1 // SPDX-License-Identifier: GPL-2.0
2 /*
3 * The NFSD open file cache.
4 *
5 * (c) 2015 - Jeff Layton <jeff.layton@primarydata.com>
6 *
7 * An nfsd_file object is a per-file collection of open state that binds
8 * together:
9 * - a struct file *
10 * - a user credential
11 * - a network namespace
12 * - a read-ahead context
13 * - monitoring for writeback errors
14 *
15 * nfsd_file objects are reference-counted. Consumers acquire a new
16 * object via the nfsd_file_acquire API. They manage their interest in
17 * the acquired object, and hence the object's reference count, via
18 * nfsd_file_get and nfsd_file_put. There are two varieties of nfsd_file
19 * object:
20 *
21 * * non-garbage-collected: When a consumer wants to precisely control
22 * the lifetime of a file's open state, it acquires a non-garbage-
23 * collected nfsd_file. The final nfsd_file_put releases the open
24 * state immediately.
25 *
26 * * garbage-collected: When a consumer does not control the lifetime
27 * of open state, it acquires a garbage-collected nfsd_file. The
28 * final nfsd_file_put allows the open state to linger for a period
29 * during which it may be re-used.
30 */
31
32 #include <linux/hash.h>
33 #include <linux/slab.h>
34 #include <linux/file.h>
35 #include <linux/pagemap.h>
36 #include <linux/sched.h>
37 #include <linux/list_lru.h>
38 #include <linux/fsnotify_backend.h>
39 #include <linux/fsnotify.h>
40 #include <linux/seq_file.h>
41 #include <linux/rhashtable.h>
42
43 #include "vfs.h"
44 #include "nfsd.h"
45 #include "nfsfh.h"
46 #include "netns.h"
47 #include "filecache.h"
48 #include "trace.h"
49
50 #define NFSD_LAUNDRETTE_DELAY (2 * HZ)
51
52 #define NFSD_FILE_CACHE_UP (0)
53
54 /* We only care about NFSD_MAY_READ/WRITE for this cache */
55 #define NFSD_FILE_MAY_MASK (NFSD_MAY_READ|NFSD_MAY_WRITE)
56
57 static DEFINE_PER_CPU(unsigned long, nfsd_file_cache_hits);
58 static DEFINE_PER_CPU(unsigned long, nfsd_file_acquisitions);
59 static DEFINE_PER_CPU(unsigned long, nfsd_file_releases);
60 static DEFINE_PER_CPU(unsigned long, nfsd_file_total_age);
61 static DEFINE_PER_CPU(unsigned long, nfsd_file_evictions);
62
63 struct nfsd_fcache_disposal {
64 struct work_struct work;
65 spinlock_t lock;
66 struct list_head freeme;
67 };
68
69 static struct workqueue_struct *nfsd_filecache_wq __read_mostly;
70
71 static struct kmem_cache *nfsd_file_slab;
72 static struct kmem_cache *nfsd_file_mark_slab;
73 static struct list_lru nfsd_file_lru;
74 static unsigned long nfsd_file_flags;
75 static struct fsnotify_group *nfsd_file_fsnotify_group;
76 static struct delayed_work nfsd_filecache_laundrette;
77 static struct rhashtable nfsd_file_rhash_tbl
78 ____cacheline_aligned_in_smp;
79
80 enum nfsd_file_lookup_type {
81 NFSD_FILE_KEY_INODE,
82 NFSD_FILE_KEY_FULL,
83 };
84
85 struct nfsd_file_lookup_key {
86 struct inode *inode;
87 struct net *net;
88 const struct cred *cred;
89 unsigned char need;
90 bool gc;
91 enum nfsd_file_lookup_type type;
92 };
93
94 /*
95 * The returned hash value is based solely on the address of an in-code
96 * inode, a pointer to a slab-allocated object. The entropy in such a
97 * pointer is concentrated in its middle bits.
98 */
nfsd_file_inode_hash(const struct inode * inode,u32 seed)99 static u32 nfsd_file_inode_hash(const struct inode *inode, u32 seed)
100 {
101 unsigned long ptr = (unsigned long)inode;
102 u32 k;
103
104 k = ptr >> L1_CACHE_SHIFT;
105 k &= 0x00ffffff;
106 return jhash2(&k, 1, seed);
107 }
108
109 /**
110 * nfsd_file_key_hashfn - Compute the hash value of a lookup key
111 * @data: key on which to compute the hash value
112 * @len: rhash table's key_len parameter (unused)
113 * @seed: rhash table's random seed of the day
114 *
115 * Return value:
116 * Computed 32-bit hash value
117 */
nfsd_file_key_hashfn(const void * data,u32 len,u32 seed)118 static u32 nfsd_file_key_hashfn(const void *data, u32 len, u32 seed)
119 {
120 const struct nfsd_file_lookup_key *key = data;
121
122 return nfsd_file_inode_hash(key->inode, seed);
123 }
124
125 /**
126 * nfsd_file_obj_hashfn - Compute the hash value of an nfsd_file
127 * @data: object on which to compute the hash value
128 * @len: rhash table's key_len parameter (unused)
129 * @seed: rhash table's random seed of the day
130 *
131 * Return value:
132 * Computed 32-bit hash value
133 */
nfsd_file_obj_hashfn(const void * data,u32 len,u32 seed)134 static u32 nfsd_file_obj_hashfn(const void *data, u32 len, u32 seed)
135 {
136 const struct nfsd_file *nf = data;
137
138 return nfsd_file_inode_hash(nf->nf_inode, seed);
139 }
140
141 static bool
nfsd_match_cred(const struct cred * c1,const struct cred * c2)142 nfsd_match_cred(const struct cred *c1, const struct cred *c2)
143 {
144 int i;
145
146 if (!uid_eq(c1->fsuid, c2->fsuid))
147 return false;
148 if (!gid_eq(c1->fsgid, c2->fsgid))
149 return false;
150 if (c1->group_info == NULL || c2->group_info == NULL)
151 return c1->group_info == c2->group_info;
152 if (c1->group_info->ngroups != c2->group_info->ngroups)
153 return false;
154 for (i = 0; i < c1->group_info->ngroups; i++) {
155 if (!gid_eq(c1->group_info->gid[i], c2->group_info->gid[i]))
156 return false;
157 }
158 return true;
159 }
160
161 /**
162 * nfsd_file_obj_cmpfn - Match a cache item against search criteria
163 * @arg: search criteria
164 * @ptr: cache item to check
165 *
166 * Return values:
167 * %0 - Item matches search criteria
168 * %1 - Item does not match search criteria
