Thomas Gleixner | 1621633 | 2019-05-19 15:51:31 +0200 | [diff] [blame] | 1 | /* SPDX-License-Identifier: GPL-2.0-or-later */ |
Jeff Layton | 7ea34ac | 2012-03-21 09:52:05 -0400 | [diff] [blame] | 2 | /* |
| 3 | * per net namespace data structures for nfsd |
| 4 | * |
| 5 | * Copyright (C) 2012, Jeff Layton <jlayton@redhat.com> |
Jeff Layton | 7ea34ac | 2012-03-21 09:52:05 -0400 | [diff] [blame] | 6 | */ |
| 7 | |
| 8 | #ifndef __NFSD_NETNS_H__ |
| 9 | #define __NFSD_NETNS_H__ |
| 10 | |
| 11 | #include <net/net_namespace.h> |
| 12 | #include <net/netns/generic.h> |
Amir Goldstein | e567b98 | 2021-01-06 09:52:35 +0200 | [diff] [blame] | 13 | #include <linux/percpu_counter.h> |
Chuck Lever | 91d2e9b | 2021-12-29 14:43:16 -0500 | [diff] [blame] | 14 | #include <linux/siphash.h> |
Jeff Layton | 7ea34ac | 2012-03-21 09:52:05 -0400 | [diff] [blame] | 15 | |
Stanislav Kinsbursky | 52e19c0 | 2012-11-14 18:21:16 +0300 | [diff] [blame] | 16 | /* Hash tables for nfs4_clientid state */ |
| 17 | #define CLIENT_HASH_BITS 4 |
| 18 | #define CLIENT_HASH_SIZE (1 << CLIENT_HASH_BITS) |
| 19 | #define CLIENT_HASH_MASK (CLIENT_HASH_SIZE - 1) |
| 20 | |
Stanislav Kinsbursky | 1872de0 | 2012-11-14 18:21:51 +0300 | [diff] [blame] | 21 | #define SESSION_HASH_SIZE 512 |
| 22 | |
Jeff Layton | 7ea34ac | 2012-03-21 09:52:05 -0400 | [diff] [blame] | 23 | struct cld_net; |
Stanislav Kinsbursky | 9a9c647 | 2012-12-04 14:29:27 +0300 | [diff] [blame] | 24 | struct nfsd4_client_tracking_ops; |
Jeff Layton | 7ea34ac | 2012-03-21 09:52:05 -0400 | [diff] [blame] | 25 | |
Amir Goldstein | e567b98 | 2021-01-06 09:52:35 +0200 | [diff] [blame] | 26 | enum { |
| 27 | /* cache misses due only to checksum comparison failures */ |
| 28 | NFSD_NET_PAYLOAD_MISSES, |
| 29 | /* amount of memory (in bytes) currently consumed by the DRC */ |
| 30 | NFSD_NET_DRC_MEM_USAGE, |
| 31 | NFSD_NET_COUNTERS_NUM |
| 32 | }; |
| 33 | |
Jeff Layton | 14a571a | 2014-08-05 15:13:30 -0400 | [diff] [blame] | 34 | /* |
| 35 | * Represents a nfsd "container". With respect to nfsv4 state tracking, the |
| 36 | * fields of interest are the *_id_hashtbls and the *_name_tree. These track |
| 37 | * the nfs4_client objects by either short or long form clientid. |
| 38 | * |
| 39 | * Each nfsd_net runs a nfs4_laundromat workqueue job when necessary to clean |
| 40 | * up expired clients and delegations within the container. |
| 41 | */ |
Jeff Layton | 7ea34ac | 2012-03-21 09:52:05 -0400 | [diff] [blame] | 42 | struct nfsd_net { |
| 43 | struct cld_net *cld_net; |
Stanislav Kinsbursky | b3853e0 | 2012-04-11 15:13:21 +0400 | [diff] [blame] | 44 | |
Stanislav Kinsbursky | e5f06f7 | 2012-04-11 15:13:28 +0400 | [diff] [blame] | 45 | struct cache_detail *svc_expkey_cache; |
Stanislav Kinsbursky | b3853e0 | 2012-04-11 15:13:21 +0400 | [diff] [blame] | 46 | struct cache_detail *svc_export_cache; |
Stanislav Kinsbursky | c2e76ef | 2012-04-11 17:32:51 +0400 | [diff] [blame] | 47 | |
| 48 | struct cache_detail *idtoname_cache; |
Stanislav Kinsbursky | 9e75a4d | 2012-04-11 17:32:58 +0400 | [diff] [blame] | 49 | struct cache_detail *nametoid_cache; |
Stanislav Kinsbursky | 5e1533c | 2012-07-25 16:56:58 +0400 | [diff] [blame] | 50 | |
| 51 | struct lock_manager nfsd4_manager; |
Stanislav Kinsbursky | a51c84e | 2012-07-25 16:57:37 +0400 | [diff] [blame] | 52 | bool grace_ended; |
