From patchwork Sat Jul 1 21:33:15 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Trond Myklebust X-Patchwork-Id: 115061 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:994d:0:b0:3d9:f83d:47d9 with SMTP id k13csp11257547vqr; Sat, 1 Jul 2023 14:46:04 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ6r4Q68KSEvzFf4GYhrFNJ2Kh1iJD9QWOk4WVsl+tKxg4xMcmMAw4pAELB7y1bYKnpS/rtd X-Received: by 2002:a05:6a20:bf24:b0:12b:68f6:411d with SMTP id gc36-20020a056a20bf2400b0012b68f6411dmr4265828pzb.49.1688247964566; Sat, 01 Jul 2023 14:46:04 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1688247964; cv=pass; d=google.com; s=arc-20160816; b=gZk3hqoT1DPS/uUDOFxcE6fEgMHHQ6SCyqh8Cm8fnCGDdPi9f28/z0/HXj7HOU6Ad7 ebSrnyB0PTXE0oSHQWDojWRx2P0Qs/N+nHY1/xeVOd0xvyaS3aPJBTTbKd7RDlkbgt7d d4MQ0AxulH87fVOD+ZnR9EGtkxCzCW8vMPECLl5AqWSk26NuLGAvwqn2jlbwDOK1ksXT pJ7VioBy4LjjTIO4J/dvyCucC9OtFQunfHKXiO7EAkBEnudnlvHctc/VV+tIJWzdqwI6 7apBbsOHKWYugVZ0bRBuV/UG0NvnetLK2C2KxOXb30mhB3Xd8tZ8FN4ls0JxW8LvpU8q 5AfA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:content-transfer-encoding :content-id:content-language:accept-language:message-id:date :thread-index:thread-topic:subject:cc:to:from:dkim-signature; bh=C9qcHg0KW6eduu9KFMlDKv2cDHXwCvbu7P2D5/xq8ug=; fh=POto838KDexjZdEOTr8Sq5YsO60PtHzjUFp3GotapVY=; b=UfHrdyHor6xYdA5D9EDs/BRiaD8w49XjxBRQ26/TIKo1lYTATW0L1zK5/jbHCXgOPi MERib+jCPEvj7yapEfkp9IB0jG2Y9JOroBA0KRNdgUgYQiXQa3i3WSlIPMiQ0hAEo4Gf RduwJeMEd8QhWgmYTQ0uerJcS/g9gyS68e7qAtF/lzQvj/zBCnq9FevQkEyqXCv8Hiqh KXWAxd3J/N2z1QmXnSeRDCoJVwFXbIyNhwSVMllA11u7itFz/SsNvfWCX8Kg7qSQStqz mVHRUWK6amgMWTgdIkOmv9bqQHYkooZilJ0D/6zY0yXPGUCjCXoALVL1cllg5apD9+r3 EPxA== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@hammerspace.com header.s=selector2 header.b=g3blRl2P; arc=pass (i=1 spf=pass spfdomain=hammerspace.com dkim=pass dkdomain=hammerspace.com dmarc=pass fromdomain=hammerspace.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=hammerspace.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id cz8-20020aa79308000000b0065addb172d1si14682817pfb.380.2023.07.01.14.45.35; Sat, 01 Jul 2023 14:46:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@hammerspace.com header.s=selector2 header.b=g3blRl2P; arc=pass (i=1 spf=pass spfdomain=hammerspace.com dkim=pass dkdomain=hammerspace.com dmarc=pass fromdomain=hammerspace.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=hammerspace.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229644AbjGAVdY (ORCPT + 99 others); Sat, 1 Jul 2023 17:33:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50264 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229533AbjGAVdX (ORCPT ); Sat, 1 Jul 2023 17:33:23 -0400 Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2136.outbound.protection.outlook.com [40.107.244.136]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 21A3510DC; Sat, 1 Jul 2023 