-
Notifications
You must be signed in to change notification settings - Fork 555
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cephfs: do not run modprobe
if support is compiled into the kernel
#4378
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -19,6 +19,8 @@ package mounter | |
import ( | ||
"context" | ||
"fmt" | ||
"os" | ||
"strings" | ||
|
||
"github.com/ceph/ceph-csi/internal/cephfs/store" | ||
"github.com/ceph/ceph-csi/internal/util" | ||
|
@@ -27,13 +29,47 @@ import ( | |
const ( | ||
volumeMounterKernel = "kernel" | ||
netDev = "_netdev" | ||
kernelModule = "ceph" | ||
) | ||
|
||
type KernelMounter struct{} | ||
// testErrorf can be set by unit test for enhanced error reporting. | ||
var testErrorf = func(fmt string, args ...any) { /* do nothing */ } | ||
|
||
func mountKernel(ctx context.Context, mountPoint string, cr *util.Credentials, volOptions *store.VolumeOptions) error { | ||
if err := execCommandErr(ctx, "modprobe", "ceph"); err != nil { | ||
return err | ||
type KernelMounter interface { | ||
Mount( | ||
ctx context.Context, | ||
mountPoint string, | ||
cr *util.Credentials, | ||
volOptions *store.VolumeOptions, | ||
) error | ||
|
||
Name() string | ||
} | ||
|
||
type kernelMounter struct { | ||
// needsModprobe indicates that the ceph kernel module is not loaded in | ||
// the kernel yet (or compiled into it) | ||
needsModprobe bool | ||
} | ||
|
||
func NewKernelMounter() KernelMounter { | ||
return &kernelMounter{ | ||
needsModprobe: !filesystemSupported(kernelModule), | ||
} | ||
} | ||
|
||
func (m *kernelMounter) mountKernel( | ||
ctx context.Context, | ||
mountPoint string, | ||
cr *util.Credentials, | ||
volOptions *store.VolumeOptions, | ||
) error { | ||
if m.needsModprobe { | ||
if err := execCommandErr(ctx, "modprobe", kernelModule); err != nil { | ||
return err | ||
} | ||
Comment on lines
+68
to
+70
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. i think we can optimize it by moving this modeprobe to There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. There is a check to see if the driver is loaded when There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. yeah i agree but this works byt when where a mountKernel is called and if There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. we can take it as an enhancement as well. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Ah, yes, if There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. this is done now, please review again. |
||
|
||
m.needsModprobe = false | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. i think this needs to be set to true? also this is not of much use with the current code because mounter.New() is called for every NodeStage RPC call. we need to move this to Driver initialization time as it needs to run only one time. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. once the module is loaded, it will be listed in |
||
} | ||
|
||
args := []string{ | ||
|
@@ -68,7 +104,7 @@ func mountKernel(ctx context.Context, mountPoint string, cr *util.Credentials, v | |
return err | ||
} | ||
|
||
func (m *KernelMounter) Mount( | ||
func (m *kernelMounter) Mount( | ||
ctx context.Context, | ||
mountPoint string, | ||
cr *util.Credentials, | ||
|
@@ -78,7 +114,26 @@ func (m *KernelMounter) Mount( | |
return err | ||
} | ||
|
||
return mountKernel(ctx, mountPoint, cr, volOptions) | ||
return m.mountKernel(ctx, mountPoint, cr, volOptions) | ||
} | ||
|
||
func (m *KernelMounter) Name() string { return "Ceph kernel client" } | ||
func (m *kernelMounter) Name() string { return "Ceph kernel client" } | ||
|
||
// filesystemSupported checks if the passed name of the filesystem is included | ||
// in /proc/filesystems. | ||
func filesystemSupported(fs string) bool { | ||
// /proc/filesystems contains a list of all supported filesystems, | ||
// either compiled into the kernel, or as loadable module. | ||
data, err := os.ReadFile("/proc/filesystems") | ||
if err != nil { | ||
testErrorf("failed to read /proc/filesystems: %v", err) | ||
|
||
return false | ||
} | ||
|
||
// The format of /proc/filesystems is one filesystem per line, an | ||
// optional keyword ("nodev") followed by a tab and the name of the | ||
// filesystem. Matching <tab>ceph<eol> for the ceph kernel module that | ||
// supports CephFS. | ||
return strings.Contains(string(data), "\t"+fs+"\n") | ||
} |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,38 @@ | ||
/* | ||
Copyright 2024 The Ceph-CSI Authors. | ||
|
||
Licensed under the Apache License, Version 2.0 (the "License"); | ||
you may not use this file except in compliance with the License. | ||
You may obtain a copy of the License at | ||
|
||
http://www.apache.org/licenses/LICENSE-2.0 | ||
|
||
Unless required by applicable law or agreed to in writing, software | ||
distributed under the License is distributed on an "AS IS" BASIS, | ||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||
See the License for the specific language governing permissions and | ||
limitations under the License. | ||
*/ | ||
|
||
package mounter | ||
|
||
import ( | ||
"testing" | ||
|
||
"github.com/stretchr/testify/assert" | ||
) | ||
|
||
func TestFilesystemSupported(t *testing.T) { | ||
t.Parallel() | ||
|
||
testErrorf = func(fmt string, args ...any) { | ||
t.Errorf(fmt, args...) | ||
} | ||
|
||
// "proc" is always a supported filesystem, we detect supported | ||
// filesystems by reading from it | ||
assert.True(t, filesystemSupported("proc")) | ||
|
||
// "nonefs" is a made-up name, and does not exist | ||
assert.False(t, filesystemSupported("nonefs")) | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
testErrorf
might not be the right name for non-test file and alsofmt
can be replaced to something else as its a core package name.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
not sure I understand,
fmt
is just a string?There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
what i mean is that fmt is also a package name, we might get into a static check problem if we use the same name for some variable name as well.