]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - fs/nfsd/state.h
UBUNTU: rebase to v4.10-rc2
[mirror_ubuntu-zesty-kernel.git] / fs / nfsd / state.h
CommitLineData
1da177e4 1/*
1da177e4
LT
2 * Copyright (c) 2001 The Regents of the University of Michigan.
3 * All rights reserved.
4 *
5 * Kendrick Smith <kmsmith@umich.edu>
6 * Andy Adamson <andros@umich.edu>
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 *
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the University nor the names of its
18 * contributors may be used to endorse or promote products derived
19 * from this software without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
22 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
23 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
24 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
26 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
27 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
28 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
29 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
30 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
31 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32 *
33 */
34
35#ifndef _NFSD4_STATE_H
36#define _NFSD4_STATE_H
37
38c2f4b1 38#include <linux/idr.h>
19cf5c02 39#include <linux/sunrpc/svc_xprt.h>
1557aca7 40#include "nfsfh.h"
1da177e4 41
1da177e4
LT
42typedef struct {
43 u32 cl_boot;
44 u32 cl_id;
45} clientid_t;
46
47typedef struct {
d3b313a4
BF
48 clientid_t so_clid;
49 u32 so_id;
1da177e4
LT
50} stateid_opaque_t;
51
52typedef struct {
53 u32 si_generation;
54 stateid_opaque_t si_opaque;
55} stateid_t;
1da177e4 56
8c10cbdb
BH
57#define STATEID_FMT "(%08x/%08x/%08x/%08x)"
58#define STATEID_VAL(s) \
d3b313a4
BF
59 (s)->si_opaque.so_clid.cl_boot, \
60 (s)->si_opaque.so_clid.cl_id, \
61 (s)->si_opaque.so_id, \
8c10cbdb
BH
62 (s)->si_generation
63
227f98d9 64struct nfsd4_callback {
fb003923 65 struct nfs4_client *cb_clp;
5878453d 66 struct rpc_message cb_msg;
c4cb8974 67 const struct nfsd4_callback_ops *cb_ops;
b5a1a81e 68 struct work_struct cb_work;
7ba6cad6 69 int cb_seq_status;
ef2a1b3e 70 int cb_status;
cba5f62b 71 bool cb_need_restart;
227f98d9
BF
72};
73
0162ac2b
CH
74struct nfsd4_callback_ops {
75 void (*prepare)(struct nfsd4_callback *);
76 int (*done)(struct nfsd4_callback *, struct rpc_task *);
77 void (*release)(struct nfsd4_callback *);
78};
79
14a571a8
JL
80/*
81 * A core object that represents a "common" stateid. These are generally
82 * embedded within the different (more specific) stateid objects and contain
83 * fields that are of general use to any stateid.
84 */
d5477a8d 85struct nfs4_stid {
9767feb2 86 atomic_t sc_count;
d5477a8d
BF
87#define NFS4_OPEN_STID 1
88#define NFS4_LOCK_STID 2
89#define NFS4_DELEG_STID 4
f7a4d872
BF
90/* For an open stateid kept around *only* to process close replays: */
91#define NFS4_CLOSED_STID 8
3bd64a5b
BF
92/* For a deleg stateid kept around only to process free_stateid's: */
93#define NFS4_REVOKED_DELEG_STID 16
b0fc29d6 94#define NFS4_CLOSED_DELEG_STID 32
9cf514cc 95#define NFS4_LAYOUT_STID 64
9767feb2
JL
96 unsigned char sc_type;
97 stateid_t sc_stateid;
98 spinlock_t sc_lock;
99 struct nfs4_client *sc_client;
100 struct nfs4_file *sc_file;
101 void (*sc_free)(struct nfs4_stid *);
d5477a8d
BF
102};
103
14a571a8
JL
104/*
105 * Represents a delegation stateid. The nfs4_client holds references to these
106 * and they are put when it is being destroyed or when the delegation is
107 * returned by the client:
108 *
109 * o 1 reference as long as a delegation is still in force (taken when it's
110 * alloc'd, put when it's returned or revoked)
111 *
112 * o 1 reference as long as a recall rpc is in progress (taken when the lease
113 * is broken, put when the rpc exits)
114 *
115 * o 1 more ephemeral reference for each nfsd thread currently doing something
116 * with that delegation without holding the cl_lock
117 *
118 * If the server attempts to recall a delegation and the client doesn't do so
119 * before a timeout, the server may also revoke the delegation. In that case,
120 * the object will either be destroyed (v4.0) or moved to a per-client list of
121 * revoked delegations (v4.1+).
