Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp2541478rwd; Mon, 15 May 2023 13:11:36 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4IsxLNALa9P0MaIfZrR6IFetIdJSaKVgBkyW8rlloXwjqUrcnA6CaBc7yN9MfRJOPPdPmA X-Received: by 2002:a05:6a21:9987:b0:100:c3ad:79a8 with SMTP id ve7-20020a056a21998700b00100c3ad79a8mr35200324pzb.1.1684181495636; Mon, 15 May 2023 13:11:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1684181495; cv=none; d=google.com; s=arc-20160816; b=Zzga6HFkviTdR7ktUyEH85Z3aPwodDrCUGDyNbuVJ2VsfTroiZXe8hVCevqIZXwnen HTmZBckLDwjlnZ1614IEMEK5OudGcTiqdQYalcyIuJTfKpgAmRNQfczMpcrcUcL+h3Uk LX1nosmnjLM2n/2C2eeByXJ2Ipj+OmkDqhKiJQc31gXZTrKlFMAhF96JAExymbpvf1mo x6dV16OcLJBFZ/lBxQdIXFuUIxKUqqdotH5Rs+utDgSEzdSj5fSmTvw67obz04d3Cwek iL6BwvFbMJN1JIgekx6CopkjHpMpNaKg9N7xNHFh/8Ga1S4czUIkOp00HikHr9XQ9eOe nlPQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=Z3Fc/bkKEg4eKdqY9bvrYpcOUvkaXPSLdbl5To19DJg=; b=AL9ozTUDYqxlla/Ulwe9MW+qo7CTk0uSrJR+pjl6QAqmAGqWkLheiXBRhmx1mgm7T7 wBzoce4dP4tAv+3HZPomIqUa46bydbBhFUcyr34yTYn1qAhTDa3Fc+tApIr2rWjUm95H JwTt6KKdtuyHK0QSiR2YJdj0ZUT7ILA4gn3RBSkJlW3kR7khYrA0wuGCm8e5EW+qNDG+ 28fkDq3tfg5JQ2LXF/mZq/2kx5e6x/eHlawx1sY4H0whY8TOH9syEcpwx4KTY7d660EQ YN4TVHuABMG1hx6mYrKNe/Mbsfk7UzgtTQv5G/e30vsAyTk9mEEdvFFj2eDab+uPC1zP q14Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@umich.edu header.s=google-2016-06-03 header.b=pTkLVGDl; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=umich.edu Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f29-20020a63381d000000b0052c8dda0f66si17241005pga.161.2023.05.15.13.11.14; Mon, 15 May 2023 13:11:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@umich.edu header.s=google-2016-06-03 header.b=pTkLVGDl; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=umich.edu Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244867AbjEOUKe (ORCPT + 99 others); Mon, 15 May 2023 16:10:34 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58062 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243766AbjEOUKc (ORCPT ); Mon, 15 May 2023 16:10:32 -0400 Received: from mail-lj1-x22a.google.com (mail-lj1-x22a.google.com [IPv6:2a00:1450:4864:20::22a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F0D1011608; Mon, 15 May 2023 13:10:29 -0700 (PDT) Received: by mail-lj1-x22a.google.com with SMTP id 38308e7fff4ca-2ada1927e20so12441921fa.0; Mon, 15 May 2023 13:10:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=umich.edu; s=google-2016-06-03; t=1684181428; x=1686773428; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=Z3Fc/bkKEg4eKdqY9bvrYpcOUvkaXPSLdbl5To19DJg=; b=pTkLVGDlLfm8d8LpdMNPYvYDYXpXQtkFpCJPahglZbvvngCd7ITVi15TVcyyAUdvuO mIC3Ei1HCt7jyh6/e8efkbFHfkAngTN+SOIFYzewj8VHehhAIctrHvwtOgtOab7W6jRJ guVg6H1pXqNIlbtDv01C1EDAc8PupgesdxBY0GXgxrjmHIRndkI3pWk8nsLfh6TPcikO PgV6fqCBgGecTPFb8l8pHrPF5x1/fj3V3eFv17UnUz9/KG8iuFwyLp0J+UogS/LXr/3A Xm5lv46uycbOVg1epTuqXFqh/fZpcVPmGcLtAaQg1vIRnb/8WO9bL+rEcwRonzCvgLnY uCdQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1684181428; x=1686773428; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Z3Fc/bkKEg4eKdqY9bvrYpcOUvkaXPSLdbl5To19DJg=; b=QyEHT393NaMW6IBhPSkJq1HVfodZIsWTivrWICCHEaSUgbud44cXQwwGFqAouiVfYj uG+vUMGH0K+FAx5m8jcmmNL1i4N+l4DQ35XWTsKeAksqPSkqDMHhZOLNqHIceZUw7R5J TdBspmgmkP3LJa2njQcf9BQnmazQCSQilvtsTQfY9nEkXiRq44Mb+X8aKKKtvTf3gTZY 