169 */
nfsd_file_obj_cmpfn(struct rhashtable_compare_arg * arg,const void * ptr)170 static int nfsd_file_obj_cmpfn(struct rhashtable_compare_arg *arg,
171 const void *ptr)
172 {
173 const struct nfsd_file_lookup_key *key = arg->key;
174 const struct nfsd_file *nf = ptr;
175
176 switch (key->type) {
177 case NFSD_FILE_KEY_INODE:
178 if (nf->nf_inode != key->inode)
179 return 1;
180 break;
181 case NFSD_FILE_KEY_FULL:
182 if (nf->nf_inode != key->inode)
183 return 1;
184 if (nf->nf_may != key->need)
185 return 1;
186 if (nf->nf_net != key->net)
187 return 1;
188 if (!nfsd_match_cred(nf->nf_cred, key->cred))
189 return 1;
190 if (!!test_bit(NFSD_FILE_GC, &nf->nf_flags) != key->gc)
191 return 1;
192 if (test_bit(NFSD_FILE_HASHED, &nf->nf_flags) == 0)
193 return 1;
194 break;
195 }
196 return 0;
197 }
198
199 static const struct rhashtable_params nfsd_file_rhash_params = {
200 .key_len = sizeof_field(struct nfsd_file, nf_inode),
201 .key_offset = offsetof(struct nfsd_file, nf_inode),
202 .head_offset = offsetof(struct nfsd_file, nf_rhash),
203 .hashfn = nfsd_file_key_hashfn,
204 .obj_hashfn = nfsd_file_obj_hashfn,
205 .obj_cmpfn = nfsd_file_obj_cmpfn,
206 /* Reduce resizing churn on light workloads */
207 .min_size = 512, /* buckets */
208 .automatic_shrinking = true,
209 };
210
211 static void
nfsd_file_schedule_laundrette(void)212 nfsd_file_schedule_laundrette(void)
213 {
214 if (test_bit(NFSD_FILE_CACHE_UP, &nfsd_file_flags))
215 queue_delayed_work(system_wq, &nfsd_filecache_laundrette,
216 NFSD_LAUNDRETTE_DELAY);
217 }
218
219 static void
nfsd_file_slab_free(struct rcu_head * rcu)220 nfsd_file_slab_free(struct rcu_head *rcu)
221 {
222 struct nfsd_file *nf = container_of(rcu, struct nfsd_file, nf_rcu);
223
224 put_cred(nf->nf_cred);
225 kmem_cache_free(nfsd_file_slab, nf);
226 }
227
228 static void
nfsd_file_mark_free(struct fsnotify_mark * mark)229 nfsd_file_mark_free(struct fsnotify_mark *mark)
230 {
231 struct nfsd_file_mark *nfm = container_of(mark, struct nfsd_file_mark,
232 nfm_mark);
233
234 kmem_cache_free(nfsd_file_mark_slab, nfm);
235 }
236
237 static struct nfsd_file_mark *
nfsd_file_mark_get(struct nfsd_file_mark * nfm)238 nfsd_file_mark_get(struct nfsd_file_mark *nfm)
239 {
240 if (!refcount_inc_not_zero(&nfm->nfm_ref))
241 return NULL;
242 return nfm;
243 }
244
245 static void
nfsd_file_mark_put(struct nfsd_file_mark * nfm)246 nfsd_file_mark_put(struct nfsd_file_mark *nfm)
247 {
248 if (refcount_dec_and_test(&nfm->nfm_ref)) {
249 fsnotify_destroy_mark(&nfm->nfm_mark, nfsd_file_fsnotify_group);
250 fsnotify_put_mark(&nfm->nfm_mark);
251 }
252 }
253
254 static struct nfsd_file_mark *
nfsd_file_mark_find_or_create(struct nfsd_file * nf,struct inode * inode)255 nfsd_file_mark_find_or_create(struct nfsd_file *nf, struct inode *inode)
256 {
257 int err;
258 struct fsnotify_mark *mark;
259 struct nfsd_file_mark *nfm = NULL, *new;
260
261 do {
262 fsnotify_group_lock(nfsd_file_fsnotify_group);
263 mark = fsnotify_find_mark(&inode->i_fsnotify_marks,
264 nfsd_file_fsnotify_group);
265 if (mark) {
266 nfm = nfsd_file_mark_get(container_of(mark,
267 struct nfsd_file_mark,
268 nfm_mark));
269 fsnotify_group_unlock(nfsd_file_fsnotify_group);
270 if (nfm) {
271 fsnotify_put_mark(mark);
272 break;
273 }
274 /* Avoid soft lockup race with nfsd_file_mark_put() */
275 fsnotify_destroy_mark(mark, nfsd_file_fsnotify_group);
276 fsnotify_put_mark(mark);
277 } else {
278 fsnotify_group_unlock(nfsd_file_fsnotify_group);
279 }
280
281 /* allocate a new nfm */
282 new = kmem_cache_alloc(nfsd_file_mark_slab, GFP_KERNEL);
283 if (!new)
284 return NULL;
285 fsnotify_init_mark(&new->nfm_mark, nfsd_file_fsnotify_group);
286 new->nfm_mark.mask = FS_ATTRIB|FS_DELETE_SELF;
287 refcount_set(&new->nfm_ref, 1);
288
289 err = fsnotify_add_inode_mark(&new->nfm_mark, inode, 0);
290
291 /*
292 * If the add was successful, then return the object.
293 * Otherwise, we need to put the reference we hold on the
294 * nfm_mark. The fsnotify code will take a reference and put
295 * it on failure, so we can't just free it directly. It's also
296 * not safe to call fsnotify_destroy_mark on it as the
297 * mark->group will be NULL. Thus, we can't let the nfm_ref
298 * counter drive the destruction at this point.
299 */
300 if (likely(!err))
301 nfm = new;
302 else
303 fsnotify_put_mark(&new->nfm_mark);
304 } while (unlikely(err == -EEXIST));
305
306 return nfm;
307 }
308
309 static struct nfsd_file *
nfsd_file_alloc(struct nfsd_file_lookup_key * key,unsigned int may)310 nfsd_file_alloc(struct nfsd_file_lookup_key *key, unsigned int may)
311 {
312 struct nfsd_file *nf;
313
314 nf = kmem_cache_alloc(nfsd_file_slab, GFP_KERNEL);
315 if (nf) {
316 INIT_LIST_HEAD(&nf->nf_lru);
317 nf->nf_birthtime = ktime_get();
318 nf->nf_file = NULL;
319 nf->nf_cred = get_current_cred();
320 nf->nf_net = key->net;
321 nf->nf_flags = 0;
322 __set_bit(NFSD_FILE_HASHED, &nf->nf_flags);
323 __set_bit(NFSD_FILE_PENDING, &nf->nf_flags);
324 if (key->gc)
325 __set_bit(NFSD_FILE_GC, &nf->nf_flags);
326 nf->nf_inode = key->inode;
327 refcount_set(&nf->nf_ref, 1);
328 nf->nf_may = key->need;
329 nf->nf_mark = NULL;
330 }
331 return nf;
332 }
333
334 /**
335 * nfsd_file_check_write_error - check for writeback errors on a file
336 * @nf: nfsd_file to check for writeback errors
337 *
338 * Check whether a nfsd_file has an unseen error. Reset the write
339 * verifier if so.