122 *
123 * This object is a superset of the nfs4_stid.
124 */
1da177e4 125struct nfs4_delegation {
996e0938 126 struct nfs4_stid dl_stid; /* must be first field */
ea1da636
N
127 struct list_head dl_perfile;
128 struct list_head dl_perclnt;
1da177e4 129 struct list_head dl_recall_lru; /* delegation recalled */
8287f009 130 struct nfs4_clnt_odstate *dl_clnt_odstate;
1da177e4
LT
131 u32 dl_type;
132 time_t dl_time;
b53d40c5 133/* For recall: */
3aea09dc 134 int dl_retries;
227f98d9 135 struct nfsd4_callback dl_recall;
1da177e4
LT
136};
137
34549ab0
JL
138#define cb_to_delegation(cb) \
139 container_of(cb, struct nfs4_delegation, dl_recall)
140
1da177e4 141/* client delegation callback info */
c237dc03 142struct nfs4_cb_conn {
1da177e4 143 /* SETCLIENTID info */
aa9a4ec7 144 struct sockaddr_storage cb_addr;
6f3d772f 145 struct sockaddr_storage cb_saddr;
aa9a4ec7 146 size_t cb_addrlen;
8b5ce5cd
BF
147 u32 cb_prog; /* used only in 4.0 case;
148 per-session otherwise */
ab52ae6d 149 u32 cb_ident; /* minorversion 0 only */
2bf23875 150 struct svc_xprt *cb_xprt; /* minorversion 1 only */
1da177e4
LT
151};
152
f459e453
BF
153static inline struct nfs4_delegation *delegstateid(struct nfs4_stid *s)
154{
155 return container_of(s, struct nfs4_delegation, dl_stid);
156}
157
a649637c
AA
158/* Maximum number of slots per session. 160 is useful for long haul TCP */
159#define NFSD_MAX_SLOTS_PER_SESSION 160
ec6b5d7b
AA
160/* Maximum number of operations per session compound */
161#define NFSD_MAX_OPS_PER_COMPOUND 16
557ce264 162/* Maximum session per slot cache size */
24906f32 163#define NFSD_SLOT_CACHE_SIZE 2048
a649637c
AA
164/* Maximum number of NFSD_SLOT_CACHE_SIZE slots per session */
165#define NFSD_CACHE_SIZE_SLOTS_PER_SESSION 32
166#define NFSD_MAX_MEM_PER_SESSION \
167 (NFSD_CACHE_SIZE_SLOTS_PER_SESSION * NFSD_SLOT_CACHE_SIZE)
074fe897 168
7116ed6b 169struct nfsd4_slot {
557ce264
AA
170 u32 sl_seqid;
171 __be32 sl_status;
172 u32 sl_datalen;
73e79482
BF
173 u16 sl_opcnt;
174#define NFSD4_SLOT_INUSE (1 << 0)
175#define NFSD4_SLOT_CACHETHIS (1 << 1)
bf5c43c8 176#define NFSD4_SLOT_INITIALIZED (1 << 2)
73e79482 177 u8 sl_flags;
557ce264 178 char sl_data[];
7116ed6b
AA
179};
180
6c18ba9f
AB
181struct nfsd4_channel_attrs {
182 u32 headerpadsz;
183 u32 maxreq_sz;
184 u32 maxresp_sz;
185 u32 maxresp_cached;
186 u32 maxops;
187 u32 maxreqs;
188 u32 nr_rdma_attrs;
189 u32 rdma_attrs;
190};
191
acb2887e 192struct nfsd4_cb_sec {
12fc3e92 193 u32 flavor; /* (u32)(-1) used to mean "no valid flavor" */
03bc6d1c
EB
194 kuid_t uid;
195 kgid_t gid;
acb2887e
BF
196};
197
49557cc7
AA
198struct nfsd4_create_session {
199 clientid_t clientid;
