]> git.proxmox.com Git - ceph.git/blame - ceph/src/mds/CInode.cc
update sources to 12.2.7
[ceph.git] / ceph / src / mds / CInode.cc
CommitLineData
7c673cae
FG
1// -*- mode:C++; tab-width:8; c-basic-offset:2; indent-tabs-mode:t -*-
2// vim: ts=8 sw=2 smarttab
3/*
4 * Ceph - scalable distributed file system
5 *
6 * Copyright (C) 2004-2006 Sage Weil <sage@newdream.net>
7 *
8 * This is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU Lesser General Public
10 * License version 2.1, as published by the Free Software
11 * Foundation. See file COPYING.
12 *
13 */
14
15#include "include/int_types.h"
16#include "common/errno.h"
17
18#include <string>
19#include <stdio.h>
20
21#include "CInode.h"
22#include "CDir.h"
23#include "CDentry.h"
24
25#include "MDSRank.h"
26#include "MDCache.h"
27#include "MDLog.h"
28#include "Locker.h"
29#include "Mutation.h"
30
31#include "events/EUpdate.h"
32
33#include "osdc/Objecter.h"
34
35#include "snap.h"
36
37#include "LogSegment.h"
38
39#include "common/Clock.h"
40
41#include "messages/MLock.h"
42#include "messages/MClientCaps.h"
43
44#include "common/config.h"
45#include "global/global_context.h"
46#include "include/assert.h"
47
48#include "mds/MDSContinuation.h"
49#include "mds/InoTable.h"
50
51#define dout_context g_ceph_context
52#define dout_subsys ceph_subsys_mds
53#undef dout_prefix
54#define dout_prefix *_dout << "mds." << mdcache->mds->get_nodeid() << ".cache.ino(" << inode.ino << ") "
55
56
57class CInodeIOContext : public MDSIOContextBase
58{
59protected:
60 CInode *in;
61 MDSRank *get_mds() override {return in->mdcache->mds;}
62public:
63 explicit CInodeIOContext(CInode *in_) : in(in_) {
64 assert(in != NULL);
65 }
66};
67
68
69LockType CInode::versionlock_type(CEPH_LOCK_IVERSION);
70LockType CInode::authlock_type(CEPH_LOCK_IAUTH);
71LockType CInode::linklock_type(CEPH_LOCK_ILINK);
72LockType CInode::dirfragtreelock_type(CEPH_LOCK_IDFT);
73LockType CInode::filelock_type(CEPH_LOCK_IFILE);
74LockType CInode::xattrlock_type(CEPH_LOCK_IXATTR);
75LockType CInode::snaplock_type(CEPH_LOCK_ISNAP);
76LockType CInode::nestlock_type(CEPH_LOCK_INEST);
77LockType CInode::flocklock_type(CEPH_LOCK_IFLOCK);
78LockType CInode::policylock_type(CEPH_LOCK_IPOLICY);
79
80//int cinode_pins[CINODE_NUM_PINS]; // counts
81ostream& CInode::print_db_line_prefix(ostream& out)
82{
83 return out << ceph_clock_now() << " mds." << mdcache->mds->get_nodeid() << ".cache.ino(" << inode.ino << ") ";
84}
85
86/*
87 * write caps and lock ids
88 */
89struct cinode_lock_info_t cinode_lock_info[] = {
90 { CEPH_LOCK_IFILE, CEPH_CAP_ANY_FILE_WR },
91 { CEPH_LOCK_IAUTH, CEPH_CAP_AUTH_EXCL },
92 { CEPH_LOCK_ILINK, CEPH_CAP_LINK_EXCL },
93 { CEPH_LOCK_IXATTR, CEPH_CAP_XATTR_EXCL },
94};
95int num_cinode_locks = sizeof(cinode_lock_info) / sizeof(cinode_lock_info[0]);
96
97
98
99ostream& operator<<(ostream& out, const CInode& in)
100{
101 string path;
102 in.make_path_string(path, true);
103
104 out << "[inode " << in.inode.ino;
105 out << " ["
106 << (in.is_multiversion() ? "...":"")
107 << in.first << "," << in.last << "]";
108 out << " " << path << (in.is_dir() ? "/":"");
109
110 if (in.is_auth()) {
111 out << " auth";
112 if (in.is_replicated())
113 out << in.get_replicas();
114 } else {
115 mds_authority_t a = in.authority();
116 out << " rep@" << a.first;
117 if (a.second != CDIR_AUTH_UNKNOWN)
118 out << "," << a.second;
119 out << "." << in.get_replica_nonce();
120 }
121
122 if (in.is_symlink())
123 out << " symlink='" << in.symlink << "'";
124 if (in.is_dir() && !in.dirfragtree.empty())
125 out << " " << in.dirfragtree;
126
127 out << " v" << in.get_version();
128 if (in.get_projected_version() > in.get_version())
129 out << " pv" << in.get_projected_version();
130
131 if (in.is_auth_pinned()) {
132 out << " ap=" << in.get_num_auth_pins() << "+" << in.get_num_nested_auth_pins();
133#ifdef MDS_AUTHPIN_SET
134 out << "(" << in.auth_pin_set << ")";
135#endif
136 }
137
138 if (in.snaprealm)
139 out << " snaprealm=" << in.snaprealm;
140
141 if (in.state_test(CInode::STATE_AMBIGUOUSAUTH)) out << " AMBIGAUTH";
142 if (in.state_test(CInode::STATE_NEEDSRECOVER)) out << " needsrecover";
143 if (in.state_test(CInode::STATE_RECOVERING)) out << " recovering";
144 if (in.state_test(CInode::STATE_DIRTYPARENT)) out << " dirtyparent";
145 if (in.state_test(CInode::STATE_MISSINGOBJS)) out << " missingobjs";
146 if (in.is_freezing_inode()) out << " FREEZING=" << in.auth_pin_freeze_allowance;
147 if (in.is_frozen_inode()) out << " FROZEN";
148 if (in.is_frozen_auth_pin()) out << " FROZEN_AUTHPIN";
149
94b18763 150 const CInode::mempool_inode *pi = in.get_projected_inode();
7c673cae
FG
151 if (pi->is_truncating())
152 out << " truncating(" << pi->truncate_from << " to " << pi->truncate_size << ")";
153
154 if (in.inode.is_dir()) {
155 out << " " << in.inode.dirstat;
156 if (g_conf->mds_debug_scatterstat && in.is_projected()) {
94b18763 157 const CInode::mempool_inode *pi = in.get_projected_inode();
7c673cae
FG
158 out << "->" << pi->dirstat;
159 }
160 } else {
161 out << " s=" << in.inode.size;
162 if (in.inode.nlink != 1)
163 out << " nl=" << in.inode.nlink;
164 }
165
166 // rstat
167 out << " " << in.inode.rstat;
168 if (!(in.inode.rstat == in.inode.accounted_rstat))
169 out << "/" << in.inode.accounted_rstat;
170 if (g_conf->mds_debug_scatterstat && in.is_projected()) {
94b18763 171 const CInode::mempool_inode *pi = in.get_projected_inode();
7c673cae
FG
172 out << "->" << pi->rstat;
173 if (!(pi->rstat == pi->accounted_rstat))
174 out << "/" << pi->accounted_rstat;
175 }
176
177 if (!in.client_need_snapflush.empty())
178 out << " need_snapflush=" << in.client_need_snapflush;
179
180
181 // locks
182 if (!in.authlock.is_sync_and_unlocked())
183 out << " " << in.authlock;
184 if (!in.linklock.is_sync_and_unlocked())
185 out << " " << in.linklock;
186 if (in.inode.is_dir()) {
187 if (!in.dirfragtreelock.is_sync_and_unlocked())
188 out << " " << in.dirfragtreelock;
189 if (!in.snaplock.is_sync_and_unlocked())
190 out << " " << in.snaplock;
191 if (!in.nestlock.is_sync_and_unlocked())
192 out << " " << in.nestlock;
193 if (!in.policylock.is_sync_and_unlocked())
194 out << " " << in.policylock;
195 } else {
196 if (!in.flocklock.is_sync_and_unlocked())
197 out << " " << in.flocklock;
198 }
199 if (!in.filelock.is_sync_and_unlocked())
200 out << " " << in.filelock;
201 if (!in.xattrlock.is_sync_and_unlocked())
202 out << " " << in.xattrlock;
203 if (!in.versionlock.is_sync_and_unlocked())
204 out << " " << in.versionlock;
205
206 // hack: spit out crap on which clients have caps
207 if (in.inode.client_ranges.size())
208 out << " cr=" << in.inode.client_ranges;
209
210 if (!in.get_client_caps().empty()) {
211 out << " caps={";
212 for (map<client_t,Capability*>::const_iterator it = in.get_client_caps().begin();
213 it != in.get_client_caps().end();
214 ++it) {
215 if (it != in.get_client_caps().begin()) out << ",";
216 out << it->first << "="
217 << ccap_string(it->second->pending());
218 if (it->second->issued() != it->second->pending())
219 out << "/" << ccap_string(it->second->issued());
220 out << "/" << ccap_string(it->second->wanted())
221 << "@" << it->second->get_last_sent();
222 }
223 out << "}";
224 if (in.get_loner() >= 0 || in.get_wanted_loner() >= 0) {
225 out << ",l=" << in.get_loner();
226 if (in.get_loner() != in.get_wanted_loner())
227 out << "(" << in.get_wanted_loner() << ")";
228 }
229 }
230 if (!in.get_mds_caps_wanted().empty()) {
231 out << " mcw={";
94b18763
FG
232 bool first = true;
233 for (const auto &p : in.get_mds_caps_wanted()) {
234 if (!first)
7c673cae 235 out << ',';
94b18763
FG
236 out << p.first << '=' << ccap_string(p.second);
237 first = false;
7c673cae
FG
238 }
239 out << '}';
240 }
241
242 if (in.get_num_ref()) {
243 out << " |";
244 in.print_pin_set(out);
245 }
246
247 if (in.inode.export_pin != MDS_RANK_NONE) {
248 out << " export_pin=" << in.inode.export_pin;
249 }
250
251 out << " " << &in;
252 out << "]";
253 return out;
254}
255
256ostream& operator<<(ostream& out, const CInode::scrub_stamp_info_t& si)
257{
258 out << "{scrub_start_version: " << si.scrub_start_version
259 << ", scrub_start_stamp: " << si.scrub_start_stamp
260 << ", last_scrub_version: " << si.last_scrub_version
261 << ", last_scrub_stamp: " << si.last_scrub_stamp;
262 return out;
263}
264
265
266
267void CInode::print(ostream& out)
268{
269 out << *this;
270}
271
272
273
274void CInode::add_need_snapflush(CInode *snapin, snapid_t snapid, client_t client)
275{
276 dout(10) << "add_need_snapflush client." << client << " snapid " << snapid << " on " << snapin << dendl;
277
278 if (client_need_snapflush.empty()) {
279 get(CInode::PIN_NEEDSNAPFLUSH);
280
281 // FIXME: this is non-optimal, as we'll block freezes/migrations for potentially
282 // long periods waiting for clients to flush their snaps.
283 auth_pin(this); // pin head inode...
284 }
285
94b18763 286 auto &clients = client_need_snapflush[snapid];
7c673cae
FG
287 if (clients.empty())
288 snapin->auth_pin(this); // ...and pin snapped/old inode!
289
290 clients.insert(client);
291}
292
293void CInode::remove_need_snapflush(CInode *snapin, snapid_t snapid, client_t client)
294{
94b18763
FG
295 dout(10) << __func__ << " client." << client << " snapid " << snapid << " on " << snapin << dendl;
296 auto it = client_need_snapflush.find(snapid);
297 if (it == client_need_snapflush.end()) {
7c673cae
FG
298 dout(10) << " snapid not found" << dendl;
299 return;
300 }
94b18763
FG
301 size_t n = it->second.erase(client);
302 if (n == 0) {
7c673cae
FG
303 dout(10) << " client not found" << dendl;
304 return;
305 }
94b18763
FG
306 if (it->second.empty()) {
307 client_need_snapflush.erase(it);
7c673cae
FG
308 snapin->auth_unpin(this);
309
310 if (client_need_snapflush.empty()) {
311 put(CInode::PIN_NEEDSNAPFLUSH);
312 auth_unpin(this);
313 }
314 }
315}
316
317bool CInode::split_need_snapflush(CInode *cowin, CInode *in)
318{
319 dout(10) << "split_need_snapflush [" << cowin->first << "," << cowin->last << "] for " << *cowin << dendl;
320 bool need_flush = false;
94b18763
FG
321 for (auto it = client_need_snapflush.lower_bound(cowin->first);
322 it != client_need_snapflush.end() && it->first < in->first; ) {
323 assert(!it->second.empty());
324 if (cowin->last >= it->first) {
7c673cae
FG
325 cowin->auth_pin(this);
326 need_flush = true;
94b18763
FG
327 ++it;
328 } else {
329 it = client_need_snapflush.erase(it);
330 }
7c673cae
FG
331 in->auth_unpin(this);
332 }
333 return need_flush;
334}
335
336void CInode::mark_dirty_rstat()
337{
338 if (!state_test(STATE_DIRTYRSTAT)) {
339 dout(10) << "mark_dirty_rstat" << dendl;
340 state_set(STATE_DIRTYRSTAT);
341 get(PIN_DIRTYRSTAT);
224ce89b
WB
342 CDentry *pdn = get_projected_parent_dn();
343 if (pdn->is_auth()) {
344 CDir *pdir = pdn->dir;
345 pdir->dirty_rstat_inodes.push_back(&dirty_rstat_item);
346 mdcache->mds->locker->mark_updated_scatterlock(&pdir->inode->nestlock);
347 } else {
348 // under cross-MDS rename.
349 // DIRTYRSTAT flag will get cleared when rename finishes
350 assert(state_test(STATE_AMBIGUOUSAUTH));
351 }
7c673cae
FG
352 }
353}
354void CInode::clear_dirty_rstat()
355{
356 if (state_test(STATE_DIRTYRSTAT)) {
357 dout(10) << "clear_dirty_rstat" << dendl;
358 state_clear(STATE_DIRTYRSTAT);
359 put(PIN_DIRTYRSTAT);
360 dirty_rstat_item.remove_myself();
361 }
362}
363
94b18763
FG
364/* Ideally this function would be subsumed by project_inode but it is also
365 * needed by CInode::project_past_snaprealm_parent so we keep it.
366 */
367sr_t &CInode::project_snaprealm(projected_inode &pi)
7c673cae 368{
94b18763
FG
369 const sr_t *cur_srnode = get_projected_srnode();
370
371 assert(!pi.snapnode);
372 if (cur_srnode) {
373 pi.snapnode.reset(new sr_t(*cur_srnode));
7c673cae 374 } else {
94b18763
FG
375 pi.snapnode.reset(new sr_t());
376 pi.snapnode->created = 0;
377 pi.snapnode->current_parent_since = get_oldest_snap();
7c673cae 378 }
94b18763 379 ++num_projected_srnodes;
7c673cae 380
94b18763
FG
381 dout(10) << __func__ << " " << pi.snapnode.get() << dendl;
382 return *pi.snapnode.get();
383}
7c673cae 384
94b18763
FG
385CInode::projected_inode &CInode::project_inode(bool xattr, bool snap)
386{
387 if (projected_nodes.empty()) {
388 projected_nodes.emplace_back(inode);
389 } else {
390 projected_nodes.emplace_back(projected_nodes.back().inode);
7c673cae 391 }
94b18763 392 auto &pi = projected_nodes.back();
7c673cae
FG
393
394 if (scrub_infop && scrub_infop->last_scrub_dirty) {
94b18763
FG
395 pi.inode.last_scrub_stamp = scrub_infop->last_scrub_stamp;
396 pi.inode.last_scrub_version = scrub_infop->last_scrub_version;
7c673cae
FG
397 scrub_infop->last_scrub_dirty = false;
398 scrub_maybe_delete_info();
399 }
94b18763
FG
400
401 if (xattr) {
402 pi.xattrs.reset(new mempool_xattr_map(*get_projected_xattrs()));
403 ++num_projected_xattrs;
404 }
405
406 if (snap) {
407 project_snaprealm(pi);
408 }
409
410 dout(15) << __func__ << " " << pi.inode.ino << dendl;
411 return pi;
7c673cae
FG
412}
413
414void CInode::pop_and_dirty_projected_inode(LogSegment *ls)
415{
416 assert(!projected_nodes.empty());
94b18763
FG
417 auto &front = projected_nodes.front();
418 dout(15) << __func__ << " " << front.inode.ino
419 << " v" << front.inode.version << dendl;
7c673cae
FG
420 int64_t old_pool = inode.layout.pool_id;
421
94b18763
FG
422 mark_dirty(front.inode.version, ls);
423 inode = front.inode;
7c673cae
FG
424
425 if (inode.is_backtrace_updated())
28e407b8 426 mark_dirty_parent(ls, old_pool != inode.layout.pool_id);
7c673cae 427
94b18763 428 if (front.xattrs) {
7c673cae 429 --num_projected_xattrs;
94b18763 430 xattrs = *front.xattrs;
7c673cae
FG
431 }
432
94b18763
FG
433 auto &snapnode = front.snapnode;
434 if (snapnode) {
435 pop_projected_snaprealm(snapnode.get());
7c673cae
FG
436 --num_projected_srnodes;
437 }
438
7c673cae
FG
439 projected_nodes.pop_front();
440}
441
7c673cae
FG
442/* if newparent != parent, add parent to past_parents
443 if parent DNE, we need to find what the parent actually is and fill that in */
444void CInode::project_past_snaprealm_parent(SnapRealm *newparent)
445{
94b18763
FG
446 assert(!projected_nodes.empty());
447 sr_t &new_snap = project_snaprealm(projected_nodes.back());
7c673cae
FG
448 SnapRealm *oldparent;
449 if (!snaprealm) {
450 oldparent = find_snaprealm();
94b18763 451 new_snap.seq = oldparent->get_newest_seq();
7c673cae
FG
452 }
453 else
454 oldparent = snaprealm->parent;
455
456 if (newparent != oldparent) {
457 snapid_t oldparentseq = oldparent->get_newest_seq();
94b18763
FG
458 if (oldparentseq + 1 > new_snap.current_parent_since) {
459 new_snap.past_parents[oldparentseq].ino = oldparent->inode->ino();
460 new_snap.past_parents[oldparentseq].first = new_snap.current_parent_since;
7c673cae 461 }
94b18763 462 new_snap.current_parent_since = std::max(oldparentseq, newparent->get_last_created()) + 1;
7c673cae
FG
463 }
464}
465
466void CInode::pop_projected_snaprealm(sr_t *next_snaprealm)
467{
468 assert(next_snaprealm);
469 dout(10) << "pop_projected_snaprealm " << next_snaprealm
470 << " seq" << next_snaprealm->seq << dendl;
471 bool invalidate_cached_snaps = false;
472 if (!snaprealm) {
473 open_snaprealm();
474 } else if (next_snaprealm->past_parents.size() !=
475 snaprealm->srnode.past_parents.size()) {
476 invalidate_cached_snaps = true;
477 // re-open past parents
478 snaprealm->_close_parents();
479
480 dout(10) << " realm " << *snaprealm << " past_parents " << snaprealm->srnode.past_parents
481 << " -> " << next_snaprealm->past_parents << dendl;
482 }
483 snaprealm->srnode = *next_snaprealm;
7c673cae
FG
484
485 // we should be able to open these up (or have them already be open).
486 bool ok = snaprealm->_open_parents(NULL);
487 assert(ok);
488
489 if (invalidate_cached_snaps)
490 snaprealm->invalidate_cached_snaps();
491
492 if (snaprealm->parent)
493 dout(10) << " realm " << *snaprealm << " parent " << *snaprealm->parent << dendl;
494}
495
496
497// ====== CInode =======
498
499// dirfrags
500
94b18763 501__u32 InodeStoreBase::hash_dentry_name(boost::string_view dn)
7c673cae
FG
502{
503 int which = inode.dir_layout.dl_dir_hash;
504 if (!which)
505 which = CEPH_STR_HASH_LINUX;
506 assert(ceph_str_hash_valid(which));
507 return ceph_str_hash(which, dn.data(), dn.length());
508}
509
94b18763 510frag_t InodeStoreBase::pick_dirfrag(boost::string_view dn)
7c673cae
FG
511{
512 if (dirfragtree.empty())
513 return frag_t(); // avoid the string hash if we can.
514
515 __u32 h = hash_dentry_name(dn);
516 return dirfragtree[h];
517}
518
519bool CInode::get_dirfrags_under(frag_t fg, list<CDir*>& ls)
520{
521 bool all = true;
94b18763 522 std::list<frag_t> fglist;
7c673cae
FG
523 dirfragtree.get_leaves_under(fg, fglist);
524 for (list<frag_t>::iterator p = fglist.begin(); p != fglist.end(); ++p)
525 if (dirfrags.count(*p))
526 ls.push_back(dirfrags[*p]);
527 else
528 all = false;
529
530 if (all)
531 return all;
532
533 fragtree_t tmpdft;
534 tmpdft.force_to_leaf(g_ceph_context, fg);
94b18763
FG
535 for (auto &p : dirfrags) {
536 tmpdft.force_to_leaf(g_ceph_context, p.first);
537 if (fg.contains(p.first) && !dirfragtree.is_leaf(p.first))
538 ls.push_back(p.second);
7c673cae
FG
539 }
540
541 all = true;
542 tmpdft.get_leaves_under(fg, fglist);
94b18763
FG
543 for (const auto &p : fglist) {
544 if (!dirfrags.count(p)) {
7c673cae
FG
545 all = false;
546 break;
547 }
94b18763 548 }
7c673cae
FG
549
550 return all;
551}
552
553void CInode::verify_dirfrags()
554{
555 bool bad = false;
94b18763
FG
556 for (const auto &p : dirfrags) {
557 if (!dirfragtree.is_leaf(p.first)) {
558 dout(0) << "have open dirfrag " << p.first << " but not leaf in " << dirfragtree
559 << ": " << *p.second << dendl;
7c673cae
FG
560 bad = true;
561 }
562 }
563 assert(!bad);
564}
565
566void CInode::force_dirfrags()
567{
568 bool bad = false;
94b18763
FG
569 for (auto &p : dirfrags) {
570 if (!dirfragtree.is_leaf(p.first)) {
571 dout(0) << "have open dirfrag " << p.first << " but not leaf in " << dirfragtree
572 << ": " << *p.second << dendl;
7c673cae
FG
573 bad = true;
574 }
575 }
576
577 if (bad) {
578 list<frag_t> leaves;
579 dirfragtree.get_leaves(leaves);
580 for (list<frag_t>::iterator p = leaves.begin(); p != leaves.end(); ++p)
581 mdcache->get_force_dirfrag(dirfrag_t(ino(),*p), true);
582 }
583
584 verify_dirfrags();
585}
586
587CDir *CInode::get_approx_dirfrag(frag_t fg)
588{
589 CDir *dir = get_dirfrag(fg);
590 if (dir) return dir;
591
592 // find a child?
