License cleanup: add SPDX GPL-2.0 license identifier to files with no license
Many source files in the tree are missing licensing information, which
makes it harder for compliance tools to determine the correct license.
By default all files without license information are under the default
license of the kernel, which is GPL version 2.
Update the files which contain no license information with the 'GPL-2.0'
SPDX license identifier. The SPDX identifier is a legally binding
shorthand, which can be used instead of the full boiler plate text.
This patch is based on work done by Thomas Gleixner and Kate Stewart and
Philippe Ombredanne.
How this work was done:
Patches were generated and checked against linux-4.14-rc6 for a subset of
the use cases:
- file had no licensing information it it.
- file was a */uapi/* one with no licensing information in it,
- file was a */uapi/* one with existing licensing information,
Further patches will be generated in subsequent months to fix up cases
where non-standard license headers were used, and references to license
had to be inferred by heuristics based on keywords.
The analysis to determine which SPDX License Identifier to be applied to
a file was done in a spreadsheet of side by side results from of the
output of two independent scanners (ScanCode & Windriver) producing SPDX
tag:value files created by Philippe Ombredanne. Philippe prepared the
base worksheet, and did an initial spot review of a few 1000 files.
The 4.13 kernel was the starting point of the analysis with 60,537 files
assessed. Kate Stewart did a file by file comparison of the scanner
results in the spreadsheet to determine which SPDX license identifier(s)
to be applied to the file. She confirmed any determination that was not
immediately clear with lawyers working with the Linux Foundation.
Criteria used to select files for SPDX license identifier tagging was:
- Files considered eligible had to be source code files.
- Make and config files were included as candidates if they contained >5
lines of source
- File already had some variant of a license header in it (even if <5
lines).
All documentation files were explicitly excluded.
The following heuristics were used to determine which SPDX license
identifiers to apply.
- when both scanners couldn't find any license traces, file was
considered to have no license information in it, and the top level
COPYING file license applied.
For non */uapi/* files that summary was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 11139
and resulted in the first patch in this series.
If that file was a */uapi/* path one, it was "GPL-2.0 WITH
Linux-syscall-note" otherwise it was "GPL-2.0". Results of that was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 WITH Linux-syscall-note 930
and resulted in the second patch in this series.
- if a file had some form of licensing information in it, and was one
of the */uapi/* ones, it was denoted with the Linux-syscall-note if
any GPL family license was found in the file or had no licensing in
it (per prior point). Results summary:
SPDX license identifier # files
---------------------------------------------------|------
GPL-2.0 WITH Linux-syscall-note 270
GPL-2.0+ WITH Linux-syscall-note 169
((GPL-2.0 WITH Linux-syscall-note) OR BSD-2-Clause) 21
((GPL-2.0 WITH Linux-syscall-note) OR BSD-3-Clause) 17
LGPL-2.1+ WITH Linux-syscall-note 15
GPL-1.0+ WITH Linux-syscall-note 14
((GPL-2.0+ WITH Linux-syscall-note) OR BSD-3-Clause) 5
LGPL-2.0+ WITH Linux-syscall-note 4
LGPL-2.1 WITH Linux-syscall-note 3
((GPL-2.0 WITH Linux-syscall-note) OR MIT) 3
((GPL-2.0 WITH Linux-syscall-note) AND MIT) 1
and that resulted in the third patch in this series.
- when the two scanners agreed on the detected license(s), that became
the concluded license(s).
- when there was disagreement between the two scanners (one detected a
license but the other didn't, or they both detected different
licenses) a manual inspection of the file occurred.
- In most cases a manual inspection of the information in the file
resulted in a clear resolution of the license that should apply (and
which scanner probably needed to revisit its heuristics).
- When it was not immediately clear, the license identifier was
confirmed with lawyers working with the Linux Foundation.
- If there was any question as to the appropriate license identifier,
the file was flagged for further research and to be revisited later
in time.
In total, over 70 hours of logged manual review was done on the
spreadsheet to determine the SPDX license identifiers to apply to the
source files by Kate, Philippe, Thomas and, in some cases, confirmation
by lawyers working with the Linux Foundation.
Kate also obtained a third independent scan of the 4.13 code base from
FOSSology, and compared selected files where the other two scanners
disagreed against that SPDX file, to see if there was new insights. The
Windriver scanner is based on an older version of FOSSology in part, so
they are related.
Thomas did random spot checks in about 500 files from the spreadsheets
for the uapi headers and agreed with SPDX license identifier in the
files he inspected. For the non-uapi files Thomas did random spot checks
in about 15000 files.
In initial set of patches against 4.14-rc6, 3 files were found to have
copy/paste license identifier errors, and have been fixed to reflect the
correct identifier.
Additionally Philippe spent 10 hours this week doing a detailed manual
inspection and review of the 12,461 patched files from the initial patch
version early this week with:
- a full scancode scan run, collecting the matched texts, detected
license ids and scores
- reviewing anything where there was a license detected (about 500+
files) to ensure that the applied SPDX license was correct
- reviewing anything where there was no detection but the patch license
was not GPL-2.0 WITH Linux-syscall-note to ensure that the applied
SPDX license was correct
This produced a worksheet with 20 files needing minor correction. This
worksheet was then exported into 3 different .csv files for the
different types of files to be modified.
These .csv files were then reviewed by Greg. Thomas wrote a script to
parse the csv files and add the proper SPDX tag to the file, in the
format that the file expected. This script was further refined by Greg
based on the output to detect more types of files automatically and to
distinguish between header and source .c files (which need different
comment types.) Finally Greg ran the script using the .csv files to
generate the patches.
Reviewed-by: Kate Stewart <kstewart@linuxfoundation.org>
Reviewed-by: Philippe Ombredanne <pombredanne@nexb.com>
Reviewed-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2017-11-01 17:07:57 +03:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
2005-04-17 02:20:36 +04:00
|
|
|
/*
|
|
|
|
* Central processing for nfsd.
|
|
|
|
*
|
|
|
|
* Authors: Olaf Kirch (okir@monad.swb.de)
|
|
|
|
*
|
|
|
|
* Copyright (C) 1995, 1996, 1997 Olaf Kirch <okir@monad.swb.de>
|
|
|
|
*/
|
|
|
|
|
2017-02-08 20:51:30 +03:00
|
|
|
#include <linux/sched/signal.h>
|
2007-07-17 15:03:35 +04:00
|
|
|
#include <linux/freezer.h>
|
2011-07-01 22:23:34 +04:00
|
|
|
#include <linux/module.h>
|
2005-04-17 02:20:36 +04:00
|
|
|
#include <linux/fs_struct.h>
|
2009-04-03 09:28:18 +04:00
|
|
|
#include <linux/swap.h>
|
2021-12-29 22:43:16 +03:00
|
|
|
#include <linux/siphash.h>
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
#include <linux/sunrpc/stats.h>
|
|
|
|
#include <linux/sunrpc/svcsock.h>
|
2015-12-12 00:45:59 +03:00
|
|
|
#include <linux/sunrpc/svc_xprt.h>
|
2005-04-17 02:20:36 +04:00
|
|
|
#include <linux/lockd/bind.h>
|
2005-06-22 21:16:26 +04:00
|
|
|
#include <linux/nfsacl.h>
|
2009-08-15 19:54:41 +04:00
|
|
|
#include <linux/seq_file.h>
|
2015-12-12 00:45:59 +03:00
|
|
|
#include <linux/inetdevice.h>
|
|
|
|
#include <net/addrconf.h>
|
|
|
|
#include <net/ipv6.h>
|
2010-09-29 16:03:50 +04:00
|
|
|
#include <net/net_namespace.h>
|
2009-12-03 21:30:56 +03:00
|
|
|
#include "nfsd.h"
|
|
|
|
#include "cache.h"
|
2009-11-05 02:12:35 +03:00
|
|
|
#include "vfs.h"
|
2012-12-06 15:23:14 +04:00
|
|
|
#include "netns.h"
|
2019-08-18 21:18:48 +03:00
|
|
|
#include "filecache.h"
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2020-10-19 20:00:29 +03:00
|
|
|
#include "trace.h"
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
#define NFSDDBG_FACILITY NFSDDBG_SVC
|
|
|
|
|
|
|
|
extern struct svc_program nfsd_program;
|
2008-06-10 16:40:38 +04:00
|
|
|
static int nfsd(void *vrqstp);
|
2019-04-09 18:46:18 +03:00
|
|
|
#if defined(CONFIG_NFSD_V2_ACL) || defined(CONFIG_NFSD_V3_ACL)
|
|
|
|
static int nfsd_acl_rpcbind_set(struct net *,
|
|
|
|
const struct svc_program *,
|
|
|
|
u32, int,
|
|
|
|
unsigned short,
|
|
|
|
unsigned short);
|
2019-04-09 18:46:19 +03:00
|
|
|
static __be32 nfsd_acl_init_request(struct svc_rqst *,
|
|
|
|
const struct svc_program *,
|
|
|
|
struct svc_process_info *);
|
2019-04-09 18:46:18 +03:00
|
|
|
#endif
|
|
|
|
static int nfsd_rpcbind_set(struct net *,
|
|
|
|
const struct svc_program *,
|
|
|
|
u32, int,
|
|
|
|
unsigned short,
|
|
|
|
unsigned short);
|
2019-04-09 18:46:19 +03:00
|
|
|
static __be32 nfsd_init_request(struct svc_rqst *,
|
|
|
|
const struct svc_program *,
|
|
|
|
struct svc_process_info *);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2008-06-10 16:40:35 +04:00
|
|
|
/*
|
2021-11-29 07:51:25 +03:00
|
|
|
* nfsd_mutex protects nn->nfsd_serv -- both the pointer itself and some members
|
|
|
|
* of the svc_serv struct such as ->sv_temp_socks and ->sv_permsocks.
|
2008-06-10 16:40:35 +04:00
|
|
|
*
|
2012-12-06 15:23:24 +04:00
|
|
|
* If (out side the lock) nn->nfsd_serv is non-NULL, then it must point to a
|
2021-11-29 07:51:25 +03:00
|
|
|
* properly initialised 'struct svc_serv' with ->sv_nrthreads > 0 (unless
|
|
|
|
* nn->keep_active is set). That number of nfsd threads must
|
|
|
|
* exist and each must be listed in ->sp_all_threads in some entry of
|
|
|
|
* ->sv_pools[].
|
2008-06-10 16:40:35 +04:00
|
|
|
*
|
2021-11-29 07:51:25 +03:00
|
|
|
* Each active thread holds a counted reference on nn->nfsd_serv, as does
|
|
|
|
* the nn->keep_active flag and various transient calls to svc_get().
