Received: by 2002:a05:6500:1b45:b0:1f5:f2ab:c469 with SMTP id cz5csp269766lqb; Tue, 16 Apr 2024 15:33:29 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCV+IixY+qGUJ5G2Wc1krupsfs2FqNY6I2kibOUu3waUT6WA4VGR9PevExVzUrMDsN4xxZfSzp3KXRLMR+DxPxmpLfPj1o7yq738CcUmiA== X-Google-Smtp-Source: AGHT+IHv/moWG99ubnStoHViwvffJfg/ZFHmFXatL4JU2pb4wJox1RjxfabBIKqR3WWs2loTqMy2 X-Received: by 2002:a50:9315:0:b0:570:1e3e:a019 with SMTP id m21-20020a509315000000b005701e3ea019mr6968733eda.11.1713306808868; Tue, 16 Apr 2024 15:33:28 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1713306808; cv=pass; d=google.com; s=arc-20160816; b=cZuk1CDB6hZ4v9K4Ge28+DJDCfpQDj3nrT6Ww7Acb9dSksnw3mFFMjDnDx89D00I2s eGNsr82is2xJABgTuZ/z+3TVmk9CPL1BqvI1qawJ+IefR6t7iLQTyJov895yM1Bukhp5 dSiQJLogXtSZjkJTrlY1PPPOowGDaDBUmCFtfo1O/0YQGnAx0fmFOkYLkyVbwNcTWnZz 85aaZwbm+tw8gGAWtrMXKLf9BP+H3YnE3IEe0jMG6qkZVkSVKKgF6YEmT8tq3pKwZCGd oiyDaVx+Uz16+92hlt1j+rz2sbKXmMQAEYPfnkgd993LWF3GnKs350M7ymzPT9tDU0VX LmQQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:list-unsubscribe:list-subscribe:list-id:precedence :user-agent:content-transfer-encoding:autocrypt:references :in-reply-to:date:cc:to:from:subject:message-id:dkim-signature; bh=5TvXIRTE3fMCshI8FTwo+HhKoD5oH+FNmkmj/ZxLM9Y=; fh=rkmLex+YoiT8rUFIIRzmRfvFUcfn0sJtaZZz5sN0Sfw=; b=y4NdV880h/Fqa1ZOOGJnZXkcj+BnXX4IekJeavhGbgpUofIHnRbA6BvYQY1haSghCp VJjGp0aPqRYIy5g37nZI4zwFI/rB3AEeiK7zIizIyli8FEU5CJaxOSIEcrVmKmgt8Bk4 shXqDIXw7alQy6zQUoP7FrTYaTOCd4/vb9lcSNGcwNkmKFgBnyrKnllkPIXpkfXtaqCd XxVcLYzrf5tt0D5d28LqmWTzxJ5ViVx63x78RNgjtyKQWc/NjK0tgLSBNj/Nzfgfthfa T11qrA2d0Lp0VgCsqsLk9ctHQWQ1GDpwt5u/tOHPtl4FIlOLGTkKzvgZGmdUIQfqniRT R73w==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=FNHI6Ra3; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-nfs+bounces-2855-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-nfs+bounces-2855-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id m13-20020a50d7cd000000b0056e367afebdsi6073482edj.325.2024.04.16.15.33.28 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 16 Apr 2024 15:33:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs+bounces-2855-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=FNHI6Ra3; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-nfs+bounces-2855-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-nfs+bounces-2855-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 66F381F216DF for ; Tue, 16 Apr 2024 22:33:28 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 481372943C; Tue, 16 Apr 2024 22:33:25 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="FNHI6Ra3" X-Original-To: linux-nfs@vger.kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 141411E511; Tue, 16 Apr 2024 22:33:23 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713306805; cv=none; b=UnXTYnHSiVrvlzJob9krQgA5Uk7Gc/hdBH2caaxqE5c/qnoIOFysLAfxJFPlDgpW+fHFmsKNmNtzEu4UuYo+hHn8hF7TK77obWpSz6jV06ydkUWa9WkVTfpR1M0BDn266RZ8BzRXEleJ68sir5nBINA3GJ9w7aAAjqOweSNScqs= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1713306805; c=relaxed/simple; bh=wHRs9H/kautYRHiOBHvVqxSV+yA9kc7J0FWK+kfzsbE=; h=Message-ID:Subject:From:To:Cc:Date:In-Reply-To:References: Content-Type:MIME-Version; b=DQ1O838yADJ0C+Zt/7iOYU469CYZf/2Tj1DxNWw1CnNj1hzuTzl0Kb6eQi1ijqpHbsk9e12cyKflWPQkKvqoe7IGLeJ6vV0BjKr5mtuK9G97cklzwPpHQQoi9k3DjMx3GvVLOZU8Nf24MadkucxzxMgz0tRdNuiNzjf8hHo0RPQ= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=FNHI6Ra3; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id F0B6CC113CE; Tue, 16 Apr 2024 22:33:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1713306803; bh=wHRs9H/kautYRHiOBHvVqxSV+yA9kc7J0FWK+kfzsbE=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=FNHI6Ra3zwaHsZbCiUTkCvtTlAnDFT/uKOHzxpZGeFNiGNhS26tzi2HGsJy/710nz EOCYR0/0l8TNYoqsUnF4ByxF/9MuCEOQTWCOUpy59euwdNoi8bZ2qi+QafZET10DdT nko3E/RWkz7w8/ar7aMlCwApFTK85MviIg7c8dh0FvV4hQei+RhR3OkMdPm6PWu++Z 4VdZ6pldi8PzMHjEnBvPTjmuwNIJjWvQaRZzB+FlG0hhvQP1Y4Cbf+VDAkwOZkhoAl fpB7P4jnqqkyXhhZxgF6MNCeU89zXrzQvxAlpxrwNn8/KOCQQUJ3wRmeoH9O6yPopQ 9zjAPzlRw7MUw== Message-ID: <5b0ca756d84dd72a3eccb05290a3986d9786f1a8.camel@kernel.org> Subject: Re: [PATCH v8 3/6] NFSD: add write_version to netlink command From: Jeff Layton To: NeilBrown Cc: Lorenzo Bianconi , linux-nfs@vger.kernel.org, lorenzo.bianconi@redhat.com, chuck.lever@oracle.com, netdev@vger.kernel.org, kuba@kernel.org Date: Tue, 16 Apr 2024 18:33:21 -0400 In-Reply-To: <171330410225.17212.2547625907525888196@noble.neil.brown.name> References: <>, <4a77c2b164781c6df14e001573bd5631319a9043.camel@kernel.org> <171330410225.17212.2547625907525888196@noble.neil.brown.name> Autocrypt: addr=jlayton@kernel.org; prefer-encrypt=mutual; keydata=mQINBE6V0TwBEADXhJg7s8wFDwBMEvn0qyhAnzFLTOCHooMZyx7XO7dAiIhDSi7G1NPxwn8jdFUQMCR/GlpozMFlSFiZXiObE7sef9rTtM68ukUyZM4pJ9l0KjQNgDJ6Fr342Htkjxu/kFV1WvegyjnSsFt7EGoDjdKqr1TS9syJYFjagYtvWk/UfHlW09X+jOh4vYtfX7iYSx/NfqV3W1D7EDi0PqVT2h6v8i8YqsATFPwO4nuiTmL6I40ZofxVd+9wdRI4Db8yUNA4ZSP2nqLcLtFjClYRBoJvRWvsv4lm0OX6MYPtv76hka8lW4mnRmZqqx3UtfHX/hF/zH24Gj7A6sYKYLCU3YrI2Ogiu7/ksKcl7goQjpvtVYrOOI5VGLHge0awt7bhMCTM9KAfPc+xL/ZxAMVWd3NCk5SamL2cE99UWgtvNOIYU8m6EjTLhsj8snVluJH0/RcxEeFbnSaswVChNSGa7mXJrTR22lRL6ZPjdMgS2Km90haWPRc8Wolcz07Y2se0xpGVLEQcDEsvv5IMmeMe1/qLZ6NaVkNuL3WOXvxaVT9USW1+/SGipO2IpKJjeDZfehlB/kpfF24+RrK+seQfCBYyUE8QJpvTZyfUHNYldXlrjO6n5MdOempLqWpfOmcGkwnyNRBR46g/jf8KnPRwXs509yAqDB6sELZH+yWr9LQZEwARAQABtCVKZWZmIExheXRvbiA8amxheXRvbkBwb29jaGllcmVkcy5uZXQ+iQI7BBMBAgAlAhsDBgsJCAcDAgYVCAIJCgsEFgIDAQIeAQIXgAUCTpXWPAIZAQAKCRAADmhBGVaCFc65D/4gBLNMHopQYgG/9RIM3kgFCCQV0pLv0hcg1cjr+bPI5f1PzJoOVi9s0wBDHwp8+vtHgYhM54yt43uI7Htij0RHFL5eFqoVT4TSfAg2qlvNemJEOY0e4daljjmZM7UtmpGs9NN0r9r50W82eb5Kw5bc/ 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 kZWuOsJdJQdmwlWC5L5ln9xgfr/4mOY38B0U= Content-Type: text/plain; charset="ISO-8859-15" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.50.4 (3.50.4-1.fc39) Precedence: bulk X-Mailing-List: linux-nfs@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 On Wed, 2024-04-17 at 07:48 +1000, NeilBrown wrote: > On Tue, 16 Apr 2024, Jeff Layton wrote: > > On Tue, 2024-04-16 at 13:16 +1000, NeilBrown wrote: > > > On Tue, 16 Apr 2024, Lorenzo Bianconi wrote: > > > > Introduce write_version netlink command through a "declarative" int= erface. > > > > This patch introduces a change in behavior since for version-set us= erspace > > > > is expected to provide a NFS major/minor version list it wants to e= nable > > > > while all the other ones will be disabled. (procfs write_version > > > > command implements