Lines Matching refs:cap

28  * If the client holds a *_SHARED cap, the client has a coherent value
52 * Generate readable cap strings for debugging output.
135 struct ceph_cap *cap;
139 cap = list_first_entry(&mdsc->caps_list,
141 list_del(&cap->caps_item);
142 kmem_cache_free(ceph_cap_cachep, cap);
168 struct ceph_cap *cap;
178 cap = list_first_entry(&mdsc->caps_list,
180 list_del(&cap->caps_item);
181 kmem_cache_free(ceph_cap_cachep, cap);
204 struct ceph_cap *cap;
229 cap = kmem_cache_alloc(ceph_cap_cachep, GFP_NOFS);
230 if (cap) {
231 list_add(&cap->caps_item, &newcaps);
329 struct ceph_cap *cap = NULL;
331 /* temporary, until we do something about cap import/export */
333 cap = kmem_cache_alloc(ceph_cap_cachep, GFP_NOFS);
334 if (cap) {
346 cap = list_first_entry(&mdsc->caps_list,
348 list_del(&cap->caps_item);
356 return cap;
372 cap = list_first_entry(&mdsc->caps_list, struct ceph_cap, caps_item);
373 list_del(&cap->caps_item);
378 return cap;
381 void ceph_put_cap(struct ceph_mds_client *mdsc, struct ceph_cap *cap)
385 cap, mdsc->caps_total_count, mdsc->caps_use_count,
395 kmem_cache_free(ceph_cap_cachep, cap);
398 list_add(&cap->caps_item, &mdsc->caps_list);
435 struct ceph_cap *cap;
439 cap = rb_entry(n, struct ceph_cap, ci_node);
440 if (mds < cap->mds)
442 else if (mds > cap->mds)
445 return cap;
452 struct ceph_cap *cap;
455 cap = __get_cap_for_mds(ci, mds);
457 return cap;
468 struct ceph_cap *cap = NULL;
472 cap = rb_entry(parent, struct ceph_cap, ci_node);
473 if (new->mds < cap->mds)
475 else if (new->mds > cap->mds)
486 * (re)set cap hold timeouts, which control the delayed release
487 * of unused caps back to the MDS. Should be called on cap use.
500 * (Re)queue cap at the end of the delayed cap release list.
528 * indicating we should send a cap message to flush dirty metadata
529 * asap, and move to the front of the delayed cap list.
544 * Cancel delayed work on cap.
560 static void __check_cap_issue(struct ceph_inode_info *ci, struct ceph_cap *cap,
579 * know what happened to this directory while we didn't have the cap.
627 * it is < 0. (This is so we can atomically add the cap and add an
638 struct ceph_cap *cap;
645 dout("add_cap %p mds%d cap %llx %s seq %d\n", inode,
652 cap = __get_cap_for_mds(ci, mds);
653 if (!cap) {
654 cap = *new_cap;
657 cap->issued = 0;
658 cap->implemented = 0;
659 cap->mds = mds;
660 cap->mds_wanted = 0;
661 cap->mseq = 0;
663 cap->ci = ci;
664 __insert_cap_node(ci, cap);
666 /* add to session cap list */
667 cap->session = session;
669 list_add_tail(&cap->session_caps, &session->s_caps);
675 list_move_tail(&cap->session_caps, &session->s_caps);
678 if (cap->cap_gen < gen)
679 cap->issued = cap->implemented = CEPH_CAP_PIN;
682 * auth mds of the inode changed. we received the cap export
683 * message, but still haven't received the cap import message.
684 * handle_cap_export() updated the new auth MDS' cap.
