From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.2 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_PASS autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 744DAC43387 for ; Thu, 20 Dec 2018 00:19:58 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 28BB220869 for ; Thu, 20 Dec 2018 00:19:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1545265198; bh=E0v6uwcCM7EGQ3swdPp46ltZPtDyBZLYFkSnw/d5KtE=; h=Subject:From:To:Cc:Date:In-Reply-To:References:List-ID:From; b=Y/AkesS3IUKMUAK2SvxXh7TsBdpgPiIR/RguQOBUI22w52GfSNcmduL/tSdU8BP44 N2+SZCm0EZZw8Toq9eSezJnn1e1Nn231Olv7v+OpzrsgyseN+PimIsk5xbwHQRBKjw vhReFJodwVNw7QcBWc2e6Yg1xrXlxQtyms2l7n1Y= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730350AbeLTAT5 (ORCPT ); Wed, 19 Dec 2018 19:19:57 -0500 Received: from mail.kernel.org ([198.145.29.99]:36068 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728849AbeLTAT5 (ORCPT ); Wed, 19 Dec 2018 19:19:57 -0500 Received: from tleilax.poochiereds.net (cpe-71-70-156-158.nc.res.rr.com [71.70.156.158]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4466B20869; Thu, 20 Dec 2018 00:19:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1545265195; bh=E0v6uwcCM7EGQ3swdPp46ltZPtDyBZLYFkSnw/d5KtE=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=R4OQYahjWsRtgxAhdZthYOZNaxF+kSnO+CevwMGiFj/7zSx8+Som2fYKhIB384sbp 5ZOGaI/j8WWtfQjQxde82AYV0OgFuYdXVMH2m20fRsdjl6TELC6PFNUETi/VxfXOxb E8Ysc9tMht13n+sC+dWjWcx6SZ4fFvZ2BNt5b+Y8= Message-ID: <89285646ae8755f94cffb5a389ec19a7eeed0fd6.camel@kernel.org> Subject: Re: [PATCH v2 2/3] nfsd: un-deprecate nfsdcld From: Jeff Layton To: Scott Mayhew Cc: bfields@fieldses.org, linux-nfs@vger.kernel.org Date: Wed, 19 Dec 2018 19:19:53 -0500 In-Reply-To: <20181219221118.GT27213@coeurl.usersys.redhat.com> References: <20181218142926.27933-1-smayhew@redhat.com> <20181218142926.27933-3-smayhew@redhat.com> <04e5de8ca245ee9d2fc9607690ff87b763ab5fde.camel@kernel.org> <20181219221118.GT27213@coeurl.usersys.redhat.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.30.3 (3.30.3-1.fc29) Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Wed, 2018-12-19 at 17:11 -0500, Scott Mayhew wrote: > On Wed, 19 Dec 2018, Jeff Layton wrote: > > > On Tue, 2018-12-18 at 09:29 -0500, Scott Mayhew wrote: > > > When nfsdcld was released, it was quickly deprecated in favor of the > > > nfsdcltrack usermodehelper, so as to not require another running daemon. > > > That prevents NFSv4 clients from reclaiming locks from nfsd's running in > > > containers, since neither nfsdcltrack nor the legacy client tracking > > > code work in containers. > > > > > > This commit un-deprecates the use of nfsdcld, with one twist: we will > > > populate the reclaim_str_hashtbl on startup. > > > > > > During client tracking initialization, do an upcall ("GraceStart") to > > > nfsdcld to get a list of clients from the database. nfsdcld will do > > > one downcall with a status of -EINPROGRESS for each client record in > > > the database, which in turn will cause an nfs4_client_reclaim to be > > > added to the reclaim_str_hashtbl. When complete, nfsdcld will do a > > > final downcall with a status of 0. > > > > > > This will save nfsd from having to do an upcall to the daemon during > > > nfs4_check_open_reclaim() processing. > > > > > > Even though nfsdcld was quickly deprecated, there is a very small chance > > > of old nfsdcld daemons running in the wild. These will respond to the > > > new "GraceStart" upcall with -EOPNOTSUPP, in which case we will log a > > > message and fall back to the original nfsdcld tracking ops (now called > > > nfsd4_cld_tracking_ops_v0). > > > > > > Signed-off-by: Scott Mayhew > > > --- > > > fs/nfsd/nfs4recover.c | 225 ++++++++++++++++++++++++++++++++-- > > > include/uapi/linux/nfsd/cld.h | 1 + > > > 2 files changed, 218 insertions(+), 8 deletions(-) > > > > > > diff --git a/fs/nfsd/nfs4recover.c b/fs/nfsd/nfs4recover.c > > > index 2243b909b407..89c2a27956d0 100644 > > > --- a/fs/nfsd/nfs4recover.c > > > +++ b/fs/nfsd/nfs4recover.c > > > @@ -779,6 +779,34 @@ cld_pipe_upcall(struct rpc_pipe *pipe, struct cld_msg *cmsg) > > > return ret; > > > } > > > > > > +static ssize_t > > > +__cld_pipe_inprogress_downcall(const struct cld_msg __user *cmsg, > > > + struct nfsd_net *nn) > > > +{ > > > + uint8_t cmd; > > > + struct xdr_netobj name; > > > + uint16_t namelen; > > > + > > > + if (get_user(cmd, &cmsg->cm_cmd)) { > > > + dprintk("%s: error when copying cmd from userspace", __func__); > > > + return -EFAULT; > > > + } > > > + if (cmd == Cld_GraceStart) { > > > + if (get_user(namelen, &cmsg->cm_u.cm_name.cn_len)) > > > + return -EFAULT; > > > + name.data = memdup_user(&cmsg->cm_u.cm_name.cn_id, namelen); > > > + if (IS_ERR_OR_NULL(name.data)) > > > + return -EFAULT; > > > + name.len = namelen; > > > + if (!nfs4_client_to_reclaim(name, nn)) { > > > + kfree(name.data); > > > + return -EFAULT; > > > + } > > > + return sizeof(*cmsg); > > > + } > > > + return -EFAULT; > > > +} > > > + > > > static ssize_t > > > cld_pipe_downcall(struct file *filp, const char __user *src, size_t mlen) > > > { > > > @@ -788,6 +816,7 @@ cld_pipe_downcall(struct file *filp, const char __user *src, size_t mlen) > > > struct nfsd_net *nn = net_generic(file_inode(filp)->i_sb->s_fs_info, > > > nfsd_net_id); > > > struct cld_net *cn = nn->cld_net; > > > + int16_t status; > > > > > > if (mlen != sizeof(*cmsg)) { > > > dprintk("%s: got %zu bytes, expected %zu\n", __func__, mlen, > > > @@ -801,13 +830,24 @@ cld_pipe_downcall(struct file *filp, const char __user *src, size_t mlen) > > > return -EFAULT; > > > } > > > > > > + /* > > > + * copy the status so we know whether to remove the upcall from the > > > + * list (for -EINPROGRESS, we just want to make sure the xid is > > > + * valid, not remove the upcall from the list) > > > + */ > > > + if (get_user(status, &cmsg->cm_status)) { > > > + dprintk("%s: error when copying status from userspace", __func__); > > > + return -EFAULT; > > > + } > > > + > > > /* walk the list and find corresponding xid */ > > > cup = NULL; > > > spin_lock(&cn->cn_lock); > > > list_for_each_entry(tmp, &cn->cn_list, cu_list) { > > > if (get_unaligned(&tmp->cu_msg.cm_xid) == xid) { > > > cup = tmp; > > > - list_del_init(&cup->cu_list); > > > + if (status != -EINPROGRESS) > > > + list_del_init(&cup->cu_list); > > > break; > > > } > > > } > > > @@ -819,6 +859,9 @@ cld_pipe_downcall(struct file *filp, const char __user *src, size_t mlen) > > > return -EINVAL; > > > } > > > > > > + if (status == -EINPROGRESS) > > > + return __cld_pipe_inprogress_downcall(cmsg, nn); > > > + > > > if (copy_from_user(&cup->cu_msg, src, mlen) != 0) > > > return -EFAULT; > > > > > > @@ -1065,9 +1108,14 @@ nfsd4_cld_remove(struct nfs4_client *clp) > > > "record from stable storage: %d\n", ret); > > > } > > > > > > -/* Check for presence of a record, and update its timestamp */ > > > +/* > > > + * For older nfsdcld's that do not allow us to "slurp" the clients > > > + * from the tracking database during startup. > > > + * > > > + * Check for presence of a record, and update its timestamp > > > + */ > > > static int > > > -nfsd4_cld_check(struct nfs4_client *clp) > > > +nfsd4_cld_check_v0(struct nfs4_client *clp) > > > { > > > int ret; > > > struct cld_upcall *cup; > > > @@ -1100,8 +1148,61 @@ nfsd4_cld_check(struct nfs4_client *clp) > > > return