Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp138154pxb; Thu, 21 Apr 2022 19:23:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwKzkkplJwYsRbJiuXP5/p8Z+9oL4ZLqHdw2V80L9R6EKp31nfsnNnsMi/NADn5IILIsfXf X-Received: by 2002:a17:902:cecb:b0:158:9a0b:c839 with SMTP id d11-20020a170902cecb00b001589a0bc839mr2470344plg.58.1650594187591; Thu, 21 Apr 2022 19:23:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650594187; cv=none; d=google.com; s=arc-20160816; b=hnpMVwoCUoIQiK4E92WS+CJF2lRmutrDhYOnfpZeIMEHouV1zdmo5kBN8dmic5xEJu LXF/ZXe89i58YJerEkNI9RQwhsOXFeS5ZH2BrNQw8BOH289YlfTGK0Uj8BxlwYNrhlKD Abu7Edb5QDatqaKFElZ5PjfyDe+mA9anMGcXprk6X7FVTqX4Mo0XfA6d/L3CYCtRL7wI kh7TdM+y4Te8GsudMQQc+9Ls1gmVauCVxFG3VzxRMw5+Fq1xRPS1lsef1b3KEjwjDxcY vql4GDJc/6mRGZtzR/CjH6bugdUTWBYRitCUTrolxJ0A4naO/YeBNOTilzUqgPOQNchr yzxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:from:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:date :dkim-signature:dkim-filter; bh=ziPMTeOUG26tWYhF3IoXdxqxKKwewkeusqsCcAWd1vo=; b=n9pU41mqkOboZMDK7pnHPx6P3kMhv/OYjYImzNluP4uFORKDWHUPzHLU1JCGdxHMww nSiYWajHudrrAlR7Qi+m22ZUah2SoW7a9OGBRRDV3pjLXt0fK9cnjwCqmC2ZvAIRNkms hqBz5QB4SFdlC/W7W8AYwFlfDYz6D3Cg3rg7/A2qD6Z8mHR+EvXWvVz0ar4JjyuayKV9 6mk5Vro+3H9Gtkw9rzWJP+hiyskuixE9kJsOsjZR2sQ3kIl2M38TplNxyHeGuElb5pPL 1Tx/IiMtMdzC4uZWxGR4qYk2bTZtB9iIxPx1RgWcAQWeDg73G7OIZ94RVqgRSwGgsN14 tRSQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@fieldses.org header.s=default header.b=QdQbwbi7; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l13-20020a170902f68d00b00158f94c9839si7250033plg.310.2022.04.21.19.22.35; Thu, 21 Apr 2022 19:23:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@fieldses.org header.s=default header.b=QdQbwbi7; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1381785AbiDTT1H (ORCPT + 99 others); Wed, 20 Apr 2022 15:27:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47840 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1381787AbiDTT1G (ORCPT ); Wed, 20 Apr 2022 15:27:06 -0400 Received: from fieldses.org (fieldses.org [IPv6:2600:3c00:e000:2f7::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8DE31427FE; Wed, 20 Apr 2022 12:24:19 -0700 (PDT) Received: by fieldses.org (Postfix, from userid 2815) id 015C8612C; Wed, 20 Apr 2022 15:24:18 -0400 (EDT) DKIM-Filter: OpenDKIM Filter v2.11.0 fieldses.org 015C8612C DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fieldses.org; s=default; t=1650482659; bh=ziPMTeOUG26tWYhF3IoXdxqxKKwewkeusqsCcAWd1vo=; h=Date:To:Cc:Subject:References:In-Reply-To:From:From; b=QdQbwbi7DRafT804ouNvmbBuD5MwCqumbvlHb5bJa9U1jAstE6Wi3qq4xZUlFsGvY qMn/QfhID451WzZ+xrGAtKetjpEYAkfNFYhX+0wmHRX9HQQrNUaqe7dpBUJqcEKV0Q sHVLKJrfw3RUlhOB5T3q9f/LO9pKbIs4EnJJ5nTg= Date: Wed, 20 Apr 2022 15:24:18 -0400 To: Chuck Lever Cc: linux-nfs@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: Re: [PATCH RFC 0/8] Make NFSv4 OPEN(CREATE) less brittle Message-ID: <20220420192418.GB27805@fieldses.org> References: <165047903719.1829.18357114060053600197.stgit@manet.1015granger.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <165047903719.1829.18357114060053600197.stgit@manet.1015granger.net> User-Agent: Mutt/1.5.21 (2010-09-15) From: bfields@fieldses.org (J. Bruce Fields) X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Wed, Apr 20, 2022 at 02:28:34PM -0400, Chuck Lever wrote: > Attempt to address occasional reports of test failures caused by > NFSv4 OPEN(CREATE) having failing internally after the target > file object has been created. > > The basic approach is to re-organize the NFSv4 OPEN code path so > that common failure modes occur /before/ the call to vfs_create() > rather than afterwards. In addition, the file is opened and created > atomically so that another client can't race and de-permit the > file just after it was created but before the server has opened it. > > So far I haven't found any regressions. However I have not been > able to reproduce the original failures. I'll admit I don't know how big an impact those races have in practice. But this has bugged me for a long time--thanks for finally tackling it. I haven't reviewed it in detail but the basic idea looks good. --b. > Chuck Lever (8): > NFSD: Clean up nfsd3_proc_create() > NFSD: Avoid calling fh_drop_write() twice in do_nfsd_create() > NFSD: Refactor nfsd_create_setattr() > NFSD: Refactor NFSv3 CREATE > NFSD: Refactor NFSv4 OPEN(CREATE) > NFSD: Remove do_nfsd_create() > NFSD: Clean up nfsd_open_verified() > NFSD: Instantiate a struct file when creating a regular NFSv4 file > > > fs/nfsd/filecache.c | 51 +++++++-- > fs/nfsd/filecache.h | 2 + > fs/nfsd/nfs3proc.c | 141 +++++++++++++++++++++---- > fs/nfsd/nfs4proc.c | 197 +++++++++++++++++++++++++++++++++-- > fs/nfsd/nfs4state.c | 16 ++- > fs/nfsd/vfs.c | 245 ++++++++++---------------------------------- > fs/nfsd/vfs.h | 14 +-- > fs/nfsd/xdr4.h | 1 + > fs/open.c | 44 ++++++++ > include/linux/fs.h | 2 + > 10 files changed, 471 insertions(+), 242 deletions(-) > > -- > Chuck Lever