200 struct nfs4_sessionid sessionid;
201 u32 seqid;
202 u32 flags;
203 struct nfsd4_channel_attrs fore_channel;
204 struct nfsd4_channel_attrs back_channel;
205 u32 callback_prog;
acb2887e 206 struct nfsd4_cb_sec cb_sec;
49557cc7
AA
207};
208
cb73a9f4
BF
209struct nfsd4_backchannel_ctl {
210 u32 bc_cb_program;
211 struct nfsd4_cb_sec bc_cb_sec;
212};
213
1d1bc8f2
BF
214struct nfsd4_bind_conn_to_session {
215 struct nfs4_sessionid sessionid;
216 u32 dir;
217};
218
49557cc7
AA
219/* The single slot clientid cache structure */
220struct nfsd4_clid_slot {
221 u32 sl_seqid;
222 __be32 sl_status;
223 struct nfsd4_create_session sl_cr_ses;
224};
225
c7662518
BF
226struct nfsd4_conn {
227 struct list_head cn_persession;
228 struct svc_xprt *cn_xprt;
19cf5c02
BF
229 struct svc_xpt_user cn_xpt_user;
230 struct nfsd4_session *cn_session;
c7662518
BF
231/* CDFC4_FORE, CDFC4_BACK: */
232 unsigned char cn_flags;
233};
234
14a571a8
JL
235/*
236 * Representation of a v4.1+ session. These are refcounted in a similar fashion
237 * to the nfs4_client. References are only taken when the server is actively
238 * working on the object (primarily during the processing of compounds).
239 */
7116ed6b 240struct nfsd4_session {
66b2b9b2 241 atomic_t se_ref;
7116ed6b
AA
242 struct list_head se_hash; /* hash by sessionid */
243 struct list_head se_perclnt;
66b2b9b2
BF
244/* See SESSION4_PERSIST, etc. for standard flags; this is internal-only: */
245#define NFS4_SESSION_DEAD 0x010
7116ed6b 246 u32 se_flags;
07cd4909 247 struct nfs4_client *se_client;
7116ed6b 248 struct nfs4_sessionid se_sessionid;
6c18ba9f
AB
249 struct nfsd4_channel_attrs se_fchannel;
250 struct nfsd4_channel_attrs se_bchannel;
acb2887e 251 struct nfsd4_cb_sec se_cb_sec;
c7662518 252 struct list_head se_conns;
8b5ce5cd 253 u32 se_cb_prog;
ac7c46f2 254 u32 se_cb_seq_nr;
557ce264 255 struct nfsd4_slot *se_slots[]; /* forward channel slots */
7116ed6b
AA
256};
257
5282fd72
ME
258/* formatted contents of nfs4_sessionid */
259struct nfsd4_sessionid {
260 clientid_t clientid;
261 u32 sequence;
262 u32 reserved;
263};
264
a55370a3
N
265#define HEXDIR_LEN 33 /* hex version of 16 byte md5 of cl_name plus '\0' */
266
1da177e4
LT
267/*
268 * struct nfs4_client - one per client. Clientids live here.
1da177e4 269 *
14a571a8
JL
270 * The initial object created by an NFS client using SETCLIENTID (for NFSv4.0)
271 * or EXCHANGE_ID (for NFSv4.1+). These objects are refcounted and timestamped.
272 * Each nfsd_net_ns object contains a set of these and they are tracked via
273 * short and long form clientid. They are hashed and searched for under the
274 * per-nfsd_net client_lock spinlock.