593 list<CDir*> ls;
594 get_dirfrags_under(fg, ls);
595 if (!ls.empty())
596 return ls.front();
597
598 // try parents?
599 while (fg.bits() > 0) {
600 fg = fg.parent();
601 dir = get_dirfrag(fg);
602 if (dir) return dir;
603 }
604 return NULL;
605}
606
94b18763 607void CInode::get_dirfrags(std::list<CDir*>& ls)
7c673cae
FG
608{
609 // all dirfrags
94b18763
FG
610 for (const auto &p : dirfrags) {
611 ls.push_back(p.second);
612 }
7c673cae
FG
613}
614void CInode::get_nested_dirfrags(list<CDir*>& ls)
615{
616 // dirfrags in same subtree
94b18763
FG
617 for (const auto &p : dirfrags) {
618 if (!p.second->is_subtree_root())
619 ls.push_back(p.second);
620 }
7c673cae
FG
621}
622void CInode::get_subtree_dirfrags(list<CDir*>& ls)
623{
624 // dirfrags that are roots of new subtrees
94b18763
FG
625 for (const auto &p : dirfrags) {
626 if (p.second->is_subtree_root())
627 ls.push_back(p.second);
628 }
7c673cae
FG
629}
630
631
632CDir *CInode::get_or_open_dirfrag(MDCache *mdcache, frag_t fg)
633{
634 assert(is_dir());
635
636 // have it?
637 CDir *dir = get_dirfrag(fg);
638 if (!dir) {
639 // create it.
640 assert(is_auth() || mdcache->mds->is_any_replay());
641 dir = new CDir(this, fg, mdcache, is_auth());
642 add_dirfrag(dir);
643 }
644 return dir;
645}
646
647CDir *CInode::add_dirfrag(CDir *dir)
648{
649 assert(dirfrags.count(dir->dirfrag().frag) == 0);
650 dirfrags[dir->dirfrag().frag] = dir;
651
652 if (stickydir_ref > 0) {
653 dir->state_set(CDir::STATE_STICKY);
654 dir->get(CDir::PIN_STICKY);
655 }
656
657 maybe_export_pin();
658
659 return dir;
660}
661
662void CInode::close_dirfrag(frag_t fg)
663{
664 dout(14) << "close_dirfrag " << fg << dendl;
665 assert(dirfrags.count(fg));
666
667 CDir *dir = dirfrags[fg];
668 dir->remove_null_dentries();
669
670 // clear dirty flag
671 if (dir->is_dirty())
672 dir->mark_clean();
673
674 if (stickydir_ref > 0) {
675 dir->state_clear(CDir::STATE_STICKY);
676 dir->put(CDir::PIN_STICKY);
677 }
678
679 // dump any remaining dentries, for debugging purposes
94b18763
FG
680 for (const auto &p : dir->items)
681 dout(14) << __func__ << " LEFTOVER dn " << *p.second << dendl;
7c673cae
FG
682
683 assert(dir->get_num_ref() == 0);
684 delete dir;
685 dirfrags.erase(fg);
686}
687
688void CInode::close_dirfrags()
689{
690 while (!dirfrags.empty())
691 close_dirfrag(dirfrags.begin()->first);
692}
693
694bool CInode::has_subtree_root_dirfrag(int auth)
695{
94b18763
FG
696 for (const auto &p : dirfrags) {
697 if (p.second->is_subtree_root() &&
698 (auth == -1 || p.second->dir_auth.first == auth))
7c673cae 699 return true;
94b18763 700 }
7c673cae
FG
701 return false;
702}
703
704bool CInode::has_subtree_or_exporting_dirfrag()
705{
94b18763
FG
706 for (const auto &p : dirfrags) {
707 if (p.second->is_subtree_root() ||
708 p.second->state_test(CDir::STATE_EXPORTING))
7c673cae 709 return true;
94b18763 710 }
7c673cae
FG
711 return false;
712}
713
714void CInode::get_stickydirs()
715{
716 if (stickydir_ref == 0) {
717 get(PIN_STICKYDIRS);
94b18763
FG
718 for (const auto &p : dirfrags) {
719 p.second->state_set(CDir::STATE_STICKY);
720 p.second->get(CDir::PIN_STICKY);
7c673cae
FG
721 }
722 }
723 stickydir_ref++;
724}
725
726void CInode::put_stickydirs()
727{
728 assert(stickydir_ref > 0);
729 stickydir_ref--;
730 if (stickydir_ref == 0) {
731 put(PIN_STICKYDIRS);
94b18763
FG
732 for (const auto &p : dirfrags) {
733 p.second->state_clear(CDir::STATE_STICKY);
734 p.second->put(CDir::PIN_STICKY);
7c673cae
FG
735 }
736 }
737}
738
739
740
741
742
743// pins
744
745void CInode::first_get()
746{
747 // pin my dentry?
748 if (parent)
749 parent->get(CDentry::PIN_INODEPIN);
750}
751
752void CInode::last_put()
753{
754 // unpin my dentry?
755 if (parent)
756 parent->put(CDentry::PIN_INODEPIN);
757}
758
759void CInode::_put()
760{
761 if (get_num_ref() == (int)is_dirty() + (int)is_dirty_parent())
762 mdcache->maybe_eval_stray(this, true);
763}
764
765void CInode::add_remote_parent(CDentry *p)
766{
767 if (remote_parents.empty())
768 get(PIN_REMOTEPARENT);
769 remote_parents.insert(p);
770}
771void CInode::remove_remote_parent(CDentry *p)
772{
773 remote_parents.erase(p);
774 if (remote_parents.empty())
775 put(PIN_REMOTEPARENT);
776}
777
778
779
780
781CDir *CInode::get_parent_dir()
782{
783 if (parent)
784 return parent->dir;
785 return NULL;
786}
787CDir *CInode::get_projected_parent_dir()
788{
789 CDentry *p = get_projected_parent_dn();
790 if (p)
791 return p->dir;
792 return NULL;
793}
794CInode *CInode::get_parent_inode()
795{
796 if (parent)
797 return parent->dir->inode;
798 return NULL;
799}
800
801bool CInode::is_projected_ancestor_of(CInode *other)
802{
803 while (other) {
804 if (other == this)
805 return true;
806 if (!other->get_projected_parent_dn())
807 break;
808 other = other->get_projected_parent_dn()->get_dir()->get_inode();
809 }
810 return false;
811}
812
813/*
814 * Because a non-directory inode may have multiple links, the use_parent
815 * argument allows selecting which parent to use for path construction. This
816 * argument is only meaningful for the final component (i.e. the first of the
817 * nested calls) because directories cannot have multiple hard links. If
818 * use_parent is NULL and projected is true, the primary parent's projected
819 * inode is used all the way up the path chain. Otherwise the primary parent
820 * stable inode is used.
821 */
822void CInode::make_path_string(string& s, bool projected, const CDentry *use_parent) const
823{
824 if (!use_parent) {
825 use_parent = projected ? get_projected_parent_dn() : parent;
826 }
827
828 if (use_parent) {
829 use_parent->make_path_string(s, projected);
830 } else if (is_root()) {
831 s = "";
832 } else if (is_mdsdir()) {
833 char t[40];
834 uint64_t eino(ino());
835 eino -= MDS_INO_MDSDIR_OFFSET;
836 snprintf(t, sizeof(t), "~mds%" PRId64, eino);
837 s = t;
838 } else {
839 char n[40];
840 uint64_t eino(ino());
841 snprintf(n, sizeof(n), "#%" PRIx64, eino);
842 s += n;
843 }
844}
845
846void CInode::make_path(filepath& fp, bool projected) const
847{
848 const CDentry *use_parent = projected ? get_projected_parent_dn() : parent;
849 if (use_parent) {
850 assert(!is_base());
851 use_parent->make_path(fp, projected);
852 } else {
853 fp = filepath(ino());
854 }
855}
856
857void CInode::name_stray_dentry(string& dname)
858{
859 char s[20];
860 snprintf(s, sizeof(s), "%llx", (unsigned long long)inode.ino.val);
861 dname = s;
862}
863
864version_t CInode::pre_dirty()
865{
866 version_t pv;
867 CDentry* _cdentry = get_projected_parent_dn();
868 if (_cdentry) {
869 pv = _cdentry->pre_dirty(get_projected_version());
870 dout(10) << "pre_dirty " << pv << " (current v " << inode.version << ")" << dendl;
871 } else {
872 assert(is_base());
873 pv = get_projected_version() + 1;
874 }
94b18763 875 // force update backtrace for old format inode (see mempool_inode::decode)
7c673cae 876 if (inode.backtrace_version == 0 && !projected_nodes.empty()) {
94b18763
FG
877 mempool_inode &pi = projected_nodes.back().inode;
878 if (pi.backtrace_version == 0)
879 pi.update_backtrace(pv);
7c673cae
FG
880 }
881 return pv;
882}
883
884void CInode::_mark_dirty(LogSegment *ls)
885{
886 if (!state_test(STATE_DIRTY)) {
887 state_set(STATE_DIRTY);
888 get(PIN_DIRTY);
889 assert(ls);
890 }
891
892 // move myself to this segment's dirty list
893 if (ls)
894 ls->dirty_inodes.push_back(&item_dirty);
895}
896
897void CInode::mark_dirty(version_t pv, LogSegment *ls) {
898
899 dout(10) << "mark_dirty " << *this << dendl;
900
901 /*
902 NOTE: I may already be dirty, but this fn _still_ needs to be called so that
903 the directory is (perhaps newly) dirtied, and so that parent_dir_version is
904 updated below.
905 */
906
907 // only auth can get dirty. "dirty" async data in replicas is relative to
908 // filelock state, not the dirty flag.
909 assert(is_auth());
910
911 // touch my private version
912 assert(inode.version < pv);
913 inode.version = pv;
914 _mark_dirty(ls);
915
916 // mark dentry too
917 if (parent)
918 parent->mark_dirty(pv, ls);
919}
920
921
922void CInode::mark_clean()
923{
924 dout(10) << " mark_clean " << *this << dendl;
925 if (state_test(STATE_DIRTY)) {
926 state_clear(STATE_DIRTY);
927 put(PIN_DIRTY);
928
929 // remove myself from ls dirty list
930 item_dirty.remove_myself();
931 }
932}
933
934
935// --------------
936// per-inode storage
937// (currently for root inode only)
938
939struct C_IO_Inode_Stored : public CInodeIOContext {
940 version_t version;
941 Context *fin;
942 C_IO_Inode_Stored(CInode *i, version_t v, Context *f) : CInodeIOContext(i), version(v), fin(f) {}
943 void finish(int r) override {
944 in->_stored(r, version, fin);
945 }
946};
947
948object_t InodeStoreBase::get_object_name(inodeno_t ino, frag_t fg, const char *suffix)
949{
950 char n[60];
951 snprintf(n, sizeof(n), "%llx.%08llx%s", (long long unsigned)ino, (long long unsigned)fg, suffix ? suffix : "");
952 return object_t(n);
953}
954
955void CInode::store(MDSInternalContextBase *fin)
956{
957 dout(10) << "store " << get_version() << dendl;
958 assert(is_base());
959
960 if (snaprealm)
961 purge_stale_snap_data(snaprealm->get_snaps());
962
963 // encode
964 bufferlist bl;
965 string magic = CEPH_FS_ONDISK_MAGIC;
966 ::encode(magic, bl);
967 encode_store(bl, mdcache->mds->mdsmap->get_up_features());
968
969 // write it.
970 SnapContext snapc;
971 ObjectOperation m;
972 m.write_full(bl);
973
974 object_t oid = CInode::get_object_name(ino(), frag_t(), ".inode");
975 object_locator_t oloc(mdcache->mds->mdsmap->get_metadata_pool());
976
977 Context *newfin =
978 new C_OnFinisher(new C_IO_Inode_Stored(this, get_version(), fin),
979 mdcache->mds->finisher);
980 mdcache->mds->objecter->mutate(oid, oloc, m, snapc,
981 ceph::real_clock::now(), 0,
982 newfin);
983}
984
985void CInode::_stored(int r, version_t v, Context *fin)
986{
987 if (r < 0) {
988 dout(1) << "store error " << r << " v " << v << " on " << *this << dendl;
d2e6a577
FG
989 mdcache->mds->clog->error() << "failed to store inode " << ino()
990 << " object: " << cpp_strerror(r);
7c673cae
FG
991 mdcache->mds->handle_write_error(r);
992 fin->complete(r);
993 return;
994 }
995
996 dout(10) << "_stored " << v << " on " << *this << dendl;
997 if (v == get_projected_version())
998 mark_clean();
999
1000 fin->complete(0);
1001}
1002
1003void CInode::flush(MDSInternalContextBase *fin)
1004{
1005 dout(10) << "flush " << *this << dendl;
1006 assert(is_auth() && can_auth_pin());
1007
1008 MDSGatherBuilder gather(g_ceph_context);
1009
1010 if (is_dirty_parent()) {
1011 store_backtrace(gather.new_sub());
1012 }
1013 if (is_dirty()) {
1014 if (is_base()) {
1015 store(gather.new_sub());
1016 } else {
1017 parent->dir->commit(0, gather.new_sub());
1018 }
1019 }
1020
1021 if (gather.has_subs()) {
1022 gather.set_finisher(fin);
1023 gather.activate();
1024 } else {
1025 fin->complete(0);
1026 }
1027}
1028
1029struct C_IO_Inode_Fetched : public CInodeIOContext {
1030 bufferlist bl, bl2;
1031 Context *fin;
1032 C_IO_Inode_Fetched(CInode *i, Context *f) : CInodeIOContext(i), fin(f) {}
1033 void finish(int r) override {
1034 // Ignore 'r', because we fetch from two places, so r is usually ENOENT
1035 in->_fetched(bl, bl2, fin);
1036 }
1037};
1038
1039void CInode::fetch(MDSInternalContextBase *fin)
1040{
1041 dout(10) << "fetch" << dendl;
1042
1043 C_IO_Inode_Fetched *c = new C_IO_Inode_Fetched(this, fin);
1044 C_GatherBuilder gather(g_ceph_context, new C_OnFinisher(c, mdcache->mds->finisher));
1045
1046 object_t oid = CInode::get_object_name(ino(), frag_t(), "");
1047 object_locator_t oloc(mdcache->mds->mdsmap->get_metadata_pool());
1048
1049 // Old on-disk format: inode stored in xattr of a dirfrag
1050 ObjectOperation rd;
1051 rd.getxattr("inode", &c->bl, NULL);
1052 mdcache->mds->objecter->read(oid, oloc, rd, CEPH_NOSNAP, (bufferlist*)NULL, 0, gather.new_sub());
1053
1054 // Current on-disk format: inode stored in a .inode object
1055 object_t oid2 = CInode::get_object_name(ino(), frag_t(), ".inode");
1056 mdcache->mds->objecter->read(oid2, oloc, 0, 0, CEPH_NOSNAP, &c->bl2, 0, gather.new_sub());
1057
1058 gather.activate();
1059}
1060
1061void CInode::_fetched(bufferlist& bl, bufferlist& bl2, Context *fin)
1062{
1063 dout(10) << "_fetched got " << bl.length() << " and " << bl2.length() << dendl;
1064 bufferlist::iterator p;
1065 if (bl2.length()) {
1066 p = bl2.begin();
1067 } else if (bl.length()) {
1068 p = bl.begin();
1069 } else {
d2e6a577 1070 derr << "No data while reading inode " << ino() << dendl;
7c673cae
FG
1071 fin->complete(-ENOENT);
1072 return;
1073 }
1074
1075 // Attempt decode
1076 try {
1077 string magic;
1078 ::decode(magic, p);
1079 dout(10) << " magic is '" << magic << "' (expecting '"
1080 << CEPH_FS_ONDISK_MAGIC << "')" << dendl;
1081 if (magic != CEPH_FS_ONDISK_MAGIC) {
1082 dout(0) << "on disk magic '" << magic << "' != my magic '" << CEPH_FS_ONDISK_MAGIC
1083 << "'" << dendl;
1084 fin->complete(-EINVAL);
1085 } else {
1086 decode_store(p);
1087 dout(10) << "_fetched " << *this << dendl;
1088 fin->complete(0);
1089 }
1090 } catch (buffer::error &err) {
d2e6a577 1091 derr << "Corrupt inode " << ino() << ": " << err << dendl;
7c673cae
FG
1092 fin->complete(-EINVAL);
1093 return;
1094 }
1095}
1096
1097void CInode::build_backtrace(int64_t pool, inode_backtrace_t& bt)
1098{
1099 bt.ino = inode.ino;
1100 bt.ancestors.clear();
1101 bt.pool = pool;
1102
1103 CInode *in = this;
1104 CDentry *pdn = get_parent_dn();
1105 while (pdn) {
1106 CInode *diri = pdn->get_dir()->get_inode();
94b18763 1107 bt.ancestors.push_back(inode_backpointer_t(diri->ino(), pdn->get_name(), in->inode.version));
7c673cae
FG
1108 in = diri;
1109 pdn = in->get_parent_dn();
1110 }
94b18763 1111 for (auto &p : inode.old_pools) {
7c673cae 1112 // don't add our own pool id to old_pools to avoid looping (e.g. setlayout 0, 1, 0)
94b18763
FG
1113 if (p != pool)
1114 bt.old_pools.insert(p);
7c673cae
FG
1115 }
1116}
1117
1118struct C_IO_Inode_StoredBacktrace : public CInodeIOContext {
1119 version_t version;
1120 Context *fin;
1121 C_IO_Inode_StoredBacktrace(CInode *i, version_t v, Context *f) : CInodeIOContext(i), version(v), fin(f) {}
1122 void finish(int r) override {
1123 in->_stored_backtrace(r, version, fin);
1124 }
1125};
1126
1127void CInode::store_backtrace(MDSInternalContextBase *fin, int op_prio)
1128{
1129 dout(10) << "store_backtrace on " << *this << dendl;
1130 assert(is_dirty_parent());
1131
1132 if (op_prio < 0)
1133 op_prio = CEPH_MSG_PRIO_DEFAULT;
1134
1135 auth_pin(this);
1136
1137 const int64_t pool = get_backtrace_pool();
1138 inode_backtrace_t bt;
1139 build_backtrace(pool, bt);
1140 bufferlist parent_bl;
1141 ::encode(bt, parent_bl);
1142
1143 ObjectOperation op;
1144 op.priority = op_prio;
1145 op.create(false);
1146 op.setxattr("parent", parent_bl);
1147
1148 bufferlist layout_bl;
1149 ::encode(inode.layout, layout_bl, mdcache->mds->mdsmap->get_up_features());
1150 op.setxattr("layout", layout_bl);
1151
1152 SnapContext snapc;
1153 object_t oid = get_object_name(ino(), frag_t(), "");
1154 object_locator_t oloc(pool);
1155 Context *fin2 = new C_OnFinisher(
1156 new C_IO_Inode_StoredBacktrace(this, inode.backtrace_version, fin),
1157 mdcache->mds->finisher);
1158
1159 if (!state_test(STATE_DIRTYPOOL) || inode.old_pools.empty()) {
1160 dout(20) << __func__ << ": no dirtypool or no old pools" << dendl;
1161 mdcache->mds->objecter->mutate(oid, oloc, op, snapc,
1162 ceph::real_clock::now(),
1163 0, fin2);
1164 return;
1165 }
1166
1167 C_GatherBuilder gather(g_ceph_context, fin2);
1168 mdcache->mds->objecter->mutate(oid, oloc, op, snapc,
1169 ceph::real_clock::now(),
1170 0, gather.new_sub());
1171
1172 // In the case where DIRTYPOOL is set, we update all old pools backtraces
1173 // such that anyone reading them will see the new pool ID in
1174 // inode_backtrace_t::pool and go read everything else from there.
94b18763
FG
1175 for (const auto &p : inode.old_pools) {
1176 if (p == pool)
7c673cae
FG
1177 continue;
1178
94b18763 1179 dout(20) << __func__ << ": updating old pool " << p << dendl;
7c673cae
FG
1180
1181 ObjectOperation op;
1182 op.priority = op_prio;
1183 op.create(false);
1184 op.setxattr("parent", parent_bl);
1185
94b18763 1186 object_locator_t oloc(p);
7c673cae
FG
1187 mdcache->mds->objecter->mutate(oid, oloc, op, snapc,
1188 ceph::real_clock::now(),
1189 0, gather.new_sub());
1190 }
1191 gather.activate();
1192}
1193
1194void CInode::_stored_backtrace(int r, version_t v, Context *fin)
1195{
1196 if (r == -ENOENT) {
1197 const int64_t pool = get_backtrace_pool();
1198 bool exists = mdcache->mds->objecter->with_osdmap(
1199 [pool](const OSDMap &osd_map) {
1200 return osd_map.have_pg_pool(pool);
1201 });
1202
1203 // This ENOENT is because the pool doesn't exist (the user deleted it
1204 // out from under us), so the backtrace can never be written, so pretend
1205 // to succeed so that the user can proceed to e.g. delete the file.
