Thomas Gleixner | 1621633 | 2019-05-19 15:51:31 +0200 | [diff] [blame] | 1 | /* SPDX-License-Identifier: GPL-2.0-or-later */ |
Jeff Layton | 7ea34ac | 2012-03-21 09:52:05 -0400 | [diff] [blame] | 2 | /* |
| 3 | * per net namespace data structures for nfsd |
| 4 | * |
| 5 | * Copyright (C) 2012, Jeff Layton <jlayton@redhat.com> |
Jeff Layton | 7ea34ac | 2012-03-21 09:52:05 -0400 | [diff] [blame] | 6 | */ |
| 7 | |
| 8 | #ifndef __NFSD_NETNS_H__ |
| 9 | #define __NFSD_NETNS_H__ |
| 10 | |
| 11 | #include <net/net_namespace.h> |
| 12 | #include <net/netns/generic.h> |
| 13 | |
Stanislav Kinsbursky | 52e19c0 | 2012-11-14 18:21:16 +0300 | [diff] [blame] | 14 | /* Hash tables for nfs4_clientid state */ |
| 15 | #define CLIENT_HASH_BITS 4 |
| 16 | #define CLIENT_HASH_SIZE (1 << CLIENT_HASH_BITS) |
| 17 | #define CLIENT_HASH_MASK (CLIENT_HASH_SIZE - 1) |
| 18 | |
Stanislav Kinsbursky | 1872de0 | 2012-11-14 18:21:51 +0300 | [diff] [blame] | 19 | #define SESSION_HASH_SIZE 512 |
| 20 | |
Jeff Layton | 7ea34ac | 2012-03-21 09:52:05 -0400 | [diff] [blame] | 21 | struct cld_net; |
Stanislav Kinsbursky | 9a9c647 | 2012-12-04 14:29:27 +0300 | [diff] [blame] | 22 | struct nfsd4_client_tracking_ops; |
Jeff Layton | 7ea34ac | 2012-03-21 09:52:05 -0400 | [diff] [blame] | 23 | |
Jeff Layton | 14a571a | 2014-08-05 15:13:30 -0400 | [diff] [blame] | 24 | /* |
| 25 | * Represents a nfsd "container". With respect to nfsv4 state tracking, the |
| 26 | * fields of interest are the *_id_hashtbls and the *_name_tree. These track |
| 27 | * the nfs4_client objects by either short or long form clientid. |
| 28 | * |
| 29 | * Each nfsd_net runs a nfs4_laundromat workqueue job when necessary to clean |
| 30 | * up expired clients and delegations within the container. |
| 31 | */ |
Jeff Layton | 7ea34ac | 2012-03-21 09:52:05 -0400 | [diff] [blame] | 32 | struct nfsd_net { |
| 33 | struct cld_net *cld_net; |
Stanislav Kinsbursky | b3853e0 | 2012-04-11 15:13:21 +0400 | [diff] [blame] | 34 | |
Stanislav Kinsbursky | e5f06f7 | 2012-04-11 15:13:28 +0400 | [diff] [blame] | 35 | struct cache_detail *svc_expkey_cache; |
Stanislav Kinsbursky | b3853e0 | 2012-04-11 15:13:21 +0400 | [diff] [blame] | 36 | struct cache_detail *svc_export_cache; |
Stanislav Kinsbursky | c2e76ef | 2012-04-11 17:32:51 +0400 | [diff] [blame] | 37 | |
| 38 | struct cache_detail *idtoname_cache; |
Stanislav Kinsbursky | 9e75a4d | 2012-04-11 17:32:58 +0400 | [diff] [blame] | 39 | struct cache_detail *nametoid_cache; |
Stanislav Kinsbursky | 5e1533c | 2012-07-25 16:56:58 +0400 | [diff] [blame] | 40 | |
| 41 | struct lock_manager nfsd4_manager; |
Stanislav Kinsbursky | a51c84e | 2012-07-25 16:57:37 +0400 | [diff] [blame] | 42 | bool grace_ended; |
Arnd Bergmann | 9cc7680 | 2019-10-31 15:53:13 +0100 | [diff] [blame] | 43 | time64_t boot_time; |
Stanislav Kinsbursky | 52e19c0 | 2012-11-14 18:21:16 +0300 | [diff] [blame] | 44 | |
J. Bruce Fields | 2c830dd | 2018-12-14 09:40:56 -0500 | [diff] [blame] | 45 | /* internal mount of the "nfsd" pseudofilesystem: */ |
