Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp329440pxb; Fri, 22 Apr 2022 01:35:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyNkdWl46I+QuMgffU0YHNmlyKNW71JHwNUZDegfGuF6MN4Qp2222hNinm1cZlN5RU+WEoB X-Received: by 2002:aa7:ce16:0:b0:41d:8e19:6dfb with SMTP id d22-20020aa7ce16000000b0041d8e196dfbmr3755815edv.12.1650616542669; Fri, 22 Apr 2022 01:35:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650616542; cv=none; d=google.com; s=arc-20160816; b=H4ZR9on/CieWKg+61F5fDOiYbGuANtXn2MK+GxZ3yjTpV7g9FQQGRhJcijptZDLXoe +2/EkWv07CGQYdmIMCEohvb+q/U+VOmkkftHXCH8bYRx7FQbNiEq9vqU+LsL28l3xrEI 4LdGe/qncCvw/ldl9npi8CIPdlI11nMOmi3uZjNrzjdiJOidQnwJJdodbC5MBPLkhziA TlR5Mv5MeZ9AgMXKzKUufiN6XtvZCVQcBQ9UIkZ4cr7NfQaaD19mCnmmrslN553/ZziX sCd8LHDgHA/Swu4h/HOHIsxolKG/wjppbTJLIObKIlNheDPiRxh4ZFz7Yj9Qh4za771E U8Iw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:message-id:date:to:from:subject; bh=ORuCOEe3YozNWfau56+VQvmz5gx1OukNQpO5TXbq5D8=; b=yXqxUsMo6E9Nod82cKrRVJzsnw65p1XBneY8NY1hxJ8e15wppmDBfmxq7B8ew/b+3b GnKMwmknw2wIIeLEZj9d4ABgvRF61AnpUscdMlVzNBM/tnUb+aSwo/VyyZyXBu1GyKG4 APSQBaXpEGQThsRG1cA2D+67iwfxHA27fqt3quCulC67weY5qM6JI3sX9I9Zc+eTCq1Y DRHI1FsAmIVfys8iLdIMv0bLvh062zwwIWU3cPXKe9PS37LvXXh7J/8drb3g/ODQgPAD 3gPUyvJ5lHFnMxBkLM8WJQaiwmprejZ3AtwhLy710sS11P1noExtxa83Ztb64XtY8fkU 1/rA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j26-20020a170906831a00b006df76385c08si6211591ejx.168.2022.04.22.01.35.05; Fri, 22 Apr 2022 01:35:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245198AbiDTSbY (ORCPT + 99 others); Wed, 20 Apr 2022 14:31:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52666 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S245374AbiDTSbY (ORCPT ); Wed, 20 Apr 2022 14:31:24 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 33FFA23BDE; Wed, 20 Apr 2022 11:28:37 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id AD5D161B60; Wed, 20 Apr 2022 18:28:36 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id EB3B6C385A0; Wed, 20 Apr 2022 18:28:35 +0000 (UTC) Subject: [PATCH RFC 0/8] Make NFSv4 OPEN(CREATE) less brittle From: Chuck Lever To: linux-nfs@vger.kernel.org, linux-fsdevel@vger.kernel.org Date: Wed, 20 Apr 2022 14:28:34 -0400 Message-ID: <165047903719.1829.18357114060053600197.stgit@manet.1015granger.net> User-Agent: StGit/1.5 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-6.7 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org Attempt to address occasional reports of test failures caused by NFSv4 OPEN(CREATE) having failing internally after the target file object has been created. The basic approach is to re-organize the NFSv4 OPEN code path so that common failure modes occur /before/ the call to vfs_create() rather than afterwards. In addition, the file is opened and created atomically so that another client can't race and de-permit the file just after it was created but before the server has opened it. So far I haven't found any regressions. However I have not been able to reproduce the original failures. --- Chuck Lever (8): NFSD: Clean up nfsd3_proc_create() NFSD: Avoid calling fh_drop_write() twice in do_nfsd_create() NFSD: Refactor nfsd_create_setattr() NFSD: Refactor NFSv3 CREATE NFSD: Refactor NFSv4 OPEN(CREATE) NFSD: Remove do_nfsd_create() NFSD: Clean up nfsd_open_verified() NFSD: Instantiate a struct file when creating a regular NFSv4 file fs/nfsd/filecache.c | 51 +++++++-- fs/nfsd/filecache.h | 2 + fs/nfsd/nfs3proc.c | 141 +++++++++++++++++++++---- fs/nfsd/nfs4proc.c | 197 +++++++++++++++++++++++++++++++++-- fs/nfsd/nfs4state.c | 16 ++- fs/nfsd/vfs.c | 245 ++++++++++---------------------------------- fs/nfsd/vfs.h | 14 +-- fs/nfsd/xdr4.h | 1 + fs/open.c | 44 ++++++++ include/linux/fs.h | 2 + 10 files changed, 471 insertions(+), 242 deletions(-) -- Chuck Lever