Re: [PATCH v2] cifs: Fix handling of OFD locks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Pavel,

Thanks for the review!

On August 2, 2018 7:17:42 PM GMT-03:00, Pavel Shilovsky <piastryyy@xxxxxxxxx> wrote:
>2018-08-02 11:52 GMT-07:00 Paulo Alcantara <paulo@xxxxxxxx>:
>> OFD locks never conflict each other.
>
>I guess it should be mentioned that OFD locks never conflicts if they
>are set through the same FD.

OK.

>
>>
>> Signed-off-by: Paulo Alcantara <palcantara@xxxxxxx>
>> ---
>>  fs/cifs/cifsglob.h  |   1 +
>>  fs/cifs/cifsproto.h |   4 --
>>  fs/cifs/file.c      | 109
>+++++++++++++++++++++++++++++---------------
>>  3 files changed, 74 insertions(+), 40 deletions(-)
>>
>> diff --git a/fs/cifs/cifsglob.h b/fs/cifs/cifsglob.h
>> index 0553929e8339..bb55e9aa4fe3 100644
>> --- a/fs/cifs/cifsglob.h
>> +++ b/fs/cifs/cifsglob.h
>> @@ -1069,6 +1069,7 @@ struct cifsLockInfo {
>>         __u64 length;
>>         __u32 pid;
>>         __u32 type;
>> +       unsigned int flags; /* file lock flags */
>>  };
>>
>>  /*
>> diff --git a/fs/cifs/cifsproto.h b/fs/cifs/cifsproto.h
>> index 20adda4de83b..e6a72a3f597b 100644
>> --- a/fs/cifs/cifsproto.h
>> +++ b/fs/cifs/cifsproto.h
>> @@ -218,10 +218,6 @@ extern void cifs_umount(struct cifs_sb_info *);
>>  extern void cifs_mark_open_files_invalid(struct cifs_tcon *tcon);
>>  extern void cifs_reopen_persistent_handles(struct cifs_tcon *tcon);
>>
>> -extern bool cifs_find_lock_conflict(struct cifsFileInfo *cfile,
>__u64 offset,
>> -                                   __u64 length, __u8 type,
>> -                                   struct cifsLockInfo **conf_lock,
>> -                                   int rw_check);
>>  extern void cifs_add_pending_open(struct cifs_fid *fid,
>>                                   struct tcon_link *tlink,
>>                                   struct cifs_pending_open *open);
>> diff --git a/fs/cifs/file.c b/fs/cifs/file.c
>> index 8d41ca7bfcf1..58ee94550e42 100644
>> --- a/fs/cifs/file.c
>> +++ b/fs/cifs/file.c
>> @@ -864,14 +864,15 @@ int cifs_closedir(struct inode *inode, struct
>file *file)
>>  }
>>
>>  static struct cifsLockInfo *
>> -cifs_lock_init(__u64 offset, __u64 length, __u8 type)
>> +cifs_lock_init(struct file_lock *fl, __u8 type)
>>  {
>>         struct cifsLockInfo *lock =
>>                 kmalloc(sizeof(struct cifsLockInfo), GFP_KERNEL);
>>         if (!lock)
>>                 return lock;
>> -       lock->offset = offset;
>> -       lock->length = length;
>> +       lock->offset = fl->fl_start;
>> +       lock->length = fl->fl_end - fl->fl_start + 1;
>> +       lock->flags = fl->fl_flags;
>>         lock->type = type;
>>         lock->pid = current->tgid;
>>         INIT_LIST_HEAD(&lock->blist);
>> @@ -893,30 +894,60 @@ cifs_del_lock_waiters(struct cifsLockInfo
>*lock)
>>  #define CIFS_READ_OP   1
>>  #define CIFS_WRITE_OP  2
>>
>> -/* @rw_check : 0 - no op, 1 - read, 2 - write */
>> -static bool
>> -cifs_find_fid_lock_conflict(struct cifs_fid_locks *fdlocks, __u64
>offset,
>> -                           __u64 length, __u8 type, struct
>cifsFileInfo *cfile,
>> -                           struct cifsLockInfo **conf_lock, int
>rw_check)
>> +static inline bool locks_overlap(struct cifsLockInfo *li, __u64
>offset,
>> +                                __u64 length)
>> +{
>> +       return offset + length > li->offset &&
>> +               offset < li->offset + li->length;
>> +}
>> +
>> +static inline bool
>> +locks_conflict(struct cifsFileInfo *cfile, struct cifsFileInfo
>*cur_cfile,
>> +              struct cifsLockInfo *li, __u64 offset, __u64 length,
>> +              __u8 type, unsigned int flags, struct TCP_Server_Info
>*server,
>> +              int rw_check)
>> +{
>> +       if (!locks_overlap(li, offset, length))
>> +               return false;
>> +       if (!server->ops->compare_fids(cfile, cur_cfile))
>> +               return true;
>
>If FIDs don't match locks are considered conflicting which is not true
>for shared locks.
>
>> +       if (current->tgid != li->pid)
>> +               return true;
>> +
>> +       if (rw_check == CIFS_LOCK_OP) {
>> +               if ((flags & FL_OFDLCK) && (li->flags & FL_OFDLCK))
>> +                       return false;
>> +               if ((flags & FL_POSIX) && (li->flags & FL_POSIX))
>> +                       return false;
>
>Here you are changing the behavior for POSIX locks that doesn't
>reflect the patch title/message.
>
>> +               if (li->type & server->vals->exclusive_lock_type)
>> +                       return true;
>
>With the change above locking a file with a shared lock already locked
>by an exclusive lock from the same FD and PID won't be allowed which
>contradict LockFileEx semantics
>(https://docs.microsoft.com/en-us/windows/desktop/api/fileapi/nf-fileapi-lockfileex).