14:33:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=O8v11w3pkRLbtDn/V8+de7rcazOGGAq8GgYE/mlEQ2X1IoMEMZuHBDEwEhMfrahibQ5cSLrOeCX3aOgyHhHWMEyIduGUWTolcjchKXy/7ETW8Vwyeedgk6YnPF22775++Xy+sQSiNpiIhUXFYrjZjE7/+HvjzVtwroUkbGtNBexEV6zktDc0KVVnlahlZfgUzUUCPjjpVJym69Mt6gVbhnq8lg73yHmXx1ISW/748LpzhebuHIQzuHkg7laXLS9yLdIoXTQIffE1640kIlPdaXL+ABbdTBj+uBjEvPzG73l9/Iy7d/x1C0ZLL5uTlTl+nK1oSPRLnfYAOdLe240yzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=C9qcHg0KW6eduu9KFMlDKv2cDHXwCvbu7P2D5/xq8ug=; b=NPO7xHak9//pEPbWuHSXkOiPjaNKLWwB6C3KexrTJJ0vBmjKejNp1DrLTqfPbNDK16OBdxRok8ewN/vw1QQwnASzxQX6b+hb7Szxtt4oONSCO26WB1sWE2L0gOTiT8c+ejHOyJtM/uPkcmDJJHq955VQnvSkiHdLww7YFOG0ebbK0LT/mzi+SGIYNnN4LE3oSlBhRWviHggFdSGl9slCwpu2XU4IteDSn3oIAhHrlJeXjhfxCKZv5HvUUr8Kmzel5MgmZhFgwdHMl29NAvXizCREgJeUINgLovzbiwUCZUacSPo4wS5mbkG1VL+Fom/0zRe+pm3dS/mVQew1Kn9sDQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hammerspace.com; dmarc=pass action=none header.from=hammerspace.com; dkim=pass header.d=hammerspace.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hammerspace.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=C9qcHg0KW6eduu9KFMlDKv2cDHXwCvbu7P2D5/xq8ug=; b=g3blRl2PRnj0HsvhAepiqSsMuPBuFzWwsHGrCkztHU5fr9pNbAv9qos7D3rdWWoTC7Cy2dFH5d9f7RyXCCKzL5gYmNMcd6CsKJ+NWXCv3lSK00XHPXEmg0p+klBk3NEju0z2D0XhWIfS7EpkNWoPzopGBg0LeCc18UY+0PNXuwU= Received: from CH0PR13MB5084.namprd13.prod.outlook.com (2603:10b6:610:111::7) by SA3PR13MB6231.namprd13.prod.outlook.com (2603:10b6:806:2ff::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6544.24; Sat, 1 Jul 2023 21:33:17 +0000 Received: from CH0PR13MB5084.namprd13.prod.outlook.com ([fe80::6a2f:f437:6816:78f8]) by CH0PR13MB5084.namprd13.prod.outlook.com ([fe80::6a2f:f437:6816:78f8%7]) with mapi id 15.20.6544.024; Sat, 1 Jul 2023 21:33:16 +0000 From: Trond Myklebust To: "torvalds@linux-foundation.org" CC: "linux-nfs@vger.kernel.org" , "linux-kernel@vger.kernel.org" Subject: [GIT PULL] Please pull NFS client updates for Linux 6.5 Thread-Topic: [GIT PULL] Please pull NFS client updates for Linux 6.5 Thread-Index: AQHZrGOliM0J7bMnOUq5DjPIPQa4cA== Date: Sat, 1 Jul 2023 21:33:15 +0000 Message-ID: Accept-Language: en-US, en-GB Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=hammerspace.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: CH0PR13MB5084:EE_|SA3PR13MB6231:EE_ x-ms-office365-filtering-correlation-id: fcfc8971-b086-47ba-a3ef-08db7a7ac7a8 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CH0PR13MB5084.namprd13.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230028)(346002)(366004)(136003)(376002)(396003)(39830400003)(451199021)(4326008)(316002)(66476007)(86362001)(66446008)(64756008)(66556008)(186003)(6916009)(66946007)(76116006)(6506007)(6512007)(83380400001)(122000001)(2616005)(2906002)(6486002)(38100700002)(15650500001)(71200400001)(5660300002)(478600001)(38070700005)(8676002)(54906003)(8936002)(41300700001)(36756003);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?q?+uvYBxKjGmyzUudsQ9c7m7FTh0Fb?= =?utf-8?q?s607d59yFtJf/PLOXOyMgMf5a7mhoBj6rIwG080y6q5hM3UYKpqDbbTeWGrSQ+99Z?= =?utf-8?q?KqRcz5I5hi/wQbcA18eYPX5LhSOXeTYNWT+CyLcNeSQaEMF+W1iF74i1jqpl/IX/p?= =?utf-8?q?bYtZzQ2Tb7tTtzvtYQA0yALDslDBYK0lMBE/ZZqDei9H12XkqKwU2miwrfk3vBuj5?= =?utf-8?q?QIY/g2995/+E9YgaPXJjfJxzdziu0GzekYc4lFdHs5I21pzFNjznRRGJSH61UVnyb?= =?utf-8?q?Ol+yEOXOiCon1ryw7y9CTKF0iUjb49Lb68eibpUwWFq30k9wRUMBApAJwVIEWkjkc?= =?utf-8?q?r38Iq4H7R/RqBPp0lqx8/w7Q1Y1jKDR5bs7RYgq2lskcWm7hRsyfpDwXdyje3V8u1?= =?utf-8?q?rHmvZw9H4fTZUz1QBApi4dHztwf1JEKDhypu4581XZVaERldkKIWvXt/ByIeheoUq?= =?utf-8?q?EACruHNqxWuHs8Z9WtTjmYHpEae9fenwaUfltna6BYVcU/7JqRB5hctY5zyppqsAb?