[Bugs] [Bug 1158628] [FEAT] Add GF_FOP_IPC for inter-translator communication

bugzilla at redhat.com bugzilla at redhat.com
Tue Mar 17 14:02:25 UTC 2015


https://bugzilla.redhat.com/show_bug.cgi?id=1158628



--- Comment #6 from Anand Avati <aavati at redhat.com> ---
COMMIT: http://review.gluster.org/8812 committed in master by Vijay Bellur
(vbellur at redhat.com) 
------
commit 0d2bed70faed3c63f25ed9269dc55562973ef9b7
Author: Jeff Darcy <jdarcy at redhat.com>
Date:   Tue Mar 10 20:14:47 2015 -0400

    every/where: add GF_FOP_IPC for inter-translator communication

    Several features - e.g. encryption, erasure codes, or NSR - involve
    multiple cooperating translators which sometimes need a "private" means
    of communication amongst themselves.  Historically we've used virtual or
    synthetic xattrs, but that's not very elegant and clutters up the
    getxattr/setxattr path which must also handle real xattr requests.  This
    new fop should address that.

    The only argument is an int32_t "op" which should be recognized by the
    target translator.  It is recommended that translators using these
    feature follow some convention regarding the ops that they define, to
    avoid conflicts.  Using a hash of the target translator's type string as
    a base for a series of ops would probably be a good start.  Any other
    information can be passed in both directions using xdata.

    The default behavior for this fop, as with any other, is to pass through
    to FIRST_CHILD.  That makes use of this fop "transparent" to other
    translators that were written before it existed, but it also means that
    it only really works with pass-through translators.  If a routing
    translator (such as DHT) or a fan-out translator (such as AFR) is
    involved, the IPC might not reach its intended destination unless those
    translators are modified to forward IPC fops along all paths.

    If an IPC gets all the way to storage/posix it is considered an error,
    much like an uncaught exception.  We don't actually *do* anything in
    that case, but we do log it send back an EOPNOTSUPP error.  This makes
    the "unrecognized opcode" condition distinguishable from the "no IPC
    support" condition (which would yield an RPC error instead) so clients
    can probe for the presence of a handler for their own favorite opcode
    and either use that or use old-school xattrs depending on the result.

    BUG: 1158628
    Signed-off-by: Venky Shankar <vshankar at redhat.com>
    Signed-off-by: Jeff Darcy <jdarcy at redhat.com>
    Change-Id: I84af1b17babe5b30ec03ecf027ae37d09b873968
    Reviewed-on: http://review.gluster.org/8812
    Reviewed-by: Vijay Bellur <vbellur at redhat.com>

-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=z3ZUCyg07t&a=cc_unsubscribe


More information about the Bugs mailing list