Arnd Bergmann | 9cc7680 | 2019-10-31 15:53:13 +0100 | [diff] [blame] | 53 | time64_t boot_time; |
Stanislav Kinsbursky | 52e19c0 | 2012-11-14 18:21:16 +0300 | [diff] [blame] | 54 | |
J. Bruce Fields | e8a79fb | 2019-03-22 11:11:06 -0400 | [diff] [blame] | 55 | struct dentry *nfsd_client_dir; |
| 56 | |
Stanislav Kinsbursky | 52e19c0 | 2012-11-14 18:21:16 +0300 | [diff] [blame] | 57 | /* |
| 58 | * reclaim_str_hashtbl[] holds known client info from previous reset/reboot |
| 59 | * used in reboot/reset lease grace period processing |
Stanislav Kinsbursky | 382a62e | 2012-11-14 18:21:26 +0300 | [diff] [blame] | 60 | * |
| 61 | * conf_id_hashtbl[], and conf_name_tree hold confirmed |
| 62 | * setclientid_confirmed info. |
Stanislav Kinsbursky | a99454a | 2012-11-14 18:21:36 +0300 | [diff] [blame] | 63 | * |
| 64 | * unconf_str_hastbl[] and unconf_name_tree hold unconfirmed |
| 65 | * setclientid info. |
Stanislav Kinsbursky | 52e19c0 | 2012-11-14 18:21:16 +0300 | [diff] [blame] | 66 | */ |
| 67 | struct list_head *reclaim_str_hashtbl; |
| 68 | int reclaim_str_hashtbl_size; |
Stanislav Kinsbursky | 8daae4d | 2012-11-14 18:21:21 +0300 | [diff] [blame] | 69 | struct list_head *conf_id_hashtbl; |
Stanislav Kinsbursky | 382a62e | 2012-11-14 18:21:26 +0300 | [diff] [blame] | 70 | struct rb_root conf_name_tree; |
Stanislav Kinsbursky | 0a7ec37 | 2012-11-14 18:21:31 +0300 | [diff] [blame] | 71 | struct list_head *unconf_id_hashtbl; |
Stanislav Kinsbursky | a99454a | 2012-11-14 18:21:36 +0300 | [diff] [blame] | 72 | struct rb_root unconf_name_tree; |
Stanislav Kinsbursky | 1872de0 | 2012-11-14 18:21:51 +0300 | [diff] [blame] | 73 | struct list_head *sessionid_hashtbl; |
Stanislav Kinsbursky | 5ed58bb | 2012-11-14 18:21:56 +0300 | [diff] [blame] | 74 | /* |
| 75 | * client_lru holds client queue ordered by nfs4_client.cl_time |
| 76 | * for lease renewal. |
Stanislav Kinsbursky | 73758fed | 2012-11-14 18:22:01 +0300 | [diff] [blame] | 77 | * |
| 78 | * close_lru holds (open) stateowner queue ordered by nfs4_stateowner.so_time |
| 79 | * for last close replay. |
| 80 | * |
| 81 | * All of the above fields are protected by the client_mutex. |
Stanislav Kinsbursky | 5ed58bb | 2012-11-14 18:21:56 +0300 | [diff] [blame] | 82 | */ |
| 83 | struct list_head client_lru; |
Stanislav Kinsbursky | 73758fed | 2012-11-14 18:22:01 +0300 | [diff] [blame] | 84 | struct list_head close_lru; |
J. Bruce Fields | e8c69d1 | 2013-03-21 15:19:33 -0400 | [diff] [blame] | 85 | struct list_head del_recall_lru; |
Jeff Layton | 0cc11a6 | 2016-10-20 09:34:31 -0400 | [diff] [blame] | 86 | |
| 87 | /* protected by blocked_locks_lock */ |
Jeff Layton | 7919d0a | 2016-09-16 16:28:25 -0400 | [diff] [blame] | 88 | struct list_head blocked_locks_lru; |
Stanislav Kinsbursky | 0912128 | 2012-11-14 18:22:17 +0300 | [diff] [blame] | 89 | |
| 90 | struct delayed_work laundromat_work; |
Stanislav Kinsbursky | c9a4962 | 2012-11-26 15:21:58 +0300 | [diff] [blame] | 91 | |
| 92 | /* client_lock protects the client lru list and session hash table */ |
| 93 | spinlock_t client_lock; |
Stanislav Kinsbursky | 3a07336 | 2012-11-26 16:16:25 +0300 | [diff] [blame] | 94 | |
Jeff Layton | 0cc11a6 | 2016-10-20 09:34:31 -0400 | [diff] [blame] | 95 | /* protects blocked_locks_lru */ |
| 96 | spinlock_t blocked_locks_lock; |