= =?utf-8?q?nY9iM/ap3q7xNjIsv7hFZYUTGJYm9hHS5eU+mVhdcIzEJz4+SYdOtq4jVbiUi6buj?= =?utf-8?q?u7YhWYeiH5UgldMR2hZl708YbnmhnmtquROfjTELOFSsxMs5pXvdvwPT5ffTRWQVc?= =?utf-8?q?zptN9TfanAF1kU4gJ0Oy3S0IWsIYzyhcw8azKcOkxoKeRL8Ba7NQzmlokVwTmdCMW?= =?utf-8?q?uSm58qzQS2vVW9806LlyZRLYzTGo7b1nYmkkHzZNTYIsACxlbSoQypPoPxoazo22/?= =?utf-8?q?9X3O/yyFTfA7+VbqmB1riM4rdBuB+IwDq6gUFeX7PL+uzCCYVd/KpnOmI6AwUojF1?= =?utf-8?q?IWpfrxANNtlWsKqIciH6t+r+/p0gcYT5z4Qm8ze1RHAmbPxcos/nsE6uuDrIgXBdL?= =?utf-8?q?XOekcVEPcG32PSLsM1uHH3bEW1jUsSgL2dX4GHfBny+ZVZKMg/O4Gymuueot45/cU?= =?utf-8?q?fdWfzx8zUdE0UkSjVAOuq8ew2LJ59CXFyq+bkNQKEqQgKSDwiGNcYVP0pNDO8ADWB?= =?utf-8?q?z5AEjvPF0a87u7n0CvvgBNU7sRMX/P10g8DtTv1jZo9929qXkhEGa/iy8t1xcfzTU?= =?utf-8?q?o16cSQkPsyLH42htVxzip061iW/9BoJHHiwIvMPNUb+sQugSayLSqdOsgdhikWvnJ?= =?utf-8?q?wUQJJfiWcVU1x6FwmHnKHLvi93AtmFcEBNJ9XpJdUev407EEUh69g2Kr4qOH3A3aJ?= =?utf-8?q?9pFq9AjVvkseHhujqYzOnzh2via6wfmlfe3+bjlwp25NE2VDk7OwOmy+nrisSmaq5?= =?utf-8?q?z05C5DFrPI/BnLNRjX5z3kTgEb0AWLYbX6/Em4kbpU/sV85dpAHbDJ6TX+67rlsbH?= =?utf-8?q?odzBHfqS0QeYeV5Wn4rAyn7rd/VoxJkzyFKjcCeCsCLOH8hW8dBTh8jUANK/fGxNu?= =?utf-8?q?qhnjdBZlPdX5PMQrIS+/Ledmz0wSMIZ/rKLM0zC/FfOCRKMuQ++9LIbPPkgP9rCxe?= =?utf-8?q?rGOVgVLjmlekSyQ0b8vgr06HpPpKcnxiupo/M8AzAzGndIc1ZuQZ8omvdZ8iGS0q/?= =?utf-8?q?/JmVwfvnhKmJEh172FEDENLgbWOabuj+Fxh9K1SJuaM2Vt/5dBw5t11mP0T/8AC0M?= =?utf-8?q?Rb71CIIcGUGMcLj5GWtWo0lGzcNk0eUHw=3D=3D?= Content-ID: <9F340E1ACF7A3E4B958D96687BDCBD4C@namprd13.prod.outlook.com> MIME-Version: 1.0 X-OriginatorOrg: hammerspace.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CH0PR13MB5084.namprd13.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: fcfc8971-b086-47ba-a3ef-08db7a7ac7a8 X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Jul 2023 21:33:15.6836 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 0d4fed5c-3a70-46fe-9430-ece41741f59e X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 6KSvd2Bm8MB1Gupnh4jVNL8XcFVxhyrO5hd5yBQ5URqdrCS072i3PNZdLvTfSwFyhKh7w6aOKdOQgugzui+hTg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA3PR13MB6231 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_PASS,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1770256297647328232?= X-GMAIL-MSGID: =?utf-8?q?1770256297647328232?= Hi Linus, The following changes since commit 45a3e24f65e90a047bef86f927ebdc4c710edaa1: Linux 6.4-rc7 (2023-06-18 14:06:27 -0700) are available in the Git repository at: git://git.linux-nfs.org/projects/trondmy/linux-nfs.git tags/nfs-for-6.5-1 for you to fetch changes up to 5b4a82a0724af1dfd1320826e0266117b6a57fbd: Revert "NFSv4: Retry LOCK on OLD_STATEID during delegation return" (2023-06-29 14:25:35 -0400) Thanks, Trond ---------------------------------------------------------------- NFS client updates for Linux 6.5 Highlights include: Stable fixes and other bugfixes: - nfs: don't report STATX_BTIME in ->getattr - Revert "NFSv4: Retry LOCK on OLD_STATEID during delegation return" since it breaks NFSv4 state recovery. - NFSv4.1: freeze the session table upon receiving NFS4ERR_BADSESSION - Fix the NFSv4.2 xattr cache shrinker_id - Force a ctime update after a NFSv4.2 SETXATTR call Features and cleanups: - NFS and RPC over TLS client code from