imperative interface where the admin writes +3/-= 3 to > > > > enable/disable a single version. > > >=20 > > > It seems a little weird to me that the interface always disables all > > > version, but then also allows individual versions to be disabled. > > >=20 > > > Would it be reasonable to simply ignore the "enabled" flag when setti= ng > > > version, and just enable all versions listed?? > > >=20 > > > Or maybe only enable those with the flag, and don't disable those > > > without the flag? > > >=20 > > > Those don't necessarily seem much better - but the current behaviour > > > still seems odd. > > >=20 > >=20 > > I think it makes sense. > >=20 > > We disable all versions, and enable any that have the "enabled" flag se= t > > in the call from userland. Userland technically needn't send down the > > versions that are disabled in the call, but the current userland progra= m > > does. > >=20 > > I worry about imperative interfaces that might only say -- "enable v4.1= , > > but disable v3" and leave the others in their current state. That > > requires that both the kernel and userland keep state about what > > versions are currently enabled and disabled, and it's possible to get > > that wrong. >=20 > I understand and support your aversion for imperative interfaces. > But this interface, as currently implemented, looks somewhat imperative. > The message sent to the kernel could enable some interfaces and then > disable them. I know that isn't the intent, but it is what the code > supports. Hence "weird". >=20 > We could add code to make that sort of thing impossible, but there isn't > much point. Better to make it syntactically impossible. >=20 > Realistically there will never be NFSv4.3 as there is no need - new > features can be added incrementally.=A0 >=20 There is no need _so_far_. Who knows what the future will bring? Maybe we'll need v4.3 in order to add some needed feature? > So we could just pass an array of > 5 active flags: 2,3,4.0,4.1,4.2. I suspect you wouldn't like that and > I'm not sure that I do either. A "read" would return the same array > with 3 possible states: unavailable, disabled, enabled. (Maybe the > array could be variable length so 5.0 could be added one day...). >=20 A set of flags is basically what this interface is. They just happen to also be labeled with the major and minorversion. I think that's a good thing. > > I haven't managed to come up with anything *better* than the current > proposal and I don't want to stand in its way, but I wanted to highlight > that it looks weird - as much imperative as declarative - in case > someone else might be able to come up with a better alternative. >=20 The intention was to create a symmetrical interface. We have 2 operations: a "get" that asks "what versions are currently supported and are they enabled?", and a "set" that says "here is the new state of version enablement". The userland tool always sends down a complete set of versions. The kernel is (currently) more forgiving, and treats omitted versions as being disabled. The kernel could require that every supported version be represented in the "set" operation, if that's more desirable. > >=20 > > My thinking was that by using a declarative interface like this, we > > eliminate