Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp1907107rwd; Mon, 15 May 2023 04:58:12 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ49AJbvC7CVw5O3JeiVqkgbEdzUQqm4NpE91rmOpUzyY2Hh80TVmZaXTf2pwpM5bzu1mSWv X-Received: by 2002:a17:90a:62c2:b0:24b:66fe:6b4b with SMTP id k2-20020a17090a62c200b0024b66fe6b4bmr32772611pjs.47.1684151891916; Mon, 15 May 2023 04:58:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1684151891; cv=none; d=google.com; s=arc-20160816; b=D5wDEE6l2IMpVYyW2+vonVOgRKjJKF5K7gjcIs1T3xxGF8vRUSM6BJ5dIgoKWFkoM1 Ki/WBpcRPeWP2CZHr97hLFqsmV9kjG9I0ab45GUykmLo9WJiX+eKZ5xvCNtX3Wl+Ha4K hVpZdrPctq3kLusb96AyFcKaJG0JJKwnI/PyTNjbSShMSCZ6o0RExmLV4z4xtWO5qCdp H7+vn4wr1ZI60CFe9RV1LwplasLLopwis275Bo7rMgBaCOsNJ9VL+a+jNwGcpMRqMaSP UlRpwq9VrSuVLfbYNzT11qIx9Tui/EnN6DWGCuio/ldXMnyeKr6Jr1e9Gg/HyRtFo9Ra xV2g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent :content-transfer-encoding:references:in-reply-to:date:cc:to:from :subject:message-id:dkim-signature; bh=oCfVrtnwFAPBee3TXDqqJNkxhB5rYr5FRhkktjXW95k=; b=E+RMIIPFd33QvM188F9T9KYwB0X5NAgjsDyStep4iWNQGAsw/I/2soyvIaPP93njpu +7mDFknvsdzJB04DjCI0Hz8swRIXqZ0AyfwaWnaL0QTsGM/pRfriy+M8RZD+U5eZeWon PTtoGVxR88UYc3YwT4FEonN+40tJeuKc4o48Zm8+SLymfKwFFkPfJ+d6ztwyqrhXApUo sGWrml+IqHkIxuWIHRoSzA1lrUMk1HgYq9+vJ/9ymLTyqyLryRsAvUlpVojwLVY1x0RS JgdpYzQ4o6tDoKy36ElVK+rj/YnG0xxCCKz9aIV5Td22tMUBVIxoM+GsfszKO63ZiCnW dCOw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=RKYvE+7Z; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ay24-20020a17090b031800b00246973aef88si16055276pjb.29.2023.05.15.04.57.52; Mon, 15 May 2023 04:58:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=RKYvE+7Z; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241625AbjEOL4r (ORCPT + 99 others); Mon, 15 May 2023 07:56:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51272 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241567AbjEOL4K (ORCPT ); Mon, 15 May 2023 07:56:10 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C91CE3AA0; Mon, 15 May 2023 04:51:44 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 42E7F62250; Mon, 15 May 2023 11:51:44 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3A5A5C433D2; Mon, 15 May 2023 11:51:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1684151503; bh=3KSleyL7XQUaTkYDk+zv0P1xYUZAQVLII4WzE3eWxZ4=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=RKYvE+7ZbkB8x/YZzza6ok3IrA2k0ZWdqASIvRBYevL6vkOtNLLOJoTvZX/naiDXo Ghn0v76ehzPxIEFZd1JaXblVsUgee8xJTGPSlrx0+AYt7LQv92mvz/670qxEoZ52n1 NRUXU0amptFQ7ptS/PaGGMsy1cg9a0EZpf5ebGiaH03s3ujx3u7SpBD4oU+RunbiJ6 rxDAlZVqvU30xSPYwjDVbh6TIxkjnIZBcZIYzYVv1mM/nOci6GIfotJzGMsy00AR+l Sc8/YGqPizJ18RN+KOiz1csXqIzvz/haGdse7PGI5/06+C3ECWa5G7ImeubD+TIj2f ngi5LeCItgleA== Message-ID: <0dcd16bae001b3cbc51337e360341f9efb35470e.camel@kernel.org> Subject: Re: [PATCH v2 4/4] NFSD: handle GETATTR conflict with write delegation From: Jeff Layton To: Dai Ngo , chuck.lever@oracle.com Cc: linux-nfs@vger.kernel.org, linux-fsdevel@vger.kernel.org Date: Mon, 15 May 2023 07:51:41 -0400 In-Reply-To: <1684110038-11266-5-git-send-email-dai.ngo@oracle.com> References: <1684110038-11266-1-git-send-email-dai.ngo@oracle.com> <1684110038-11266-5-git-send-email-dai.ngo@oracle.com> Content-Type: text/plain; charset="ISO-8859-15" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.48.1 (3.48.1-1.fc38) MIME-Version: 1.0 X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Sun, 2023-05-14 at 17:20 -0700, Dai Ngo wrote: > If the GETATTR request on a file that has write delegation in effect > and the request attributes include the change info and size attribute > then the request is handled as below: >=20 > Server sends CB_GETATTR to client to get the latest change info and file > size. If these values are the same as the server's cached values then > the GETATTR proceeds as normal. >=20 > If either the change info or file size is different from the server's > cached values, or the file was already marked as modified, then: >=20 > . update time_modify and time_metadata into file's metadata > with current time >=20 > . encode GETATTR as normal except the file size is encoded with > the value returned from CB_GETATTR >=20 > . mark the file as modified >=20 > If the CB_GETATTR fails for any reasons, the delegation is recalled > and NFS4ERR_DELAY is returned for the GETATTR. >=20 > Signed-off-by: Dai Ngo > --- > fs/nfsd/nfs4state.c | 58 ++++++++++++++++++++++++++++++++++++ > fs/nfsd/nfs4xdr.c | 84 +++++++++++++++++++++++++++++++++++++++++++++++= +++++- > fs/nfsd/state.h | 7 +++++ > 3 files changed, 148 insertions(+), 1 deletion(-) >=20 > diff --git a/fs/nfsd/nfs4state.c b/fs/nfsd/nfs4state.c > index 09a9e16407f9..fb305b28a090 100644 > --- a/fs/nfsd/nfs4state.c > +++ b/fs/nfsd/nfs4state.c > @@ -127,6 +127,7 @@ static void free_session(struct nfsd4_session *); > =20 > static const struct nfsd4_callback_ops nfsd4_cb_recall_ops; > static const struct nfsd4_callback_ops nfsd4_cb_notify_lock_ops; > +static const struct nfsd4_callback_ops nfsd4_cb_getattr_ops; > =20 > static struct workqueue_struct *laundry_wq; > =20 > @@ -1175,6 +1176,10 @@ alloc_init_deleg(struct nfs4_client *clp, struct n= fs4_file *fp, > dp->dl_recalled =3D false; > nfsd4_init_cb(&dp->dl_recall, dp->dl_stid.sc_client, > &nfsd4_cb_recall_ops, NFSPROC4_CLNT_CB_RECALL); > + nfsd4_init_cb(&dp->dl_cb_fattr.ncf_getattr, dp->dl_stid.sc_client, > + &nfsd4_cb_getattr_ops, NFSPROC4_CLNT_CB_GETATTR); > + dp->dl_cb_fattr.ncf_file_modified =3D false; > + dp->dl_cb_fattr.ncf_cb_bmap[0] =3D FATTR4_WORD0_CHANGE | FATTR4_WORD0_S= IZE; > get_nfs4_file(fp); > dp->dl_stid.sc_file =3D fp; > return dp; > @@ -2882,11 +2887,49 @@ nfsd4_cb_recall_any_release(struct nfsd4_callback= *cb) > spin_unlock(&nn->client_lock); > } > =20 > +static int > +nfsd4_cb_getattr_done(struct nfsd4_callback *cb, struct rpc_task *task) > +{ > + struct nfs4_cb_fattr *ncf =3D > + container_of(cb, struct nfs4_cb_fattr, ncf_getattr); > + > + ncf->ncf_cb_status =3D task->tk_status; > + switch (task->tk_status) { > + case -NFS4ERR_DELAY: > + rpc_delay(task, 2 * HZ); > + return 0; > + default: > + return 1; > + } > +} > + > +static void > +nfsd4_cb_getattr_release(struct nfsd4_callback *cb) > +{ > + struct nfs4_cb_fattr *ncf =3D > + container_of(cb, struct nfs4_cb_fattr, ncf_getattr); > + > + clear_bit(CB_GETATTR_BUSY, &ncf->ncf_cb_flags); > + wake_up_bit(&ncf->ncf_cb_flags, CB_GETATTR_BUSY); > +} > + > static const struct nfsd4_callback_ops