blob: 14ec15656320903b2bdc9b2426b462498050e7d1 [file] [log] [blame]
Thomas Gleixner16216332019-05-19 15:51:31 +02001/* SPDX-License-Identifier: GPL-2.0-or-later */
Jeff Layton7ea34ac2012-03-21 09:52:05 -04002/*
3 * per net namespace data structures for nfsd
4 *
5 * Copyright (C) 2012, Jeff Layton <jlayton@redhat.com>
Jeff Layton7ea34ac2012-03-21 09:52:05 -04006 */
7
8#ifndef __NFSD_NETNS_H__
9#define __NFSD_NETNS_H__
10
11#include <net/net_namespace.h>
12#include <net/netns/generic.h>
Jeff Layton5970e152022-11-20 09:15:34 -050013#include <linux/filelock.h>
Josef Bacik4b1488542024-01-26 10:39:47 -050014#include <linux/nfs4.h>
Amir Goldsteine567b982021-01-06 09:52:35 +020015#include <linux/percpu_counter.h>
Chuck Lever91d2e9b2021-12-29 14:43:16 -050016#include <linux/siphash.h>
Josef Bacik16fb9802024-01-26 10:39:49 -050017#include <linux/sunrpc/stats.h>
Jeff Layton7ea34ac2012-03-21 09:52:05 -040018
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +030019/* Hash tables for nfs4_clientid state */
20#define CLIENT_HASH_BITS 4
21#define CLIENT_HASH_SIZE (1 << CLIENT_HASH_BITS)
22#define CLIENT_HASH_MASK (CLIENT_HASH_SIZE - 1)
23
Stanislav Kinsbursky1872de02012-11-14 18:21:51 +030024#define SESSION_HASH_SIZE 512
25
Jeff Layton7ea34ac2012-03-21 09:52:05 -040026struct cld_net;
Stanislav Kinsbursky9a9c6472012-12-04 14:29:27 +030027struct nfsd4_client_tracking_ops;
Jeff Layton7ea34ac2012-03-21 09:52:05 -040028
Amir Goldsteine567b982021-01-06 09:52:35 +020029enum {
30 /* cache misses due only to checksum comparison failures */
Josef Bacikd98416c2024-01-26 10:39:45 -050031 NFSD_STATS_PAYLOAD_MISSES,
Amir Goldsteine567b982021-01-06 09:52:35 +020032 /* amount of memory (in bytes) currently consumed by the DRC */
Josef Bacikd98416c2024-01-26 10:39:45 -050033 NFSD_STATS_DRC_MEM_USAGE,
Josef Bacik4b1488542024-01-26 10:39:47 -050034 NFSD_STATS_RC_HITS, /* repcache hits */
35 NFSD_STATS_RC_MISSES, /* repcache misses */
36 NFSD_STATS_RC_NOCACHE, /* uncached reqs */
37 NFSD_STATS_FH_STALE, /* FH stale error */
38 NFSD_STATS_IO_READ, /* bytes returned to read requests */
39 NFSD_STATS_IO_WRITE, /* bytes passed in write requests */
40#ifdef CONFIG_NFSD_V4
41 NFSD_STATS_FIRST_NFS4_OP, /* count of individual nfsv4 operations */
42 NFSD_STATS_LAST_NFS4_OP = NFSD_STATS_FIRST_NFS4_OP + LAST_NFS4_OP,
43#define NFSD_STATS_NFS4_OP(op) (NFSD_STATS_FIRST_NFS4_OP + (op))
44 NFSD_STATS_WDELEG_GETATTR, /* count of getattr conflict with wdeleg */
45#endif
46 NFSD_STATS_COUNTERS_NUM
Amir Goldsteine567b982021-01-06 09:52:35 +020047};
48
Jeff Layton14a571a2014-08-05 15:13:30 -040049/*
50 * Represents a nfsd "container". With respect to nfsv4 state tracking, the
51 * fields of interest are the *_id_hashtbls and the *_name_tree. These track
52 * the nfs4_client objects by either short or long form clientid.
