From patchwork Wed Oct 23 15:29:40 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mike Snitzer X-Patchwork-Id: 13847291 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A603F1B85E2 for ; Wed, 23 Oct 2024 15:29:42 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729697382; cv=none; b=Mpai4uV3086ZB8jZaT2lzizgFlBH211F5P/PRBeCpFaPNbyCYyTkl5+TcmeWPOXiGRPF/8tELJuhDET+44P84MYstKBCSYyvhdlhLrBFuiPKp5KxopLsJyw1LJ5bNa/AGA0Ed12Ay3c1wyg9Z2gfJqqhEopIps6mwq5cb2MUqEg= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1729697382; c=relaxed/simple; bh=iy08ei6ZWjGpKWnCZ+MqrtfgvXVq+JV7nEXARr7+YgI=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=IFiBgd7H9Rm/3uC0qkfFRWeLLBIU0l9t6q1uekbq0Mg4I0CEa1ZGSF7RT1m0ryRT0iyoRj/hbWvdCZil6VPVZg7oID0R2+qqebZMo2wFzH+dOUsyTOFknGv6YiVqJa/rcS8RzRil8riBf6dFUmtj9LgTDJ8GJLxeDUhR0YeDOGg= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=Pzg6RcTJ; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="Pzg6RcTJ" Received: by smtp.kernel.org (Postfix) with ESMTPSA id C792AC4CEC6; Wed, 23 Oct 2024 15:29:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1729697382; bh=iy08ei6ZWjGpKWnCZ+MqrtfgvXVq+JV7nEXARr7+YgI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Pzg6RcTJg4V763kyc8N9mwx+HnFALA0LfmU2ksw+NaXlG9zh/yNdAHuoOCdhsuVXU sDoRdkNR3Uj8T3hFS/c3HyAvtc7uRsyoyNJxjMGrj0xhc2SGw5+xFx+FiEBf6/zAMt vowzzUNojqAmkCTwvf+uFtZdJn76cw58Vbi1gVtdUmOuuvwb4NZy121Z55NPHmFGs9 Tx3Vhe9qffXr8dqRQlx4fnonj14M7A24Qe0PiR1XLQmaJ8nWMeCRwmOyoXCRfng0fd bP1Se+gbWUvI19AyOky9+YLA57Mg9wdxTK9Dg7y8NR9LNsL5nZINPiDswYAualaSC+ wr8s5aiLs1gGw== From: Mike Snitzer To: linux-nfs@vger.kernel.org Cc: Anna Schumaker , Trond Myklebust , Chuck Lever , Jeff Layton Subject: [PATCH v2] nfsd: disallow file locking and delegations for NFSv4 proxy Date: Wed, 23 Oct 2024 11:29:40 -0400 Message-ID: <20241023152940.63479-1-snitzer@kernel.org> X-Mailer: git-send-email 2.44.0 In-Reply-To: <20241023145436.63240-1-snitzer@kernel.org> References: <20241023145436.63240-1-snitzer@kernel.org> Precedence: bulk X-Mailing-List: linux-nfs@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 We do not and cannot support NFS proxy server file locking over NFSv4.x for the same reason we don't do it for NFSv3: NFS proxy server reboot cannot allow clients to recover locks because the source NFS server has not rebooted, and so it is not in grace. Since the source NFS server is not in grace, it cannot offer any guarantees that the file won't have been changed between the locks getting lost and any attempt to recover/reclaim them. The same applies to delegations and any associated locks, so disallow them too. Add EXPORT_OP_NOLOCKSUPPORT and exportfs_lock_op_is_unsupported(), set EXPORT_OP_NOLOCKSUPPORT in nfs_export_ops and check for it in nfsd4_lock(), nfsd4_locku() and nfs4_set_delegation(). Signed-off-by: Mike Snitzer --- Documentation/filesystems/nfs/reexport.rst | 11 ++++++++--- fs/nfs/export.c | 3 ++- fs/nfsd/nfs4state.c | 20 ++++++++++++++++++++ include/linux/exportfs.h | 14 ++++++++++++++ 4 files changed, 44 insertions(+), 4 deletions(-) v2: enhance "Reboot recovery" section of Documentation/filesystems/nfs/reexport.rst diff --git a/Documentation/filesystems/nfs/reexport.rst b/Documentation/filesystems/nfs/reexport.rst index ff9ae4a46530..fdcbb3891097 100644 --- a/Documentation/filesystems/nfs/reexport.rst +++ b/Documentation/filesystems/nfs/reexport.rst @@ -26,9 +26,14 @@ Reboot recovery --------------- The NFS protocol's normal reboot recovery mechanisms don't work for the -case when the reexport server reboots. Clients will