340 */
341 static void
nfsd_file_check_write_error(struct nfsd_file * nf)342 nfsd_file_check_write_error(struct nfsd_file *nf)
343 {
344 struct file *file = nf->nf_file;
345
346 if ((file->f_mode & FMODE_WRITE) &&
347 filemap_check_wb_err(file->f_mapping, READ_ONCE(file->f_wb_err)))
348 nfsd_reset_write_verifier(net_generic(nf->nf_net, nfsd_net_id));
349 }
350
351 static void
nfsd_file_hash_remove(struct nfsd_file * nf)352 nfsd_file_hash_remove(struct nfsd_file *nf)
353 {
354 trace_nfsd_file_unhash(nf);
355 rhashtable_remove_fast(&nfsd_file_rhash_tbl, &nf->nf_rhash,
356 nfsd_file_rhash_params);
357 }
358
359 static bool
nfsd_file_unhash(struct nfsd_file * nf)360 nfsd_file_unhash(struct nfsd_file *nf)
361 {
362 if (test_and_clear_bit(NFSD_FILE_HASHED, &nf->nf_flags)) {
363 nfsd_file_hash_remove(nf);
364 return true;
365 }
366 return false;
367 }
368
369 static void
nfsd_file_free(struct nfsd_file * nf)370 nfsd_file_free(struct nfsd_file *nf)
371 {
372 s64 age = ktime_to_ms(ktime_sub(ktime_get(), nf->nf_birthtime));
373
374 trace_nfsd_file_free(nf);
375
376 this_cpu_inc(nfsd_file_releases);
377 this_cpu_add(nfsd_file_total_age, age);
378
379 nfsd_file_unhash(nf);
380 if (nf->nf_mark)
381 nfsd_file_mark_put(nf->nf_mark);
382 if (nf->nf_file) {
383 get_file(nf->nf_file);
384 filp_close(nf->nf_file, NULL);
385 nfsd_file_check_write_error(nf);
386 fput(nf->nf_file);
387 }
388
389 /*
390 * If this item is still linked via nf_lru, that's a bug.
391 * WARN and leak it to preserve system stability.
392 */
393 if (WARN_ON_ONCE(!list_empty(&nf->nf_lru)))
394 return;
395
396 call_rcu(&nf->nf_rcu, nfsd_file_slab_free);
397 }
398
399 static bool
nfsd_file_check_writeback(struct nfsd_file * nf)400 nfsd_file_check_writeback(struct nfsd_file *nf)
401 {
402 struct file *file = nf->nf_file;
403 struct address_space *mapping;
404
405 if (!file || !(file->f_mode & FMODE_WRITE))
406 return false;
407 mapping = file->f_mapping;
408 return mapping_tagged(mapping, PAGECACHE_TAG_DIRTY) ||
409 mapping_tagged(mapping, PAGECACHE_TAG_WRITEBACK);
410 }
411
nfsd_file_lru_add(struct nfsd_file * nf)412 static bool nfsd_file_lru_add(struct nfsd_file *nf)
413 {
414 set_bit(NFSD_FILE_REFERENCED, &nf->nf_flags);
415 if (list_lru_add(&nfsd_file_lru, &nf->nf_lru)) {
416 trace_nfsd_file_lru_add(nf);
417 return true;
418 }
419 return false;
420 }
421
nfsd_file_lru_remove(struct nfsd_file * nf)422 static bool nfsd_file_lru_remove(struct nfsd_file *nf)
423 {
424 if (list_lru_del(&nfsd_file_lru, &nf->nf_lru)) {
425 trace_nfsd_file_lru_del(nf);
426 return true;
427 }
428 return false;
429 }
430
431 struct nfsd_file *
nfsd_file_get(struct nfsd_file * nf)432 nfsd_file_get(struct nfsd_file *nf)
433 {
434 if (nf && refcount_inc_not_zero(&nf->nf_ref))
435 return nf;
436 return NULL;
437 }
438
439 /**
440 * nfsd_file_put - put the reference to a nfsd_file
441 * @nf: nfsd_file of which to put the reference
442 *
443 * Put a reference to a nfsd_file. In the non-GC case, we just put the
444 * reference immediately. In the GC case, if the reference would be
445 * the last one, the put it on the LRU instead to be cleaned up later.
446 */
447 void
nfsd_file_put(struct nfsd_file * nf)448 nfsd_file_put(struct nfsd_file *nf)
449 {
450 might_sleep();
451 trace_nfsd_file_put(nf);
452
453 if (test_bit(NFSD_FILE_GC, &nf->nf_flags) &&
454 test_bit(NFSD_FILE_HASHED, &nf->nf_flags)) {
455 /*
456 * If this is the last reference (nf_ref == 1), then try to
457 * transfer it to the LRU.
458 */
459 if (refcount_dec_not_one(&nf->nf_ref))
460 return;
461
462 /* Try to add it to the LRU. If that fails, decrement. */
463 if (nfsd_file_lru_add(nf)) {
464 /* If it's still hashed, we're done */
465 if (test_bit(NFSD_FILE_HASHED, &nf->nf_flags)) {
466 nfsd_file_schedule_laundrette();
467 return;
468 }
469
470 /*
471 * We're racing with unhashing, so try to remove it from
472 * the LRU. If removal fails, then someone else already
473 * has our reference.
