Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp4419590ybl; Mon, 26 Aug 2019 10:09:11 -0700 (PDT) X-Google-Smtp-Source: APXvYqxYZcut/p+87XD9uOWwFlnO89dJy3fMrzoUq7cvjBSJ7gMwEXG7/N8xhfdWFal/SYEvtVQo X-Received: by 2002:a63:4c5a:: with SMTP id m26mr17037818pgl.270.1566839351642; Mon, 26 Aug 2019 10:09:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566839351; cv=none; d=google.com; s=arc-20160816; b=ZlR+wrvD+T3u5pKemPp29im5vy38nRydTen+ynzwQ5fxTr7OQOA7a6fX0q7ejKlHcz 2lYyJ3nt49QuO98HJaaP9Vc7kXCygI392pCevgc3ayJcP0AbRVRq9UaMmyvNvE/tCMVa vSEcBH15MQ50XKhGFjoaGMSAKlPN4KsRRfvgUoNsUe5buSQaM4A0sprUE1dojnXDdb6Q 3uTyyMQYM4se+8xuN+C/fHr7YZyMt2lggQJjfQFfrFUNKJ+EiW2fC8yMRR/x90Dq3ga6 79knOKp9K0iAZb1RoLmt7g/nmEZjsqqC+yZPfHuh0g7zbHluIKPXyGDZDGD0hSy/To7X 3PKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=GA75ufOJonbpqC5MlA/RQIRk67dy/HSW1IeiLuiWlEU=; b=ZtyWW83njQIpaiWHOhEqcxmwMmi/F6o+pIUv588qXjapY7Z0WCrxXnvdl9F4FKLE5h TE8BZqVEIY/1uoTeSrm9jKmNVKHfuRkS27gh7CezvJ6GMGYoLQOCzHqE/LThX7GbA0TT gusyEx9i86cn6PwPURlNi3XjxxVIr0HHZHfA7cLXqsKxcGazr8OWMFrVfkhg0WokN0cF HFHyG6imSoFx0Te8rDGNWSVvcwfljjIMjZIfqOPIdAAMOb47vGBw+ZemegeEfvonsmgi PPFikVs+EvxStPsaDh4KHGqCxTUAnOHA8dy7oO3hIYoItzgq7kdD37QlsK5A4HlJHWeJ P85Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=sQXUoMWR; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id cm1si99292pjb.12.2019.08.26.10.08.57; Mon, 26 Aug 2019 10:09:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=sQXUoMWR; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731786AbfHZQxu (ORCPT + 99 others); Mon, 26 Aug 2019 12:53:50 -0400 Received: from mail-io1-f68.google.com ([209.85.166.68]:38795 "EHLO mail-io1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728560AbfHZQxu (ORCPT ); Mon, 26 Aug 2019 12:53:50 -0400 Received: by mail-io1-f68.google.com with SMTP id p12so38996815iog.5 for ; Mon, 26 Aug 2019 09:53:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=GA75ufOJonbpqC5MlA/RQIRk67dy/HSW1IeiLuiWlEU=; b=sQXUoMWRro6muf1MsbOMAs+rCGu9aPocoQUZtfzyxA4DD4E+/gRzFCVXMRK+QW/rg6 IrOyVBSJkgwuZqFu6hCQ7TLSCwXrSkeqvUDmyRAoQvncFyeqynvIS2fSmyai9ruZiuCY DYtVrYE4FZJ7Q5Q4Ocfab1r0cy9C10xkYoEEdSJYlaL+3mH4Vk7/6P6lqt6QnMws8Gbf 1TpVY3bGVKCM/oJ796xs4YG2sw4FpMaAwPaehd6AHuleFrLCeHKPoGMs1Pdor0duCMS4 V1O5m9fZSP7vvTPM9imoh88zcjkmbUjAdPdYoYThSjFi71BpX226is5/unR3h9vgHH5V ZhRw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=GA75ufOJonbpqC5MlA/RQIRk67dy/HSW1IeiLuiWlEU=; b=iSaIV3qUzmAh7+61Y59Azse8zkDgig+6uVbQ1kG74h9eXwtTFAm5bRLE9EKT1SiAbz FxpzwevxRkHEfpn61efWw4qKnmtupjScpnD+/ypurh+jPBX4NrmtYqkDdBmb+vHr2oFP DooaHN7fhPSdUmmIRaNo6PocS0aj4PgMhHxOvTwPaMnXxTMST6SMYZUToatUj4C9eJGx /x1Qpc4xE8guVgtN+wBbJE8fNj/XogR+K/YPDeo8iNu3yXPo5a/EC4AzfOreYhTKN031 NrmbNpBLddIXl77OUoKrYKOmHNs2ENGZW/B0PXYkNGLUoqfHY9zVwU2JljQoTIn+HnBZ vEyA== X-Gm-Message-State: APjAAAWTKiMYWOmEttebn040vi39CGCUP7KJVH5WpPV2iACGjkhNBDr+ OvjsZSnCd3w6/MkmyJmqfmOulGjq2g== X-Received: by 2002:a5d:9d43:: with SMTP id k3mr889970iok.111.1566838428863; Mon, 26 Aug 2019 09:53:48 -0700 (PDT) Received: from localhost.localdomain (c-68-40-189-247.hsd1.mi.comcast.net. [68.40.189.247]) by smtp.gmail.com with ESMTPSA id u24sm10613490iot.38.2019.08.26.09.53.