686 * "ceph_seq_cmp(seq, cap->seq) <= 0" means we are processing
687 * a message that was send before the cap import message. So
690 if (ceph_seq_cmp(seq, cap->seq) <= 0) {
691 WARN_ON(cap != ci->i_auth_cap);
692 WARN_ON(cap->cap_id != cap_id);
693 seq = cap->seq;
694 mseq = cap->mseq;
695 issued |= cap->issued;
733 __check_cap_issue(ci, cap, issued);
753 ci->i_auth_cap->session != cap->session)
754 change_auth_cap_ses(ci, cap->session);
755 ci->i_auth_cap = cap;
756 cap->mds_wanted = wanted;
759 WARN_ON(ci->i_auth_cap == cap);
762 dout("add_cap inode %p (%llx.%llx) cap %p %s now %s seq %d mds%d\n",
763 inode, ceph_vinop(inode), cap, ceph_cap_string(issued),
764 ceph_cap_string(issued|cap->issued), seq, mds);
765 cap->cap_id = cap_id;
766 cap->issued = issued;
767 cap->implemented |= issued;
768 if (ceph_seq_cmp(mseq, cap->mseq) > 0)
769 cap->mds_wanted = wanted;
771 cap->mds_wanted |= wanted;
772 cap->seq = seq;
773 cap->issue_seq = seq;
774 cap->mseq = mseq;
775 cap->cap_gen = gen;
779 * Return true if cap has not timed out and belongs to the current
783 static int __cap_is_valid(struct ceph_cap *cap)
788 spin_lock(&cap->session->s_gen_ttl_lock);
789 gen = cap->session->s_cap_gen;
790 ttl = cap->session->s_cap_ttl;
791 spin_unlock(&cap->session->s_gen_ttl_lock);
793 if (cap->cap_gen < gen || time_after_eq(jiffies, ttl)) {
794 dout("__cap_is_valid %p cap %p issued %s "
795 "but STALE (gen %u vs %u)\n", &cap->ci->vfs_inode,
796 cap, ceph_cap_string(cap->issued), cap->cap_gen, gen);
804 * Return set of valid cap bits issued to us. Note that caps time
811 struct ceph_cap *cap;
817 cap = rb_entry(p, struct ceph_cap, ci_node);
818 if (!__cap_is_valid(cap))
820 dout("__ceph_caps_issued %p cap %p issued %s\n",
821 &ci->vfs_inode, cap, ceph_cap_string(cap->issued));
822 have |= cap->issued;
824 *implemented |= cap->implemented;
832 cap = ci->i_auth_cap;
833 have &= ~cap->implemented | cap->issued;
839 * Get cap bits issued by caps other than @ocap
844 struct ceph_cap *cap;
848 cap = rb_entry(p, struct ceph_cap, ci_node);
849 if (cap == ocap)
851 if (!__cap_is_valid(cap))
853 have |= cap->issued;
859 * Move a cap to the end of the LRU (oldest caps at list head, newest
862 static void __touch_cap(struct ceph_cap *cap)
864 struct ceph_mds_session *s = cap->session;
868 dout("__touch_cap %p cap %p mds%d\n", &cap->ci->vfs_inode, cap,
870 list_move_tail(&cap->session_caps, &s->s_caps);
872 dout("__touch_cap %p cap %p mds%d NOP, iterating over caps\n",
873 &cap->ci->vfs_inode, cap, s->s_mds);
879 * Check if we hold the given mask. If so, move the cap(s) to the
885 struct ceph_cap *cap;
898 cap = rb_entry(p, struct ceph_cap, ci_node);
899 if (!__cap_is_valid(cap))
901 if ((cap->issued & mask) == mask) {
902 dout("__ceph_caps_issued_mask ino 0x%llx cap %p issued %s"
903 " (mask %s)\n", ceph_ino(&ci->vfs_inode), cap,
904 ceph_cap_string(cap->issued),
907 __touch_cap(cap);
912 have |= cap->issued;
916 ceph_cap_string(cap->issued),
922 __touch_cap(cap);
925 cap = rb_entry(q, struct ceph_cap,
927 if (!__cap_is_valid(cap))
929 if (cap->issued & mask)
930 __touch_cap(cap);
960 struct ceph_cap *cap;
964 cap = rb_entry(p, struct ceph_cap, ci_node);
965 if (cap != ocap &&
966 (cap->implemented & ~cap->issued & mask))
1069 * wanted, by virtue of open file modes AND cap refs (buffered/cached data)
1091 struct ceph_cap *cap;
1096 cap = rb_entry(p, struct ceph_cap, ci_node);
1097 if (check && !__cap_is_valid(cap))
1099 if (cap == ci->i_auth_cap)
1100 mds_wanted |= cap->mds_wanted;
1102 mds_wanted |= (cap->mds_wanted & ~CEPH_CAP_ANY_FILE_WR);
1134 * Remove a cap. Take steps to deal with a racing iterate_session_caps.