|
2008-06-10 16:40:36 +04:00
|
|
|
*
|
|
|
|
* Finally, the nfsd_mutex also protects some of the global variables that are
|
|
|
|
* accessed when nfsd starts and that are settable via the write_* routines in
|
|
|
|
* nfsctl.c. In particular:
|
|
|
|
*
|
|
|
|
* user_recovery_dirname
|
|
|
|
* user_lease_time
|
|
|
|
* nfsd_versions
|
2008-06-10 16:40:35 +04:00
|
|
|
*/
|
|
|
|
DEFINE_MUTEX(nfsd_mutex);
|
|
|
|
|
2009-06-24 23:37:45 +04:00
|
|
|
/*
|
|
|
|
* nfsd_drc_lock protects nfsd_drc_max_pages and nfsd_drc_pages_used.
|
|
|
|
* nfsd_drc_max_pages limits the total amount of memory available for
|
|
|
|
* version 4.1 DRC caches.
|
|
|
|
* nfsd_drc_pages_used tracks the current version 4.1 DRC memory usage.
|
|
|
|
*/
|
2021-04-06 15:08:18 +03:00
|
|
|
DEFINE_SPINLOCK(nfsd_drc_lock);
|
2013-02-23 04:35:47 +04:00
|
|
|
unsigned long nfsd_drc_max_mem;
|
|
|
|
unsigned long nfsd_drc_mem_used;
|
2009-06-24 23:37:45 +04:00
|
|
|
|
2006-02-01 14:04:34 +03:00
|
|
|
#if defined(CONFIG_NFSD_V2_ACL) || defined(CONFIG_NFSD_V3_ACL)
|
|
|
|
static struct svc_stat nfsd_acl_svcstats;
|
2017-05-12 17:21:37 +03:00
|
|
|
static const struct svc_version *nfsd_acl_version[] = {
|
2006-02-01 14:04:34 +03:00
|
|
|
[2] = &nfsd_acl_version2,
|
|
|
|
[3] = &nfsd_acl_version3,
|
|
|
|
};
|
|
|
|
|
|
|
|
#define NFSD_ACL_MINVERS 2
|
2006-03-24 14:15:34 +03:00
|
|
|
#define NFSD_ACL_NRVERS ARRAY_SIZE(nfsd_acl_version)
|
2006-02-01 14:04:34 +03:00
|
|
|
|
|
|
|
static struct svc_program nfsd_acl_program = {
|
|
|
|
.pg_prog = NFS_ACL_PROGRAM,
|
|
|
|
.pg_nvers = NFSD_ACL_NRVERS,
|
2019-11-20 00:05:33 +03:00
|
|
|
.pg_vers = nfsd_acl_version,
|
2007-01-26 11:56:58 +03:00
|
|
|
.pg_name = "nfsacl",
|
2006-02-01 14:04:34 +03:00
|
|
|
.pg_class = "nfsd",
|
|
|
|
.pg_stats = &nfsd_acl_svcstats,
|
|
|
|
.pg_authenticate = &svc_set_client,
|
2019-04-09 18:46:19 +03:00
|
|
|
.pg_init_request = nfsd_acl_init_request,
|
2019-04-09 18:46:18 +03:00
|
|
|
.pg_rpcbind_set = nfsd_acl_rpcbind_set,
|
2006-02-01 14:04:34 +03:00
|
|
|
};
|
|
|
|
|
|
|
|
static struct svc_stat nfsd_acl_svcstats = {
|
|
|
|
.program = &nfsd_acl_program,
|
|
|
|
};
|
|
|
|
#endif /* defined(CONFIG_NFSD_V2_ACL) || defined(CONFIG_NFSD_V3_ACL) */
|
|
|
|
|
2017-05-12 17:21:37 +03:00
|
|
|
static const struct svc_version *nfsd_version[] = {
|
2005-11-07 12:00:25 +03:00
|
|
|
[2] = &nfsd_version2,
|
|
|
|
#if defined(CONFIG_NFSD_V3)
|
|
|
|
[3] = &nfsd_version3,
|
|
|
|
#endif
|
|
|
|
#if defined(CONFIG_NFSD_V4)
|
|
|
|
[4] = &nfsd_version4,
|
|
|
|
#endif
|
|
|
|
};
|
|
|
|
|
|
|
|
#define NFSD_MINVERS 2
|
2006-03-24 14:15:34 +03:00
|
|
|
#define NFSD_NRVERS ARRAY_SIZE(nfsd_version)
|
2005-11-07 12:00:25 +03:00
|
|
|
|
|
|
|
struct svc_program nfsd_program = {
|
2006-02-01 14:04:34 +03:00
|
|
|
#if defined(CONFIG_NFSD_V2_ACL) || defined(CONFIG_NFSD_V3_ACL)
|
|
|
|
.pg_next = &nfsd_acl_program,
|
|
|
|
#endif
|
2005-11-07 12:00:25 +03:00
|
|
|
.pg_prog = NFS_PROGRAM, /* program number */
|
|
|
|
.pg_nvers = NFSD_NRVERS, /* nr of entries in nfsd_version */
|
2019-04-09 18:46:19 +03:00
|
|
|
.pg_vers = nfsd_version, /* version table */
|
2005-11-07 12:00:25 +03:00
|
|
|
.pg_name = "nfsd", /* program name */
|
|
|
|
.pg_class = "nfsd", /* authentication class */
|
|
|
|
.pg_stats = &nfsd_svcstats, /* version table */
|
|
|
|
.pg_authenticate = &svc_set_client, /* export authentication */
|
2019-04-09 18:46:19 +03:00
|
|
|
.pg_init_request = nfsd_init_request,
|
2019-04-09 18:46:18 +03:00
|
|
|
.pg_rpcbind_set = nfsd_rpcbind_set,
|
2005-11-07 12:00:25 +03:00
|
|
|
};
|
|
|
|
|
2019-04-09 18:46:19 +03:00
|
|
|
static bool
|
|
|
|
nfsd_support_version(int vers)
|
|
|
|
{
|
|
|
|
if (vers >= NFSD_MINVERS && vers < NFSD_NRVERS)
|
|
|
|
return nfsd_version[vers] != NULL;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool *
|
|
|
|
nfsd_alloc_versions(void)
|
|
|
|
{
|
|
|
|
bool *vers = kmalloc_array(NFSD_NRVERS, sizeof(bool), GFP_KERNEL);
|
|
|
|
unsigned i;
|
|
|
|
|
|
|
|
if (vers) {
|
|
|
|
/* All compiled versions are enabled by default */
|
|
|
|
for (i = 0; i < NFSD_NRVERS; i++)
|
|
|
|
vers[i] = nfsd_support_version(i);
|
|
|
|
}
|
|
|
|
return vers;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool *
|
|
|
|
nfsd_alloc_minorversions(void)
|
|
|
|
{
|
|
|
|
bool *vers = kmalloc_array(NFSD_SUPPORTED_MINOR_VERSION + 1,
|
|
|
|
sizeof(bool), GFP_KERNEL);
|
|
|
|
unsigned i;
|
2009-04-03 09:28:59 +04:00
|
|
|
|
2019-04-09 18:46:19 +03:00
|
|
|
if (vers) {
|
|
|
|
/* All minor versions are enabled by default */
|
|
|
|
for (i = 0; i <= NFSD_SUPPORTED_MINOR_VERSION; i++)
|
|
|
|
vers[i] = nfsd_support_version(4);
|
|
|
|
}
|
|
|
|
return vers;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
nfsd_netns_free_versions(struct nfsd_net *nn)
|
|
|
|
{
|
|
|
|
kfree(nn->nfsd_versions);
|
|
|
|
kfree(nn->nfsd4_minorversions);
|
|
|
|
nn->nfsd_versions = NULL;
|
|
|
|
nn->nfsd4_minorversions = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
nfsd_netns_init_versions(struct nfsd_net *nn)
|
|
|
|
{
|
|
|
|
if (!nn->nfsd_versions) {
|
|
|
|
nn->nfsd_versions = nfsd_alloc_versions();
|
|
|
|
nn->nfsd4_minorversions = nfsd_alloc_minorversions();
|
|
|
|
if (!nn->nfsd_versions || !nn->nfsd4_minorversions)
|
|
|
|
nfsd_netns_free_versions(nn);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int nfsd_vers(struct nfsd_net *nn, int vers, enum vers_op change)
|
2006-10-02 13:17:46 +04:00
|
|
|
{
|
|
|
|
if (vers < NFSD_MINVERS || vers >= NFSD_NRVERS)
|
2010-05-14 15:33:36 +04:00
|
|
|
return 0;
|
2006-10-02 13:17:46 +04:00
|
|
|
switch(change) {
|
|
|
|
case NFSD_SET:
|
2019-04-09 18:46:19 +03:00
|
|
|
if (nn->nfsd_versions)
|
|
|
|
nn->nfsd_versions[vers] = nfsd_support_version(vers);
|
2007-01-26 11:56:58 +03:00
|
|
|
break;
|
2006-10-02 13:17:46 +04:00
|
|
|
case NFSD_CLEAR:
|
2019-04-09 18:46:19 +03:00
|
|
|
nfsd_netns_init_versions(nn);
|
|
|
|
if (nn->nfsd_versions)
|
|
|
|
nn->nfsd_versions[vers] = false;
|
2006-10-02 13:17:46 +04:00
|
|
|
break;
|
|
|
|
case NFSD_TEST:
|
2019-04-09 18:46:19 +03:00
|
|
|
if (nn->nfsd_versions)
|
|
|
|
return nn->nfsd_versions[vers];
|
2020-08-24 01:36:59 +03:00
|
|
|
fallthrough;
|
2006-10-02 13:17:46 +04:00
|
|
|
case NFSD_AVAIL:
|
2019-04-09 18:46:19 +03:00
|
|
|
return nfsd_support_version(vers);
|
2006-10-02 13:17:46 +04:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
2009-04-03 09:28:59 +04:00
|
|
|
|
2017-02-23 02:35:32 +03:00
|
|
|
static void
|
2019-04-09 18:46:19 +03:00
|
|
|
nfsd_adjust_nfsd_versions4(struct nfsd_net *nn)
|
2017-02-23 02:35:32 +03:00
|
|
|
{
|
|
|
|
unsigned i;
|
|
|
|
|
|
|
|
for (i = 0; i <= NFSD_SUPPORTED_MINOR_VERSION; i++) {
|
2019-04-09 18:46:19 +03:00
|
|
|
if (nn->nfsd4_minorversions[i])
|
2017-02-23 02:35:32 +03:00
|
|
|
return;
|
|
|
|