1206 if (!exists) {
1207 dout(4) << "store_backtrace got ENOENT: a data pool was deleted "
1208 "beneath us!" << dendl;
1209 r = 0;
1210 }
1211 }
1212
1213 if (r < 0) {
1214 dout(1) << "store backtrace error " << r << " v " << v << dendl;
1215 mdcache->mds->clog->error() << "failed to store backtrace on ino "
1216 << ino() << " object"
1217 << ", pool " << get_backtrace_pool()
1218 << ", errno " << r;
1219 mdcache->mds->handle_write_error(r);
1220 if (fin)
1221 fin->complete(r);
1222 return;
1223 }
1224
1225 dout(10) << "_stored_backtrace v " << v << dendl;
1226
1227 auth_unpin(this);
1228 if (v == inode.backtrace_version)
1229 clear_dirty_parent();
1230 if (fin)
1231 fin->complete(0);
1232}
1233
1234void CInode::fetch_backtrace(Context *fin, bufferlist *backtrace)
1235{
1236 mdcache->fetch_backtrace(inode.ino, get_backtrace_pool(), *backtrace, fin);
1237}
1238
28e407b8 1239void CInode::mark_dirty_parent(LogSegment *ls, bool dirty_pool)
7c673cae
FG
1240{
1241 if (!state_test(STATE_DIRTYPARENT)) {
1242 dout(10) << "mark_dirty_parent" << dendl;
1243 state_set(STATE_DIRTYPARENT);
1244 get(PIN_DIRTYPARENT);
1245 assert(ls);
1246 }
1247 if (dirty_pool)
1248 state_set(STATE_DIRTYPOOL);
1249 if (ls)
1250 ls->dirty_parent_inodes.push_back(&item_dirty_parent);
1251}
1252
1253void CInode::clear_dirty_parent()
1254{
1255 if (state_test(STATE_DIRTYPARENT)) {
1256 dout(10) << "clear_dirty_parent" << dendl;
1257 state_clear(STATE_DIRTYPARENT);
1258 state_clear(STATE_DIRTYPOOL);
1259 put(PIN_DIRTYPARENT);
1260 item_dirty_parent.remove_myself();
1261 }
1262}
1263
1264void CInode::verify_diri_backtrace(bufferlist &bl, int err)
1265{
1266 if (is_base() || is_dirty_parent() || !is_auth())
1267 return;
1268
1269 dout(10) << "verify_diri_backtrace" << dendl;
1270
1271 if (err == 0) {
1272 inode_backtrace_t backtrace;
1273 ::decode(backtrace, bl);
1274 CDentry *pdn = get_parent_dn();
1275 if (backtrace.ancestors.empty() ||
94b18763 1276 backtrace.ancestors[0].dname != pdn->get_name() ||
7c673cae
FG
1277 backtrace.ancestors[0].dirino != pdn->get_dir()->ino())
1278 err = -EINVAL;
1279 }
1280
1281 if (err) {
1282 MDSRank *mds = mdcache->mds;
d2e6a577 1283 mds->clog->error() << "bad backtrace on directory inode " << ino();
7c673cae
FG
1284 assert(!"bad backtrace" == (g_conf->mds_verify_backtrace > 1));
1285
28e407b8 1286 mark_dirty_parent(mds->mdlog->get_current_segment(), false);
7c673cae
FG
1287 mds->mdlog->flush();
1288 }
1289}
1290
1291// ------------------
1292// parent dir
1293
1294
1295void InodeStoreBase::encode_bare(bufferlist &bl, uint64_t features,
1296 const bufferlist *snap_blob) const
1297{
1298 ::encode(inode, bl, features);
1299 if (is_symlink())
1300 ::encode(symlink, bl);
1301 ::encode(dirfragtree, bl);
1302 ::encode(xattrs, bl);
1303 if (snap_blob)
1304 ::encode(*snap_blob, bl);
1305 else
1306 ::encode(bufferlist(), bl);
1307 ::encode(old_inodes, bl, features);
1308 ::encode(oldest_snap, bl);
1309 ::encode(damage_flags, bl);
1310}
1311
1312void InodeStoreBase::encode(bufferlist &bl, uint64_t features,
1313 const bufferlist *snap_blob) const
1314{
1315 ENCODE_START(6, 4, bl);
1316 encode_bare(bl, features, snap_blob);
1317 ENCODE_FINISH(bl);
1318}
1319
1320void CInode::encode_store(bufferlist& bl, uint64_t features)
1321{
1322 bufferlist snap_blob;
1323 encode_snap_blob(snap_blob);
1324 InodeStoreBase::encode(bl, mdcache->mds->mdsmap->get_up_features(),
1325 &snap_blob);
1326}
1327
1328void InodeStoreBase::decode_bare(bufferlist::iterator &bl,
1329 bufferlist& snap_blob, __u8 struct_v)
1330{
1331 ::decode(inode, bl);
94b18763
FG
1332 if (is_symlink()) {
1333 std::string tmp;
1334 ::decode(tmp, bl);
1335 symlink = mempool::mds_co::string(boost::string_view(tmp));
1336 }
7c673cae
FG
1337 ::decode(dirfragtree, bl);
1338 ::decode(xattrs, bl);
1339 ::decode(snap_blob, bl);
1340
1341 ::decode(old_inodes, bl);
1342 if (struct_v == 2 && inode.is_dir()) {
1343 bool default_layout_exists;
1344 ::decode(default_layout_exists, bl);
1345 if (default_layout_exists) {
1346 ::decode(struct_v, bl); // this was a default_file_layout
1347 ::decode(inode.layout, bl); // but we only care about the layout portion
1348 }
1349 }
1350
1351 if (struct_v >= 5) {
1352 // InodeStore is embedded in dentries without proper versioning, so
1353 // we consume up to the end of the buffer
1354 if (!bl.end()) {
1355 ::decode(oldest_snap, bl);
1356 }
1357
1358 if (!bl.end()) {
1359 ::decode(damage_flags, bl);
1360 }
1361 }
1362}
1363
1364
1365void InodeStoreBase::decode(bufferlist::iterator &bl, bufferlist& snap_blob)
1366{
1367 DECODE_START_LEGACY_COMPAT_LEN(5, 4, 4, bl);
1368 decode_bare(bl, snap_blob, struct_v);
1369 DECODE_FINISH(bl);
1370}
1371
1372void CInode::decode_store(bufferlist::iterator& bl)
1373{
1374 bufferlist snap_blob;
1375 InodeStoreBase::decode(bl, snap_blob);
1376 decode_snap_blob(snap_blob);
1377}
1378
1379// ------------------
1380// locking
1381
1382void CInode::set_object_info(MDSCacheObjectInfo &info)
1383{
1384 info.ino = ino();
1385 info.snapid = last;
1386}
1387
1388void CInode::encode_lock_state(int type, bufferlist& bl)
1389{
1390 ::encode(first, bl);
1391
1392 switch (type) {
1393 case CEPH_LOCK_IAUTH:
1394 ::encode(inode.version, bl);
1395 ::encode(inode.ctime, bl);
1396 ::encode(inode.mode, bl);
1397 ::encode(inode.uid, bl);
1398 ::encode(inode.gid, bl);
1399 break;
1400
1401 case CEPH_LOCK_ILINK:
1402 ::encode(inode.version, bl);
1403 ::encode(inode.ctime, bl);
1404 ::encode(inode.nlink, bl);
1405 break;
1406
1407 case CEPH_LOCK_IDFT:
1408 if (is_auth()) {
1409 ::encode(inode.version, bl);
1410 } else {
1411 // treat flushing as dirty when rejoining cache
1412 bool dirty = dirfragtreelock.is_dirty_or_flushing();
1413 ::encode(dirty, bl);
1414 }
1415 {
1416 // encode the raw tree
1417 ::encode(dirfragtree, bl);
1418
1419 // also specify which frags are mine
1420 set<frag_t> myfrags;
1421 list<CDir*> dfls;
1422 get_dirfrags(dfls);
1423 for (list<CDir*>::iterator p = dfls.begin(); p != dfls.end(); ++p)
1424 if ((*p)->is_auth()) {
1425 frag_t fg = (*p)->get_frag();
1426 myfrags.insert(fg);
1427 }
1428 ::encode(myfrags, bl);
1429 }
1430 break;
1431
1432 case CEPH_LOCK_IFILE:
1433 if (is_auth()) {
1434 ::encode(inode.version, bl);
1435 ::encode(inode.ctime, bl);
1436 ::encode(inode.mtime, bl);
1437 ::encode(inode.atime, bl);
1438 ::encode(inode.time_warp_seq, bl);
1439 if (!is_dir()) {
1440 ::encode(inode.layout, bl, mdcache->mds->mdsmap->get_up_features());
1441 ::encode(inode.size, bl);
1442 ::encode(inode.truncate_seq, bl);
1443 ::encode(inode.truncate_size, bl);
1444 ::encode(inode.client_ranges, bl);
1445 ::encode(inode.inline_data, bl);
1446 }
1447 } else {
1448 // treat flushing as dirty when rejoining cache
1449 bool dirty = filelock.is_dirty_or_flushing();
1450 ::encode(dirty, bl);
1451 }
1452
1453 {
1454 dout(15) << "encode_lock_state inode.dirstat is " << inode.dirstat << dendl;
1455 ::encode(inode.dirstat, bl); // only meaningful if i am auth.
1456 bufferlist tmp;
1457 __u32 n = 0;
94b18763
FG
1458 for (const auto &p : dirfrags) {
1459 frag_t fg = p.first;
1460 CDir *dir = p.second;
7c673cae
FG
1461 if (is_auth() || dir->is_auth()) {
1462 fnode_t *pf = dir->get_projected_fnode();
1463 dout(15) << fg << " " << *dir << dendl;
1464 dout(20) << fg << " fragstat " << pf->fragstat << dendl;
1465 dout(20) << fg << " accounted_fragstat " << pf->accounted_fragstat << dendl;
1466 ::encode(fg, tmp);
1467 ::encode(dir->first, tmp);
1468 ::encode(pf->fragstat, tmp);
1469 ::encode(pf->accounted_fragstat, tmp);
1470 n++;
1471 }
1472 }
1473 ::encode(n, bl);
1474 bl.claim_append(tmp);
1475 }
1476 break;
1477
1478 case CEPH_LOCK_INEST:
1479 if (is_auth()) {
1480 ::encode(inode.version, bl);
1481 } else {
1482 // treat flushing as dirty when rejoining cache
1483 bool dirty = nestlock.is_dirty_or_flushing();
1484 ::encode(dirty, bl);
1485 }
1486 {
1487 dout(15) << "encode_lock_state inode.rstat is " << inode.rstat << dendl;
1488 ::encode(inode.rstat, bl); // only meaningful if i am auth.
1489 bufferlist tmp;
1490 __u32 n = 0;
94b18763
FG
1491 for (const auto &p : dirfrags) {
1492 frag_t fg = p.first;
1493 CDir *dir = p.second;
7c673cae
FG
1494 if (is_auth() || dir->is_auth()) {
1495 fnode_t *pf = dir->get_projected_fnode();
1496 dout(10) << fg << " " << *dir << dendl;
1497 dout(10) << fg << " " << pf->rstat << dendl;
1498 dout(10) << fg << " " << pf->rstat << dendl;
1499 dout(10) << fg << " " << dir->dirty_old_rstat << dendl;
1500 ::encode(fg, tmp);
1501 ::encode(dir->first, tmp);
1502 ::encode(pf->rstat, tmp);
1503 ::encode(pf->accounted_rstat, tmp);
1504 ::encode(dir->dirty_old_rstat, tmp);
1505 n++;
1506 }
1507 }
1508 ::encode(n, bl);
1509 bl.claim_append(tmp);
1510 }
1511 break;
1512
1513 case CEPH_LOCK_IXATTR:
1514 ::encode(inode.version, bl);
1515 ::encode(inode.ctime, bl);
1516 ::encode(xattrs, bl);
1517 break;
1518
1519 case CEPH_LOCK_ISNAP:
1520 ::encode(inode.version, bl);
1521 ::encode(inode.ctime, bl);
1522 encode_snap(bl);
1523 break;
1524
1525 case CEPH_LOCK_IFLOCK:
1526 ::encode(inode.version, bl);
1527 _encode_file_locks(bl);
1528 break;
1529
1530 case CEPH_LOCK_IPOLICY:
1531 if (inode.is_dir()) {
1532 ::encode(inode.version, bl);
1533 ::encode(inode.ctime, bl);
1534 ::encode(inode.layout, bl, mdcache->mds->mdsmap->get_up_features());
1535 ::encode(inode.quota, bl);
1536 ::encode(inode.export_pin, bl);
1537 }
1538 break;
1539
1540 default:
1541 ceph_abort();
1542 }
1543}
1544
1545
1546/* for more info on scatterlocks, see comments by Locker::scatter_writebehind */
1547
1548void CInode::decode_lock_state(int type, bufferlist& bl)
1549{
1550 bufferlist::iterator p = bl.begin();
1551 utime_t tm;
1552
1553 snapid_t newfirst;
1554 ::decode(newfirst, p);
1555
1556 if (!is_auth() && newfirst != first) {
1557 dout(10) << "decode_lock_state first " << first << " -> " << newfirst << dendl;
1558 assert(newfirst > first);
1559 if (!is_multiversion() && parent) {
1560 assert(parent->first == first);
1561 parent->first = newfirst;
1562 }
1563 first = newfirst;
1564 }
1565
1566 switch (type) {
1567 case CEPH_LOCK_IAUTH:
1568 ::decode(inode.version, p);
1569 ::decode(tm, p);
1570 if (inode.ctime < tm) inode.ctime = tm;
1571 ::decode(inode.mode, p);
1572 ::decode(inode.uid, p);
1573 ::decode(inode.gid, p);
1574 break;
1575
1576 case CEPH_LOCK_ILINK:
1577 ::decode(inode.version, p);
1578 ::decode(tm, p);
1579 if (inode.ctime < tm) inode.ctime = tm;
1580 ::decode(inode.nlink, p);
1581 break;
1582
1583 case CEPH_LOCK_IDFT:
1584 if (is_auth()) {
1585 bool replica_dirty;
1586 ::decode(replica_dirty, p);
1587 if (replica_dirty) {
1588 dout(10) << "decode_lock_state setting dftlock dirty flag" << dendl;
1589 dirfragtreelock.mark_dirty(); // ok bc we're auth and caller will handle
1590 }
1591 } else {
1592 ::decode(inode.version, p);
1593 }
1594 {
1595 fragtree_t temp;
1596 ::decode(temp, p);
1597 set<frag_t> authfrags;
1598 ::decode(authfrags, p);
1599 if (is_auth()) {
1600 // auth. believe replica's auth frags only.
1601 for (set<frag_t>::iterator p = authfrags.begin(); p != authfrags.end(); ++p)
1602 if (!dirfragtree.is_leaf(*p)) {
1603 dout(10) << " forcing frag " << *p << " to leaf (split|merge)" << dendl;
1604 dirfragtree.force_to_leaf(g_ceph_context, *p);
1605 dirfragtreelock.mark_dirty(); // ok bc we're auth and caller will handle
1606 }
1607 } else {
1608 // replica. take the new tree, BUT make sure any open
1609 // dirfrags remain leaves (they may have split _after_ this
1610 // dft was scattered, or we may still be be waiting on the
1611 // notify from the auth)
1612 dirfragtree.swap(temp);
94b18763
FG
1613 for (const auto &p : dirfrags) {
1614 if (!dirfragtree.is_leaf(p.first)) {
1615 dout(10) << " forcing open dirfrag " << p.first << " to leaf (racing with split|merge)" << dendl;
1616 dirfragtree.force_to_leaf(g_ceph_context, p.first);
7c673cae 1617 }
94b18763
FG
1618 if (p.second->is_auth())
1619 p.second->state_clear(CDir::STATE_DIRTYDFT);
7c673cae
FG
1620 }
1621 }
1622 if (g_conf->mds_debug_frag)
1623 verify_dirfrags();
1624 }
1625 break;
1626
1627 case CEPH_LOCK_IFILE:
1628 if (!is_auth()) {
1629 ::decode(inode.version, p);
1630 ::decode(tm, p);
1631 if (inode.ctime < tm) inode.ctime = tm;
1632 ::decode(inode.mtime, p);
1633 ::decode(inode.atime, p);
1634 ::decode(inode.time_warp_seq, p);
1635 if (!is_dir()) {
1636 ::decode(inode.layout, p);
1637 ::decode(inode.size, p);
1638 ::decode(inode.truncate_seq, p);
1639 ::decode(inode.truncate_size, p);
1640 ::decode(inode.client_ranges, p);
1641 ::decode(inode.inline_data, p);
1642 }
1643 } else {
1644 bool replica_dirty;
1645 ::decode(replica_dirty, p);
1646 if (replica_dirty) {
1647 dout(10) << "decode_lock_state setting filelock dirty flag" << dendl;
1648 filelock.mark_dirty(); // ok bc we're auth and caller will handle
1649 }
1650 }
1651 {
1652 frag_info_t dirstat;
1653 ::decode(dirstat, p);
1654 if (!is_auth()) {
1655 dout(10) << " taking inode dirstat " << dirstat << " for " << *this << dendl;
1656 inode.dirstat = dirstat; // take inode summation if replica
1657 }
1658 __u32 n;
1659 ::decode(n, p);
1660 dout(10) << " ...got " << n << " fragstats on " << *this << dendl;
1661 while (n--) {
1662 frag_t fg;
1663 snapid_t fgfirst;
1664 frag_info_t fragstat;
1665 frag_info_t accounted_fragstat;
1666 ::decode(fg, p);
1667 ::decode(fgfirst, p);
1668 ::decode(fragstat, p);
1669 ::decode(accounted_fragstat, p);
1670 dout(10) << fg << " [" << fgfirst << ",head] " << dendl;
1671 dout(10) << fg << " fragstat " << fragstat << dendl;
1672 dout(20) << fg << " accounted_fragstat " << accounted_fragstat << dendl;
1673
1674 CDir *dir = get_dirfrag(fg);
1675 if (is_auth()) {
1676 assert(dir); // i am auth; i had better have this dir open
1677 dout(10) << fg << " first " << dir->first << " -> " << fgfirst
1678 << " on " << *dir << dendl;
1679 dir->first = fgfirst;
1680 dir->fnode.fragstat = fragstat;
1681 dir->fnode.accounted_fragstat = accounted_fragstat;
1682 dir->first = fgfirst;
1683 if (!(fragstat == accounted_fragstat)) {
1684 dout(10) << fg << " setting filelock updated flag" << dendl;
1685 filelock.mark_dirty(); // ok bc we're auth and caller will handle
1686 }
1687 } else {
1688 if (dir && dir->is_auth()) {
1689 dout(10) << fg << " first " << dir->first << " -> " << fgfirst
1690 << " on " << *dir << dendl;
1691 dir->first = fgfirst;
1692 fnode_t *pf = dir->get_projected_fnode();
1693 finish_scatter_update(&filelock, dir,
1694 inode.dirstat.version, pf->accounted_fragstat.version);
1695 }
1696 }
1697 }
1698 }
1699 break;
1700
1701 case CEPH_LOCK_INEST:
1702 if (is_auth()) {
1703 bool replica_dirty;
1704 ::decode(replica_dirty, p);
1705 if (replica_dirty) {
1706 dout(10) << "decode_lock_state setting nestlock dirty flag" << dendl;
1707 nestlock.mark_dirty(); // ok bc we're auth and caller will handle
1708 }
1709 } else {
1710 ::decode(inode.version, p);
1711 }
1712 {
1713 nest_info_t rstat;
1714 ::decode(rstat, p);
1715 if (!is_auth()) {
1716 dout(10) << " taking inode rstat " << rstat << " for " << *this << dendl;
1717 inode.rstat = rstat; // take inode summation if replica
1718 }
1719 __u32 n;
1720 ::decode(n, p);
1721 while (n--) {
1722 frag_t fg;
1723 snapid_t fgfirst;
1724 nest_info_t rstat;
1725 nest_info_t accounted_rstat;
94b18763 1726 decltype(CDir::dirty_old_rstat) dirty_old_rstat;
7c673cae
FG
1727 ::decode(fg, p);
1728 ::decode(fgfirst, p);
1729 ::decode(rstat, p);
1730 ::decode(accounted_rstat, p);
1731 ::decode(dirty_old_rstat, p);
1732 dout(10) << fg << " [" << fgfirst << ",head]" << dendl;
1733 dout(10) << fg << " rstat " << rstat << dendl;
1734 dout(10) << fg << " accounted_rstat " << accounted_rstat << dendl;
1735 dout(10) << fg << " dirty_old_rstat " << dirty_old_rstat << dendl;
1736
1737 CDir *dir = get_dirfrag(fg);
1738 if (is_auth()) {
1739 assert(dir); // i am auth; i had better have this dir open
1740 dout(10) << fg << " first " << dir->first << " -> " << fgfirst
1741 << " on " << *dir << dendl;
1742 dir->first = fgfirst;
1743 dir->fnode.rstat = rstat;
1744 dir->fnode.accounted_rstat = accounted_rstat;
1745 dir->dirty_old_rstat.swap(dirty_old_rstat);
1746 if (!(rstat == accounted_rstat) || !dir->dirty_old_rstat.empty()) {
1747 dout(10) << fg << " setting nestlock updated flag" << dendl;
1748 nestlock.mark_dirty(); // ok bc we're auth and caller will handle
1749 }
1750 } else {
1751 if (dir && dir->is_auth()) {
1752 dout(10) << fg << " first " << dir->first << " -> " << fgfirst
1753 << " on " << *dir << dendl;
1754 dir->first = fgfirst;
1755 fnode_t *pf = dir->get_projected_fnode();
1756 finish_scatter_update(&nestlock, dir,
1757 inode.rstat.version, pf->accounted_rstat.version);
1758 }
1759 }
1760 }
1761 }
1762 break;
1763
1764 case CEPH_LOCK_IXATTR:
1765 ::decode(inode.version, p);
1766 ::decode(tm, p);
1767 if (inode.ctime < tm) inode.ctime = tm;
1768 ::decode(xattrs, p);
1769 break;
1770
1771 case CEPH_LOCK_ISNAP:
1772 {
1773 ::decode(inode.version, p);
1774 ::decode(tm, p);
1775 if (inode.ctime < tm) inode.ctime = tm;
1776 snapid_t seq = 0;
1777 if (snaprealm)
1778 seq = snaprealm->srnode.seq;
1779 decode_snap(p);
1780 if (snaprealm && snaprealm->srnode.seq != seq)
1781 mdcache->do_realm_invalidate_and_update_notify(this, seq ? CEPH_SNAP_OP_UPDATE:CEPH_SNAP_OP_SPLIT);
1782 }
1783 break;
1784
1785 case CEPH_LOCK_IFLOCK:
1786 ::decode(inode.version, p);
1787 _decode_file_locks(p);
1788 break;
1789
1790 case CEPH_LOCK_IPOLICY:
1791 if (inode.is_dir()) {
1792 ::decode(inode.version, p);
1793 ::decode(tm, p);
1794 if (inode.ctime < tm) inode.ctime = tm;
1795 ::decode(inode.layout, p);
1796 ::decode(inode.quota, p);
31f18b77 1797 mds_rank_t old_pin = inode.export_pin;
7c673cae 1798 ::decode(inode.export_pin, p);
31f18b77 1799 maybe_export_pin(old_pin != inode.export_pin);
7c673cae
FG
1800 }
1801 break;
1802
1803 default:
1804 ceph_abort();
1805 }
1806}
1807
1808
1809bool CInode::is_dirty_scattered()
1810{
1811 return
1812 filelock.is_dirty_or_flushing() ||
1813 nestlock.is_dirty_or_flushing() ||
1814 dirfragtreelock.is_dirty_or_flushing();
1815}
1816
1817void CInode::clear_scatter_dirty()
1818{
1819 filelock.remove_dirty();
1820 nestlock.remove_dirty();
1821 dirfragtreelock.remove_dirty();
1822}
1823
1824void CInode::clear_dirty_scattered(int type)
1825{
1826 dout(10) << "clear_dirty_scattered " << type << " on " << *this << dendl;
b32b8144 1827 assert(is_dir());
7c673cae
FG
1828 switch (type) {
1829 case CEPH_LOCK_IFILE:
1830 item_dirty_dirfrag_dir.remove_myself();
1831 break;
1832
1833 case CEPH_LOCK_INEST:
1834 item_dirty_dirfrag_nest.remove_myself();
1835 break;
1836
1837 case CEPH_LOCK_IDFT:
1838 item_dirty_dirfrag_dirfragtree.remove_myself();
1839 break;
1840
1841 default:
1842 ceph_abort();
1843 }
1844}
1845
1846
1847/*
1848 * when we initially scatter a lock, we need to check if any of the dirfrags
1849 * have out of date accounted_rstat/fragstat. if so, mark the lock stale.
