2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2001 The Regents of the University of Michigan.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Kendrick Smith <kmsmith@umich.edu>
|
|
|
|
* Andy Adamson <andros@umich.edu>
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. Neither the name of the University nor the names of its
|
|
|
|
* contributors may be used to endorse or promote products derived
|
|
|
|
* from this software without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
|
|
|
|
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
|
|
* DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
|
|
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
|
|
|
|
* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
|
|
|
|
* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
|
|
|
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef _NFSD4_STATE_H
|
|
|
|
#define _NFSD4_STATE_H
|
|
|
|
|
2011-09-24 05:01:19 +08:00
|
|
|
#include <linux/idr.h>
|
2017-10-20 17:53:28 +08:00
|
|
|
#include <linux/refcount.h>
|
2010-06-07 06:37:16 +08:00
|
|
|
#include <linux/sunrpc/svc_xprt.h>
|
2009-12-05 08:36:06 +08:00
|
|
|
#include "nfsfh.h"
|
2019-03-22 23:11:06 +08:00
|
|
|
#include "nfsd.h"
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
u32 cl_boot;
|
|
|
|
u32 cl_id;
|
|
|
|
} clientid_t;
|
|
|
|
|
|
|
|
typedef struct {
|
2011-09-16 03:02:41 +08:00
|
|
|
clientid_t so_clid;
|
|
|
|
u32 so_id;
|
2005-04-17 06:20:36 +08:00
|
|
|
} stateid_opaque_t;
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
u32 si_generation;
|
|
|
|
stateid_opaque_t si_opaque;
|
|
|
|
} stateid_t;
|
|
|
|
|
2019-10-05 04:34:26 +08:00
|
|
|
typedef struct {
|
|
|
|
stateid_t stid;
|
|
|
|
#define NFS4_COPY_STID 1
|
|
|
|
#define NFS4_COPYNOTIFY_STID 2
|
|
|
|
unsigned char sc_type;
|
|
|
|
refcount_t sc_count;
|
|
|
|
} copy_stateid_t;
|
|
|
|
|
2009-10-19 18:04:53 +08:00
|
|
|
#define STATEID_FMT "(%08x/%08x/%08x/%08x)"
|
|
|
|
#define STATEID_VAL(s) \
|
2011-09-16 03:02:41 +08:00
|
|
|
(s)->si_opaque.so_clid.cl_boot, \
|
|
|
|
(s)->si_opaque.so_clid.cl_id, \
|
|
|
|
(s)->si_opaque.so_id, \
|
2009-10-19 18:04:53 +08:00
|
|
|
(s)->si_generation
|
|
|
|
|
2010-02-19 00:27:24 +08:00
|
|
|
struct nfsd4_callback {
|
2010-06-01 06:21:37 +08:00
|
|
|
struct nfs4_client *cb_clp;
|
2010-05-17 04:47:08 +08:00
|
|
|
struct rpc_message cb_msg;
|
2015-11-22 05:57:39 +08:00
|
|
|
const struct nfsd4_callback_ops *cb_ops;
|
2010-03-04 03:52:55 +08:00
|
|
|
struct work_struct cb_work;
|
2015-06-24 16:33:37 +08:00
|
|
|
int cb_seq_status;
|
2015-04-30 17:49:23 +08:00
|
|
|
int cb_status;
|
2015-04-30 17:49:24 +08:00
|
|
|
bool cb_need_restart;
|
2019-04-05 23:54:37 +08:00
|
|
|
bool cb_holds_slot;
|
2010-02-19 00:27:24 +08:00
|
|
|
};
|
|
|
|
|
2014-09-24 18:19:19 +08:00
|
|
|
struct nfsd4_callback_ops {
|
|
|
|
void (*prepare)(struct nfsd4_callback *);
|
|
|
|
int (*done)(struct nfsd4_callback *, struct rpc_task *);
|
|
|
|
void (*release)(struct nfsd4_callback *);
|
|
|
|
};
|
|
|
|
|
2014-08-06 03:13:30 +08:00
|
|
|
/*
|
|
|
|
* A core object that represents a "common" stateid. These are generally
|
|
|
|
* embedded within the different (more specific) stateid objects and contain
|
|
|
|
* fields that are of general use to any stateid.
|
|
|
|
*/
|
2011-09-09 00:07:44 +08:00
|
|
|
struct nfs4_stid {
|
2017-10-20 17:53:28 +08:00
|
|
|
refcount_t sc_count;
|
2011-09-09 00:07:44 +08:00
|
|
|
#define NFS4_OPEN_STID 1
|
|
|
|
#define NFS4_LOCK_STID 2
|
|
|
|
#define NFS4_DELEG_STID 4
|
2011-09-17 08:12:38 +08:00
|
|
|
/* For an open stateid kept around *only* to process close replays: */
|
|
|
|
#define NFS4_CLOSED_STID 8
|
2013-04-10 05:02:51 +08:00
|
|
|
/* For a deleg stateid kept around only to process free_stateid's: */
|
|
|
|
#define NFS4_REVOKED_DELEG_STID 16
|
2014-07-16 22:31:59 +08:00
|
|
|
#define NFS4_CLOSED_DELEG_STID 32
|
nfsd: implement pNFS operations
Add support for the GETDEVICEINFO, LAYOUTGET, LAYOUTCOMMIT and
LAYOUTRETURN NFSv4.1 operations, as well as backing code to manage
outstanding layouts and devices.
Layout management is very straight forward, with a nfs4_layout_stateid
structure that extends nfs4_stid to manage layout stateids as the
top-level structure. It is linked into the nfs4_file and nfs4_client
structures like the other stateids, and contains a linked list of
layouts that hang of the stateid. The actual layout operations are
implemented in layout drivers that are not part of this commit, but
will be added later.
The worst part of this commit is the management of the pNFS device IDs,
which suffers from a specification that is not sanely implementable due
to the fact that the device-IDs are global and not bound to an export,
and have a small enough size so that we can't store the fsid portion of
a file handle, and must never be reused. As we still do need perform all
export authentication and validation checks on a device ID passed to
GETDEVICEINFO we are caught between a rock and a hard place. To work
around this issue we add a new hash that maps from a 64-bit integer to a
fsid so that we can look up the export to authenticate against it,
a 32-bit integer as a generation that we can bump when changing the device,
and a currently unused 32-bit integer that could be used in the future
to handle more than a single device per export. Entries in this hash
table are never deleted as we can't reuse the ids anyway, and would have
a severe lifetime problem anyway as Linux export structures are temporary
structures that can go away under load.
Parts of the XDR data, structures and marshaling/unmarshaling code, as
well as many concepts are derived from the old pNFS server implementation
from Andy Adamson, Benny Halevy, Dean Hildebrand, Marc Eshel, Fred Isaman,
Mike Sager, Ricardo Labiaga and many others.
Signed-off-by: Christoph Hellwig <hch@lst.de>
2014-05-05 19:11:59 +08:00
|
|
|
#define NFS4_LAYOUT_STID 64
|
2019-10-05 04:34:26 +08:00
|
|
|
struct list_head sc_cp_list;
|
2015-10-01 21:05:50 +08:00
|
|
|
unsigned char sc_type;
|
|
|
|
stateid_t sc_stateid;
|
|
|
|
spinlock_t sc_lock;
|
|
|
|
struct nfs4_client *sc_client;
|
|
|
|
struct nfs4_file *sc_file;
|
|
|
|
void (*sc_free)(struct nfs4_stid *);
|
2011-09-09 00:07:44 +08:00
|
|
|
};
|
|
|
|
|
2019-10-05 04:34:26 +08:00
|
|
|
/* Keep a list of stateids issued by the COPY_NOTIFY, associate it with the
|
|
|
|
* parent OPEN/LOCK/DELEG stateid.