}
|
2019-04-09 18:46:19 +03:00
|
|
|
nfsd_vers(nn, 4, NFSD_CLEAR);
|
2017-02-23 02:35:32 +03:00
|
|
|
}
|
|
|
|
|
2019-04-09 18:46:19 +03:00
|
|
|
int nfsd_minorversion(struct nfsd_net *nn, u32 minorversion, enum vers_op change)
|
2009-04-03 09:28:59 +04:00
|
|
|
{
|
2017-03-10 03:36:39 +03:00
|
|
|
if (minorversion > NFSD_SUPPORTED_MINOR_VERSION &&
|
|
|
|
change != NFSD_AVAIL)
|
2009-04-03 09:28:59 +04:00
|
|
|
return -1;
|
2019-04-09 18:46:19 +03:00
|
|
|
|
2009-04-03 09:28:59 +04:00
|
|
|
switch(change) {
|
|
|
|
case NFSD_SET:
|
2019-04-09 18:46:19 +03:00
|
|
|
if (nn->nfsd4_minorversions) {
|
|
|
|
nfsd_vers(nn, 4, NFSD_SET);
|
|
|
|
nn->nfsd4_minorversions[minorversion] =
|
|
|
|
nfsd_vers(nn, 4, NFSD_TEST);
|
|
|
|
}
|
2009-04-03 09:28:59 +04:00
|
|
|
break;
|
|
|
|
case NFSD_CLEAR:
|
2019-04-09 18:46:19 +03:00
|
|
|
nfsd_netns_init_versions(nn);
|
|
|
|
if (nn->nfsd4_minorversions) {
|
|
|
|
nn->nfsd4_minorversions[minorversion] = false;
|
|
|
|
nfsd_adjust_nfsd_versions4(nn);
|
|
|
|
}
|
2009-04-03 09:28:59 +04:00
|
|
|
break;
|
|
|
|
case NFSD_TEST:
|
2019-04-09 18:46:19 +03:00
|
|
|
if (nn->nfsd4_minorversions)
|
|
|
|
return nn->nfsd4_minorversions[minorversion];
|
|
|
|
return nfsd_vers(nn, 4, NFSD_TEST);
|
2009-04-03 09:28:59 +04:00
|
|
|
case NFSD_AVAIL:
|
2019-04-09 18:46:19 +03:00
|
|
|
return minorversion <= NFSD_SUPPORTED_MINOR_VERSION &&
|
|
|
|
nfsd_vers(nn, 4, NFSD_AVAIL);
|
2009-04-03 09:28:59 +04:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
/*
|
|
|
|
* Maximum number of nfsd processes
|
|
|
|
*/
|
|
|
|
#define NFSD_MAXSERVS 8192
|
|
|
|
|
2012-12-06 15:23:24 +04:00
|
|
|
int nfsd_nrthreads(struct net *net)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
2008-06-12 07:38:42 +04:00
|
|
|
int rv = 0;
|
2012-12-06 15:23:24 +04:00
|
|
|
struct nfsd_net *nn = net_generic(net, nfsd_net_id);
|
|
|
|
|
2008-06-12 07:38:42 +04:00
|
|
|
mutex_lock(&nfsd_mutex);
|
2012-12-06 15:23:24 +04:00
|
|
|
if (nn->nfsd_serv)
|
|
|
|
rv = nn->nfsd_serv->sv_nrthreads;
|
2008-06-12 07:38:42 +04:00
|
|
|
mutex_unlock(&nfsd_mutex);
|
|
|
|
return rv;
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
|
|
|
|
2019-04-09 19:13:37 +03:00
|
|
|
static int nfsd_init_socks(struct net *net, const struct cred *cred)
|
2010-07-22 02:29:25 +04:00
|
|
|
{
|
|
|
|
int error;
|
2012-12-06 15:23:24 +04:00
|
|
|
struct nfsd_net *nn = net_generic(net, nfsd_net_id);
|
|
|
|
|
|
|
|
if (!list_empty(&nn->nfsd_serv->sv_permsocks))
|
2010-07-22 02:29:25 +04:00
|
|
|
return 0;
|
|
|
|
|
2012-12-06 15:23:24 +04:00
|
|
|
error = svc_create_xprt(nn->nfsd_serv, "udp", net, PF_INET, NFS_PORT,
|
2019-04-09 19:13:37 +03:00
|
|
|
SVC_SOCK_DEFAULTS, cred);
|
2010-07-22 02:29:25 +04:00
|
|
|
if (error < 0)
|
|
|
|
return error;
|
|
|
|
|
2012-12-06 15:23:24 +04:00
|
|
|
error = svc_create_xprt(nn->nfsd_serv, "tcp", net, PF_INET, NFS_PORT,
|
2019-04-09 19:13:37 +03:00
|
|
|
SVC_SOCK_DEFAULTS, cred);
|
2010-07-22 02:29:25 +04:00
|
|
|
if (error < 0)
|
|
|
|
return error;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-12-06 15:23:39 +04:00
|
|
|
static int nfsd_users = 0;
|
2010-07-20 00:50:04 +04:00
|
|
|
|
2021-04-15 15:00:58 +03:00
|
|
|
static int nfsd_startup_generic(void)
|
2012-12-06 15:23:29 +04:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
2012-12-06 15:23:39 +04:00
|
|
|
if (nfsd_users++)
|
2012-12-06 15:23:29 +04:00
|
|
|
return 0;
|
|
|
|
|
2019-08-18 21:18:48 +03:00
|
|
|
ret = nfsd_file_cache_init();
|
|
|
|
if (ret)
|
|
|
|
goto dec_users;
|
2014-07-30 17:26:05 +04:00
|
|
|
|
2012-12-06 15:23:29 +04:00
|
|
|
ret = nfs4_state_start();
|
|
|
|
if (ret)
|
2019-08-18 21:18:56 +03:00
|
|
|
goto out_file_cache;
|
2012-12-06 15:23:29 +04:00
|
|
|
return 0;
|
|
|
|
|
2019-08-18 21:18:48 +03:00
|
|
|
out_file_cache:
|
|
|
|
nfsd_file_cache_shutdown();
|
2014-07-30 17:26:05 +04:00
|
|
|
dec_users:
|
|
|
|
nfsd_users--;
|
2012-12-06 15:23:29 +04:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void nfsd_shutdown_generic(void)
|
|
|
|
{
|
2012-12-06 15:23:39 +04:00
|
|
|
if (--nfsd_users)
|
|
|
|
return;
|
|
|
|
|
2012-12-06 15:23:29 +04:00
|
|
|
nfs4_state_shutdown();
|
2019-08-18 21:18:48 +03:00
|
|
|
nfsd_file_cache_shutdown();
|
2012-12-06 15:23:29 +04:00
|
|
|
}
|
|
|
|
|
2019-04-09 18:46:19 +03:00
|
|
|
static bool nfsd_needs_lockd(struct nfsd_net *nn)
|
2013-12-31 09:17:30 +04:00
|
|
|
{
|
2019-04-09 18:46:19 +03:00
|
|
|
return nfsd_vers(nn, 2, NFSD_TEST) || nfsd_vers(nn, 3, NFSD_TEST);
|
2013-12-31 09:17:30 +04:00
|
|
|
}
|
|
|
|
|
2021-12-29 22:43:16 +03:00
|
|
|
/**
|
2021-12-30 18:22:05 +03:00
|
|
|
* nfsd_copy_write_verifier - Atomically copy a write verifier
|
2021-12-29 22:43:16 +03:00
|
|
|
* @verf: buffer in which to receive the verifier cookie
|
|
|
|
* @nn: NFS net namespace
|
|
|
|
*
|
|
|
|
* This function provides a wait-free mechanism for copying the
|
2021-12-30 18:22:05 +03:00
|
|
|
* namespace's write verifier without tearing it.
|
2021-12-29 22:43:16 +03:00
|
|
|
*/
|
2021-12-30 18:22:05 +03:00
|
|
|
void nfsd_copy_write_verifier(__be32 verf[2], struct nfsd_net *nn)
|
2019-09-02 20:02:56 +03:00
|
|
|
{
|
|
|
|
int seq = 0;
|
|
|
|
|
|
|
|
do {
|
2021-12-29 22:43:16 +03:00
|
|
|
read_seqbegin_or_lock(&nn->writeverf_lock, &seq);
|
|
|
|
memcpy(verf, nn->writeverf, sizeof(*verf));
|
|
|
|
} while (need_seqretry(&nn->writeverf_lock, seq));
|
|
|
|
done_seqretry(&nn->writeverf_lock, seq);
|
2019-09-02 20:02:56 +03:00
|
|
|
}
|
|
|
|
|
2021-12-30 18:22:05 +03:00
|
|
|
static void nfsd_reset_write_verifier_locked(struct nfsd_net *nn)
|
2019-09-02 20:02:56 +03:00
|
|
|
{
|
2021-12-29 22:43:16 +03:00
|
|
|
struct timespec64 now;
|
|
|
|
u64 verf;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Because the time value is hashed, y2038 time_t overflow
|
|
|
|
* is irrelevant in this usage.
|
|
|
|
*/
|
|
|
|
ktime_get_raw_ts64(&now);
|
|
|
|
verf = siphash_2u64(now.tv_sec, now.tv_nsec, &nn->siphash_key);
|
|
|
|
memcpy(nn->writeverf, &verf, sizeof(nn->writeverf));
|
2019-09-02 20:02:56 +03:00
|
|
|
}
|
|
|
|
|
2021-12-29 22:43:16 +03:00
|
|
|
/**
|
2021-12-30 18:22:05 +03:00
|
|
|
* nfsd_reset_write_verifier - Generate a new write verifier
|
2021-12-29 22:43:16 +03:00
|
|
|
* @nn: NFS net namespace
|
|
|
|
*
|
|
|
|
* This function updates the ->writeverf field of @nn. This field
|
|
|
|
* contains an opaque cookie that, according to Section 18.32.3 of
|
|
|
|
* RFC 8881, "the client can use to determine whether a server has
|
|
|
|
* changed instance state (e.g., server restart) between a call to
|
|
|
|
* WRITE and a subsequent call to either WRITE or COMMIT. This
|
|
|
|
* cookie MUST be unchanged during a single instance of the NFSv4.1
|
|
|
|
* server and MUST be unique between instances of the NFSv4.1
|
|
|
|
* server."