1850 */
1851/* for more info on scatterlocks, see comments by Locker::scatter_writebehind */
1852void CInode::start_scatter(ScatterLock *lock)
1853{
1854 dout(10) << "start_scatter " << *lock << " on " << *this << dendl;
1855 assert(is_auth());
94b18763 1856 mempool_inode *pi = get_projected_inode();
7c673cae 1857
94b18763
FG
1858 for (const auto &p : dirfrags) {
1859 frag_t fg = p.first;
1860 CDir *dir = p.second;
7c673cae
FG
1861 fnode_t *pf = dir->get_projected_fnode();
1862 dout(20) << fg << " " << *dir << dendl;
1863
1864 if (!dir->is_auth())
1865 continue;
1866
1867 switch (lock->get_type()) {
1868 case CEPH_LOCK_IFILE:
1869 finish_scatter_update(lock, dir, pi->dirstat.version, pf->accounted_fragstat.version);
1870 break;
1871
1872 case CEPH_LOCK_INEST:
1873 finish_scatter_update(lock, dir, pi->rstat.version, pf->accounted_rstat.version);
1874 break;
1875
1876 case CEPH_LOCK_IDFT:
1877 dir->state_clear(CDir::STATE_DIRTYDFT);
1878 break;
1879 }
1880 }
1881}
1882
1883
1884class C_Inode_FragUpdate : public MDSLogContextBase {
1885protected:
1886 CInode *in;
1887 CDir *dir;
1888 MutationRef mut;
1889 MDSRank *get_mds() override {return in->mdcache->mds;}
1890 void finish(int r) override {
1891 in->_finish_frag_update(dir, mut);
1892 }
1893
1894public:
1895 C_Inode_FragUpdate(CInode *i, CDir *d, MutationRef& m) : in(i), dir(d), mut(m) {}
1896};
1897
1898void CInode::finish_scatter_update(ScatterLock *lock, CDir *dir,
1899 version_t inode_version, version_t dir_accounted_version)
1900{
1901 frag_t fg = dir->get_frag();
1902 assert(dir->is_auth());
1903
1904 if (dir->is_frozen()) {
1905 dout(10) << "finish_scatter_update " << fg << " frozen, marking " << *lock << " stale " << *dir << dendl;
1906 } else if (dir->get_version() == 0) {
1907 dout(10) << "finish_scatter_update " << fg << " not loaded, marking " << *lock << " stale " << *dir << dendl;
1908 } else {
1909 if (dir_accounted_version != inode_version) {
1910 dout(10) << "finish_scatter_update " << fg << " journaling accounted scatterstat update v" << inode_version << dendl;
1911
1912 MDLog *mdlog = mdcache->mds->mdlog;
1913 MutationRef mut(new MutationImpl());
1914 mut->ls = mdlog->get_current_segment();
1915
94b18763 1916 mempool_inode *pi = get_projected_inode();
7c673cae 1917 fnode_t *pf = dir->project_fnode();
7c673cae
FG
1918
1919 const char *ename = 0;
1920 switch (lock->get_type()) {
1921 case CEPH_LOCK_IFILE:
1922 pf->fragstat.version = pi->dirstat.version;
1923 pf->accounted_fragstat = pf->fragstat;
1924 ename = "lock ifile accounted scatter stat update";
1925 break;
1926 case CEPH_LOCK_INEST:
1927 pf->rstat.version = pi->rstat.version;
1928 pf->accounted_rstat = pf->rstat;
1929 ename = "lock inest accounted scatter stat update";
c07f9fc5
FG
1930
1931 if (!is_auth() && lock->get_state() == LOCK_MIX) {
1932 dout(10) << "finish_scatter_update try to assimilate dirty rstat on "
1933 << *dir << dendl;
1934 dir->assimilate_dirty_rstat_inodes();
1935 }
1936
7c673cae
FG
1937 break;
1938 default:
1939 ceph_abort();
1940 }
1941
c07f9fc5 1942 pf->version = dir->pre_dirty();
7c673cae
FG
1943 mut->add_projected_fnode(dir);
1944
1945 EUpdate *le = new EUpdate(mdlog, ename);
1946 mdlog->start_entry(le);
1947 le->metablob.add_dir_context(dir);
1948 le->metablob.add_dir(dir, true);
1949
1950 assert(!dir->is_frozen());
1951 mut->auth_pin(dir);
c07f9fc5
FG
1952
1953 if (lock->get_type() == CEPH_LOCK_INEST &&
1954 !is_auth() && lock->get_state() == LOCK_MIX) {
1955 dout(10) << "finish_scatter_update finish assimilating dirty rstat on "
1956 << *dir << dendl;
1957 dir->assimilate_dirty_rstat_inodes_finish(mut, &le->metablob);
1958
1959 if (!(pf->rstat == pf->accounted_rstat)) {
1960 if (mut->wrlocks.count(&nestlock) == 0) {
1961 mdcache->mds->locker->wrlock_force(&nestlock, mut);
1962 }
1963
1964 mdcache->mds->locker->mark_updated_scatterlock(&nestlock);
1965 mut->ls->dirty_dirfrag_nest.push_back(&item_dirty_dirfrag_nest);
1966 }
1967 }
7c673cae
FG
1968
1969 mdlog->submit_entry(le, new C_Inode_FragUpdate(this, dir, mut));
1970 } else {
1971 dout(10) << "finish_scatter_update " << fg << " accounted " << *lock
1972 << " scatter stat unchanged at v" << dir_accounted_version << dendl;
1973 }
1974 }
1975}
1976
1977void CInode::_finish_frag_update(CDir *dir, MutationRef& mut)
1978{
1979 dout(10) << "_finish_frag_update on " << *dir << dendl;
1980 mut->apply();
c07f9fc5 1981 mdcache->mds->locker->drop_locks(mut.get());
7c673cae
FG
1982 mut->cleanup();
1983}
1984
1985
1986/*
1987 * when we gather a lock, we need to assimilate dirfrag changes into the inode
1988 * state. it's possible we can't update the dirfrag accounted_rstat/fragstat
1989 * because the frag is auth and frozen, or that the replica couldn't for the same
1990 * reason. hopefully it will get updated the next time the lock cycles.
1991 *
1992 * we have two dimensions of behavior:
1993 * - we may be (auth and !frozen), and able to update, or not.
1994 * - the frag may be stale, or not.
1995 *
1996 * if the frag is non-stale, we want to assimilate the diff into the
1997 * inode, regardless of whether it's auth or updateable.
1998 *
1999 * if we update the frag, we want to set accounted_fragstat = frag,
2000 * both if we took the diff or it was stale and we are making it
2001 * un-stale.
2002 */
2003/* for more info on scatterlocks, see comments by Locker::scatter_writebehind */
2004void CInode::finish_scatter_gather_update(int type)
2005{
2006 LogChannelRef clog = mdcache->mds->clog;
2007
2008 dout(10) << "finish_scatter_gather_update " << type << " on " << *this << dendl;
2009 assert(is_auth());
2010
2011 switch (type) {
2012 case CEPH_LOCK_IFILE:
2013 {
2014 fragtree_t tmpdft = dirfragtree;
2015 struct frag_info_t dirstat;
2016 bool dirstat_valid = true;
2017
2018 // adjust summation
2019 assert(is_auth());
94b18763 2020 mempool_inode *pi = get_projected_inode();
7c673cae
FG
2021
2022 bool touched_mtime = false, touched_chattr = false;
2023 dout(20) << " orig dirstat " << pi->dirstat << dendl;
2024 pi->dirstat.version++;
94b18763
FG
2025 for (const auto &p : dirfrags) {
2026 frag_t fg = p.first;
2027 CDir *dir = p.second;
7c673cae
FG
2028 dout(20) << fg << " " << *dir << dendl;
2029
2030 bool update;
2031 if (dir->get_version() != 0) {
2032 update = dir->is_auth() && !dir->is_frozen();
2033 } else {
2034 update = false;
2035 dirstat_valid = false;
2036 }
2037
2038 fnode_t *pf = dir->get_projected_fnode();
2039 if (update)
2040 pf = dir->project_fnode();
2041
2042 if (pf->accounted_fragstat.version == pi->dirstat.version - 1) {
2043 dout(20) << fg << " fragstat " << pf->fragstat << dendl;
2044 dout(20) << fg << " accounted_fragstat " << pf->accounted_fragstat << dendl;
2045 pi->dirstat.add_delta(pf->fragstat, pf->accounted_fragstat, &touched_mtime, &touched_chattr);
2046 } else {
2047 dout(20) << fg << " skipping STALE accounted_fragstat " << pf->accounted_fragstat << dendl;
2048 }
2049
2050 if (pf->fragstat.nfiles < 0 ||
2051 pf->fragstat.nsubdirs < 0) {
2052 clog->error() << "bad/negative dir size on "
2053 << dir->dirfrag() << " " << pf->fragstat;
2054 assert(!"bad/negative fragstat" == g_conf->mds_verify_scatter);
2055
2056 if (pf->fragstat.nfiles < 0)
2057 pf->fragstat.nfiles = 0;
2058 if (pf->fragstat.nsubdirs < 0)
2059 pf->fragstat.nsubdirs = 0;
2060 }
2061
2062 if (update) {
2063 pf->accounted_fragstat = pf->fragstat;
2064 pf->fragstat.version = pf->accounted_fragstat.version = pi->dirstat.version;
2065 dout(10) << fg << " updated accounted_fragstat " << pf->fragstat << " on " << *dir << dendl;
2066 }
2067
2068 tmpdft.force_to_leaf(g_ceph_context, fg);
2069 dirstat.add(pf->fragstat);
2070 }
2071 if (touched_mtime)
2072 pi->mtime = pi->ctime = pi->dirstat.mtime;
2073 if (touched_chattr)
2074 pi->change_attr = pi->dirstat.change_attr;
2075 dout(20) << " final dirstat " << pi->dirstat << dendl;
2076
2077 if (dirstat_valid && !dirstat.same_sums(pi->dirstat)) {
2078 list<frag_t> ls;
2079 tmpdft.get_leaves_under(frag_t(), ls);
2080 for (list<frag_t>::iterator p = ls.begin(); p != ls.end(); ++p)
2081 if (!dirfrags.count(*p)) {
2082 dirstat_valid = false;
2083 break;
2084 }
2085 if (dirstat_valid) {
2086 if (state_test(CInode::STATE_REPAIRSTATS)) {
2087 dout(20) << " dirstat mismatch, fixing" << dendl;
2088 } else {
2089 clog->error() << "unmatched fragstat on " << ino() << ", inode has "
2090 << pi->dirstat << ", dirfrags have " << dirstat;
2091 assert(!"unmatched fragstat" == g_conf->mds_verify_scatter);
2092 }
2093 // trust the dirfrags for now
2094 version_t v = pi->dirstat.version;
2095 if (pi->dirstat.mtime > dirstat.mtime)
2096 dirstat.mtime = pi->dirstat.mtime;
2097 if (pi->dirstat.change_attr > dirstat.change_attr)
2098 dirstat.change_attr = pi->dirstat.change_attr;
2099 pi->dirstat = dirstat;
2100 pi->dirstat.version = v;
2101 }
2102 }
2103
d2e6a577
FG
2104 if (pi->dirstat.nfiles < 0 || pi->dirstat.nsubdirs < 0)
2105 {
2106 std::string path;
2107 make_path_string(path);
2108 clog->error() << "Inconsistent statistics detected: fragstat on inode "
2109 << ino() << " (" << path << "), inode has " << pi->dirstat;
7c673cae
FG
2110 assert(!"bad/negative fragstat" == g_conf->mds_verify_scatter);
2111
2112 if (pi->dirstat.nfiles < 0)
2113 pi->dirstat.nfiles = 0;
2114 if (pi->dirstat.nsubdirs < 0)
2115 pi->dirstat.nsubdirs = 0;
2116 }
2117 }
2118 break;
2119
2120 case CEPH_LOCK_INEST:
2121 {
2122 fragtree_t tmpdft = dirfragtree;
2123 nest_info_t rstat;
2124 rstat.rsubdirs = 1;
2125 bool rstat_valid = true;
2126
2127 // adjust summation
2128 assert(is_auth());
94b18763 2129 mempool_inode *pi = get_projected_inode();
7c673cae
FG
2130 dout(20) << " orig rstat " << pi->rstat << dendl;
2131 pi->rstat.version++;
94b18763
FG
2132 for (const auto &p : dirfrags) {
2133 frag_t fg = p.first;
2134 CDir *dir = p.second;
7c673cae
FG
2135 dout(20) << fg << " " << *dir << dendl;
2136
2137 bool update;
2138 if (dir->get_version() != 0) {
2139 update = dir->is_auth() && !dir->is_frozen();
2140 } else {
2141 update = false;
2142 rstat_valid = false;
2143 }
2144
2145 fnode_t *pf = dir->get_projected_fnode();
2146 if (update)
2147 pf = dir->project_fnode();
2148
2149 if (pf->accounted_rstat.version == pi->rstat.version-1) {
2150 // only pull this frag's dirty rstat inodes into the frag if
2151 // the frag is non-stale and updateable. if it's stale,
2152 // that info will just get thrown out!
2153 if (update)
2154 dir->assimilate_dirty_rstat_inodes();
2155
2156 dout(20) << fg << " rstat " << pf->rstat << dendl;
2157 dout(20) << fg << " accounted_rstat " << pf->accounted_rstat << dendl;
2158 dout(20) << fg << " dirty_old_rstat " << dir->dirty_old_rstat << dendl;
2159 mdcache->project_rstat_frag_to_inode(pf->rstat, pf->accounted_rstat,
2160 dir->first, CEPH_NOSNAP, this, true);
94b18763
FG
2161 for (auto &p : dir->dirty_old_rstat) {
2162 mdcache->project_rstat_frag_to_inode(p.second.rstat, p.second.accounted_rstat,
2163 p.second.first, p.first, this, true);
2164 }
7c673cae
FG
2165 if (update) // dir contents not valid if frozen or non-auth
2166 dir->check_rstats();
2167 } else {
2168 dout(20) << fg << " skipping STALE accounted_rstat " << pf->accounted_rstat << dendl;
2169 }
2170 if (update) {
2171 pf->accounted_rstat = pf->rstat;
2172 dir->dirty_old_rstat.clear();
2173 pf->rstat.version = pf->accounted_rstat.version = pi->rstat.version;
2174 dir->check_rstats();
2175 dout(10) << fg << " updated accounted_rstat " << pf->rstat << " on " << *dir << dendl;
2176 }
2177
2178 tmpdft.force_to_leaf(g_ceph_context, fg);
2179 rstat.add(pf->rstat);
2180 }
2181 dout(20) << " final rstat " << pi->rstat << dendl;
2182
2183 if (rstat_valid && !rstat.same_sums(pi->rstat)) {
2184 list<frag_t> ls;
2185 tmpdft.get_leaves_under(frag_t(), ls);
2186 for (list<frag_t>::iterator p = ls.begin(); p != ls.end(); ++p)
2187 if (!dirfrags.count(*p)) {
2188 rstat_valid = false;
2189 break;
2190 }
2191 if (rstat_valid) {
2192 if (state_test(CInode::STATE_REPAIRSTATS)) {
2193 dout(20) << " rstat mismatch, fixing" << dendl;
2194 } else {
d2e6a577
FG
2195 clog->error() << "inconsistent rstat on inode " << ino()
2196 << ", inode has " << pi->rstat
2197 << ", directory fragments have " << rstat;
7c673cae
FG
2198 assert(!"unmatched rstat" == g_conf->mds_verify_scatter);
2199 }
2200 // trust the dirfrag for now
2201 version_t v = pi->rstat.version;
2202 if (pi->rstat.rctime > rstat.rctime)
2203 rstat.rctime = pi->rstat.rctime;
2204 pi->rstat = rstat;
2205 pi->rstat.version = v;
2206 }
2207 }
2208
2209 mdcache->broadcast_quota_to_client(this);
2210 }
2211 break;
2212
2213 case CEPH_LOCK_IDFT:
2214 break;
2215
2216 default:
2217 ceph_abort();
2218 }
2219}
2220
2221void CInode::finish_scatter_gather_update_accounted(int type, MutationRef& mut, EMetaBlob *metablob)
2222{
2223 dout(10) << "finish_scatter_gather_update_accounted " << type << " on " << *this << dendl;
2224 assert(is_auth());
2225
94b18763
FG
2226 for (const auto &p : dirfrags) {
2227 CDir *dir = p.second;
7c673cae
FG
2228 if (!dir->is_auth() || dir->get_version() == 0 || dir->is_frozen())
2229 continue;
2230
2231 if (type == CEPH_LOCK_IDFT)
2232 continue; // nothing to do.
2233
2234 dout(10) << " journaling updated frag accounted_ on " << *dir << dendl;
2235 assert(dir->is_projected());
2236 fnode_t *pf = dir->get_projected_fnode();
2237 pf->version = dir->pre_dirty();
2238 mut->add_projected_fnode(dir);
2239 metablob->add_dir(dir, true);
2240 mut->auth_pin(dir);
2241
2242 if (type == CEPH_LOCK_INEST)
2243 dir->assimilate_dirty_rstat_inodes_finish(mut, metablob);
2244 }
2245}
2246
2247// waiting
2248
2249bool CInode::is_frozen() const
2250{
2251 if (is_frozen_inode()) return true;
2252 if (parent && parent->dir->is_frozen()) return true;
2253 return false;
2254}
2255
2256bool CInode::is_frozen_dir() const
2257{
2258 if (parent && parent->dir->is_frozen_dir()) return true;
2259 return false;
2260}
2261
2262bool CInode::is_freezing() const
2263{
2264 if (is_freezing_inode()) return true;
2265 if (parent && parent->dir->is_freezing()) return true;
2266 return false;
2267}
2268
2269void CInode::add_dir_waiter(frag_t fg, MDSInternalContextBase *c)
2270{
2271 if (waiting_on_dir.empty())
2272 get(PIN_DIRWAITER);
2273 waiting_on_dir[fg].push_back(c);
2274 dout(10) << "add_dir_waiter frag " << fg << " " << c << " on " << *this << dendl;
2275}
2276
2277void CInode::take_dir_waiting(frag_t fg, list<MDSInternalContextBase*>& ls)
2278{
2279 if (waiting_on_dir.empty())
2280 return;
2281
94b18763
FG
2282 auto it = waiting_on_dir.find(fg);
2283 if (it != waiting_on_dir.end()) {
2284 dout(10) << __func__ << " frag " << fg << " on " << *this << dendl;
2285 ls.splice(ls.end(), it->second);
2286 waiting_on_dir.erase(it);
7c673cae
FG
2287
2288 if (waiting_on_dir.empty())
2289 put(PIN_DIRWAITER);
2290 }
2291}
2292
2293void CInode::add_waiter(uint64_t tag, MDSInternalContextBase *c)
2294{
2295 dout(10) << "add_waiter tag " << std::hex << tag << std::dec << " " << c
2296 << " !ambig " << !state_test(STATE_AMBIGUOUSAUTH)
2297 << " !frozen " << !is_frozen_inode()
2298 << " !freezing " << !is_freezing_inode()
2299 << dendl;
2300 // wait on the directory?