ret; > > > } > > > > > > +/* > > > + * For newer nfsdcld's that allow us to "slurp" the clients > > > + * from the tracking database during startup. > > > + * > > > + * Check for presence of a record in the reclaim_str_hashtbl > > > + */ > > > +static int > > > +nfsd4_cld_check(struct nfs4_client *clp) > > > +{ > > > + struct nfs4_client_reclaim *crp; > > > + struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id); > > > + > > > + /* did we already find that this client is stable? */ > > > + if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags)) > > > + return 0; > > > + > > > + /* look for it in the reclaim hashtable otherwise */ > > > + crp = nfsd4_find_reclaim_client(clp->cl_name, nn); > > > + if (crp) { > > > + crp->cr_clp = clp; > > > + return 0; > > > + } > > > + > > > + return -ENOENT; > > > +} > > > + > > > +static int > > > +nfsd4_cld_grace_start(struct nfsd_net *nn) > > > +{ > > > + int ret; > > > + struct cld_upcall *cup; > > > + struct cld_net *cn = nn->cld_net; > > > + > > > + cup = alloc_cld_upcall(cn); > > > + if (!cup) { > > > + ret = -ENOMEM; > > > + goto out_err; > > > + } > > > + > > > + cup->cu_msg.cm_cmd = Cld_GraceStart; > > > + ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg); > > > + if (!ret) > > > + ret = cup->cu_msg.cm_status; > > > + > > > + free_cld_upcall(cup); > > > +out_err: > > > + if (ret) > > > + dprintk("%s: Unable to get clients from userspace: %d\n", > > > + __func__, ret); > > > + return ret; > > > +} > > > + > > > +/* For older nfsdcld's that need cm_gracetime */ > > > static void > > > -nfsd4_cld_grace_done(struct nfsd_net *nn) > > > +nfsd4_cld_grace_done_v0(struct nfsd_net *nn) > > > { > > > int ret; > > > struct cld_upcall *cup; > > > @@ -1125,11 +1226,118 @@ nfsd4_cld_grace_done(struct nfsd_net *nn) > > > printk(KERN_ERR "NFSD: Unable to end grace period: %d\n", ret); > > > } > > > > > > -static const struct nfsd4_client_tracking_ops nfsd4_cld_tracking_ops = { > > > +/* > > > + * For newer nfsdcld's that do not need cm_gracetime. We also need to call > > > + * nfs4_release_reclaim() to clear out the reclaim_str_hashtbl. > > > + */ > > > +static void > > > +nfsd4_cld_grace_done(struct nfsd_net *nn) > > > +{ > > > + int ret; > > > + struct cld_upcall *cup; > > > + struct cld_net *cn = nn->cld_net; > > > + > > > + cup = alloc_cld_upcall(cn); > > > + if (!cup) { > > > + ret = -ENOMEM; > > > + goto out_err; > > > + } > > > + > > > + cup->cu_msg.cm_cmd = Cld_GraceDone; > > > + ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg); > > > + if (!ret) > > > + ret = cup->cu_msg.cm_status; > > > + > > > + free_cld_upcall(cup); > > > +out_err: > > > + nfs4_release_reclaim(nn); > > > + if (ret) > > > + printk(KERN_ERR "NFSD: Unable to end grace period: %d\n", ret); > > > +} > > > + > > > +static int > > > +nfs4_cld_state_init(struct net *net) > > > +{ > > > + struct nfsd_net *nn = net_generic(net, nfsd_net_id); > > > + int i; > > > + > > > + nn->reclaim_str_hashtbl = kmalloc_array(CLIENT_HASH_SIZE, > > > + sizeof(struct list_head), > > > + GFP_KERNEL); > > > + if (!nn->reclaim_str_hashtbl) > > > + return -ENOMEM; > > > + > > > + for (i = 0; i < CLIENT_HASH_SIZE; i++) > > > + INIT_LIST_HEAD(&nn->reclaim_str_hashtbl[i]); > > > + nn->reclaim_str_hashtbl_size = 0; > > > + > > > + return 0; > > > +} > > > + > > > +static void > > > +nfs4_cld_state_shutdown(struct net *net) > > > +{ > > > + struct nfsd_net *nn = net_generic(net, nfsd_net_id); > > > + > > > + kfree(nn->reclaim_str_hashtbl); > > > +} > > > + > > > +static int > > > +nfsd4_cld_tracking_init(struct net *net) > > > +{ > > > + int status; > > > + struct nfsd_net *nn = net_generic(net, nfsd_net_id); > > > + > > > + status = nfs4_cld_state_init(net); > > > + if (status) > > > + return status; > > > + > > > + status = nfsd4_init_cld_pipe(net); > > > + if (status) > > > + goto err_shutdown; > > > + > > > + status = nfsd4_cld_grace_start(nn); > > > + if (status) { > > > + if (status == -EOPNOTSUPP) > > > + printk(KERN_WARNING "NFSD: Please upgrade nfsdcld.