|
|
|
|
*/
|
|
|
|
struct nfs4_cpntf_state {
|
|
|
|
copy_stateid_t cp_stateid;
|
|
|
|
struct list_head cp_list; /* per parent nfs4_stid */
|
|
|
|
stateid_t cp_p_stateid; /* copy of parent's stateid */
|
|
|
|
clientid_t cp_p_clid; /* copy of parent's clid */
|
|
|
|
time_t cpntf_time; /* last time stateid used */
|
|
|
|
};
|
|
|
|
|
2014-08-06 03:13:30 +08:00
|
|
|
/*
|
|
|
|
* Represents a delegation stateid. The nfs4_client holds references to these
|
|
|
|
* and they are put when it is being destroyed or when the delegation is
|
|
|
|
* returned by the client:
|
|
|
|
*
|
|
|
|
* o 1 reference as long as a delegation is still in force (taken when it's
|
|
|
|
* alloc'd, put when it's returned or revoked)
|
|
|
|
*
|
|
|
|
* o 1 reference as long as a recall rpc is in progress (taken when the lease
|
|
|
|
* is broken, put when the rpc exits)
|
|
|
|
*
|
|
|
|
* o 1 more ephemeral reference for each nfsd thread currently doing something
|
|
|
|
* with that delegation without holding the cl_lock
|
|
|
|
*
|
|
|
|
* If the server attempts to recall a delegation and the client doesn't do so
|
|
|
|
* before a timeout, the server may also revoke the delegation. In that case,
|
|
|
|
* the object will either be destroyed (v4.0) or moved to a per-client list of
|
|
|
|
* revoked delegations (v4.1+).
|
|
|
|
*
|
|
|
|
* This object is a superset of the nfs4_stid.
|
|
|
|
*/
|
2005-04-17 06:20:36 +08:00
|
|
|
struct nfs4_delegation {
|
2011-10-17 23:14:48 +08:00
|
|
|
struct nfs4_stid dl_stid; /* must be first field */
|
2005-06-24 13:04:17 +08:00
|
|
|
struct list_head dl_perfile;
|
|
|
|
struct list_head dl_perclnt;
|
2005-04-17 06:20:36 +08:00
|
|
|
struct list_head dl_recall_lru; /* delegation recalled */
|
2015-04-27 20:50:14 +08:00
|
|
|
struct nfs4_clnt_odstate *dl_clnt_odstate;
|
2005-04-17 06:20:36 +08:00
|
|
|
u32 dl_type;
|
|
|
|
time_t dl_time;
|
2009-05-02 07:50:00 +08:00
|
|
|
/* For recall: */
|
2009-05-02 08:11:12 +08:00
|
|
|
int dl_retries;
|
2010-02-19 00:27:24 +08:00
|
|
|
struct nfsd4_callback dl_recall;
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
2014-10-01 20:05:22 +08:00
|
|
|
#define cb_to_delegation(cb) \
|
|
|
|
container_of(cb, struct nfs4_delegation, dl_recall)
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/* client delegation callback info */
|
2009-04-30 07:09:19 +08:00
|
|
|
struct nfs4_cb_conn {
|
2005-04-17 06:20:36 +08:00
|
|
|
/* SETCLIENTID info */
|
2009-08-15 00:57:57 +08:00
|
|
|
struct sockaddr_storage cb_addr;
|
2010-12-15 13:09:01 +08:00
|
|
|
struct sockaddr_storage cb_saddr;
|
2009-08-15 00:57:57 +08:00
|
|
|
size_t cb_addrlen;
|
2010-10-20 05:31:50 +08:00
|
|
|
u32 cb_prog; /* used only in 4.0 case;
|
|
|
|
per-session otherwise */
|
2009-06-16 09:20:53 +08:00
|
|
|
u32 cb_ident; /* minorversion 0 only */
|
2010-03-09 01:37:27 +08:00
|
|
|
struct svc_xprt *cb_xprt; /* minorversion 1 only */
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
2011-09-09 21:06:12 +08:00
|
|
|
static inline struct nfs4_delegation *delegstateid(struct nfs4_stid *s)
|
|
|
|
{
|
|
|
|
return container_of(s, struct nfs4_delegation, dl_stid);
|
|
|
|
}
|
|
|
|
|
2009-08-28 20:45:01 +08:00
|
|
|
/* Maximum number of slots per session. 160 is useful for long haul TCP */
|
|
|
|
#define NFSD_MAX_SLOTS_PER_SESSION 160
|
2009-04-03 13:28:28 +08:00
|
|
|
/* Maximum number of operations per session compound */
|
|
|
|
#define NFSD_MAX_OPS_PER_COMPOUND 16
|
2009-08-28 20:45:04 +08:00
|
|
|
/* Maximum session per slot cache size */
|
2014-03-13 03:17:18 +08:00
|
|
|
#define NFSD_SLOT_CACHE_SIZE 2048
|
2009-08-28 20:45:01 +08:00
|
|
|
/* Maximum number of NFSD_SLOT_CACHE_SIZE slots per session */
|
|
|
|
#define NFSD_CACHE_SIZE_SLOTS_PER_SESSION 32
|
|
|
|
#define NFSD_MAX_MEM_PER_SESSION \
|
|
|
|
(NFSD_CACHE_SIZE_SLOTS_PER_SESSION * NFSD_SLOT_CACHE_SIZE)
|
2009-04-03 13:28:15 +08:00
|
|
|
|
2009-04-03 13:27:43 +08:00
|
|
|
struct nfsd4_slot {
|
2009-08-28 20:45:04 +08:00
|
|
|
u32 sl_seqid;
|
|
|
|
__be32 sl_status;
|
2017-10-18 08:38:49 +08:00
|
|
|
struct svc_cred sl_cred;
|
2009-08-28 20:45:04 +08:00
|
|
|
u32 sl_datalen;
|
2012-02-14 05:39:00 +08:00
|
|
|
u16 sl_opcnt;
|
|
|
|
#define NFSD4_SLOT_INUSE (1 << 0)
|
|
|
|
#define NFSD4_SLOT_CACHETHIS (1 << 1)
|
2012-02-14 05:56:19 +08:00
|
|
|
#define NFSD4_SLOT_INITIALIZED (1 << 2)
|
nfsd4: fix cached replies to solo SEQUENCE compounds
Currently our handling of 4.1+ requests without "cachethis" set is
confusing and not quite correct.
Suppose a client sends a compound consisting of only a single SEQUENCE
op, and it matches the seqid in a session slot (so it's a retry), but
the previous request with that seqid did not have "cachethis" set.
The obvious thing to do might be to return NFS4ERR_RETRY_UNCACHED_REP,
but the protocol only allows that to be returned on the op following the
SEQUENCE, and there is no such op in this case.
The protocol permits us to cache replies even if the client didn't ask
us to. And it's easy to do so in the case of solo SEQUENCE compounds.
So, when we get a solo SEQUENCE, we can either return the previously
cached reply or NFSERR_SEQ_FALSE_RETRY if we notice it differs in some
way from the original call.
Currently, we're returning a corrupt reply in the case a solo SEQUENCE
matches a previous compound with more ops. This actually matters
because the Linux client recently started doing this as a way to recover
from lost replies to idempotent operations in the case the process doing
the original reply was killed: in that case it's difficult to keep the
original arguments around to do a real retry, and the client no longer
cares what the result is anyway, but it would like to make sure that the
slot's sequence id has been incremented, and the solo SEQUENCE assures
that: if the server never got the original reply, it will increment the
sequence id. If it did get the original reply, it won't increment, and
nothing else that about the reply really matters much. But we can at
least attempt to return valid xdr!