nfsd4_cb_recall_any_ops =3D { > .done =3D nfsd4_cb_recall_any_done, > .release =3D nfsd4_cb_recall_any_release, > }; > =20 > +static const struct nfsd4_callback_ops nfsd4_cb_getattr_ops =3D { > + .done =3D nfsd4_cb_getattr_done, > + .release =3D nfsd4_cb_getattr_release, > +}; > + > +void nfs4_cb_getattr(struct nfs4_cb_fattr *ncf) > +{ > + if (test_and_set_bit(CB_GETATTR_BUSY, &ncf->ncf_cb_flags)) > + return; > + nfsd4_run_cb(&ncf->ncf_getattr); > +} > + > static struct nfs4_client *create_client(struct xdr_netobj name, > struct svc_rqst *rqstp, nfs4_verifier *verf) > { > @@ -5591,6 +5634,8 @@ nfs4_open_delegation(struct nfsd4_open *open, struc= t nfs4_ol_stateid *stp, > int cb_up; > int status =3D 0; > u32 wdeleg =3D false; > + struct kstat stat; > + struct path path; > =20 > cb_up =3D nfsd4_cb_channel_good(oo->oo_owner.so_client); > open->op_recall =3D 0; > @@ -5626,6 +5671,19 @@ nfs4_open_delegation(struct nfsd4_open *open, stru= ct nfs4_ol_stateid *stp, > wdeleg =3D open->op_share_access & NFS4_SHARE_ACCESS_WRITE; > open->op_delegate_type =3D wdeleg ? > NFS4_OPEN_DELEGATE_WRITE : NFS4_OPEN_DELEGATE_READ; > + if (wdeleg) { > + path.mnt =3D currentfh->fh_export->ex_path.mnt; > + path.dentry =3D currentfh->fh_dentry; > + if (vfs_getattr(&path, &stat, STATX_BASIC_STATS, I think you want (STATX_SIZE|STATX_CTIME|STATX_CHANGE_COOKIE) here instead of BASIC_STATS. You might not get the change cookie otherwise, even when it's supported. > + AT_STATX_SYNC_AS_STAT)) { > + nfs4_put_stid(&dp->dl_stid); > + destroy_delegation(dp); > + goto out_no_deleg; > + } > + dp->dl_cb_fattr.ncf_cur_fsize =3D stat.size; > + dp->dl_cb_fattr.ncf_initial_cinfo =3D nfsd4_change_attribute(&stat, > + d_inode(currentfh->fh_dentry)); > + } > nfs4_put_stid(&dp->dl_stid); > return; > out_no_deleg: > diff --git a/fs/nfsd/nfs4xdr.c b/fs/nfsd/nfs4xdr.c > index 76db2fe29624..5d7e11db8ccf 100644 > --- a/fs/nfsd/nfs4xdr.c > +++ b/fs/nfsd/nfs4xdr.c > @@ -2920,6 +2920,77 @@ nfsd4_encode_bitmap(struct xdr_stream *xdr, u32 bm= val0, u32 bmval1, u32 bmval2) > return nfserr_resource; > } > =20 > +static struct file_lock * > +nfs4_wrdeleg_filelock(struct svc_rqst *rqstp, struct inode *inode) > +{ > + struct file_lock_context *ctx; > + struct file_lock *fl; > + > + ctx =3D locks_inode_context(inode); > + if (!ctx) > + return NULL; > + spin_lock(&ctx->flc_lock); > + list_for_each_entry(fl, &ctx->flc_lease, fl_list) { > + if (fl->fl_type =3D=3D F_WRLCK) { > + spin_unlock(&ctx->flc_lock); > + return fl; > + } > + } When there is a write lease, then there cannot be any read leases, so you don't need to walk the entire list here. Just check the first element and see whether it's a write lease. > + spin_unlock(&ctx->flc_lock); > + return NULL; > +} > + > +static __be32 > +nfs4_handle_wrdeleg_conflict(struct svc_rqst *rqstp, struct inode *inode= , > + bool *modified, u64 *size) > +{ > + __be32 status; > + struct file_lock *fl; > + struct nfs4_delegation *dp; > + struct nfs4_cb_fattr *ncf; > + struct iattr attrs; > + > + *modified =3D false; > + fl =3D nfs4_wrdeleg_filelock(rqstp, inode); > + if (!fl) > + return 0; > + dp =3D fl->fl_owner; > + ncf =3D &dp->dl_cb_fattr; > + if (dp->dl_recall.cb_clp =3D=3D *(rqstp->rq_lease_breaker)) > + return 0; > + > + refcount_inc(&dp->dl_stid.sc_count); > + nfs4_cb_getattr(&dp->dl_cb_fattr); > + wait_on_bit(&ncf->ncf_cb_flags, CB_GETATTR_BUSY, TASK_INTERRUPTIBLE); > + if (ncf->ncf_cb_status) { > + status =3D nfserrno(nfsd_open_break_lease(inode, NFSD_MAY_READ)); > + nfs4_put_stid(&dp->dl_stid); > + return status; > + } > + ncf->ncf_cur_fsize =3D ncf->ncf_cb_fsize; > + if (!ncf->ncf_file_modified && > + (ncf->ncf_initial_cinfo !