Merge branch 'for-2.6.33' of git://linux-nfs.org/~bfields/linux
* 'for-2.6.33' of git://linux-nfs.org/~bfields/linux: (42 commits) nfsd: remove pointless paths in file headers nfsd: move most of nfsfh.h to fs/nfsd nfsd: remove unused field rq_reffh nfsd: enable V4ROOT exports nfsd: make V4ROOT exports read-only nfsd: restrict filehandles accepted in V4ROOT case nfsd: allow exports of symlinks nfsd: filter readdir results in V4ROOT case nfsd: filter lookup results in V4ROOT case nfsd4: don't continue "under" mounts in V4ROOT case nfsd: introduce export flag for v4 pseudoroot nfsd: let "insecure" flag vary by pseudoflavor nfsd: new interface to advertise export features nfsd: Move private headers to source directory vfs: nfsctl.c un-used nfsd #includes lockd: Remove un-used nfsd headers #includes s390: remove un-used nfsd #includes sparc: remove un-used nfsd #includes parsic: remove un-used nfsd #includes compat.c: Remove dependence on nfsd private headers ...
This commit is contained in:
@@ -166,7 +166,7 @@ config IP_PNP_DHCP
|
||||
|
||||
If unsure, say Y. Note that if you want to use DHCP, a DHCP server
|
||||
must be operating on your network. Read
|
||||
<file:Documentation/filesystems/nfsroot.txt> for details.
|
||||
<file:Documentation/filesystems/nfs/nfsroot.txt> for details.
|
||||
|
||||
config IP_PNP_BOOTP
|
||||
bool "IP: BOOTP support"
|
||||
@@ -181,7 +181,7 @@ config IP_PNP_BOOTP
|
||||
does BOOTP itself, providing all necessary information on the kernel
|
||||
command line, you can say N here. If unsure, say Y. Note that if you
|
||||
want to use BOOTP, a BOOTP server must be operating on your network.
|
||||
Read <file:Documentation/filesystems/nfsroot.txt> for details.
|
||||
Read <file:Documentation/filesystems/nfs/nfsroot.txt> for details.
|
||||
|
||||
config IP_PNP_RARP
|
||||
bool "IP: RARP support"
|
||||
@@ -194,7 +194,7 @@ config IP_PNP_RARP
|
||||
older protocol which is being obsoleted by BOOTP and DHCP), say Y
|
||||
here. Note that if you want to use RARP, a RARP server must be
|
||||
operating on your network. Read
|
||||
<file:Documentation/filesystems/nfsroot.txt> for details.
|
||||
<file:Documentation/filesystems/nfs/nfsroot.txt> for details.
|
||||
|
||||
# not yet ready..
|
||||
# bool ' IP: ARP support' CONFIG_IP_PNP_ARP
|
||||
|
@@ -1446,7 +1446,7 @@ late_initcall(ip_auto_config);
|
||||
|
||||
/*
|
||||
* Decode any IP configuration options in the "ip=" or "nfsaddrs=" kernel
|
||||
* command line parameter. See Documentation/filesystems/nfsroot.txt.
|
||||
* command line parameter. See Documentation/filesystems/nfs/nfsroot.txt.