1SS4ZIhBS75dfawEsY7z8+ZLb64QPF4d4ylzxwKlp08e1CFKWDL6Vemlun9Av1X8yKnP SaVAfePe+RoaYToNKnvObdVLp59vDIbx6ToxEBKoCgsCbUvqCYEA1dmIwXFWf6flb9Xn LSHA== X-Gm-Message-State: AC+VfDxfFTah21Kd96phquluSMq3rhupDXOUdzbPVPOnCZxZDwojf71F UwwdyCV95ou9LUHycJqwZEytN/kq/zd/brWIfu4= X-Received: by 2002:a2e:b534:0:b0:2ac:90d2:fe9a with SMTP id z20-20020a2eb534000000b002ac90d2fe9amr2627105ljm.5.1684181427691; Mon, 15 May 2023 13:10:27 -0700 (PDT) MIME-Version: 1.0 References: <1684110038-11266-1-git-send-email-dai.ngo@oracle.com> <1684110038-11266-5-git-send-email-dai.ngo@oracle.com> <392379f7-4e28-fae5-a799-00b4e35fe6fd@oracle.com> <5318a050cbe6e89ae0949c654545ae8998ff7795.camel@kernel.org> In-Reply-To: <5318a050cbe6e89ae0949c654545ae8998ff7795.camel@kernel.org> From: Olga Kornievskaia Date: Mon, 15 May 2023 16:10:16 -0400 Message-ID: Subject: Re: [PATCH v2 4/4] NFSD: handle GETATTR conflict with write delegation To: Jeff Layton Cc: dai.ngo@oracle.com, chuck.lever@oracle.com, linux-nfs@vger.kernel.org, linux-fsdevel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-1.5 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Mon, May 15, 2023 at 2:58=E2=80=AFPM Jeff Layton wr= ote: > > On Mon, 2023-05-15 at 11:26 -0700, dai.ngo@oracle.com wrote: > > On 5/15/23 11:14 AM, Olga Kornievskaia wrote: > > > On Sun, May 14, 2023 at 8:56=E2=80=AFPM Dai Ngo = wrote: > > > > If the GETATTR request on a file that has write delegation in effec= t > > > > and the request attributes include the change info and size attribu= te > > > > then the request is handled as below: > > > > > > > > Server sends CB_GETATTR to client to get the latest change info and= file > > > > size. If these values are the same as the server's cached values th= en > > > > the GETATTR proceeds as normal. > > > > > > > > If either the change info or file size is different from the server= 's > > > > cached values, or the file was already marked as modified, then: > > > > > > > > . update time_modify and time_metadata into file's metadata > > > > with current time > > > > > > > > . encode GETATTR as normal except the file size is encoded with > > > > the value returned from CB_GETATTR > > > > > > > > . mark the file as modified > > > > > > > > If the CB_GETATTR fails for any reasons, the delegation is recalled > > > > and NFS4ERR_DELAY is returned for the GETATTR. > > > Hi Dai, > > > > > > I'm curious what does the server gain by implementing handling of > > > GETATTR with delegations? As far as I can tell it is not strictly > > > required by the RFC(s). When the file is being written any attempt at > > > querying its attribute is immediately stale. > > > > Yes, you're right that handling of GETATTR with delegations is not > > required by the spec. The only benefit I see is that the server > > provides a more accurate state of the file as whether the file has > > been changed/updated since the client's last GETATTR. This allows > > the app on the client to take appropriate action (whatever that > > might be) when sharing files among multiple clients. > > > > > > From RFC 8881 10.4.3: > > "It should be noted that the server is under no obligation to use > CB_GETATTR, and therefore the server MAY simply recall the delegation to > avoid its use." This is a "MAY" which means the server can choose to not to and just return the info it currently