| 97 | |
Stanislav Kinsbursky | 3a07336 | 2012-11-26 16:16:25 +0300 | [diff] [blame] | 98 | struct file *rec_file; |
Stanislav Kinsbursky | f141f79 | 2012-11-26 16:16:30 +0300 | [diff] [blame] | 99 | bool in_grace; |
Julia Lawall | 7c582e4 | 2015-11-22 08:22:10 +0100 | [diff] [blame] | 100 | const struct nfsd4_client_tracking_ops *client_tracking_ops; |
Stanislav Kinsbursky | 3d73371 | 2012-11-27 14:11:44 +0300 | [diff] [blame] | 101 | |
Arnd Bergmann | 20b7d86 | 2019-11-04 16:31:52 +0100 | [diff] [blame] | 102 | time64_t nfsd4_lease; |
| 103 | time64_t nfsd4_grace; |
J. Bruce Fields | 03f318c | 2018-06-08 12:28:47 -0400 | [diff] [blame] | 104 | bool somebody_reclaimed; |
Stanislav Kinsbursky | 2c2fe29 | 2012-12-06 14:23:14 +0300 | [diff] [blame] | 105 | |
Scott Mayhew | 362063a | 2019-03-26 18:06:28 -0400 | [diff] [blame] | 106 | bool track_reclaim_completes; |
| 107 | atomic_t nr_reclaim_complete; |
| 108 | |
Stanislav Kinsbursky | 2c2fe29 | 2012-12-06 14:23:14 +0300 | [diff] [blame] | 109 | bool nfsd_net_up; |
Kinglong Mee | 8ef6671 | 2013-12-31 13:17:30 +0800 | [diff] [blame] | 110 | bool lockd_up; |
Stanislav Kinsbursky | b9c0ef8 | 2012-12-06 14:23:19 +0300 | [diff] [blame] | 111 | |
Chuck Lever | 91d2e9b | 2021-12-29 14:43:16 -0500 | [diff] [blame] | 112 | seqlock_t writeverf_lock; |
| 113 | unsigned char writeverf[8]; |
Stanislav Kinsbursky | 9dd9845 | 2012-12-06 14:23:24 +0300 | [diff] [blame] | 114 | |
Jeff Layton | 5b8db00 | 2014-07-02 16:11:22 -0400 | [diff] [blame] | 115 | /* |
| 116 | * Max number of connections this nfsd container will allow. Defaults |
| 117 | * to '0' which is means that it bases this on the number of threads. |
| 118 | */ |
| 119 | unsigned int max_connections; |
| 120 | |
J. Bruce Fields | bf5ed3e | 2019-03-14 16:20:19 -0400 | [diff] [blame] | 121 | u32 clientid_base; |
Jeff Layton | 294ac32 | 2014-07-30 08:27:15 -0400 | [diff] [blame] | 122 | u32 clientid_counter; |
Kinglong Mee | 19311aa8 | 2015-07-18 07:33:31 +0800 | [diff] [blame] | 123 | u32 clverifier_counter; |
Jeff Layton | 294ac32 | 2014-07-30 08:27:15 -0400 | [diff] [blame] | 124 | |
Stanislav Kinsbursky | 9dd9845 | 2012-12-06 14:23:24 +0300 | [diff] [blame] | 125 | struct svc_serv *nfsd_serv; |
NeilBrown | ec52361 | 2021-11-29 15:51:25 +1100 | [diff] [blame] | 126 | /* When a listening socket is added to nfsd, keep_active is set |
| 127 | * and this justifies a reference on nfsd_serv. This stops |
| 128 | * nfsd_serv from being freed. When the number of threads is |
| 129 | * set, keep_active is cleared and the reference is dropped. So |
| 130 | * when the last thread exits, the service will be destroyed. |
| 131 | */ |
| 132 | int keep_active; |
Vasily Averin | 2317dc5 | 2017-11-10 10:19:35 +0300 | [diff] [blame] | 133 | |
Olga Kornievskaia | e0639dc | 2018-07-20 18:19:20 -0400 | [diff] [blame] | 134 | /* |
| 135 | * clientid and stateid data for construction of net unique COPY |
| 136 | * stateids. |
| 137 | */ |
| 138 | u32 s2s_cp_cl_id; |
| 139 | struct idr s2s_cp_stateids; |
| 140 | spinlock_t s2s_cp_lock; |
Trond Myklebust | e333f3b | 2019-04-09 11:46:19 -0400 | [diff] [blame] | 141 | |
| 142 | /* |
| 143 | * Version information |
| 144 | */ |
| 145 | bool *nfsd_versions; |
| 146 | bool *nfsd4_minorversions; |
J. Bruce Fields | 3ba7583 | 2019-05-17 09:03:38 -0400 | [diff] [blame] | 147 | |