|
||||
*/
|
||||
static int __init ic_proto_name(char *name)
|
||||
{
|
||||
|
@@ -16,8 +16,6 @@
|
||||
|
||||
#define RPCDBG_FACILITY RPCDBG_SVCXPRT
|
||||
|
||||
#define SVC_MAX_WAKING 5
|
||||
|
||||
static struct svc_deferred_req *svc_deferred_dequeue(struct svc_xprt *xprt);
|
||||
static int svc_deferred_recv(struct svc_rqst *rqstp);
|
||||
static struct cache_deferred_req *svc_defer(struct cache_req *req);
|
||||
@@ -306,7 +304,6 @@ void svc_xprt_enqueue(struct svc_xprt *xprt)
|
||||
struct svc_pool *pool;
|
||||
struct svc_rqst *rqstp;
|
||||
int cpu;
|
||||
int thread_avail;
|
||||
|
||||
if (!(xprt->xpt_flags &
|
||||
((1<<XPT_CONN)|(1<<XPT_DATA)|(1<<XPT_CLOSE)|(1<<XPT_DEFERRED))))
|
||||
@@ -318,6 +315,12 @@ void svc_xprt_enqueue(struct svc_xprt *xprt)
|
||||
|
||||
spin_lock_bh(&pool->sp_lock);
|
||||
|
||||
if (!list_empty(&pool->sp_threads) &&
|
||||
!list_empty(&pool->sp_sockets))
|
||||
printk(KERN_ERR
|
||||
"svc_xprt_enqueue: "
|
||||
"threads and transports both waiting??\n");
|
||||
|
||||
if (test_bit(XPT_DEAD, &xprt->xpt_flags)) {
|
||||
/* Don't enqueue dead transports */
|
||||
dprintk("svc: transport %p is dead, not enqueued\n", xprt);
|
||||
@@ -358,15 +361,7 @@ void svc_xprt_enqueue(struct svc_xprt *xprt)
|
||||
}
|
||||
|
||||
process:
|
||||
/* Work out whether threads are available */
|
||||
thread_avail = !list_empty(&pool->sp_threads); /* threads are asleep */
|
||||
if (pool->sp_nwaking >= SVC_MAX_WAKING) {
|
||||
/* too many threads are runnable and trying to wake up */
|
||||
thread_avail = 0;
|
||||
pool->sp_stats.overloads_avoided++;
|
||||
}
|
||||
|
||||
if (thread_avail) {
|
||||
if (!list_empty(&pool->sp_threads)) {
|
||||
rqstp = list_entry(pool->sp_threads.next,
|
||||
struct svc_rqst,
|
||||
rq_list);
|
||||
@@ -381,8 +376,6 @@ void svc_xprt_enqueue(struct svc_xprt *xprt)
|
||||
svc_xprt_get(xprt);
|
||||
rqstp->rq_reserved = serv->sv_max_mesg;
|
||||
atomic_add(rqstp->rq_reserved, &xprt->xpt_reserved);
|
||||
rqstp->rq_waking = 1;
|
||||
pool->sp_nwaking++;
|
||||
pool->sp_stats.threads_woken++;
|
||||
BUG_ON(xprt->xpt_pool != pool);
|
||||
wake_up(&rqstp->rq_wait);
|
||||
@@ -651,11 +644,6 @@ int svc_recv(struct svc_rqst *rqstp, long timeout)
|
||||
return -EINTR;
|
||||
|
||||
spin_lock_bh(&pool->sp_lock);
|
||||
if (rqstp->rq_waking) {
|
||||
rqstp->rq_waking = 0;
|
||||
pool->sp_nwaking--;
|
||||
BUG_ON(pool->sp_nwaking < 0);
|
||||
}
|
||||
xprt = svc_xprt_dequeue(pool);
|
||||
if (xprt) {
|
||||
rqstp->rq_xprt = xprt;
|
||||
@@ -1204,16 +1192,15 @@ static int svc_pool_stats_show(struct seq_file *m, void *p)
|
||||
struct svc_pool *pool = p;
|
||||
|
||||
if (p == SEQ_START_TOKEN) {
|
||||
seq_puts(m, "# pool packets-arrived sockets-enqueued threads-woken overloads-avoided threads-timedout\n");
|
||||
seq_puts(m, "# pool packets-arrived sockets-enqueued threads-woken threads-timedout\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
seq_printf(m, "%u %lu %lu %lu %lu %lu\n",
|
||||
seq_printf(m, "%u %lu %lu %lu %lu\n",
|
||||
pool->sp_id,
|
||||
pool->sp_stats.packets,
