Received: by 2002:a89:288:0:b0:1f7:eeee:6653 with SMTP id j8csp140495lqh; Mon, 6 May 2024 14:04:18 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXfwxKK+oZ50CYU6/3fN8lNc0b9yYiwQbjky8PfCH9dSc8xb5zM9Fs6/V9pwaL/FmqqkiIuXCPd06p6037Sz8joP55bdNymHcFVpU8bbQ== X-Google-Smtp-Source: AGHT+IF/r6fPIz8DjbxkDCPXomtiGkQiVrx08+GrvtZJqzN5MkLQ53f9v7nvQOsx87wHREi8TDxH X-Received: by 2002:a17:90a:fd89:b0:2a2:f4f4:2c4a with SMTP id 98e67ed59e1d1-2b5bc2c8dc9mr1129085a91.21.1715029458372; Mon, 06 May 2024 14:04:18 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1715029458; cv=pass; d=google.com; s=arc-20160816; b=YgN7J6zG02ZV4xZQA8MFTTXiL55AOtuWrJd8PQA0BnVcwq5iahUqfDnjJK1a8cEG5c lQIoljjCEMc5/BWu7GNn7i0xcYpU27Mc2cIRDQkk9MriYPw/HtYxkCgAc/ZX3LJEPalB kUi/EQPURZ73QrPeauZaNQQ51wQYhgQQWi6TeDRhH7gunBZetpiWweqMwTmnmxq+UYxi jfk++mrzXrmdY7Ta+O7d3uzQ76lmIeGap+7JpZ7YM3T/s/wVPuQ7Pb0d0+QJ6HCjrym8 zy3YUaQrdzlOkVqlnJCxP4A/pJPr0sj6Xpg74B9arScZVBFTyJ17nJKqa+5GEWqNlY6N xzeQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=Zykf161P6KhSMB/Do/gP527EbB5nAMjj4I24S8k/1I8=; fh=PtHAaexXubJMN0SUXNM6xFPH8yz+/kYpWu1buuWcQuc=; b=LArySRB9tF0c0fhWfjqoBNYmAL211mypraS4z/vt1kCC685TmjOe60f1xamaEv2H+E GxPLa3OmBhF+edZIXWdiQfiWDjYQki0A2ZgDDgy1XR3/8Ofm53QnhPLkBD75e/o6KbdL FfAxOVeXS10NsD6Uu35UAHQM3fMzmzPs7jVSPg/NXcK40epo31hCgN4hyoK7K1v8JlHq UyB0Wn5858VxyizbfDzLH6dpopamwVSOmeLsonl4MKITpW6iuWnrzaUF0z+qvBb8tlcG Ie2jPdUvCxpKJrnAtrpm2mhCX8hHHGFe+Snx4v1sAgw6aMonknriwv4fICUEsfwjdfhn c3FQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=GgtKXXQi; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-nfs+bounces-3182-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-nfs+bounces-3182-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id j15-20020a17090ae60f00b0029bd4f70048si11134117pjy.170.2024.05.06.14.04.17 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 06 May 2024 14:04:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs+bounces-3182-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=GgtKXXQi; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-nfs+bounces-3182-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-nfs+bounces-3182-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 34B5DB21858 for ; Mon, 6 May 2024 21:04:16 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 14CBA446AC; Mon, 6 May 2024 21:04:13 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="GgtKXXQi" X-Original-To: linux-nfs@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E4758EBB for ; Mon, 6 May 2024 21:04:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715029453; cv=none; b=HFZZD/i6alWxuYq51Yl9AZ8FmUGpP+WYObegQ++X7vYPUop9kJh/tQlqbODBGUxFQGdS05U42/GNVQqlBumgZdTwUyaorezVv3VVeRxxVRMEl66KaEeFJ0T6H32cKSeVAFvH/82mKGppYEcc9BPcgkTX5ULg2WTIcFnOiGvnzkw= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715029453; c=relaxed/simple; bh=84LaucSvuIO29dKS79xg+PYhSZWeRGW+mEGw/ORS+tI=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=bT377ZbTL+aig2LU1sKAsjmzOy8vzuIaXIvY+Ll/K11mt+cCMgQHVhRWvAIaq6HXcJNJADyUbtKD6TLLn84hJv5VYaHun/pu3huHrpXHQn6Ofw9pC55yLC4YshUQ+7ufD0fgaDm2sQ3+l3wLDXKDMxsnglZuN6hGe2/IUSSXTYc= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=GgtKXXQi; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3A1BFC116B1; Mon, 6 May 2024 21:04:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1715029452; bh=84LaucSvuIO29dKS79xg+PYhSZWeRGW+mEGw/ORS+tI=; h=From:To:Cc:Subject:Date:From; b=GgtKXXQiK/LQyDkdJf/JXJrCUTxGL3i6ZM17VJBMPLOI7gC7xSlqEgM42186VZTOG IBX0kcNWeAI3dxzF2oulsuvP86agCo1J+MienIti37gXCzkLNSR44buiQeZWuD4olY 5QISFA+v2RW335A4ZOd06z+V+wNDXnpTGFi9WoJ/puBuGmDKHNKre2L6NZuzBZ75WM Yt/1pW1/Bnhg4Pq6+oXnU8O/g1PzikhTqYh8w0nU3AJaQdR4X8B3XZGOBcjr02MH1L nx9X5Ypi+teweRapf+QhdSB5wnNCgFZGQAsVTaB+H8n25XPdMGUx4ehOHuCb2VxO6n vb01tfAyg14TQ== From: cel@kernel.org To: Cc: Chuck Lever Subject: [RFC PATCH] NFSD: Force all NFSv4.2 COPY requests to be synchronous Date: Mon, 6 May 2024 17:04:08 -0400 Message-ID: <20240506210408.4760-1-cel@kernel.org> X-Mailer: git-send-email 2.44.0 Precedence: bulk X-Mailing-List: linux-nfs@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit From: Chuck Lever We've discovered that delivering a CB_OFFLOAD operation can be unreliable in some pretty unremarkable situations, and the Linux NFS client does not yet support sending an OFFLOAD_STATUS operation to probe whether an asynchronous COPY operation has finished. On Linux NFS clients, COPY can hang until manually interrupted. I've tried a couple of remedies, but so far the side-effects are worse than the disease. For now, force COPY operations to be synchronous so that the use of CB_OFFLOAD is avoided entirely. I have some patches that add an OFFLOAD_STATUS implementation to the Linux NFS client, but that is not likely to fix older clients. Signed-off-by: Chuck Lever --- fs/nfsd/nfs4proc.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/fs/nfsd/nfs4proc.c b/fs/nfsd/nfs4proc.c index ea3cc3e870a7..12722c709cc6 100644 --- a/fs/nfsd/nfs4proc.c +++ b/fs/nfsd/nfs4proc.c @@ -1807,6 +1807,13 @@ nfsd4_copy(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, __be32 status; struct nfsd4_copy *async_copy = NULL; + /* + * Currently, async COPY is not reliable. Force all COPY + * requests to be synchronous to avoid client application + * hangs waiting for completion. + */ + nfsd4_copy_set_sync(copy, true); + copy->cp_clp = cstate->clp; if (nfsd4_ssc_is_inter(copy)) { trace_nfsd_copy_inter(copy); base-commit: 939cb14d51a150e3c12ef7a8ce0ba04ce6131bd2 -- 2.44.0