275 *
276 * References to it are only held during the processing of compounds, and in
277 * certain other operations. In their "resting state" they have a refcount of
278 * 0. If they are not renewed within a lease period, they become eligible for
279 * destruction by the laundromat.
280 *
281 * These objects can also be destroyed prematurely by the fault injection code,
282 * or if the client sends certain forms of SETCLIENTID or EXCHANGE_ID updates.
283 * Care is taken *not* to do this however when the objects have an elevated
284 * refcount.
285 *
286 * o Each nfs4_client is hashed by clientid
287 *
288 * o Each nfs4_clients is also hashed by name (the opaque quantity initially
289 * sent by the client to identify itself).
1da177e4 290 *
14a571a8
JL
291 * o cl_perclient list is used to ensure no dangling stateowner references
292 * when we expire the nfs4_client
1da177e4
LT
293 */
294struct nfs4_client {
295 struct list_head cl_idhash; /* hash by cl_clientid.id */
ac55fdc4 296 struct rb_node cl_namenode; /* link into by-name trees */
d4f0489f 297 struct list_head *cl_ownerstr_hashtbl;
ea1da636 298 struct list_head cl_openowners;
38c2f4b1 299 struct idr cl_stateids; /* stateid lookup */
ea1da636 300 struct list_head cl_delegations;
3bd64a5b 301 struct list_head cl_revoked; /* unacknowledged, revoked 4.1 state */
1da177e4 302 struct list_head cl_lru; /* tail queue */
9cf514cc
CH
303#ifdef CONFIG_NFSD_PNFS
304 struct list_head cl_lo_states; /* outstanding layout states */
305#endif
1da177e4
LT
306 struct xdr_netobj cl_name; /* id generated by client */
307 nfs4_verifier cl_verifier; /* generated by client */
308 time_t cl_time; /* time of last lease renewal */
363168b4 309 struct sockaddr_storage cl_addr; /* client ipaddress */
57266a6e 310 bool cl_mach_cred; /* SP4_MACH_CRED in force */
1da177e4
LT
311 struct svc_cred cl_cred; /* setclientid principal */
312 clientid_t cl_clientid; /* generated by server */
313 nfs4_verifier cl_confirm; /* generated by server */
8323c3b2 314 u32 cl_minorversion;
9fb87070 315
2bf23875
BF
316 /* for v4.0 and v4.1 callbacks: */
317 struct nfs4_cb_conn cl_cb_conn;
a52d726b
JL
318#define NFSD4_CLIENT_CB_UPDATE (0)
319#define NFSD4_CLIENT_CB_KILL (1)
320#define NFSD4_CLIENT_STABLE (2) /* client on stable storage */
321#define NFSD4_CLIENT_RECLAIM_COMPLETE (3) /* reclaim_complete done */
ac55fdc4 322#define NFSD4_CLIENT_CONFIRMED (4) /* client is confirmed */
d682e750 323#define NFSD4_CLIENT_UPCALL_LOCK (5) /* upcall serialization */
a52d726b
JL
324#define NFSD4_CLIENT_CB_FLAG_MASK (1 << NFSD4_CLIENT_CB_UPDATE | \
325 1 << NFSD4_CLIENT_CB_KILL)
326 unsigned long cl_flags;
c6bb3ca2 327 struct rpc_cred *cl_cb_cred;
2bf23875 328 struct rpc_clnt *cl_cb_client;
6ff8da08 329 u32 cl_cb_ident;
77a3569d
BF
330#define NFSD4_CB_UP 0
331#define NFSD4_CB_UNKNOWN 1
332#define NFSD4_CB_DOWN 2
5423732a 333#define NFSD4_CB_FAULT 3
77a3569d 334 int cl_cb_state;
cee277d9 335 struct nfsd4_callback cl_cb_null;
edd76786 336 struct nfsd4_session *cl_cb_session;
2bf23875 337
6ff8da08
BF
338 /* for all client information that callback code might need: */
339 spinlock_t cl_lock;
340
9fb87070
ME
341 /* for nfs41 */
342 struct list_head cl_sessions;
49557cc7 343 struct nfsd4_clid_slot cl_cs_slot; /* create_session slot */
0733d213 344 u32 cl_exchange_flags;
46583e25
BH
345 /* number of rpc's in progress over an associated session: */
346 atomic_t cl_refcount;
ed941643 347 struct nfs4_op_map cl_spo_must_allow;
38524ab3
AA
348
349 /* for nfs41 callbacks */
199ff35e
RL
350 /* We currently support a single back channel with a single slot */
351 unsigned long cl_cb_slot_busy;
199ff35e
RL
352 struct rpc_wait_queue cl_cb_waitq; /* backchannel callers may */
353 /* wait here for slots */
c212cecf 354 struct net *net;
1da177e4
LT
355};
356
357/* struct nfs4_client_reset
358 * one per old client. Populates reset_str_hashtbl. Filled from conf_id_hashtbl
359 * upon lease reset, or from upcall to state_daemon (to read in state
360 * from non-volitile storage) upon reboot.