|
||||
pool->sp_stats.sockets_queued,
|
||||
pool->sp_stats.threads_woken,
|
||||
pool->sp_stats.overloads_avoided,
|
||||
pool->sp_stats.threads_timedout);
|
||||
|
||||
return 0;
|
||||
|
@@ -655,23 +655,25 @@ static struct unix_gid *unix_gid_lookup(uid_t uid)
|
||||
return NULL;
|
||||
}
|
||||
|
||||
static int unix_gid_find(uid_t uid, struct group_info **gip,
|
||||
struct svc_rqst *rqstp)
|
||||
static struct group_info *unix_gid_find(uid_t uid, struct svc_rqst *rqstp)
|
||||
{
|
||||
struct unix_gid *ug = unix_gid_lookup(uid);
|
||||
struct unix_gid *ug;
|
||||
struct group_info *gi;
|
||||
int ret;
|
||||
|
||||
ug = unix_gid_lookup(uid);
|
||||
if (!ug)
|
||||
return -EAGAIN;
|
||||
switch (cache_check(&unix_gid_cache, &ug->h, &rqstp->rq_chandle)) {
|
||||
return ERR_PTR(-EAGAIN);
|
||||
ret = cache_check(&unix_gid_cache, &ug->h, &rqstp->rq_chandle);
|
||||
switch (ret) {
|
||||
case -ENOENT:
|
||||
*gip = NULL;
|
||||
return 0;
|
||||
return ERR_PTR(-ENOENT);
|
||||
case 0:
|
||||
*gip = ug->gi;
|
||||
get_group_info(*gip);
|
||||
gi = get_group_info(ug->gi);
|
||||
cache_put(&ug->h, &unix_gid_cache);
|
||||
return 0;
|
||||
return gi;
|
||||
default:
|
||||
return -EAGAIN;
|
||||
return ERR_PTR(-EAGAIN);
|
||||
}
|
||||
}
|
||||
|
||||
@@ -681,6 +683,8 @@ svcauth_unix_set_client(struct svc_rqst *rqstp)
|
||||
struct sockaddr_in *sin;
|
||||
struct sockaddr_in6 *sin6, sin6_storage;
|
||||
struct ip_map *ipm;
|
||||
struct group_info *gi;
|
||||
struct svc_cred *cred = &rqstp->rq_cred;
|
||||
|
||||
switch (rqstp->rq_addr.ss_family) {
|
||||
case AF_INET:
|
||||
@@ -721,6 +725,17 @@ svcauth_unix_set_client(struct svc_rqst *rqstp)
|
||||
ip_map_cached_put(rqstp, ipm);
|
||||
break;
|
||||
}
|
||||
|
||||
gi = unix_gid_find(cred->cr_uid, rqstp);
|
||||
switch (PTR_ERR(gi)) {
|
||||
case -EAGAIN:
|
||||
return SVC_DROP;
|
||||
case -ENOENT:
|
||||
break;
|
||||
default:
|
||||
put_group_info(cred->cr_group_info);
|
||||
cred->cr_group_info = gi;
|
||||
}
|
||||
return SVC_OK;
|
||||
}
|
||||
|
||||
@@ -817,19 +832,11 @@ svcauth_unix_accept(struct svc_rqst *rqstp, __be32 *authp)
|
||||
slen = svc_getnl(argv); /* gids length */
|
||||
if (slen > 16 || (len -= (slen + 2)*4) < 0)
|
||||
goto badcred;
|
||||
if (unix_gid_find(cred->cr_uid, &cred->cr_group_info, rqstp)
|
||||
== -EAGAIN)
|
||||
cred->cr_group_info = groups_alloc(slen);
|
||||
if (cred->cr_group_info == NULL)
|
||||
return SVC_DROP;
|
||||
if (cred->cr_group_info == NULL) {
|
||||
cred->cr_group_info = groups_alloc(slen);
|
||||
if (cred->cr_group_info == NULL)
|
||||
return SVC_DROP;
|
||||
for (i = 0; i < slen; i++)
|
||||
GROUP_AT(cred->cr_group_info, i) = svc_getnl(argv);
|
||||
} else {
|
||||
for (i = 0; i < slen ; i++)
|
||||
svc_getnl(argv);
|
||||
}
|
||||
for (i = 0; i < slen; i++)
|
||||
GROUP_AT(cred->cr_group_info, i) = svc_getnl(argv);
|
||||
if (svc_getu32(argv) != htonl(RPC_AUTH_NULL) || svc_getu32(argv) != 0) {
|
||||
*authp = rpc_autherr_badverf;
|
||||
return SVC_DENIED;
|
||||
|
Reference in New Issue
Block a user