Tested-by: Olga Kornievskaia <aglo@umich.edu>
Signed-off-by: J. Bruce Fields <bfields@redhat.com>
2017-10-19 04:17:18 +08:00
|
|
|
#define NFSD4_SLOT_CACHED (1 << 3)
|
2012-02-14 05:39:00 +08:00
|
|
|
u8 sl_flags;
|
2009-08-28 20:45:04 +08:00
|
|
|
char sl_data[];
|
2009-04-03 13:27:43 +08:00
|
|
|
};
|
|
|
|
|
2009-06-16 09:19:13 +08:00
|
|
|
struct nfsd4_channel_attrs {
|
|
|
|
u32 headerpadsz;
|
|
|
|
u32 maxreq_sz;
|
|
|
|
u32 maxresp_sz;
|
|
|
|
u32 maxresp_cached;
|
|
|
|
u32 maxops;
|
|
|
|
u32 maxreqs;
|
|
|
|
u32 nr_rdma_attrs;
|
|
|
|
u32 rdma_attrs;
|
|
|
|
};
|
|
|
|
|
2012-03-28 02:50:26 +08:00
|
|
|
struct nfsd4_cb_sec {
|
2012-11-06 05:01:48 +08:00
|
|
|
u32 flavor; /* (u32)(-1) used to mean "no valid flavor" */
|
2013-02-02 22:24:49 +08:00
|
|
|
kuid_t uid;
|
|
|
|
kgid_t gid;
|
2012-03-28 02:50:26 +08:00
|
|
|
};
|
|
|
|
|
2009-07-24 07:02:16 +08:00
|
|
|
struct nfsd4_create_session {
|
|
|
|
clientid_t clientid;
|
|
|
|
struct nfs4_sessionid sessionid;
|
|
|
|
u32 seqid;
|
|
|
|
u32 flags;
|
|
|
|
struct nfsd4_channel_attrs fore_channel;
|
|
|
|
struct nfsd4_channel_attrs back_channel;
|
|
|
|
u32 callback_prog;
|
2012-03-28 02:50:26 +08:00
|
|
|
struct nfsd4_cb_sec cb_sec;
|
2009-07-24 07:02:16 +08:00
|
|
|
};
|
|
|
|
|
2012-11-02 06:09:48 +08:00
|
|
|
struct nfsd4_backchannel_ctl {
|
|
|
|
u32 bc_cb_program;
|
|
|
|
struct nfsd4_cb_sec bc_cb_sec;
|
|
|
|
};
|
|
|
|
|
2010-10-05 11:12:59 +08:00
|
|
|
struct nfsd4_bind_conn_to_session {
|
|
|
|
struct nfs4_sessionid sessionid;
|
|
|
|
u32 dir;
|
|
|
|
};
|
|
|
|
|
2009-07-24 07:02:16 +08:00
|
|
|
/* The single slot clientid cache structure */
|
|
|
|
struct nfsd4_clid_slot {
|
|
|
|
u32 sl_seqid;
|
|
|
|
__be32 sl_status;
|
|
|
|
struct nfsd4_create_session sl_cr_ses;
|
|
|
|
};
|
|
|
|
|
2010-06-07 06:12:14 +08:00
|
|
|
struct nfsd4_conn {
|
|
|
|
struct list_head cn_persession;
|
|
|
|
struct svc_xprt *cn_xprt;
|
2010-06-07 06:37:16 +08:00
|
|
|
struct svc_xpt_user cn_xpt_user;
|
|
|
|
struct nfsd4_session *cn_session;
|
2010-06-07 06:12:14 +08:00
|
|
|
/* CDFC4_FORE, CDFC4_BACK: */
|
|
|
|
unsigned char cn_flags;
|
|
|
|
};
|
|
|
|
|
2014-08-06 03:13:30 +08:00
|
|
|
/*
|
|
|
|
* Representation of a v4.1+ session. These are refcounted in a similar fashion
|
|
|
|
* to the nfs4_client. References are only taken when the server is actively
|
|
|
|
* working on the object (primarily during the processing of compounds).
|
|
|
|
*/
|
2009-04-03 13:27:43 +08:00
|
|
|
struct nfsd4_session {
|
2013-03-20 00:05:39 +08:00
|
|
|
atomic_t se_ref;
|
2009-04-03 13:27:43 +08:00
|
|
|
struct list_head se_hash; /* hash by sessionid */
|
|
|
|
struct list_head se_perclnt;
|
2013-03-20 00:05:39 +08:00
|
|
|
/* See SESSION4_PERSIST, etc. for standard flags; this is internal-only: */
|
|
|
|
#define NFS4_SESSION_DEAD 0x010
|
2009-04-03 13:27:43 +08:00
|
|
|
u32 se_flags;
|
2010-05-12 05:13:41 +08:00
|
|
|
struct nfs4_client *se_client;
|
2009-04-03 13:27:43 +08:00
|
|
|
struct nfs4_sessionid se_sessionid;
|
2009-06-16 09:19:13 +08:00
|
|
|
struct nfsd4_channel_attrs se_fchannel;
|
|
|
|
struct nfsd4_channel_attrs se_bchannel;
|
2012-03-28 02:50:26 +08:00
|
|
|
struct nfsd4_cb_sec se_cb_sec;
|
2010-06-07 06:12:14 +08:00
|
|
|
struct list_head se_conns;
|
2010-10-20 05:31:50 +08:00
|
|
|
u32 se_cb_prog;
|
2010-06-15 07:01:57 +08:00
|
|
|
u32 se_cb_seq_nr;
|
2009-08-28 20:45:04 +08:00
|
|
|
struct nfsd4_slot *se_slots[]; /* forward channel slots */
|
2009-04-03 13:27:43 +08:00
|
|
|
};
|
|
|
|
|
2009-04-03 13:27:52 +08:00
|
|
|
/* formatted contents of nfs4_sessionid */
|
|
|
|
struct nfsd4_sessionid {
|
|
|
|
clientid_t clientid;
|
|
|
|
u32 sequence;
|
|
|
|
u32 reserved;
|
|
|
|
};
|
|
|
|
|
2005-06-24 13:03:52 +08:00
|
|
|
#define HEXDIR_LEN 33 /* hex version of 16 byte md5 of cl_name plus '\0' */
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* struct nfs4_client - one per client. Clientids live here.
|
|
|
|
*
|
2014-08-06 03:13:30 +08:00
|
|
|
* The initial object created by an NFS client using SETCLIENTID (for NFSv4.0)
|
|
|
|
* or EXCHANGE_ID (for NFSv4.1+). These objects are refcounted and timestamped.
|
|
|
|
* Each nfsd_net_ns object contains a set of these and they are tracked via
|
|
|
|
* short and long form clientid. They are hashed and searched for under the
|
|
|
|
* per-nfsd_net client_lock spinlock.
|
|
|
|
*
|
|
|
|
* References to it are only held during the processing of compounds, and in
|
|
|
|
* certain other operations. In their "resting state" they have a refcount of
|
|
|
|
* 0. If they are not renewed within a lease period, they become eligible for
|
|
|
|
* destruction by the laundromat.
|
|
|
|
*
|
|
|
|
* These objects can also be destroyed prematurely by the fault injection code,
|
|
|
|
* or if the client sends certain forms of SETCLIENTID or EXCHANGE_ID updates.
|
|
|
|
* Care is taken *not* to do this however when the objects have an elevated
|
|
|
|
* refcount.
|
|
|
|
*
|
|
|
|
* o Each nfs4_client is hashed by clientid
|
|
|
|
*
|
|
|
|
* o Each nfs4_clients is also hashed by name (the opaque quantity initially
|
|
|
|
* sent by the client to identify itself).
|
2005-04-17 06:20:36 +08:00
|
|
|
*
|
2014-08-06 03:13:30 +08:00
|
|
|
* o cl_perclient list is used to ensure no dangling stateowner references
|
|
|
|
* when we expire the nfs4_client
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
|
|
|
struct nfs4_client {
|
|
|
|
struct list_head cl_idhash; /* hash by cl_clientid.id */
|
2012-11-13 04:00:56 +08:00
|
|
|
struct rb_node cl_namenode; /* link into by-name trees */
|
2014-07-30 09:34:36 +08:00
|
|
|
struct list_head *cl_ownerstr_hashtbl;
|
2005-06-24 13:04:17 +08:00
|
|
|
struct list_head cl_openowners;
|
2011-09-24 05:01:19 +08:00
|
|
|
struct idr cl_stateids; /* stateid lookup */
|
2005-06-24 13:04:17 +08:00
|
|
|
struct list_head cl_delegations;
|
2013-04-10 05:02:51 +08:00
|
|
|
struct list_head cl_revoked; /* unacknowledged, revoked 4.1 state */
|
2005-04-17 06:20:36 +08:00
|
|
|
struct list_head cl_lru; /* tail queue */
|
nfsd: implement pNFS operations
Add support for the GETDEVICEINFO, LAYOUTGET, LAYOUTCOMMIT and
LAYOUTRETURN NFSv4.1 operations, as well as backing code to manage
outstanding layouts and devices.
Layout management is very straight forward, with a nfs4_layout_stateid
structure that extends nfs4_stid to manage layout stateids as the
top-level structure. It is linked into the nfs4_file and nfs4_client
structures like the other stateids, and contains a linked list of
layouts that hang of the stateid. The actual layout operations are
implemented in layout drivers that are not part of this commit, but
will be added later.