lose any locks -they held before the reboot, and further IO will result in errors. -Closing and reopening files should clear the errors. +case when the reexport server reboots because the source server has not +rebooted, and so it is not in grace. Since the source server is not in +grace, it cannot offer any guarantees that the file won't have been +changed between the locks getting lost and any attempt to recover them. +The same applies to delegations and any associated locks. Clients will +lose any locks and delegations they held before the reexport server +reboot, and further IO will result in errors. Closing and reopening +files should clear the errors. Filehandle limits ----------------- diff --git a/fs/nfs/export.c b/fs/nfs/export.c index be686b8e0c54..2f001a0273bc 100644 --- a/fs/nfs/export.c +++ b/fs/nfs/export.c @@ -154,5 +154,6 @@ const struct export_operations nfs_export_ops = { EXPORT_OP_CLOSE_BEFORE_UNLINK | EXPORT_OP_REMOTE_FS | EXPORT_OP_NOATOMIC_ATTR | - EXPORT_OP_FLUSH_ON_CLOSE, + EXPORT_OP_FLUSH_ON_CLOSE | + EXPORT_OP_NOLOCKSUPPORT, }; diff --git a/fs/nfsd/nfs4state.c b/fs/nfsd/nfs4state.c index ac1859c7cc9d..63297ea82e4e 100644 --- a/fs/nfsd/nfs4state.c +++ b/fs/nfsd/nfs4state.c @@ -5813,6 +5813,15 @@ nfs4_set_delegation(struct nfsd4_open *open, struct nfs4_ol_stateid *stp, if (!nf) return ERR_PTR(-EAGAIN); + /* + * File delegations and associated locks cannot be recovered if + * export is from NFS proxy server. + */ + if (exportfs_lock_op_is_unsupported(nf->nf_file->f_path.mnt->mnt_sb->s_export_op)) { + nfsd_file_put(nf); + return ERR_PTR(-EOPNOTSUPP); + } + spin_lock(&state_lock); spin_lock(&fp->fi_lock); if (nfs4_delegation_exists(clp, fp)) @@ -7917,6 +7926,11 @@ nfsd4_lock(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, } sb = cstate->current_fh.fh_dentry->d_sb; + if (exportfs_lock_op_is_unsupported(sb->s_export_op)) { + status = nfserr_notsupp; + goto out; + } + if (lock->lk_is_new) { if (nfsd4_has_session(cstate)) /* See rfc 5661 18.10.3: given clientid is ignored: */ @@ -8266,6 +8280,12 @@ nfsd4_locku(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, status = nfserr_lock_range; goto put_stateid; } + + if (exportfs_lock_op_is_unsupported(nf->nf_file->f_path.mnt->mnt_sb->s_export_op)) { + status = nfserr_notsupp; + goto put_file; + } + file_lock = locks_alloc_lock(); if (!file_lock) { dprintk("NFSD: %s: unable to allocate lock!\n", __func__); diff --git a/include/linux/exportfs.h b/include/linux/exportfs.h index 893a1d21dc1c..106fd590d323 100644 --- a/include/linux/exportfs.h +++ b/include/linux/exportfs.h @@ -247,6 +247,7 @@ struct export_operations { */ #define EXPORT_OP_FLUSH_ON_CLOSE (0x20) /* fs flushes file data on close */ #define EXPORT_OP_ASYNC_LOCK (0x40) /* fs can do async lock request */ +#define EXPORT_OP_NOLOCKSUPPORT (0x80) /* no file locking support */ unsigned long flags; }; @@ -263,6 +264,19 @@ exportfs_lock_op_is_async(const struct export_operations *export_ops) return export_ops->flags & EXPORT_OP_ASYNC_LOCK; } +/** + * exportfs_lock_op_is_unsupported() - export does not support file locking + * @export_ops: the nfs export operations to check + * + * Returns true if the nfs export_operations structure has + * EXPORT_OP_NOLOCKSUPPORT in their flags set + */ +static inline bool +exportfs_lock_op_is_unsupported(const struct export_operations *export_ops) +{ + return export_ops->flags & EXPORT_OP_NOLOCKSUPPORT; +} + extern int exportfs_encode_inode_fh(struct inode *inode, struct fid *fid, int *max_len, struct inode *parent, int flags);