Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2493018imm; Mon, 28 May 2018 09:07:05 -0700 (PDT) X-Google-Smtp-Source: AB8JxZppW2RP558K3SdzO99bIM57Jfmyb+hJt5FM0k60v11snldiK2R2owbSrCTcq+RoFIbuB4Vh X-Received: by 2002:a62:828c:: with SMTP id w134-v6mr13976282pfd.138.1527523625860; Mon, 28 May 2018 09:07:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527523625; cv=none; d=google.com; s=arc-20160816; b=t9Vkpy7eDOWIz1/7SPlhGn4XfCwsU9JvKLdq1I/yroDBaWJRrMhMJedjLvcZXLQWu0 pAMYtlVYNsTCCrepAj5tGmATKWv/fkPuBYurXB6J4qEdzKOII95sxL8SFdbfvojdSYS6 eaTFF9p1spOgKlLvDgAOLU0uE1UbaT4E4juyXjyfQcslIfC6o9/MktPNXfGPwgp43g5L 9P4nio6XpTH5M+nrsGGtKRls7z486x/aX1cKekM1ymRiZBf0zk1yORM/n8phgnem+lre wWz3SwI+eg0E6H+iESUtzTSf+BE+u129VE/AQzUZEl5YpgzWbnGTd9fImkTTRkxb+BEu OnaA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=44YYbOfqcJM1Qi1DTaQsqkJ/0eX8e2Iks+vanxB2Eyo=; b=saojU8+6zU3xJDGGxiLijxKoxGioVKwiN9vh6QBLaMlKpCV4hwI/ukFjashKu0ryqq itIYg39P67urRUK78bPH760WAWU7KXYXK3Piu/eAVnmb0CV/iAuZV1oY0S6WvPiMBDdh lukr14svn0WV7uBb3tLIcy0uMx1YIf5mWxnYLZ+J9vFQCHA7nGZ0m5bo4xOk6a0aIat8 1hcC6Skh1iqbCGhK9Hzekb++UTtGsJDqvQsm6t3jRZ2DgEgwziqsBqZO5EeaQgeDoPzS 3wV9criHhMQtOdo6SUKlzXZ94RbVW5sKqmtvPLy9caqFVGZG9l42cPjUVMRtQn3Yh9WT OAww== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VO8RJ9jb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k139-v6si30726298pfd.97.2018.05.28.09.06.51; Mon, 28 May 2018 09:07:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VO8RJ9jb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933453AbeE1QGM (ORCPT + 99 others); Mon, 28 May 2018 12:06:12 -0400 Received: from mail.kernel.org ([198.145.29.99]:34886 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965861AbeE1KOr (ORCPT ); Mon, 28 May 2018 06:14:47 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 79ABA20876; Mon, 28 May 2018 10:14:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1527502487; bh=x+axb8bs0vfp53FBVxlM9q9DX3o0M1AAVmkJXgA+Fww=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=VO8RJ9jb2sLSll3cEMLN3Vk4iB7O7Dxm8sgya7nfD0aqli3CReWTQr/xRUTUm6O58 5NDNn7xLF9R5KNGlBZue49yslcv54vJBgrYa3P5SrJksplRO0dr9ZA5oDsZt4vF+cw OpxkMpcsXeXap1kPHZ5UYYKitXNxwTnaLZb4Ozr8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, NeilBrown , Trond Myklebust , Sasha Levin Subject: [PATCH 4.4 019/268] NFSv4: always set NFS_LOCK_LOST when a lock is lost. Date: Mon, 28 May 2018 11:59:53 +0200 Message-Id: <20180528100204.273457878@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180528100202.045206534@linuxfoundation.org> References: <20180528100202.045206534@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: NeilBrown [ Upstream commit dce2630c7da73b0634686bca557cc8945cc450c8 ] There are 2 comments in the NFSv4 code which suggest that SIGLOST should possibly be sent to a process. In these cases a lock has been lost. The current practice is to set NFS_LOCK_LOST so that read/write returns EIO when a lock is lost. So change these comments to code when sets NFS_LOCK_LOST. One case is when lock recovery after apparent server restart