You're right. I will fix it.

>
>> +               if (type & server->vals->exclusive_lock_type)
>> +                       return true;
>> +               return false;
>> +       }
>> +
>> +       /* shared lock prevents write op through the same fid */
>> +       if (!(li->type & server->vals->shared_lock_type) ||
>> +           rw_check != CIFS_WRITE_OP)
>> +               return false;
>> +
>> +       return true;
>> +}
>> +
>> +static inline bool __fid_lock_conflicts(struct cifs_fid_locks
>*fdlocks,
>> +                                       __u64 offset, __u64 length,
>> +                                       __u8 type, unsigned int
>flags,
>> +                                       struct cifsFileInfo *cfile,
>> +                                       struct cifsLockInfo
>**conf_lock,
>> +                                       int rw_check)
>>  {
>>         struct cifsLockInfo *li;
>>         struct cifsFileInfo *cur_cfile = fdlocks->cfile;
>>         struct TCP_Server_Info *server =
>tlink_tcon(cfile->tlink)->ses->server;
>>
>>         list_for_each_entry(li, &fdlocks->locks, llist) {
>> -               if (offset + length <= li->offset ||
>> -                   offset >= li->offset + li->length)
>> -                       continue;
>> -               if (rw_check != CIFS_LOCK_OP && current->tgid ==
>li->pid &&
>> -                   server->ops->compare_fids(cfile, cur_cfile)) {
>> -                       /* shared lock prevents write op through the
>same fid */
>> -                       if (!(li->type &
>server->vals->shared_lock_type) ||
>> -                           rw_check != CIFS_WRITE_OP)
>> -                               continue;
>> -               }
>> -               if ((type & server->vals->shared_lock_type) &&
>> -                   ((server->ops->compare_fids(cfile, cur_cfile) &&
>> -                    current->tgid == li->pid) || type == li->type))
>> +               if (!locks_conflict(cfile, cur_cfile, li, offset,
>length, type,
>> +                                   flags, server, rw_check))
>
>I am remembering that the existing logic is trying to match the SMB
>server behavior for SMB locks (see LockFileEx), so we won't have
>conflicts when we get a oplock/lease break and push byte-range locks
>to the server.
>
>This change will break the existing behavior for both POSIX and OFD
>locks: while you allow locks to be set locally, server will reject
>them and we will end up in a mixed state. Is it desired behavior?

Nope, it isn't. Your comments make sense and the logic is broken. I will fix it in next version.