ambiguity in how these interfaces are supposed to work. The > > client sends down an entire version map in one fell swoop, and we know > > exactly what the result should look like. > >=20 > > Note that you can enable or disable just a single version with the > > userland tool, but this way all of that complexity stays in userland. > >=20 > > > Also for getting the version, the doc says: > > >=20 > > > doc: get nfs enabled versions > > >=20 > > > which I don't think it quite right. The code reports all supported > > > versions, and indicates which of those are enabled. So maybe: > > >=20 > > > doc: get enabled status for all supported versions > > >=20 > > >=20 > > > I think that fact that it actually lists all supported versions is > > > useful and worth making explicit. > > >=20 > > >=20 > >=20 > > Agreed. We should make that change before merging anything. > >=20 > > > >=20 > > > > Reviewed-by: Jeff Layton > > > > Tested-by: Jeff Layton > > > > Signed-off-by: Lorenzo Bianconi > > > > --- > > > > Documentation/netlink/specs/nfsd.yaml | 37 +++++++ > > > > fs/nfsd/netlink.c | 24 +++++ > > > > fs/nfsd/netlink.h | 5 + > > > > fs/nfsd/netns.h | 1 + > > > > fs/nfsd/nfsctl.c | 150 ++++++++++++++++++++++= ++++ > > > > fs/nfsd/nfssvc.c | 3 +- > > > > include/uapi/linux/nfsd_netlink.h | 18 ++++ > > > > 7 files changed, 236 insertions(+), 2 deletions(-) > > > >=20 > > > > diff --git a/Documentation/netlink/specs/nfsd.yaml b/Documentation/= netlink/specs/nfsd.yaml > > > > index cbe6c5fd6c4d..0396e8b3ea1f 100644 > > > > --- a/Documentation/netlink/specs/nfsd.yaml > > > > +++ b/Documentation/netlink/specs/nfsd.yaml > > > > @@ -74,6 +74,26 @@ attribute-sets: > > > > - > > > > name: leasetime > > > > type: u32 > > > > + - > > > > + name: version > > > > + attributes: > > > > + - > > > > + name: major > > > > + type: u32 > > > > + - > > > > + name: minor > > > > + type: u32 > > > > + - > > > > + name: enabled > > > > + type: flag > > > > + - > > > > + name: server-proto > > > > + attributes: > > > > + - > > > > + name: version > > > > + type: nest > > > > + nested-attributes: version > > > > + multi-attr: true > > > > =20 > > > > operations: > > > > list: > > > > @@ -120,3 +140,20 @@ operations: > > > > - threads > > > > - gracetime > > > > - leasetime > > > > + - > > > > + name: version-set > > > > + doc: set nfs enabled versions > > > > + attribute-set: server-proto > > > > + flags: [ admin-perm ] > > > > + do: > > > > + request: > > > > + attributes: > > > > + - version > > > > + - > > > > + name: version-get > > > > + doc: get nfs enabled versions > > > > + attribute-set: server-proto > > > > + do: > > > > + reply: > > > > + attributes: > > > > + - version > > > > diff --git a/fs/nfsd/netlink.c b/fs/nfsd/netlink.c > > > > index 20a646af0324..bf5df9597288 100644 > > > > --- a/fs/nfsd/netlink.c > > > > +++ b/fs/nfsd/netlink.c > > > > @@ -10,6 +10,13 @@ > > > > =20 > > > > #include > > > > =20 > > > > +/* Common nested types */ > > > > +const struct nla_policy nfsd_version_nl_policy[NFSD_A_VERSION_ENAB= LED + 1] =3D { > > > > + [NFSD_A_VERSION_MAJOR] =3D { .type =3D NLA_U32, }, > > > > + [NFSD_A_VERSION_MINOR] =3D { .type =3D NLA_U32, }, > > > > + [NFSD_A_VERSION_ENABLED] =3D { .type =3D