The worst part of this commit is the management of the pNFS device IDs,
which suffers from a specification that is not sanely implementable due
to the fact that the device-IDs are global and not bound to an export,
and have a small enough size so that we can't store the fsid portion of
a file handle, and must never be reused. As we still do need perform all
export authentication and validation checks on a device ID passed to
GETDEVICEINFO we are caught between a rock and a hard place. To work
around this issue we add a new hash that maps from a 64-bit integer to a
fsid so that we can look up the export to authenticate against it,
a 32-bit integer as a generation that we can bump when changing the device,
and a currently unused 32-bit integer that could be used in the future
to handle more than a single device per export. Entries in this hash
table are never deleted as we can't reuse the ids anyway, and would have
a severe lifetime problem anyway as Linux export structures are temporary
structures that can go away under load.
Parts of the XDR data, structures and marshaling/unmarshaling code, as
well as many concepts are derived from the old pNFS server implementation
from Andy Adamson, Benny Halevy, Dean Hildebrand, Marc Eshel, Fred Isaman,
Mike Sager, Ricardo Labiaga and many others.
Signed-off-by: Christoph Hellwig <hch@lst.de>
2014-05-05 19:11:59 +08:00
|
|
|
#ifdef CONFIG_NFSD_PNFS
|
|
|
|
struct list_head cl_lo_states; /* outstanding layout states */
|
|
|
|
#endif
|
2005-04-17 06:20:36 +08:00
|
|
|
struct xdr_netobj cl_name; /* id generated by client */
|
|
|
|
nfs4_verifier cl_verifier; /* generated by client */
|
|
|
|
time_t cl_time; /* time of last lease renewal */
|
2009-08-15 00:57:56 +08:00
|
|
|
struct sockaddr_storage cl_addr; /* client ipaddress */
|
2013-04-14 02:27:29 +08:00
|
|
|
bool cl_mach_cred; /* SP4_MACH_CRED in force */
|
2005-04-17 06:20:36 +08:00
|
|
|
struct svc_cred cl_cred; /* setclientid principal */
|
|
|
|
clientid_t cl_clientid; /* generated by server */
|
|
|
|
nfs4_verifier cl_confirm; /* generated by server */
|
2010-10-20 07:36:51 +08:00
|
|
|
u32 cl_minorversion;
|
2019-06-06 00:42:05 +08:00
|
|
|
/* NFSv4.1 client implementation id: */
|
|
|
|
struct xdr_netobj cl_nii_domain;
|
|
|
|
struct xdr_netobj cl_nii_name;
|
2019-10-31 21:52:43 +08:00
|
|
|
struct timespec64 cl_nii_time;
|
2009-04-03 13:27:46 +08:00
|
|
|
|
2010-03-09 01:37:27 +08:00
|
|
|
/* for v4.0 and v4.1 callbacks: */
|
|
|
|
struct nfs4_cb_conn cl_cb_conn;
|
2012-03-21 21:52:02 +08:00
|
|
|
#define NFSD4_CLIENT_CB_UPDATE (0)
|
|
|
|
#define NFSD4_CLIENT_CB_KILL (1)
|
|
|
|
#define NFSD4_CLIENT_STABLE (2) /* client on stable storage */
|
|
|
|
#define NFSD4_CLIENT_RECLAIM_COMPLETE (3) /* reclaim_complete done */
|
2012-11-13 04:00:56 +08:00
|
|
|
#define NFSD4_CLIENT_CONFIRMED (4) /* client is confirmed */
|
2014-09-13 04:40:21 +08:00
|
|
|
#define NFSD4_CLIENT_UPCALL_LOCK (5) /* upcall serialization */
|
2012-03-21 21:52:02 +08:00
|
|
|
#define NFSD4_CLIENT_CB_FLAG_MASK (1 << NFSD4_CLIENT_CB_UPDATE | \
|
|
|
|
1 << NFSD4_CLIENT_CB_KILL)
|
|
|
|
unsigned long cl_flags;
|
2018-12-03 08:30:31 +08:00
|
|
|
const struct cred *cl_cb_cred;
|
2010-03-09 01:37:27 +08:00
|
|
|
struct rpc_clnt *cl_cb_client;
|
2010-06-05 08:04:45 +08:00
|
|
|
u32 cl_cb_ident;
|
2010-05-01 06:51:44 +08:00
|
|
|
#define NFSD4_CB_UP 0
|
|
|
|
#define NFSD4_CB_UNKNOWN 1
|
|
|
|
#define NFSD4_CB_DOWN 2
|
2011-10-20 10:12:58 +08:00
|
|
|
#define NFSD4_CB_FAULT 3
|
2010-05-01 06:51:44 +08:00
|
|
|
int cl_cb_state;
|
2010-05-27 05:52:14 +08:00
|
|
|
struct nfsd4_callback cl_cb_null;
|
2010-06-15 10:26:31 +08:00
|
|
|
struct nfsd4_session *cl_cb_session;
|
2010-03-09 01:37:27 +08:00
|
|
|
|
2010-06-05 08:04:45 +08:00
|
|
|
/* for all client information that callback code might need: */
|
|
|
|
spinlock_t cl_lock;
|
|
|
|
|
2009-04-03 13:27:46 +08:00
|
|
|
/* for nfs41 */
|
|
|
|
struct list_head cl_sessions;
|
2009-07-24 07:02:16 +08:00
|
|
|
struct nfsd4_clid_slot cl_cs_slot; /* create_session slot */
|
2009-04-03 13:28:01 +08:00
|
|
|
u32 cl_exchange_flags;
|
2010-05-12 05:13:29 +08:00
|
|
|
/* number of rpc's in progress over an associated session: */
|
2019-03-20 23:54:11 +08:00
|
|
|
atomic_t cl_rpc_users;
|
2019-03-22 23:11:06 +08:00
|
|
|
struct nfsdfs_client cl_nfsdfs;
|
2016-06-16 00:52:09 +08:00
|
|
|
struct nfs4_op_map cl_spo_must_allow;
|
2009-09-10 17:25:59 +08:00
|
|
|
|
2019-03-22 23:11:06 +08:00
|
|
|
/* debugging info directory under nfsd/clients/ : */
|
|
|
|
struct dentry *cl_nfsd_dentry;
|
|
|
|
|
2009-09-10 17:25:59 +08:00
|
|
|
/* for nfs41 callbacks */
|
2009-09-10 17:26:25 +08:00
|
|
|
/* We currently support a single back channel with a single slot */
|
|
|
|
unsigned long cl_cb_slot_busy;
|
|
|
|
struct rpc_wait_queue cl_cb_waitq; /* backchannel callers may */
|
|
|
|
/* wait here for slots */
|
2012-11-14 23:21:10 +08:00
|
|
|
struct net *net;
|
2018-07-21 06:19:20 +08:00
|
|
|
struct list_head async_copies; /* list of async copies */
|
|
|
|
spinlock_t async_lock; /* lock for async copies */
|
2019-10-24 05:43:18 +08:00
|
|
|
atomic_t cl_cb_inflight; /* Outstanding callbacks */
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
/* struct nfs4_client_reset
|
|
|
|
* one per old client. Populates reset_str_hashtbl. Filled from conf_id_hashtbl
|
|
|
|
* upon lease reset, or from upcall to state_daemon (to read in state
|
|
|
|
* from non-volitile storage) upon reboot.
|
|
|
|
*/
|
|
|
|
struct nfs4_client_reclaim {
|
|
|
|
struct list_head cr_strhash; /* hash by cr_name */
|
2012-11-13 04:00:55 +08:00
|
|
|
struct nfs4_client *cr_clp; /* pointer to associated clp */
|
2019-03-27 06:06:26 +08:00
|
|
|
struct xdr_netobj cr_name; /* recovery dir name */
|
2019-09-10 04:10:31 +08:00
|
|
|
struct xdr_netobj cr_princhash;
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
/* A reasonable value for REPLAY_ISIZE was estimated as follows:
|
|
|
|
* The OPEN response, typically the largest, requires
|
|
|
|
* 4(status) + 8(stateid) + 20(changeinfo) + 4(rflags) + 8(verifier) +
|
|
|
|
* 4(deleg. type) + 8(deleg. stateid) + 4(deleg. recall flag) +
|
|
|
|
* 20(deleg. space limit) + ~32(deleg. ace) = 112 bytes
|
|
|
|
*/
|
|
|
|
|
|
|
|
#define NFSD4_REPLAY_ISIZE 112
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Replay buffer, where the result of the last seqid-mutating operation
|
|
|
|
* is cached.
