blob: 935c1028c21755ecc3f1f25dcba23d6094342367 [file] [log] [blame]
Thomas Gleixner16216332019-05-19 15:51:31 +02001/* SPDX-License-Identifier: GPL-2.0-or-later */
Jeff Layton7ea34ac2012-03-21 09:52:05 -04002/*
3 * per net namespace data structures for nfsd
4 *
5 * Copyright (C) 2012, Jeff Layton <jlayton@redhat.com>
Jeff Layton7ea34ac2012-03-21 09:52:05 -04006 */
7
8#ifndef __NFSD_NETNS_H__
9#define __NFSD_NETNS_H__
10
11#include <net/net_namespace.h>
12#include <net/netns/generic.h>
Amir Goldsteine567b982021-01-06 09:52:35 +020013#include <linux/percpu_counter.h>
Jeff Layton7ea34ac2012-03-21 09:52:05 -040014
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +030015/* Hash tables for nfs4_clientid state */
16#define CLIENT_HASH_BITS 4
17#define CLIENT_HASH_SIZE (1 << CLIENT_HASH_BITS)
18#define CLIENT_HASH_MASK (CLIENT_HASH_SIZE - 1)
19
Stanislav Kinsbursky1872de02012-11-14 18:21:51 +030020#define SESSION_HASH_SIZE 512
21
Jeff Layton7ea34ac2012-03-21 09:52:05 -040022struct cld_net;
Stanislav Kinsbursky9a9c6472012-12-04 14:29:27 +030023struct nfsd4_client_tracking_ops;
Jeff Layton7ea34ac2012-03-21 09:52:05 -040024
Amir Goldsteine567b982021-01-06 09:52:35 +020025enum {
26 /* cache misses due only to checksum comparison failures */
27 NFSD_NET_PAYLOAD_MISSES,
28 /* amount of memory (in bytes) currently consumed by the DRC */
29 NFSD_NET_DRC_MEM_USAGE,
30 NFSD_NET_COUNTERS_NUM
31};
32
Jeff Layton14a571a2014-08-05 15:13:30 -040033/*
34 * Represents a nfsd "container". With respect to nfsv4 state tracking, the
35 * fields of interest are the *_id_hashtbls and the *_name_tree. These track
36 * the nfs4_client objects by either short or long form clientid.
37 *
38 * Each nfsd_net runs a nfs4_laundromat workqueue job when necessary to clean
39 * up expired clients and delegations within the container.
40 */
Jeff Layton7ea34ac2012-03-21 09:52:05 -040041struct nfsd_net {
42 struct cld_net *cld_net;
Stanislav Kinsburskyb3853e02012-04-11 15:13:21 +040043
Stanislav Kinsburskye5f06f72012-04-11 15:13:28 +040044 struct cache_detail *svc_expkey_cache;
Stanislav Kinsburskyb3853e02012-04-11 15:13:21 +040045 struct cache_detail *svc_export_cache;
Stanislav Kinsburskyc2e76ef2012-04-11 17:32:51 +040046
47 struct cache_detail *idtoname_cache;
Stanislav Kinsbursky9e75a4d2012-04-11 17:32:58 +040048 struct cache_detail *nametoid_cache;
Stanislav Kinsbursky5e1533c2012-07-25 16:56:58 +040049
50 struct lock_manager nfsd4_manager;
Stanislav Kinsburskya51c84e2012-07-25 16:57:37 +040051 bool grace_ended;
Arnd Bergmann9cc76802019-10-31 15:53:13 +010052 time64_t boot_time;
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +030053
J. Bruce Fieldse8a79fb2019-03-22 11:11:06 -040054 struct dentry *nfsd_client_dir;
55
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +030056 /*
57 * reclaim_str_hashtbl[] holds known client info from previous reset/reboot
58 * used in reboot/reset lease grace period processing
Stanislav Kinsbursky382a62e2012-11-14 18:21:26 +030059 *
60 * conf_id_hashtbl[], and conf_name_tree hold confirmed
61 * setclientid_confirmed info.
Stanislav Kinsburskya99454a2012-11-14 18:21:36 +030062 *
63 * unconf_str_hastbl[] and unconf_name_tree hold unconfirmed
64 * setclientid info.