\n"); > > > + nfs4_release_reclaim(nn); > > > + goto err_remove; > > > + } > > > + return 0; > > > + > > > +err_remove: > > > + nfsd4_remove_cld_pipe(net); > > > +err_shutdown: > > > + nfs4_cld_state_shutdown(net); > > > + return status; > > > +} > > > + > > > +static void > > > +nfsd4_cld_tracking_exit(struct net *net) > > > +{ > > > + struct nfsd_net *nn = net_generic(net, nfsd_net_id); > > > + > > > + nfs4_release_reclaim(nn); > > > + nfsd4_remove_cld_pipe(net); > > > + nfs4_cld_state_shutdown(net); > > > +} > > > + > > > +/* For older nfsdcld's */ > > > +static const struct nfsd4_client_tracking_ops nfsd4_cld_tracking_ops_v0 = { > > > .init = nfsd4_init_cld_pipe, > > > .exit = nfsd4_remove_cld_pipe, > > > .create = nfsd4_cld_create, > > > .remove = nfsd4_cld_remove, > > > + .check = nfsd4_cld_check_v0, > > > + .grace_done = nfsd4_cld_grace_done_v0, > > > +}; > > > + > > > +/* For newer nfsdcld's */ > > > +static const struct nfsd4_client_tracking_ops nfsd4_cld_tracking_ops = { > > > + .init = nfsd4_cld_tracking_init, > > > + .exit = nfsd4_cld_tracking_exit, > > > + .create = nfsd4_cld_create, > > > + .remove = nfsd4_cld_remove, > > > .check = nfsd4_cld_check, > > > .grace_done = nfsd4_cld_grace_done, > > > }; > > > @@ -1514,9 +1722,10 @@ nfsd4_client_tracking_init(struct net *net) > > > > > > /* Finally, try to use nfsdcld */ > > > nn->client_tracking_ops = &nfsd4_cld_tracking_ops; > > > - printk(KERN_WARNING "NFSD: the nfsdcld client tracking upcall will be " > > > - "removed in 3.10. Please transition to using " > > > - "nfsdcltrack.\n"); > > > + status = nn->client_tracking_ops->init(net); > > > + if (!status) > > > + return status; > > > + nn->client_tracking_ops = &nfsd4_cld_tracking_ops_v0; > > > > It seems like we probably ought to check to see if the daemon is up > > before attempting a UMH upcall now? If someone starts up the daemon > > they'll probably be surprised that it didn't get used because there was > > a UMH upcall program present. > > I figured that the UMH upcall program would still be the default and > that the admin would have to do some extra configuration to use nfsdcld, > namely remove the /var/lib/nfs/v4recovery directory and set an empty > value for nfsd's 'cltrack_prog' module option. Do you think that's a > bad idea? > > -Scott > The only real issue there is that that is several steps, any of which someone could screw up. I think we probably do want to aim for allowing someone to enable nfsdcld (via systemd or whatever) and have it all "just work" without needing to do anything else. Assuming that daemon works better and in more places than the umh helper, should we aim for it to eventually become the default? > > > do_init: > > > status = nn->client_tracking_ops->init(net); > > > if (status) { > > > diff --git a/include/uapi/linux/nfsd/cld.h b/include/uapi/linux/nfsd/cld.h > > > index f8f5cccad749..b1e9de4f07d5 100644 > > > --- a/include/uapi/linux/nfsd/cld.h > > > +++ b/include/uapi/linux/nfsd/cld.h > > > @@ -36,6 +36,7 @@ enum cld_command { > > > Cld_Remove, /* remove record of this cm_id */ > > > Cld_Check, /* is this cm_id allowed? */ > > > Cld_GraceDone, /* grace period is complete */ > > > + Cld_GraceStart, > > > }; > > > > > > /* representation of long-form NFSv4 client ID */ > > > > -- > > Jeff Layton > > -- Jeff Layton