1139 void __ceph_remove_cap(struct ceph_cap *cap, bool queue_release)
1141 struct ceph_mds_session *session = cap->session;
1142 struct ceph_inode_info *ci = cap->ci;
1148 dout("%s: cap inode is NULL\n", __func__);
1152 dout("__ceph_remove_cap %p from %p\n", cap, &ci->vfs_inode);
1156 /* remove from inode's cap rbtree, and clear auth cap */
1157 rb_erase(&cap->ci_node, &ci->i_caps);
1158 if (ci->i_auth_cap == cap) {
1165 if (session->s_cap_iterator == cap) {
1166 /* not yet, we are iterating over this very cap */
1168 cap, cap->session);
1170 list_del_init(&cap->session_caps);
1173 cap->session = NULL;
1177 cap->ci = NULL;
1184 (!session->s_cap_reconnect || cap->cap_gen == session->s_cap_gen)) {
1185 cap->queue_release = 1;
1187 __ceph_queue_cap_release(session, cap);
1191 cap->queue_release = 0;
1193 cap->cap_ino = ci->i_vino.ino;
1198 ceph_put_cap(mdsc, cap);
1232 * cap struct size + flock buffer size + inline version + inline data size +
1238 /* Marshal up the cap msg to the MDS */
1327 * Queue cap releases when an inode is dropped from our cache.
1338 struct ceph_cap *cap = rb_entry(p, struct ceph_cap, ci_node);
1340 __ceph_remove_cap(cap, true);
1346 * Prepare to send a cap message to an MDS. Update the cap state, and populate
1348 * be done under the i_ceph_lock to guard against changes to cap state.
1353 static void __prep_cap(struct cap_msg_args *arg, struct ceph_cap *cap,
1357 struct ceph_inode_info *ci = cap->ci;
1363 held = cap->issued | cap->implemented;
1364 revoking = cap->implemented & ~cap->issued;
1367 dout("%s %p cap %p session %p %s -> %s (revoking %s)\n",
1368 __func__, inode, cap, cap->session,
1375 cap->issued &= retain; /* drop bits we don't want */
1381 arg->wake = cap->implemented & ~cap->issued;
1382 cap->implemented &= cap->issued | used;
1383 cap->mds_wanted = want;
1385 arg->session = cap->session;
1387 arg->cid = cap->cap_id;
1395 if (cap == ci->i_auth_cap) {
1418 arg->caps = cap->implemented;
1422 arg->seq = cap->seq;
1423 arg->issue_seq = cap->issue_seq;
1424 arg->mseq = cap->mseq;
1448 * Send a cap msg on the given inode.
1459 pr_err("error allocating cap msg: ino (%llx.%llx) flushing %s tid %llu, requeuing cap.\n",
1592 struct ceph_cap *cap = ci->i_auth_cap;
1596 if (!(cap && cap->session == session)) {
1597 dout("__flush_snaps %p auth cap %p not mds%d, "
1598 "stop\n", inode, cap, session->s_mds);
1621 ret = __send_flush_snap(inode, session, capsnap, cap->mseq,
1624 pr_err("__flush_snaps: error sending cap flushsnap, "
1653 dout(" no auth cap (migrating?), doing nothing\n");
1719 "but no auth cap (session was closed?)\n",
1739 dout(" inode %p now dirty snapc %p auth cap %p\n",
1790 * Remove cap_flush from the mdsc's or inode's flushing cap list.