53 *
54 * Each nfsd_net runs a nfs4_laundromat workqueue job when necessary to clean
55 * up expired clients and delegations within the container.
56 */
Jeff Layton7ea34ac2012-03-21 09:52:05 -040057struct nfsd_net {
58 struct cld_net *cld_net;
Stanislav Kinsburskyb3853e02012-04-11 15:13:21 +040059
Stanislav Kinsburskye5f06f72012-04-11 15:13:28 +040060 struct cache_detail *svc_expkey_cache;
Stanislav Kinsburskyb3853e02012-04-11 15:13:21 +040061 struct cache_detail *svc_export_cache;
Stanislav Kinsburskyc2e76ef2012-04-11 17:32:51 +040062
63 struct cache_detail *idtoname_cache;
Stanislav Kinsbursky9e75a4d2012-04-11 17:32:58 +040064 struct cache_detail *nametoid_cache;
Stanislav Kinsbursky5e1533c2012-07-25 16:56:58 +040065
66 struct lock_manager nfsd4_manager;
Stanislav Kinsburskya51c84e2012-07-25 16:57:37 +040067 bool grace_ended;
Arnd Bergmann9cc76802019-10-31 15:53:13 +010068 time64_t boot_time;
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +030069
J. Bruce Fieldse8a79fb2019-03-22 11:11:06 -040070 struct dentry *nfsd_client_dir;
71
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +030072 /*
73 * reclaim_str_hashtbl[] holds known client info from previous reset/reboot
74 * used in reboot/reset lease grace period processing
Stanislav Kinsbursky382a62e2012-11-14 18:21:26 +030075 *
76 * conf_id_hashtbl[], and conf_name_tree hold confirmed
77 * setclientid_confirmed info.
Stanislav Kinsburskya99454a2012-11-14 18:21:36 +030078 *
79 * unconf_str_hastbl[] and unconf_name_tree hold unconfirmed
80 * setclientid info.
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +030081 */
82 struct list_head *reclaim_str_hashtbl;
83 int reclaim_str_hashtbl_size;
Stanislav Kinsbursky8daae4d2012-11-14 18:21:21 +030084 struct list_head *conf_id_hashtbl;
Stanislav Kinsbursky382a62e2012-11-14 18:21:26 +030085 struct rb_root conf_name_tree;
Stanislav Kinsbursky0a7ec372012-11-14 18:21:31 +030086 struct list_head *unconf_id_hashtbl;
Stanislav Kinsburskya99454a2012-11-14 18:21:36 +030087 struct rb_root unconf_name_tree;
Stanislav Kinsbursky1872de02012-11-14 18:21:51 +030088 struct list_head *sessionid_hashtbl;
Stanislav Kinsbursky5ed58bb2012-11-14 18:21:56 +030089 /*
90 * client_lru holds client queue ordered by nfs4_client.cl_time
91 * for lease renewal.
Stanislav Kinsbursky73758fed2012-11-14 18:22:01 +030092 *
93 * close_lru holds (open) stateowner queue ordered by nfs4_stateowner.so_time
94 * for last close replay.
95 *
96 * All of the above fields are protected by the client_mutex.