361 */
362struct nfs4_client_reclaim {
363 struct list_head cr_strhash; /* hash by cr_name */
0ce0c2b5 364 struct nfs4_client *cr_clp; /* pointer to associated clp */
a55370a3 365 char cr_recdir[HEXDIR_LEN]; /* recover dir */
1da177e4
LT
366};
367
1da177e4
LT
368/* A reasonable value for REPLAY_ISIZE was estimated as follows:
369 * The OPEN response, typically the largest, requires
370 * 4(status) + 8(stateid) + 20(changeinfo) + 4(rflags) + 8(verifier) +
371 * 4(deleg. type) + 8(deleg. stateid) + 4(deleg. recall flag) +
372 * 20(deleg. space limit) + ~32(deleg. ace) = 112 bytes
373 */
374
375#define NFSD4_REPLAY_ISIZE 112
376
377/*
378 * Replay buffer, where the result of the last seqid-mutating operation
379 * is cached.
380 */
381struct nfs4_replay {
b37ad28b 382 __be32 rp_status;
1da177e4
LT
383 unsigned int rp_buflen;
384 char *rp_buf;
a4773c08 385 struct knfsd_fh rp_openfh;
58fb12e6 386 struct mutex rp_mutex;
1da177e4
LT
387 char rp_ibuf[NFSD4_REPLAY_ISIZE];
388};
389
6b180f0b
JL
390struct nfs4_stateowner;
391
392struct nfs4_stateowner_operations {
8f4b54c5 393 void (*so_unhash)(struct nfs4_stateowner *);
6b180f0b
JL
394 void (*so_free)(struct nfs4_stateowner *);
395};
396
14a571a8
JL
397/*
398 * A core object that represents either an open or lock owner. The object and
399 * lock owner objects have one of these embedded within them. Refcounts and
400 * other fields common to both owner types are contained within these
401 * structures.
402 */
1da177e4 403struct nfs4_stateowner {
6b180f0b
JL
404 struct list_head so_strhash;
405 struct list_head so_stateids;
406 struct nfs4_client *so_client;
407 const struct nfs4_stateowner_operations *so_ops;
83e452fe 408 /* after increment in nfsd4_bump_seqid, represents the next
7fb64cee 409 * sequence id expected from the client: */
6b180f0b
JL
410 atomic_t so_count;
411 u32 so_seqid;
412 struct xdr_netobj so_owner; /* open owner name */
413 struct nfs4_replay so_replay;
414 bool so_is_open_owner;
1da177e4
LT
415};
416
14a571a8
JL
417/*
418 * When a file is opened, the client provides an open state owner opaque string
419 * that indicates the "owner" of that open. These objects are refcounted.
420 * References to it are held by each open state associated with it. This object
421 * is a superset of the nfs4_stateowner struct.