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 26 Aug 2019 09:53:48 -0700 (PDT) From: Trond Myklebust X-Google-Original-From: Trond Myklebust To: "J. Bruce Fields" Cc: linux-nfs@vger.kernel.org Subject: [PATCH 1/3] nfsd: nfsd_file cache entries should be per net namespace Date: Mon, 26 Aug 2019 12:50:19 -0400 Message-Id: <20190826165021.81075-2-trond.myklebust@hammerspace.com> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190826165021.81075-1-trond.myklebust@hammerspace.com> References: <20190826165021.81075-1-trond.myklebust@hammerspace.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org Ensure that we can safely clear out the file cache entries when the nfs server is shut down on a container. Otherwise, the file cache may end up pinning the mounts. Signed-off-by: Trond Myklebust --- fs/nfsd/export.c | 2 +- fs/nfsd/filecache.c | 33 +++++++++++++++++++++------------ fs/nfsd/filecache.h | 3 ++- fs/nfsd/nfssvc.c | 1 + 4 files changed, 25 insertions(+), 14 deletions(-) diff --git a/fs/nfsd/export.c b/fs/nfsd/export.c index 052fac64b578..15422c951fd1 100644 --- a/fs/nfsd/export.c +++ b/fs/nfsd/export.c @@ -240,7 +240,7 @@ static void expkey_flush(void) * destroyed while we're in the middle of flushing. */ mutex_lock(&nfsd_mutex); - nfsd_file_cache_purge(); + nfsd_file_cache_purge(current->nsproxy->net_ns); mutex_unlock(&nfsd_mutex); } diff --git a/fs/nfsd/filecache.c b/fs/nfsd/filecache.c index a2fcb251d2f6..d229fd3c825d 100644 --- a/fs/nfsd/filecache.c +++ b/fs/nfsd/filecache.c @@ -17,6 +17,7 @@ #include "vfs.h" #include "nfsd.h" #include "nfsfh.h" +#include "netns.h" #include "filecache.h" #include "trace.h" @@ -168,7 +169,8 @@ nfsd_file_mark_find_or_create(struct nfsd_file *nf) } static struct nfsd_file * -nfsd_file_alloc(struct inode *inode, unsigned int may, unsigned int hashval) +nfsd_file_alloc(struct inode *inode, unsigned int may, unsigned int hashval, + struct net *net) { struct nfsd_file *nf; @@ -178,6 +180,7 @@ nfsd_file_alloc(struct inode *inode, unsigned int may, unsigned int hashval) INIT_LIST_HEAD(&nf->nf_lru); nf->nf_file = NULL; nf->nf_cred = get_current_cred(); + nf->nf_net = net; nf->nf_flags = 0; nf->nf_inode = inode; nf->nf_hashval = hashval; @@ -608,10 +611,11 @@ nfsd_file_cache_init(void) * Note this can deadlock with nfsd_file_lru_cb. */ void -nfsd_file_cache_purge(void) +nfsd_file_cache_purge(struct net *net) { unsigned int i; struct nfsd_file *nf; + struct hlist_node *next; LIST_HEAD(dispose); bool del; @@ -619,10 +623,12 @@ nfsd_file_cache_purge(void) return; for (i = 0; i < NFSD_FILE_HASH_SIZE; i++) { - spin_lock(&nfsd_file_hashtbl[i].nfb_lock); - while(!hlist_empty(&nfsd_file_hashtbl[i].nfb_head)) { - nf = hlist_entry(nfsd_file_hashtbl[i].nfb_head.first, - struct nfsd_file, nf_node); + struct nfsd_fcache_bucket *nfb = &nfsd_file_hashtbl[i]; + + spin_lock(&nfb->nfb_lock); + hlist_for_each_entry_safe(nf, next, &nfb->nfb_head, nf_node) { + if (net && nf->nf_net != net) + continue; del = nfsd_file_unhash_and_release_locked(nf, &dispose); /* @@ -631,7 +637,7 @@ nfsd_file_cache_purge(void) */ WARN_ON_ONCE(!del); } - spin_unlock(&nfsd_file_hashtbl[i].nfb_lock); + spin_unlock(&nfb->nfb_lock); nfsd_file_dispose_list(&dispose); } } @@ -650,7 +656,7 @@ nfsd_file_cache_shutdown(void) * calling nfsd_file_cache_purge */ cancel_delayed_work_sync(&nfsd_filecache_laundrette); - nfsd_file_cache_purge(); + nfsd_file_cache_purge(NULL); list_lru_destroy(&nfsd_file_lru); rcu_barrier(); fsnotify_put_group(nfsd_file_fsnotify_group); @@ -686,7 +692,7 @@ nfsd_match_cred(const struct cred *c1, const struct cred *c2) static struct nfsd_file * nfsd_file_find_locked(struct inode *inode, unsigned int may_flags, - unsigned int hashval) + unsigned int hashval, struct net *net) { struct nfsd_file *nf; unsigned char need = may_flags & NFSD_FILE_MAY_MASK; @@ -697,6 +703,8 @@ nfsd_file_find_locked(struct inode *inode, unsigned int may_flags, continue; if (nf->nf_inode != inode) continue; + if (nf->nf_net != net) + continue; if (!nfsd_match_cred(nf->nf_cred, current_cred())) continue; if (nfsd_file_get(nf) != NULL) @@ -739,6 +747,7 @@ nfsd_file_acquire(struct svc_rqst *rqstp, struct svc_fh *fhp, unsigned int may_flags, struct nfsd_file **pnf) { __be32 status; + struct net *net = SVC_NET(rqstp); struct nfsd_file *nf, *new; struct inode *inode; unsigned int hashval; @@ -753,12 +762,12 @@ nfsd_file_acquire(struct svc_rqst *rqstp, struct svc_fh *fhp, hashval = (unsigned int)hash_long(inode->i_ino, NFSD_FILE_HASH_BITS); retry: rcu_read_lock(); - nf = nfsd_file_find_locked(inode, may_flags, hashval); + nf = nfsd_file_find_locked(inode, may_flags, hashval, net); rcu_read_unlock(); if (nf) goto wait_for_construction; - new = nfsd_file_alloc(inode, may_flags, hashval); + new = nfsd_file_alloc(inode, may_flags, hashval, net); if (!new) { trace_nfsd_file_acquire(rqstp, hashval, inode, may_flags, NULL, nfserr_jukebox); @@ -766,7 +775,7 @@ nfsd_file_acquire(struct svc_rqst *rqstp, struct svc_fh *fhp, } spin_lock(&nfsd_file_hashtbl[hashval].nfb_lock); - nf = nfsd_file_find_locked(inode, may_flags, hashval); + nf = nfsd_file_find_locked(inode, may_flags, hashval, net); if (nf == NULL) goto open_file; spin_unlock(&nfsd_file_hashtbl[hashval].nfb_lock); diff --git a/fs/nfsd/filecache.h b/fs/nfsd/filecache.h index 0c0c67166b87..851d9abf54c2 100644 --- a/fs/nfsd/filecache.h +++ b/fs/nfsd/filecache.h @@ -34,6 +34,7 @@ struct nfsd_file { struct rcu_head nf_rcu; struct file *nf_file; const struct cred *nf_cred; + struct net *nf_net; #define NFSD_FILE_HASHED (0) #define NFSD_FILE_PENDING (1) #define NFSD_FILE_BREAK_READ (2) @@ -48,7 +49,7 @@ struct nfsd_file { }; int nfsd_file_cache_init(void); -void nfsd_file_cache_purge(void); +void nfsd_file_cache_purge(struct net *); void nfsd_file_cache_shutdown(void); void nfsd_file_put(struct nfsd_file *nf); struct nfsd_file *nfsd_file_get(struct nfsd_file *nf); diff --git a/fs/nfsd/nfssvc.c b/fs/nfsd/nfssvc.c index d02712ca2685..b944553c6927 100644 --- a/fs/nfsd/nfssvc.c +++ b/fs/nfsd/nfssvc.c @@ -387,6 +387,7 @@ static void nfsd_shutdown_net(struct net *net) { struct nfsd_net *nn = net_generic(net, nfsd_net_id); + nfsd_file_cache_purge(net); nfs4_state_shutdown_net(net); if (nn->lockd_up) { lockd_down(net); -- 2.21.0