474 */
475 if (!nfsd_file_lru_remove(nf))
476 return;
477 }
478 }
479 if (refcount_dec_and_test(&nf->nf_ref))
480 nfsd_file_free(nf);
481 }
482
483 static void
nfsd_file_dispose_list(struct list_head * dispose)484 nfsd_file_dispose_list(struct list_head *dispose)
485 {
486 struct nfsd_file *nf;
487
488 while (!list_empty(dispose)) {
489 nf = list_first_entry(dispose, struct nfsd_file, nf_lru);
490 list_del_init(&nf->nf_lru);
491 nfsd_file_free(nf);
492 }
493 }
494
495 static void
nfsd_file_list_remove_disposal(struct list_head * dst,struct nfsd_fcache_disposal * l)496 nfsd_file_list_remove_disposal(struct list_head *dst,
497 struct nfsd_fcache_disposal *l)
498 {
499 spin_lock(&l->lock);
500 list_splice_init(&l->freeme, dst);
501 spin_unlock(&l->lock);
502 }
503
504 static void
nfsd_file_list_add_disposal(struct list_head * files,struct net * net)505 nfsd_file_list_add_disposal(struct list_head *files, struct net *net)
506 {
507 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
508 struct nfsd_fcache_disposal *l = nn->fcache_disposal;
509
510 spin_lock(&l->lock);
511 list_splice_tail_init(files, &l->freeme);
512 spin_unlock(&l->lock);
513 queue_work(nfsd_filecache_wq, &l->work);
514 }
515
516 static void
nfsd_file_list_add_pernet(struct list_head * dst,struct list_head * src,struct net * net)517 nfsd_file_list_add_pernet(struct list_head *dst, struct list_head *src,
518 struct net *net)
519 {
520 struct nfsd_file *nf, *tmp;
521
522 list_for_each_entry_safe(nf, tmp, src, nf_lru) {
523 if (nf->nf_net == net)
524 list_move_tail(&nf->nf_lru, dst);
525 }
526 }
527
528 static void
nfsd_file_dispose_list_delayed(struct list_head * dispose)529 nfsd_file_dispose_list_delayed(struct list_head *dispose)
530 {
531 LIST_HEAD(list);
532 struct nfsd_file *nf;
533
534 while(!list_empty(dispose)) {
535 nf = list_first_entry(dispose, struct nfsd_file, nf_lru);
536 nfsd_file_list_add_pernet(&list, dispose, nf->nf_net);
537 nfsd_file_list_add_disposal(&list, nf->nf_net);
538 }
539 }
540
541 /**
542 * nfsd_file_lru_cb - Examine an entry on the LRU list
543 * @item: LRU entry to examine
544 * @lru: controlling LRU
545 * @lock: LRU list lock (unused)
546 * @arg: dispose list
547 *
548 * Return values:
549 * %LRU_REMOVED: @item was removed from the LRU
550 * %LRU_ROTATE: @item is to be moved to the LRU tail
551 * %LRU_SKIP: @item cannot be evicted
552 */
553 static enum lru_status
nfsd_file_lru_cb(struct list_head * item,struct list_lru_one * lru,spinlock_t * lock,void * arg)554 nfsd_file_lru_cb(struct list_head *item, struct list_lru_one *lru,
555 spinlock_t *lock, void *arg)
556 __releases(lock)
557 __acquires(lock)
558 {
559 struct list_head *head = arg;
560 struct nfsd_file *nf = list_entry(item, struct nfsd_file, nf_lru);
561
562 /* We should only be dealing with GC entries here */
563 WARN_ON_ONCE(!test_bit(NFSD_FILE_GC, &nf->nf_flags));
564
565 /*
566 * Don't throw out files that are still undergoing I/O or
567 * that have uncleared errors pending.
568 */
569 if (nfsd_file_check_writeback(nf)) {
570 trace_nfsd_file_gc_writeback(nf);
571 return LRU_SKIP;
572 }
573
574 /* If it was recently added to the list, skip it */
575 if (test_and_clear_bit(NFSD_FILE_REFERENCED, &nf->nf_flags)) {
576 trace_nfsd_file_gc_referenced(nf);
577 return LRU_ROTATE;
578 }
579
580 /*
581 * Put the reference held on behalf of the LRU. If it wasn't the last
582 * one, then just remove it from the LRU and ignore it.
583 */
584 if (!refcount_dec_and_test(&nf->nf_ref)) {
585 trace_nfsd_file_gc_in_use(nf);
586 list_lru_isolate(lru, &nf->nf_lru);
587 return LRU_REMOVED;
588 }
589
590 /* Refcount went to zero. Unhash it and queue it to the dispose list */
591 nfsd_file_unhash(nf);
592 list_lru_isolate_move(lru, &nf->nf_lru, head);
593 this_cpu_inc(nfsd_file_evictions);
594 trace_nfsd_file_gc_disposed(nf);
595 return LRU_REMOVED;
596 }
597
598 static void
nfsd_file_gc(void)599 nfsd_file_gc(void)
600 {
601 LIST_HEAD(dispose);
602 unsigned long ret;
603
604 ret = list_lru_walk(&nfsd_file_lru, nfsd_file_lru_cb,
605 &dispose, list_lru_count(&nfsd_file_lru));
606 trace_nfsd_file_gc_removed(ret, list_lru_count(&nfsd_file_lru));
607 nfsd_file_dispose_list_delayed(&dispose);
608 }
609
610 static void
nfsd_file_gc_worker(struct work_struct * work)611 nfsd_file_gc_worker(struct work_struct *work)
612 {
613 nfsd_file_gc();
614 if (list_lru_count(&nfsd_file_lru))
615 nfsd_file_schedule_laundrette();
616 }
617
618 static unsigned long
nfsd_file_lru_count(struct shrinker * s,struct shrink_control * sc)619 nfsd_file_lru_count(struct shrinker *s, struct shrink_control *sc)
620 {
621 return list_lru_count(&nfsd_file_lru);
622 }
623
624 static unsigned long
nfsd_file_lru_scan(struct shrinker * s,struct shrink_control * sc)625 nfsd_file_lru_scan(struct shrinker *s, struct shrink_control *sc)
626 {
627 LIST_HEAD(dispose);
628 unsigned long ret;
629
630 ret = list_lru_shrink_walk(&nfsd_file_lru, sc,
631 nfsd_file_lru_cb, &dispose);
632 trace_nfsd_file_shrinker_removed(ret, list_lru_count(&nfsd_file_lru));
633 nfsd_file_dispose_list_delayed(&dispose);
634 return ret;
635 }
636
637 static struct shrinker nfsd_file_shrinker = {
638 .scan_objects = nfsd_file_lru_scan,
639 .count_objects = nfsd_file_lru_count,
640 .seeks = 1,
641 };
642
643 /**
644 * nfsd_file_cond_queue - conditionally unhash and queue a nfsd_file
645 * @nf: nfsd_file to attempt to queue
646 * @dispose: private list to queue successfully-put objects
647 *
648 * Unhash an nfsd_file, try to get a reference to it, and then put that
649 * reference. If it's the last reference, queue it to the dispose list.
650 */
651 static void
nfsd_file_cond_queue(struct nfsd_file * nf,struct list_head * dispose)652 nfsd_file_cond_queue(struct nfsd_file *nf, struct list_head *dispose)
653 __must_hold(RCU)
654 {
655 int decrement = 1;
656
657 /* If we raced with someone else unhashing, ignore it */
658 if (!nfsd_file_unhash(nf))
659 return;
660
661 /* If we can't get a reference, ignore it */
662 if (!nfsd_file_get(nf))
663 return;
664
665 /* Extra decrement if we remove from the LRU */
666 if (nfsd_file_lru_remove(nf))
667 ++decrement;
668
669 /* If refcount goes to 0, then put on the dispose list */
670 if (refcount_sub_and_test(decrement, &nf->nf_ref)) {
671 list_add(&nf->nf_lru, dispose);
672 trace_nfsd_file_closing(nf);
673 }
674 }
675
676 /**
677 * nfsd_file_queue_for_close: try to close out any open nfsd_files for an inode
678 * @inode: inode on which to close out nfsd_files
679 * @dispose: list on which to gather nfsd_files to close out
680 *
681 * An nfsd_file represents a struct file being held open on behalf of nfsd. An
682 * open file however can block other activity (such as leases), or cause
683 * undesirable behavior (e.g. spurious silly-renames when reexporting NFS).
684 *
685 * This function is intended to find open nfsd_files when this sort of
686 * conflicting access occurs and then attempt to close those files out.
687 *
688 * Populates the dispose list with entries that have already had their
689 * refcounts go to zero. The actual free of an nfsd_file can be expensive,
690 * so we leave it up to the caller whether it wants to wait or not.
691 */
692 static void
nfsd_file_queue_for_close(struct inode * inode,struct list_head * dispose)693 nfsd_file_queue_for_close(struct inode *inode, struct list_head *dispose)
694 {
695 struct nfsd_file_lookup_key key = {
696 .type = NFSD_FILE_KEY_INODE,
697 .inode = inode,
698 };
699 struct nfsd_file *nf;
700
701 rcu_read_lock();
702 do {
703 nf = rhashtable_lookup(&nfsd_file_rhash_tbl, &key,
704 nfsd_file_rhash_params);
705 if (!nf)
706 break;
707 nfsd_file_cond_queue(nf, dispose);
708 } while (1);
709 rcu_read_unlock();
710 }
711
712 /**
713 * nfsd_file_close_inode - attempt a delayed close of a nfsd_file
714 * @inode: inode of the file to attempt to remove
715 *
716 * Close out any open nfsd_files that can be reaped for @inode. The
717 * actual freeing is deferred to the dispose_list_delayed infrastructure.
718 *
719 * This is used by the fsnotify callbacks and setlease notifier.
720 */
721 static void
nfsd_file_close_inode(struct inode * inode)722 nfsd_file_close_inode(struct inode *inode)
723 {
724 LIST_HEAD(dispose);
725
726 nfsd_file_queue_for_close(inode, &dispose);
727 nfsd_file_dispose_list_delayed(&dispose);
728 }
729
730 /**
731 * nfsd_file_close_inode_sync - attempt to forcibly close a nfsd_file
732 * @inode: inode of the file to attempt to remove
733 *
734 * Close out any open nfsd_files that can be reaped for @inode. The
735 * nfsd_files are closed out synchronously.
736 *
737 * This is called from nfsd_rename and nfsd_unlink to avoid silly-renames
738 * when reexporting NFS.
739 */
740 void
nfsd_file_close_inode_sync(struct inode * inode)741 nfsd_file_close_inode_sync(struct inode *inode)
742 {
743 struct nfsd_file *nf;
744 LIST_HEAD(dispose);
745
746 trace_nfsd_file_close(inode);
747
748 nfsd_file_queue_for_close(inode, &dispose);
749 while (!list_empty(&dispose)) {
750 nf = list_first_entry(&dispose, struct nfsd_file, nf_lru);
751 list_del_init(&nf->nf_lru);
752 nfsd_file_free(nf);
753 }
754 flush_delayed_fput();
755 }
756
757 /**
758 * nfsd_file_delayed_close - close unused nfsd_files
759 * @work: dummy
760 *
761 * Walk the LRU list and destroy any entries that have not been used since
762 * the last scan.
763 */
764 static void
nfsd_file_delayed_close(struct work_struct * work)765 nfsd_file_delayed_close(struct work_struct *work)
766 {
767 LIST_HEAD(head);
768 struct nfsd_fcache_disposal *l = container_of(work,
769 struct nfsd_fcache_disposal, work);
770
771 nfsd_file_list_remove_disposal(&head, l);
772 nfsd_file_dispose_list(&head);
773 }
774
775 static int
nfsd_file_lease_notifier_call(struct notifier_block * nb,unsigned long arg,void * data)776 nfsd_file_lease_notifier_call(struct notifier_block *nb, unsigned long arg,
777 void *data)
778 {
779 struct file_lock *fl = data;
780
781 /* Only close files for F_SETLEASE leases */
782 if (fl->fl_flags & FL_LEASE)
783 nfsd_file_close_inode(file_inode(fl->fl_file));
784 return 0;
785 }
786
787 static struct notifier_block nfsd_file_lease_notifier = {
788 .notifier_call = nfsd_file_lease_notifier_call,
789 };
790
791 static int
nfsd_file_fsnotify_handle_event(struct fsnotify_mark * mark,u32 mask,struct inode * inode,struct inode * dir,const struct qstr * name,u32 cookie)792 nfsd_file_fsnotify_handle_event(struct fsnotify_mark *mark, u32 mask,
793 struct inode *inode, struct inode *dir,
794 const struct qstr *name, u32 cookie)
795 {
796 if (WARN_ON_ONCE(!inode))
797 return 0;
798
799 trace_nfsd_file_fsnotify_handle_event(inode, mask);
800
801 /* Should be no marks on non-regular files */
802 if (!S_ISREG(inode->i_mode)) {
803 WARN_ON_ONCE(1);
804 return 0;
805 }
806
807 /* don't close files if this was not the last link */
808 if (mask & FS_ATTRIB) {
809 if (inode->i_nlink)
810 return 0;
811 }
812
813 nfsd_file_close_inode(inode);
814 return 0;
815 }
816
817
818 static const struct fsnotify_ops nfsd_file_fsnotify_ops = {
819 .handle_inode_event = nfsd_file_fsnotify_handle_event,
820 .free_mark = nfsd_file_mark_free,
821 };
822
823 int
nfsd_file_cache_init(void)824 nfsd_file_cache_init(void)
825 {
826 int ret;
827
828 lockdep_assert_held(&nfsd_mutex);
829 if (test_and_set_bit(NFSD_FILE_CACHE_UP, &nfsd_file_flags) == 1)
830 return 0;
831
832 ret = rhashtable_init(&nfsd_file_rhash_tbl, &nfsd_file_rhash_params);
833 if (ret)
834 return ret;
835
836 ret = -ENOMEM;
837 nfsd_filecache_wq = alloc_workqueue("nfsd_filecache", 0, 0);
838 if (!nfsd_filecache_wq)
