From patchwork Fri Feb 21 23:42:19 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Dai Ngo X-Patchwork-Id: 13986454 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 774D942A95 for ; Fri, 21 Feb 2025 23:42:57 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=205.220.165.32 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1740181379; cv=none; b=RNG1sbKyomHJBJ4wnn40YO6qwrbJO+Tzx4vg8xuMCoiSEP1yqj1p5ETr+qzw6UoO5c7dIYcuDYcjR6IClAxp6O8euc6WGwQRMVCd2Xn2LlCE0jNikucdkDh7aQkNaSl2BKZYvKSwBsjGkTKl18bmcEjj2L89v10mgeIxQmqv7+o= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1740181379; c=relaxed/simple; bh=/VRmRaoP8tlOOIYAt6HvtsZrEAzcFl30++Jgh+uSNt4=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References; b=olS0nW4lZ/W+20zYiLeQTq4TrbHZwlKukrK76YW+Kb82ApcQgkHeXgaux1fmhdQLOtFjR91A0JeYyYrxPbcbJTICvU/g+E6oCLxjDr/bI7HPM2On/7fHEuIp0TY7TV1INRXjZ8WuOTvVVAqwc2hQu1ibVWW9LXcd3IY9jU7TIX4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com; spf=pass smtp.mailfrom=oracle.com; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b=dyoCQOAZ; arc=none smtp.client-ip=205.220.165.32 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=oracle.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b="dyoCQOAZ" Received: from pps.filterd (m0246617.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 51LMBdLO012315; Fri, 21 Feb 2025 23:42:45 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :date:from:in-reply-to:message-id:references:subject:to; s= corp-2023-11-20; bh=06gwkYsI+a84qFLsh1bh8QxEtZObvGNbDmcO7DZpCq4=; b= dyoCQOAZPgA7q5R+DWUALvM9sLXl7WnEMpFgWAfM8v4UyJdBlWhMdH5ItH2mzjyH nTa5FgGNvTeXBVngEkx0YaZ/k8Y/8P0L+iv70kyZKQKJV5vL24KR+A3h17hwIulV J5jaiMs+PxEaEF3aBteYC/3dTRljux4NwpMguoc+pls6tTjYKtNOusEhitcvey0i m0cCpu5DIg4RYQh+2+vnBhc6jtOmMdKntPd4Uy/ilPUnheVPVxLfbZ1NMqVvhuSR gpif0a6xreqaUonyPY8/9HOv+gEnphaUUWVCS7iQvG2A2wfL53/av6UwWdqjuzxb FMKB49tuDOyjJWJa3dv+9w== Received: from iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta01.appoci.oracle.com [130.35.100.223]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 44w00nqcpt-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 21 Feb 2025 23:42:44 +0000 (GMT) Received: from pps.filterd (iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 51LM9cmD026291; Fri, 21 Feb 2025 23:42:43 GMT Received: from pps.reinject (localhost [127.0.0.1]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 44w0ssumd5-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 21 Feb 2025 23:42:43 +0000 Received: from iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by pps.reinject (8.17.1.5/8.17.1.5) with ESMTP id 51LNbkJL037041; Fri, 21 Feb 2025 23:42:42 GMT Received: from ca-common-sca.us.oracle.com (ca-common-sca.us.oracle.com [10.132.20.202]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTP id 44w0ssumcp-2; Fri, 21 Feb 2025 23:42:42 +0000 From: Dai Ngo To: chuck.lever@oracle.com, jlayton@kernel.org, neilb@suse.de, okorniev@redhat.com, tom@talpey.com Cc: linux-nfs@vger.kernel.org, sagi@grimberg.me Subject: [PATCH V2 1/2] NFSD: Offer write delegation for OPEN with OPEN4_SHARE_ACCESS_WRITE Date: Fri, 21 Feb 2025 15:42:19 -0800 Message-Id: <1740181340-14562-2-git-send-email-dai.ngo@oracle.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1740181340-14562-1-git-send-email-dai.ngo@oracle.com> References: <1740181340-14562-1-git-send-email-dai.ngo@oracle.com> X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1057,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-02-21_09,2025-02-20_02,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 bulkscore=0 mlxlogscore=999 phishscore=0 spamscore=0 malwarescore=0 mlxscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2502100000 definitions=main-2502210162 X-Proofpoint-GUID: mgzmStUySGuwPo5hHD5nympl2rUR1Hr5 X-Proofpoint-ORIG-GUID: mgzmStUySGuwPo5hHD5nympl2rUR1Hr5 