|
|
|
|
*/
|
2021-12-30 18:22:05 +03:00
|
|
|
void nfsd_reset_write_verifier(struct nfsd_net *nn)
|
2019-09-02 20:02:56 +03:00
|
|
|
{
|
2021-12-29 22:43:16 +03:00
|
|
|
write_seqlock(&nn->writeverf_lock);
|
2021-12-30 18:22:05 +03:00
|
|
|
nfsd_reset_write_verifier_locked(nn);
|
2021-12-29 22:43:16 +03:00
|
|
|
write_sequnlock(&nn->writeverf_lock);
|
2019-09-02 20:02:56 +03:00
|
|
|
}
|
|
|
|
|
2021-04-15 15:00:58 +03:00
|
|
|
static int nfsd_startup_net(struct net *net, const struct cred *cred)
|
2012-12-06 15:23:09 +04:00
|
|
|
{
|
2012-12-06 15:23:14 +04:00
|
|
|
struct nfsd_net *nn = net_generic(net, nfsd_net_id);
|
2012-12-06 15:23:09 +04:00
|
|
|
int ret;
|
|
|
|
|
2012-12-06 15:23:14 +04:00
|
|
|
if (nn->nfsd_net_up)
|
|
|
|
return 0;
|
|
|
|
|
2021-04-15 15:00:58 +03:00
|
|
|
ret = nfsd_startup_generic();
|
2012-12-06 15:23:09 +04:00
|
|
|
if (ret)
|
|
|
|
return ret;
|
2019-04-09 19:13:37 +03:00
|
|
|
ret = nfsd_init_socks(net, cred);
|
2012-12-06 15:23:34 +04:00
|
|
|
if (ret)
|
|
|
|
goto out_socks;
|
2013-12-31 09:17:30 +04:00
|
|
|
|
2019-04-09 18:46:19 +03:00
|
|
|
if (nfsd_needs_lockd(nn) && !nn->lockd_up) {
|
2019-04-09 19:13:39 +03:00
|
|
|
ret = lockd_up(net, cred);
|
2013-12-31 09:17:30 +04:00
|
|
|
if (ret)
|
|
|
|
goto out_socks;
|
2019-12-25 06:19:36 +03:00
|
|
|
nn->lockd_up = true;
|
2013-12-31 09:17:30 +04:00
|
|
|
}
|
|
|
|
|
2020-01-06 21:18:05 +03:00
|
|
|
ret = nfsd_file_cache_start_net(net);
|
2012-12-06 15:23:09 +04:00
|
|
|
if (ret)
|
|
|
|
goto out_lockd;
|
2020-01-06 21:18:05 +03:00
|
|
|
ret = nfs4_state_start_net(net);
|
|
|
|
if (ret)
|
|
|
|
goto out_filecache;
|
2012-12-06 15:23:09 +04:00
|
|
|
|
2021-05-21 22:09:37 +03:00
|
|
|
#ifdef CONFIG_NFSD_V4_2_INTER_SSC
|
|
|
|
nfsd4_ssc_init_umount_work(nn);
|
|
|
|
#endif
|
2012-12-06 15:23:14 +04:00
|
|
|
nn->nfsd_net_up = true;
|
2012-12-06 15:23:09 +04:00
|
|
|
return 0;
|
|
|
|
|
2020-01-06 21:18:05 +03:00
|
|
|
out_filecache:
|
|
|
|
nfsd_file_cache_shutdown_net(net);
|
2012-12-06 15:23:09 +04:00
|
|
|
out_lockd:
|
2013-12-31 09:17:30 +04:00
|
|
|
if (nn->lockd_up) {
|
|
|
|
lockd_down(net);
|
2019-12-25 06:19:36 +03:00
|
|
|
nn->lockd_up = false;
|
2013-12-31 09:17:30 +04:00
|
|
|
}
|
2012-12-06 15:23:34 +04:00
|
|
|
out_socks:
|
2012-12-06 15:23:29 +04:00
|
|
|
nfsd_shutdown_generic();
|
2010-07-20 00:50:04 +04:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2012-12-06 15:23:09 +04:00
|
|
|
static void nfsd_shutdown_net(struct net *net)
|
|
|
|
{
|
2012-12-06 15:23:14 +04:00
|
|
|
struct nfsd_net *nn = net_generic(net, nfsd_net_id);
|
|
|
|
|
2020-01-06 21:18:05 +03:00
|
|
|
nfsd_file_cache_shutdown_net(net);
|
2012-12-06 15:23:09 +04:00
|
|
|
nfs4_state_shutdown_net(net);
|
2013-12-31 09:17:30 +04:00
|
|
|
if (nn->lockd_up) {
|
|
|
|
lockd_down(net);
|
2019-12-25 06:19:36 +03:00
|
|
|
nn->lockd_up = false;
|
2013-12-31 09:17:30 +04:00
|
|
|
}
|
2012-12-06 15:23:14 +04:00
|
|
|
nn->nfsd_net_up = false;
|
2012-12-06 15:23:34 +04:00
|
|
|
nfsd_shutdown_generic();
|
2012-12-06 15:23:09 +04:00
|
|
|
}
|
|
|
|
|
2021-11-29 07:51:25 +03:00
|
|
|
static DEFINE_SPINLOCK(nfsd_notifier_lock);
|
2015-12-12 00:45:59 +03:00
|
|
|
static int nfsd_inetaddr_event(struct notifier_block *this, unsigned long event,
|
|
|
|
void *ptr)
|
|
|
|
{
|
|
|
|
struct in_ifaddr *ifa = (struct in_ifaddr *)ptr;
|
|
|
|
struct net_device *dev = ifa->ifa_dev->dev;
|
|
|
|
struct net *net = dev_net(dev);
|
|
|
|
struct nfsd_net *nn = net_generic(net, nfsd_net_id);
|
|
|
|
struct sockaddr_in sin;
|
|
|
|
|
2021-11-29 07:51:25 +03:00
|
|
|
if (event != NETDEV_DOWN || !nn->nfsd_serv)
|
2015-12-12 00:45:59 +03:00
|
|
|
goto out;
|
|
|
|
|
2021-11-29 07:51:25 +03:00
|
|
|
spin_lock(&nfsd_notifier_lock);
|
2015-12-12 00:45:59 +03:00
|
|
|
if (nn->nfsd_serv) {
|
|
|
|
dprintk("nfsd_inetaddr_event: removed %pI4\n", &ifa->ifa_local);
|
|
|
|
sin.sin_family = AF_INET;
|
|
|
|
sin.sin_addr.s_addr = ifa->ifa_local;
|
|
|
|
svc_age_temp_xprts_now(nn->nfsd_serv, (struct sockaddr *)&sin);
|
|
|
|
}
|
2021-11-29 07:51:25 +03:00
|
|
|
spin_unlock(&nfsd_notifier_lock);
|
2015-12-12 00:45:59 +03:00
|
|
|
|
|
|
|
out:
|
|
|
|
return NOTIFY_DONE;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct notifier_block nfsd_inetaddr_notifier = {
|
|
|
|
.notifier_call = nfsd_inetaddr_event,
|
|
|
|
};
|
|
|
|
|
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
static int nfsd_inet6addr_event(struct notifier_block *this,
|
|
|
|
unsigned long event, void *ptr)
|
|
|
|
{
|
|
|
|
struct inet6_ifaddr *ifa = (struct inet6_ifaddr *)ptr;
|
|
|
|
struct net_device *dev = ifa->idev->dev;
|
|
|
|
struct net *net = dev_net(dev);
|
|
|
|
struct nfsd_net *nn = net_generic(net, nfsd_net_id);
|
|
|
|
struct sockaddr_in6 sin6;
|
|
|
|
|
2021-11-29 07:51:25 +03:00
|
|
|
if (event != NETDEV_DOWN || !nn->nfsd_serv)
|
2015-12-12 00:45:59 +03:00
|
|
|
goto out;
|
|
|
|
|
2021-11-29 07:51:25 +03:00
|
|
|
spin_lock(&nfsd_notifier_lock);
|
2015-12-12 00:45:59 +03:00
|
|
|
if (nn->nfsd_serv) {
|
|
|
|
dprintk("nfsd_inet6addr_event: removed %pI6\n", &ifa->addr);
|
|
|
|
sin6.sin6_family = AF_INET6;
|
|
|
|
sin6.sin6_addr = ifa->addr;
|
2017-01-06 00:34:49 +03:00
|
|
|
if (ipv6_addr_type(&sin6.sin6_addr) & IPV6_ADDR_LINKLOCAL)
|
|
|
|
sin6.sin6_scope_id = ifa->idev->dev->ifindex;
|
2015-12-12 00:45:59 +03:00
|
|
|
svc_age_temp_xprts_now(nn->nfsd_serv, (struct sockaddr *)&sin6);
|
|
|
|
}
|
2021-11-29 07:51:25 +03:00
|
|
|
spin_unlock(&nfsd_notifier_lock);
|
|
|
|
|
2015-12-12 00:45:59 +03:00
|
|
|
out:
|
|
|
|
return NOTIFY_DONE;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct notifier_block nfsd_inet6addr_notifier = {
|
|
|
|
.notifier_call = nfsd_inet6addr_event,
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2016-09-21 15:33:05 +03:00
|
|
|
/* Only used under nfsd_mutex, so this atomic may be overkill: */
|
|
|
|
static atomic_t nfsd_notifier_refcount = ATOMIC_INIT(0);
|
|
|
|
|
2012-12-06 15:23:44 +04:00
|
|
|
static void nfsd_last_thread(struct svc_serv *serv, struct net *net)
|
2010-07-20 00:50:04 +04:00
|
|
|
{
|
2012-12-06 15:23:34 +04:00
|
|
|
struct nfsd_net *nn = net_generic(net, nfsd_net_id);
|
|
|
|
|
2016-09-21 15:33:05 +03:00
|
|
|
/* check if the notifier still has clients */
|
|
|
|
if (atomic_dec_return(&nfsd_notifier_refcount) == 0) {
|
|
|
|
unregister_inetaddr_notifier(&nfsd_inetaddr_notifier);
|
2015-12-12 00:45:59 +03:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2016-09-21 15:33:05 +03:00
|
|
|
unregister_inet6addr_notifier(&nfsd_inet6addr_notifier);
|
2015-12-12 00:45:59 +03:00
|
|
|
#endif
|
2016-09-21 15:33:05 +03:00
|
|
|
}
|
|
|
|
|
2010-07-20 00:50:04 +04:00
|
|
|
/*
|
|
|
|
* write_ports can create the server without actually starting
|
|
|
|
* any threads--if we get shut down before any threads are
|
|
|
|
* started, then nfsd_last_thread will be run before any of this
|
2016-01-04 06:15:21 +03:00
|
|
|
* other initialization has been done except the rpcb information.