2301 // make sure its not the inode that is explicitly ambiguous|freezing|frozen
2302 if (((tag & WAIT_SINGLEAUTH) && !state_test(STATE_AMBIGUOUSAUTH)) ||
2303 ((tag & WAIT_UNFREEZE) &&
2304 !is_frozen_inode() && !is_freezing_inode() && !is_frozen_auth_pin())) {
2305 dout(15) << "passing waiter up tree" << dendl;
2306 parent->dir->add_waiter(tag, c);
2307 return;
2308 }
2309 dout(15) << "taking waiter here" << dendl;
2310 MDSCacheObject::add_waiter(tag, c);
2311}
2312
2313void CInode::take_waiting(uint64_t mask, list<MDSInternalContextBase*>& ls)
2314{
2315 if ((mask & WAIT_DIR) && !waiting_on_dir.empty()) {
2316 // take all dentry waiters
2317 while (!waiting_on_dir.empty()) {
94b18763
FG
2318 auto it = waiting_on_dir.begin();
2319 dout(10) << __func__ << " dirfrag " << it->first << " on " << *this << dendl;
2320 ls.splice(ls.end(), it->second);
2321 waiting_on_dir.erase(it);
7c673cae
FG
2322 }
2323 put(PIN_DIRWAITER);
2324 }
2325
2326 // waiting
2327 MDSCacheObject::take_waiting(mask, ls);
2328}
2329
2330bool CInode::freeze_inode(int auth_pin_allowance)
2331{
2332 assert(auth_pin_allowance > 0); // otherwise we need to adjust parent's nested_auth_pins
2333 assert(auth_pins >= auth_pin_allowance);
2334 if (auth_pins > auth_pin_allowance) {
2335 dout(10) << "freeze_inode - waiting for auth_pins to drop to " << auth_pin_allowance << dendl;
2336 auth_pin_freeze_allowance = auth_pin_allowance;
2337 get(PIN_FREEZING);
2338 state_set(STATE_FREEZING);
2339 return false;
2340 }
2341
2342 dout(10) << "freeze_inode - frozen" << dendl;
2343 assert(auth_pins == auth_pin_allowance);
2344 if (!state_test(STATE_FROZEN)) {
2345 get(PIN_FROZEN);
2346 state_set(STATE_FROZEN);
2347 }
2348 return true;
2349}
2350
2351void CInode::unfreeze_inode(list<MDSInternalContextBase*>& finished)
2352{
2353 dout(10) << "unfreeze_inode" << dendl;
2354 if (state_test(STATE_FREEZING)) {
2355 state_clear(STATE_FREEZING);
2356 put(PIN_FREEZING);
2357 } else if (state_test(STATE_FROZEN)) {
2358 state_clear(STATE_FROZEN);
2359 put(PIN_FROZEN);
2360 } else
2361 ceph_abort();
2362 take_waiting(WAIT_UNFREEZE, finished);
2363}
2364
2365void CInode::unfreeze_inode()
2366{
2367 list<MDSInternalContextBase*> finished;
2368 unfreeze_inode(finished);
2369 mdcache->mds->queue_waiters(finished);
2370}
2371
2372void CInode::freeze_auth_pin()
2373{
2374 assert(state_test(CInode::STATE_FROZEN));
2375 state_set(CInode::STATE_FROZENAUTHPIN);
2376}
2377
2378void CInode::unfreeze_auth_pin()
2379{
2380 assert(state_test(CInode::STATE_FROZENAUTHPIN));
2381 state_clear(CInode::STATE_FROZENAUTHPIN);
2382 if (!state_test(STATE_FREEZING|STATE_FROZEN)) {
2383 list<MDSInternalContextBase*> finished;
2384 take_waiting(WAIT_UNFREEZE, finished);
2385 mdcache->mds->queue_waiters(finished);
2386 }
2387}
2388
2389void CInode::clear_ambiguous_auth(list<MDSInternalContextBase*>& finished)
2390{
2391 assert(state_test(CInode::STATE_AMBIGUOUSAUTH));
2392 state_clear(CInode::STATE_AMBIGUOUSAUTH);
2393 take_waiting(CInode::WAIT_SINGLEAUTH, finished);
2394}
2395
2396void CInode::clear_ambiguous_auth()
2397{
2398 list<MDSInternalContextBase*> finished;
2399 clear_ambiguous_auth(finished);
2400 mdcache->mds->queue_waiters(finished);
2401}
2402
2403// auth_pins
2404bool CInode::can_auth_pin() const {
2405 if (!is_auth() || is_freezing_inode() || is_frozen_inode() || is_frozen_auth_pin())
2406 return false;
2407 if (parent)
2408 return parent->can_auth_pin();
2409 return true;
2410}
2411
2412void CInode::auth_pin(void *by)
2413{
2414 if (auth_pins == 0)
2415 get(PIN_AUTHPIN);
2416 auth_pins++;
2417
2418#ifdef MDS_AUTHPIN_SET
2419 auth_pin_set.insert(by);
2420#endif
2421
2422 dout(10) << "auth_pin by " << by << " on " << *this
2423 << " now " << auth_pins << "+" << nested_auth_pins
2424 << dendl;
2425
2426 if (parent)
2427 parent->adjust_nested_auth_pins(1, 1, this);
2428}
2429
2430void CInode::auth_unpin(void *by)
2431{
2432 auth_pins--;
2433
2434#ifdef MDS_AUTHPIN_SET
2435 assert(auth_pin_set.count(by));
2436 auth_pin_set.erase(auth_pin_set.find(by));
2437#endif
2438
2439 if (auth_pins == 0)
2440 put(PIN_AUTHPIN);
2441
2442 dout(10) << "auth_unpin by " << by << " on " << *this
2443 << " now " << auth_pins << "+" << nested_auth_pins
2444 << dendl;
2445
2446 assert(auth_pins >= 0);
2447
2448 if (parent)
2449 parent->adjust_nested_auth_pins(-1, -1, by);
2450
2451 if (is_freezing_inode() &&
2452 auth_pins == auth_pin_freeze_allowance) {
2453 dout(10) << "auth_unpin freezing!" << dendl;
2454 get(PIN_FROZEN);
2455 put(PIN_FREEZING);
2456 state_clear(STATE_FREEZING);
2457 state_set(STATE_FROZEN);
2458 finish_waiting(WAIT_FROZEN);
2459 }
2460}
2461
2462void CInode::adjust_nested_auth_pins(int a, void *by)
2463{
2464 assert(a);
2465 nested_auth_pins += a;
2466 dout(35) << "adjust_nested_auth_pins by " << by
2467 << " change " << a << " yields "
2468 << auth_pins << "+" << nested_auth_pins << dendl;
2469 assert(nested_auth_pins >= 0);
2470
2471 if (g_conf->mds_debug_auth_pins) {
2472 // audit
2473 int s = 0;
94b18763
FG
2474 for (const auto &p : dirfrags) {
2475 CDir *dir = p.second;
7c673cae
FG
2476 if (!dir->is_subtree_root() && dir->get_cum_auth_pins())
2477 s++;
2478 }
2479 assert(s == nested_auth_pins);
2480 }
2481
2482 if (parent)
2483 parent->adjust_nested_auth_pins(a, 0, by);
2484}
2485
2486
2487// authority
2488
2489mds_authority_t CInode::authority() const
2490{
2491 if (inode_auth.first >= 0)
2492 return inode_auth;
2493
2494 if (parent)
2495 return parent->dir->authority();
2496
2497 // new items that are not yet linked in (in the committed plane) belong
2498 // to their first parent.
2499 if (!projected_parent.empty())
2500 return projected_parent.front()->dir->authority();
2501
2502 return CDIR_AUTH_UNDEF;
2503}
2504
2505
2506// SNAP
2507
2508snapid_t CInode::get_oldest_snap()
2509{
2510 snapid_t t = first;
2511 if (!old_inodes.empty())
2512 t = old_inodes.begin()->second.first;
2513 return MIN(t, oldest_snap);
2514}
2515
94b18763 2516CInode::mempool_old_inode& CInode::cow_old_inode(snapid_t follows, bool cow_head)
7c673cae
FG
2517{
2518 assert(follows >= first);
2519
94b18763
FG
2520 mempool_inode *pi = cow_head ? get_projected_inode() : get_previous_projected_inode();
2521 mempool_xattr_map *px = cow_head ? get_projected_xattrs() : get_previous_projected_xattrs();
7c673cae 2522
94b18763 2523 mempool_old_inode &old = old_inodes[follows];
7c673cae
FG
2524 old.first = first;
2525 old.inode = *pi;
2526 old.xattrs = *px;
2527
2528 if (first < oldest_snap)
2529 oldest_snap = first;
2530
2531 dout(10) << " " << px->size() << " xattrs cowed, " << *px << dendl;
2532
2533 old.inode.trim_client_ranges(follows);
2534
2535 if (g_conf->mds_snap_rstat &&
2536 !(old.inode.rstat == old.inode.accounted_rstat))
2537 dirty_old_rstats.insert(follows);
2538
2539 first = follows+1;
2540
2541 dout(10) << "cow_old_inode " << (cow_head ? "head" : "previous_head" )
2542 << " to [" << old.first << "," << follows << "] on "
2543 << *this << dendl;
2544
2545 return old;
2546}
2547
2548void CInode::split_old_inode(snapid_t snap)
2549{
94b18763
FG
2550 auto it = old_inodes.lower_bound(snap);
2551 assert(it != old_inodes.end() && it->second.first < snap);
7c673cae 2552
94b18763
FG
2553 mempool_old_inode &old = old_inodes[snap - 1];
2554 old = it->second;
7c673cae 2555
94b18763
FG
2556 it->second.first = snap;
2557 dout(10) << __func__ << " " << "[" << old.first << "," << it->first
2558 << "] to [" << snap << "," << it->first << "] on " << *this << dendl;
7c673cae
FG
2559}
2560
2561void CInode::pre_cow_old_inode()
2562{
2563 snapid_t follows = find_snaprealm()->get_newest_seq();
2564 if (first <= follows)
2565 cow_old_inode(follows, true);
2566}
2567
2568void CInode::purge_stale_snap_data(const set<snapid_t>& snaps)
2569{
2570 dout(10) << "purge_stale_snap_data " << snaps << dendl;
2571
94b18763
FG
2572 for (auto it = old_inodes.begin(); it != old_inodes.end(); ) {
2573 const snapid_t &id = it->first;
2574 const auto &s = snaps.lower_bound(it->second.first);
2575 if (s == snaps.end() || *s > id) {
2576 dout(10) << " purging old_inode [" << it->second.first << "," << id << "]" << dendl;
2577 it = old_inodes.erase(it);
2578 } else {
2579 ++it;
2580 }
7c673cae
FG
2581 }
2582}
2583
2584/*
2585 * pick/create an old_inode
2586 */
94b18763 2587CInode::mempool_old_inode * CInode::pick_old_inode(snapid_t snap)
7c673cae 2588{
94b18763
FG
2589 auto it = old_inodes.lower_bound(snap); // p is first key >= to snap
2590 if (it != old_inodes.end() && it->second.first <= snap) {
2591 dout(10) << __func__ << " snap " << snap << " -> [" << it->second.first << "," << it->first << "]" << dendl;
2592 return &it->second;
7c673cae
FG
2593 }
2594 dout(10) << "pick_old_inode snap " << snap << " -> nothing" << dendl;
2595 return NULL;
2596}
2597
2598void CInode::open_snaprealm(bool nosplit)
2599{
2600 if (!snaprealm) {
2601 SnapRealm *parent = find_snaprealm();
2602 snaprealm = new SnapRealm(mdcache, this);
2603 if (parent) {
2604 dout(10) << "open_snaprealm " << snaprealm
2605 << " parent is " << parent
2606 << dendl;
2607 dout(30) << " siblings are " << parent->open_children << dendl;
2608 snaprealm->parent = parent;
2609 if (!nosplit)
2610 parent->split_at(snaprealm);
2611 parent->open_children.insert(snaprealm);
2612 }
2613 }
2614}
2615void CInode::close_snaprealm(bool nojoin)
2616{
2617 if (snaprealm) {
2618 dout(15) << "close_snaprealm " << *snaprealm << dendl;
2619 snaprealm->close_parents();
2620 if (snaprealm->parent) {
2621 snaprealm->parent->open_children.erase(snaprealm);
2622 //if (!nojoin)
2623 //snaprealm->parent->join(snaprealm);
2624 }
2625 delete snaprealm;
2626 snaprealm = 0;
2627 }
2628}
2629
2630SnapRealm *CInode::find_snaprealm() const
2631{
2632 const CInode *cur = this;
2633 while (!cur->snaprealm) {
2634 if (cur->get_parent_dn())
2635 cur = cur->get_parent_dn()->get_dir()->get_inode();
2636 else if (get_projected_parent_dn())
2637 cur = cur->get_projected_parent_dn()->get_dir()->get_inode();
2638 else
2639 break;
2640 }
2641 return cur->snaprealm;
2642}
2643
2644void CInode::encode_snap_blob(bufferlist &snapbl)
2645{
2646 if (snaprealm) {
2647 ::encode(snaprealm->srnode, snapbl);
2648 dout(20) << "encode_snap_blob " << *snaprealm << dendl;
2649 }
2650}
2651void CInode::decode_snap_blob(bufferlist& snapbl)
2652{
2653 if (snapbl.length()) {
2654 open_snaprealm();
2655 bufferlist::iterator p = snapbl.begin();
2656 ::decode(snaprealm->srnode, p);
2657 if (is_base()) {
2658 bool ok = snaprealm->_open_parents(NULL);
2659 assert(ok);
2660 }
2661 dout(20) << "decode_snap_blob " << *snaprealm << dendl;
2662 }
2663}
2664
2665void CInode::encode_snap(bufferlist& bl)
2666{
2667 bufferlist snapbl;
2668 encode_snap_blob(snapbl);
2669 ::encode(snapbl, bl);
2670 ::encode(oldest_snap, bl);
2671}
2672
2673void CInode::decode_snap(bufferlist::iterator& p)
2674{
2675 bufferlist snapbl;
2676 ::decode(snapbl, p);
2677 ::decode(oldest_snap, p);
2678 decode_snap_blob(snapbl);
2679}
2680
2681// =============================================
2682
2683client_t CInode::calc_ideal_loner()
2684{
2685 if (mdcache->is_readonly())
2686 return -1;
2687 if (!mds_caps_wanted.empty())
2688 return -1;
2689
2690 int n = 0;
2691 client_t loner = -1;
2692 for (map<client_t,Capability*>::iterator it = client_caps.begin();
2693 it != client_caps.end();
2694 ++it)
2695 if (!it->second->is_stale() &&
2696 ((it->second->wanted() & (CEPH_CAP_ANY_WR|CEPH_CAP_FILE_WR|CEPH_CAP_FILE_RD)) ||
2697 (inode.is_dir() && !has_subtree_root_dirfrag()))) {
2698 if (n)
2699 return -1;
2700 n++;
2701 loner = it->first;
2702 }
2703 return loner;
2704}
2705
b32b8144 2706bool CInode::choose_ideal_loner()
7c673cae
FG
2707{
2708 want_loner_cap = calc_ideal_loner();
b32b8144
FG
2709 int changed = false;
2710 if (loner_cap >= 0 && loner_cap != want_loner_cap) {
2711 if (!try_drop_loner())
2712 return false;
2713 changed = true;
2714 }
2715
2716 if (want_loner_cap >= 0) {
2717 if (loner_cap < 0) {
2718 set_loner_cap(want_loner_cap);
2719 changed = true;
2720 } else
2721 assert(loner_cap == want_loner_cap);
2722 }
2723 return changed;
7c673cae
FG
2724}
2725
2726bool CInode::try_set_loner()
2727{
2728 assert(want_loner_cap >= 0);
2729 if (loner_cap >= 0 && loner_cap != want_loner_cap)
2730 return false;
2731 set_loner_cap(want_loner_cap);
2732 return true;
2733}
2734
2735void CInode::set_loner_cap(client_t l)
2736{
2737 loner_cap = l;
2738 authlock.set_excl_client(loner_cap);
2739 filelock.set_excl_client(loner_cap);
2740 linklock.set_excl_client(loner_cap);
2741 xattrlock.set_excl_client(loner_cap);
2742}
2743
2744bool CInode::try_drop_loner()
2745{
2746 if (loner_cap < 0)
2747 return true;
2748
2749 int other_allowed = get_caps_allowed_by_type(CAP_ANY);
2750 Capability *cap = get_client_cap(loner_cap);
2751 if (!cap ||
2752 (cap->issued() & ~other_allowed) == 0) {
2753 set_loner_cap(-1);
2754 return true;
2755 }
2756 return false;
2757}
2758
2759
2760// choose new lock state during recovery, based on issued caps
2761void CInode::choose_lock_state(SimpleLock *lock, int allissued)
2762{
2763 int shift = lock->get_cap_shift();
2764 int issued = (allissued >> shift) & lock->get_cap_mask();
2765 if (is_auth()) {
2766 if (lock->is_xlocked()) {
2767 // do nothing here
2768 } else if (lock->get_state() != LOCK_MIX) {
2769 if (issued & (CEPH_CAP_GEXCL | CEPH_CAP_GBUFFER))
2770 lock->set_state(LOCK_EXCL);
2771 else if (issued & CEPH_CAP_GWR)
2772 lock->set_state(LOCK_MIX);
2773 else if (lock->is_dirty()) {
2774 if (is_replicated())
2775 lock->set_state(LOCK_MIX);
2776 else
2777 lock->set_state(LOCK_LOCK);
2778 } else
2779 lock->set_state(LOCK_SYNC);
2780 }
2781 } else {
2782 // our states have already been chosen during rejoin.
2783 if (lock->is_xlocked())
2784 assert(lock->get_state() == LOCK_LOCK);
2785 }
2786}
2787
2788void CInode::choose_lock_states(int dirty_caps)
2789{
2790 int issued = get_caps_issued() | dirty_caps;
b32b8144
FG
2791 if (is_auth() && (issued & (CEPH_CAP_ANY_EXCL|CEPH_CAP_ANY_WR)))
2792 choose_ideal_loner();
7c673cae
FG
2793 choose_lock_state(&filelock, issued);
2794 choose_lock_state(&nestlock, issued);
2795 choose_lock_state(&dirfragtreelock, issued);
2796 choose_lock_state(&authlock, issued);
2797 choose_lock_state(&xattrlock, issued);
2798 choose_lock_state(&linklock, issued);
2799}
2800
2801Capability *CInode::add_client_cap(client_t client, Session *session, SnapRealm *conrealm)
2802{
2803 if (client_caps.empty()) {
2804 get(PIN_CAPS);
2805 if (conrealm)
2806 containing_realm = conrealm;
2807 else
2808 containing_realm = find_snaprealm();
2809 containing_realm->inodes_with_caps.push_back(&item_caps);
2810 dout(10) << "add_client_cap first cap, joining realm " << *containing_realm << dendl;
2811 }
2812
2813 if (client_caps.empty())
2814 mdcache->num_inodes_with_caps++;
2815
2816 Capability *cap = new Capability(this, ++mdcache->last_cap_id, client);
2817 assert(client_caps.count(client) == 0);
2818 client_caps[client] = cap;
2819
2820 session->add_cap(cap);
2821 if (session->is_stale())
2822 cap->mark_stale();
2823
2824 cap->client_follows = first-1;
2825
2826 containing_realm->add_cap(client, cap);
2827
2828 return cap;
2829}
2830
2831void CInode::remove_client_cap(client_t client)
2832{
2833 assert(client_caps.count(client) == 1);
2834 Capability *cap = client_caps[client];
2835
2836 cap->item_session_caps.remove_myself();
2837 cap->item_revoking_caps.remove_myself();
2838 cap->item_client_revoking_caps.remove_myself();
2839 containing_realm->remove_cap(client, cap);
2840
2841 if (client == loner_cap)
2842 loner_cap = -1;
2843
2844 delete cap;
2845 client_caps.erase(client);
2846 if (client_caps.empty()) {
2847 dout(10) << "remove_client_cap last cap, leaving realm " << *containing_realm << dendl;
2848 put(PIN_CAPS);
2849 item_caps.remove_myself();
2850 containing_realm = NULL;
2851 item_open_file.remove_myself(); // unpin logsegment
2852 mdcache->num_inodes_with_caps--;
2853 }
2854
2855 //clean up advisory locks
2856 bool fcntl_removed = fcntl_locks ? fcntl_locks->remove_all_from(client) : false;
2857 bool flock_removed = flock_locks ? flock_locks->remove_all_from(client) : false;
2858 if (fcntl_removed || flock_removed) {
2859 list<MDSInternalContextBase*> waiters;
2860 take_waiting(CInode::WAIT_FLOCK, waiters);
2861 mdcache->mds->queue_waiters(waiters);
2862 }
2863}
2864
2865void CInode::move_to_realm(SnapRealm *realm)
2866{
2867 dout(10) << "move_to_realm joining realm " << *realm
2868 << ", leaving realm " << *containing_realm << dendl;
2869 for (map<client_t,Capability*>::iterator q = client_caps.begin();
2870 q != client_caps.end();
2871 ++q) {
2872 containing_realm->remove_cap(q->first, q->second);
2873 realm->add_cap(q->first, q->second);
2874 }
2875 item_caps.remove_myself();
2876 realm->inodes_with_caps.push_back(&item_caps);
2877 containing_realm = realm;
2878}
2879
2880Capability *CInode::reconnect_cap(client_t client, const cap_reconnect_t& icr, Session *session)
2881{
2882 Capability *cap = get_client_cap(client);
2883 if (cap) {
2884 // FIXME?