|
|
|
|
*/
|
|
|
|
struct nfs4_replay {
|
2006-10-20 14:28:59 +08:00
|
|
|
__be32 rp_status;
|
2005-04-17 06:20:36 +08:00
|
|
|
unsigned int rp_buflen;
|
|
|
|
char *rp_buf;
|
2009-02-03 06:23:10 +08:00
|
|
|
struct knfsd_fh rp_openfh;
|
2014-07-30 09:34:27 +08:00
|
|
|
struct mutex rp_mutex;
|
2005-04-17 06:20:36 +08:00
|
|
|
char rp_ibuf[NFSD4_REPLAY_ISIZE];
|
|
|
|
};
|
|
|
|
|
2014-07-30 09:34:26 +08:00
|
|
|
struct nfs4_stateowner;
|
|
|
|
|
|
|
|
struct nfs4_stateowner_operations {
|
2014-07-30 09:34:29 +08:00
|
|
|
void (*so_unhash)(struct nfs4_stateowner *);
|
2014-07-30 09:34:26 +08:00
|
|
|
void (*so_free)(struct nfs4_stateowner *);
|
|
|
|
};
|
|
|
|
|
2014-08-06 03:13:30 +08:00
|
|
|
/*
|
|
|
|
* A core object that represents either an open or lock owner. The object and
|
|
|
|
* lock owner objects have one of these embedded within them. Refcounts and
|
|
|
|
* other fields common to both owner types are contained within these
|
|
|
|
* structures.
|
|
|
|
*/
|
2005-04-17 06:20:36 +08:00
|
|
|
struct nfs4_stateowner {
|
2014-07-30 09:34:26 +08:00
|
|
|
struct list_head so_strhash;
|
|
|
|
struct list_head so_stateids;
|
|
|
|
struct nfs4_client *so_client;
|
|
|
|
const struct nfs4_stateowner_operations *so_ops;
|
2014-08-01 04:10:08 +08:00
|
|
|
/* after increment in nfsd4_bump_seqid, represents the next
|
2005-07-08 08:59:20 +08:00
|
|
|
* sequence id expected from the client: */
|
2014-07-30 09:34:26 +08:00
|
|
|
atomic_t so_count;
|
|
|
|
u32 so_seqid;
|
|
|
|
struct xdr_netobj so_owner; /* open owner name */
|
|
|
|
struct nfs4_replay so_replay;
|
|
|
|
bool so_is_open_owner;
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
2014-08-06 03:13:30 +08:00
|
|
|
/*
|
|
|
|
* When a file is opened, the client provides an open state owner opaque string
|
|
|
|
* that indicates the "owner" of that open. These objects are refcounted.
|
|
|
|
* References to it are held by each open state associated with it. This object
|
|
|
|
* is a superset of the nfs4_stateowner struct.
|
|
|
|
*/
|
2011-07-31 11:33:59 +08:00
|
|
|
struct nfs4_openowner {
|
|
|
|
struct nfs4_stateowner oo_owner; /* must be first field */
|
|
|
|
struct list_head oo_perclient;
|
2011-09-28 23:47:20 +08:00
|
|
|
/*
|
|
|
|
* We keep around openowners a little while after last close,
|
|
|
|
* which saves clients from having to confirm, and allows us to
|
|
|
|
* handle close replays if they come soon enough. The close_lru
|
|
|
|
* is a list of such openowners, to be reaped by the laundromat
|
|
|
|
* thread eventually if they remain unused:
|
|
|
|
*/
|
|
|
|
struct list_head oo_close_lru;
|
2011-09-17 05:42:48 +08:00
|
|
|
struct nfs4_ol_stateid *oo_last_closed_stid;
|
2011-07-31 11:33:59 +08:00
|
|
|
time_t oo_time; /* time of placement on so_close_lru */
|
2011-09-13 00:24:13 +08:00
|
|
|
#define NFS4_OO_CONFIRMED 1
|
|
|
|
unsigned char oo_flags;
|
2011-07-31 11:33:59 +08:00
|
|
|
};
|
|
|
|
|
2014-08-06 03:13:30 +08:00
|
|
|
/*
|
|
|
|
* Represents a generic "lockowner". Similar to an openowner. References to it
|
|
|
|
* are held by the lock stateids that are created on its behalf. This object is
|
2016-09-17 04:28:24 +08:00
|
|
|
* a superset of the nfs4_stateowner struct.
|
2014-08-06 03:13:30 +08:00
|
|
|
*/
|
2011-07-31 11:33:59 +08:00
|
|
|
struct nfs4_lockowner {
|
2016-09-17 04:28:24 +08:00
|
|
|
struct nfs4_stateowner lo_owner; /* must be first element */
|
|
|
|
struct list_head lo_blocked; /* blocked file_locks */
|
2011-07-31 11:33:59 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static inline struct nfs4_openowner * openowner(struct nfs4_stateowner *so)
|
|
|
|
{
|
|
|
|
return container_of(so, struct nfs4_openowner, oo_owner);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline struct nfs4_lockowner * lockowner(struct nfs4_stateowner *so)
|
|
|
|
{
|
|
|
|
return container_of(so, struct nfs4_lockowner, lo_owner);
|
|
|
|
}
|
|
|
|
|
2015-04-27 20:50:14 +08:00
|
|
|
/*
|
|
|
|
* Per-client state indicating no. of opens and outstanding delegations
|
|
|
|
* on a file from a particular client.'od' stands for 'open & delegation'
|
|
|
|
*/
|
|
|
|
struct nfs4_clnt_odstate {
|
|
|
|
struct nfs4_client *co_client;
|
|
|
|
struct nfs4_file *co_file;
|
|
|
|
struct list_head co_perfile;
|
2017-10-20 17:53:29 +08:00
|
|
|
refcount_t co_odcount;
|
2015-04-27 20:50:14 +08:00
|
|
|
};
|
|
|
|
|
2014-08-06 03:13:30 +08:00
|
|
|
/*
|
|
|
|
* nfs4_file: a file opened by some number of (open) nfs4_stateowners.
|
|
|
|
*
|
2014-10-16 20:49:37 +08:00
|
|
|
* These objects are global. nfsd keeps one instance of a nfs4_file per
|
|
|
|
* filehandle (though it may keep multiple file descriptors for each). Each
|
|
|
|
* inode can have multiple filehandles associated with it, so there is
|
|
|
|
* (potentially) a many to one relationship between this struct and struct
|
|
|
|
* inode.
|
|
|
|
*
|
|
|
|
* These are hashed by filehandle in the file_hashtbl, which is protected by
|
|
|
|
* the global state_lock spinlock.
|
2014-08-06 03:13:30 +08:00
|
|
|
*/
|
2005-04-17 06:20:36 +08:00
|
|
|
struct nfs4_file {
|
2017-10-20 17:53:30 +08:00
|
|
|
refcount_t fi_ref;
|
2014-07-11 02:07:25 +08:00
|
|
|
spinlock_t fi_lock;
|
2014-10-16 20:49:37 +08:00
|
|
|
struct hlist_node fi_hash; /* hash on fi_fhandle */
|
2005-06-24 13:03:08 +08:00
|
|
|
struct list_head fi_stateids;
|
2014-10-23 20:01:02 +08:00
|
|
|
union {
|
|
|
|
struct list_head fi_delegations;
|
|
|
|
struct rcu_head fi_rcu;
|
|
|
|
};
|
2015-04-27 20:50:14 +08:00
|
|
|
struct list_head fi_clnt_odstate;
|
2010-07-08 23:02:09 +08:00
|
|
|
/* One each for O_RDONLY, O_WRONLY, O_RDWR: */
|
2019-08-19 02:18:52 +08:00
|
|
|
struct nfsd_file *fi_fds[3];
|
2010-07-08 23:02:09 +08:00
|
|
|
/*
|
2011-09-28 23:37:56 +08:00
|
|
|
* Each open or lock stateid contributes 0-4 to the counts
|
|
|
|
* below depending on which bits are set in st_access_bitmap:
|
|
|
|
* 1 to fi_access[O_RDONLY] if NFS4_SHARE_ACCES_READ is set
|
|
|
|
* + 1 to fi_access[O_WRONLY] if NFS4_SHARE_ACCESS_WRITE is set
|
|
|
|
* + 1 to both of the above if NFS4_SHARE_ACCESS_BOTH is set.
|
2010-07-08 23:02:09 +08:00
|
|
|
*/
|
2011-03-18 00:52:33 +08:00
|
|
|
atomic_t fi_access[2];
|
nfsd: make deny mode enforcement more efficient and close races in it
The current enforcement of deny modes is both inefficient and scattered
across several places, which makes it hard to guarantee atomicity. The
inefficiency is a problem now, and the lack of atomicity will mean races
once the client_mutex is removed.