Stanislav Kinsbursky5ed58bb2012-11-14 18:21:56 +030097 */
98 struct list_head client_lru;
Stanislav Kinsbursky73758fed2012-11-14 18:22:01 +030099 struct list_head close_lru;
J. Bruce Fieldse8c69d12013-03-21 15:19:33 -0400100 struct list_head del_recall_lru;
Jeff Layton0cc11a62016-10-20 09:34:31 -0400101
102 /* protected by blocked_locks_lock */
Jeff Layton7919d0a2016-09-16 16:28:25 -0400103 struct list_head blocked_locks_lru;
Stanislav Kinsbursky09121282012-11-14 18:22:17 +0300104
105 struct delayed_work laundromat_work;
Stanislav Kinsburskyc9a49622012-11-26 15:21:58 +0300106
107 /* client_lock protects the client lru list and session hash table */
108 spinlock_t client_lock;
Stanislav Kinsbursky3a0733692012-11-26 16:16:25 +0300109
Jeff Layton0cc11a62016-10-20 09:34:31 -0400110 /* protects blocked_locks_lru */
111 spinlock_t blocked_locks_lock;
112
Stanislav Kinsbursky3a0733692012-11-26 16:16:25 +0300113 struct file *rec_file;
Stanislav Kinsburskyf141f792012-11-26 16:16:30 +0300114 bool in_grace;
Julia Lawall7c582e42015-11-22 08:22:10 +0100115 const struct nfsd4_client_tracking_ops *client_tracking_ops;
Stanislav Kinsbursky3d733712012-11-27 14:11:44 +0300116
Arnd Bergmann20b7d862019-11-04 16:31:52 +0100117 time64_t nfsd4_lease;
118 time64_t nfsd4_grace;
J. Bruce Fields03f318c2018-06-08 12:28:47 -0400119 bool somebody_reclaimed;
Stanislav Kinsbursky2c2fe292012-12-06 14:23:14 +0300120
Scott Mayhew362063a2019-03-26 18:06:28 -0400121 bool track_reclaim_completes;
122 atomic_t nr_reclaim_complete;
123
Stanislav Kinsbursky2c2fe292012-12-06 14:23:14 +0300124 bool nfsd_net_up;
Kinglong Mee8ef66712013-12-31 13:17:30 +0800125 bool lockd_up;
Stanislav Kinsburskyb9c0ef82012-12-06 14:23:19 +0300126
Chuck Lever91d2e9b2021-12-29 14:43:16 -0500127 seqlock_t writeverf_lock;
128 unsigned char writeverf[8];
Stanislav Kinsbursky9dd98452012-12-06 14:23:24 +0300129
Jeff Layton5b8db002014-07-02 16:11:22 -0400130 /*
131 * Max number of connections this nfsd container will allow. Defaults
132 * to '0' which is means that it bases this on the number of threads.
133 */
134 unsigned int max_connections;
135
J. Bruce Fieldsbf5ed3e2019-03-14 16:20:19 -0400136 u32 clientid_base;
Jeff Layton294ac322014-07-30 08:27:15 -0400137 u32 clientid_counter;
Kinglong Mee19311aa82015-07-18 07:33:31 +0800138 u32 clverifier_counter;
Jeff Layton294ac322014-07-30 08:27:15 -0400139
NeilBrown7b207cc2023-12-15 11:56:32 +1100140 struct svc_info nfsd_info;
141#define nfsd_serv nfsd_info.serv
142
Vasily Averin2317dc52017-11-10 10:19:35 +0300143
Olga Kornievskaiae0639dc2018-07-20 18:19:20 -0400144 /*
145 * clientid and stateid data for construction of net unique COPY
146 * stateids.
147 */
148 u32 s2s_cp_cl_id;
149 struct idr s2s_cp_stateids;
150 spinlock_t s2s_cp_lock;
Trond Myklebuste333f3b2019-04-09 11:46:19 -0400151
152 /*
153 * Version information
154 */
155 bool *nfsd_versions;
156 bool *nfsd4_minorversions;
J. Bruce Fields3ba75832019-05-17 09:03:38 -0400157
158 /*
159 * Duplicate reply cache
160 */
161 struct nfsd_drc_bucket *drc_hashtbl;
J. Bruce Fields3ba75832019-05-17 09:03:38 -0400162
163 /* max number of entries allowed in the cache */
164 unsigned int max_drc_entries;
165
166 /* number of significant bits in the hash value */
167 unsigned int maskbits;
168 unsigned int drc_hashsize;
169
170 /*
J. Bruce Fields22a46eb42019-05-17 16:22:18 -0400171 * Stats and other tracking of on the duplicate reply cache.
Amir Goldsteine567b982021-01-06 09:52:35 +0200172 * The longest_chain* fields are modified with only the per-bucket
173 * cache lock, which isn't really safe and should be fixed if we want
174 * these statistics to be completely accurate.