|
2010-07-20 00:50:04 +04:00
|
|
|
*/
|
2016-01-04 06:15:21 +03:00
|
|
|
svc_rpcb_cleanup(serv, net);
|
2012-12-06 15:23:34 +04:00
|
|
|
if (!nn->nfsd_net_up)
|
2010-07-20 00:50:04 +04:00
|
|
|
return;
|
2011-10-25 15:17:28 +04:00
|
|
|
|
2016-01-04 06:15:21 +03:00
|
|
|
nfsd_shutdown_net(net);
|
2020-11-27 09:26:59 +03:00
|
|
|
pr_info("nfsd: last server has exited, flushing export cache\n");
|
2012-04-11 15:13:21 +04:00
|
|
|
nfsd_export_flush(net);
|
2006-10-02 13:17:44 +04:00
|
|
|
}
|
2006-10-02 13:17:46 +04:00
|
|
|
|
2019-04-09 18:46:19 +03:00
|
|
|
void nfsd_reset_versions(struct nfsd_net *nn)
|
2006-10-02 13:17:46 +04:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
2017-03-10 03:36:39 +03:00
|
|
|
for (i = 0; i < NFSD_NRVERS; i++)
|
2019-04-09 18:46:19 +03:00
|
|
|
if (nfsd_vers(nn, i, NFSD_TEST))
|
2017-03-10 03:36:39 +03:00
|
|
|
return;
|
2006-10-02 13:17:46 +04:00
|
|
|
|
2017-03-10 03:36:39 +03:00
|
|
|
for (i = 0; i < NFSD_NRVERS; i++)
|
|
|
|
if (i != 4)
|
2019-04-09 18:46:19 +03:00
|
|
|
nfsd_vers(nn, i, NFSD_SET);
|
2017-03-10 03:36:39 +03:00
|
|
|
else {
|
|
|
|
int minor = 0;
|
2019-04-09 18:46:19 +03:00
|
|
|
while (nfsd_minorversion(nn, minor, NFSD_SET) >= 0)
|
2017-03-10 03:36:39 +03:00
|
|
|
minor++;
|
|
|
|
}
|
2006-10-02 13:17:46 +04:00
|
|
|
}
|
|
|
|
|
2009-04-03 09:28:18 +04:00
|
|
|
/*
|
|
|
|
* Each session guarantees a negotiated per slot memory cache for replies
|
|
|
|
* which in turn consumes memory beyond the v2/v3/v4.0 server. A dedicated
|
|
|
|
* NFSv4.1 server might want to use more memory for a DRC than a machine
|
|
|
|
* with mutiple services.
|
|
|
|
*
|
|
|
|
* Impose a hard limit on the number of pages for the DRC which varies
|
|
|
|
* according to the machines free pages. This is of course only a default.
|
|
|
|
*
|
|
|
|
* For now this is a #defined shift which could be under admin control
|
|
|
|
* in the future.
|
|
|
|
*/
|
|
|
|
static void set_max_drc(void)
|
|
|
|
{
|
2017-09-20 03:51:31 +03:00
|
|
|
#define NFSD_DRC_SIZE_SHIFT 7
|
2009-07-28 03:09:19 +04:00
|
|
|
nfsd_drc_max_mem = (nr_free_buffer_pages()
|
|
|
|
>> NFSD_DRC_SIZE_SHIFT) * PAGE_SIZE;
|
|
|
|
nfsd_drc_mem_used = 0;
|
2013-02-23 04:35:47 +04:00
|
|
|
dprintk("%s nfsd_drc_max_mem %lu \n", __func__, nfsd_drc_max_mem);
|
2009-04-03 09:28:18 +04:00
|
|
|
}
|
2008-06-10 16:40:35 +04:00
|
|
|
|
2012-01-31 01:18:35 +04:00
|
|
|
static int nfsd_get_default_max_blksize(void)
|
2006-10-02 13:17:46 +04:00
|
|
|
{
|
2012-01-31 01:18:35 +04:00
|
|
|
struct sysinfo i;
|
|
|
|
unsigned long long target;
|
|
|
|
unsigned long ret;
|
2008-06-10 16:40:35 +04:00
|
|
|
|
2012-01-31 01:18:35 +04:00
|
|
|
si_meminfo(&i);
|
2012-01-31 01:21:11 +04:00
|
|
|
target = (i.totalram - i.totalhigh) << PAGE_SHIFT;
|
2012-01-31 01:18:35 +04:00
|
|
|
/*
|
|
|
|
* Aim for 1/4096 of memory per thread This gives 1MB on 4Gig
|
|
|
|
* machines, but only uses 32K on 128M machines. Bottom out at
|
|
|
|
* 8K on 32M and smaller. Of course, this is only a default.
|
|
|
|
*/
|
|
|
|
target >>= 12;
|
|
|
|
|
|
|
|
ret = NFSSVC_MAXBLKSIZE;
|
|
|
|
while (ret > target && ret >= 8*1024*2)
|
|
|
|
ret /= 2;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2017-08-01 19:00:06 +03:00
|
|
|
static const struct svc_serv_ops nfsd_thread_sv_ops = {
|
2015-06-08 22:06:51 +03:00
|
|
|
.svo_shutdown = nfsd_last_thread,
|
|
|
|
.svo_function = nfsd,
|
|
|
|
.svo_module = THIS_MODULE,
|
2015-06-08 22:03:32 +03:00
|
|
|
};
|
|
|
|
|
2021-03-14 00:08:47 +03:00
|
|
|
void nfsd_shutdown_threads(struct net *net)
|
|
|
|
{
|
|
|
|
struct nfsd_net *nn = net_generic(net, nfsd_net_id);
|
|
|
|
struct svc_serv *serv;
|
|
|
|
|
|
|
|
mutex_lock(&nfsd_mutex);
|
|
|
|
serv = nn->nfsd_serv;
|
|
|
|
if (serv == NULL) {
|
|
|
|
mutex_unlock(&nfsd_mutex);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
svc_get(serv);
|
|
|
|
/* Kill outstanding nfsd threads */
|
2021-11-29 07:51:25 +03:00
|
|
|
svc_set_num_threads(serv, NULL, 0);
|
2021-11-29 07:51:25 +03:00
|
|
|
nfsd_put(net);
|
2021-03-14 00:08:47 +03:00
|
|
|
mutex_unlock(&nfsd_mutex);
|
|
|
|
}
|
|
|
|
|
2020-05-11 15:07:08 +03:00
|
|
|
bool i_am_nfsd(void)
|
2017-07-28 23:35:15 +03:00
|
|
|
{
|
|
|
|
return kthread_func(current) == nfsd;
|
|
|
|
}
|
|
|
|
|
2012-12-10 13:19:20 +04:00
|
|
|
int nfsd_create_serv(struct net *net)
|
2012-01-31 01:18:35 +04:00
|
|
|
{
|
2012-05-02 16:08:38 +04:00
|
|
|
int error;
|
2012-12-06 15:23:19 +04:00
|
|
|
struct nfsd_net *nn = net_generic(net, nfsd_net_id);
|
2021-11-29 07:51:25 +03:00
|
|
|
struct svc_serv *serv;
|
2012-05-02 16:08:38 +04:00
|
|
|
|
2008-06-10 16:40:35 +04:00
|
|
|
WARN_ON(!mutex_is_locked(&nfsd_mutex));
|
2012-12-06 15:23:24 +04:00
|
|
|
if (nn->nfsd_serv) {
|
|
|
|
svc_get(nn->nfsd_serv);
|
2006-10-02 13:17:46 +04:00
|
|
|
return 0;
|
|
|
|
}
|
2012-01-31 01:18:35 +04:00
|
|
|
if (nfsd_max_blksize == 0)
|
|
|
|
nfsd_max_blksize = nfsd_get_default_max_blksize();
|
2019-04-09 18:46:19 +03:00
|
|
|
nfsd_reset_versions(nn);
|
2021-11-29 07:51:25 +03:00
|
|
|
serv = svc_create_pooled(&nfsd_program, nfsd_max_blksize,
|
|
|
|
&nfsd_thread_sv_ops);
|
|
|
|
if (serv == NULL)
|
2010-07-22 00:40:08 +04:00
|
|
|
return -ENOMEM;
|
2008-06-10 16:40:35 +04:00
|
|
|
|
2021-11-29 07:51:25 +03:00
|
|
|
serv->sv_maxconn = nn->max_connections;
|
|
|
|
error = svc_bind(serv, net);
|
2012-05-02 16:08:38 +04:00
|
|
|
if (error < 0) {
|
2021-11-29 07:51:25 +03:00
|
|
|
/* NOT nfsd_put() as notifiers (see below) haven't
|
|
|
|
* been set up yet.
|
|
|
|
*/
|
2021-11-29 07:51:25 +03:00
|
|
|
svc_put(serv);
|
2012-05-02 16:08:38 +04:00
|
|
|
return error;
|
|
|
|
}
|
2021-11-29 07:51:25 +03:00
|
|
|
spin_lock(&nfsd_notifier_lock);
|
|
|
|
nn->nfsd_serv = serv;
|
|
|
|
spin_unlock(&nfsd_notifier_lock);
|
2012-05-02 16:08:38 +04:00
|
|
|
|
2010-07-22 00:40:08 +04:00
|
|
|
set_max_drc();
|
2016-09-21 15:33:05 +03:00
|
|
|
/* check if the notifier is already set */
|
|
|
|
if (atomic_inc_return(&nfsd_notifier_refcount) == 1) {
|
|
|
|
register_inetaddr_notifier(&nfsd_inetaddr_notifier);
|
2015-12-12 00:45:59 +03:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2016-09-21 15:33:05 +03:00
|
|
|
register_inet6addr_notifier(&nfsd_inet6addr_notifier);
|
2015-12-12 00:45:59 +03:00
|
|
|
#endif
|
2016-09-21 15:33:05 +03:00
|
|
|
}
|
2021-12-30 18:22:05 +03:00
|
|
|
nfsd_reset_write_verifier(nn);
|
2012-01-31 01:18:35 +04:00
|
|
|
return 0;
|
2006-10-02 13:17:46 +04:00
|
|
|
}
|
|
|
|
|
2012-12-06 15:23:24 +04:00
|
|
|
int nfsd_nrpools(struct net *net)
|
2006-10-02 13:18:02 +04:00
|
|
|
{
|
2012-12-06 15:23:24 +04:00
|
|
|
struct nfsd_net *nn = net_generic(net, nfsd_net_id);
|
|
|
|
|
|
|
|
if (nn->nfsd_serv == NULL)
|
2006-10-02 13:18:02 +04:00
|
|
|
return 0;
|
|
|
|
else
|
2012-12-06 15:23:24 +04:00
|
|
|
return nn->nfsd_serv->sv_nrpools;
|
2006-10-02 13:18:02 +04:00
|
|
|
}
|
|
|
|
|
2012-12-06 15:23:24 +04:00
|
|
|
int nfsd_get_nrthreads(int n, int *nthreads, struct net *net)
|
2006-10-02 13:18:02 +04:00
|
|
|
{
|
|
|
|
int i = 0;
|
2012-12-06 15:23:24 +04:00
|
|
|
struct nfsd_net *nn = net_generic(net, nfsd_net_id);
|
2006-10-02 13:18:02 +04:00
|
|
|
|
2012-12-06 15:23:24 +04:00
|
|
|
if (nn->nfsd_serv != NULL) {
|
|
|
|
for (i = 0; i < nn->nfsd_serv->sv_nrpools && i < n; i++)
|
|
|
|
nthreads[i] = nn->nfsd_serv->sv_pools[i].sp_nrthreads;
|
2006-10-02 13:18:02 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-11-29 07:51:25 +03:00
|
|
|
/* This is the callback for kref_put() below.