has without recalling a delegation. > As I see it, the main benefit is that you avoid having to recall a write > delegation when someone does a drive-by stat() on the file (e.g. due to > a "ls -l" in its parent directory). > > > > > > > > Signed-off-by: Dai Ngo > > > > --- > > > > fs/nfsd/nfs4state.c | 58 ++++++++++++++++++++++++++++++++++++ > > > > fs/nfsd/nfs4xdr.c | 84 ++++++++++++++++++++++++++++++++++++++++= ++++++++++++- > > > > fs/nfsd/state.h | 7 +++++ > > > > 3 files changed, 148 insertions(+), 1 deletion(-) > > > > > > > > diff --git a/fs/nfsd/nfs4state.c b/fs/nfsd/nfs4state.c > > > > index 09a9e16407f9..fb305b28a090 100644 > > > > --- a/fs/nfsd/nfs4state.c > > > > +++ b/fs/nfsd/nfs4state.c > > > > @@ -127,6 +127,7 @@ static void free_session(struct nfsd4_session *= ); > > > > > > > > static const struct nfsd4_callback_ops nfsd4_cb_recall_ops; > > > > static const struct nfsd4_callback_ops nfsd4_cb_notify_lock_ops; > > > > +static const struct nfsd4_callback_ops nfsd4_cb_getattr_ops; > > > > > > > > static struct workqueue_struct *laundry_wq; > > > > > > > > @@ -1175,6 +1176,10 @@ alloc_init_deleg(struct nfs4_client *clp, st= ruct nfs4_file *fp, > > > > dp->dl_recalled =3D false; > > > > nfsd4_init_cb(&dp->dl_recall, dp->dl_stid.sc_client, > > > > &nfsd4_cb_recall_ops, NFSPROC4_CLNT_CB_RECAL= L); > > > > + nfsd4_init_cb(&dp->dl_cb_fattr.ncf_getattr, dp->dl_stid.sc_= client, > > > > + &nfsd4_cb_getattr_ops, NFSPROC4_CLNT_CB_GET= ATTR); > > > > + dp->dl_cb_fattr.ncf_file_modified =3D false; > > > > + dp->dl_cb_fattr.ncf_cb_bmap[0] =3D FATTR4_WORD0_CHANGE | FA= TTR4_WORD0_SIZE; > > > > get_nfs4_file(fp); > > > > dp->dl_stid.sc_file =3D fp; > > > > return dp; > > > > @@ -2882,11 +2887,49 @@ nfsd4_cb_recall_any_release(struct nfsd4_ca= llback *cb) > > > > spin_unlock(&nn->client_lock); > > > > } > > > > > > > > +static int > > > > +nfsd4_cb_getattr_done(struct nfsd4_callback *cb, struct rpc_task *= task) > > > > +{ > > > > + struct nfs4_cb_fattr *ncf =3D > > > > + container_of(cb, struct nfs4_cb_fattr, ncf_getattr)= ; > > > > + > > > > + ncf->ncf_cb_status =3D task->tk_status; > > > > + switch (task->tk_status) { > > > > + case -NFS4ERR_DELAY: > > > > + rpc_delay(task, 2 * HZ); > > > > + return 0; > > > > + default: > > > > + return 1; > > > > + } > > > > +} > > > > + > > > > +static void > > > > +nfsd4_cb_getattr_release(struct nfsd4_callback *cb) > > > > +{ > > > > + struct nfs4_cb_fattr *ncf =3D > > > > + container_of(cb, struct nfs4_cb_fattr, ncf_getattr)= ; > > > > + > > > > + clear_bit(CB_GETATTR_BUSY, &ncf->ncf_cb_flags); > > > > + wake_up_bit(&ncf->ncf_cb_flags, CB_GETATTR_BUSY); > > > > +} > > > > + > > > > static const struct nfsd4_callback_ops nfsd4_cb_recall_any_ops = =3D { > > > > .done =3D nfsd4_cb_recall_any_done, > > > > .release =3D nfsd4_cb_recall_any_release, > > > > }; > > > > > > > > +static const struct nfsd4_callback_ops nfsd4_cb_getattr_ops =3D { > > > > + .done =3D nfsd4_cb_getattr_done, > > > > + .release =3D nfsd4_cb_getattr_release, > > > > +}; > > > > + > > > > +void nfs4_cb_getattr(struct nfs4_cb_fattr *ncf) > > > > +{ > > > > + if (test_and_set_bit(CB_GETATTR_BUSY, &ncf->ncf_cb_flags)) > > > > + return; > > > > + nfsd4_run_cb(&ncf->ncf_getattr); > > > > +} > > > > + > > > > static struct nfs4_client *create_client(struct xdr_netobj