839 goto out;
840
841 nfsd_file_slab = kmem_cache_create("nfsd_file",
842 sizeof(struct nfsd_file), 0, 0, NULL);
843 if (!nfsd_file_slab) {
844 pr_err("nfsd: unable to create nfsd_file_slab\n");
845 goto out_err;
846 }
847
848 nfsd_file_mark_slab = kmem_cache_create("nfsd_file_mark",
849 sizeof(struct nfsd_file_mark), 0, 0, NULL);
850 if (!nfsd_file_mark_slab) {
851 pr_err("nfsd: unable to create nfsd_file_mark_slab\n");
852 goto out_err;
853 }
854
855
856 ret = list_lru_init(&nfsd_file_lru);
857 if (ret) {
858 pr_err("nfsd: failed to init nfsd_file_lru: %d\n", ret);
859 goto out_err;
860 }
861
862 ret = register_shrinker(&nfsd_file_shrinker, "nfsd-filecache");
863 if (ret) {
864 pr_err("nfsd: failed to register nfsd_file_shrinker: %d\n", ret);
865 goto out_lru;
866 }
867
868 ret = lease_register_notifier(&nfsd_file_lease_notifier);
869 if (ret) {
870 pr_err("nfsd: unable to register lease notifier: %d\n", ret);
871 goto out_shrinker;
872 }
873
874 nfsd_file_fsnotify_group = fsnotify_alloc_group(&nfsd_file_fsnotify_ops,
875 FSNOTIFY_GROUP_NOFS);
876 if (IS_ERR(nfsd_file_fsnotify_group)) {
877 pr_err("nfsd: unable to create fsnotify group: %ld\n",
878 PTR_ERR(nfsd_file_fsnotify_group));
879 ret = PTR_ERR(nfsd_file_fsnotify_group);
880 nfsd_file_fsnotify_group = NULL;
881 goto out_notifier;
882 }
883
884 INIT_DELAYED_WORK(&nfsd_filecache_laundrette, nfsd_file_gc_worker);
885 out:
886 return ret;
887 out_notifier:
888 lease_unregister_notifier(&nfsd_file_lease_notifier);
889 out_shrinker:
890 unregister_shrinker(&nfsd_file_shrinker);
891 out_lru:
892 list_lru_destroy(&nfsd_file_lru);
893 out_err:
894 kmem_cache_destroy(nfsd_file_slab);
895 nfsd_file_slab = NULL;
896 kmem_cache_destroy(nfsd_file_mark_slab);
897 nfsd_file_mark_slab = NULL;
898 destroy_workqueue(nfsd_filecache_wq);
899 nfsd_filecache_wq = NULL;
900 rhashtable_destroy(&nfsd_file_rhash_tbl);
901 goto out;
902 }
903
904 /**
905 * __nfsd_file_cache_purge: clean out the cache for shutdown
906 * @net: net-namespace to shut down the cache (may be NULL)
907 *
908 * Walk the nfsd_file cache and close out any that match @net. If @net is NULL,
909 * then close out everything. Called when an nfsd instance is being shut down.
910 */
911 static void
__nfsd_file_cache_purge(struct net * net)912 __nfsd_file_cache_purge(struct net *net)
913 {
914 struct rhashtable_iter iter;
915 struct nfsd_file *nf;
916 LIST_HEAD(dispose);
917
918 rhashtable_walk_enter(&nfsd_file_rhash_tbl, &iter);
919 do {
920 rhashtable_walk_start(&iter);
921
922 nf = rhashtable_walk_next(&iter);
923 while (!IS_ERR_OR_NULL(nf)) {
924 if (!net || nf->nf_net == net)
925 nfsd_file_cond_queue(nf, &dispose);
926 nf = rhashtable_walk_next(&iter);
927 }
928
929 rhashtable_walk_stop(&iter);
930 } while (nf == ERR_PTR(-EAGAIN));
931 rhashtable_walk_exit(&iter);
932
933 nfsd_file_dispose_list(&dispose);
934 }
935
936 static struct nfsd_fcache_disposal *
nfsd_alloc_fcache_disposal(void)937 nfsd_alloc_fcache_disposal(void)
938 {
939 struct nfsd_fcache_disposal *l;
940
941 l = kmalloc(sizeof(*l), GFP_KERNEL);
942 if (!l)
943 return NULL;
944 INIT_WORK(&l->work, nfsd_file_delayed_close);
945 spin_lock_init(&l->lock);
946 INIT_LIST_HEAD(&l->freeme);
947 return l;
948 }
949
950 static void
nfsd_free_fcache_disposal(struct nfsd_fcache_disposal * l)951 nfsd_free_fcache_disposal(struct nfsd_fcache_disposal *l)
952 {
953 cancel_work_sync(&l->work);
954 nfsd_file_dispose_list(&l->freeme);
955 kfree(l);
956 }
957
958 static void
nfsd_free_fcache_disposal_net(struct net * net)959 nfsd_free_fcache_disposal_net(struct net *net)
960 {
961 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
962 struct nfsd_fcache_disposal *l = nn->fcache_disposal;
963
964 nfsd_free_fcache_disposal(l);
965 }
966
967 int
nfsd_file_cache_start_net(struct net * net)968 nfsd_file_cache_start_net(struct net *net)
969 {
970 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
971
972 nn->fcache_disposal = nfsd_alloc_fcache_disposal();
973 return nn->fcache_disposal ? 0 : -ENOMEM;
974 }
975
976 /**
977 * nfsd_file_cache_purge - Remove all cache items associated with @net
978 * @net: target net namespace
979 *
980 */
981 void
nfsd_file_cache_purge(struct net * net)982 nfsd_file_cache_purge(struct net *net)
983 {
984 lockdep_assert_held(&nfsd_mutex);
985 if (test_bit(NFSD_FILE_CACHE_UP, &nfsd_file_flags) == 1)
986 __nfsd_file_cache_purge(net);
987 }
988
989 void
nfsd_file_cache_shutdown_net(struct net * net)990 nfsd_file_cache_shutdown_net(struct net *net)
991 {
992 nfsd_file_cache_purge(net);
993 nfsd_free_fcache_disposal_net(net);
994 }
995
996 void
nfsd_file_cache_shutdown(void)997 nfsd_file_cache_shutdown(void)
998 {
999 int i;
1000
1001 lockdep_assert_held(&nfsd_mutex);
1002 if (test_and_clear_bit(NFSD_FILE_CACHE_UP, &nfsd_file_flags) == 0)
1003 return;
1004
1005 lease_unregister_notifier(&nfsd_file_lease_notifier);
1006 unregister_shrinker(&nfsd_file_shrinker);
1007 /*
1008 * make sure all callers of nfsd_file_lru_cb are done before
1009 * calling nfsd_file_cache_purge
1010 */
1011 cancel_delayed_work_sync(&nfsd_filecache_laundrette);
1012 __nfsd_file_cache_purge(NULL);
1013 list_lru_destroy(&nfsd_file_lru);
1014 rcu_barrier();
1015 fsnotify_put_group(nfsd_file_fsnotify_group);
1016 nfsd_file_fsnotify_group = NULL;
1017 kmem_cache_destroy(nfsd_file_slab);
1018 nfsd_file_slab = NULL;
1019 fsnotify_wait_marks_destroyed();
1020 kmem_cache_destroy(nfsd_file_mark_slab);
1021 nfsd_file_mark_slab = NULL;
1022 destroy_workqueue(nfsd_filecache_wq);
1023 nfsd_filecache_wq = NULL;
1024 rhashtable_destroy(&nfsd_file_rhash_tbl);
1025
1026 for_each_possible_cpu(i) {
1027 per_cpu(nfsd_file_cache_hits, i) = 0;
1028 per_cpu(nfsd_file_acquisitions, i) = 0;
1029 per_cpu(nfsd_file_releases, i) = 0;
1030 per_cpu(nfsd_file_total_age, i) = 0;
1031 per_cpu(nfsd_file_evictions, i) = 0;
1032 }
1033 }
1034
1035 /**
1036 * nfsd_file_is_cached - are there any cached open files for this inode?