1921 * CHECK_CAPS_AUTHONLY - we should only check the auth cap
1930 struct ceph_cap *cap;
1976 * the exclusive cap. So that MDS does not end up
1977 * revoking the shared cap on every create/unlink
2035 cap = rb_entry(p, struct ceph_cap, ci_node);
2038 if (mds >= cap->mds ||
2039 ((flags & CHECK_CAPS_AUTHONLY) && cap != ci->i_auth_cap))
2045 * If we have an auth cap, we don't need to consider any
2049 if (ci->i_auth_cap && cap != ci->i_auth_cap)
2052 revoking = cap->implemented & ~cap->issued;
2053 dout(" mds%d cap %p used %s issued %s implemented %s revoking %s\n",
2054 cap->mds, cap, ceph_cap_string(cap_used),
2055 ceph_cap_string(cap->issued),
2056 ceph_cap_string(cap->implemented),
2059 if (cap == ci->i_auth_cap &&
2060 (cap->issued & CEPH_CAP_FILE_WR)) {
2075 if (cap == ci->i_auth_cap) {
2089 ceph_cap_string(cap->implemented & ~cap->issued));
2094 if (want & ~cap->mds_wanted) {
2095 if (want & ~(cap->mds_wanted | cap->issued))
2097 if (!__cap_is_valid(cap))
2102 if ((cap->issued & ~retain) == 0)
2106 if (session && session != cap->session) {
2112 session = cap->session;
2139 * cap message */
2140 if (cap == ci->i_auth_cap &&
2164 if (cap == ci->i_auth_cap && ci->i_dirty_caps) {
2179 mds = cap->mds; /* remember mds, so we don't repeat */
2181 __prep_cap(&arg, cap, CEPH_CAP_OP_UPDATE, mflags, cap_used,
2187 goto retry; /* retake i_ceph_lock and restart our cap scan. */
2224 struct ceph_cap *cap = ci->i_auth_cap;
2227 if (session != cap->session) {
2231 session = cap->session;
2235 if (cap->session->s_state < CEPH_MDS_SESSION_OPEN) {
2253 __prep_cap(&arg, cap, CEPH_CAP_OP_FLUSH, CEPH_CLIENT_CAPS_SYNC,
2255 (cap->issued | cap->implemented),
2501 struct ceph_cap *cap;
2520 cap = ci->i_auth_cap;
2521 if (!(cap && cap->session == session)) {
2522 pr_err("%p auth cap %p not mds%d ???\n",
2523 inode, cap, session->s_mds);
2532 dout("kick_flushing_caps %p cap %p tid %llu %s\n",
2533 inode, cap, cf->tid, ceph_cap_string(cf->caps));
2534 __prep_cap(&arg, cap, CEPH_CAP_OP_FLUSH,
2539 (cap->issued | cap->implemented),
2554 ret = __send_flush_snap(inode, session, capsnap, cap->mseq,
2558 "cap flushsnap, ino (%llx.%llx) "
2575 struct ceph_cap *cap;
2586 cap = ci->i_auth_cap;
2587 if (!(cap && cap->session == session)) {
2588 pr_err("%p auth cap %p not mds%d ???\n",
2589 &ci->vfs_inode, cap, session->s_mds);
2596 * if flushing caps were revoked, we re-send the cap flush
2598 * the cap flush message before issuing the flushing caps to
2601 if ((cap->issued & ci->i_flushing_caps) !=
2604 * numbers. make sure sequence numbers in cap flush
2606 cap->seq = 0;
2607 cap->issue_seq = 0;
2608 cap->mseq = 0;
2623 struct ceph_cap *cap;
2636 cap = ci->i_auth_cap;
2637 if (!(cap && cap->session == session)) {
2638 pr_err("%p auth cap %p not mds%d ???\n",
2639 &ci->vfs_inode, cap, session->s_mds);
2655 struct ceph_cap *cap = ci->i_auth_cap;
2666 &cap->session->s_cap_flushing);
2710 * Try to grab cap references. Specify those refs we @want, and the
2942 * Wait for caps, and take cap references. If we can't get a WR cap
3052 * drop cap refs first because getattr while
3081 * Take cap refs. Caller must already know we hold at least one ref
3116 * Release cap refs.
