mirror of https://github.com/ceph/ceph
142 lines
5.4 KiB
Python
142 lines
5.4 KiB
Python
import contextlib
|
|
import logging
|
|
import json
|
|
|
|
from io import StringIO
|
|
from teuthology import misc as teuthology
|
|
from teuthology import contextutil
|
|
from teuthology.orchestra import run
|
|
|
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
|
|
@contextlib.contextmanager
|
|
def task(ctx, config):
|
|
log.info('Setting up nvme_loop on scratch devices...')
|
|
host = 'hostnqn'
|
|
port = '1'
|
|
devs_by_remote = {}
|
|
old_scratch_by_remote = {}
|
|
for remote, roles in ctx.cluster.remotes.items():
|
|
if remote.is_container:
|
|
continue
|
|
devs = teuthology.get_scratch_devices(remote)
|
|
devs_by_remote[remote] = devs
|
|
base = '/sys/kernel/config/nvmet'
|
|
remote.run(
|
|
args=[
|
|
'grep', '^nvme_loop', '/proc/modules', run.Raw('||'),
|
|
'sudo', 'modprobe', 'nvme_loop',
|
|
run.Raw('&&'),
|
|
'sudo', 'mkdir', '-p', f'{base}/hosts/{host}',
|
|
run.Raw('&&'),
|
|
'sudo', 'mkdir', '-p', f'{base}/ports/{port}',
|
|
run.Raw('&&'),
|
|
'echo', 'loop', run.Raw('|'),
|
|
'sudo', 'tee', f'{base}/ports/{port}/addr_trtype',
|
|
]
|
|
)
|
|
for dev in devs:
|
|
short = dev.split('/')[-1]
|
|
log.info(f'Connecting nvme_loop {remote.shortname}:{dev}...')
|
|
remote.run(
|
|
args=[
|
|
'sudo', 'mkdir', '-p', f'{base}/subsystems/{short}',
|
|
run.Raw('&&'),
|
|
'echo', '1', run.Raw('|'),
|
|
'sudo', 'tee', f'{base}/subsystems/{short}/attr_allow_any_host',
|
|
run.Raw('&&'),
|
|
'sudo', 'mkdir', '-p', f'{base}/subsystems/{short}/namespaces/1',
|
|
run.Raw('&&'),
|
|
'echo', '-n', dev, run.Raw('|'),
|
|
'sudo', 'tee', f'{base}/subsystems/{short}/namespaces/1/device_path',
|
|
run.Raw('&&'),
|
|
'echo', '1', run.Raw('|'),
|
|
'sudo', 'tee', f'{base}/subsystems/{short}/namespaces/1/enable',
|
|
run.Raw('&&'),
|
|
'sudo', 'ln', '-s', f'{base}/subsystems/{short}',
|
|
f'{base}/ports/{port}/subsystems/{short}',
|
|
run.Raw('&&'),
|
|
'sudo', 'nvme', 'connect', '-t', 'loop', '-n', short, '-q', host,
|
|
]
|
|
)
|
|
|
|
# identify nvme_loops devices
|
|
old_scratch_by_remote[remote] = remote.read_file('/scratch_devs')
|
|
|
|
with contextutil.safe_while(sleep=1, tries=15) as proceed:
|
|
while proceed():
|
|
remote.run(args=['lsblk'], stdout=StringIO())
|
|
p = remote.run(args=['sudo', 'nvme', 'list', '-o', 'json'], stdout=StringIO())
|
|
new_devs = []
|
|
# `nvme list -o json` will return the following output:
|
|
'''{
|
|
"Devices" : [
|
|
{
|
|
"DevicePath" : "/dev/nvme0n1",
|
|
"Firmware" : "8DV101H0",
|
|
"Index" : 0,
|
|
"ModelNumber" : "INTEL SSDPEDMD400G4",
|
|
"ProductName" : "Unknown Device",
|
|
"SerialNumber" : "PHFT620400WB400BGN"
|
|
},
|
|
{
|
|
"DevicePath" : "/dev/nvme1n1",
|
|
"Firmware" : "5.15.0-1",
|
|
"Index" : 1,
|
|
"ModelNumber" : "Linux",
|
|
"ProductName" : "Unknown Device",
|
|
"SerialNumber" : "7672ce414766ba44a8e5"
|
|
}
|
|
]
|
|
}'''
|
|
nvme_list = json.loads(p.stdout.getvalue())
|
|
for device in nvme_list['Devices']:
|
|
dev = device['DevicePath']
|
|
vendor = device['ModelNumber']
|
|
if dev.startswith('/dev/') and vendor == 'Linux':
|
|
new_devs.append(dev)
|
|
bluestore_zap(remote, dev)
|
|
log.info(f'new_devs {new_devs}')
|
|
assert len(new_devs) <= len(devs)
|
|
if len(new_devs) == len(devs):
|
|
break
|
|
|
|
remote.write_file(
|
|
path='/scratch_devs',
|
|
data='\n'.join(new_devs) + '\n',
|
|
sudo=True
|
|
)
|
|
|
|
try:
|
|
yield
|
|
|
|
finally:
|
|
for remote, devs in devs_by_remote.items():
|
|
if remote.is_container:
|
|
continue
|
|
for dev in devs:
|
|
short = dev.split('/')[-1]
|
|
log.info(f'Disconnecting nvme_loop {remote.shortname}:{dev}...')
|
|
remote.run(
|
|
args=[
|
|
'sudo', 'nvme', 'disconnect', '-n', short
|
|
],
|
|
check_status=False,
|
|
)
|
|
remote.write_file(
|
|
path='/scratch_devs',
|
|
data=old_scratch_by_remote[remote],
|
|
sudo=True
|
|
)
|
|
|
|
def bluestore_zap(remote, device: str) -> None:
|
|
for offset in [0, 1073741824, 10737418240]:
|
|
remote.run(args=['sudo', 'dd',
|
|
'if=/dev/zero', f'of={device}',
|
|
f'seek={offset}', 'bs=1',
|
|
'count=4096'], stdout=StringIO())
|
|
remote.run(args=['sudo', 'hexdump', '-n22',
|
|
'-C', f'-s{offset}', f'{device}'],
|
|
stdout=StringIO()) |