1037 * @inode: inode to check
1038 *
1039 * The lookup matches inodes in all net namespaces and is atomic wrt
1040 * nfsd_file_acquire().
1041 *
1042 * Return values:
1043 * %true: filecache contains at least one file matching this inode
1044 * %false: filecache contains no files matching this inode
1045 */
1046 bool
nfsd_file_is_cached(struct inode * inode)1047 nfsd_file_is_cached(struct inode *inode)
1048 {
1049 struct nfsd_file_lookup_key key = {
1050 .type = NFSD_FILE_KEY_INODE,
1051 .inode = inode,
1052 };
1053 bool ret = false;
1054
1055 if (rhashtable_lookup_fast(&nfsd_file_rhash_tbl, &key,
1056 nfsd_file_rhash_params) != NULL)
1057 ret = true;
1058 trace_nfsd_file_is_cached(inode, (int)ret);
1059 return ret;
1060 }
1061
1062 static __be32
nfsd_file_do_acquire(struct svc_rqst * rqstp,struct svc_fh * fhp,unsigned int may_flags,struct file * file,struct nfsd_file ** pnf,bool want_gc)1063 nfsd_file_do_acquire(struct svc_rqst *rqstp, struct svc_fh *fhp,
1064 unsigned int may_flags, struct file *file,
1065 struct nfsd_file **pnf, bool want_gc)
1066 {
1067 struct nfsd_file_lookup_key key = {
1068 .type = NFSD_FILE_KEY_FULL,
1069 .need = may_flags & NFSD_FILE_MAY_MASK,
1070 .net = SVC_NET(rqstp),
1071 .gc = want_gc,
1072 };
1073 bool open_retry = true;
1074 struct nfsd_file *nf;
1075 __be32 status;
1076 int ret;
1077
1078 status = fh_verify(rqstp, fhp, S_IFREG,
1079 may_flags|NFSD_MAY_OWNER_OVERRIDE);
1080 if (status != nfs_ok)
1081 return status;
1082 key.inode = d_inode(fhp->fh_dentry);
1083 key.cred = get_current_cred();
1084
1085 retry:
1086 rcu_read_lock();
1087 nf = rhashtable_lookup(&nfsd_file_rhash_tbl, &key,
1088 nfsd_file_rhash_params);
1089 nf = nfsd_file_get(nf);
1090 rcu_read_unlock();
1091
1092 if (nf) {
1093 if (nfsd_file_lru_remove(nf))
1094 WARN_ON_ONCE(refcount_dec_and_test(&nf->nf_ref));
1095 goto wait_for_construction;
1096 }
1097
1098 nf = nfsd_file_alloc(&key, may_flags);
1099 if (!nf) {
1100 status = nfserr_jukebox;
1101 goto out_status;
1102 }
1103
1104 ret = rhashtable_lookup_insert_key(&nfsd_file_rhash_tbl,
1105 &key, &nf->nf_rhash,
1106 nfsd_file_rhash_params);
1107 if (likely(ret == 0))
1108 goto open_file;
1109
1110 nfsd_file_slab_free(&nf->nf_rcu);
1111 nf = NULL;
1112 if (ret == -EEXIST)
1113 goto retry;
1114 trace_nfsd_file_insert_err(rqstp, key.inode, may_flags, ret);
1115 status = nfserr_jukebox;
1116 goto out_status;
1117
1118 wait_for_construction:
1119 wait_on_bit(&nf->nf_flags, NFSD_FILE_PENDING, TASK_UNINTERRUPTIBLE);
1120
1121 /* Did construction of this file fail? */
1122 if (!test_bit(NFSD_FILE_HASHED, &nf->nf_flags)) {
1123 trace_nfsd_file_cons_err(rqstp, key.inode, may_flags, nf);
1124 if (!open_retry) {
1125 status = nfserr_jukebox;
1126 goto out;
1127 }
1128 open_retry = false;
1129 if (refcount_dec_and_test(&nf->nf_ref))
1130 nfsd_file_free(nf);
1131 goto retry;
1132 }
1133
1134 this_cpu_inc(nfsd_file_cache_hits);
1135
1136 status = nfserrno(nfsd_open_break_lease(file_inode(nf->nf_file), may_flags));
1137 out:
1138 if (status == nfs_ok) {
1139 this_cpu_inc(nfsd_file_acquisitions);
1140 nfsd_file_check_write_error(nf);
1141 *pnf = nf;
1142 } else {
1143 if (refcount_dec_and_test(&nf->nf_ref))
1144 nfsd_file_free(nf);
1145 nf = NULL;
1146 }
1147
1148 out_status:
1149 put_cred(key.cred);
1150 trace_nfsd_file_acquire(rqstp, key.inode, may_flags, nf, status);
1151 return status;
1152
1153 open_file:
1154 trace_nfsd_file_alloc(nf);
1155 nf->nf_mark = nfsd_file_mark_find_or_create(nf, key.inode);
1156 if (nf->nf_mark) {
1157 if (file) {
1158 get_file(file);
1159 nf->nf_file = file;
1160 status = nfs_ok;
1161 trace_nfsd_file_opened(nf, status);
1162 } else {
1163 status = nfsd_open_verified(rqstp, fhp, may_flags,
1164 &nf->nf_file);
1165 trace_nfsd_file_open(nf, status);
1166 }
1167 } else
1168 status = nfserr_jukebox;
1169 /*
1170 * If construction failed, or we raced with a call to unlink()
1171 * then unhash.