name, > > > > struct svc_rqst *rqstp, nfs4_verifier *verf) > > > > { > > > > @@ -5591,6 +5634,8 @@ nfs4_open_delegation(struct nfsd4_open *open,= struct nfs4_ol_stateid *stp, > > > > int cb_up; > > > > int status =3D 0; > > > > u32 wdeleg =3D false; > > > > + struct kstat stat; > > > > + struct path path; > > > > > > > > cb_up =3D nfsd4_cb_channel_good(oo->oo_owner.so_client); > > > > open->op_recall =3D 0; > > > > @@ -5626,6 +5671,19 @@ nfs4_open_delegation(struct nfsd4_open *open= , struct nfs4_ol_stateid *stp, > > > > wdeleg =3D open->op_share_access & NFS4_SHARE_ACCESS_WRITE= ; > > > > open->op_delegate_type =3D wdeleg ? > > > > NFS4_OPEN_DELEGATE_WRITE : NFS4_OPEN_DELEG= ATE_READ; > > > > + if (wdeleg) { > > > > + path.mnt =3D currentfh->fh_export->ex_path.mnt; > > > > + path.dentry =3D currentfh->fh_dentry; > > > > + if (vfs_getattr(&path, &stat, STATX_BASIC_STATS, > > > > + AT_STATX_SYNC_AS_ST= AT)) { > > > > + nfs4_put_stid(&dp->dl_stid); > > > > + destroy_delegation(dp); > > > > + goto out_no_deleg; > > > > + } > > > > + dp->dl_cb_fattr.ncf_cur_fsize =3D stat.size; > > > > + dp->dl_cb_fattr.ncf_initial_cinfo =3D nfsd4_change_= attribute(&stat, > > > > + d_inode(cur= rentfh->fh_dentry)); > > > > + } > > > > nfs4_put_stid(&dp->dl_stid); > > > > return; > > > > out_no_deleg: > > > > diff --git a/fs/nfsd/nfs4xdr.c b/fs/nfsd/nfs4xdr.c > > > > index 76db2fe29624..5d7e11db8ccf 100644 > > > > --- a/fs/nfsd/nfs4xdr.c > > > > +++ b/fs/nfsd/nfs4xdr.c > > > > @@ -2920,6 +2920,77 @@ nfsd4_encode_bitmap(struct xdr_stream *xdr, = u32 bmval0, u32 bmval1, u32 bmval2) > > > > return nfserr_resource; > > > > } > > > > > > > > +static struct file_lock * > > > > +nfs4_wrdeleg_filelock(struct svc_rqst *rqstp, struct inode *inode) > > > > +{ > > > > + struct file_lock_context *ctx; > > > > + struct file_lock *fl; > > > > + > > > > + ctx =3D locks_inode_context(inode); > > > > + if (!ctx) > > > > + return NULL; > > > > + spin_lock(&ctx->flc_lock); > > > > + list_for_each_entry(fl, &ctx->flc_lease, fl_list) { > > > > + if (fl->fl_type =3D=3D F_WRLCK) { > > > > + spin_unlock(&ctx->flc_lock); > > > > + return fl; > > > > + } > > > > + } > > > > + spin_unlock(&ctx->flc_lock); > > > > + return NULL; > > > > +} > > > > + > > > > +static __be32 > > > > +nfs4_handle_wrdeleg_conflict(struct svc_rqst *rqstp, struct inode = *inode, > > > > + bool *modified, u64 *size) > > > > +{ > > > > + __be32 status; > > > > + struct file_lock *fl; > > > > + struct nfs4_delegation *dp; > > > > + struct nfs4_cb_fattr *ncf; > > > > + struct iattr attrs; > > > > + > > > > + *modified =3D false; > > > > + fl =3D nfs4_wrdeleg_filelock(rqstp, inode); > > > > + if (!fl) > > > > + return 0; > > > > + dp =3D fl->fl_owner; > > > > + ncf =3D &dp->dl_cb_fattr; > > > > + if (dp->dl_recall.cb_clp =3D=3D *(rqstp->rq_lease_breaker)) > > > > + return 0; > > > > + > > > > + refcount_inc(&dp->dl_stid.sc_count); > > > > + nfs4_cb_getattr(&dp->dl_cb_fattr); > > > > + wait_on_bit(&ncf->ncf_cb_flags, CB_GETATTR_BUSY, TASK_INTER= RUPTIBLE); > > > > + if (ncf->ncf_cb_status) { > > > > + status =3D nfserrno(nfsd_open_break_lease(inode, NF= SD_MAY_READ)); > > > > + nfs4_put_stid(&dp->dl_stid); > > > > + return status; > > > > + } > > > > + ncf->ncf_cur_fsize =3D ncf->ncf_cb_fsize; > > > > + if (!ncf->ncf_file_modified && > > > > + (ncf->ncf_initial_cinfo !