2885 cap->merge(icr.capinfo.wanted, icr.capinfo.issued);
2886 } else {
2887 cap = add_client_cap(client, session);
2888 cap->set_cap_id(icr.capinfo.cap_id);
2889 cap->set_wanted(icr.capinfo.wanted);
2890 cap->issue_norevoke(icr.capinfo.issued);
2891 cap->reset_seq();
2892 }
2893 cap->set_last_issue_stamp(ceph_clock_now());
2894 return cap;
2895}
2896
2897void CInode::clear_client_caps_after_export()
2898{
2899 while (!client_caps.empty())
2900 remove_client_cap(client_caps.begin()->first);
2901 loner_cap = -1;
2902 want_loner_cap = -1;
2903 mds_caps_wanted.clear();
2904}
2905
2906void CInode::export_client_caps(map<client_t,Capability::Export>& cl)
2907{
2908 for (map<client_t,Capability*>::iterator it = client_caps.begin();
2909 it != client_caps.end();
2910 ++it) {
2911 cl[it->first] = it->second->make_export();
2912 }
2913}
2914
2915 // caps allowed
2916int CInode::get_caps_liked() const
2917{
2918 if (is_dir())
2919 return CEPH_CAP_PIN | CEPH_CAP_ANY_EXCL | CEPH_CAP_ANY_SHARED; // but not, say, FILE_RD|WR|WRBUFFER
2920 else
2921 return CEPH_CAP_ANY & ~CEPH_CAP_FILE_LAZYIO;
2922}
2923
2924int CInode::get_caps_allowed_ever() const
2925{
2926 int allowed;
2927 if (is_dir())
2928 allowed = CEPH_CAP_PIN | CEPH_CAP_ANY_EXCL | CEPH_CAP_ANY_SHARED;
2929 else
2930 allowed = CEPH_CAP_ANY;
2931 return allowed &
2932 (CEPH_CAP_PIN |
2933 (filelock.gcaps_allowed_ever() << filelock.get_cap_shift()) |
2934 (authlock.gcaps_allowed_ever() << authlock.get_cap_shift()) |
2935 (xattrlock.gcaps_allowed_ever() << xattrlock.get_cap_shift()) |
2936 (linklock.gcaps_allowed_ever() << linklock.get_cap_shift()));
2937}
2938
2939int CInode::get_caps_allowed_by_type(int type) const
2940{
2941 return
2942 CEPH_CAP_PIN |
2943 (filelock.gcaps_allowed(type) << filelock.get_cap_shift()) |
2944 (authlock.gcaps_allowed(type) << authlock.get_cap_shift()) |
2945 (xattrlock.gcaps_allowed(type) << xattrlock.get_cap_shift()) |
2946 (linklock.gcaps_allowed(type) << linklock.get_cap_shift());
2947}
2948
2949int CInode::get_caps_careful() const
2950{
2951 return
2952 (filelock.gcaps_careful() << filelock.get_cap_shift()) |
2953 (authlock.gcaps_careful() << authlock.get_cap_shift()) |
2954 (xattrlock.gcaps_careful() << xattrlock.get_cap_shift()) |
2955 (linklock.gcaps_careful() << linklock.get_cap_shift());
2956}
2957
2958int CInode::get_xlocker_mask(client_t client) const
2959{
2960 return
2961 (filelock.gcaps_xlocker_mask(client) << filelock.get_cap_shift()) |
2962 (authlock.gcaps_xlocker_mask(client) << authlock.get_cap_shift()) |
2963 (xattrlock.gcaps_xlocker_mask(client) << xattrlock.get_cap_shift()) |
2964 (linklock.gcaps_xlocker_mask(client) << linklock.get_cap_shift());
2965}
2966
94b18763 2967int CInode::get_caps_allowed_for_client(Session *session, mempool_inode *file_i) const
7c673cae
FG
2968{
2969 client_t client = session->info.inst.name.num();
2970 int allowed;
2971 if (client == get_loner()) {
2972 // as the loner, we get the loner_caps AND any xlocker_caps for things we have xlocked
2973 allowed =
2974 get_caps_allowed_by_type(CAP_LONER) |
2975 (get_caps_allowed_by_type(CAP_XLOCKER) & get_xlocker_mask(client));
2976 } else {
2977 allowed = get_caps_allowed_by_type(CAP_ANY);
2978 }
2979
2980 if (!is_dir()) {
2981 if ((file_i->inline_data.version != CEPH_INLINE_NONE &&
2982 !session->connection->has_feature(CEPH_FEATURE_MDS_INLINE_DATA)) ||
2983 (!file_i->layout.pool_ns.empty() &&
2984 !session->connection->has_feature(CEPH_FEATURE_FS_FILE_LAYOUT_V2)))
2985 allowed &= ~(CEPH_CAP_FILE_RD | CEPH_CAP_FILE_WR);
2986 }
2987 return allowed;
2988}
2989
2990// caps issued, wanted
2991int CInode::get_caps_issued(int *ploner, int *pother, int *pxlocker,
2992 int shift, int mask)
2993{
2994 int c = 0;
2995 int loner = 0, other = 0, xlocker = 0;
2996 if (!is_auth()) {
2997 loner_cap = -1;
2998 }
2999
3000 for (map<client_t,Capability*>::const_iterator it = client_caps.begin();
3001 it != client_caps.end();
3002 ++it) {
3003 int i = it->second->issued();
3004 c |= i;
3005 if (it->first == loner_cap)
3006 loner |= i;
3007 else
3008 other |= i;
3009 xlocker |= get_xlocker_mask(it->first) & i;
3010 }
3011 if (ploner) *ploner = (loner >> shift) & mask;
3012 if (pother) *pother = (other >> shift) & mask;
3013 if (pxlocker) *pxlocker = (xlocker >> shift) & mask;
3014 return (c >> shift) & mask;
3015}
3016
3017bool CInode::is_any_caps_wanted() const
3018{
3019 for (map<client_t,Capability*>::const_iterator it = client_caps.begin();
3020 it != client_caps.end();
3021 ++it)
3022 if (it->second->wanted())
3023 return true;
3024 return false;
3025}
3026
3027int CInode::get_caps_wanted(int *ploner, int *pother, int shift, int mask) const
3028{
3029 int w = 0;
3030 int loner = 0, other = 0;
3031 for (map<client_t,Capability*>::const_iterator it = client_caps.begin();
3032 it != client_caps.end();
3033 ++it) {
3034 if (!it->second->is_stale()) {
3035 int t = it->second->wanted();
3036 w |= t;
3037 if (it->first == loner_cap)
3038 loner |= t;
3039 else
3040 other |= t;
3041 }
3042 //cout << " get_caps_wanted client " << it->first << " " << cap_string(it->second.wanted()) << endl;
3043 }
3044 if (is_auth())
94b18763
FG
3045 for (const auto &p : mds_caps_wanted) {
3046 w |= p.second;
3047 other |= p.second;
7c673cae
FG
3048 //cout << " get_caps_wanted mds " << it->first << " " << cap_string(it->second) << endl;
3049 }
3050 if (ploner) *ploner = (loner >> shift) & mask;
3051 if (pother) *pother = (other >> shift) & mask;
3052 return (w >> shift) & mask;
3053}
3054
3055bool CInode::issued_caps_need_gather(SimpleLock *lock)
3056{
3057 int loner_issued, other_issued, xlocker_issued;
3058 get_caps_issued(&loner_issued, &other_issued, &xlocker_issued,
3059 lock->get_cap_shift(), lock->get_cap_mask());
3060 if ((loner_issued & ~lock->gcaps_allowed(CAP_LONER)) ||
3061 (other_issued & ~lock->gcaps_allowed(CAP_ANY)) ||
3062 (xlocker_issued & ~lock->gcaps_allowed(CAP_XLOCKER)))
3063 return true;
3064 return false;
3065}
3066
3067void CInode::replicate_relax_locks()
3068{
3069 //dout(10) << " relaxing locks on " << *this << dendl;
3070 assert(is_auth());
3071 assert(!is_replicated());
3072
3073 authlock.replicate_relax();
3074 linklock.replicate_relax();
3075 dirfragtreelock.replicate_relax();
3076 filelock.replicate_relax();
3077 xattrlock.replicate_relax();
3078 snaplock.replicate_relax();
3079 nestlock.replicate_relax();
3080 flocklock.replicate_relax();
3081 policylock.replicate_relax();
3082}
3083
3084
3085
3086// =============================================
3087
3088int CInode::encode_inodestat(bufferlist& bl, Session *session,
3089 SnapRealm *dir_realm,
3090 snapid_t snapid,
3091 unsigned max_bytes,
3092 int getattr_caps)
3093{
31f18b77 3094 client_t client = session->info.inst.name.num();
7c673cae
FG
3095 assert(snapid);
3096 assert(session->connection);
3097
3098 bool valid = true;
3099
3100 // pick a version!
94b18763
FG
3101 mempool_inode *oi = &inode;
3102 mempool_inode *pi = get_projected_inode();
7c673cae 3103
94b18763 3104 CInode::mempool_xattr_map *pxattrs = nullptr;
7c673cae
FG
3105
3106 if (snapid != CEPH_NOSNAP) {
3107
3108 // for now at least, old_inodes is only defined/valid on the auth
3109 if (!is_auth())
3110 valid = false;
3111
3112 if (is_multiversion()) {
94b18763
FG
3113 auto it = old_inodes.lower_bound(snapid);
3114 if (it != old_inodes.end()) {
3115 if (it->second.first > snapid) {
3116 if (it != old_inodes.begin())
3117 --it;
7c673cae 3118 }
94b18763
FG
3119 if (it->second.first <= snapid && snapid <= it->first) {
3120 dout(15) << __func__ << " snapid " << snapid
3121 << " to old_inode [" << it->second.first << "," << it->first << "]"
3122 << " " << it->second.inode.rstat
7c673cae 3123 << dendl;
94b18763
FG
3124 auto &p = it->second;
3125 pi = oi = &p.inode;
3126 pxattrs = &p.xattrs;
7c673cae
FG
3127 } else {
3128 // snapshoted remote dentry can result this
3129 dout(0) << "encode_inodestat old_inode for snapid " << snapid
3130 << " not found" << dendl;
3131 }
3132 }
3133 } else if (snapid < first || snapid > last) {
3134 // snapshoted remote dentry can result this
3135 dout(0) << "encode_inodestat [" << first << "," << last << "]"
3136 << " not match snapid " << snapid << dendl;
3137 }
3138 }
3139
3140 SnapRealm *realm = find_snaprealm();
3141
3142 bool no_caps = !valid ||
3143 session->is_stale() ||
3144 (dir_realm && realm != dir_realm) ||
3145 is_frozen() ||
3146 state_test(CInode::STATE_EXPORTINGCAPS);
3147 if (no_caps)
3148 dout(20) << "encode_inodestat no caps"
3149 << (!valid?", !valid":"")
3150 << (session->is_stale()?", session stale ":"")
3151 << ((dir_realm && realm != dir_realm)?", snaprealm differs ":"")
3152 << (is_frozen()?", frozen inode":"")
3153 << (state_test(CInode::STATE_EXPORTINGCAPS)?", exporting caps":"")
3154 << dendl;
3155
3156
3157 // "fake" a version that is old (stable) version, +1 if projected.
3158 version_t version = (oi->version * 2) + is_projected();
3159
3160 Capability *cap = get_client_cap(client);
3161 bool pfile = filelock.is_xlocked_by_client(client) || get_loner() == client;
3162 //(cap && (cap->issued() & CEPH_CAP_FILE_EXCL));
3163 bool pauth = authlock.is_xlocked_by_client(client) || get_loner() == client;
3164 bool plink = linklock.is_xlocked_by_client(client) || get_loner() == client;
3165 bool pxattr = xattrlock.is_xlocked_by_client(client) || get_loner() == client;
3166
3167 bool plocal = versionlock.get_last_wrlock_client() == client;
3168 bool ppolicy = policylock.is_xlocked_by_client(client) || get_loner()==client;
3169
94b18763 3170 mempool_inode *any_i = (pfile|pauth|plink|pxattr|plocal) ? pi : oi;
7c673cae
FG
3171
3172 dout(20) << " pfile " << pfile << " pauth " << pauth
3173 << " plink " << plink << " pxattr " << pxattr
3174 << " plocal " << plocal
3175 << " ctime " << any_i->ctime
3176 << " valid=" << valid << dendl;
3177
3178 // file
94b18763 3179 mempool_inode *file_i = pfile ? pi:oi;
7c673cae
FG
3180 file_layout_t layout;
3181 if (is_dir()) {
3182 layout = (ppolicy ? pi : oi)->layout;
3183 } else {
3184 layout = file_i->layout;
3185 }
3186
3187 // max_size is min of projected, actual
3188 uint64_t max_size =
3189 MIN(oi->client_ranges.count(client) ?
3190 oi->client_ranges[client].range.last : 0,
3191 pi->client_ranges.count(client) ?
3192 pi->client_ranges[client].range.last : 0);
3193
3194 // inline data
3195 version_t inline_version = 0;
3196 bufferlist inline_data;
3197 if (file_i->inline_data.version == CEPH_INLINE_NONE) {
3198 inline_version = CEPH_INLINE_NONE;
3199 } else if ((!cap && !no_caps) ||
3200 (cap && cap->client_inline_version < file_i->inline_data.version) ||
3201 (getattr_caps & CEPH_CAP_FILE_RD)) { // client requests inline data
3202 inline_version = file_i->inline_data.version;
3203 if (file_i->inline_data.length() > 0)
3204 inline_data = file_i->inline_data.get_data();
3205 }
3206
3207 // nest (do same as file... :/)
3208 if (cap) {
3209 cap->last_rbytes = file_i->rstat.rbytes;
3210 cap->last_rsize = file_i->rstat.rsize();
3211 }
3212
3213 // auth
94b18763 3214 mempool_inode *auth_i = pauth ? pi:oi;
7c673cae
FG
3215
3216 // link
94b18763 3217 mempool_inode *link_i = plink ? pi:oi;
7c673cae
FG
3218
3219 // xattr
94b18763 3220 mempool_inode *xattr_i = pxattr ? pi:oi;
7c673cae
FG
3221
3222 // xattr
3223 bufferlist xbl;
3224 version_t xattr_version;
3225 if ((!cap && !no_caps) ||
3226 (cap && cap->client_xattr_version < xattr_i->xattr_version) ||
3227 (getattr_caps & CEPH_CAP_XATTR_SHARED)) { // client requests xattrs
3228 if (!pxattrs)
3229 pxattrs = pxattr ? get_projected_xattrs() : &xattrs;
3230 ::encode(*pxattrs, xbl);
3231 xattr_version = xattr_i->xattr_version;
3232 } else {
3233 xattr_version = 0;
3234 }
3235
3236 // do we have room?
3237 if (max_bytes) {
3238 unsigned bytes = 8 + 8 + 4 + 8 + 8 + sizeof(ceph_mds_reply_cap) +
3239 sizeof(struct ceph_file_layout) + 4 + layout.pool_ns.size() +
3240 sizeof(struct ceph_timespec) * 3 +
3241 4 + 8 + 8 + 8 + 4 + 4 + 4 + 4 + 4 +
3242 8 + 8 + 8 + 8 + 8 + sizeof(struct ceph_timespec) +
3243 4;
3244 bytes += sizeof(__u32);
3245 bytes += (sizeof(__u32) + sizeof(__u32)) * dirfragtree._splits.size();
3246 bytes += sizeof(__u32) + symlink.length();
3247 bytes += sizeof(__u32) + xbl.length();
3248 bytes += sizeof(version_t) + sizeof(__u32) + inline_data.length();
3249 if (bytes > max_bytes)
3250 return -ENOSPC;
3251 }
3252
3253
3254 // encode caps
3255 struct ceph_mds_reply_cap ecap;
3256 if (snapid != CEPH_NOSNAP) {
3257 /*
3258 * snapped inodes (files or dirs) only get read-only caps. always
3259 * issue everything possible, since it is read only.
3260 *
3261 * if a snapped inode has caps, limit issued caps based on the
3262 * lock state.
3263 *
3264 * if it is a live inode, limit issued caps based on the lock
3265 * state.
3266 *
3267 * do NOT adjust cap issued state, because the client always
3268 * tracks caps per-snap and the mds does either per-interval or
3269 * multiversion.
3270 */
3271 ecap.caps = valid ? get_caps_allowed_by_type(CAP_ANY) : CEPH_STAT_CAP_INODE;
3272 if (last == CEPH_NOSNAP || is_any_caps())
3273 ecap.caps = ecap.caps & get_caps_allowed_for_client(session, file_i);
3274 ecap.seq = 0;
3275 ecap.mseq = 0;
3276 ecap.realm = 0;
3277 } else {
3278 if (!no_caps && !cap) {
3279 // add a new cap
3280 cap = add_client_cap(client, session, realm);
b32b8144
FG
3281 if (is_auth())
3282 choose_ideal_loner();
7c673cae
FG
3283 }
3284
3285 int issue = 0;
3286 if (!no_caps && cap) {
3287 int likes = get_caps_liked();
3288 int allowed = get_caps_allowed_for_client(session, file_i);
3289 issue = (cap->wanted() | likes) & allowed;
3290 cap->issue_norevoke(issue);
3291 issue = cap->pending();
3292 dout(10) << "encode_inodestat issuing " << ccap_string(issue)
3293 << " seq " << cap->get_last_seq() << dendl;
3294 } else if (cap && cap->is_new() && !dir_realm) {
3295 // alway issue new caps to client, otherwise the caps get lost
3296 assert(cap->is_stale());
3297 issue = cap->pending() | CEPH_CAP_PIN;
3298 cap->issue_norevoke(issue);
3299 dout(10) << "encode_inodestat issuing " << ccap_string(issue)
3300 << " seq " << cap->get_last_seq()
3301 << "(stale|new caps)" << dendl;
3302 }
3303
3304 if (issue) {
3305 cap->set_last_issue();
3306 cap->set_last_issue_stamp(ceph_clock_now());
3307 cap->clear_new();
3308 ecap.caps = issue;
3309 ecap.wanted = cap->wanted();
3310 ecap.cap_id = cap->get_cap_id();
3311 ecap.seq = cap->get_last_seq();
3312 ecap.mseq = cap->get_mseq();
3313 ecap.realm = realm->inode->ino();
3314 } else {
3315 ecap.cap_id = 0;
3316 ecap.caps = 0;
3317 ecap.seq = 0;
3318 ecap.mseq = 0;
3319 ecap.realm = 0;
3320 ecap.wanted = 0;
3321 }
3322 }
3323 ecap.flags = is_auth() ? CEPH_CAP_FLAG_AUTH : 0;
3324 dout(10) << "encode_inodestat caps " << ccap_string(ecap.caps)
3325 << " seq " << ecap.seq << " mseq " << ecap.mseq
3326 << " xattrv " << xattr_version << " len " << xbl.length()
3327 << dendl;
3328
3329 if (inline_data.length() && cap) {
3330 if ((cap->pending() | getattr_caps) & CEPH_CAP_FILE_SHARED) {
3331 dout(10) << "including inline version " << inline_version << dendl;
3332 cap->client_inline_version = inline_version;
3333 } else {
3334 dout(10) << "dropping inline version " << inline_version << dendl;
3335 inline_version = 0;
3336 inline_data.clear();
3337 }
3338 }
3339
3340 // include those xattrs?
3341 if (xbl.length() && cap) {
3342 if ((cap->pending() | getattr_caps) & CEPH_CAP_XATTR_SHARED) {
3343 dout(10) << "including xattrs version " << xattr_i->xattr_version << dendl;
3344 cap->client_xattr_version = xattr_i->xattr_version;
3345 } else {
3346 dout(10) << "dropping xattrs version " << xattr_i->xattr_version << dendl;
3347 xbl.clear(); // no xattrs .. XXX what's this about?!?
3348 xattr_version = 0;
3349 }
3350 }
3351
3352 /*
3353 * note: encoding matches MClientReply::InodeStat
3354 */
3355 ::encode(oi->ino, bl);
3356 ::encode(snapid, bl);
3357 ::encode(oi->rdev, bl);
3358 ::encode(version, bl);
3359
3360 ::encode(xattr_version, bl);
3361
3362 ::encode(ecap, bl);
3363 {
3364 ceph_file_layout legacy_layout;
3365 layout.to_legacy(&legacy_layout);
3366 ::encode(legacy_layout, bl);
3367 }
3368 ::encode(any_i->ctime, bl);
3369 ::encode(file_i->mtime, bl);
3370 ::encode(file_i->atime, bl);
3371 ::encode(file_i->time_warp_seq, bl);
3372 ::encode(file_i->size, bl);
3373 ::encode(max_size, bl);
3374 ::encode(file_i->truncate_size, bl);
3375 ::encode(file_i->truncate_seq, bl);
3376
3377 ::encode(auth_i->mode, bl);
3378 ::encode((uint32_t)auth_i->uid, bl);
3379 ::encode((uint32_t)auth_i->gid, bl);
3380
3381 ::encode(link_i->nlink, bl);
3382
3383 ::encode(file_i->dirstat.nfiles, bl);
3384 ::encode(file_i->dirstat.nsubdirs, bl);
3385 ::encode(file_i->rstat.rbytes, bl);
3386 ::encode(file_i->rstat.rfiles, bl);
3387 ::encode(file_i->rstat.rsubdirs, bl);
3388 ::encode(file_i->rstat.rctime, bl);
3389
3390 dirfragtree.encode(bl);
3391
3392 ::encode(symlink, bl);
3393 if (session->connection->has_feature(CEPH_FEATURE_DIRLAYOUTHASH)) {
3394 ::encode(file_i->dir_layout, bl);
3395 }
3396 ::encode(xbl, bl);
3397 if (session->connection->has_feature(CEPH_FEATURE_MDS_INLINE_DATA)) {
3398 ::encode(inline_version, bl);
3399 ::encode(inline_data, bl);
3400 }
3401 if (session->connection->has_feature(CEPH_FEATURE_MDS_QUOTA)) {
94b18763 3402 mempool_inode *policy_i = ppolicy ? pi : oi;
7c673cae
FG
3403 ::encode(policy_i->quota, bl);
3404 }
3405 if (session->connection->has_feature(CEPH_FEATURE_FS_FILE_LAYOUT_V2)) {
3406 ::encode(layout.pool_ns, bl);
3407 }
3408 if (session->connection->has_feature(CEPH_FEATURE_FS_BTIME)) {
3409 ::encode(any_i->btime, bl);
3410 ::encode(any_i->change_attr, bl);
3411 }
3412
3413 return valid;
3414}
3415
3416void CInode::encode_cap_message(MClientCaps *m, Capability *cap)
3417{
3418 assert(cap);
3419
3420 client_t client = cap->get_client();
3421
3422 bool pfile = filelock.is_xlocked_by_client(client) || (cap->issued() & CEPH_CAP_FILE_EXCL);
3423 bool pauth = authlock.is_xlocked_by_client(client);
3424 bool plink = linklock.is_xlocked_by_client(client);
3425 bool pxattr = xattrlock.is_xlocked_by_client(client);
3426
94b18763
FG
3427 mempool_inode *oi = &inode;
3428 mempool_inode *pi = get_projected_inode();
3429 mempool_inode *i = (pfile|pauth|plink|pxattr) ? pi : oi;
7c673cae
FG
3430
3431 dout(20) << "encode_cap_message pfile " << pfile
3432 << " pauth " << pauth << " plink " << plink << " pxattr " << pxattr
3433 << " ctime " << i->ctime << dendl;
3434
3435 i = pfile ? pi:oi;
3436 m->set_layout(i->layout);
3437 m->size = i->size;
3438 m->truncate_seq = i->truncate_seq;
3439 m->truncate_size = i->truncate_size;
3440 m->mtime = i->mtime;
3441 m->atime = i->atime;
3442 m->ctime = i->ctime;
3443 m->change_attr = i->change_attr;
3444 m->time_warp_seq = i->time_warp_seq;
28e407b8
AA
3445 m->nfiles = i->dirstat.nfiles;
3446 m->nsubdirs = i->dirstat.nsubdirs;
7c673cae
FG
3447
3448 if (cap->client_inline_version < i->inline_data.version) {
3449 m->inline_version = cap->client_inline_version = i->inline_data.version;
3450 if (i->inline_data.length() > 0)
3451 m->inline_data = i->inline_data.get_data();
3452 } else {
3453 m->inline_version = 0;
3454 }
3455
3456 // max_size is min of projected, actual.