=3D ncf->ncf_cb_change || > + ncf->ncf_cur_fsize !=3D ncf->ncf_cb_fsize)) { > + ncf->ncf_file_modified =3D true; > + } > + > + if (ncf->ncf_file_modified) { > + /* > + * The server would not update the file's metadata > + * with the client's modified size. > + * nfsd4 change attribute is constructed from ctime. > + */ > + attrs.ia_mtime =3D attrs.ia_ctime =3D current_time(inode); > + attrs.ia_valid =3D ATTR_MTIME | ATTR_CTIME; > + setattr_copy(&nop_mnt_idmap, inode, &attrs); > + mark_inode_dirty(inode); > + *size =3D ncf->ncf_cur_fsize; > + *modified =3D true; > + } > + nfs4_put_stid(&dp->dl_stid); > + return 0; > +} > + > /* > * Note: @fhp can be NULL; in this case, we might have to compose the fi= lehandle > * ourselves. > @@ -2957,6 +3028,8 @@ nfsd4_encode_fattr(struct xdr_stream *xdr, struct s= vc_fh *fhp, > .dentry =3D dentry, > }; > struct nfsd_net *nn =3D net_generic(SVC_NET(rqstp), nfsd_net_id); > + bool file_modified; > + u64 size =3D 0; > =20 > BUG_ON(bmval1 & NFSD_WRITEONLY_ATTRS_WORD1); > BUG_ON(!nfsd_attrs_supported(minorversion, bmval)); > @@ -2966,6 +3039,12 @@ nfsd4_encode_fattr(struct xdr_stream *xdr, struct = svc_fh *fhp, > if (status) > goto out; > } > + if (bmval0 & (FATTR4_WORD0_CHANGE | FATTR4_WORD0_SIZE)) { > + status =3D nfs4_handle_wrdeleg_conflict(rqstp, d_inode(dentry), > + &file_modified, &size); > + if (status) > + goto out; > + } > =20 > err =3D vfs_getattr(&path, &stat, > STATX_BASIC_STATS | STATX_BTIME | STATX_CHANGE_COOKIE, > @@ -3089,7 +3168,10 @@ nfsd4_encode_fattr(struct xdr_stream *xdr, struct = svc_fh *fhp, > p =3D xdr_reserve_space(xdr, 8); > if (!p) > goto out_resource; > - p =3D xdr_encode_hyper(p, stat.size); > + if (file_modified) > + p =3D xdr_encode_hyper(p, size); > + else > + p =3D xdr_encode_hyper(p, stat.size); > } > if (bmval0 & FATTR4_WORD0_LINK_SUPPORT) { > p =3D xdr_reserve_space(xdr, 4); > diff --git a/fs/nfsd/state.h b/fs/nfsd/state.h > index 9fb69ed8ae80..b20b65fe89b4 100644 > --- a/fs/nfsd/state.h > +++ b/fs/nfsd/state.h > @@ -121,6 +121,10 @@ struct nfs4_cb_fattr { > struct nfsd4_callback ncf_getattr; > u32 ncf_cb_status; > u32 ncf_cb_bmap[1]; > + unsigned long ncf_cb_flags; > + bool ncf_file_modified; > + u64 ncf_initial_cinfo; > + u64 ncf_cur_fsize; > =20 > /* from CB_GETATTR reply */ > u64 ncf_cb_change; > @@ -744,6 +748,9 @@ extern void nfsd4_client_record_remove(struct nfs4_cl= ient *clp); > extern int nfsd4_client_record_check(struct nfs4_client *clp); > extern void nfsd4_record_grace_done(struct nfsd_net *nn); > =20 > +/* CB_GETTTAR */ > +extern void nfs4_cb_getattr(struct nfs4_cb_fattr *ncf); > + > static inline bool try_to_expire_client(struct nfs4_client *clp) > { > cmpxchg(&clp->cl_state, NFSD4_COURTESY, NFSD4_EXPIRABLE); --=20 Jeff Layton