Precedence: bulk X-Mailing-List: linux-nfs@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: RFC8881, section 9.1.2 says: "In the case of READ, the server may perform the corresponding check on the access mode, or it may choose to allow READ for OPEN4_SHARE_ACCESS_WRITE, to accommodate clients whose WRITE implementation may unavoidably do (e.g., due to buffer cache constraints)." and in section 10.4.1: "Similarly, when closing a file opened for OPEN4_SHARE_ACCESS_WRITE/ OPEN4_SHARE_ACCESS_BOTH and if an OPEN_DELEGATE_WRITE delegation is in effect" This patch offers write delegation for OPEN with OPEN4_SHARE_ACCESS_WRITE only. Also deleted no longer use find_rw_file(). Signed-off-by: Dai Ngo --- fs/nfsd/nfs4state.c | 34 +++++++++++++--------------------- 1 file changed, 13 insertions(+), 21 deletions(-) diff --git a/fs/nfsd/nfs4state.c b/fs/nfsd/nfs4state.c index 0f97f2c62b3a..b533225e57cf 100644 --- a/fs/nfsd/nfs4state.c +++ b/fs/nfsd/nfs4state.c @@ -633,18 +633,6 @@ find_readable_file(struct nfs4_file *f) return ret; } -static struct nfsd_file * -find_rw_file(struct nfs4_file *f) -{ - struct nfsd_file *ret; - - spin_lock(&f->fi_lock); - ret = nfsd_file_get(f->fi_fds[O_RDWR]); - spin_unlock(&f->fi_lock); - - return ret; -} - struct nfsd_file * find_any_file(struct nfs4_file *f) { @@ -5382,7 +5370,6 @@ static int nfsd4_cb_recall_done(struct nfsd4_callback *cb, if (dp->dl_stid.sc_status) /* CLOSED or REVOKED */ return 1; - switch (task->tk_status) { case 0: return 1; @@ -5987,14 +5974,19 @@ nfs4_set_delegation(struct nfsd4_open *open, struct nfs4_ol_stateid *stp, * "An OPEN_DELEGATE_WRITE delegation allows the client to handle, * on its own, all opens." * - * Furthermore the client can use a write delegation for most READ - * operations as well, so we require a O_RDWR file here. + * Furthermore, section 9.1.2 says: + * + * "In the case of READ, the server may perform the corresponding + * check on the access mode, or it may choose to allow READ for + * OPEN4_SHARE_ACCESS_WRITE, to accommodate clients whose WRITE + * implementation may unavoidably do (e.g., due to buffer cache + * constraints)." * - * Offer a write delegation in the case of a BOTH open, and ensure - * we get the O_RDWR descriptor. + * We choose to offer a write delegation for OPEN with the + * OPEN4_SHARE_ACCESS_WRITE access mode to accommodate such clients. */ - if ((open->op_share_access & NFS4_SHARE_ACCESS_BOTH) == NFS4_SHARE_ACCESS_BOTH) { - nf = find_rw_file(fp); + if (open->op_share_access & NFS4_SHARE_ACCESS_WRITE) { + nf = find_writeable_file(fp); dl_type = deleg_ts ? OPEN_DELEGATE_WRITE_ATTRS_DELEG : OPEN_DELEGATE_WRITE; } @@ -6116,7 +6108,7 @@ static bool nfs4_delegation_stat(struct nfs4_delegation *dp, struct svc_fh *currentfh, struct kstat *stat) { - struct nfsd_file *nf = find_rw_file(dp->dl_stid.sc_file); + struct nfsd_file *nf = find_writeable_file(dp->dl_stid.sc_file); struct path path; int rc; @@ -7063,7 +7055,7 @@ nfsd4_lookup_stateid(struct nfsd4_compound_state *cstate, return_revoked = true; if (typemask & SC_TYPE_DELEG) /* Always allow REVOKED for DELEG so we can - * retturn the appropriate error. + * return the appropriate error. */ statusmask |= SC_STATUS_REVOKED; From patchwork Fri Feb 21 23:42:20 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Dai Ngo X-Patchwork-Id: 13986453 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 11CA12528E5 for ; Fri, 21 Feb 2025 23:42:55 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=205.220.165.32 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1740181377; cv=none; b=nJ/fyoAXIIQ5AenIK/UZZMpV4iIU7alQ6Qb3btqRnxR+EIe+4e5snvnjSmkHQO9vFugjNOG1JUf5P+4qnwQskD8bW/m64ng1SmnxUQZgO43GUbh0AT41phQqh01tDCJBfeScKpBW5bF9BO7DM0KUsB7nfT8oGmLs8DH5QpET8qk= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1740181377; c=relaxed/simple; bh=/BxnPa9qIjrMBQA7ovc7mawj+dNdH4+F4a94y/KB55s=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References; b=BO6tnGgJDw1re4jFp3wVnG8aLIVpcnE/H4VRriO1u3PSC0bc6IhODo5mBNFLHDYID1IiYm3MQOEYvXvBGRTZvjz7R3YAzihGBbbrmc3iARv96KZ8q/48sfVeVVXuuk0gbuYr2YP3BKlNWWIip3sdrZFx+sh7GFC+T3pZgOrqhCc= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com; spf=pass smtp.mailfrom=oracle.com; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b=F81OJrVk; arc=none smtp.client-ip=205.220.165.32 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oracle.