| 148 | /* |
| 149 | * Duplicate reply cache |
| 150 | */ |
| 151 | struct nfsd_drc_bucket *drc_hashtbl; |
J. Bruce Fields | 3ba7583 | 2019-05-17 09:03:38 -0400 | [diff] [blame] | 152 | |
| 153 | /* max number of entries allowed in the cache */ |
| 154 | unsigned int max_drc_entries; |
| 155 | |
| 156 | /* number of significant bits in the hash value */ |
| 157 | unsigned int maskbits; |
| 158 | unsigned int drc_hashsize; |
| 159 | |
| 160 | /* |
J. Bruce Fields | 22a46eb4 | 2019-05-17 16:22:18 -0400 | [diff] [blame] | 161 | * Stats and other tracking of on the duplicate reply cache. |
Amir Goldstein | e567b98 | 2021-01-06 09:52:35 +0200 | [diff] [blame] | 162 | * The longest_chain* fields are modified with only the per-bucket |
| 163 | * cache lock, which isn't really safe and should be fixed if we want |
| 164 | * these statistics to be completely accurate. |
J. Bruce Fields | 3ba7583 | 2019-05-17 09:03:38 -0400 | [diff] [blame] | 165 | */ |
| 166 | |
| 167 | /* total number of entries */ |
| 168 | atomic_t num_drc_entries; |
| 169 | |
Amir Goldstein | e567b98 | 2021-01-06 09:52:35 +0200 | [diff] [blame] | 170 | /* Per-netns stats counters */ |
| 171 | struct percpu_counter counter[NFSD_NET_COUNTERS_NUM]; |
J. Bruce Fields | 3ba7583 | 2019-05-17 09:03:38 -0400 | [diff] [blame] | 172 | |
| 173 | /* longest hash chain seen */ |
| 174 | unsigned int longest_chain; |
| 175 | |
| 176 | /* size of cache when we saw the longest hash chain */ |
| 177 | unsigned int longest_chain_cachesize; |
| 178 | |
| 179 | struct shrinker nfsd_reply_cache_shrinker; |
Dai Ngo | f4e44b3 | 2021-05-21 15:09:37 -0400 | [diff] [blame] | 180 | |
| 181 | /* tracking server-to-server copy mounts */ |
| 182 | spinlock_t nfsd_ssc_lock; |
| 183 | struct list_head nfsd_ssc_mount_list; |
| 184 | wait_queue_head_t nfsd_ssc_waitq; |
| 185 | |
Randy Dunlap | 94a4bea | 2020-07-19 17:14:03 -0700 | [diff] [blame] | 186 | /* utsname taken from the process that starts the server */ |
Scott Mayhew | 7627d7d | 2020-02-19 15:52:15 -0500 | [diff] [blame] | 187 | char nfsd_name[UNX_MAXNODENAME+1]; |
NeilBrown | 1463b38 | 2021-12-01 10:58:14 +1100 | [diff] [blame] | 188 | |
| 189 | struct nfsd_fcache_disposal *fcache_disposal; |
Chuck Lever | 91d2e9b | 2021-12-29 14:43:16 -0500 | [diff] [blame] | 190 | |
| 191 | siphash_key_t siphash_key; |
Jeff Layton | 7ea34ac | 2012-03-21 09:52:05 -0400 | [diff] [blame] | 192 | }; |
| 193 | |
Bryan Schumaker | 44e34da60 | 2012-11-29 11:40:39 -0500 | [diff] [blame] | 194 | /* Simple check to find out if a given net was properly initialized */ |
| 195 | #define nfsd_netns_ready(nn) ((nn)->sessionid_hashtbl) |
| 196 | |
Trond Myklebust | e333f3b | 2019-04-09 11:46:19 -0400 | [diff] [blame] | 197 | extern void nfsd_netns_free_versions(struct nfsd_net *nn); |
| 198 | |
Alexey Dobriyan | c7d03a0 | 2016-11-17 04:58:21 +0300 | [diff] [blame] | 199 | extern unsigned int nfsd_net_id; |
Trond Myklebust | 27c438f | 2019-09-02 13:02:56 -0400 | [diff] [blame] | 200 | |
Chuck Lever | 3988a57 | 2021-12-30 10:22:05 -0500 | [diff] [blame] | 201 | void nfsd_copy_write_verifier(__be32 verf[2], struct nfsd_net *nn); |
| 202 | void nfsd_reset_write_verifier(struct nfsd_net *nn); |
Jeff Layton | 7ea34ac | 2012-03-21 09:52:05 -0400 | [diff] [blame] | 203 | #endif /* __NFSD_NETNS_H__ */ |