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +030065 */
66 struct list_head *reclaim_str_hashtbl;
67 int reclaim_str_hashtbl_size;
Stanislav Kinsbursky8daae4d2012-11-14 18:21:21 +030068 struct list_head *conf_id_hashtbl;
Stanislav Kinsbursky382a62e2012-11-14 18:21:26 +030069 struct rb_root conf_name_tree;
Stanislav Kinsbursky0a7ec372012-11-14 18:21:31 +030070 struct list_head *unconf_id_hashtbl;
Stanislav Kinsburskya99454a2012-11-14 18:21:36 +030071 struct rb_root unconf_name_tree;
Stanislav Kinsbursky1872de02012-11-14 18:21:51 +030072 struct list_head *sessionid_hashtbl;
Stanislav Kinsbursky5ed58bb2012-11-14 18:21:56 +030073 /*
74 * client_lru holds client queue ordered by nfs4_client.cl_time
75 * for lease renewal.
Stanislav Kinsbursky73758fed2012-11-14 18:22:01 +030076 *
77 * close_lru holds (open) stateowner queue ordered by nfs4_stateowner.so_time
78 * for last close replay.
79 *
80 * All of the above fields are protected by the client_mutex.
Stanislav Kinsbursky5ed58bb2012-11-14 18:21:56 +030081 */
82 struct list_head client_lru;
Stanislav Kinsbursky73758fed2012-11-14 18:22:01 +030083 struct list_head close_lru;
J. Bruce Fieldse8c69d12013-03-21 15:19:33 -040084 struct list_head del_recall_lru;
Jeff Layton0cc11a62016-10-20 09:34:31 -040085
86 /* protected by blocked_locks_lock */
Jeff Layton7919d0a2016-09-16 16:28:25 -040087 struct list_head blocked_locks_lru;
Stanislav Kinsbursky09121282012-11-14 18:22:17 +030088
89 struct delayed_work laundromat_work;
Stanislav Kinsburskyc9a49622012-11-26 15:21:58 +030090
91 /* client_lock protects the client lru list and session hash table */
92 spinlock_t client_lock;
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +030093
Jeff Layton0cc11a62016-10-20 09:34:31 -040094 /* protects blocked_locks_lru */
95 spinlock_t blocked_locks_lock;
96
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +030097 struct file *rec_file;
Stanislav Kinsburskyf141f792012-11-26 16:16:30 +030098 bool in_grace;
Julia Lawall7c582e42015-11-22 08:22:10 +010099 const struct nfsd4_client_tracking_ops *client_tracking_ops;
Stanislav Kinsbursky3d733712012-11-27 14:11:44 +0300100
Arnd Bergmann20b7d862019-11-04 16:31:52 +0100101 time64_t nfsd4_lease;
102 time64_t nfsd4_grace;
J. Bruce Fields03f318c2018-06-08 12:28:47 -0400103 bool somebody_reclaimed;
Stanislav Kinsbursky2c2fe292012-12-06 14:23:14 +0300104
Scott Mayhew362063a2019-03-26 18:06:28 -0400105 bool track_reclaim_completes;
106 atomic_t nr_reclaim_complete;
107
Stanislav Kinsbursky2c2fe292012-12-06 14:23:14 +0300108 bool nfsd_net_up;
Kinglong Mee8ef66712013-12-31 13:17:30 +0800109 bool lockd_up;
Stanislav Kinsburskyb9c0ef82012-12-06 14:23:19 +0300110
Jeff Layton294ac322014-07-30 08:27:15 -0400111 /* Time of server startup */
Arnd Bergmann256a89f2017-10-19 12:04:11 +0200112 struct timespec64 nfssvc_boot;
Trond Myklebust27c438f2019-09-02 13:02:56 -0400113 seqlock_t boot_lock;
Stanislav Kinsbursky9dd98452012-12-06 14:23:24 +0300114
Jeff Layton5b8db002014-07-02 16:11:22 -0400115 /*
116 * Max number of connections this nfsd container will allow. Defaults
117 * to '0' which is means that it bases this on the number of threads.