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=oracle.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b="F81OJrVk" Received: from pps.filterd (m0246627.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 51LMBeDl030244; Fri, 21 Feb 2025 23:42:46 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :date:from:in-reply-to:message-id:references:subject:to; s= corp-2023-11-20; bh=zj3OAyIoG9zZ9+Id1lzgoNr+b0P5wbygbm2WJ5irbJQ=; b= F81OJrVkDTwZZdsZiVJj7cWSNFZWnLsYH+W0/usoSkzymBUBpeFr64mBl+xGk+kY PtKaiaUTM+tnFbfieCkbpobnzbP5THJQy1FGEOqtIMATVzKL+RwmVExmvix3We8t 0K6KQI1Nst+mX2FyjwwPssx9+0kcPuBHYOJkZz7FjPdHe6wsbtavygI+WN3q+ue/ m3A2KHJ/zc0t1ukxiI9JSgG6b/4sZ18B1rBUYJMe/A9N5tj1r4jCFL+s0qF0sbx0 aQ+Hw4bGyGLwGYPnoF9915LnCxfM1ezJLtaQffUE9q1aEhgzzsxFnkbfNBFxNolT UIvWIor9EGhNMkd5/bjsiQ== Received: from iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta01.appoci.oracle.com [130.35.100.223]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 44w02yqafj-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 21 Feb 2025 23:42:45 +0000 (GMT) Received: from pps.filterd (iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 51LLx7fs026262; Fri, 21 Feb 2025 23:42:44 GMT Received: from pps.reinject (localhost [127.0.0.1]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 44w0ssumdc-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 21 Feb 2025 23:42:44 +0000 Received: from iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by pps.reinject (8.17.1.5/8.17.1.5) with ESMTP id 51LNbkJN037041; Fri, 21 Feb 2025 23:42:43 GMT Received: from ca-common-sca.us.oracle.com (ca-common-sca.us.oracle.com [10.132.20.202]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTP id 44w0ssumcp-3; Fri, 21 Feb 2025 23:42:43 +0000 From: Dai Ngo To: chuck.lever@oracle.com, jlayton@kernel.org, neilb@suse.de, okorniev@redhat.com, tom@talpey.com Cc: linux-nfs@vger.kernel.org, sagi@grimberg.me Subject: [PATCH V2 2/2] NFSD: allow client to use write delegation stateid for READ Date: Fri, 21 Feb 2025 15:42:20 -0800 Message-Id: <1740181340-14562-3-git-send-email-dai.ngo@oracle.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1740181340-14562-1-git-send-email-dai.ngo@oracle.com> References: <1740181340-14562-1-git-send-email-dai.ngo@oracle.com> X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1057,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-02-21_09,2025-02-20_02,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 bulkscore=0 mlxlogscore=841 phishscore=0 spamscore=0 malwarescore=0 mlxscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2502100000 definitions=main-2502210162 X-Proofpoint-ORIG-GUID: aHT5LpQ5xY7eCKRAzl9l5XTEKVnLpQ2o X-Proofpoint-GUID: aHT5LpQ5xY7eCKRAzl9l5XTEKVnLpQ2o Precedence: bulk X-Mailing-List: linux-nfs@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Allow READ using write delegation stateid granted on OPENs with OPEN4_SHARE_ACCESS_WRITE only, to accommodate clients whose WRITE implementation may unavoidably do (e.g., due to buffer cache constraints). When the server offers a write delegation for an OPEN with OPEN4_SHARE_ACCESS_WRITE, the file access mode, the nfs4_file and nfs4_ol_stateid are upgraded as if the OPEN was sent with OPEN4_SHARE_ACCESS_BOTH. When this delegation is returned or revoked, the