1172 */
1173 if (status == nfs_ok && key.inode->i_nlink == 0)
1174 status = nfserr_jukebox;
1175 if (status != nfs_ok)
1176 nfsd_file_unhash(nf);
1177 clear_bit_unlock(NFSD_FILE_PENDING, &nf->nf_flags);
1178 smp_mb__after_atomic();
1179 wake_up_bit(&nf->nf_flags, NFSD_FILE_PENDING);
1180 goto out;
1181 }
1182
1183 /**
1184 * nfsd_file_acquire_gc - Get a struct nfsd_file with an open file
1185 * @rqstp: the RPC transaction being executed
1186 * @fhp: the NFS filehandle of the file to be opened
1187 * @may_flags: NFSD_MAY_ settings for the file
1188 * @pnf: OUT: new or found "struct nfsd_file" object
1189 *
1190 * The nfsd_file object returned by this API is reference-counted
1191 * and garbage-collected. The object is retained for a few
1192 * seconds after the final nfsd_file_put() in case the caller
1193 * wants to re-use it.
1194 *
1195 * Returns nfs_ok and sets @pnf on success; otherwise an nfsstat in
1196 * network byte order is returned.
1197 */
1198 __be32
nfsd_file_acquire_gc(struct svc_rqst * rqstp,struct svc_fh * fhp,unsigned int may_flags,struct nfsd_file ** pnf)1199 nfsd_file_acquire_gc(struct svc_rqst *rqstp, struct svc_fh *fhp,
1200 unsigned int may_flags, struct nfsd_file **pnf)
1201 {
1202 return nfsd_file_do_acquire(rqstp, fhp, may_flags, NULL, pnf, true);
1203 }
1204
1205 /**
1206 * nfsd_file_acquire - Get a struct nfsd_file with an open file
1207 * @rqstp: the RPC transaction being executed
1208 * @fhp: the NFS filehandle of the file to be opened
1209 * @may_flags: NFSD_MAY_ settings for the file
1210 * @pnf: OUT: new or found "struct nfsd_file" object
1211 *
1212 * The nfsd_file_object returned by this API is reference-counted
1213 * but not garbage-collected. The object is unhashed after the
1214 * final nfsd_file_put().
1215 *
1216 * Returns nfs_ok and sets @pnf on success; otherwise an nfsstat in
1217 * network byte order is returned.
1218 */
1219 __be32
nfsd_file_acquire(struct svc_rqst * rqstp,struct svc_fh * fhp,unsigned int may_flags,struct nfsd_file ** pnf)1220 nfsd_file_acquire(struct svc_rqst *rqstp, struct svc_fh *fhp,
1221 unsigned int may_flags, struct nfsd_file **pnf)
1222 {
1223 return nfsd_file_do_acquire(rqstp, fhp, may_flags, NULL, pnf, false);
1224 }
1225
1226 /**
1227 * nfsd_file_acquire_opened - Get a struct nfsd_file using existing open file
1228 * @rqstp: the RPC transaction being executed
1229 * @fhp: the NFS filehandle of the file just created
1230 * @may_flags: NFSD_MAY_ settings for the file
1231 * @file: cached, already-open file (may be NULL)
1232 * @pnf: OUT: new or found "struct nfsd_file" object
1233 *
1234 * Acquire a nfsd_file object that is not GC'ed. If one doesn't already exist,
1235 * and @file is non-NULL, use it to instantiate a new nfsd_file instead of
1236 * opening a new one.
1237 *
1238 * Returns nfs_ok and sets @pnf on success; otherwise an nfsstat in
1239 * network byte order is returned.
1240 */
1241 __be32
nfsd_file_acquire_opened(struct svc_rqst * rqstp,struct svc_fh * fhp,unsigned int may_flags,struct file * file,struct nfsd_file ** pnf)1242 nfsd_file_acquire_opened(struct svc_rqst *rqstp, struct svc_fh *fhp,
1243 unsigned int may_flags, struct file *file,
1244 struct nfsd_file **pnf)
1245 {
1246 return nfsd_file_do_acquire(rqstp, fhp, may_flags, file, pnf, false);
1247 }
1248
1249 /*
1250 * Note that fields may be added, removed or reordered in the future. Programs
1251 * scraping this file for info should test the labels to ensure they're
1252 * getting the correct field.
1253 */
nfsd_file_cache_stats_show(struct seq_file * m,void * v)1254 int nfsd_file_cache_stats_show(struct seq_file *m, void *v)
1255 {
1256 unsigned long releases = 0, evictions = 0;
1257 unsigned long hits = 0, acquisitions = 0;
1258 unsigned int i, count = 0, buckets = 0;
1259 unsigned long lru = 0, total_age = 0;
1260
1261 /* Serialize with server shutdown */
1262 mutex_lock(&nfsd_mutex);
1263 if (test_bit(NFSD_FILE_CACHE_UP, &nfsd_file_flags) == 1) {
1264 struct bucket_table *tbl;
1265 struct rhashtable *ht;
1266
1267 lru = list_lru_count(&nfsd_file_lru);
1268
1269 rcu_read_lock();
1270 ht = &nfsd_file_rhash_tbl;
1271 count = atomic_read(&ht->nelems);
1272 tbl = rht_dereference_rcu(ht->tbl, ht);
1273 buckets = tbl->size;
1274 rcu_read_unlock();
1275 }
1276 mutex_unlock(&nfsd_mutex);
1277
1278 for_each_possible_cpu(i) {
1279 hits += per_cpu(nfsd_file_cache_hits, i);
1280 acquisitions += per_cpu(nfsd_file_acquisitions, i);
1281 releases += per_cpu(nfsd_file_releases, i);
1282 total_age += per_cpu(nfsd_file_total_age, i);
1283 evictions += per_cpu(nfsd_file_evictions, i);
1284 }
1285
1286 seq_printf(m, "total entries: %u\n", count);
1287 seq_printf(m, "hash buckets: %u\n", buckets);
1288 seq_printf(m, "lru entries: %lu\n", lru);
1289 seq_printf(m, "cache hits: %lu\n", hits);
1290 seq_printf(m, "acquisitions: %lu\n", acquisitions);
1291 seq_printf(m, "releases: %lu\n", releases);
1292 seq_printf(m, "evictions: %lu\n", evictions);
1293 if (releases)
1294 seq_printf(m, "mean age (ms): %ld\n", total_age / releases);
1295 else
1296 seq_printf(m, "mean age (ms): -\n");
1297 return 0;
1298 }
1299