First, we address the inefficiency. We have to track deny modes on a
per-stateid basis to ensure that open downgrades are sane, but when the
server goes to enforce them it has to walk the entire list of stateids
and check against each one.
Instead of doing that, maintain a per-nfs4_file deny mode. When a file
is opened, we simply set any deny bits in that mode that were specified
in the OPEN call. We can then use that unified deny mode to do a simple
check to see whether there are any conflicts without needing to walk the
entire stateid list.
The only time we'll need to walk the entire list of stateids is when a
stateid that has a deny mode on it is being released, or one is having
its deny mode downgraded. In that case, we must walk the entire list and
recalculate the fi_share_deny field. Since deny modes are pretty rare
today, this should be very rare under normal workloads.
To address the potential for races once the client_mutex is removed,
protect fi_share_deny with the fi_lock. In nfs4_get_vfs_file, check to
make sure that any deny mode we want to apply won't conflict with
existing access. If that's ok, then have nfs4_file_get_access check that
new access to the file won't conflict with existing deny modes.
If that also passes, then get file access references, set the correct
access and deny bits in the stateid, and update the fi_share_deny field.
If opening the file or truncating it fails, then unwind the whole mess
and return the appropriate error.
Signed-off-by: Jeff Layton <jlayton@primarydata.com>
Reviewed-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: J. Bruce Fields <bfields@redhat.com>
2014-07-11 02:07:34 +08:00
|
|
|
u32 fi_share_deny;
|
2019-08-19 02:18:53 +08:00
|
|
|
struct nfsd_file *fi_deleg_file;
|
2014-12-13 22:11:40 +08:00
|
|
|
int fi_delegees;
|
2014-07-24 04:17:38 +08:00
|
|
|
struct knfsd_fh fi_fhandle;
|
2007-07-17 19:04:40 +08:00
|
|
|
bool fi_had_conflict;
|
nfsd: implement pNFS operations
Add support for the GETDEVICEINFO, LAYOUTGET, LAYOUTCOMMIT and
LAYOUTRETURN NFSv4.1 operations, as well as backing code to manage
outstanding layouts and devices.
Layout management is very straight forward, with a nfs4_layout_stateid
structure that extends nfs4_stid to manage layout stateids as the
top-level structure. It is linked into the nfs4_file and nfs4_client
structures like the other stateids, and contains a linked list of
layouts that hang of the stateid. The actual layout operations are
implemented in layout drivers that are not part of this commit, but
will be added later.
The worst part of this commit is the management of the pNFS device IDs,
which suffers from a specification that is not sanely implementable due
to the fact that the device-IDs are global and not bound to an export,
and have a small enough size so that we can't store the fsid portion of
a file handle, and must never be reused. As we still do need perform all
export authentication and validation checks on a device ID passed to
GETDEVICEINFO we are caught between a rock and a hard place. To work
around this issue we add a new hash that maps from a 64-bit integer to a
fsid so that we can look up the export to authenticate against it,
a 32-bit integer as a generation that we can bump when changing the device,
and a currently unused 32-bit integer that could be used in the future
to handle more than a single device per export. Entries in this hash
table are never deleted as we can't reuse the ids anyway, and would have
a severe lifetime problem anyway as Linux export structures are temporary
structures that can go away under load.
Parts of the XDR data, structures and marshaling/unmarshaling code, as
well as many concepts are derived from the old pNFS server implementation
from Andy Adamson, Benny Halevy, Dean Hildebrand, Marc Eshel, Fred Isaman,
Mike Sager, Ricardo Labiaga and many others.
Signed-off-by: Christoph Hellwig <hch@lst.de>
2014-05-05 19:11:59 +08:00
|
|
|
#ifdef CONFIG_NFSD_PNFS
|
|
|
|
struct list_head fi_lo_states;
|
2014-09-23 18:38:48 +08:00
|
|
|
atomic_t fi_lo_recalls;
|
nfsd: implement pNFS operations
Add support for the GETDEVICEINFO, LAYOUTGET, LAYOUTCOMMIT and
LAYOUTRETURN NFSv4.1 operations, as well as backing code to manage
outstanding layouts and devices.
Layout management is very straight forward, with a nfs4_layout_stateid
structure that extends nfs4_stid to manage layout stateids as the
top-level structure. It is linked into the nfs4_file and nfs4_client
structures like the other stateids, and contains a linked list of
layouts that hang of the stateid. The actual layout operations are
implemented in layout drivers that are not part of this commit, but
will be added later.
The worst part of this commit is the management of the pNFS device IDs,
which suffers from a specification that is not sanely implementable due
to the fact that the device-IDs are global and not bound to an export,
and have a small enough size so that we can't store the fsid portion of
a file handle, and must never be reused. As we still do need perform all
export authentication and validation checks on a device ID passed to
GETDEVICEINFO we are caught between a rock and a hard place. To work
around this issue we add a new hash that maps from a 64-bit integer to a
fsid so that we can look up the export to authenticate against it,
a 32-bit integer as a generation that we can bump when changing the device,
and a currently unused 32-bit integer that could be used in the future
to handle more than a single device per export. Entries in this hash
table are never deleted as we can't reuse the ids anyway, and would have
a severe lifetime problem anyway as Linux export structures are temporary
structures that can go away under load.
Parts of the XDR data, structures and marshaling/unmarshaling code, as
well as many concepts are derived from the old pNFS server implementation
from Andy Adamson, Benny Halevy, Dean Hildebrand, Marc Eshel, Fred Isaman,
Mike Sager, Ricardo Labiaga and many others.
Signed-off-by: Christoph Hellwig <hch@lst.de>
2014-05-05 19:11:59 +08:00
|
|
|
#endif
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
2014-08-06 03:13:30 +08:00
|
|
|
/*
|
|
|
|
* A generic struct representing either a open or lock stateid. The nfs4_client
|
|
|
|
* holds a reference to each of these objects, and they in turn hold a
|
|
|
|
* reference to their respective stateowners. The client's reference is
|
|
|
|
* released in response to a close or unlock (depending on whether it's an open
|
|
|
|
* or lock stateid) or when the client is being destroyed.
|
|
|
|
*
|
|
|
|
* In the case of v4.0 open stateids, these objects are preserved for a little
|
|
|
|
* while after close in order to handle CLOSE replays. Those are eventually
|
|
|
|
* reclaimed via a LRU scheme by the laundromat.
|
|
|
|
*
|
|
|
|
* This object is a superset of the nfs4_stid. "ol" stands for "Open or Lock".
|
|
|
|
* Better suggestions welcome.
|
|
|
|
*/
|
2011-09-08 04:06:42 +08:00
|
|
|
struct nfs4_ol_stateid {
|
2015-09-17 19:47:08 +08:00
|
|
|
struct nfs4_stid st_stid;
|
|
|
|
struct list_head st_perfile;
|
|
|
|
struct list_head st_perstateowner;
|
|
|
|
struct list_head st_locks;
|
|
|
|
struct nfs4_stateowner *st_stateowner;
|
|
|
|
struct nfs4_clnt_odstate *st_clnt_odstate;
|
|
|
|
unsigned char st_access_bmap;
|
|
|
|
unsigned char st_deny_bmap;
|
|
|
|
struct nfs4_ol_stateid *st_openstp;
|
2016-06-15 11:28:04 +08:00
|
|
|
struct mutex st_mutex;
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
2011-09-08 04:06:42 +08:00
|
|
|
static inline struct nfs4_ol_stateid *openlockstateid(struct nfs4_stid *s)
|
|
|
|
{
|
|
|
|
return container_of(s, struct nfs4_ol_stateid, st_stid);
|
|
|
|
}
|
|
|
|
|
nfsd: implement pNFS operations
Add support for the GETDEVICEINFO, LAYOUTGET, LAYOUTCOMMIT and
LAYOUTRETURN NFSv4.1 operations, as well as backing code to manage
outstanding layouts and devices.