corresponding open stateid is looked up and if it's found then the file access mode, the nfs4_file and nfs4_ol_stateid are downgraded to remove the read access. Signed-off-by: Dai Ngo --- fs/nfsd/nfs4state.c | 62 +++++++++++++++++++++++++++++++++++++++++++++ fs/nfsd/state.h | 2 ++ 2 files changed, 64 insertions(+) diff --git a/fs/nfsd/nfs4state.c b/fs/nfsd/nfs4state.c index b533225e57cf..0c14f902c54c 100644 --- a/fs/nfsd/nfs4state.c +++ b/fs/nfsd/nfs4state.c @@ -6126,6 +6126,51 @@ nfs4_delegation_stat(struct nfs4_delegation *dp, struct svc_fh *currentfh, return rc == 0; } +/* + * Upgrade file access mode to include FMODE_READ. This is called only when + * a write delegation is granted for an OPEN with OPEN4_SHARE_ACCESS_WRITE. + */ +static void +nfs4_upgrade_rdwr_file_access(struct nfs4_ol_stateid *stp) +{ + struct nfs4_file *fp = stp->st_stid.sc_file; + struct nfsd_file *nflp; + struct file *file; + + spin_lock(&fp->fi_lock); + nflp = fp->fi_fds[O_WRONLY]; + file = nflp->nf_file; + file->f_mode |= FMODE_READ; + swap(fp->fi_fds[O_RDWR], fp->fi_fds[O_WRONLY]); + clear_access(NFS4_SHARE_ACCESS_WRITE, stp); + set_access(NFS4_SHARE_ACCESS_BOTH, stp); + __nfs4_file_get_access(fp, NFS4_SHARE_ACCESS_READ); /* incr fi_access[O_RDONLY] */ + spin_unlock(&fp->fi_lock); +} + +/* + * Downgrade file access mode to remove FMODE_READ. This is called when + * a write delegation, granted for an OPEN with OPEN4_SHARE_ACCESS_WRITE, + * is returned. + */ +static void +nfs4_downgrade_wronly_file_access(struct nfs4_ol_stateid *stp) +{ + struct nfs4_file *fp = stp->st_stid.sc_file; + struct nfsd_file *nflp; + struct file *file; + + spin_lock(&fp->fi_lock); + nflp = fp->fi_fds[O_RDWR]; + file = nflp->nf_file; + file->f_mode &= ~FMODE_READ; + swap(fp->fi_fds[O_WRONLY], fp->fi_fds[O_RDWR]); + clear_access(NFS4_SHARE_ACCESS_BOTH, stp); + set_access(NFS4_SHARE_ACCESS_WRITE, stp); + spin_unlock(&fp->fi_lock); + nfs4_file_put_access(fp, NFS4_SHARE_ACCESS_READ); /* decr. fi_access[O_RDONLY] */ +} + /* * The Linux NFS server does not offer write delegations to NFSv4.0 * clients in order to avoid conflicts between write delegations and @@ -6207,6 +6252,11 @@ nfs4_open_delegation(struct nfsd4_open *open, struct nfs4_ol_stateid *stp, dp->dl_cb_fattr.ncf_cur_fsize = stat.size; dp->dl_cb_fattr.ncf_initial_cinfo = nfsd4_change_attribute(&stat); trace_nfsd_deleg_write(&dp->dl_stid.sc_stateid); + + if ((open->op_share_access & NFS4_SHARE_ACCESS_BOTH) == NFS4_SHARE_ACCESS_WRITE) { + dp->dl_stateid = stp->st_stid.sc_stateid; + nfs4_upgrade_rdwr_file_access(stp); + } } else { open->op_delegate_type = deleg_ts ? OPEN_DELEGATE_READ_ATTRS_DELEG : OPEN_DELEGATE_READ; @@ -7710,6 +7760,8 @@ nfsd4_delegreturn(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, struct nfs4_stid *s; __be32 status; struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); + struct nfs4_ol_stateid *stp; + struct nfs4_stid *stid; if ((status = fh_verify(rqstp, &cstate->current_fh, S_IFREG, 0))) return status; @@ -7724,6 +7776,16 @@ nfsd4_delegreturn(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, trace_nfsd_deleg_return(stateid); destroy_delegation(dp); + + if (dp->dl_stateid.si_generation && dp->dl_stateid.si_opaque.so_id) { + if (!nfsd4_lookup_stateid(cstate, &dp->dl_stateid, + SC_TYPE_OPEN, 0, &stid, nn)) { + stp = openlockstateid(stid); + nfs4_downgrade_wronly_file_access(stp); + nfs4_put_stid(stid); + } + } + smp_mb__after_atomic(); wake_up_var(d_inode(cstate->current_fh.fh_dentry)); put_stateid: diff --git a/fs/nfsd/state.h b/fs/nfsd/state.h index 74d2d7b42676..3f2f1b92db66 100644 --- a/fs/nfsd/state.h +++ b/fs/nfsd/state.h @@ -207,6 +207,8 @@ struct nfs4_delegation { /* for CB_GETATTR */ struct nfs4_cb_fattr dl_cb_fattr; + + stateid_t dl_stateid; /* open stateid */ }; static inline bool deleg_is_read(u32 dl_type)