>
>
>>                         continue;
>>                 if (conf_lock)
>>                         *conf_lock = li;
>> @@ -925,18 +956,19 @@ cifs_find_fid_lock_conflict(struct
>cifs_fid_locks *fdlocks, __u64 offset,
>>         return false;
>>  }
>>
>> -bool
>> -cifs_find_lock_conflict(struct cifsFileInfo *cfile, __u64 offset,
>__u64 length,
>> -                       __u8 type, struct cifsLockInfo **conf_lock,
>> -                       int rw_check)
>> +static bool cifs_find_lock_conflict(struct cifsFileInfo *cfile,
>__u64 offset,
>> +                                   __u64 length, __u8 type, unsigned
>int flags,
>> +                                   struct cifsLockInfo **conf_lock,
>> +                                   int rw_check)
>>  {
>>         bool rc = false;
>>         struct cifs_fid_locks *cur;
>>         struct cifsInodeInfo *cinode =
>CIFS_I(d_inode(cfile->dentry));
>>
>>         list_for_each_entry(cur, &cinode->llist, llist) {
>> -               rc = cifs_find_fid_lock_conflict(cur, offset, length,
>type,
>> -                                                cfile, conf_lock,
>rw_check);
>> +               rc = __fid_lock_conflicts(cur, offset, length, type,
>> +                                         flags, cfile, conf_lock,
>> +                                         rw_check);
>>                 if (rc)
>>                         break;
>>         }
>> @@ -964,7 +996,8 @@ cifs_lock_test(struct cifsFileInfo *cfile, __u64
>offset, __u64 length,
>>         down_read(&cinode->lock_sem);
>>
>>         exist = cifs_find_lock_conflict(cfile, offset, length, type,
>> -                                       &conf_lock, CIFS_LOCK_OP);
>> +                                       flock->fl_flags, &conf_lock,
>> +                                       CIFS_LOCK_OP);
>>         if (exist) {
>>                 flock->fl_start = conf_lock->offset;
>>                 flock->fl_end = conf_lock->offset + conf_lock->length
>- 1;
>> @@ -1011,7 +1044,8 @@ cifs_lock_add_if(struct cifsFileInfo *cfile,
>struct cifsLockInfo *lock,
>>         down_write(&cinode->lock_sem);
>>
>>         exist = cifs_find_lock_conflict(cfile, lock->offset,
>lock->length,
>> -                                       lock->type, &conf_lock,
>CIFS_LOCK_OP);
>> +                                       lock->type, lock->flags,
>&conf_lock,
>> +                                       CIFS_LOCK_OP);
>>         if (!exist && cinode->can_cache_brlcks) {
>>                 list_add_tail(&lock->llist, &cfile->llist->locks);
>>                 up_write(&cinode->lock_sem);
>> @@ -1307,8 +1341,15 @@ static void
>>  cifs_read_flock(struct file_lock *flock, __u32 *type, int *lock, int
>*unlock,
>>                 bool *wait_flag, struct TCP_Server_Info *server)
>>  {
>> +       unsigned int flags = FL_POSIX | FL_OFDLCK | FL_FLOCK |
>FL_SLEEP |
>> +               FL_ACCESS | FL_LEASE | FL_CLOSE;
>> +
>> +       if (flock->fl_flags & ~flags)
>> +               cifs_dbg(FYI, "Unknown lock flags 0x%x\n",
>flock->fl_flags);
>>         if (flock->fl_flags & FL_POSIX)
>>                 cifs_dbg(FYI, "Posix\n");
>> +       if (flock->fl_flags & FL_OFDLCK)
>> +               cifs_dbg(FYI, "OFD lock\n");
>>         if (flock->fl_flags & FL_FLOCK)
>>                 cifs_dbg(FYI, "Flock\n");
>>         if (flock->fl_flags & FL_SLEEP) {
>> @@ -1319,10 +1360,6 @@ cifs_read_flock(struct file_lock *flock, __u32
>*type, int *lock, int *unlock,
>>                 cifs_dbg(FYI, "Process suspended by mandatory locking
>- not implemented yet\n");
>>         if (flock->fl_flags & FL_LEASE)
>>                 cifs_dbg(FYI, "Lease on file - not implemented
>yet\n");
>> -       if (flock->fl_flags &
>> -           (~(FL_POSIX | FL_FLOCK | FL_SLEEP |
>> -              FL_ACCESS | FL_LEASE | FL_CLOSE)))
>> -               cifs_dbg(FYI, "Unknown lock flags 0x%x\n",
>flock->fl_flags);
>>
>>         *type = server->vals->large_lock_type;
>>         if (flock->fl_type == F_WRLCK) {
>> @@ -1584,7 +1621,7 @@ cifs_setlk(struct file *file, struct file_lock
>*flock, __u32 type,
>>         if (lock) {
>>                 struct cifsLockInfo *lock;
>>
>> -               lock = cifs_lock_init(flock->fl_start, length, type);
>> +               lock = cifs_lock_init(flock, type);
>>                 if (!lock)
>>                         return -ENOMEM;
>>
>> @@ -2817,7 +2854,7 @@ cifs_writev(struct kiocb *iocb, struct iov_iter
>*from)
>>                 goto out;
>>
>>         if (!cifs_find_lock_conflict(cfile, iocb->ki_pos,
>iov_iter_count(from),
>> -                                   
>server->vals->exclusive_lock_type, NULL,
>> +                                   
>server->vals->exclusive_lock_type, 0, NULL,
>>                                      CIFS_WRITE_OP))
>>                 rc = __generic_file_write_iter(iocb, from);
>>         else
>> @@ -3388,7 +3425,7 @@ cifs_strict_readv(struct kiocb *iocb, struct
>iov_iter *to)
>>         down_read(&cinode->lock_sem);
>>         if (!cifs_find_lock_conflict(cfile, iocb->ki_pos,
>iov_iter_count(to),
>>                                     
>tcon->ses->server->vals->shared_lock_type,
>> -                                    NULL, CIFS_READ_OP))
>> +                                    0, NULL, CIFS_READ_OP))
>>                 rc = generic_file_read_iter(iocb, to);
>>         up_read(&cinode->lock_sem);
>>         return rc;
>> --
>> 2.18.0
>>
>> --
>> To unsubscribe from this list: send the line "unsubscribe linux-cifs"
>in
>> the body of a message to majordomo@xxxxxxxxxxxxxxx
>> More majordomo info at  http://vger.kernel.org/majordomo-info.html
>
>Best regards,
>Pavel Shilovsky

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.
--
To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux