Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp229458iob; Mon, 2 May 2022 17:53:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxKIj3tXpUUPvjxPd5HVVrrrFPJgcAD8zwOPvNhgqnCscBgBIcr/9gFC1KGQ83hPQVdd13o X-Received: by 2002:a17:903:244b:b0:15e:8844:1578 with SMTP id l11-20020a170903244b00b0015e88441578mr13981190pls.13.1651539211087; Mon, 02 May 2022 17:53:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651539211; cv=none; d=google.com; s=arc-20160816; b=KAn56dQWe1YuJWN71q1Zk4FFEL/Na6gqY65/JcuBhIrm66d86cb2Ewaan0yYHxQIry +xrnuczO+goVIYGlt5qWUsqKv/j1QsDwlSICbJGhtZy7ENWyTj1RbUZ9E+fpxf1Rw9jH XapN2a0tW1mXjGIInj0jcw/NrUB5G0YFr32adQHDgOr8UX9oJ1977gxp+7o1s1pYIBGW oy2pWdk7mhFlI0jpmEEAbFhUJpRNRzo3jnSNyPXVF45k4c9eBiqya1T7xGmOI/TNV36z AInhPVooRr4iywlHi2TwqPjpCZfRcu5W1ZcPwtqoMQNl7fsnxXTpjXmD/8KApdqAvnSs q53Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature:dkim-filter; bh=AS/6vbqVTf7sfE1lbMJTchfiT0amHhuZ+GSv/ZwMb0A=; b=A+YBYVsl2V+gF3OYPbjjxQdfYbNm6fa2q+olKSMcLCxIIU9WrrTnPuhmaqlePechjq wnAAoSa8eIAWeCtRR4iRQCMQHaDs5+kh5C+zJn4/oD0GTGq23eSpOewMkg+SUmxk4ujs 4pWIXPM413AKbjhse+O6gWlT9LOS7m15BenOc+OMbjUb1MdYWSqrFnjsMiZTPMXy0wZm dRgdi2TossC8GRD4DgTTiZUJIEdGYyL2/xCMrLOp5U0ODP66zNFDIUeoH+D1GQ/OXy+L U3R3QKlIgDCUSy1mIMu3V4m1JQHFHFxKGbmes+Wi6ud9AcLwN6qGcXzUqCVbhwvp4oxh kVtg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@fieldses.org header.s=default header.b=jQoM7tjK; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id f13-20020a056a00238d00b0050a99acc9ecsi16219935pfc.45.2022.05.02.17.53.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 02 May 2022 17:53:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@fieldses.org header.s=default header.b=jQoM7tjK; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 9895D50B2A; Mon, 2 May 2022 17:40:15 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239289AbiEBP1H (ORCPT + 99 others); Mon, 2 May 2022 11:27:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59506 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238609AbiEBP1G (ORCPT ); Mon, 2 May 2022 11:27:06 -0400 Received: from fieldses.org (fieldses.org [IPv6:2600:3c00:e000:2f7::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E1ED913CC9; Mon, 2 May 2022 08:23:36 -0700 (PDT) Received: by fieldses.org (Postfix, from userid 2815) id 201D46214; Mon, 2 May 2022 11:23:36 -0400 (EDT) DKIM-Filter: OpenDKIM Filter v2.11.0 fieldses.org 201D46214 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fieldses.org; s=default; t=1651505016; bh=AS/6vbqVTf7sfE1lbMJTchfiT0amHhuZ+GSv/ZwMb0A=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=jQoM7tjKlyWX5peTO+sDQcLQfrPIRkn4Obz0UP2q2vYotfD3EbzFXqDzCyNG0CPn1 siPoA6quCRQG3M5v0JFFtwrR6ZypdLc/l3Pp++PLyKgDA5g+eu69k5DdfzQJhzVZNx zq5GeH5dC4Hlfw17M6azSZ4OTBFR8Ojsd0GGBB78= Date: Mon, 2 May 2022 11:23:36 -0400 From: "J. Bruce Fields" To: Dai Ngo Cc: chuck.lever@oracle.com, jlayton@redhat.com, viro@zeniv.linux.org.uk, linux-nfs@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: Re: [PATCH RFC v24 1/7] NFSD: add courteous server support for thread with only delegation Message-ID: <20220502152336.GA30550@fieldses.org> References: <1651426696-15509-1-git-send-email-dai.ngo@oracle.com> <1651426696-15509-2-git-send-email-dai.ngo@oracle.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1651426696-15509-2-git-send-email-dai.ngo@oracle.com> User-Agent: Mutt/1.5.21 (2010-09-15) X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Sun, May 01, 2022 at 10:38:10AM -0700, Dai Ngo wrote: > This patch provides courteous server support for delegation only. > Only expired client with delegation but no conflict and no open > or lock state is allowed to be in COURTESY state. > > Delegation conflict with COURTESY/EXPIRABLE client is resolved by > setting it to EXPIRABLE, queue work for the laundromat and return > delay to the caller. Conflict is resolved when the laudromat runs > and expires the EXIRABLE client while the NFS client retries the > OPEN request. Local thread request that gets conflict is doing the > retry in _break_lease. > > Client in COURTESY or EXPIRABLE state is allowed to reconnect and > continues to have access to its state. Access to the nfs4_client by > the reconnecting thread and the laundromat is serialized via the > client_lock. > > Signed-off-by: Dai Ngo > --- > fs/nfsd/nfs4state.c | 83 +++++++++++++++++++++++++++++++++++++++++++---------- > fs/nfsd/nfsd.h | 1 + > fs/nfsd/state.h | 31 ++++++++++++++++++++ > 3 files changed, 100 insertions(+), 15 deletions(-) > > diff --git a/fs/nfsd/nfs4state.c b/fs/nfsd/nfs4state.c > index 234e852fcdfa..917eaab45999 100644 > --- a/fs/nfsd/nfs4state.c > +++ b/fs/nfsd/nfs4state.c > @@ -125,6 +125,8 @@ static void free_session(struct nfsd4_session *); > static const struct nfsd4_callback_ops nfsd4_cb_recall_ops; > static const struct nfsd4_callback_ops nfsd4_cb_notify_lock_ops; > > +static struct workqueue_struct *laundry_wq; > + > static bool is_session_dead(struct nfsd4_session *ses) > { > return ses->se_flags & NFS4_SESSION_DEAD; > @@ -152,6 +154,7 @@ static __be32 get_client_locked(struct nfs4_client *clp) > if (is_client_expired(clp)) > return nfserr_expired; > atomic_inc(&clp->cl_rpc_users); > + clp->cl_state = NFSD4_ACTIVE; > return nfs_ok; > } > > @@ -172,6 +175,7 @@ renew_client_locked(struct nfs4_client *clp) > > list_move_tail(&clp->cl_lru, &nn->client_lru); > clp->cl_time = ktime_get_boottime_seconds(); > + clp->cl_state = NFSD4_ACTIVE; > } > > static void put_client_renew_locked(struct nfs4_client *clp) > @@ -1090,6 +1094,7 @@ alloc_init_deleg(struct nfs4_client *clp, struct nfs4_file *fp, > get_clnt_odstate(odstate); > dp->dl_type = NFS4_OPEN_DELEGATE_READ; > dp->dl_retries = 1; > + dp->dl_recalled = false; > nfsd4_init_cb(&dp->dl_recall, dp->dl_stid.sc_client, > &nfsd4_cb_recall_ops, NFSPROC4_CLNT_CB_RECALL); > get_nfs4_file(fp); > @@ -2004,6 +2009,8 @@ static struct nfs4_client *alloc_client(struct xdr_netobj name) > idr_init(&clp->cl_stateids); > atomic_set(&clp->cl_rpc_users, 0); > clp->cl_cb_state = NFSD4_CB_UNKNOWN; > + clp->cl_state = NFSD4_ACTIVE; > + atomic_set(&clp->cl_delegs_in_recall, 0); > INIT_LIST_HEAD(&clp->cl_idhash); > INIT_LIST_HEAD(&clp->cl_openowners); > INIT_LIST_HEAD(&clp->cl_delegations); > @@ -4694,9 +4701,18 @@ nfsd_break_deleg_cb(struct file_lock *fl) > bool ret = false; > struct nfs4_delegation *dp = (struct nfs4_delegation *)fl->fl_owner; > struct nfs4_file *fp = dp->dl_stid.sc_file; > + struct nfs4_client *clp = dp->dl_stid.sc_client; > + struct nfsd_net *nn; > > trace_nfsd_cb_recall(&dp->dl_stid); > > + dp->dl_recalled = true; > + atomic_inc(&clp->cl_delegs_in_recall); > + if (try_to_expire_client(clp)) { > + nn = net_generic(clp->net, nfsd_net_id); > + mod_delayed_work(laundry_wq, &nn->laundromat_work, 0); > + } > + > /* > * We don't want the locks code to timeout the lease for us; > * we'll remove it ourself if a delegation isn't returned > @@ -4739,9 +4755,15 @@ static int > nfsd_change_deleg_cb(struct file_lock *onlist, int arg, > struct list_head *dispose) > { > - if (arg & F_UNLCK) > + struct nfs4_delegation *dp = (struct nfs4_delegation *)onlist->fl_owner; > + struct nfs4_client *clp = dp->dl_stid.sc_client; > + > + if (arg & F_UNLCK) { > + if (dp->dl_recalled && > + atomic_dec_return(&clp->cl_delegs_in_recall) == 0) > + dp->dl_recalled = false; Why isn't this just if (dp->dl_recalled) atomic_dec(&clp->cl_delegs_in_recall) ? I'm not seeing why the case where cl_delegs_in_recall goes to zero should be special. Also, from a quick check of fs/locks.c, I don't think lm_change(.,F_UNLCK,.) will be called more than once, so I don't think it's necessary to clear dl_recalled. Other than that, the patch looks good to me. --b. > return lease_modify(onlist, arg, dispose); > - else > + } else > return -EAGAIN; > } > > @@ -5605,6 +5627,49 @@ static void nfsd4_ssc_expire_umount(struct nfsd_net *nn) > } > #endif > > +/* > + * place holder for now, no check for lock blockers yet > + */ > +static bool > +nfs4_anylock_blockers(struct nfs4_client *clp) > +{ > + if (atomic_read(&clp->cl_delegs_in_recall) || > + client_has_openowners(clp) || > + !list_empty(&clp->async_copies)) > + return true; > + return false; > +} > + > +static void > +nfs4_get_client_reaplist(struct nfsd_net *nn, struct list_head *reaplist, > + struct laundry_time *lt) > +{ > + struct list_head *pos, *next; > + struct nfs4_client *clp; > + > + INIT_LIST_HEAD(reaplist); > + spin_lock(&nn->client_lock); > + list_for_each_safe(pos, next, &nn->client_lru) { > + clp = list_entry(pos, struct nfs4_client, cl_lru); > + if (clp->cl_state == NFSD4_EXPIRABLE) > + goto exp_client; > + if (!state_expired(lt, clp->cl_time)) > + break; > + if (!atomic_read(&clp->cl_rpc_users)) > + clp->cl_state = NFSD4_COURTESY; > + if (!client_has_state(clp) || > + ktime_get_boottime_seconds() >= > + (clp->cl_time + NFSD_COURTESY_CLIENT_TIMEOUT)) > + goto exp_client; > + if (nfs4_anylock_blockers(clp)) { > +exp_client: > + if (!mark_client_expired_locked(clp)) > + list_add(&clp->cl_lru, reaplist); > + } > + } > + spin_unlock(&nn->client_lock); > +} > + > static time64_t > nfs4_laundromat(struct nfsd_net *nn) > { > @@ -5627,7 +5692,6 @@ nfs4_laundromat(struct nfsd_net *nn) > goto out; > } > nfsd4_end_grace(nn); > - INIT_LIST_HEAD(&reaplist); > > spin_lock(&nn->s2s_cp_lock); > idr_for_each_entry(&nn->s2s_cp_stateids, cps_t, i) { > @@ -5637,17 +5701,7 @@ nfs4_laundromat(struct nfsd_net *nn) > _free_cpntf_state_locked(nn, cps); > } > spin_unlock(&nn->s2s_cp_lock); > - > - spin_lock(&nn->client_lock); > - list_for_each_safe(pos, next, &nn->client_lru) { > - clp = list_entry(pos, struct nfs4_client, cl_lru); > - if (!state_expired(<, clp->cl_time)) > - break; > - if (mark_client_expired_locked(clp)) > - continue; > - list_add(&clp->cl_lru, &reaplist); > - } > - spin_unlock(&nn->client_lock); > + nfs4_get_client_reaplist(nn, &reaplist, <); > list_for_each_safe(pos, next, &reaplist) { > clp = list_entry(pos, struct nfs4_client, cl_lru); > trace_nfsd_clid_purged(&clp->cl_clientid); > @@ -5722,7 +5776,6 @@ nfs4_laundromat(struct nfsd_net *nn) > return max_t(time64_t, lt.new_timeo, NFSD_LAUNDROMAT_MINTIMEOUT); > } > > -static struct workqueue_struct *laundry_wq; > static void laundromat_main(struct work_struct *); > > static void > diff --git a/fs/nfsd/nfsd.h b/fs/nfsd/nfsd.h > index 4fc1fd639527..23996c6ca75e 100644 > --- a/fs/nfsd/nfsd.h > +++ b/fs/nfsd/nfsd.h > @@ -336,6 +336,7 @@ void nfsd_lockd_shutdown(void); > #define COMPOUND_ERR_SLACK_SPACE 16 /* OP_SETATTR */ > > #define NFSD_LAUNDROMAT_MINTIMEOUT 1 /* seconds */ > +#define NFSD_COURTESY_CLIENT_TIMEOUT (24 * 60 * 60) /* seconds */ > > /* > * The following attributes are currently not supported by the NFSv4 server: > diff --git a/fs/nfsd/state.h b/fs/nfsd/state.h > index 95457cfd37fc..f3d6313914ed 100644 > --- a/fs/nfsd/state.h > +++ b/fs/nfsd/state.h > @@ -149,6 +149,7 @@ struct nfs4_delegation { > /* For recall: */ > int dl_retries; > struct nfsd4_callback dl_recall; > + bool dl_recalled; > }; > > #define cb_to_delegation(cb) \ > @@ -283,6 +284,28 @@ struct nfsd4_sessionid { > #define HEXDIR_LEN 33 /* hex version of 16 byte md5 of cl_name plus '\0' */ > > /* > + * State Meaning Where set > + * -------------------------------------------------------------------------- > + * | NFSD4_ACTIVE | Confirmed, active | Default | > + * |------------------- ----------------------------------------------------| > + * | NFSD4_COURTESY | Courtesy state. | nfs4_get_client_reaplist | > + * | | Lease/lock/share | | > + * | | reservation conflict | | > + * | | can cause Courtesy | | > + * | | client to be expired | | > + * |------------------------------------------------------------------------| > + * | NFSD4_EXPIRABLE | Courtesy client to be| nfs4_laundromat | > + * | | expired by Laundromat| try_to_expire_client | > + * | | due to conflict | | > + * |------------------------------------------------------------------------| > + */ > +enum { > + NFSD4_ACTIVE = 0, > + NFSD4_COURTESY, > + NFSD4_EXPIRABLE, > +}; > + > +/* > * struct nfs4_client - one per client. Clientids live here. > * > * The initial object created by an NFS client using SETCLIENTID (for NFSv4.0) > @@ -385,6 +408,9 @@ struct nfs4_client { > struct list_head async_copies; /* list of async copies */ > spinlock_t async_lock; /* lock for async copies */ > atomic_t cl_cb_inflight; /* Outstanding callbacks */ > + > + unsigned int cl_state; > + atomic_t cl_delegs_in_recall; > }; > > /* struct nfs4_client_reset > @@ -702,4 +728,9 @@ extern void nfsd4_client_record_remove(struct nfs4_client *clp); > extern int nfsd4_client_record_check(struct nfs4_client *clp); > extern void nfsd4_record_grace_done(struct nfsd_net *nn); > > +static inline bool try_to_expire_client(struct nfs4_client *clp) > +{ > + cmpxchg(&clp->cl_state, NFSD4_COURTESY, NFSD4_EXPIRABLE); > + return clp->cl_state == NFSD4_EXPIRABLE; > +} > #endif /* NFSD4_STATE_H */ > -- > 2.9.5