|
|
|
|
* There is no code here as the first thing to be done is
|
|
|
|
* call svc_shutdown_net(), but we cannot get the 'net' from
|
|
|
|
* the kref. So do all the work when kref_put returns true.
|
|
|
|
*/
|
|
|
|
static void nfsd_noop(struct kref *ref)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2021-11-29 07:51:25 +03:00
|
|
|
void nfsd_put(struct net *net)
|
2012-12-06 15:23:24 +04:00
|
|
|
{
|
|
|
|
struct nfsd_net *nn = net_generic(net, nfsd_net_id);
|
|
|
|
|
2021-11-29 07:51:25 +03:00
|
|
|
if (kref_put(&nn->nfsd_serv->sv_refcnt, nfsd_noop)) {
|
2012-12-06 15:23:24 +04:00
|
|
|
svc_shutdown_net(nn->nfsd_serv, net);
|
2021-11-29 07:51:25 +03:00
|
|
|
svc_destroy(&nn->nfsd_serv->sv_refcnt);
|
2021-11-29 07:51:25 +03:00
|
|
|
spin_lock(&nfsd_notifier_lock);
|
NFSD: Make it possible to use svc_set_num_threads_sync
nfsd cannot currently use svc_set_num_threads_sync. It instead
uses svc_set_num_threads which does *not* wait for threads to all
exit, and has a separate mechanism (nfsd_shutdown_complete) to wait
for completion.
The reason that nfsd is unlike other services is that nfsd threads can
exit separately from svc_set_num_threads being called - they die on
receipt of SIGKILL. Also, when the last thread exits, the service must
be shut down (sockets closed).
For this, the nfsd_mutex needs to be taken, and as that mutex needs to
be held while svc_set_num_threads is called, the one cannot wait for
the other.
This patch changes the nfsd thread so that it can drop the ref on the
service without blocking on nfsd_mutex, so that svc_set_num_threads_sync
can be used:
- if it can drop a non-last reference, it does that. This does not
trigger shutdown and does not require a mutex. This will likely
happen for all but the last thread signalled, and for all threads
being shut down by nfsd_shutdown_threads()
- if it can get the mutex without blocking (trylock), it does that
and then drops the reference. This will likely happen for the
last thread killed by SIGKILL
- Otherwise there might be an unrelated task holding the mutex,
possibly in another network namespace, or nfsd_shutdown_threads()
might be just about to get a reference on the service, after which
we can drop ours safely.
We cannot conveniently get wakeup notifications on these events,
and we are unlikely to need to, so we sleep briefly and check again.
With this we can discard nfsd_shutdown_complete and
nfsd_complete_shutdown(), and switch to svc_set_num_threads_sync.
Signed-off-by: NeilBrown <neilb@suse.de>
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
2021-11-29 07:51:25 +03:00
|
|
|
nn->nfsd_serv = NULL;
|
2021-11-29 07:51:25 +03:00
|
|
|
spin_unlock(&nfsd_notifier_lock);
|
2021-11-29 07:51:25 +03:00
|
|
|
}
|
2012-12-06 15:23:24 +04:00
|
|
|
}
|
|
|
|
|
2012-12-10 13:19:30 +04:00
|
|
|
int nfsd_set_nrthreads(int n, int *nthreads, struct net *net)
|
2006-10-02 13:18:02 +04:00
|
|
|
{
|
|
|
|
int i = 0;
|
|
|
|
int tot = 0;
|
|
|
|
int err = 0;
|
2012-12-06 15:23:24 +04:00
|
|
|
struct nfsd_net *nn = net_generic(net, nfsd_net_id);
|
2006-10-02 13:18:02 +04:00
|
|
|
|
2008-06-10 16:40:35 +04:00
|
|
|
WARN_ON(!mutex_is_locked(&nfsd_mutex));
|
|
|
|
|
2012-12-06 15:23:24 +04:00
|
|
|
if (nn->nfsd_serv == NULL || n <= 0)
|
2006-10-02 13:18:02 +04:00
|
|
|
return 0;
|
|
|
|
|
2012-12-06 15:23:24 +04:00
|
|
|
if (n > nn->nfsd_serv->sv_nrpools)
|
|
|
|
n = nn->nfsd_serv->sv_nrpools;
|
2006-10-02 13:18:02 +04:00
|
|
|
|
|
|
|
/* enforce a global maximum number of threads */
|
|
|
|
tot = 0;
|
|
|
|
for (i = 0; i < n; i++) {
|
2014-06-10 14:08:19 +04:00
|
|
|
nthreads[i] = min(nthreads[i], NFSD_MAXSERVS);
|
2006-10-02 13:18:02 +04:00
|
|
|
tot += nthreads[i];
|
|
|
|
}
|
|
|
|
if (tot > NFSD_MAXSERVS) {
|
|
|
|
/* total too large: scale down requested numbers */
|
|
|
|
for (i = 0; i < n && tot > 0; i++) {
|
NFSD: Make it possible to use svc_set_num_threads_sync
nfsd cannot currently use svc_set_num_threads_sync. It instead
uses svc_set_num_threads which does *not* wait for threads to all
exit, and has a separate mechanism (nfsd_shutdown_complete) to wait
for completion.
The reason that nfsd is unlike other services is that nfsd threads can
exit separately from svc_set_num_threads being called - they die on
receipt of SIGKILL. Also, when the last thread exits, the service must
be shut down (sockets closed).
For this, the nfsd_mutex needs to be taken, and as that mutex needs to
be held while svc_set_num_threads is called, the one cannot wait for
the other.
This patch changes the nfsd thread so that it can drop the ref on the
service without blocking on nfsd_mutex, so that svc_set_num_threads_sync
can be used:
- if it can drop a non-last reference, it does that. This does not
trigger shutdown and does not require a mutex. This will likely
happen for all but the last thread signalled, and for all threads
being shut down by nfsd_shutdown_threads()
- if it can get the mutex without blocking (trylock), it does that
and then drops the reference. This will likely happen for the
last thread killed by SIGKILL
- Otherwise there might be an unrelated task holding the mutex,
possibly in another network namespace, or nfsd_shutdown_threads()
might be just about to get a reference on the service, after which
we can drop ours safely.
We cannot conveniently get wakeup notifications on these events,
and we are unlikely to need to, so we sleep briefly and check again.
With this we can discard nfsd_shutdown_complete and
nfsd_complete_shutdown(), and switch to svc_set_num_threads_sync.
Signed-off-by: NeilBrown <neilb@suse.de>
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
2021-11-29 07:51:25 +03:00
|
|
|
int new = nthreads[i] * NFSD_MAXSERVS / tot;
|
2006-10-02 13:18:02 +04:00
|
|
|
tot -= (nthreads[i] - new);
|
|
|
|
nthreads[i] = new;
|
|
|
|
}
|
|
|
|
for (i = 0; i < n && tot > 0; i++) {
|
|
|
|
nthreads[i]--;
|
|
|
|
tot--;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* There must always be a thread in pool 0; the admin
|
|
|
|
* can't shut down NFS completely using pool_threads.
|
|
|
|
*/
|
|
|
|
if (nthreads[0] == 0)
|
|
|
|
nthreads[0] = 1;
|
|
|
|
|
|
|
|
/* apply the new numbers */
|
2012-12-06 15:23:24 +04:00
|
|
|
svc_get(nn->nfsd_serv);
|
2006-10-02 13:18:02 +04:00
|
|
|
for (i = 0; i < n; i++) {
|
2021-11-29 07:51:25 +03:00
|
|
|
err = svc_set_num_threads(nn->nfsd_serv,
|
|
|
|
&nn->nfsd_serv->sv_pools[i],
|
|
|
|
nthreads[i]);
|
2006-10-02 13:18:02 +04:00
|
|
|
if (err)
|
|
|
|
break;
|
|
|
|
}
|
2021-11-29 07:51:25 +03:00
|
|
|
nfsd_put(net);
|
2006-10-02 13:18:02 +04:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2010-07-20 22:10:22 +04:00
|
|
|
/*
|
|
|
|
* Adjust the number of threads and return the new number of threads.
|
|
|
|
* This is also the function that starts the server if necessary, if
|
|
|
|
* this is the first time nrservs is nonzero.