| 46 | struct vfsmount *nfsd_mnt; |
| 47 | |
J. Bruce Fields | e8a79fb | 2019-03-22 11:11:06 -0400 | [diff] [blame] | 48 | struct dentry *nfsd_client_dir; |
| 49 | |
Stanislav Kinsbursky | 52e19c0 | 2012-11-14 18:21:16 +0300 | [diff] [blame] | 50 | /* |
| 51 | * reclaim_str_hashtbl[] holds known client info from previous reset/reboot |
| 52 | * used in reboot/reset lease grace period processing |
Stanislav Kinsbursky | 382a62e | 2012-11-14 18:21:26 +0300 | [diff] [blame] | 53 | * |
| 54 | * conf_id_hashtbl[], and conf_name_tree hold confirmed |
| 55 | * setclientid_confirmed info. |
Stanislav Kinsbursky | a99454a | 2012-11-14 18:21:36 +0300 | [diff] [blame] | 56 | * |
| 57 | * unconf_str_hastbl[] and unconf_name_tree hold unconfirmed |
| 58 | * setclientid info. |
Stanislav Kinsbursky | 52e19c0 | 2012-11-14 18:21:16 +0300 | [diff] [blame] | 59 | */ |
| 60 | struct list_head *reclaim_str_hashtbl; |
| 61 | int reclaim_str_hashtbl_size; |
Stanislav Kinsbursky | 8daae4d | 2012-11-14 18:21:21 +0300 | [diff] [blame] | 62 | struct list_head *conf_id_hashtbl; |
Stanislav Kinsbursky | 382a62e | 2012-11-14 18:21:26 +0300 | [diff] [blame] | 63 | struct rb_root conf_name_tree; |
Stanislav Kinsbursky | 0a7ec37 | 2012-11-14 18:21:31 +0300 | [diff] [blame] | 64 | struct list_head *unconf_id_hashtbl; |
Stanislav Kinsbursky | a99454a | 2012-11-14 18:21:36 +0300 | [diff] [blame] | 65 | struct rb_root unconf_name_tree; |
Stanislav Kinsbursky | 1872de0 | 2012-11-14 18:21:51 +0300 | [diff] [blame] | 66 | struct list_head *sessionid_hashtbl; |
Stanislav Kinsbursky | 5ed58bb | 2012-11-14 18:21:56 +0300 | [diff] [blame] | 67 | /* |
| 68 | * client_lru holds client queue ordered by nfs4_client.cl_time |
| 69 | * for lease renewal. |
Stanislav Kinsbursky | 73758fed | 2012-11-14 18:22:01 +0300 | [diff] [blame] | 70 | * |
| 71 | * close_lru holds (open) stateowner queue ordered by nfs4_stateowner.so_time |
| 72 | * for last close replay. |
| 73 | * |
| 74 | * All of the above fields are protected by the client_mutex. |
Stanislav Kinsbursky | 5ed58bb | 2012-11-14 18:21:56 +0300 | [diff] [blame] | 75 | */ |
| 76 | struct list_head client_lru; |
Stanislav Kinsbursky | 73758fed | 2012-11-14 18:22:01 +0300 | [diff] [blame] | 77 | struct list_head close_lru; |
J. Bruce Fields | e8c69d1 | 2013-03-21 15:19:33 -0400 | [diff] [blame] | 78 | struct list_head del_recall_lru; |
Jeff Layton | 0cc11a6 | 2016-10-20 09:34:31 -0400 | [diff] [blame] | 79 | |
| 80 | /* protected by blocked_locks_lock */ |
Jeff Layton | 7919d0a | 2016-09-16 16:28:25 -0400 | [diff] [blame] | 81 | struct list_head blocked_locks_lru; |
Stanislav Kinsbursky | 0912128 | 2012-11-14 18:22:17 +0300 | [diff] [blame] | 82 | |
| 83 | struct delayed_work laundromat_work; |
Stanislav Kinsbursky | c9a4962 | 2012-11-26 15:21:58 +0300 | [diff] [blame] | 84 | |
| 85 | /* client_lock protects the client lru list and session hash table */ |
| 86 | spinlock_t client_lock; |