3457 uint64_t oldms = oi->client_ranges.count(client) ? oi->client_ranges[client].range.last : 0;
3458 uint64_t newms = pi->client_ranges.count(client) ? pi->client_ranges[client].range.last : 0;
3459 m->max_size = MIN(oldms, newms);
3460
3461 i = pauth ? pi:oi;
3462 m->head.mode = i->mode;
3463 m->head.uid = i->uid;
3464 m->head.gid = i->gid;
3465
3466 i = plink ? pi:oi;
3467 m->head.nlink = i->nlink;
3468
3469 i = pxattr ? pi:oi;
94b18763 3470 auto ix = pxattr ? get_projected_xattrs() : &xattrs;
7c673cae
FG
3471 if ((cap->pending() & CEPH_CAP_XATTR_SHARED) &&
3472 i->xattr_version > cap->client_xattr_version) {
3473 dout(10) << " including xattrs v " << i->xattr_version << dendl;
3474 ::encode(*ix, m->xattrbl);
3475 m->head.xattr_version = i->xattr_version;
3476 cap->client_xattr_version = i->xattr_version;
3477 }
3478}
3479
3480
3481
3482void CInode::_encode_base(bufferlist& bl, uint64_t features)
3483{
3484 ::encode(first, bl);
3485 ::encode(inode, bl, features);
3486 ::encode(symlink, bl);
3487 ::encode(dirfragtree, bl);
3488 ::encode(xattrs, bl);
3489 ::encode(old_inodes, bl, features);
3490 ::encode(damage_flags, bl);
3491 encode_snap(bl);
3492}
3493void CInode::_decode_base(bufferlist::iterator& p)
3494{
3495 ::decode(first, p);
3496 ::decode(inode, p);
94b18763
FG
3497 {
3498 std::string tmp;
3499 ::decode(tmp, p);
3500 symlink = mempool::mds_co::string(boost::string_view(tmp));
3501 }
7c673cae
FG
3502 ::decode(dirfragtree, p);
3503 ::decode(xattrs, p);
3504 ::decode(old_inodes, p);
3505 ::decode(damage_flags, p);
3506 decode_snap(p);
3507}
3508
3509void CInode::_encode_locks_full(bufferlist& bl)
3510{
3511 ::encode(authlock, bl);
3512 ::encode(linklock, bl);
3513 ::encode(dirfragtreelock, bl);
3514 ::encode(filelock, bl);
3515 ::encode(xattrlock, bl);
3516 ::encode(snaplock, bl);
3517 ::encode(nestlock, bl);
3518 ::encode(flocklock, bl);
3519 ::encode(policylock, bl);
3520
3521 ::encode(loner_cap, bl);
3522}
3523void CInode::_decode_locks_full(bufferlist::iterator& p)
3524{
3525 ::decode(authlock, p);
3526 ::decode(linklock, p);
3527 ::decode(dirfragtreelock, p);
3528 ::decode(filelock, p);
3529 ::decode(xattrlock, p);
3530 ::decode(snaplock, p);
3531 ::decode(nestlock, p);
3532 ::decode(flocklock, p);
3533 ::decode(policylock, p);
3534
3535 ::decode(loner_cap, p);
3536 set_loner_cap(loner_cap);
3537 want_loner_cap = loner_cap; // for now, we'll eval() shortly.
3538}
3539
b32b8144 3540void CInode::_encode_locks_state_for_replica(bufferlist& bl, bool need_recover)
7c673cae
FG
3541{
3542 authlock.encode_state_for_replica(bl);
3543 linklock.encode_state_for_replica(bl);
3544 dirfragtreelock.encode_state_for_replica(bl);
3545 filelock.encode_state_for_replica(bl);
3546 nestlock.encode_state_for_replica(bl);
3547 xattrlock.encode_state_for_replica(bl);
3548 snaplock.encode_state_for_replica(bl);
3549 flocklock.encode_state_for_replica(bl);
3550 policylock.encode_state_for_replica(bl);
b32b8144 3551 ::encode(need_recover, bl);
7c673cae 3552}
b32b8144 3553
7c673cae
FG
3554void CInode::_encode_locks_state_for_rejoin(bufferlist& bl, int rep)
3555{
3556 authlock.encode_state_for_replica(bl);
3557 linklock.encode_state_for_replica(bl);
3558 dirfragtreelock.encode_state_for_rejoin(bl, rep);
3559 filelock.encode_state_for_rejoin(bl, rep);
3560 nestlock.encode_state_for_rejoin(bl, rep);
3561 xattrlock.encode_state_for_replica(bl);
3562 snaplock.encode_state_for_replica(bl);
3563 flocklock.encode_state_for_replica(bl);
3564 policylock.encode_state_for_replica(bl);
3565}
b32b8144 3566
7c673cae
FG
3567void CInode::_decode_locks_state(bufferlist::iterator& p, bool is_new)
3568{
3569 authlock.decode_state(p, is_new);
3570 linklock.decode_state(p, is_new);
3571 dirfragtreelock.decode_state(p, is_new);
3572 filelock.decode_state(p, is_new);
3573 nestlock.decode_state(p, is_new);
3574 xattrlock.decode_state(p, is_new);
3575 snaplock.decode_state(p, is_new);
3576 flocklock.decode_state(p, is_new);
3577 policylock.decode_state(p, is_new);
b32b8144
FG
3578
3579 bool need_recover;
3580 ::decode(need_recover, p);
3581 if (need_recover && is_new) {
3582 // Auth mds replicated this inode while it's recovering. Auth mds may take xlock on the lock
3583 // and change the object when replaying unsafe requests.
3584 authlock.mark_need_recover();
3585 linklock.mark_need_recover();
3586 dirfragtreelock.mark_need_recover();
3587 filelock.mark_need_recover();
3588 nestlock.mark_need_recover();
3589 xattrlock.mark_need_recover();
3590 snaplock.mark_need_recover();
3591 flocklock.mark_need_recover();
3592 policylock.mark_need_recover();
3593 }
7c673cae
FG
3594}
3595void CInode::_decode_locks_rejoin(bufferlist::iterator& p, list<MDSInternalContextBase*>& waiters,
b32b8144
FG
3596 list<SimpleLock*>& eval_locks, bool survivor)
3597{
3598 authlock.decode_state_rejoin(p, waiters, survivor);
3599 linklock.decode_state_rejoin(p, waiters, survivor);
3600 dirfragtreelock.decode_state_rejoin(p, waiters, survivor);
3601 filelock.decode_state_rejoin(p, waiters, survivor);
3602 nestlock.decode_state_rejoin(p, waiters, survivor);
3603 xattrlock.decode_state_rejoin(p, waiters, survivor);
3604 snaplock.decode_state_rejoin(p, waiters, survivor);
3605 flocklock.decode_state_rejoin(p, waiters, survivor);
3606 policylock.decode_state_rejoin(p, waiters, survivor);
7c673cae
FG
3607
3608 if (!dirfragtreelock.is_stable() && !dirfragtreelock.is_wrlocked())
3609 eval_locks.push_back(&dirfragtreelock);
3610 if (!filelock.is_stable() && !filelock.is_wrlocked())
3611 eval_locks.push_back(&filelock);
3612 if (!nestlock.is_stable() && !nestlock.is_wrlocked())
3613 eval_locks.push_back(&nestlock);
3614}
3615
3616
3617// IMPORT/EXPORT
3618
3619void CInode::encode_export(bufferlist& bl)
3620{
3621 ENCODE_START(5, 4, bl);
3622 _encode_base(bl, mdcache->mds->mdsmap->get_up_features());
3623
3624 ::encode(state, bl);
3625
3626 ::encode(pop, bl);
3627
181888fb 3628 ::encode(get_replicas(), bl);
7c673cae
FG
3629
3630 // include scatterlock info for any bounding CDirs
3631 bufferlist bounding;
3632 if (inode.is_dir())
94b18763
FG
3633 for (const auto &p : dirfrags) {
3634 CDir *dir = p.second;
7c673cae 3635 if (dir->state_test(CDir::STATE_EXPORTBOUND)) {
94b18763 3636 ::encode(p.first, bounding);
7c673cae
FG
3637 ::encode(dir->fnode.fragstat, bounding);
3638 ::encode(dir->fnode.accounted_fragstat, bounding);
3639 ::encode(dir->fnode.rstat, bounding);
3640 ::encode(dir->fnode.accounted_rstat, bounding);
3641 dout(10) << " encoded fragstat/rstat info for " << *dir << dendl;
3642 }
3643 }
3644 ::encode(bounding, bl);
3645
3646 _encode_locks_full(bl);
3647
3648 _encode_file_locks(bl);
3649
3650 ENCODE_FINISH(bl);
3651
3652 get(PIN_TEMPEXPORTING);
3653}
3654
3655void CInode::finish_export(utime_t now)
3656{
3657 state &= MASK_STATE_EXPORT_KEPT;
3658
3659 pop.zero(now);
3660
3661 // just in case!
3662 //dirlock.clear_updated();
3663
3664 loner_cap = -1;
3665
3666 put(PIN_TEMPEXPORTING);
3667}
3668
3669void CInode::decode_import(bufferlist::iterator& p,
3670 LogSegment *ls)
3671{
3672 DECODE_START(5, p);
3673
3674 _decode_base(p);
3675
3676 unsigned s;
3677 ::decode(s, p);
3678 state_set(STATE_AUTH | (s & MASK_STATE_EXPORTED));
3679
3680 if (is_dirty()) {
3681 get(PIN_DIRTY);
3682 _mark_dirty(ls);
3683 }
3684 if (is_dirty_parent()) {
3685 get(PIN_DIRTYPARENT);
28e407b8 3686 mark_dirty_parent(ls);
7c673cae
FG
3687 }
3688
3689 ::decode(pop, ceph_clock_now(), p);
3690
181888fb
FG
3691 ::decode(get_replicas(), p);
3692 if (is_replicated())
7c673cae
FG
3693 get(PIN_REPLICATED);
3694 replica_nonce = 0;
3695
3696 // decode fragstat info on bounding cdirs
3697 bufferlist bounding;
3698 ::decode(bounding, p);
3699 bufferlist::iterator q = bounding.begin();
3700 while (!q.end()) {
3701 frag_t fg;
3702 ::decode(fg, q);
3703 CDir *dir = get_dirfrag(fg);
3704 assert(dir); // we should have all bounds open
3705
3706 // Only take the remote's fragstat/rstat if we are non-auth for
3707 // this dirfrag AND the lock is NOT in a scattered (MIX) state.
3708 // We know lock is stable, and MIX is the only state in which
3709 // the inode auth (who sent us this data) may not have the best
3710 // info.
3711
3712 // HMM: Are there cases where dir->is_auth() is an insufficient
3713 // check because the dirfrag is under migration? That implies
3714 // it is frozen (and in a SYNC or LOCK state). FIXME.
3715
3716 if (dir->is_auth() ||
3717 filelock.get_state() == LOCK_MIX) {
3718 dout(10) << " skipped fragstat info for " << *dir << dendl;
3719 frag_info_t f;
3720 ::decode(f, q);
3721 ::decode(f, q);
3722 } else {
3723 ::decode(dir->fnode.fragstat, q);
3724 ::decode(dir->fnode.accounted_fragstat, q);
3725 dout(10) << " took fragstat info for " << *dir << dendl;
3726 }
3727 if (dir->is_auth() ||
3728 nestlock.get_state() == LOCK_MIX) {
3729 dout(10) << " skipped rstat info for " << *dir << dendl;
3730 nest_info_t n;
3731 ::decode(n, q);
3732 ::decode(n, q);
3733 } else {
3734 ::decode(dir->fnode.rstat, q);
3735 ::decode(dir->fnode.accounted_rstat, q);
3736 dout(10) << " took rstat info for " << *dir << dendl;
3737 }
3738 }
3739
3740 _decode_locks_full(p);
3741
3742 _decode_file_locks(p);
3743
3744 DECODE_FINISH(p);
3745}
3746
3747
3748void InodeStoreBase::dump(Formatter *f) const
3749{
3750 inode.dump(f);
3751 f->dump_string("symlink", symlink);
3752 f->open_array_section("old_inodes");
94b18763 3753 for (const auto &p : old_inodes) {
7c673cae 3754 f->open_object_section("old_inode");
94b18763
FG
3755 // The key is the last snapid, the first is in the mempool_old_inode
3756 f->dump_int("last", p.first);
3757 p.second.dump(f);
7c673cae
FG
3758 f->close_section(); // old_inode
3759 }
3760 f->close_section(); // old_inodes
3761
3762 f->open_object_section("dirfragtree");
3763 dirfragtree.dump(f);
3764 f->close_section(); // dirfragtree
3765}
3766
3767
3768void InodeStore::generate_test_instances(list<InodeStore*> &ls)
3769{
3770 InodeStore *populated = new InodeStore;
3771 populated->inode.ino = 0xdeadbeef;
3772 populated->symlink = "rhubarb";
3773 ls.push_back(populated);
3774}
3775
3776void CInode::validate_disk_state(CInode::validated_data *results,
3777 MDSInternalContext *fin)
3778{
3779 class ValidationContinuation : public MDSContinuation {
3780 public:
3781 MDSInternalContext *fin;
3782 CInode *in;
3783 CInode::validated_data *results;
3784 bufferlist bl;
3785 CInode *shadow_in;
3786
3787 enum {
3788 START = 0,
3789 BACKTRACE,
3790 INODE,
3791 DIRFRAGS
3792 };
3793
3794 ValidationContinuation(CInode *i,
3795 CInode::validated_data *data_r,
3796 MDSInternalContext *fin_) :
3797 MDSContinuation(i->mdcache->mds->server),
3798 fin(fin_),
3799 in(i),
3800 results(data_r),
3801 shadow_in(NULL) {
3802 set_callback(START, static_cast<Continuation::stagePtr>(&ValidationContinuation::_start));
3803 set_callback(BACKTRACE, static_cast<Continuation::stagePtr>(&ValidationContinuation::_backtrace));
3804 set_callback(INODE, static_cast<Continuation::stagePtr>(&ValidationContinuation::_inode_disk));
3805 set_callback(DIRFRAGS, static_cast<Continuation::stagePtr>(&ValidationContinuation::_dirfrags));
3806 }
3807
3808 ~ValidationContinuation() override {
b32b8144
FG
3809 if (shadow_in) {
3810 delete shadow_in;
3811 in->mdcache->num_shadow_inodes--;
3812 }
7c673cae
FG
3813 }
3814
3815 /**
3816 * Fetch backtrace and set tag if tag is non-empty
3817 */
94b18763 3818 void fetch_backtrace_and_tag(CInode *in, boost::string_view tag,
7c673cae
FG
3819 Context *fin, int *bt_r, bufferlist *bt)
3820 {
3821 const int64_t pool = in->get_backtrace_pool();
3822 object_t oid = CInode::get_object_name(in->ino(), frag_t(), "");
3823
3824 ObjectOperation fetch;
3825 fetch.getxattr("parent", bt, bt_r);
3826 in->mdcache->mds->objecter->read(oid, object_locator_t(pool), fetch, CEPH_NOSNAP,
3827 NULL, 0, fin);
3828 if (!tag.empty()) {
3829 ObjectOperation scrub_tag;
3830 bufferlist tag_bl;
3831 ::encode(tag, tag_bl);
3832 scrub_tag.setxattr("scrub_tag", tag_bl);
3833 SnapContext snapc;
3834 in->mdcache->mds->objecter->mutate(oid, object_locator_t(pool), scrub_tag, snapc,
3835 ceph::real_clock::now(),
3836 0, NULL);
3837 }
3838 }
3839
3840 bool _start(int rval) {
3841 if (in->is_dirty()) {
3842 MDCache *mdcache = in->mdcache;
94b18763 3843 mempool_inode& inode = in->inode;
7c673cae
FG
3844 dout(20) << "validating a dirty CInode; results will be inconclusive"
3845 << dendl;
3846 }
3847 if (in->is_symlink()) {
3848 // there's nothing to do for symlinks!
3849 return true;
3850 }
3851
3852 C_OnFinisher *conf = new C_OnFinisher(get_io_callback(BACKTRACE),
3853 in->mdcache->mds->finisher);
3854
3855 // Whether we have a tag to apply depends on ScrubHeader (if one is
3856 // present)
3857 if (in->scrub_infop) {
3858 // I'm a non-orphan, so look up my ScrubHeader via my linkage
94b18763 3859 boost::string_view tag = in->scrub_infop->header->get_tag();
7c673cae
FG
3860 // Rather than using the usual CInode::fetch_backtrace,
3861 // use a special variant that optionally writes a tag in the same
3862 // operation.
3863 fetch_backtrace_and_tag(in, tag, conf,
3864 &results->backtrace.ondisk_read_retval, &bl);
3865 } else {
3866 // When we're invoked outside of ScrubStack we might be called
3867 // on an orphaned inode like /
3868 fetch_backtrace_and_tag(in, {}, conf,
3869 &results->backtrace.ondisk_read_retval, &bl);
3870 }
3871 return false;
3872 }
3873
3874 bool _backtrace(int rval) {
3875 // set up basic result reporting and make sure we got the data
3876 results->performed_validation = true; // at least, some of it!
3877 results->backtrace.checked = true;
3878
3879 const int64_t pool = in->get_backtrace_pool();
3880 inode_backtrace_t& memory_backtrace = results->backtrace.memory_value;
3881 in->build_backtrace(pool, memory_backtrace);
3882 bool equivalent, divergent;
3883 int memory_newer;
3884
3885 MDCache *mdcache = in->mdcache; // For the benefit of dout
94b18763 3886 const mempool_inode& inode = in->inode; // For the benefit of dout
7c673cae
FG
3887
3888 // Ignore rval because it's the result of a FAILOK operation
3889 // from fetch_backtrace_and_tag: the real result is in
3890 // backtrace.ondisk_read_retval
3891 dout(20) << "ondisk_read_retval: " << results->backtrace.ondisk_read_retval << dendl;
3892 if (results->backtrace.ondisk_read_retval != 0) {
3893 results->backtrace.error_str << "failed to read off disk; see retval";
3894 goto next;
3895 }
3896
3897 // extract the backtrace, and compare it to a newly-constructed one
3898 try {
3899 bufferlist::iterator p = bl.begin();
3900 ::decode(results->backtrace.ondisk_value, p);
3901 dout(10) << "decoded " << bl.length() << " bytes of backtrace successfully" << dendl;
3902 } catch (buffer::error&) {
3903 if (results->backtrace.ondisk_read_retval == 0 && rval != 0) {
3904 // Cases where something has clearly gone wrong with the overall
3905 // fetch op, though we didn't get a nonzero rc from the getxattr
3906 // operation. e.g. object missing.
3907 results->backtrace.ondisk_read_retval = rval;
3908 }
3909 results->backtrace.error_str << "failed to decode on-disk backtrace ("
3910 << bl.length() << " bytes)!";
3911 goto next;
3912 }
3913
3914 memory_newer = memory_backtrace.compare(results->backtrace.ondisk_value,
3915 &equivalent, &divergent);
3916
3917 if (divergent || memory_newer < 0) {
3918 // we're divergent, or on-disk version is newer
3919 results->backtrace.error_str << "On-disk backtrace is divergent or newer";
3920 } else {
3921 results->backtrace.passed = true;
3922 }
3923next:
3924
3925 if (!results->backtrace.passed && in->scrub_infop->header->get_repair()) {
3926 std::string path;
3927 in->make_path_string(path);
d2e6a577
FG
3928 in->mdcache->mds->clog->warn() << "bad backtrace on inode " << in->ino()
3929 << "(" << path << "), rewriting it";
28e407b8 3930 in->mark_dirty_parent(in->mdcache->mds->mdlog->get_current_segment(),
7c673cae 3931 false);
b32b8144
FG
3932 // Flag that we repaired this BT so that it won't go into damagetable
3933 results->backtrace.repaired = true;
3934
3935 // Flag that we did some repair work so that our repair operation
3936 // can be flushed at end of scrub
3937 in->scrub_infop->header->set_repaired();
7c673cae
FG
3938 }
3939
3940 // If the inode's number was free in the InoTable, fix that
3941 // (#15619)
3942 {
3943 InoTable *inotable = mdcache->mds->inotable;
3944
d2e6a577 3945 dout(10) << "scrub: inotable ino = " << inode.ino << dendl;
7c673cae
FG
3946 dout(10) << "scrub: inotable free says "
3947 << inotable->is_marked_free(inode.ino) << dendl;
3948
3949 if (inotable->is_marked_free(inode.ino)) {
3950 LogChannelRef clog = in->mdcache->mds->clog;
3951 clog->error() << "scrub: inode wrongly marked free: 0x" << std::hex
3952 << inode.ino;
3953
3954 if (in->scrub_infop->header->get_repair()) {
3955 bool repaired = inotable->repair(inode.ino);
3956 if (repaired) {
3957 clog->error() << "inode table repaired for inode: 0x" << std::hex
3958 << inode.ino;
3959
3960 inotable->save();
3961 } else {
3962 clog->error() << "Cannot repair inotable while other operations"
3963 " are in progress";
3964 }
3965 }
3966 }
3967 }
3968
3969 // quit if we're a file, or kick off directory checks otherwise
3970 // TODO: validate on-disk inode for non-base directories
3971 if (!in->is_dir()) {
3972 return true;
3973 }
3974
3975 return validate_directory_data();
3976 }
3977
3978 bool validate_directory_data() {
3979 assert(in->is_dir());
3980
3981 if (in->is_base()) {
b32b8144
FG
3982 if (!shadow_in) {
3983 shadow_in = new CInode(in->mdcache);
3984 in->mdcache->create_unlinked_system_inode(shadow_in, in->inode.ino, in->inode.mode);
3985 in->mdcache->num_shadow_inodes++;
3986 }
7c673cae
FG
3987 shadow_in->fetch(get_internal_callback(INODE));
3988 return false;
3989 } else {
3990 results->inode.passed = true;
3991 return check_dirfrag_rstats();
3992 }
3993 }
3994
3995 bool _inode_disk(int rval) {
3996 results->inode.checked = true;
3997 results->inode.ondisk_read_retval = rval;
3998 results->inode.ondisk_value = shadow_in->inode;
3999 results->inode.memory_value = in->inode;
4000
94b18763
FG
4001 mempool_inode& si = shadow_in->inode;
4002 mempool_inode& i = in->inode;
7c673cae
FG
4003 if (si.version > i.version) {
4004 // uh, what?