3118 * If we released the last ref on any given cap, call ceph_check_caps
3121 * If we are releasing a WR cap (from a sync write), finalize any affected
3254 * auth cap in the case of a forced unmount.
3346 * Handle a cap GRANT message from the MDS. (Note that a GRANT may
3347 * actually be a revocation if it specifies a smaller cap set.)
3353 struct ceph_cap *cap,
3367 bool was_stale = cap->cap_gen < session->s_cap_gen;
3375 dout("handle_cap_grant inode %p cap %p mds%d seq %d %s\n",
3376 inode, cap, session->s_mds, seq, ceph_cap_string(newcaps));
3387 ((cap->issued & ~newcaps) & CEPH_CAP_FILE_CACHE) &&
3401 cap->issued = cap->implemented = CEPH_CAP_PIN;
3404 * auth mds of the inode changed. we received the cap export message,
3405 * but still haven't received the cap import message. handle_cap_export
3406 * updated the new auth MDS' cap.
3408 * "ceph_seq_cmp(seq, cap->seq) <= 0" means we are processing a message
3409 * that was sent before the cap import message. So don't remove caps.
3411 if (ceph_seq_cmp(seq, cap->seq) <= 0) {
3412 WARN_ON(cap != ci->i_auth_cap);
3413 WARN_ON(cap->cap_id != le64_to_cpu(grant->cap_id));
3414 seq = cap->seq;
3415 newcaps |= cap->issued;
3419 cap->cap_gen = session->s_cap_gen;
3420 cap->seq = seq;
3422 __check_cap_issue(ci, cap, newcaps);
3501 if (ci->i_auth_cap == cap && (newcaps & CEPH_CAP_ANY_FILE_WR)) {
3514 /* check cap bits */
3524 (wanted & ~(cap->mds_wanted | newcaps))) {
3526 * If mds is importing cap, prior cap messages that update
3529 * We don't send cap message to update 'wanted' if what we
3530 * want are already issued. If mds revokes caps, cap message
3539 if (cap->issued & ~newcaps) {
3540 int revoking = cap->issued & ~newcaps;
3543 ceph_cap_string(cap->issued),
3553 else if (cap == ci->i_auth_cap)
3554 check_caps = 1; /* check auth cap only */
3557 cap->issued = newcaps;
3558 cap->implemented |= newcaps;
3559 } else if (cap->issued == newcaps) {
3561 ceph_cap_string(cap->issued), ceph_cap_string(newcaps));
3563 dout("grant: %s -> %s\n", ceph_cap_string(cap->issued),
3566 if (cap == ci->i_auth_cap &&
3567 __ceph_caps_revoking_other(ci, cap, newcaps))
3570 cap->issued = newcaps;
3571 cap->implemented |= newcaps; /* add bits only, to
3576 BUG_ON(cap->issued & ~cap->implemented);
3580 cap->mds_wanted = 0;
3581 if (cap == ci->i_auth_cap)
3582 check_caps = 1; /* check auth cap only */
3596 if (ci->i_auth_cap == cap) {
3650 struct ceph_cap *cap)
3711 dout(" mds%d still flushing cap on %p\n",
3879 * indicated by mseq), make note of the migrating cap bits for the
3890 struct ceph_cap *cap, *tcap, *new_cap = NULL;
3912 cap = __get_cap_for_mds(ci, mds);
3913 if (!cap || cap->cap_id != le64_to_cpu(ex->cap_id))
3917 __ceph_remove_cap(cap, false);
3922 * now we know we haven't received the cap import message yet
3923 * because the exported cap still exist.