NLA_FLAG, }, > > > > +}; > > > > + > > > > /* NFSD_CMD_THREADS_SET - do */ > > > > static const struct nla_policy nfsd_threads_set_nl_policy[NFSD_A_S= ERVER_WORKER_LEASETIME + 1] =3D { > > > > [NFSD_A_SERVER_WORKER_THREADS] =3D { .type =3D NLA_U32, }, > > > > @@ -17,6 +24,11 @@ static const struct nla_policy nfsd_threads_set_= nl_policy[NFSD_A_SERVER_WORKER_L > > > > [NFSD_A_SERVER_WORKER_LEASETIME] =3D { .type =3D NLA_U32, }, > > > > }; > > > > =20 > > > > +/* NFSD_CMD_VERSION_SET - do */ > > > > +static const struct nla_policy nfsd_version_set_nl_policy[NFSD_A_S= ERVER_PROTO_VERSION + 1] =3D { > > > > + [NFSD_A_SERVER_PROTO_VERSION] =3D NLA_POLICY_NESTED(nfsd_version_= nl_policy), > > > > +}; > > > > + > > > > /* Ops table for nfsd */ > > > > static const struct genl_split_ops nfsd_nl_ops[] =3D { > > > > { > > > > @@ -38,6 +50,18 @@ static const struct genl_split_ops nfsd_nl_ops[]= =3D { > > > > .doit =3D nfsd_nl_threads_get_doit, > > > > .flags =3D GENL_CMD_CAP_DO, > > > > }, > > > > + { > > > > + .cmd =3D NFSD_CMD_VERSION_SET, > > > > + .doit =3D nfsd_nl_version_set_doit, > > > > + .policy =3D nfsd_version_set_nl_policy, > > > > + .maxattr =3D NFSD_A_SERVER_PROTO_VERSION, > > > > + .flags =3D GENL_ADMIN_PERM | GENL_CMD_CAP_DO, > > > > + }, > > > > + { > > > > + .cmd =3D NFSD_CMD_VERSION_GET, > > > > + .doit =3D nfsd_nl_version_get_doit, > > > > + .flags =3D GENL_CMD_CAP_DO, > > > > + }, > > > > }; > > > > =20 > > > > struct genl_family nfsd_nl_family __ro_after_init =3D { > > > > diff --git a/fs/nfsd/netlink.h b/fs/nfsd/netlink.h > > > > index 4137fac477e4..c7c0da275481 100644 > > > > --- a/fs/nfsd/netlink.h > > > > +++ b/fs/nfsd/netlink.h > > > > @@ -11,6 +11,9 @@ > > > > =20 > > > > #include > > > > =20 > > > > +/* Common nested types */ > > > > +extern const struct nla_policy nfsd_version_nl_policy[NFSD_A_VERSI= ON_ENABLED + 1]; > > > > + > > > > int nfsd_nl_rpc_status_get_start(struct netlink_callback *cb); > > > > int nfsd_nl_rpc_status_get_done(struct netlink_callback *cb); > > > > =20 > > > > @@ -18,6 +21,8 @@ int nfsd_nl_rpc_status_get_dumpit(struct sk_buff = *skb, > > > > struct netlink_callback *cb); > > > > int nfsd_nl_threads_set_doit(struct sk_buff *skb, struct genl_info= *info); > > > > int nfsd_nl_threads_get_doit(struct sk_buff *skb, struct genl_info= *info); > > > > +int nfsd_nl_version_set_doit(struct sk_buff *skb, struct genl_info= *info); > > > > +int nfsd_nl_version_get_doit(struct sk_buff *skb, struct genl_info= *info); > > > > =20 > > > > extern struct genl_family nfsd_nl_family; > > > > =20 > > > > diff --git a/fs/nfsd/netns.h b/fs/nfsd/netns.h > > > > index d4be519b5734..14ec15656320 100644 > > > > --- a/fs/nfsd/netns.h > > > > +++ b/fs/nfsd/netns.h > > > > @@ -218,6 +218,7 @@ struct nfsd_net { > > > > /* Simple check to find out if a given net was properly initialize= d */ > > > > #define nfsd_netns_ready(nn) ((nn)->sessionid_hashtbl) > > > > =20 > > > > +extern bool nfsd_support_version(int vers); > > > > extern void nfsd_netns_free_versions(struct nfsd_net *nn); > > > > =20 > > > > extern unsigned int nfsd_net_id; > > > > diff --git a/fs/nfsd/nfsctl.c b/fs/nfsd/nfsctl.c > > > > index 38a5df03981b..2c8929ef79e9 100644 > > > > --- a/fs/nfsd/nfsctl.c > > > > +++ b/fs/nfsd/nfsctl.c > > > > @@ -1757,6 +1757,156 @@ int nfsd_nl_threads_get_doit(struct sk_buff= *skb, struct genl_info *info) > > > > return err; > > > > } > > > > =20 > > > > +/** > > > > + * nfsd_nl_version_set_doit - set the nfs enabled versions > > > > + * @skb: reply buffer > > > > + * @info: netlink metadata and command arguments > > > > + * > > > > + * Return 0 on success or a negative errno. > > > > + */ > > > > +int nfsd_nl_version_set_doit(struct sk_buff *skb, struct genl_info= *info) > > > > +{ > > > > + const struct nlattr *attr; > > > > + struct nfsd_net *nn; > > > > + int i, rem; > > > > + > > > > + if (GENL_REQ_ATTR_CHECK(info, NFSD_A_SERVER_PROTO_VERSION)) > > > > + return -EINVAL; > > > > + > > > > + mutex_lock(&nfsd_mutex); > > > > + > > > > + nn =3D net_generic(genl_info_net(info), nfsd_net_id); > > > > + if (nn->nfsd_serv) { > > > > + mutex_unlock(&nfsd_mutex); > > > > + return -EBUSY; > > > > + } > > > > + > > > > + /* clear current supported versions. */ > > > > + nfsd_vers(nn, 2, NFSD_CLEAR); > > > > + nfsd_vers(nn, 3, NFSD_CLEAR); > > > > + for (i =3D 0; i <=3D NFSD_SUPPORTED_MINOR_VERSION; i++) > > > > + nfsd_minorversion(nn, i, NFSD_CLEAR); > > > > + > > > > + nlmsg_for_each_attr(attr, info->nlhdr, GENL_HDRLEN, rem) { > > > > + struct nlattr *tb[NFSD_A_VERSION_MAX + 1]; > > > > + u32 major, minor =3D 0; > > > > + bool enabled; > > > > + > > > > + if (nla_type(attr) !=3D NFSD_A_SERVER_PROTO_VERSION) > > > > + continue; > > > > + > > > > + if (nla_parse_nested(tb, NFSD_A_VERSION_MAX, attr, > > > > + nfsd_version_nl_policy, info->extack) < 0) > > > > + continue; > > > > + > > > > + if (!tb[NFSD_A_VERSION_MAJOR]) > > > > + continue; > > > > + > > > > + major =3D nla_get_u32(tb[NFSD_A_VERSION_MAJOR]); > > > > + if (tb[NFSD_A_VERSION_MINOR]) > > > > + minor =3D nla_get_u32(tb[NFSD_A_VERSION_MINOR]); > > > > + > > > > + enabled =3D nla_get_flag(tb[NFSD_A_VERSION_ENABLED]); > > > > + > > > > + switch (major) { > > > > + case 4: > > > > + nfsd_minorversion(nn, minor, enabled ? NFSD_SET : NFSD_CLEAR); > > > > + break; > > > > + case 3: > > > > + case 2: > > > > + if (!minor) > > > > + nfsd_vers(nn, major, enabled ? NFSD_SET : NFSD_CLEAR); > > > > + break; > > > > + default: > > > > + break; > > > > + } > > > > + } > > > > + > > > > + mutex_unlock(&nfsd_mutex); > > > > + > > > > + return 0; > > > > +} > > > > + > > > > +/** > > > > + * nfsd_nl_version_get_doit - get the nfs enabled versions > > > > + * @skb: reply buffer > > > > + * @info: netlink metadata and command arguments > > > > + * > > > > + * Return 0 on success or a negative errno. > > > > + */ > > > > +int nfsd_nl_version_get_doit(struct sk_buff *skb, struct genl_info= *info) > > > > +{ > > > > + struct nfsd_net *nn; > > > > + int i, err; > > > > + void *hdr; > > > > + > > > > + skb =3D genlmsg_new(GENLMSG_DEFAULT_SIZE, GFP_KERNEL); > > > > + if (!skb) > > > > + return -ENOMEM; > > > > + > > > > + hdr =3D genlmsg_iput(skb, info); > > > > + if (!hdr) { > > > > + err =3D -EMSGSIZE; > > > > + goto err_free_msg; > > > > + } > > > > + > > > > + mutex_lock(&nfsd_mutex); > > > > + nn =3D net_generic(genl_info_net(info), nfsd_net_id); > > > > + > > > > + for (i =3D 2; i <=3D 4; i++) { > > > > + int j; > > > > + > > > > + for (j =3D 0; j <=3D