Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp2006257pxb; Fri, 25 Mar 2022 09:27:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzK+xbRa4p9uBfEv5GcPhm+D1hUfWQWua4H7++t0fWjgZl3acyWb0vEHxDZLfaBhgdU+rRM X-Received: by 2002:aa7:de10:0:b0:418:d60d:aab8 with SMTP id h16-20020aa7de10000000b00418d60daab8mr14150760edv.322.1648225620918; Fri, 25 Mar 2022 09:27:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1648225620; cv=none; d=google.com; s=arc-20160816; b=o+a4F/3g9SHhGR5hz+2qiNJN0ghy1jpeGyJQXpexNahFrvPZessKG3MkfIsFgyKP7k I3v0XP8AnFSvh1MnBQPzwIBzpBXAzoHIot+T2SfRU/KaHXRDbiKHvJr5b7MYvIZCIjnx nshjsgGWlVFCf1Ja8p42gSpwqdcYuDRFz79nKSDBJIQPx+CAS/YsrfTRHdczbAkI/+zI XZP00ZgdRmSv4Sj9H6QV8k4Utbo4obhnX+qbfm3/4daYweb39cKolZdB75HnNSwP3vqL UmNPLNK741I0SHCyZpyKsgLH38p2lr6HRuCkjlc9LJT4kOfB0Ou0xX2UXbsELULb6Qio yS9g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from:dkim-signature; bh=7m5VLcqBEMVCYwIs+MEvIHvY/see9DZZ11OwFVzEYfM=; b=nlMbELdpnqIhviVYUC+CQR8/pBweL6oZUROfKzSnxJO7Ud2KZI9bXDMEr5axrswLiH q/VNSR/ggwD325Q9sxv6ZKULBc9ah1WqetiFga0lMhhP3zoEs/HCO2+Nwrm9C4yX7JhK H7xFoWNyhC85K9QuYZeRUoo3EBXyd3MTx/3/SDe9F+thRXkDVEQ0acRsSM22owONJ8Jk 793pDM8QI+VJlDOkvzSK1pAjMx48SDYzenj3Is9g6GpMk6DRrTzAmDG4HFacd5cr6k+T 5rm/L5DWYNik001O205UDRYgYMWVd+iUizQM1N6uHyEIbF6JmnienbVst4gMlJM1VjsW tHww== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2021-07-09 header.b="gh/h2r+t"; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u5-20020a50a405000000b00418c2b5be54si3174627edb.310.2022.03.25.09.26.25; Fri, 25 Mar 2022 09:27:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2021-07-09 header.b="gh/h2r+t"; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1358245AbiCYEgr (ORCPT + 99 others); Fri, 25 Mar 2022 00:36:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45806 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1358228AbiCYEgg (ORCPT ); Fri, 25 Mar 2022 00:36:36 -0400 Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D109EC6810; Thu, 24 Mar 2022 21:35:02 -0700 (PDT) Received: from pps.filterd (m0246632.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22P0GPPk010804; Fri, 25 Mar 2022 04:35:00 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : in-reply-to : references; s=corp-2021-07-09; bh=7m5VLcqBEMVCYwIs+MEvIHvY/see9DZZ11OwFVzEYfM=; b=gh/h2r+tAEanyreuPhpeGn7OEcA5WpNSp6Bu69odxSLFHO8aLlwJHQdiXjyMiG+vw1N7 lLJHAMlxIpSYNKMGHyd3CDE6LyQmauFq83GXjNM/wh8dgfHMUTac6fUcVZ2A3IoxxPqh l5L0cKPgtQBVKXIBWZGywdTnAVORLv0mfGm73qJiC7PPLIAfDpOgcIH+LcskFU/BhQYh 3nqorej+J8++P11YCuTTIOObBHzyz2ztbr7Q7EAUHhPxXVIlPMTa2wJKCIgevRwNx59L tgfVpxOMpIGEkOpUol+gptPGz9O7WOZ3X4wdmGmcJV5PNeRE24jkB8e9cNadBMxHuprC Cw== Received: from iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta03.appoci.oracle.com [130.35.103.27]) by mx0b-00069f02.pphosted.com with ESMTP id 3ew6sse8da-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 25 Mar 2022 04:35:00 +0000 Received: from pps.filterd (iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (8.16.1.2/8.16.1.2) with SMTP id 22P4WD4k020800; Fri, 25 Mar 2022 04:34:59 GMT Received: from pps.reinject (localhost [127.0.0.1]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com with ESMTP id 3ew6sc2bpr-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 25 Mar 2022 04:34:59 +0000 Received: from iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by pps.reinject (8.16.0.36/8.16.0.36) with SMTP id 22P4YsCc040479; Fri, 25 Mar 2022 04:34:59 GMT Received: from ca-common-hq.us.oracle.com (ca-common-hq.us.oracle.com [10.211.9.209]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com with ESMTP id 3ew6sc2bmt-6; Fri, 25 Mar 2022 04:34:59 +0000 From: Dai Ngo To: chuck.lever@oracle.com, bfields@fieldses.org Cc: jlayton@redhat.com, viro@zeniv.linux.org.uk, linux-nfs@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: [PATCH RFC v18 05/11] NFSD: Update nfs4_get_vfs_file() to handle courtesy client Date: Thu, 24 Mar 2022 21:34:45 -0700 Message-Id: <1648182891-32599-6-git-send-email-dai.ngo@oracle.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1648182891-32599-1-git-send-email-dai.ngo@oracle.com> References: <1648182891-32599-1-git-send-email-dai.ngo@oracle.com> X-Proofpoint-ORIG-GUID: iW5Ka5NlAPCw3uhMkrHIPTsnD7yjuXUe X-Proofpoint-GUID: iW5Ka5NlAPCw3uhMkrHIPTsnD7yjuXUe X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org Update nfs4_get_vfs_file and nfs4_upgrade_open to handle share reservation conflict with courtesy client. Update nfs4_get_vfs_file and nfs4_upgrade_open to handle share reservation conflict with courtesy client. When we have deny/access conflict we walk the fi_stateids of the file in question, looking for open stateid and check the deny/access of that stateid against the one from the open request. If there is a conflict then we check if the client that owns that stateid is a courtesy client. If it is then we set the client state to CLIENT_EXPIRED and allow the open request to continue. We have to scan all the stateid's of the file since the conflict can be caused by multiple open stateid's. Client with CLIENT_EXPIRED is expired by the laundromat. Signed-off-by: Dai Ngo --- fs/nfsd/nfs4state.c | 85 +++++++++++++++++++++++++++++++++++++++++++++-------- 1 file changed, 72 insertions(+), 13 deletions(-) diff --git a/fs/nfsd/nfs4state.c b/fs/nfsd/nfs4state.c index f20c75890594..fe8969ba94b3 100644 --- a/fs/nfsd/nfs4state.c +++ b/fs/nfsd/nfs4state.c @@ -701,9 +701,56 @@ __nfs4_file_get_access(struct nfs4_file *fp, u32 access) atomic_inc(&fp->fi_access[O_RDONLY]); } +/* + * Check if courtesy clients have conflicting access and resolve it if possible + * + * access: is op_share_access if share_access is true. + * Check if access mode, op_share_access, would conflict with + * the current deny mode of the file 'fp'. + * access: is op_share_deny if share_access is false. + * Check if the deny mode, op_share_deny, would conflict with + * current access of the file 'fp'. + * stp: skip checking this entry. + * new_stp: normal open, not open upgrade. + * + * Function returns: + * false - access/deny mode conflict with normal client. + * true - no conflict or conflict with courtesy client(s) is resolved. + */ +static bool +nfs4_resolve_deny_conflicts_locked(struct nfs4_file *fp, bool new_stp, + struct nfs4_ol_stateid *stp, u32 access, bool share_access) +{ + struct nfs4_ol_stateid *st; + struct nfs4_client *clp; + bool conflict = true; + unsigned char bmap; + + lockdep_assert_held(&fp->fi_lock); + list_for_each_entry(st, &fp->fi_stateids, st_perfile) { + /* ignore lock stateid */ + if (st->st_openstp) + continue; + if (st == stp && new_stp) + continue; + /* check file access against deny mode or vice versa */ + bmap = share_access ? st->st_deny_bmap : st->st_access_bmap; + if (!