|
|
|
|
*/
|
2005-04-17 02:20:36 +04:00
|
|
|
int
|
2019-04-09 19:13:37 +03:00
|
|
|
nfsd_svc(int nrservs, struct net *net, const struct cred *cred)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
|
|
|
int error;
|
2010-08-02 22:12:44 +04:00
|
|
|
bool nfsd_up_before;
|
2012-12-06 15:23:24 +04:00
|
|
|
struct nfsd_net *nn = net_generic(net, nfsd_net_id);
|
2008-06-10 16:40:35 +04:00
|
|
|
|
|
|
|
mutex_lock(&nfsd_mutex);
|
2006-10-02 13:17:46 +04:00
|
|
|
dprintk("nfsd: creating service\n");
|
2014-06-10 14:08:19 +04:00
|
|
|
|
|
|
|
nrservs = max(nrservs, 0);
|
|
|
|
nrservs = min(nrservs, NFSD_MAXSERVS);
|
2009-06-16 05:03:20 +04:00
|
|
|
error = 0;
|
2014-06-10 14:08:19 +04:00
|
|
|
|
2012-12-06 15:23:24 +04:00
|
|
|
if (nrservs == 0 && nn->nfsd_serv == NULL)
|
2009-06-16 05:03:20 +04:00
|
|
|
goto out;
|
|
|
|
|
2020-02-19 23:52:15 +03:00
|
|
|
strlcpy(nn->nfsd_name, utsname()->nodename,
|
|
|
|
sizeof(nn->nfsd_name));
|
|
|
|
|
2012-12-10 13:19:20 +04:00
|
|
|
error = nfsd_create_serv(net);
|
2006-10-02 13:17:46 +04:00
|
|
|
if (error)
|
2010-08-02 22:12:44 +04:00
|
|
|
goto out;
|
|
|
|
|
2012-12-06 15:23:34 +04:00
|
|
|
nfsd_up_before = nn->nfsd_net_up;
|
2010-08-02 22:12:44 +04:00
|
|
|
|
2021-04-15 15:00:58 +03:00
|
|
|
error = nfsd_startup_net(net, cred);
|
2010-07-22 02:31:42 +04:00
|
|
|
if (error)
|
2021-11-29 07:51:25 +03:00
|
|
|
goto out_put;
|
2021-11-29 07:51:25 +03:00
|
|
|
error = svc_set_num_threads(nn->nfsd_serv, NULL, nrservs);
|
2010-08-02 22:12:44 +04:00
|
|
|
if (error)
|
|
|
|
goto out_shutdown;
|
2021-11-29 07:51:25 +03:00
|
|
|
error = nn->nfsd_serv->sv_nrthreads;
|
2010-07-20 00:50:04 +04:00
|
|
|
out_shutdown:
|
2010-08-02 22:12:44 +04:00
|
|
|
if (error < 0 && !nfsd_up_before)
|
2012-12-06 15:23:44 +04:00
|
|
|
nfsd_shutdown_net(net);
|
2021-11-29 07:51:25 +03:00
|
|
|
out_put:
|
2021-11-29 07:51:25 +03:00
|
|
|
/* Threads now hold service active */
|
|
|
|
if (xchg(&nn->keep_active, 0))
|
|
|
|
nfsd_put(net);
|
2021-11-29 07:51:25 +03:00
|
|
|
nfsd_put(net);
|
2010-07-20 00:50:04 +04:00
|
|
|
out:
|
2008-06-10 16:40:35 +04:00
|
|
|
mutex_unlock(&nfsd_mutex);
|
2005-04-17 02:20:36 +04:00
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
2019-04-09 18:46:18 +03:00
|
|
|
#if defined(CONFIG_NFSD_V2_ACL) || defined(CONFIG_NFSD_V3_ACL)
|
|
|
|
static bool
|
|
|
|
nfsd_support_acl_version(int vers)
|
|
|
|
{
|
|
|
|
if (vers >= NFSD_ACL_MINVERS && vers < NFSD_ACL_NRVERS)
|
|
|
|
return nfsd_acl_version[vers] != NULL;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
nfsd_acl_rpcbind_set(struct net *net, const struct svc_program *progp,
|
|
|
|
u32 version, int family, unsigned short proto,
|
|
|
|
unsigned short port)
|
|
|
|
{
|
|
|
|
if (!nfsd_support_acl_version(version) ||
|
2019-04-09 18:46:19 +03:00
|
|
|
!nfsd_vers(net_generic(net, nfsd_net_id), version, NFSD_TEST))
|
2019-04-09 18:46:18 +03:00
|
|
|
return 0;
|
|
|
|
return svc_generic_rpcbind_set(net, progp, version, family,
|
|
|
|
proto, port);
|
|
|
|
}
|
2019-04-09 18:46:19 +03:00
|
|
|
|
|
|
|
static __be32
|
|
|
|
nfsd_acl_init_request(struct svc_rqst *rqstp,
|
|
|
|
const struct svc_program *progp,
|
|
|
|
struct svc_process_info *ret)
|
|
|
|
{
|
|
|
|
struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id);
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (likely(nfsd_support_acl_version(rqstp->rq_vers) &&
|
|
|
|
nfsd_vers(nn, rqstp->rq_vers, NFSD_TEST)))
|
|
|
|
return svc_generic_init_request(rqstp, progp, ret);
|
|
|
|
|
|
|
|
ret->mismatch.lovers = NFSD_ACL_NRVERS;
|
|
|
|
for (i = NFSD_ACL_MINVERS; i < NFSD_ACL_NRVERS; i++) {
|
|
|
|
if (nfsd_support_acl_version(rqstp->rq_vers) &&
|
|
|
|
nfsd_vers(nn, i, NFSD_TEST)) {
|
|
|
|
ret->mismatch.lovers = i;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (ret->mismatch.lovers == NFSD_ACL_NRVERS)
|
|
|
|
return rpc_prog_unavail;
|
|
|
|
ret->mismatch.hivers = NFSD_ACL_MINVERS;
|
|
|
|
for (i = NFSD_ACL_NRVERS - 1; i >= NFSD_ACL_MINVERS; i--) {
|
|
|
|
if (nfsd_support_acl_version(rqstp->rq_vers) &&
|
|
|
|
nfsd_vers(nn, i, NFSD_TEST)) {
|
|
|
|
ret->mismatch.hivers = i;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return rpc_prog_mismatch;
|
|
|
|
}
|
2019-04-09 18:46:18 +03:00
|
|
|
#endif
|
|
|
|
|
|
|
|
static int
|
|
|
|
nfsd_rpcbind_set(struct net *net, const struct svc_program *progp,
|
|
|
|
u32 version, int family, unsigned short proto,
|
|
|
|
unsigned short port)
|
|
|
|
{
|
2019-04-09 18:46:19 +03:00
|
|
|
if (!nfsd_vers(net_generic(net, nfsd_net_id), version, NFSD_TEST))
|
2019-04-09 18:46:18 +03:00
|
|
|
return 0;
|
|
|
|
return svc_generic_rpcbind_set(net, progp, version, family,
|
|
|
|
proto, port);
|
|
|
|
}
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2019-04-09 18:46:19 +03:00
|
|
|
static __be32
|
|
|
|
nfsd_init_request(struct svc_rqst *rqstp,
|
|
|
|
const struct svc_program *progp,
|
|
|
|
struct svc_process_info *ret)
|
|
|
|
{
|
|
|
|
struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id);
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (likely(nfsd_vers(nn, rqstp->rq_vers, NFSD_TEST)))
|
|
|
|
return svc_generic_init_request(rqstp, progp, ret);
|
|
|
|
|
|
|
|
ret->mismatch.lovers = NFSD_NRVERS;
|
|
|
|
for (i = NFSD_MINVERS; i < NFSD_NRVERS; i++) {
|
|
|
|
if (nfsd_vers(nn, i, NFSD_TEST)) {
|
|
|
|
ret->mismatch.lovers = i;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (ret->mismatch.lovers == NFSD_NRVERS)
|
|
|
|
return rpc_prog_unavail;
|
|
|
|
ret->mismatch.hivers = NFSD_MINVERS;
|
|
|
|
for (i = NFSD_NRVERS - 1; i >= NFSD_MINVERS; i--) {
|
|
|
|
if (nfsd_vers(nn, i, NFSD_TEST)) {
|
|
|
|
ret->mismatch.hivers = i;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return rpc_prog_mismatch;
|
|
|
|
}
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
/*
|
|
|
|
* This is the NFS server kernel thread
|
|
|
|
*/
|
2008-06-10 16:40:38 +04:00
|
|
|
static int
|
|
|
|
nfsd(void *vrqstp)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
2008-06-10 16:40:38 +04:00
|
|
|
struct svc_rqst *rqstp = (struct svc_rqst *) vrqstp;
|
2012-12-06 19:34:42 +04:00
|
|
|
struct svc_xprt *perm_sock = list_entry(rqstp->rq_server->sv_permsocks.next, typeof(struct svc_xprt), xpt_list);
|
|
|
|
struct net *net = perm_sock->xpt_net;
|
2014-07-03 00:11:22 +04:00
|
|
|
struct nfsd_net *nn = net_generic(net, nfsd_net_id);
|
2012-08-18 05:47:53 +04:00
|
|
|
int err;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2008-06-10 16:40:38 +04:00
|
|
|
/* At this point, the thread shares current->fs
|
2016-01-12 22:24:14 +03:00
|
|
|
* with the init process. We need to create files with the
|
|
|
|
* umask as defined by the client instead of init's umask. */
|
2009-03-30 03:00:13 +04:00
|
|
|
if (unshare_fs_struct() < 0) {
|
2005-04-17 02:20:36 +04:00
|
|
|
printk("Unable to start nfsd thread: out of memory\n");
|
|
|
|
goto out;
|
|
|
|
}
|
2009-03-30 03:00:13 +04:00
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
current->fs->umask = 0;
|
|
|
|
|
2008-06-10 16:40:38 +04:00
|
|
|
/*
|
|
|
|
* thread is spawned with all signals set to SIG_IGN, re-enable
|
2008-06-30 22:09:46 +04:00
|
|
|
* the ones that will bring down the thread
|
2008-06-10 16:40:38 +04:00
|
|
|
*/
|
2008-06-30 22:09:46 +04:00
|
|
|
allow_signal(SIGKILL);
|
|
|
|
allow_signal(SIGHUP);
|
|
|
|
allow_signal(SIGINT);
|
|
|
|
allow_signal(SIGQUIT);
|
2008-06-10 16:40:35 +04:00
|
|
|
|
2021-11-29 07:51:25 +03:00
|
|
|
atomic_inc(&nfsdstats.th_cnt);
|
2008-06-10 16:40:35 +04:00
|
|
|
|
2007-07-17 15:03:35 +04:00
|
|
|
set_freezable();
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* The main request loop
|
|
|
|
*/
|
|
|
|
for (;;) {
|
2014-07-03 00:11:22 +04:00
|
|
|
/* Update sv_maxconn if it has changed */
|
|
|
|
rqstp->rq_server->sv_maxconn = nn->max_connections;
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
/*
|
|
|
|
* Find a socket with data available and call its
|
|
|
|
* recvfrom routine.
|
|
|
|
*/
|
2006-10-02 13:17:50 +04:00
|
|
|
while ((err = svc_recv(rqstp, 60*60*HZ)) == -EAGAIN)
|
2005-04-17 02:20:36 +04:00
|
|
|
;
|
2008-06-10 16:40:38 +04:00
|
|
|
if (err == -EINTR)
|
2005-04-17 02:20:36 +04:00
|
|
|
break;
|
2009-09-02 12:13:40 +04:00
|
|
|
validate_process_creds();
|
2006-10-02 13:17:50 +04:00
|
|
|
svc_process(rqstp);
|
2009-09-02 12:13:40 +04:00
|
|
|
validate_process_creds();
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
|
|
|
|
2006-10-02 13:17:45 +04:00
|
|
|
/* Clear signals before calling svc_exit_thread() */
|
2005-04-17 02:26:37 +04:00
|
|
|
flush_signals(current);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2021-11-29 07:51:25 +03:00
|
|
|
atomic_dec(&nfsdstats.th_cnt);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
out:
|
2021-11-29 07:51:25 +03:00
|
|
|
/* Take an extra ref so that the svc_put in svc_exit_thread()
|
|
|
|
* doesn't call svc_destroy()
|
|
|
|
*/
|
|
|
|
svc_get(nn->nfsd_serv);
|
2012-05-04 12:49:41 +04:00
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
/* Release the thread */
|
|
|
|
svc_exit_thread(rqstp);
|
|
|
|
|
NFSD: Make it possible to use svc_set_num_threads_sync
nfsd cannot currently use svc_set_num_threads_sync. It instead
uses svc_set_num_threads which does *not* wait for threads to all
exit, and has a separate mechanism (nfsd_shutdown_complete) to wait
for completion.
