Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp4099901rwd; Mon, 29 May 2023 23:58:00 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7g66yUO9OY1TC5DmeeypwBGCUD9b5saeiVzBDJVKi5veIzVsIge9A084lfloUisP8+KRnV X-Received: by 2002:a05:6a00:a8e:b0:644:18fe:91cc with SMTP id b14-20020a056a000a8e00b0064418fe91ccmr1711620pfl.12.1685429880130; Mon, 29 May 2023 23:58:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685429880; cv=none; d=google.com; s=arc-20160816; b=0F5nOdkXMzm8h0/LYdZkFYiCCpcKpg9ysHDaZbraqvHA5NsICuqc6Lt25ABD7+8vzq 957PRktznzw5+0T51S9K9AxE8UgMuiqT2tKouFtyWJwTGfuEeXQORTNxRPsrLAqzjFpW jiubd81X+RI9b2pReV/2pcn4fsfPhjlMWf3cmgLnjYYd6uXZ5kLEWEMHYPLRrhCVU8ao 9KK6vxhZpvDq56FrTGAW6e4A0T58vCS9KDmd3oxVEKlhWw2pQJ94xChHVV9s0fqRYMom Umeo9BfaL4SD8R60A3Z0RJl8CV6vjVZAuHoNWyS2rGUPtFoCK9OUG42Iyf+MDWgs+9gm LtyA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from:dkim-signature; bh=awWsfzTxb+WAPRXH0ReE6k8A9YBXUtV652Nadj+619o=; b=F/7e2yhz34jGdeQHLu22bCAk4tOiRDGFhP75udJFUul7kmldt4UtQba561TSOp4LfZ A+uDl3DogLorDr2Njz1GlSl2w59qazO/OZuJQ5E48RY+6LCsnoKQ3xYT/G/jTTsMjL7H 7wQtMBi5Pw3yUhYS/3TakXKa8dIsoi7MdZLO/3pO+gVwyOB6QQzfv1tlOJmH9bmiuXhB FcO/4xNYA01kM2nXA6OgUfBo9kTjgG2RTunoWHAZygHm1bXl2tgTCoasalbmU99OKuhL R+ZqIbrvaqW5oFiWPaHngiHHygoGpl8Kuu5Xn6vwxqDsb/PQINtWPheJmUs7/ibu97Rj xySQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2023-03-30 header.b=XDbz16+v; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id v202-20020a6361d3000000b0053f53139199si6217507pgb.856.2023.05.29.23.57.46; Mon, 29 May 2023 23:58:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2023-03-30 header.b=XDbz16+v; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230177AbjE3Gwn (ORCPT + 99 others); Tue, 30 May 2023 02:52:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36126 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230115AbjE3Gwi (ORCPT ); Tue, 30 May 2023 02:52:38 -0400 Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7E47AF4; Mon, 29 May 2023 23:52:37 -0700 (PDT) Received: from pps.filterd (m0246630.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 34U5kvr3006039; Tue, 30 May 2023 06:52:34 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : in-reply-to : references; s=corp-2023-03-30; bh=awWsfzTxb+WAPRXH0ReE6k8A9YBXUtV652Nadj+619o=; b=XDbz16+vz+L14KDgtVCiP9E+7s9Gh+jRHxcDqna/YgytT5aeeqWoIkUwHksWTChCFB/d cvd3BTf4vdRrDcxCsR0LZvPcT1DndbJ8HbJ0rRI21aRKc1t9+dOovceGBbQs4+6VGjj1 r2TL5g0tItPnrz1IKUEX+gaUdh0ZmFohxMlkGguF9XH0dt5UwPLeE8Upb5UVO9pmEqfn 3JfCt0AH6qhHwqRXGmTGL/lrvDYfTWDiHT/RhLGTUBcsKpvFr9QUP01L/HFygHjkBejR 4A7jNfsKLDrbyk9apm51uGh13pp6W1UkVyq2POTa5L17mnNPUDwNldXLs/8iydavSU4S EA== Received: from iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta02.appoci.oracle.com [147.154.18.20]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 3qvhww9xav-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 30 May 2023 06:52:34 +0000 Received: from pps.filterd (iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com (8.17.1.19/8.17.1.19) with ESMTP id 34U6V748000380; Tue, 30 May 2023 06:52:33 GMT Received: from pps.reinject (localhost [127.0.0.1]) by iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 3qu8q7uea7-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 30 May 2023 06:52:33 +0000 Received: from iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by pps.reinject (8.17.1.5/8.17.1.5) with ESMTP id 34U6qWoq004059; Tue, 30 May 2023 06:52:33 GMT Received: from ca-common-hq.us.oracle.com (ca-common-hq.us.oracle.com [10.211.9.209]) by iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTP id 3qu8q7ue9a-2; Tue, 30 May 2023 06:52:33 +0000 From: Dai Ngo To: chuck.lever@oracle.com, jlayton@kernel.org Cc: linux-nfs@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: [PATCH v2 1/2] NFSD: handle GETATTR conflict with write delegation Date: Mon, 29 May 2023 23:52:16 -0700 Message-Id: <1685429537-11855-2-git-send-email-dai.ngo@oracle.