Chuck Lever. - Support for use of abstract unix socket addresses with the rpcbind daemon. - Sysfs API to allow shutdown of the kernel RPC client and prevent umount() hangs if the server is known to be permanently down. - XDR cleanups from Anna. ---------------------------------------------------------------- Anna Schumaker (6): NFSv4.2: Clean up: Move the encode_copy_commit() function NFSv4.2: Clean up: move decode_*xattr() functions NFSv4.2: Clean up: Move nfs4_xdr_enc_*xattr() functions NFSv4.2: Clean up nfs4_xdr_dec_*xattr() functions NFSv4.2: Clean up xattr size macros NFSv4.2: SETXATTR should update ctime Benjamin Coddington (13): NFS: rename nfs_client_kset to nfs_kset NFS: rename nfs_client_kobj to nfs_net_kobj NFS: Open-code the nfs_kset kset_create_and_add() NFS: Make all of /sys/fs/nfs network-namespace unique NFS: add superblock sysfs entries NFS: Add sysfs links to sunrpc clients for nfs_clients NFS: add a sysfs link to the lockd rpc_client NFS: add a sysfs link to the acl rpc_client NFS: add sysfs shutdown knob NFS: Cancel all existing RPC tasks when shutdown NFSv4: Clean up some shutdown loops NFS: Don't cleanup sysfs superblock entry if uninitialized Revert "NFSv4: Retry LOCK on OLD_STATEID during delegation return" Chuck Lever (9): NFS: Improvements for fs_context-related tracepoints SUNRPC: Plumb an API for setting transport layer security SUNRPC: Trace the rpc_create_args SUNRPC: Add RPC client support for the RPC_AUTH_TLS auth flavor SUNRPC: Ignore data_ready callbacks during TLS handshakes SUNRPC: Capture CMSG metadata on client-side receive SUNRPC: Add a TCP-with-TLS RPC transport class NFS: Have struct nfs_client carry a TLS policy field NFS: Add an "xprtsec=" NFS mount option Jeff Layton (1): nfs: don't report STATX_BTIME in ->getattr NeilBrown (2): SUNRPC: support abstract unix socket addresses SUNRPC: attempt to reach rpcbind with an abstract socket name Olga Kornievskaia (1): NFSv4.1: freeze the session table upon receiving NFS4ERR_BADSESSION Qi Zheng (1): NFSv4.2: fix wrong shrinker_id fs/lockd/clntlock.c | 6 + fs/nfs/client.c | 32 ++ fs/nfs/fs_context.c | 67 +++++ fs/nfs/inode.c | 2 +- fs/nfs/internal.h | 2 + fs/nfs/nfs3client.c | 13 +- fs/nfs/nfs42proc.c | 25 +- fs/nfs/nfs42xattr.c | 79 ++--- fs/nfs/nfs42xdr.c | 631 +++++++++++++++++++++------------------- fs/nfs/nfs4client.c | 44 ++- fs/nfs/nfs4proc.c | 9 +- fs/nfs/nfs4state.c | 3 + fs/nfs/super.c | 18 +- fs/nfs/sysfs.c | 235 ++++++++++++--- fs/nfs/sysfs.h | 10 +- include/linux/lockd/bind.h | 2 + include/linux/nfs_fs_sb.h | 6 +- include/linux/nfs_xdr.h | 3 + include/linux/sunrpc/auth.h | 2 + include/linux/sunrpc/clnt.h | 13 +- include/linux/sunrpc/xprt.h | 18 ++ include/linux/sunrpc/xprtsock.h | 3 + include/trace/events/sunrpc.h | 96 +++++- net/sunrpc/Makefile | 2 +- net/sunrpc/auth.c | 2 +- net/sunrpc/auth_tls.c | 175 +++++++++++ net/sunrpc/clnt.c | 22 +- net/sunrpc/rpcb_clnt.c | 39 ++- net/sunrpc/sysfs.c | 1 + net/sunrpc/sysfs.h | 7 - net/sunrpc/xprtsock.c | 434 ++++++++++++++++++++++++++- 31 files changed, 1566 insertions(+), 435 deletions(-) create mode 100644 net/sunrpc/auth_tls.c --- Trond Myklebust Linux NFS client maintainer, Hammerspace trond.myklebust@hammerspace.com