Stanislav Kinsbursky | 3a07336 | 2012-11-26 16:16:25 +0300 | [diff] [blame] | 87 | |
Jeff Layton | 0cc11a6 | 2016-10-20 09:34:31 -0400 | [diff] [blame] | 88 | /* protects blocked_locks_lru */ |
| 89 | spinlock_t blocked_locks_lock; |
| 90 | |
Stanislav Kinsbursky | 3a07336 | 2012-11-26 16:16:25 +0300 | [diff] [blame] | 91 | struct file *rec_file; |
Stanislav Kinsbursky | f141f79 | 2012-11-26 16:16:30 +0300 | [diff] [blame] | 92 | bool in_grace; |
Julia Lawall | 7c582e4 | 2015-11-22 08:22:10 +0100 | [diff] [blame] | 93 | const struct nfsd4_client_tracking_ops *client_tracking_ops; |
Stanislav Kinsbursky | 3d73371 | 2012-11-27 14:11:44 +0300 | [diff] [blame] | 94 | |
Arnd Bergmann | 20b7d86 | 2019-11-04 16:31:52 +0100 | [diff] [blame] | 95 | time64_t nfsd4_lease; |
| 96 | time64_t nfsd4_grace; |
J. Bruce Fields | 03f318c | 2018-06-08 12:28:47 -0400 | [diff] [blame] | 97 | bool somebody_reclaimed; |
Stanislav Kinsbursky | 2c2fe29 | 2012-12-06 14:23:14 +0300 | [diff] [blame] | 98 | |
Scott Mayhew | 362063a | 2019-03-26 18:06:28 -0400 | [diff] [blame] | 99 | bool track_reclaim_completes; |
| 100 | atomic_t nr_reclaim_complete; |
| 101 | |
Stanislav Kinsbursky | 2c2fe29 | 2012-12-06 14:23:14 +0300 | [diff] [blame] | 102 | bool nfsd_net_up; |
Kinglong Mee | 8ef6671 | 2013-12-31 13:17:30 +0800 | [diff] [blame] | 103 | bool lockd_up; |
Stanislav Kinsbursky | b9c0ef8 | 2012-12-06 14:23:19 +0300 | [diff] [blame] | 104 | |
Jeff Layton | 294ac32 | 2014-07-30 08:27:15 -0400 | [diff] [blame] | 105 | /* Time of server startup */ |
Arnd Bergmann | 256a89f | 2017-10-19 12:04:11 +0200 | [diff] [blame] | 106 | struct timespec64 nfssvc_boot; |
Trond Myklebust | 27c438f | 2019-09-02 13:02:56 -0400 | [diff] [blame] | 107 | seqlock_t boot_lock; |
Stanislav Kinsbursky | 9dd9845 | 2012-12-06 14:23:24 +0300 | [diff] [blame] | 108 | |
Jeff Layton | 5b8db00 | 2014-07-02 16:11:22 -0400 | [diff] [blame] | 109 | /* |
| 110 | * Max number of connections this nfsd container will allow. Defaults |
| 111 | * to '0' which is means that it bases this on the number of threads. |
| 112 | */ |
| 113 | unsigned int max_connections; |
| 114 | |
J. Bruce Fields | bf5ed3e | 2019-03-14 16:20:19 -0400 | [diff] [blame] | 115 | u32 clientid_base; |
Jeff Layton | 294ac32 | 2014-07-30 08:27:15 -0400 | [diff] [blame] | 116 | u32 clientid_counter; |
Kinglong Mee | 19311aa8 | 2015-07-18 07:33:31 +0800 | [diff] [blame] | 117 | u32 clverifier_counter; |
Jeff Layton | 294ac32 | 2014-07-30 08:27:15 -0400 | [diff] [blame] | 118 | |
Stanislav Kinsbursky | 9dd9845 | 2012-12-06 14:23:24 +0300 | [diff] [blame] | 119 | struct svc_serv *nfsd_serv; |
Vasily Averin | 2317dc5 | 2017-11-10 10:19:35 +0300 | [diff] [blame] | 120 | |
| 121 | wait_queue_head_t ntf_wq; |
| 122 | atomic_t ntf_refcnt; |
Olga Kornievskaia | e0639dc | 2018-07-20 18:19:20 -0400 | [diff] [blame] | 123 | |
| 124 | /* |
| 125 | * clientid and stateid data for construction of net unique COPY |
| 126 | * stateids. |