fails with NFS4ERR_DENIED, NFS4ERR_RECLAIM_BAD, or NFS4ERRO_RECLAIM_CONFLICT. The other case is when a lock attempt as part of lease recovery fails with NFS4ERR_DENIED. In an ideal world, these should not happen. However I have a packet trace showing an NFSv4.1 session getting NFS4ERR_BADSESSION after an extended network parition. The NFSv4.1 client treats this like server reboot until/unless it get NFS4ERR_NO_GRACE, in which case it switches over to "nograce" recovery mode. In this network trace, the client attempts to recover a lock and the server (incorrectly) reports NFS4ERR_DENIED rather than NFS4ERR_NO_GRACE. This leads to the ineffective comment and the client then continues to write using the OPEN stateid. Signed-off-by: NeilBrown Signed-off-by: Trond Myklebust Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- fs/nfs/nfs4proc.c | 12 ++++++++---- fs/nfs/nfs4state.c | 5 ++++- 2 files changed, 12 insertions(+), 5 deletions(-) --- a/fs/nfs/nfs4proc.c +++ b/fs/nfs/nfs4proc.c @@ -1780,7 +1780,7 @@ static int nfs4_open_reclaim(struct nfs4 return ret; } -static int nfs4_handle_delegation_recall_error(struct nfs_server *server, struct nfs4_state *state, const nfs4_stateid *stateid, int err) +static int nfs4_handle_delegation_recall_error(struct nfs_server *server, struct nfs4_state *state, const nfs4_stateid *stateid, struct file_lock *fl, int err) { switch (err) { default: @@ -1827,7 +1827,11 @@ static int nfs4_handle_delegation_recall return -EAGAIN; case -ENOMEM: case -NFS4ERR_DENIED: - /* kill_proc(fl->fl_pid, SIGLOST, 1); */ + if (fl) { + struct nfs4_lock_state *lsp = fl->fl_u.nfs4_fl.owner; + if (lsp) + set_bit(NFS_LOCK_LOST, &lsp->ls_flags); + } return 0; } return err; @@ -1863,7 +1867,7 @@ int nfs4_open_delegation_recall(struct n err = nfs4_open_recover_helper(opendata, FMODE_READ); } nfs4_opendata_put(opendata); - return nfs4_handle_delegation_recall_error(server, state, stateid, err); + return nfs4_handle_delegation_recall_error(server, state, stateid, NULL, err); } static void nfs4_open_confirm_prepare(struct rpc_task *task, void *calldata) @@ -6157,7 +6161,7 @@ int nfs4_lock_delegation_recall(struct f if (err != 0) return err; err = _nfs4_do_setlk(state, F_SETLK, fl, NFS_LOCK_NEW); - return nfs4_handle_delegation_recall_error(server, state, stateid, err); + return nfs4_handle_delegation_recall_error(server, state, stateid, fl, err); } struct nfs_release_lockowner_data { --- a/fs/nfs/nfs4state.c +++ b/fs/nfs/nfs4state.c @@ -1386,6 +1386,7 @@ static int nfs4_reclaim_locks(struct nfs struct inode *inode = state->inode; struct nfs_inode *nfsi = NFS_I(inode); struct file_lock *fl; + struct nfs4_lock_state *lsp; int status = 0; struct file_lock_context *flctx = inode->i_flctx; struct list_head *list; @@ -1426,7 +1427,9 @@ restart: case -NFS4ERR_DENIED: case -NFS4ERR_RECLAIM_BAD: case -NFS4ERR_RECLAIM_CONFLICT: - /* kill_proc(fl->fl_pid, SIGLOST, 1); */ + lsp = fl->fl_u.nfs4_fl.owner; + if (lsp) + set_bit(NFS_LOCK_LOST, &lsp->ls_flags); status = 0; } spin_lock(&flctx->flc_lock);