Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp3559936ybz; Mon, 20 Apr 2020 05:19:10 -0700 (PDT) X-Google-Smtp-Source: APiQypIWO/nhRonJ/+m6a8RPmUs+2eCSshzSWn0bC8SHY2lh9/zHI2sg5KdieE6+i+4YB+xfiY74 X-Received: by 2002:a17:906:70f:: with SMTP id y15mr16060474ejb.276.1587385150392; Mon, 20 Apr 2020 05:19:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587385150; cv=none; d=google.com; s=arc-20160816; b=WvAyjL4GvXRB8NDMO1Lo2p3cBEX5lbenYt1mnTOfBeyNUbLbZrFqvB5yuIHlFWONnh kJBtSoS3nEnXZDOYGV0qKvBIYbk77fxVQY7L7XXvz7biJh0xvvc/m9jh0GmsN/2s3to9 5vzROXR836xGK7+FQlLaCz5XFRGopDPk0hAC/ej8QTd7NIC6Dn0OyGE//VqDfP6qO8w/ 8Y3PidekXZf83tU/kbWRo6FGQkJmAqm1bEZlAt/1zT4EbmmJgNcewvA6FBVKcyc8UhA5 QTT/W7FQ8SuihqKX9lLq+jl53xuQ54mO8Yea5N1l2mshyiMIYVNISPvKQEwIIFGNxynm YyMw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=WnLr9H0VrXgC1hzxAd+eEQ5D0DB+sLmz7xoWj5EXnGQ=; b=Uq1Emb5Vj3BI1gHgSeZoxvr0RwNmUIV+hca9XX1Nnv8ptuQW3+1iKOvE00i23OJFex KCCIrMYfe1rdOazUc7/UUKst6kWczcBZNq6Bbo0Vd0w8Lwb+ssW29TtiCQXVDMp1fOJ4 2ovjhnCbinJ6ZakuUnOD3OMYMZ59qNGDf502gHEv5bj+79R8Pqiuw0w3eOnqqKRSqG/H ZWA//kGqA3da8eygfH9SsxLW94mB8eRpzl/hmm73wMOJ4x6Pb+sKczAe7/HiZTudBVDN QtEDqlYIlEszkbsczsOFJiNs+d1NmdcmNgMVPOjaN7FG3MxCuPVcvJbQuwPtXgo3o19L 2qTQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gP4Cr4Z5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r27si387349edc.594.2020.04.20.05.18.46; Mon, 20 Apr 2020 05:19:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gP4Cr4Z5; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726988AbgDTMQz (ORCPT + 99 others); Mon, 20 Apr 2020 08:16:55 -0400 Received: from mail.kernel.org ([198.145.29.99]:52274 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726936AbgDTMQr (ORCPT ); Mon, 20 Apr 2020 08:16:47 -0400 Received: from tleilax.poochiereds.net (68-20-15-154.lightspeed.rlghnc.sbcglobal.net [68.20.15.154]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 923C42072B; Mon, 20 Apr 2020 12:16:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1587385007; bh=mVVhiLWYoJYsxwNunGtZw2deVsVqQX5hegxPcF8jXEc=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=gP4Cr4Z5ZHEb4bcJyPTJt5zBQurdyOt5Fiy1sNYvMkyVSghB2nOZcVmkGmRrnurK0 amnRBOLxSY+3m02vnE0K8ToD8XBKtmk4DrTUroEeKN/dsk2KIQm9UVh9+zwnskujS0 zEBMk7tbQCn0dRMbtmjpddQ8WkKjn799bVzeZtJU= Message-ID: Subject: Re: [v3] ceph: if we are blacklisted, __do_request returns directly From: Jeff Layton To: Yanhu Cao Cc: sage@redhat.com, idryomov@gmail.com, ceph-devel@vger.kernel.org, linux-kernel@vger.kernel.org Date: Mon, 20 Apr 2020 08:16:45 -0400 In-Reply-To: <20200417110723.12235-1-gmayyyha@gmail.com> References: <20200417110723.12235-1-gmayyyha@gmail.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.34.4 (3.34.4-1.fc31) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 2020-04-17 at 19:07 +0800, Yanhu Cao wrote: > If we mount cephfs by the recover_session option, > __do_request can return directly until the client automatically reconnects. > > Signed-off-by: Yanhu Cao > --- > fs/ceph/mds_client.c | 6 ++++++ > 1 file changed, 6 insertions(+) > > diff --git a/fs/ceph/mds_client.c b/fs/ceph/mds_client.c > index 486f91f9685b..16ac5e5f7f79 100644 > --- a/fs/ceph/mds_client.c > +++ b/fs/ceph/mds_client.c > @@ -2708,6 +2708,12 @@ static void __do_request(struct ceph_mds_client *mdsc, > > put_request_session(req); > > + if (mdsc->fsc->blacklisted && > + ceph_test_mount_opt(mdsc->fsc, CLEANRECOVER)) { > + err = -EBLACKLISTED; > + goto finish; > + } > + Why check for CLEANRECOVER? If we're mounted with recover_session=no wouldn't we want to do the same thing here? Either way, it's still blacklisted. The only difference is that it won't attempt to automatically recover the session that way. > mds = __choose_mds(mdsc, req, &random); > if (mds < 0 || > ceph_mdsmap_get_state(mdsc->mdsmap, mds) < CEPH_MDS_STATE_ACTIVE) { -- Jeff Layton