422 */
fe0750e5
BF
423struct nfs4_openowner {
424 struct nfs4_stateowner oo_owner; /* must be first field */
425 struct list_head oo_perclient;
b31b30e5
BF
426 /*
427 * We keep around openowners a little while after last close,
428 * which saves clients from having to confirm, and allows us to
429 * handle close replays if they come soon enough. The close_lru
430 * is a list of such openowners, to be reaped by the laundromat
431 * thread eventually if they remain unused:
432 */
433 struct list_head oo_close_lru;
38c387b5 434 struct nfs4_ol_stateid *oo_last_closed_stid;
fe0750e5 435 time_t oo_time; /* time of placement on so_close_lru */
dad1c067
BF
436#define NFS4_OO_CONFIRMED 1
437 unsigned char oo_flags;
fe0750e5
BF
438};
439
14a571a8
JL
440/*
441 * Represents a generic "lockowner". Similar to an openowner. References to it
442 * are held by the lock stateids that are created on its behalf. This object is
76d348fa 443 * a superset of the nfs4_stateowner struct.
14a571a8 444 */
fe0750e5 445struct nfs4_lockowner {
76d348fa
JL
446 struct nfs4_stateowner lo_owner; /* must be first element */
447 struct list_head lo_blocked; /* blocked file_locks */
fe0750e5
BF
448};
449
450static inline struct nfs4_openowner * openowner(struct nfs4_stateowner *so)
451{
452 return container_of(so, struct nfs4_openowner, oo_owner);
453}
454
455static inline struct nfs4_lockowner * lockowner(struct nfs4_stateowner *so)
456{
457 return container_of(so, struct nfs4_lockowner, lo_owner);
458}
459
8287f009
SB
460/*
461 * Per-client state indicating no. of opens and outstanding delegations
462 * on a file from a particular client.'od' stands for 'open & delegation'
463 */
464struct nfs4_clnt_odstate {
465 struct nfs4_client *co_client;
466 struct nfs4_file *co_file;
467 struct list_head co_perfile;
468 atomic_t co_odcount;
469};
470
14a571a8
JL
471/*
472 * nfs4_file: a file opened by some number of (open) nfs4_stateowners.
473 *
ccc6398e
JL
474 * These objects are global. nfsd keeps one instance of a nfs4_file per
475 * filehandle (though it may keep multiple file descriptors for each). Each
476 * inode can have multiple filehandles associated with it, so there is
477 * (potentially) a many to one relationship between this struct and struct
478 * inode.
479 *
480 * These are hashed by filehandle in the file_hashtbl, which is protected by
481 * the global state_lock spinlock.
14a571a8 482 */
1da177e4 483struct nfs4_file {
8b671b80 484 atomic_t fi_ref;
1d31a253 485 spinlock_t fi_lock;
ccc6398e 486 struct hlist_node fi_hash; /* hash on fi_fhandle */
8beefa24 487 struct list_head fi_stateids;
5b095e99
JL
488 union {
489 struct list_head fi_delegations;
490 struct rcu_head fi_rcu;
491 };
8287f009 492 struct list_head fi_clnt_odstate;
f9d7562f
BF
493 /* One each for O_RDONLY, O_WRONLY, O_RDWR: */
494 struct file * fi_fds[3];
f9d7562f 495 /*
6409a5a6
BF
496 * Each open or lock stateid contributes 0-4 to the counts
497 * below depending on which bits are set in st_access_bitmap:
498 * 1 to fi_access[O_RDONLY] if NFS4_SHARE_ACCES_READ is set
499 * + 1 to fi_access[O_WRONLY] if NFS4_SHARE_ACCESS_WRITE is set
500 * + 1 to both of the above if NFS4_SHARE_ACCESS_BOTH is set.
f9d7562f 501 */
9ae78bcc 502 atomic_t fi_access[2];
baeb4ff0 503 u32 fi_share_deny;
acfdf5c3 504 struct file *fi_deleg_file;
67db1034 505 int fi_delegees;
e2cf80d7 506 struct knfsd_fh fi_fhandle;
47f9940c 507 bool fi_had_conflict;
9cf514cc
CH
508#ifdef CONFIG_NFSD_PNFS
509 struct list_head fi_lo_states;
c5c707f9 510 atomic_t fi_lo_recalls;
9cf514cc 511#endif
1da177e4
LT
512};
513
14a571a8
JL
514/*
515 * A generic struct representing either a open or lock stateid. The nfs4_client
516 * holds a reference to each of these objects, and they in turn hold a
517 * reference to their respective stateowners. The client's reference is
518 * released in response to a close or unlock (depending on whether it's an open
519 * or lock stateid) or when the client is being destroyed.
