Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp43848rwb; Wed, 5 Oct 2022 14:27:02 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6TAWxg0I6ua/QbADzKirOJnFYs/OoCI6ppyt44v8/qqDHcr7bGHlchC4QwdUWch0wmnGZK X-Received: by 2002:a17:90b:164b:b0:202:d347:2512 with SMTP id il11-20020a17090b164b00b00202d3472512mr1693167pjb.185.1665005221740; Wed, 05 Oct 2022 14:27:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665005221; cv=none; d=google.com; s=arc-20160816; b=lcbPWsqYb75ZHfATR2fbOVe0tseXtkQA4jfx1Ji3DlAafUlGEas7EdqFtoDMbTNzv8 SSGIsDvzUFWH5OoiGhuJOUYsLJ8IFhRHdJgGnN/UPpifB4KkPZrxZm00l8wBM4jlqinN co17LjZkunM5vq4cCOxU5dD6wIwgJd9kfeMgJ3dcQNZFz299zOhjSzsAeU/l3CPXVNb/ gPZfYjCSyYgsuMw/ewcGF/9xM7fvgOP9zavPH3mFM+uSFHStAN58j6MeOO/IS0w4V81R zsSymZi07ynlXRGUf0E0+g2ZeVjOrdAH5ELm+xFhHxA2VQLjkGQ+Z6Z3rg62Z+QwJ84g HpHw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:references:in-reply-to:subject :cc:to:from:mime-version:content-transfer-encoding:dkim-signature :dkim-signature; bh=01sgoEm54YTMwT5GObElbBalf5G3CbGpxBxdCVhq1Pw=; b=pTG1woQSD9vJetf2rIL7xp5MYeJEweKgqm+Ca6fi/Fb0yffIY4nzv5d4CXgX3hyS2Y E4lYONt0OHMAmrDEx+jVVZuZdFcWM6sQlfYWUTlyYZ8eXFJ/zD5hDc6ENICFqP9i0Z+y NCCd3FcG0LNV8B8QNC6q6OPW3+AWNa6tFAOmJefuLaTS1NY1aT4SGpPFQSmyRLhdek8b BcmyekfW7QNOQ9zwwce2e1InRCphtMyr+mwzZZnyr27Lq0cvE6cXY6R0QoENgFJewpuf feiQBTFFhVVIB7vJUbuKS8Irl1U5B9dIbuMa/byG53n70flgpv0wGZlTEaTiiyHmOeOI JSoQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=HOBDxms5; dkim=neutral (no key) header.i=@suse.de; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id cd12-20020a056a00420c00b0054114c6685asi10365512pfb.129.2022.10.05.14.26.42; Wed, 05 Oct 2022 14:27:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=HOBDxms5; dkim=neutral (no key) header.i=@suse.de; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231208AbiJEVOf (ORCPT + 99 others); Wed, 5 Oct 2022 17:14:35 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42254 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231210AbiJEVOa (ORCPT ); Wed, 5 Oct 2022 17:14:30 -0400 Received: from smtp-out1.suse.de (smtp-out1.suse.de [IPv6:2001:67c:2178:6::1c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 361097539B; Wed, 5 Oct 2022 14:14:27 -0700 (PDT) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id 5DB522191A; Wed, 5 Oct 2022 21:14:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1665004466; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=01sgoEm54YTMwT5GObElbBalf5G3CbGpxBxdCVhq1Pw=; b=HOBDxms5f1DZa0kq0S2PE0X76B3PZFp3+ZcEUrQ7ufALeM+9RutSRpx/kWEF+GgrWgmgoE +UJNyRWei/WMNITz7p5p83jv1Iy6Vz0CYmLw8+EgT6wsgKt5m3j+hgIbO86GKRRo2BOqvf XnCLX0npbTInOVFKucSlWG5xGo7Kckc= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1665004466; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=01sgoEm54YTMwT5GObElbBalf5G3CbGpxBxdCVhq1Pw=; b=UwVsJ+/pT0W4J4hWxz0reUKGR1ZbPK98QiHRwgavUFkUb2vzYAePozrBGR6uJaWA4wXdm9 RAryWAN1Pr6EajBA== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 3152B13345; Wed, 5 Oct 2022 21:14:18 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id nmkHNqrzPWNYRQAAMHmgww (envelope-from ); Wed, 05 Oct 2022 21:14:18 +0000 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 From: "NeilBrown" To: "Jeff Layton" Cc: tytso@mit.edu, adilger.kernel@dilger.ca, djwong@kernel.org, david@fromorbit.com, trondmy@hammerspace.com, viro@zeniv.linux.org.uk, zohar@linux.ibm.com, xiubli@redhat.com, chuck.lever@oracle.com, lczerner@redhat.com, jack@suse.cz, bfields@fieldses.org, brauner@kernel.org, fweimer@redhat.com, linux-btrfs@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, ceph-devel@vger.kernel.org, linux-ext4@vger.kernel.org, linux-nfs@vger.kernel.org, linux-xfs@vger.kernel.org Subject: Re: [PATCH v6 6/9] nfsd: use the getattr operation to fetch i_version In-reply-to: <13714490816df1ff36ab06bbf32df5440cad7913.camel@kernel.org> References: <20220930111840.10695-1-jlayton@kernel.org>, <20220930111840.10695-7-jlayton@kernel.org>, <166484034920.14457.15225090674729127890@noble.neil.brown.name>, <13714490816df1ff36ab06bbf32df5440cad7913.camel@kernel.org> Date: Thu, 06 Oct 2022 08:14:04 +1100 Message-id: <166500444418.16615.7547789313879225413@noble.neil.brown.name> X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Wed, 05 Oct 2022, Jeff Layton wrote: > On Tue, 2022-10-04 at 10:39 +1100, NeilBrown wrote: > > On Fri, 30 Sep 2022, Jeff Layton wrote: > > > Now that we can call into vfs_getattr to get the i_version field, use > > > that facility to fetch it instead of doing it in nfsd4_change_attribute. > > >=20 > > > Neil also pointed out recently that IS_I_VERSION directory operations > > > are always logged, and so we only need to mitigate the rollback problem > > > on regular files. Also, we don't need to factor in the ctime when > > > reexporting NFS or Ceph. > > >=20 > > > Set the STATX_VERSION (and BTIME) bits in the request when we're dealing > > > with a v4 request. Then, instead of looking at IS_I_VERSION when > > > generating the change attr, look at the result mask and only use it if > > > STATX_VERSION is set. With this change, we can drop the fetch_iversion > > > export operation as well. > > >=20 > > > Move nfsd4_change_attribute into nfsfh.c, and change it to only factor > > > in the ctime if it's a regular file and the fs doesn't advertise > > > STATX_ATTR_VERSION_MONOTONIC. > > >=20 > > > Signed-off-by: Jeff Layton > > > --- > > > fs/nfs/export.c | 7 ------- > > > fs/nfsd/nfs4xdr.c | 4 +++- > > > fs/nfsd/nfsfh.c | 40 ++++++++++++++++++++++++++++++++++++++++ > > > fs/nfsd/nfsfh.h | 29 +---------------------------- > > > fs/nfsd/vfs.h | 7 ++++++- > > > include/linux/exportfs.h | 1 - > > > 6 files changed, 50 insertions(+), 38 deletions(-) > > >=20 > > > diff --git a/fs/nfs/export.c b/fs/nfs/export.c > > > index 01596f2d0a1e..1a9d5aa51dfb 100644 > > > --- a/fs/nfs/export.c > > > +++ b/fs/nfs/export.c > > > @@ -145,17 +145,10 @@ nfs_get_parent(struct dentry *dentry) > > > return parent; > > > } > > > =20 > > > -static u64 nfs_fetch_iversion(struct inode *inode) > > > -{ > > > - nfs_revalidate_inode(inode, NFS_INO_INVALID_CHANGE); > > > - return inode_peek_iversion_raw(inode); > > > -} > > > - > > > const struct export_operations nfs_export_ops =3D { > > > .encode_fh =3D nfs_encode_fh, > > > .fh_to_dentry =3D nfs_fh_to_dentry, > > > .get_parent =3D nfs_get_parent, > > > - .fetch_iversion =3D nfs_fetch_iversion, > > > .flags =3D EXPORT_OP_NOWCC|EXPORT_OP_NOSUBTREECHK| > > > EXPORT_OP_CLOSE_BEFORE_UNLINK|EXPORT_OP_REMOTE_FS| > > > EXPORT_OP_NOATOMIC_ATTR, > > > diff --git a/fs/nfsd/nfs4xdr.c b/fs/nfsd/nfs4xdr.c > > > index 1e9690a061ec..779c009314c6 100644 > > > --- a/fs/nfsd/nfs4xdr.c > > > +++ b/fs/nfsd/nfs4xdr.c > > > @@ -2869,7 +2869,9 @@ nfsd4_encode_fattr(struct xdr_stream *xdr, struct= svc_fh *fhp, > > > goto out; > > > } > > > =20 > > > - err =3D vfs_getattr(&path, &stat, STATX_BASIC_STATS, AT_STATX_SYNC_AS= _STAT); > > > + err =3D vfs_getattr(&path, &stat, > > > + STATX_BASIC_STATS | STATX_BTIME | STATX_VERSION, > > > + AT_STATX_SYNC_AS_STAT); > > > if (err) > > > goto out_nfserr; > > > if (!(stat.result_mask & STATX_BTIME)) > > > diff --git a/fs/nfsd/nfsfh.c b/fs/nfsd/nfsfh.c > > > index a5b71526cee0..9168bc657378 100644 > > > --- a/fs/nfsd/nfsfh.c > > > +++ b/fs/nfsd/nfsfh.c > > > @@ -634,6 +634,10 @@ void fh_fill_pre_attrs(struct svc_fh *fhp) > > > stat.mtime =3D inode->i_mtime; > > > stat.ctime =3D inode->i_ctime; > > > stat.size =3D inode->i_size; > > > + if (v4 && IS_I_VERSION(inode)) { > > > + stat.version =3D inode_query_iversion(inode); > > > + stat.result_mask |=3D STATX_VERSION; > > > + } > >=20 > > This is increasingly ugly. I wonder if it is justified at all... > >=20 >=20 > I'm fine with dropping that. So if the getattrs fail, we should just not > offer up pre/post attrs? >=20 > > > } > > > if (v4) > > > fhp->fh_pre_change =3D nfsd4_change_attribute(&stat, inode); > > > @@ -665,6 +669,8 @@ void fh_fill_post_attrs(struct svc_fh *fhp) > > > if (err) { > > > fhp->fh_post_saved =3D false; > > > fhp->fh_post_attr.ctime =3D inode->i_ctime; > > > + if (v4 && IS_I_VERSION(inode)) > > > + fhp->fh_post_attr.version =3D inode_query_iversion(inode); > >=20 > > ... ditto ... > >=20 > > > } else > > > fhp->fh_post_saved =3D true; > > > if (v4) > > > @@ -754,3 +760,37 @@ enum fsid_source fsid_source(const struct svc_fh *= fhp) > > > return FSIDSOURCE_UUID; > > > return FSIDSOURCE_DEV; > > > } > > > + > > > +/* > > > + * We could use i_version alone as the change attribute. However, i_v= ersion > > > + * can go backwards on a regular file after an unclean shutdown. On i= ts own > > > + * that doesn't necessarily cause a problem, but if i_version goes bac= kwards > > > + * and then is incremented again it could reuse a value that was previ= ously > > > + * used before boot, and a client who queried the two values might inc= orrectly > > > + * assume nothing changed. > > > + * > > > + * By using both ctime and the i_version counter we guarantee that as = long as > > > + * time doesn't go backwards we never reuse an old value. If the files= ystem > > > + * advertises STATX_ATTR_VERSION_MONOTONIC, then this mitigation is no= t needed. > > > + * > > > + * We only need to do this for regular files as well. For directories,= we > > > + * assume that the new change attr is always logged to stable storage = in some > > > + * fashion before the results can be seen. > > > + */ > > > +u64 nfsd4_change_attribute(struct kstat *stat, struct inode *inode) > > > +{ > > > + u64 chattr; > > > + > > > + if (stat->result_mask & STATX_VERSION) { > > > + chattr =3D stat->version; > > > + > > > + if (S_ISREG(inode->i_mode) && > > > + !(stat->attributes & STATX_ATTR_VERSION_MONOTONIC)) { > >=20 > > I would really rather that the fs got to make this decision. > > If it can guarantee that the i_version is monotonic even over a crash > > (which is probably can for directory, and might need changes to do for > > files) then it sets STATX_ATTR_VERSION_MONOTONIC and nfsd trusts it > > completely. > > If it cannot, then it doesn't set the flag. > > i.e. the S_ISREG() test should be in the filesystem, not in nfsd. > >=20 >=20 > This sounds reasonable, but for one thing. >=20 > From RFC 7862: >=20 > While Section 5.4 of [RFC5661] discusses > per-file system attributes, it is expected that the value of > change_attr_type will not depend on the value of "homogeneous" and > will only change in the event of a migration. >=20 > The change_attr_type4 must be the same for all filehandles under a > particular filesystem. >=20 > If we do what you suggest though, then it's easily possible for the fs > to set STATX_ATTR_VERSION_MONOTONIC on=C2=A0directories but not files. If we > later want to allow nfsd to advertise a change_attr_type4, we won't be > able to rely on the STATX_ATTR_VERSION_MONOTONIC to tell us how to fill > that out. >=20 > Maybe that's ok. I suppose we could add a new field to the export > options that filesystems can set to advertise what sort of change attr > they offer? >=20 There are 3 cases: 1/ a file/dir which advertises MONOTONIC is easy to handle. 2/ an IS_I_VERSION file/dir that does not advertise MONOTONIC will only fail to be MONOTONIC across unclean restart (correct?). nfsd can compensate using an xattr on the root to count crashes, or just adding cti= me. 3/ a non-IS_I_VERSION fs that does not advertise MONOTONIC cannot be compensated for by nfsd. If we ever want nfsd to advertise MONOTONIC, then we must be able to reject non-IS_I_VERSION filesystems that don't advertise MONOTONIC on all files. Maybe we need a global nfsd option which defaults to "monotoric" and causes those files to be rejected, but can be set to "non-monotonic" and then allows all files to be exported. It would be nice to make it easy to run multiple nfsd instances each on a different IP address. Each can then have different options. This could also be used to reexport an NFS mount using unmodified filehandles. Currently you need a network namespace to create a new nfsd. I wonder if that is a little too much of a barrier. But maybe we could automate the creation of working network namespaces for nfsd.... NeilBrown