3926 issued = cap->issued;
3927 if (issued != cap->implemented)
3931 ceph_vinop(inode), mds, cap->seq, cap->mseq,
3933 ceph_cap_string(cap->implemented));
3941 dout(" updating import cap %p mds%d\n", tcap, target);
3947 if (cap == ci->i_auth_cap) {
3952 __ceph_remove_cap(cap, false);
3956 int flag = (cap == ci->i_auth_cap) ? CEPH_CAP_FLAG_AUTH : 0;
3969 __ceph_remove_cap(cap, false);
4009 * Handle cap IMPORT.
4020 struct ceph_cap *cap, *ocap, *new_cap = NULL;
4043 cap = __get_cap_for_mds(ci, mds);
4044 if (!cap) {
4051 cap = new_cap;
4067 dout(" remove export cap %p mds%d flags %d\n",
4084 *target_cap = cap;
4091 * based on the cap op.
4099 struct ceph_cap *cap;
4216 dout(" mds%d seq %lld cap seq %u\n", session->s_mds, session->s_seq,
4223 cap = ceph_get_cap(mdsc, NULL);
4224 cap->cap_ino = vino.ino;
4225 cap->queue_release = 1;
4226 cap->cap_id = le64_to_cpu(h->cap_id);
4227 cap->mseq = mseq;
4228 cap->seq = seq;
4229 cap->issue_seq = seq;
4231 __ceph_queue_cap_release(session, cap);
4237 /* these will work even if we don't have a cap yet */
4261 &cap, &extra_info.issued);
4262 handle_cap_grant(inode, session, cap,
4269 /* the rest require a cap */
4271 cap = __get_cap_for_mds(ceph_inode(inode), session->s_mds);
4272 if (!cap) {
4273 dout(" no cap on %p ino %llx.%llx from mds%d\n",
4286 handle_cap_grant(inode, session, cap,
4292 h, session, cap);
4304 pr_err("ceph_handle_caps: unknown cap op %d %s\n", op,
4318 * send any cap release message to try to move things
4320 * cap).
4332 * Delayed work handler to process end of delayed cap release LRU list.
4515 * Helpers for embedding cap and dentry lease releases into mds
4526 struct ceph_cap *cap;
4542 cap = __get_cap_for_mds(ci, mds);
4543 if (cap && __cap_is_valid(cap)) {
4544 unless &= cap->issued;
4556 if (force || (cap->issued & drop)) {
4557 if (cap->issued & drop) {
4559 dout("encode_inode_release %p cap %p "
4560 "%s -> %s, wanted %s -> %s\n", inode, cap,
4561 ceph_cap_string(cap->issued),
4562 ceph_cap_string(cap->issued & ~drop),
4563 ceph_cap_string(cap->mds_wanted),
4566 cap->issued &= ~drop;
4567 cap->implemented &= ~drop;
4568 cap->mds_wanted = wanted;
4569 if (cap == ci->i_auth_cap &&
4573 dout("encode_inode_release %p cap %p %s"
4574 " (force)\n", inode, cap,
4575 ceph_cap_string(cap->issued));
4579 rel->cap_id = cpu_to_le64(cap->cap_id);
4580 rel->seq = cpu_to_le32(cap->seq);
4581 rel->issue_seq = cpu_to_le32(cap->issue_seq);
4582 rel->mseq = cpu_to_le32(cap->mseq);
4583 rel->caps = cpu_to_le32(cap->implemented);
4584 rel->wanted = cpu_to_le32(cap->mds_wanted);
4590 dout("encode_inode_release %p cap %p %s (noop)\n",
4591 inode, cap, ceph_cap_string(cap->issued));