118 */
119 unsigned int max_connections;
120
J. Bruce Fieldsbf5ed3e2019-03-14 16:20:19 -0400121 u32 clientid_base;
Jeff Layton294ac322014-07-30 08:27:15 -0400122 u32 clientid_counter;
Kinglong Mee19311aa82015-07-18 07:33:31 +0800123 u32 clverifier_counter;
Jeff Layton294ac322014-07-30 08:27:15 -0400124
Stanislav Kinsbursky9dd98452012-12-06 14:23:24 +0300125 struct svc_serv *nfsd_serv;
Vasily Averin2317dc52017-11-10 10:19:35 +0300126
127 wait_queue_head_t ntf_wq;
128 atomic_t ntf_refcnt;
Olga Kornievskaiae0639dc2018-07-20 18:19:20 -0400129
Trond Myklebustc6c7f2a2021-03-13 16:08:47 -0500130 /* Allow umount to wait for nfsd state cleanup */
131 struct completion nfsd_shutdown_complete;
132
Olga Kornievskaiae0639dc2018-07-20 18:19:20 -0400133 /*
134 * clientid and stateid data for construction of net unique COPY
135 * stateids.
136 */
137 u32 s2s_cp_cl_id;
138 struct idr s2s_cp_stateids;
139 spinlock_t s2s_cp_lock;
Trond Myklebuste333f3b2019-04-09 11:46:19 -0400140
141 /*
142 * Version information
143 */
144 bool *nfsd_versions;
145 bool *nfsd4_minorversions;
J. Bruce Fields3ba75832019-05-17 09:03:38 -0400146
147 /*
148 * Duplicate reply cache
149 */
150 struct nfsd_drc_bucket *drc_hashtbl;
J. Bruce Fields3ba75832019-05-17 09:03:38 -0400151
152 /* max number of entries allowed in the cache */
153 unsigned int max_drc_entries;
154
155 /* number of significant bits in the hash value */
156 unsigned int maskbits;
157 unsigned int drc_hashsize;
158
159 /*
J. Bruce Fields22a46eb42019-05-17 16:22:18 -0400160 * Stats and other tracking of on the duplicate reply cache.
Amir Goldsteine567b982021-01-06 09:52:35 +0200161 * The longest_chain* fields are modified with only the per-bucket
162 * cache lock, which isn't really safe and should be fixed if we want
163 * these statistics to be completely accurate.
J. Bruce Fields3ba75832019-05-17 09:03:38 -0400164 */
165
166 /* total number of entries */
167 atomic_t num_drc_entries;
168
Amir Goldsteine567b982021-01-06 09:52:35 +0200169 /* Per-netns stats counters */
170 struct percpu_counter counter[NFSD_NET_COUNTERS_NUM];
J. Bruce Fields3ba75832019-05-17 09:03:38 -0400171
172 /* longest hash chain seen */
173 unsigned int longest_chain;
174
175 /* size of cache when we saw the longest hash chain */
176 unsigned int longest_chain_cachesize;
177
178 struct shrinker nfsd_reply_cache_shrinker;
Dai Ngof4e44b32021-05-21 15:09:37 -0400179
180 /* tracking server-to-server copy mounts */
181 spinlock_t nfsd_ssc_lock;
182 struct list_head nfsd_ssc_mount_list;
183 wait_queue_head_t nfsd_ssc_waitq;
184
Randy Dunlap94a4bea2020-07-19 17:14:03 -0700185 /* utsname taken from the process that starts the server */
Scott Mayhew7627d7d2020-02-19 15:52:15 -0500186 char nfsd_name[UNX_MAXNODENAME+1];
Jeff Layton7ea34ac2012-03-21 09:52:05 -0400187};
188
Bryan Schumaker44e34da602012-11-29 11:40:39 -0500189/* Simple check to find out if a given net was properly initialized */
190#define nfsd_netns_ready(nn) ((nn)->sessionid_hashtbl)
191
Trond Myklebuste333f3b2019-04-09 11:46:19 -0400192extern void nfsd_netns_free_versions(struct nfsd_net *nn);
193
Alexey Dobriyanc7d03a02016-11-17 04:58:21 +0300194extern unsigned int nfsd_net_id;
Trond Myklebust27c438f2019-09-02 13:02:56 -0400195
196void nfsd_copy_boot_verifier(__be32 verf[2], struct nfsd_net *nn);
197void nfsd_reset_boot_verifier(struct nfsd_net *nn);
Jeff Layton7ea34ac2012-03-21 09:52:05 -0400198#endif /* __NFSD_NETNS_H__ */