NFSD_SUPPORTED_MINOR_VERSION; j++) { > > > > + struct nlattr *attr; > > > > + > > > > + /* Don't record any versions the kernel doesn't have > > > > + * compiled in > > > > + */ > > > > + if (!nfsd_support_version(i)) > > > > + continue; > > > > + > > > > + /* NFSv{2,3} does not support minor numbers */ > > > > + if (i < 4 && j) > > > > + continue; > > > > + > > > > + attr =3D nla_nest_start(skb, > > > > + NFSD_A_SERVER_PROTO_VERSION); > > > > + if (!attr) { > > > > + err =3D -EINVAL; > > > > + goto err_nfsd_unlock; > > > > + } > > > > + > > > > + if (nla_put_u32(skb, NFSD_A_VERSION_MAJOR, i) || > > > > + nla_put_u32(skb, NFSD_A_VERSION_MINOR, j)) { > > > > + err =3D -EINVAL; > > > > + goto err_nfsd_unlock; > > > > + } > > > > + > > > > + /* Set the enabled flag if the version is enabled */ > > > > + if (nfsd_vers(nn, i, NFSD_TEST) && > > > > + (i < 4 || nfsd_minorversion(nn, j, NFSD_TEST)) && > > > > + nla_put_flag(skb, NFSD_A_VERSION_ENABLED)) { > > > > + err =3D -EINVAL; > > > > + goto err_nfsd_unlock; > > > > + } > > > > + > > > > + nla_nest_end(skb, attr); > > > > + } > > > > + } > > > > + > > > > + mutex_unlock(&nfsd_mutex); > > > > + genlmsg_end(skb, hdr); > > > > + > > > > + return genlmsg_reply(skb, info); > > > > + > > > > +err_nfsd_unlock: > > > > + mutex_unlock(&nfsd_mutex); > > > > +err_free_msg: > > > > + nlmsg_free(skb); > > > > + > > > > + return err; > > > > +} > > > > + > > > > /** > > > > * nfsd_net_init - Prepare the nfsd_net portion of a new net names= pace > > > > * @net: a freshly-created network namespace > > > > diff --git a/fs/nfsd/nfssvc.c b/fs/nfsd/nfssvc.c > > > > index ca193f7ff0e1..4fc91f50138a 100644 > > > > --- a/fs/nfsd/nfssvc.c > > > > +++ b/fs/nfsd/nfssvc.c > > > > @@ -133,8 +133,7 @@ struct svc_program nfsd_program =3D { > > > > .pg_rpcbind_set =3D nfsd_rpcbind_set, > > > > }; > > > > =20 > > > > -static bool > > > > -nfsd_support_version(int vers) > > > > +bool nfsd_support_version(int vers) > > > > { > > > > if (vers >=3D NFSD_MINVERS && vers < NFSD_NRVERS) > > > > return nfsd_version[vers] !=3D NULL; > > > > diff --git a/include/uapi/linux/nfsd_netlink.h b/include/uapi/linux= /nfsd_netlink.h > > > > index ccc78a5ee650..8a0a2b344923 100644 > > > > --- a/include/uapi/linux/nfsd_netlink.h > > > > +++ b/include/uapi/linux/nfsd_netlink.h > > > > @@ -38,10 +38,28 @@ enum { > > > > NFSD_A_SERVER_WORKER_MAX =3D (__NFSD_A_SERVER_WORKER_MAX - 1) > > > > }; > > > > =20 > > > > +enum { > > > > + NFSD_A_VERSION_MAJOR =3D 1, > > > > + NFSD_A_VERSION_MINOR, > > > > + NFSD_A_VERSION_ENABLED, > > > > + > > > > + __NFSD_A_VERSION_MAX, > > > > + NFSD_A_VERSION_MAX =3D (__NFSD_A_VERSION_MAX - 1) > > > > +}; > > > > + > > > > +enum { > > > > + NFSD_A_SERVER_PROTO_VERSION =3D 1, > > > > + > > > > + __NFSD_A_SERVER_PROTO_MAX, > > > > + NFSD_A_SERVER_PROTO_MAX =3D (__NFSD_A_SERVER_PROTO_MAX - 1) > > > > +}; > > > > + > > > > enum { > > > > NFSD_CMD_RPC_STATUS_GET =3D 1, > > > > NFSD_CMD_THREADS_SET, > > > > NFSD_CMD_THREADS_GET, > > > > + NFSD_CMD_VERSION_SET, > > > > + NFSD_CMD_VERSION_GET, > > > > =20 > > > > __NFSD_CMD_MAX, > > > > NFSD_CMD_MAX =3D (__NFSD_CMD_MAX - 1) > > > > --=20 > > > > 2.44.0 > > > >=20 > > > >=20 > > >=20 > >=20 > > --=20 > > Jeff Layton > >=20 >=20 --=20 Jeff Layton