Layout management is very straight forward, with a nfs4_layout_stateid
structure that extends nfs4_stid to manage layout stateids as the
top-level structure. It is linked into the nfs4_file and nfs4_client
structures like the other stateids, and contains a linked list of
layouts that hang of the stateid. The actual layout operations are
implemented in layout drivers that are not part of this commit, but
will be added later.
The worst part of this commit is the management of the pNFS device IDs,
which suffers from a specification that is not sanely implementable due
to the fact that the device-IDs are global and not bound to an export,
and have a small enough size so that we can't store the fsid portion of
a file handle, and must never be reused. As we still do need perform all
export authentication and validation checks on a device ID passed to
GETDEVICEINFO we are caught between a rock and a hard place. To work
around this issue we add a new hash that maps from a 64-bit integer to a
fsid so that we can look up the export to authenticate against it,
a 32-bit integer as a generation that we can bump when changing the device,
and a currently unused 32-bit integer that could be used in the future
to handle more than a single device per export. Entries in this hash
table are never deleted as we can't reuse the ids anyway, and would have
a severe lifetime problem anyway as Linux export structures are temporary
structures that can go away under load.
Parts of the XDR data, structures and marshaling/unmarshaling code, as
well as many concepts are derived from the old pNFS server implementation
from Andy Adamson, Benny Halevy, Dean Hildebrand, Marc Eshel, Fred Isaman,
Mike Sager, Ricardo Labiaga and many others.
Signed-off-by: Christoph Hellwig <hch@lst.de>
2014-05-05 19:11:59 +08:00
|
|
|
struct nfs4_layout_stateid {
|
|
|
|
struct nfs4_stid ls_stid;
|
|
|
|
struct list_head ls_perclnt;
|
|
|
|
struct list_head ls_perfile;
|
|
|
|
spinlock_t ls_lock;
|
|
|
|
struct list_head ls_layouts;
|
|
|
|
u32 ls_layout_type;
|
2019-08-19 02:18:53 +08:00
|
|
|
struct nfsd_file *ls_file;
|
2014-09-23 18:38:48 +08:00
|
|
|
struct nfsd4_callback ls_recall;
|
|
|
|
stateid_t ls_recall_sid;
|
|
|
|
bool ls_recalled;
|
2015-09-17 19:58:24 +08:00
|
|
|
struct mutex ls_mutex;
|
nfsd: implement pNFS operations
Add support for the GETDEVICEINFO, LAYOUTGET, LAYOUTCOMMIT and
LAYOUTRETURN NFSv4.1 operations, as well as backing code to manage
outstanding layouts and devices.
Layout management is very straight forward, with a nfs4_layout_stateid
structure that extends nfs4_stid to manage layout stateids as the
top-level structure. It is linked into the nfs4_file and nfs4_client
structures like the other stateids, and contains a linked list of
layouts that hang of the stateid. The actual layout operations are
implemented in layout drivers that are not part of this commit, but
will be added later.
The worst part of this commit is the management of the pNFS device IDs,
which suffers from a specification that is not sanely implementable due
to the fact that the device-IDs are global and not bound to an export,
and have a small enough size so that we can't store the fsid portion of
a file handle, and must never be reused. As we still do need perform all
export authentication and validation checks on a device ID passed to
GETDEVICEINFO we are caught between a rock and a hard place. To work
around this issue we add a new hash that maps from a 64-bit integer to a
fsid so that we can look up the export to authenticate against it,
a 32-bit integer as a generation that we can bump when changing the device,
and a currently unused 32-bit integer that could be used in the future
to handle more than a single device per export. Entries in this hash
table are never deleted as we can't reuse the ids anyway, and would have
a severe lifetime problem anyway as Linux export structures are temporary
structures that can go away under load.
Parts of the XDR data, structures and marshaling/unmarshaling code, as
well as many concepts are derived from the old pNFS server implementation
from Andy Adamson, Benny Halevy, Dean Hildebrand, Marc Eshel, Fred Isaman,
Mike Sager, Ricardo Labiaga and many others.
Signed-off-by: Christoph Hellwig <hch@lst.de>
2014-05-05 19:11:59 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static inline struct nfs4_layout_stateid *layoutstateid(struct nfs4_stid *s)
|
|
|
|
{
|
|
|
|
return container_of(s, struct nfs4_layout_stateid, ls_stid);
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/* flags for preprocess_seqid_op() */
|
|
|
|
#define RD_STATE 0x00000010
|
|
|
|
#define WR_STATE 0x00000020
|
|
|
|
|
2014-09-24 18:19:17 +08:00
|
|
|
enum nfsd4_cb_op {
|
|
|
|
NFSPROC4_CLNT_CB_NULL = 0,
|
|
|
|
NFSPROC4_CLNT_CB_RECALL,
|
2014-09-23 18:38:48 +08:00
|
|
|
NFSPROC4_CLNT_CB_LAYOUT,
|
2018-07-21 06:19:17 +08:00
|
|
|
NFSPROC4_CLNT_CB_OFFLOAD,
|
2014-09-24 18:19:17 +08:00
|
|
|
NFSPROC4_CLNT_CB_SEQUENCE,
|
2016-09-17 04:28:23 +08:00
|
|
|
NFSPROC4_CLNT_CB_NOTIFY_LOCK,
|
2014-09-24 18:19:17 +08:00
|
|
|
};
|
|
|
|
|
2016-05-05 18:53:47 +08:00
|
|
|
/* Returns true iff a is later than b: */
|
|
|
|
static inline bool nfsd4_stateid_generation_after(stateid_t *a, stateid_t *b)
|
|
|
|
{
|
|
|
|
return (s32)(a->si_generation - b->si_generation) > 0;
|
|
|
|
}
|
2014-09-24 18:19:17 +08:00
|
|
|
|
2016-09-17 04:28:24 +08:00
|
|
|
/*
|
|
|
|
* When a client tries to get a lock on a file, we set one of these objects
|
|
|
|
* on the blocking lock. When the lock becomes free, we can then issue a
|
|
|
|
* CB_NOTIFY_LOCK to the server.