=3D ncf->ncf_cb_ch= ange || > > > > + ncf->ncf_cur_fsize !=3D ncf->ncf_cb_fsize))= { > > > > + ncf->ncf_file_modified =3D true; > > > > + } > > > > + > > > > + if (ncf->ncf_file_modified) { > > > > + /* > > > > + * The server would not update the file's metadata > > > > + * with the client's modified size. > > > > + * nfsd4 change attribute is constructed from ctime= . > > > > + */ > > > > + attrs.ia_mtime =3D attrs.ia_ctime =3D current_time(= inode); > > > > + attrs.ia_valid =3D ATTR_MTIME | ATTR_CTIME; > > > > + setattr_copy(&nop_mnt_idmap, inode, &attrs); > > > > + mark_inode_dirty(inode); > > > > + *size =3D ncf->ncf_cur_fsize; > > > > + *modified =3D true; > > > > + } > > > > + nfs4_put_stid(&dp->dl_stid); > > > > + return 0; > > > > +} > > > > + > > > > /* > > > > * Note: @fhp can be NULL; in this case, we might have to compose= the filehandle > > > > * ourselves. > > > > @@ -2957,6 +3028,8 @@ nfsd4_encode_fattr(struct xdr_stream *xdr, st= ruct svc_fh *fhp, > > > > .dentry =3D dentry, > > > > }; > > > > struct nfsd_net *nn =3D net_generic(SVC_NET(rqstp), nfsd_n= et_id); > > > > + bool file_modified; > > > > + u64 size =3D 0; > > > > > > > > BUG_ON(bmval1 & NFSD_WRITEONLY_ATTRS_WORD1); > > > > BUG_ON(!nfsd_attrs_supported(minorversion, bmval)); > > > > @@ -2966,6 +3039,12 @@ nfsd4_encode_fattr(struct xdr_stream *xdr, s= truct svc_fh *fhp, > > > > if (status) > > > > goto out; > > > > } > > > > + if (bmval0 & (FATTR4_WORD0_CHANGE | FATTR4_WORD0_SIZE)) { > > > > + status =3D nfs4_handle_wrdeleg_conflict(rqstp, d_in= ode(dentry), > > > > + &file_modified, &si= ze); > > > > + if (status) > > > > + goto out; > > > > + } > > > > > > > > err =3D vfs_getattr(&path, &stat, > > > > STATX_BASIC_STATS | STATX_BTIME | STATX_= CHANGE_COOKIE, > > > > @@ -3089,7 +3168,10 @@ nfsd4_encode_fattr(struct xdr_stream *xdr, s= truct svc_fh *fhp, > > > > p =3D xdr_reserve_space(xdr, 8); > > > > if (!p) > > > > goto out_resource; > > > > - p =3D xdr_encode_hyper(p, stat.size); > > > > + if (file_modified) > > > > + p =3D xdr_encode_hyper(p, size); > > > > + else > > > > + p =3D xdr_encode_hyper(p, stat.size); > > > > } > > > > if (bmval0 & FATTR4_WORD0_LINK_SUPPORT) { > > > > p =3D xdr_reserve_space(xdr, 4); > > > > diff --git a/fs/nfsd/state.h b/fs/nfsd/state.h > > > > index 9fb69ed8ae80..b20b65fe89b4 100644 > > > > --- a/fs/nfsd/state.h > > > > +++ b/fs/nfsd/state.h > > > > @@ -121,6 +121,10 @@ struct nfs4_cb_fattr { > > > > struct nfsd4_callback ncf_getattr; > > > > u32 ncf_cb_status; > > > > u32 ncf_cb_bmap[1]; > > > > + unsigned long ncf_cb_flags; > > > > + bool ncf_file_modified; > > > > + u64 ncf_initial_cinfo; > > > > + u64 ncf_cur_fsize; > > > > > > > > /* from CB_GETATTR reply */ > > > > u64 ncf_cb_change; > > > > @@ -744,6 +748,9 @@ extern void nfsd4_client_record_remove(struct n= fs4_client *clp); > > > > extern int nfsd4_client_record_check(struct nfs4_client *clp); > > > > extern void nfsd4_record_grace_done(struct nfsd_net *nn); > > > > > > > > +/* CB_GETTTAR */ > > > > +extern void nfs4_cb_getattr(struct nfs4_cb_fattr *ncf); > > > > + > > > > static inline bool try_to_expire_client(struct nfs4_client *clp) > > > > { > > > > cmpxchg(&clp->cl_state, NFSD4_COURTESY, NFSD4_EXPIRABLE); > > > > -- > > > > 2.9.5 > > > > > > -- > Jeff Layton