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1685429537-11855-1-git-send-email-dai.ngo@oracle.com> References: <1685429537-11855-1-git-send-email-dai.ngo@oracle.com> X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.957,Hydra:6.0.573,FMLib:17.11.176.26 definitions=2023-05-30_04,2023-05-29_02,2023-05-22_02 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 bulkscore=0 mlxscore=0 mlxlogscore=999 suspectscore=0 malwarescore=0 adultscore=0 phishscore=0 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2304280000 definitions=main-2305300056 X-Proofpoint-ORIG-GUID: Go2_EajrQe6hKvnwE3LQpE1qK3TpV1aN X-Proofpoint-GUID: Go2_EajrQe6hKvnwE3LQpE1qK3TpV1aN X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org If the GETATTR request on a file that has write delegation in effect and the request attributes include the change info and size attribute then the write delegation is recalled. If the delegation is returned within 30ms then the GETATTR is serviced as normal otherwise the NFS4ERR_DELAY error is returned for the GETATTR. Signed-off-by: Dai Ngo --- fs/nfsd/nfs4state.c | 50 ++++++++++++++++++++++++++++++++++++++++++++++++++ fs/nfsd/nfs4xdr.c | 5 +++++ fs/nfsd/state.h | 3 +++ 3 files changed, 58 insertions(+) diff --git a/fs/nfsd/nfs4state.c b/fs/nfsd/nfs4state.c index b90b74a5e66e..7826483e8421 100644 --- a/fs/nfsd/nfs4state.c +++ b/fs/nfsd/nfs4state.c @@ -8353,3 +8353,53 @@ nfsd4_get_writestateid(struct nfsd4_compound_state *cstate, { get_stateid(cstate, &u->write.wr_stateid); } + +/** + * nfsd4_deleg_getattr_conflict - Trigger recall if GETATTR causes conflict + * @rqstp: RPC transaction context + * @inode: file to be checked for a conflict + * + * This function is called when there is a conflict between a write + * delegation and a change/size GETATR from another client. The server + * must either use the CB_GETATTR to get the current values of the + * attributes from the client that hold the delegation or recall the + * delegation before replying to the GETATTR. See RFC 8881 section + * 18.7.4. + * + * Returns 0 if there is no conflict; otherwise an nfs_stat + * code is returned. + */ +__be32 +nfsd4_deleg_getattr_conflict(struct svc_rqst *rqstp, struct inode *inode) +{ + __be32 status; + struct file_lock_context *ctx; + struct file_lock *fl; + struct nfs4_delegation *dp; + + ctx = locks_inode_context(inode); + if (!ctx) + return 0; + spin_lock(&ctx->flc_lock); + list_for_each_entry(fl, &ctx->flc_lease, fl_list) { + if (fl->fl_flags == FL_LAYOUT || + fl->fl_lmops != &nfsd_lease_mng_ops) + continue; + if (fl->fl_type == F_WRLCK) { + dp = fl->fl_owner; + if (dp->dl_recall.cb_clp == *(rqstp->rq_lease_breaker)) { + spin_unlock(&ctx->flc_lock); + return 0; + } + spin_unlock(&ctx->flc_lock); + status = nfserrno(nfsd_open_break_lease(inode, NFSD_MAY_READ)); + if (status != nfserr_jukebox || + !nfsd_wait_for_delegreturn(rqstp, inode)) + return status; + return 0; + } + break; + } + spin_unlock(&ctx->flc_lock); + return 0; +} diff --git a/fs/nfsd/nfs4xdr.c b/fs/nfsd/nfs4xdr.c index b83954fc57e3..4590b893dbc8 100644 --- a/fs/nfsd/nfs4xdr.c +++ b/fs/nfsd/nfs4xdr.c @@ -2970,6 +2970,11 @@ nfsd4_encode_fattr(struct xdr_stream *xdr, struct svc_fh *fhp, if (status) goto out; } + if (bmval0 & (FATTR4_WORD0_CHANGE | FATTR4_WORD0_SIZE)) { + status = nfsd4_deleg_getattr_conflict(rqstp, d_inode(dentry)); + if (status) + goto out; + } err = vfs_getattr(&path, &stat, STATX_BASIC_STATS | STATX_BTIME | STATX_CHANGE_COOKIE, diff --git a/fs/nfsd/state.h b/fs/nfsd/state.h index d49d3060ed4f..cbddcf484dba 100644 --- a/fs/nfsd/state.h +++ b/fs/nfsd/state.h @@ -732,4 +732,7 @@ static inline bool try_to_expire_client(struct nfs4_client *clp) cmpxchg(&clp->cl_state, NFSD4_COURTESY, NFSD4_EXPIRABLE); return clp->cl_state == NFSD4_EXPIRABLE; } + +extern __be32 nfsd4_deleg_getattr_conflict(struct svc_rqst *rqstp, + struct inode *inode); #endif /* NFSD4_STATE_H */ -- 2.9.5