|
|
|
|
*/
|
2016-09-17 04:28:23 +08:00
|
|
|
struct nfsd4_blocked_lock {
|
2016-09-17 04:28:24 +08:00
|
|
|
struct list_head nbl_list;
|
2016-09-17 04:28:25 +08:00
|
|
|
struct list_head nbl_lru;
|
2019-11-04 21:43:17 +08:00
|
|
|
time_t nbl_time;
|
2016-09-17 04:28:23 +08:00
|
|
|
struct file_lock nbl_lock;
|
|
|
|
struct knfsd_fh nbl_fh;
|
|
|
|
struct nfsd4_callback nbl_cb;
|
|
|
|
};
|
|
|
|
|
2009-04-03 13:28:41 +08:00
|
|
|
struct nfsd4_compound_state;
|
2012-07-25 20:57:45 +08:00
|
|
|
struct nfsd_net;
|
2018-07-21 06:19:20 +08:00
|
|
|
struct nfsd4_copy;
|
2009-04-03 13:28:41 +08:00
|
|
|
|
2015-06-18 22:45:00 +08:00
|
|
|
extern __be32 nfs4_preprocess_stateid_op(struct svc_rqst *rqstp,
|
2015-12-03 19:59:51 +08:00
|
|
|
struct nfsd4_compound_state *cstate, struct svc_fh *fhp,
|
2019-10-05 04:34:26 +08:00
|
|
|
stateid_t *stateid, int flags, struct nfsd_file **filp,
|
|
|
|
struct nfs4_stid **cstid);
|
2014-08-14 14:44:57 +08:00
|
|
|
__be32 nfsd4_lookup_stateid(struct nfsd4_compound_state *cstate,
|
|
|
|
stateid_t *stateid, unsigned char typemask,
|
|
|
|
struct nfs4_stid **s, struct nfsd_net *nn);
|
2017-01-18 19:04:42 +08:00
|
|
|
struct nfs4_stid *nfs4_alloc_stid(struct nfs4_client *cl, struct kmem_cache *slab,
|
|
|
|
void (*sc_free)(struct nfs4_stid *));
|
2019-10-05 04:34:26 +08:00
|
|
|
int nfs4_init_copy_state(struct nfsd_net *nn, struct nfsd4_copy *copy);
|
|
|
|
void nfs4_free_copy_state(struct nfsd4_copy *copy);
|
|
|
|
struct nfs4_cpntf_state *nfs4_alloc_init_cpntf_state(struct nfsd_net *nn,
|
|
|
|
struct nfs4_stid *p_stid);
|
2014-08-14 14:44:57 +08:00
|
|
|
void nfs4_unhash_stid(struct nfs4_stid *s);
|
2014-07-30 09:34:06 +08:00
|
|
|
void nfs4_put_stid(struct nfs4_stid *s);
|
2015-10-01 21:05:50 +08:00
|
|
|
void nfs4_inc_and_copy_stateid(stateid_t *dst, struct nfs4_stid *stid);
|
2012-11-14 23:21:16 +08:00
|
|
|
void nfs4_remove_reclaim_record(struct nfs4_client_reclaim *, struct nfsd_net *);
|
|
|
|
extern void nfs4_release_reclaim(struct nfsd_net *);
|
2019-03-27 06:06:26 +08:00
|
|
|
extern struct nfs4_client_reclaim *nfsd4_find_reclaim_client(struct xdr_netobj name,
|
2012-11-14 23:21:16 +08:00
|
|
|
struct nfsd_net *nn);
|
2014-06-30 23:48:47 +08:00
|
|
|
extern __be32 nfs4_check_open_reclaim(clientid_t *clid,
|
|
|
|
struct nfsd4_compound_state *cstate, struct nfsd_net *nn);
|
2010-10-20 05:56:52 +08:00
|
|
|
extern void nfsd4_probe_callback(struct nfs4_client *clp);
|
2010-12-10 04:52:19 +08:00
|
|
|
extern void nfsd4_probe_callback_sync(struct nfs4_client *clp);
|
2010-10-20 05:56:52 +08:00
|
|
|
extern void nfsd4_change_callback(struct nfs4_client *clp, struct nfs4_cb_conn *);
|
2014-09-24 18:19:18 +08:00
|
|
|
extern void nfsd4_init_cb(struct nfsd4_callback *cb, struct nfs4_client *clp,
|
2015-11-22 05:57:39 +08:00
|
|
|
const struct nfsd4_callback_ops *ops, enum nfsd4_cb_op op);
|
2014-09-24 18:19:18 +08:00
|
|
|
extern void nfsd4_run_cb(struct nfsd4_callback *cb);
|
2010-03-04 03:52:55 +08:00
|
|
|
extern int nfsd4_create_callback_queue(void);
|
|
|
|
extern void nfsd4_destroy_callback_queue(void);
|
2010-06-05 08:04:45 +08:00
|
|
|
extern void nfsd4_shutdown_callback(struct nfs4_client *);
|
2018-07-21 06:19:20 +08:00
|
|
|
extern void nfsd4_shutdown_copy(struct nfs4_client *clp);
|
2014-07-16 22:31:57 +08:00
|
|
|
extern void nfsd4_prepare_cb_recall(struct nfs4_delegation *dp);
|
2019-03-27 06:06:26 +08:00
|
|
|
extern struct nfs4_client_reclaim *nfs4_client_to_reclaim(struct xdr_netobj name,
|
2019-09-10 04:10:31 +08:00
|
|
|
struct xdr_netobj princhash, struct nfsd_net *nn);
|
2019-03-27 06:06:26 +08:00
|
|
|
extern bool nfs4_has_reclaimed_state(struct xdr_netobj name, struct nfsd_net *nn);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2014-08-14 14:50:16 +08:00
|
|
|
struct nfs4_file *find_file(struct knfsd_fh *fh);
|
|
|
|
void put_nfs4_file(struct nfs4_file *fi);
|
2018-07-21 06:19:20 +08:00
|
|
|
extern void nfs4_put_copy(struct nfsd4_copy *copy);
|
|
|
|
extern struct nfsd4_copy *
|
|
|
|
find_async_copy(struct nfs4_client *clp, stateid_t *staetid);
|
2019-10-05 04:34:26 +08:00
|
|
|
extern void nfs4_put_cpntf_state(struct nfsd_net *nn,
|
|
|
|
struct nfs4_cpntf_state *cps);
|
2019-10-09 23:50:48 +08:00
|
|
|
extern __be32 manage_cpntf_state(struct nfsd_net *nn, stateid_t *st,
|
|
|
|
struct nfs4_client *clp,
|
|
|
|
struct nfs4_cpntf_state **cps);
|
2014-08-14 14:50:16 +08:00
|
|
|
static inline void get_nfs4_file(struct nfs4_file *fi)
|
|
|
|
{
|
2017-10-20 17:53:30 +08:00
|
|
|
refcount_inc(&fi->fi_ref);
|
2014-08-14 14:50:16 +08:00
|
|
|
}
|
2019-08-19 02:18:53 +08:00
|
|
|
struct nfsd_file *find_any_file(struct nfs4_file *f);
|
2014-08-14 14:50:16 +08:00
|
|
|
|
2014-09-13 04:40:21 +08:00
|
|
|
/* grace period management */
|
|
|
|
void nfsd4_end_grace(struct nfsd_net *nn);
|
|
|
|
|
2012-03-22 04:42:43 +08:00
|
|
|
/* nfs4recover operations */
|
|
|
|
extern int nfsd4_client_tracking_init(struct net *net);
|
|
|
|
extern void nfsd4_client_tracking_exit(struct net *net);
|
|
|
|
extern void nfsd4_client_record_create(struct nfs4_client *clp);
|
|
|
|
extern void nfsd4_client_record_remove(struct nfs4_client *clp);
|
|
|
|
extern int nfsd4_client_record_check(struct nfs4_client *clp);
|
2014-09-13 04:40:20 +08:00
|
|
|
extern void nfsd4_record_grace_done(struct nfsd_net *nn);
|
2012-11-27 22:35:10 +08:00
|
|
|
|
|
|
|
/* nfs fault injection functions */
|
|
|
|
#ifdef CONFIG_NFSD_FAULT_INJECTION
|
2019-06-12 23:26:03 +08:00
|
|
|
void nfsd_fault_inject_init(void);
|
2012-11-27 22:35:10 +08:00
|
|
|
void nfsd_fault_inject_cleanup(void);
|
2014-07-30 20:27:24 +08:00
|
|
|
|
|
|
|
u64 nfsd_inject_print_clients(void);
|
|
|
|
u64 nfsd_inject_forget_client(struct sockaddr_storage *, size_t);
|
|
|
|
u64 nfsd_inject_forget_clients(u64);
|
|
|
|
|
|
|
|
u64 nfsd_inject_print_locks(void);
|
|
|
|
u64 nfsd_inject_forget_client_locks(struct sockaddr_storage *, size_t);
|
|
|
|
u64 nfsd_inject_forget_locks(u64);
|
|
|
|
|
|
|
|
u64 nfsd_inject_print_openowners(void);
|
|
|
|
u64 nfsd_inject_forget_client_openowners(struct sockaddr_storage *, size_t);
|
|
|
|
u64 nfsd_inject_forget_openowners(u64);
|
|
|
|
|
|
|
|
u64 nfsd_inject_print_delegations(void);
|
|
|
|
u64 nfsd_inject_forget_client_delegations(struct sockaddr_storage *, size_t);
|
|
|
|
u64 nfsd_inject_forget_delegations(u64);
|
|
|
|
u64 nfsd_inject_recall_client_delegations(struct sockaddr_storage *, size_t);
|
|
|
|
u64 nfsd_inject_recall_delegations(u64);
|
2012-11-27 22:35:10 +08:00
|
|
|
#else /* CONFIG_NFSD_FAULT_INJECTION */
|
2019-06-12 23:26:03 +08:00
|
|
|
static inline void nfsd_fault_inject_init(void) {}
|
2012-11-27 22:35:10 +08:00
|
|
|
static inline void nfsd_fault_inject_cleanup(void) {}
|
|
|
|
#endif /* CONFIG_NFSD_FAULT_INJECTION */
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
#endif /* NFSD4_STATE_H */
|