The reason that nfsd is unlike other services is that nfsd threads can
exit separately from svc_set_num_threads being called - they die on
receipt of SIGKILL. Also, when the last thread exits, the service must
be shut down (sockets closed).
For this, the nfsd_mutex needs to be taken, and as that mutex needs to
be held while svc_set_num_threads is called, the one cannot wait for
the other.
This patch changes the nfsd thread so that it can drop the ref on the
service without blocking on nfsd_mutex, so that svc_set_num_threads_sync
can be used:
- if it can drop a non-last reference, it does that. This does not
trigger shutdown and does not require a mutex. This will likely
happen for all but the last thread signalled, and for all threads
being shut down by nfsd_shutdown_threads()
- if it can get the mutex without blocking (trylock), it does that
and then drops the reference. This will likely happen for the
last thread killed by SIGKILL
- Otherwise there might be an unrelated task holding the mutex,
possibly in another network namespace, or nfsd_shutdown_threads()
might be just about to get a reference on the service, after which
we can drop ours safely.
We cannot conveniently get wakeup notifications on these events,
and we are unlikely to need to, so we sleep briefly and check again.
With this we can discard nfsd_shutdown_complete and
nfsd_complete_shutdown(), and switch to svc_set_num_threads_sync.
Signed-off-by: NeilBrown <neilb@suse.de>
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
2021-11-29 07:51:25 +03:00
|
|
|
/* We need to drop a ref, but may not drop the last reference
|
|
|
|
* without holding nfsd_mutex, and we cannot wait for nfsd_mutex as that
|
|
|
|
* could deadlock with nfsd_shutdown_threads() waiting for us.
|
|
|
|
* So three options are:
|
|
|
|
* - drop a non-final reference,
|
|
|
|
* - get the mutex without waiting
|
|
|
|
* - sleep briefly andd try the above again
|
|
|
|
*/
|
|
|
|
while (!svc_put_not_last(nn->nfsd_serv)) {
|
|
|
|
if (mutex_trylock(&nfsd_mutex)) {
|
|
|
|
nfsd_put(net);
|
|
|
|
mutex_unlock(&nfsd_mutex);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
msleep(20);
|
|
|
|
}
|
2012-07-03 16:46:41 +04:00
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
/* Release module */
|
2021-12-03 20:00:19 +03:00
|
|
|
module_put_and_kthread_exit(0);
|
2008-06-10 16:40:38 +04:00
|
|
|
return 0;
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
|
|
|
|
2020-10-02 01:59:23 +03:00
|
|
|
/**
|
|
|
|
* nfsd_dispatch - Process an NFS or NFSACL Request
|
|
|
|
* @rqstp: incoming request
|
|
|
|
* @statp: pointer to location of accept_stat field in RPC Reply buffer
|
|
|
|
*
|
|
|
|
* This RPC dispatcher integrates the NFS server's duplicate reply cache.
|
|
|
|
*
|
|
|
|
* Return values:
|
|
|
|
* %0: Processing complete; do not send a Reply
|
|
|
|
* %1: Processing complete; send Reply in rqstp->rq_res
|
|
|
|
*/
|
|
|
|
int nfsd_dispatch(struct svc_rqst *rqstp, __be32 *statp)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
2020-10-02 01:59:28 +03:00
|
|
|
const struct svc_procedure *proc = rqstp->rq_procinfo;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2011-01-24 20:11:02 +03:00
|
|
|
/*
|
|
|
|
* Give the xdr decoder a chance to change this if it wants
|
|
|
|
* (necessary in the NFSv4.0 compound case)
|
|
|
|
*/
|
|
|
|
rqstp->rq_cachetype = proc->pc_cachetype;
|
2020-11-05 19:19:42 +03:00
|
|
|
|
|
|
|
svcxdr_init_decode(rqstp);
|
2021-10-12 18:57:22 +03:00
|
|
|
if (!proc->pc_decode(rqstp, &rqstp->rq_arg_stream))
|
2020-10-02 01:59:33 +03:00
|
|
|
goto out_decode_err;
|
2011-01-24 20:11:02 +03:00
|
|
|
|
|
|
|
switch (nfsd_cache_lookup(rqstp)) {
|
2020-10-02 01:59:18 +03:00
|
|
|
case RC_DOIT:
|
|
|
|
break;
|
2005-04-17 02:20:36 +04:00
|
|
|
case RC_REPLY:
|
2020-10-02 01:59:33 +03:00
|
|
|
goto out_cached_reply;
|
2020-10-02 01:59:18 +03:00
|
|
|
case RC_DROPIT:
|
2020-10-02 01:59:33 +03:00
|
|
|
goto out_dropit;
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
|
|
|
|
2020-10-02 01:59:23 +03:00
|
|
|
/*
|
|
|
|
* Need to grab the location to store the status, as
|
|
|
|
* NFSv4 does some encoding while processing
|
2005-04-17 02:20:36 +04:00
|
|
|
*/
|
2020-10-27 22:53:42 +03:00
|
|
|
svcxdr_init_encode(rqstp);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2020-10-02 22:52:44 +03:00
|
|
|
*statp = proc->pc_func(rqstp);
|
|
|
|
if (*statp == rpc_drop_reply || test_bit(RQ_DROPME, &rqstp->rq_flags))
|
2020-10-02 01:59:33 +03:00
|
|
|
goto out_update_drop;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2021-10-13 17:41:06 +03:00
|
|
|
if (!proc->pc_encode(rqstp, &rqstp->rq_res_stream))
|
2020-10-02 01:59:49 +03:00
|
|
|
goto out_encode_err;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-11-17 00:22:43 +04:00
|
|
|
nfsd_cache_update(rqstp, rqstp->rq_cachetype, statp + 1);
|
2020-10-02 01:59:33 +03:00
|
|
|
out_cached_reply:
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
out_decode_err:
|
2020-10-19 20:00:29 +03:00
|
|
|
trace_nfsd_garbage_args_err(rqstp);
|
2020-10-02 01:59:33 +03:00
|
|
|
*statp = rpc_garbage_args;
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
out_update_drop:
|
|
|
|
nfsd_cache_update(rqstp, RC_NOCACHE, NULL);
|
|
|
|
out_dropit:
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
out_encode_err:
|
2020-10-19 20:00:29 +03:00
|
|
|
trace_nfsd_cant_encode_err(rqstp);
|
2020-10-02 01:59:33 +03:00
|
|
|
nfsd_cache_update(rqstp, RC_NOCACHE, NULL);
|
|
|
|
*statp = rpc_system_err;
|
2005-04-17 02:20:36 +04:00
|
|
|
return 1;
|
|
|
|
}
|
2009-01-13 13:26:36 +03:00
|
|
|
|
2020-11-05 22:48:29 +03:00
|
|
|
/**
|
|
|
|
* nfssvc_decode_voidarg - Decode void arguments
|
|
|
|
* @rqstp: Server RPC transaction context
|
2021-10-12 18:57:22 +03:00
|
|
|
* @xdr: XDR stream positioned at arguments to decode
|
2020-11-05 22:48:29 +03:00
|
|
|
*
|
|
|
|
* Return values:
|
2021-10-12 18:57:28 +03:00
|
|
|
* %false: Arguments were not valid
|
|
|
|
* %true: Decoding was successful
|
2020-11-05 22:48:29 +03:00
|
|
|
*/
|
2021-10-12 18:57:28 +03:00
|
|
|
bool nfssvc_decode_voidarg(struct svc_rqst *rqstp, struct xdr_stream *xdr)
|
2020-11-05 22:48:29 +03:00
|
|
|
{
|
2021-10-19 07:14:22 +03:00
|
|
|
return true;
|
2020-11-05 22:48:29 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* nfssvc_encode_voidres - Encode void results
|
|
|
|
* @rqstp: Server RPC transaction context
|
2021-10-13 17:41:06 +03:00
|
|
|
* @xdr: XDR stream into which to encode results
|
2020-11-05 22:48:29 +03:00
|
|
|
*
|
|
|
|
* Return values:
|
2021-10-13 17:41:13 +03:00
|
|
|
* %false: Local error while encoding
|
|
|
|
* %true: Encoding was successful
|
2020-11-05 22:48:29 +03:00
|
|
|
*/
|
2021-10-13 17:41:13 +03:00
|
|
|
bool nfssvc_encode_voidres(struct svc_rqst *rqstp, struct xdr_stream *xdr)
|
2020-11-05 22:48:29 +03:00
|
|
|
{
|
2021-10-13 17:41:13 +03:00
|
|
|
return true;
|
2020-11-05 22:48:29 +03:00
|
|
|
}
|
|
|
|
|
2009-01-13 13:26:36 +03:00
|
|
|
int nfsd_pool_stats_open(struct inode *inode, struct file *file)
|
|
|
|
{
|
2009-08-15 19:54:41 +04:00
|
|
|
int ret;
|
2013-02-01 16:56:12 +04:00
|
|
|
struct nfsd_net *nn = net_generic(inode->i_sb->s_fs_info, nfsd_net_id);
|
2012-12-06 15:23:24 +04:00
|
|
|
|
2009-08-15 19:54:41 +04:00
|
|
|
mutex_lock(&nfsd_mutex);
|
2012-12-06 15:23:24 +04:00
|
|
|
if (nn->nfsd_serv == NULL) {
|
2009-08-15 19:54:41 +04:00
|
|
|
mutex_unlock(&nfsd_mutex);
|
2009-01-13 13:26:36 +03:00
|
|
|
return -ENODEV;
|
2009-08-15 19:54:41 +04:00
|
|
|
}
|
2012-12-06 15:23:24 +04:00
|
|
|
svc_get(nn->nfsd_serv);
|
|
|
|
ret = svc_pool_stats_open(nn->nfsd_serv, file);
|
2009-08-15 19:54:41 +04:00
|
|
|
mutex_unlock(&nfsd_mutex);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int nfsd_pool_stats_release(struct inode *inode, struct file *file)
|
|
|
|
{
|
|
|
|
int ret = seq_release(inode, file);
|
2013-02-01 16:56:12 +04:00
|
|
|
struct net *net = inode->i_sb->s_fs_info;
|
2012-05-04 12:49:41 +04:00
|
|
|
|
2009-08-15 19:54:41 +04:00
|
|
|
mutex_lock(&nfsd_mutex);
|
2021-11-29 07:51:25 +03:00
|
|
|
nfsd_put(net);
|
2009-08-15 19:54:41 +04:00
|
|
|
mutex_unlock(&nfsd_mutex);
|
|
|
|
return ret;
|
2009-01-13 13:26:36 +03:00
|
|
|
}
|