J. Bruce Fields3ba75832019-05-17 09:03:38 -0400175 */
176
177 /* total number of entries */
178 atomic_t num_drc_entries;
179
Amir Goldsteine567b982021-01-06 09:52:35 +0200180 /* Per-netns stats counters */
Josef Bacik4b1488542024-01-26 10:39:47 -0500181 struct percpu_counter counter[NFSD_STATS_COUNTERS_NUM];
J. Bruce Fields3ba75832019-05-17 09:03:38 -0400182
Josef Bacik16fb9802024-01-26 10:39:49 -0500183 /* sunrpc svc stats */
184 struct svc_stat nfsd_svcstats;
185
J. Bruce Fields3ba75832019-05-17 09:03:38 -0400186 /* longest hash chain seen */
187 unsigned int longest_chain;
188
189 /* size of cache when we saw the longest hash chain */
190 unsigned int longest_chain_cachesize;
191
Qi Zheng8eea99a2023-09-11 17:44:32 +0800192 struct shrinker *nfsd_reply_cache_shrinker;
Dai Ngof4e44b32021-05-21 15:09:37 -0400193
194 /* tracking server-to-server copy mounts */
195 spinlock_t nfsd_ssc_lock;
196 struct list_head nfsd_ssc_mount_list;
197 wait_queue_head_t nfsd_ssc_waitq;
198
Randy Dunlap94a4bea2020-07-19 17:14:03 -0700199 /* utsname taken from the process that starts the server */
Scott Mayhew7627d7d2020-02-19 15:52:15 -0500200 char nfsd_name[UNX_MAXNODENAME+1];
NeilBrown1463b38e2021-12-01 10:58:14 +1100201
202 struct nfsd_fcache_disposal *fcache_disposal;
Chuck Lever91d2e9b2021-12-29 14:43:16 -0500203
204 siphash_key_t siphash_key;
Dai Ngo0926c3952022-07-15 16:54:52 -0700205
206 atomic_t nfs4_client_count;
Dai Ngo4271c2c2022-07-15 16:54:53 -0700207 int nfs4_max_clients;
Dai Ngo3a4ea23d2022-09-14 08:54:25 -0700208
209 atomic_t nfsd_courtesy_clients;
Qi Zhengd17452a2023-09-11 17:44:31 +0800210 struct shrinker *nfsd_client_shrinker;
Dai Ngo7c24fa22023-01-11 16:06:51 -0800211 struct work_struct nfsd_shrinker_work;
NeilBrownd688d852024-01-30 12:08:29 +1100212
213 /* last time an admin-revoke happened for NFSv4.0 */
214 time64_t nfs40_last_revoke;
215
Jeff Layton7ea34ac2012-03-21 09:52:05 -0400216};
217
Bryan Schumaker44e34da602012-11-29 11:40:39 -0500218/* Simple check to find out if a given net was properly initialized */
219#define nfsd_netns_ready(nn) ((nn)->sessionid_hashtbl)
220
Lorenzo Bianconi5a939be2024-04-23 15:25:41 +0200221extern bool nfsd_support_version(int vers);
Trond Myklebuste333f3b2019-04-09 11:46:19 -0400222extern void nfsd_netns_free_versions(struct nfsd_net *nn);
223
Alexey Dobriyanc7d03a02016-11-17 04:58:21 +0300224extern unsigned int nfsd_net_id;
Trond Myklebust27c438f2019-09-02 13:02:56 -0400225
Chuck Lever3988a572021-12-30 10:22:05 -0500226void nfsd_copy_write_verifier(__be32 verf[2], struct nfsd_net *nn);
227void nfsd_reset_write_verifier(struct nfsd_net *nn);
Jeff Layton7ea34ac2012-03-21 09:52:05 -0400228#endif /* __NFSD_NETNS_H__ */