4005 results->inode.error_str << "On-disk inode is newer than in-memory one!";
4006 goto next;
4007 } else {
4008 bool divergent = false;
4009 int r = i.compare(si, &divergent);
4010 results->inode.passed = !divergent && r >= 0;
4011 if (!results->inode.passed) {
4012 results->inode.error_str <<
4013 "On-disk inode is divergent or newer than in-memory one!";
4014 goto next;
4015 }
4016 }
4017next:
4018 return check_dirfrag_rstats();
4019 }
4020
4021 bool check_dirfrag_rstats() {
4022 MDSGatherBuilder gather(g_ceph_context);
4023 std::list<frag_t> frags;
4024 in->dirfragtree.get_leaves(frags);
4025 for (list<frag_t>::iterator p = frags.begin();
4026 p != frags.end();
4027 ++p) {
4028 CDir *dir = in->get_or_open_dirfrag(in->mdcache, *p);
4029 dir->scrub_info();
4030 if (!dir->scrub_infop->header)
4031 dir->scrub_infop->header = in->scrub_infop->header;
4032 if (dir->is_complete()) {
4033 dir->scrub_local();
4034 } else {
4035 dir->scrub_infop->need_scrub_local = true;
4036 dir->fetch(gather.new_sub(), false);
4037 }
4038 }
4039 if (gather.has_subs()) {
4040 gather.set_finisher(get_internal_callback(DIRFRAGS));
4041 gather.activate();
4042 return false;
4043 } else {
4044 return immediate(DIRFRAGS, 0);
4045 }
4046 }
4047
4048 bool _dirfrags(int rval) {
4049 int frags_errors = 0;
4050 // basic reporting setup
4051 results->raw_stats.checked = true;
4052 results->raw_stats.ondisk_read_retval = rval;
4053
4054 results->raw_stats.memory_value.dirstat = in->inode.dirstat;
4055 results->raw_stats.memory_value.rstat = in->inode.rstat;
4056 frag_info_t& dir_info = results->raw_stats.ondisk_value.dirstat;
4057 nest_info_t& nest_info = results->raw_stats.ondisk_value.rstat;
4058
4059 if (rval != 0) {
4060 results->raw_stats.error_str << "Failed to read dirfrags off disk";
4061 goto next;
4062 }
4063
4064 // check each dirfrag...
94b18763
FG
4065 for (const auto &p : in->dirfrags) {
4066 CDir *dir = p.second;
7c673cae
FG
4067 assert(dir->get_version() > 0);
4068 nest_info.add(dir->fnode.accounted_rstat);
4069 dir_info.add(dir->fnode.accounted_fragstat);
4070 if (dir->scrub_infop &&
4071 dir->scrub_infop->pending_scrub_error) {
4072 dir->scrub_infop->pending_scrub_error = false;
4073 if (dir->scrub_infop->header->get_repair()) {
b32b8144 4074 results->raw_stats.repaired = true;
7c673cae 4075 results->raw_stats.error_str
94b18763 4076 << "dirfrag(" << p.first << ") has bad stats (will be fixed); ";
7c673cae
FG
4077 } else {
4078 results->raw_stats.error_str
94b18763 4079 << "dirfrag(" << p.first << ") has bad stats; ";
7c673cae
FG
4080 }
4081 frags_errors++;
4082 }
4083 }
4084 nest_info.rsubdirs++; // it gets one to account for self
4085 // ...and that their sum matches our inode settings
4086 if (!dir_info.same_sums(in->inode.dirstat) ||
4087 !nest_info.same_sums(in->inode.rstat)) {
4088 if (in->scrub_infop &&
4089 in->scrub_infop->header->get_repair()) {
4090 results->raw_stats.error_str
4091 << "freshly-calculated rstats don't match existing ones (will be fixed)";
4092 in->mdcache->repair_inode_stats(in);
b32b8144 4093 results->raw_stats.repaired = true;
7c673cae
FG
4094 } else {
4095 results->raw_stats.error_str
4096 << "freshly-calculated rstats don't match existing ones";
4097 }
4098 goto next;
4099 }
4100 if (frags_errors > 0)
4101 goto next;
4102
4103 results->raw_stats.passed = true;
4104next:
4105 return true;
4106 }
4107
4108 void _done() override {
4109 if ((!results->raw_stats.checked || results->raw_stats.passed) &&
4110 (!results->backtrace.checked || results->backtrace.passed) &&
4111 (!results->inode.checked || results->inode.passed))
4112 results->passed_validation = true;
4113 if (fin) {
4114 fin->complete(get_rval());
4115 }
4116 }
4117 };
4118
4119
4120 dout(10) << "scrub starting validate_disk_state on " << *this << dendl;
4121 ValidationContinuation *vc = new ValidationContinuation(this,
4122 results,
4123 fin);
4124 vc->begin();
4125}
4126
4127void CInode::validated_data::dump(Formatter *f) const
4128{
4129 f->open_object_section("results");
4130 {
4131 f->dump_bool("performed_validation", performed_validation);
4132 f->dump_bool("passed_validation", passed_validation);
4133 f->open_object_section("backtrace");
4134 {
4135 f->dump_bool("checked", backtrace.checked);
4136 f->dump_bool("passed", backtrace.passed);
4137 f->dump_int("read_ret_val", backtrace.ondisk_read_retval);
4138 f->dump_stream("ondisk_value") << backtrace.ondisk_value;
4139 f->dump_stream("memoryvalue") << backtrace.memory_value;
4140 f->dump_string("error_str", backtrace.error_str.str());
4141 }
4142 f->close_section(); // backtrace
4143 f->open_object_section("raw_stats");
4144 {
4145 f->dump_bool("checked", raw_stats.checked);
4146 f->dump_bool("passed", raw_stats.passed);
4147 f->dump_int("read_ret_val", raw_stats.ondisk_read_retval);
4148 f->dump_stream("ondisk_value.dirstat") << raw_stats.ondisk_value.dirstat;
4149 f->dump_stream("ondisk_value.rstat") << raw_stats.ondisk_value.rstat;
4150 f->dump_stream("memory_value.dirrstat") << raw_stats.memory_value.dirstat;
4151 f->dump_stream("memory_value.rstat") << raw_stats.memory_value.rstat;
4152 f->dump_string("error_str", raw_stats.error_str.str());
4153 }
4154 f->close_section(); // raw_stats
4155 // dump failure return code
4156 int rc = 0;
4157 if (backtrace.checked && backtrace.ondisk_read_retval)
4158 rc = backtrace.ondisk_read_retval;
4159 if (inode.checked && inode.ondisk_read_retval)
4160 rc = inode.ondisk_read_retval;
4161 if (raw_stats.checked && raw_stats.ondisk_read_retval)
4162 rc = raw_stats.ondisk_read_retval;
4163 f->dump_int("return_code", rc);
4164 }
4165 f->close_section(); // results
4166}
4167
b32b8144
FG
4168bool CInode::validated_data::all_damage_repaired() const
4169{
4170 bool unrepaired =
4171 (raw_stats.checked && !raw_stats.passed && !raw_stats.repaired)
4172 ||
4173 (backtrace.checked && !backtrace.passed && !backtrace.repaired)
4174 ||
4175 (inode.checked && !inode.passed && !inode.repaired);
4176
4177 return !unrepaired;
4178}
4179
7c673cae
FG
4180void CInode::dump(Formatter *f) const
4181{
4182 InodeStoreBase::dump(f);
4183
4184 MDSCacheObject::dump(f);
4185
4186 f->open_object_section("versionlock");
4187 versionlock.dump(f);
4188 f->close_section();
4189
4190 f->open_object_section("authlock");
4191 authlock.dump(f);
4192 f->close_section();
4193
4194 f->open_object_section("linklock");
4195 linklock.dump(f);
4196 f->close_section();
4197
4198 f->open_object_section("dirfragtreelock");
4199 dirfragtreelock.dump(f);
4200 f->close_section();
4201
4202 f->open_object_section("filelock");
4203 filelock.dump(f);
4204 f->close_section();
4205
4206 f->open_object_section("xattrlock");
4207 xattrlock.dump(f);
4208 f->close_section();
4209
4210 f->open_object_section("snaplock");
4211 snaplock.dump(f);
4212 f->close_section();
4213
4214 f->open_object_section("nestlock");
4215 nestlock.dump(f);
4216 f->close_section();
4217
4218 f->open_object_section("flocklock");
4219 flocklock.dump(f);
4220 f->close_section();
4221
4222 f->open_object_section("policylock");
4223 policylock.dump(f);
4224 f->close_section();
4225
4226 f->open_array_section("states");
4227 MDSCacheObject::dump_states(f);
4228 if (state_test(STATE_EXPORTING))
4229 f->dump_string("state", "exporting");
4230 if (state_test(STATE_OPENINGDIR))
4231 f->dump_string("state", "openingdir");
4232 if (state_test(STATE_FREEZING))
4233 f->dump_string("state", "freezing");
4234 if (state_test(STATE_FROZEN))
4235 f->dump_string("state", "frozen");
4236 if (state_test(STATE_AMBIGUOUSAUTH))
4237 f->dump_string("state", "ambiguousauth");
4238 if (state_test(STATE_EXPORTINGCAPS))
4239 f->dump_string("state", "exportingcaps");
4240 if (state_test(STATE_NEEDSRECOVER))
4241 f->dump_string("state", "needsrecover");
4242 if (state_test(STATE_PURGING))
4243 f->dump_string("state", "purging");
4244 if (state_test(STATE_DIRTYPARENT))
4245 f->dump_string("state", "dirtyparent");
4246 if (state_test(STATE_DIRTYRSTAT))
4247 f->dump_string("state", "dirtyrstat");
4248 if (state_test(STATE_STRAYPINNED))
4249 f->dump_string("state", "straypinned");
4250 if (state_test(STATE_FROZENAUTHPIN))
4251 f->dump_string("state", "frozenauthpin");
4252 if (state_test(STATE_DIRTYPOOL))
4253 f->dump_string("state", "dirtypool");
4254 if (state_test(STATE_ORPHAN))
4255 f->dump_string("state", "orphan");
4256 if (state_test(STATE_MISSINGOBJS))
4257 f->dump_string("state", "missingobjs");
4258 f->close_section();
4259
4260 f->open_array_section("client_caps");
4261 for (map<client_t,Capability*>::const_iterator it = client_caps.begin();
4262 it != client_caps.end(); ++it) {
4263 f->open_object_section("client_cap");
4264 f->dump_int("client_id", it->first.v);
4265 f->dump_string("pending", ccap_string(it->second->pending()));
4266 f->dump_string("issued", ccap_string(it->second->issued()));
4267 f->dump_string("wanted", ccap_string(it->second->wanted()));
b32b8144 4268 f->dump_int("last_sent", it->second->get_last_sent());
7c673cae
FG
4269 f->close_section();
4270 }
4271 f->close_section();
4272
4273 f->dump_int("loner", loner_cap.v);
4274 f->dump_int("want_loner", want_loner_cap.v);
4275
4276 f->open_array_section("mds_caps_wanted");
94b18763 4277 for (const auto &p : mds_caps_wanted) {
7c673cae 4278 f->open_object_section("mds_cap_wanted");
94b18763
FG
4279 f->dump_int("rank", p.first);
4280 f->dump_string("cap", ccap_string(p.second));
7c673cae
FG
4281 f->close_section();
4282 }
4283 f->close_section();
4284}
4285
4286/****** Scrub Stuff *****/
4287void CInode::scrub_info_create() const
4288{
4289 dout(25) << __func__ << dendl;
4290 assert(!scrub_infop);
4291
4292 // break out of const-land to set up implicit initial state
4293 CInode *me = const_cast<CInode*>(this);
94b18763 4294 mempool_inode *in = me->get_projected_inode();
7c673cae
FG
4295
4296 scrub_info_t *si = new scrub_info_t();
4297 si->scrub_start_stamp = si->last_scrub_stamp = in->last_scrub_stamp;
4298 si->scrub_start_version = si->last_scrub_version = in->last_scrub_version;
4299
4300 me->scrub_infop = si;
4301}
4302
4303void CInode::scrub_maybe_delete_info()
4304{
4305 if (scrub_infop &&
4306 !scrub_infop->scrub_in_progress &&
4307 !scrub_infop->last_scrub_dirty) {
4308 delete scrub_infop;
4309 scrub_infop = NULL;
4310 }
4311}
4312
4313void CInode::scrub_initialize(CDentry *scrub_parent,
b32b8144 4314 ScrubHeaderRef& header,
7c673cae
FG
4315 MDSInternalContextBase *f)
4316{
4317 dout(20) << __func__ << " with scrub_version " << get_version() << dendl;
94b18763
FG
4318 if (scrub_is_in_progress()) {
4319 dout(20) << __func__ << " inode moved during scrub, reinitializing "
4320 << dendl;
4321 assert(scrub_infop->scrub_parent);
4322 CDentry *dn = scrub_infop->scrub_parent;
4323 CDir *dir = dn->dir;
4324 dn->put(CDentry::PIN_SCRUBPARENT);
4325 assert(dir->scrub_infop && dir->scrub_infop->directory_scrubbing);
4326 dir->scrub_infop->directories_scrubbing.erase(dn->key());
4327 dir->scrub_infop->others_scrubbing.erase(dn->key());
4328 }
7c673cae
FG
4329 scrub_info();
4330 if (!scrub_infop)
4331 scrub_infop = new scrub_info_t();
4332
4333 if (get_projected_inode()->is_dir()) {
4334 // fill in dirfrag_stamps with initial state
4335 std::list<frag_t> frags;
4336 dirfragtree.get_leaves(frags);
4337 for (std::list<frag_t>::iterator i = frags.begin();
4338 i != frags.end();
4339 ++i) {
4340 if (header->get_force())
4341 scrub_infop->dirfrag_stamps[*i].reset();
4342 else
4343 scrub_infop->dirfrag_stamps[*i];
4344 }
4345 }
4346
4347 if (scrub_parent)
4348 scrub_parent->get(CDentry::PIN_SCRUBPARENT);
4349 scrub_infop->scrub_parent = scrub_parent;
4350 scrub_infop->on_finish = f;
4351 scrub_infop->scrub_in_progress = true;
4352 scrub_infop->children_scrubbed = false;
4353 scrub_infop->header = header;
4354
4355 scrub_infop->scrub_start_version = get_version();
4356 scrub_infop->scrub_start_stamp = ceph_clock_now();
4357 // right now we don't handle remote inodes
4358}
4359
4360int CInode::scrub_dirfrag_next(frag_t* out_dirfrag)
4361{
4362 dout(20) << __func__ << dendl;
4363 assert(scrub_is_in_progress());
4364
4365 if (!is_dir()) {
4366 return -ENOTDIR;
4367 }
4368
4369 std::map<frag_t, scrub_stamp_info_t>::iterator i =
4370 scrub_infop->dirfrag_stamps.begin();
4371
4372 while (i != scrub_infop->dirfrag_stamps.end()) {
4373 if (i->second.scrub_start_version < scrub_infop->scrub_start_version) {
4374 i->second.scrub_start_version = get_projected_version();
4375 i->second.scrub_start_stamp = ceph_clock_now();
4376 *out_dirfrag = i->first;
4377 dout(20) << " return frag " << *out_dirfrag << dendl;
4378 return 0;
4379 }
4380 ++i;
4381 }
4382
4383 dout(20) << " no frags left, ENOENT " << dendl;
4384 return ENOENT;
4385}
4386
4387void CInode::scrub_dirfrags_scrubbing(list<frag_t>* out_dirfrags)
4388{
4389 assert(out_dirfrags != NULL);
4390 assert(scrub_infop != NULL);
4391
4392 out_dirfrags->clear();
4393 std::map<frag_t, scrub_stamp_info_t>::iterator i =
4394 scrub_infop->dirfrag_stamps.begin();
4395
4396 while (i != scrub_infop->dirfrag_stamps.end()) {
4397 if (i->second.scrub_start_version >= scrub_infop->scrub_start_version) {
4398 if (i->second.last_scrub_version < scrub_infop->scrub_start_version)
4399 out_dirfrags->push_back(i->first);
4400 } else {
4401 return;
4402 }
4403
4404 ++i;
4405 }
4406}
4407
4408void CInode::scrub_dirfrag_finished(frag_t dirfrag)
4409{
4410 dout(20) << __func__ << " on frag " << dirfrag << dendl;
4411 assert(scrub_is_in_progress());
4412
4413 std::map<frag_t, scrub_stamp_info_t>::iterator i =
4414 scrub_infop->dirfrag_stamps.find(dirfrag);
4415 assert(i != scrub_infop->dirfrag_stamps.end());
4416
4417 scrub_stamp_info_t &si = i->second;
4418 si.last_scrub_stamp = si.scrub_start_stamp;
4419 si.last_scrub_version = si.scrub_start_version;
4420}
4421
4422void CInode::scrub_finished(MDSInternalContextBase **c) {
4423 dout(20) << __func__ << dendl;
4424 assert(scrub_is_in_progress());
4425 for (std::map<frag_t, scrub_stamp_info_t>::iterator i =
4426 scrub_infop->dirfrag_stamps.begin();
4427 i != scrub_infop->dirfrag_stamps.end();
4428 ++i) {
4429 if(i->second.last_scrub_version != i->second.scrub_start_version) {
4430 derr << i->second.last_scrub_version << " != "
4431 << i->second.scrub_start_version << dendl;
4432 }
4433 assert(i->second.last_scrub_version == i->second.scrub_start_version);
4434 }
4435
4436 scrub_infop->last_scrub_version = scrub_infop->scrub_start_version;
4437 scrub_infop->last_scrub_stamp = scrub_infop->scrub_start_stamp;
4438 scrub_infop->last_scrub_dirty = true;
4439 scrub_infop->scrub_in_progress = false;
4440
4441 if (scrub_infop->scrub_parent) {
4442 CDentry *dn = scrub_infop->scrub_parent;
4443 scrub_infop->scrub_parent = NULL;
4444 dn->dir->scrub_dentry_finished(dn);
4445 dn->put(CDentry::PIN_SCRUBPARENT);
4446 }
4447
4448 *c = scrub_infop->on_finish;
4449 scrub_infop->on_finish = NULL;
4450
4451 if (scrub_infop->header->get_origin() == this) {
4452 // We are at the point that a tagging scrub was initiated
4453 LogChannelRef clog = mdcache->mds->clog;
b32b8144
FG
4454 if (scrub_infop->header->get_tag().empty()) {
4455 clog->info() << "scrub complete";
4456 } else {
4457 clog->info() << "scrub complete with tag '"
4458 << scrub_infop->header->get_tag() << "'";
4459 }
7c673cae
FG
4460 }
4461}
4462
4463int64_t CInode::get_backtrace_pool() const
4464{
4465 if (is_dir()) {
4466 return mdcache->mds->mdsmap->get_metadata_pool();
4467 } else {
4468 // Files are required to have an explicit layout that specifies
4469 // a pool
4470 assert(inode.layout.pool_id != -1);
4471 return inode.layout.pool_id;
4472 }
4473}
4474
31f18b77
FG
4475void CInode::maybe_export_pin(bool update)
4476{
4477 if (!g_conf->mds_bal_export_pin)
4478 return;
4479 if (!is_dir() || !is_normal())
4480 return;
7c673cae 4481
31f18b77
FG
4482 mds_rank_t export_pin = get_export_pin(false);
4483 if (export_pin == MDS_RANK_NONE && !update)
4484 return;
7c673cae 4485
31f18b77
FG
4486 if (state_test(CInode::STATE_QUEUEDEXPORTPIN))
4487 return;
4488
4489 bool queue = false;
4490 for (auto p = dirfrags.begin(); p != dirfrags.end(); p++) {
4491 CDir *dir = p->second;
4492 if (!dir->is_auth())
4493 continue;
4494 if (export_pin != MDS_RANK_NONE) {
4495 if (dir->is_subtree_root()) {
4496 // set auxsubtree bit or export it
4497 if (!dir->state_test(CDir::STATE_AUXSUBTREE) ||
4498 export_pin != dir->get_dir_auth().first)
4499 queue = true;
4500 } else {
4501 // create aux subtree or export it
4502 queue = true;
7c673cae 4503 }
31f18b77
FG
4504 } else {
4505 // clear aux subtrees ?
4506 queue = dir->state_test(CDir::STATE_AUXSUBTREE);
4507 }
4508 if (queue) {
4509 state_set(CInode::STATE_QUEUEDEXPORTPIN);
7c673cae 4510 mdcache->export_pin_queue.insert(this);
31f18b77 4511 break;
7c673cae
FG
4512 }
4513 }
4514}
4515
4516void CInode::set_export_pin(mds_rank_t rank)
4517{
4518 assert(is_dir());
4519 assert(is_projected());
4520 get_projected_inode()->export_pin = rank;
31f18b77 4521 maybe_export_pin(true);
7c673cae
FG
4522}
4523
4524mds_rank_t CInode::get_export_pin(bool inherit) const
4525{
4526 /* An inode that is export pinned may not necessarily be a subtree root, we
4527 * need to traverse the parents. A base or system inode cannot be pinned.
4528 * N.B. inodes not yet linked into a dir (i.e. anonymous inodes) will not
4529 * have a parent yet.
4530 */
b32b8144
FG
4531 const CInode *in = this;
4532 while (true) {
4533 if (in->is_system())
4534 break;
4535 const CDentry *pdn = in->get_projected_parent_dn();
4536 if (!pdn)
4537 break;
94b18763 4538 const mempool_inode *pi = in->get_projected_inode();
b32b8144
FG
4539 // ignore export pin for unlinked directory
4540 if (pi->nlink == 0)
4541 break;
4542 if (pi->export_pin >= 0)
4543 return pi->export_pin;
4544
4545 if (!inherit)
4546 break;
4547 in = pdn->get_dir()->inode;
7c673cae
FG
4548 }
4549 return MDS_RANK_NONE;
4550}
4551
4552bool CInode::is_exportable(mds_rank_t dest) const
4553{
4554 mds_rank_t pin = get_export_pin();
4555 if (pin == dest) {
4556 return true;
4557 } else if (pin >= 0) {
4558 return false;
4559 } else {
4560 return true;
4561 }
4562}
181888fb
FG
4563
4564MEMPOOL_DEFINE_OBJECT_FACTORY(CInode, co_inode, mds_co);