(access & bmap_to_share_mode(bmap))) + continue; + clp = st->st_stid.sc_client; + if (nfsd4_expire_courtesy_clnt(clp)) + continue; + conflict = false; + break; + } + return conflict; +} + static __be32 -nfs4_file_get_access(struct nfs4_file *fp, u32 access) +nfs4_file_get_access(struct nfs4_file *fp, u32 access, + struct nfs4_ol_stateid *stp, bool new_stp) { + lockdep_assert_held(&fp->fi_lock); /* Does this access mode make sense? */ @@ -711,15 +758,21 @@ nfs4_file_get_access(struct nfs4_file *fp, u32 access) return nfserr_inval; /* Does it conflict with a deny mode already set? */ - if ((access & fp->fi_share_deny) != 0) - return nfserr_share_denied; + if ((access & fp->fi_share_deny) != 0) { + if (!nfs4_resolve_deny_conflicts_locked(fp, new_stp, + stp, access, true)) + return nfserr_share_denied; + } __nfs4_file_get_access(fp, access); return nfs_ok; } -static __be32 nfs4_file_check_deny(struct nfs4_file *fp, u32 deny) +static __be32 nfs4_file_check_deny(struct nfs4_file *fp, u32 deny, + struct nfs4_ol_stateid *stp, bool new_stp) { + __be32 rc = nfs_ok; + /* Common case is that there is no deny mode. */ if (deny) { /* Does this deny mode make sense? */ @@ -728,13 +781,19 @@ static __be32 nfs4_file_check_deny(struct nfs4_file *fp, u32 deny) if ((deny & NFS4_SHARE_DENY_READ) && atomic_read(&fp->fi_access[O_RDONLY])) - return nfserr_share_denied; + rc = nfserr_share_denied; if ((deny & NFS4_SHARE_DENY_WRITE) && atomic_read(&fp->fi_access[O_WRONLY])) - return nfserr_share_denied; + rc = nfserr_share_denied; + + if (rc == nfserr_share_denied) { + if (nfs4_resolve_deny_conflicts_locked(fp, new_stp, + stp, deny, false)) + rc = nfs_ok; + } } - return nfs_ok; + return rc; } static void __nfs4_file_put_access(struct nfs4_file *fp, int oflag) @@ -4952,7 +5011,7 @@ nfsd4_truncate(struct svc_rqst *rqstp, struct svc_fh *fh, static __be32 nfs4_get_vfs_file(struct svc_rqst *rqstp, struct nfs4_file *fp, struct svc_fh *cur_fh, struct nfs4_ol_stateid *stp, - struct nfsd4_open *open) + struct nfsd4_open *open, bool new_stp) { struct nfsd_file *nf = NULL; __be32 status; @@ -4966,14 +5025,14 @@ static __be32 nfs4_get_vfs_file(struct svc_rqst *rqstp, struct nfs4_file *fp, * Are we trying to set a deny mode that would conflict with * current access? */ - status = nfs4_file_check_deny(fp, open->op_share_deny); + status = nfs4_file_check_deny(fp, open->op_share_deny, stp, new_stp); if (status != nfs_ok) { spin_unlock(&fp->fi_lock); goto out; } /* set access to the file */ - status = nfs4_file_get_access(fp, open->op_share_access); + status = nfs4_file_get_access(fp, open->op_share_access, stp, new_stp); if (status != nfs_ok) { spin_unlock(&fp->fi_lock); goto out; @@ -5027,11 +5086,11 @@ nfs4_upgrade_open(struct svc_rqst *rqstp, struct nfs4_file *fp, struct svc_fh *c unsigned char old_deny_bmap = stp->st_deny_bmap; if (!test_access(open->op_share_access, stp)) - return nfs4_get_vfs_file(rqstp, fp, cur_fh, stp, open); + return nfs4_get_vfs_file(rqstp, fp, cur_fh, stp, open, false); /* test and set deny mode */ spin_lock(&fp->fi_lock); - status = nfs4_file_check_deny(fp, open->op_share_deny); + status = nfs4_file_check_deny(fp, open->op_share_deny, stp, false); if (status == nfs_ok) { set_deny(open->op_share_deny, stp); fp->fi_share_deny |= @@ -5376,7 +5435,7 @@ nfsd4_process_open2(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nf goto out; } } else { - status = nfs4_get_vfs_file(rqstp, fp, current_fh, stp, open); + status = nfs4_get_vfs_file(rqstp, fp, current_fh, stp, open, true); if (status) { stp->st_stid.sc_type = NFS4_CLOSED_STID; release_open_stateid(stp); -- 2.9.5