| 127 | */ |
| 128 | u32 s2s_cp_cl_id; |
| 129 | struct idr s2s_cp_stateids; |
| 130 | spinlock_t s2s_cp_lock; |
Trond Myklebust | e333f3b | 2019-04-09 11:46:19 -0400 | [diff] [blame] | 131 | |
| 132 | /* |
| 133 | * Version information |
| 134 | */ |
| 135 | bool *nfsd_versions; |
| 136 | bool *nfsd4_minorversions; |
J. Bruce Fields | 3ba7583 | 2019-05-17 09:03:38 -0400 | [diff] [blame] | 137 | |
| 138 | /* |
| 139 | * Duplicate reply cache |
| 140 | */ |
| 141 | struct nfsd_drc_bucket *drc_hashtbl; |
| 142 | struct kmem_cache *drc_slab; |
| 143 | |
| 144 | /* max number of entries allowed in the cache */ |
| 145 | unsigned int max_drc_entries; |
| 146 | |
| 147 | /* number of significant bits in the hash value */ |
| 148 | unsigned int maskbits; |
| 149 | unsigned int drc_hashsize; |
| 150 | |
| 151 | /* |
J. Bruce Fields | 22a46eb4 | 2019-05-17 16:22:18 -0400 | [diff] [blame] | 152 | * Stats and other tracking of on the duplicate reply cache. |
| 153 | * These fields and the "rc" fields in nfsdstats are modified |
| 154 | * with only the per-bucket cache lock, which isn't really safe |
| 155 | * and should be fixed if we want the statistics to be |
| 156 | * completely accurate. |
J. Bruce Fields | 3ba7583 | 2019-05-17 09:03:38 -0400 | [diff] [blame] | 157 | */ |
| 158 | |
| 159 | /* total number of entries */ |
| 160 | atomic_t num_drc_entries; |
| 161 | |
| 162 | /* cache misses due only to checksum comparison failures */ |
| 163 | unsigned int payload_misses; |
| 164 | |
| 165 | /* amount of memory (in bytes) currently consumed by the DRC */ |
| 166 | unsigned int drc_mem_usage; |
| 167 | |
| 168 | /* longest hash chain seen */ |
| 169 | unsigned int longest_chain; |
| 170 | |
| 171 | /* size of cache when we saw the longest hash chain */ |
| 172 | unsigned int longest_chain_cachesize; |
| 173 | |
| 174 | struct shrinker nfsd_reply_cache_shrinker; |
Scott Mayhew | 7627d7d | 2020-02-19 15:52:15 -0500 | [diff] [blame^] | 175 | /* utsname taken from the the process that starts the server */ |
| 176 | char nfsd_name[UNX_MAXNODENAME+1]; |
Jeff Layton | 7ea34ac | 2012-03-21 09:52:05 -0400 | [diff] [blame] | 177 | }; |
| 178 | |
Bryan Schumaker | 44e34da60 | 2012-11-29 11:40:39 -0500 | [diff] [blame] | 179 | /* Simple check to find out if a given net was properly initialized */ |
| 180 | #define nfsd_netns_ready(nn) ((nn)->sessionid_hashtbl) |
| 181 | |
Trond Myklebust | e333f3b | 2019-04-09 11:46:19 -0400 | [diff] [blame] | 182 | extern void nfsd_netns_free_versions(struct nfsd_net *nn); |
| 183 | |
Alexey Dobriyan | c7d03a0 | 2016-11-17 04:58:21 +0300 | [diff] [blame] | 184 | extern unsigned int nfsd_net_id; |
Trond Myklebust | 27c438f | 2019-09-02 13:02:56 -0400 | [diff] [blame] | 185 | |
| 186 | void nfsd_copy_boot_verifier(__be32 verf[2], struct nfsd_net *nn); |
| 187 | void nfsd_reset_boot_verifier(struct nfsd_net *nn); |
Jeff Layton | 7ea34ac | 2012-03-21 09:52:05 -0400 | [diff] [blame] | 188 | #endif /* __NFSD_NETNS_H__ */ |