520 *
521 * In the case of v4.0 open stateids, these objects are preserved for a little
522 * while after close in order to handle CLOSE replays. Those are eventually
523 * reclaimed via a LRU scheme by the laundromat.
524 *
525 * This object is a superset of the nfs4_stid. "ol" stands for "Open or Lock".
526 * Better suggestions welcome.
527 */
dcef0413 528struct nfs4_ol_stateid {
35a92fe8
JL
529 struct nfs4_stid st_stid;
530 struct list_head st_perfile;
531 struct list_head st_perstateowner;
532 struct list_head st_locks;
533 struct nfs4_stateowner *st_stateowner;
534 struct nfs4_clnt_odstate *st_clnt_odstate;
535 unsigned char st_access_bmap;
536 unsigned char st_deny_bmap;
537 struct nfs4_ol_stateid *st_openstp;
feb9dad5 538 struct mutex st_mutex;
1da177e4
LT
539};
540
dcef0413
BF
541static inline struct nfs4_ol_stateid *openlockstateid(struct nfs4_stid *s)
542{
543 return container_of(s, struct nfs4_ol_stateid, st_stid);
544}
545
9cf514cc
CH
546struct nfs4_layout_stateid {
547 struct nfs4_stid ls_stid;
548 struct list_head ls_perclnt;
549 struct list_head ls_perfile;
550 spinlock_t ls_lock;
551 struct list_head ls_layouts;
552 u32 ls_layout_type;
c5c707f9
CH
553 struct file *ls_file;
554 struct nfsd4_callback ls_recall;
555 stateid_t ls_recall_sid;
556 bool ls_recalled;
cc8a5532 557 struct mutex ls_mutex;
9cf514cc
CH
558};
559
560static inline struct nfs4_layout_stateid *layoutstateid(struct nfs4_stid *s)
561{
562 return container_of(s, struct nfs4_layout_stateid, ls_stid);
563}
564
1da177e4 565/* flags for preprocess_seqid_op() */
1da177e4
LT
566#define RD_STATE 0x00000010
567#define WR_STATE 0x00000020
1da177e4 568
326129d0
CH
569enum nfsd4_cb_op {
570 NFSPROC4_CLNT_CB_NULL = 0,
571 NFSPROC4_CLNT_CB_RECALL,
c5c707f9 572 NFSPROC4_CLNT_CB_LAYOUT,
326129d0 573 NFSPROC4_CLNT_CB_SEQUENCE,
a188620e 574 NFSPROC4_CLNT_CB_NOTIFY_LOCK,
326129d0
CH
575};
576
14b7f4a1
JL
577/* Returns true iff a is later than b: */
578static inline bool nfsd4_stateid_generation_after(stateid_t *a, stateid_t *b)
579{
580 return (s32)(a->si_generation - b->si_generation) > 0;
581}
326129d0 582
76d348fa
JL
583/*
584 * When a client tries to get a lock on a file, we set one of these objects
585 * on the blocking lock. When the lock becomes free, we can then issue a
586 * CB_NOTIFY_LOCK to the server.
587 */
a188620e 588struct nfsd4_blocked_lock {
76d348fa 589 struct list_head nbl_list;
7919d0a2
JL
590 struct list_head nbl_lru;
591 unsigned long nbl_time;
a188620e
JL
592 struct file_lock nbl_lock;
593 struct knfsd_fh nbl_fh;
594 struct nfsd4_callback nbl_cb;
595};
596
dd453dfd 597struct nfsd4_compound_state;
2c142baa 598struct nfsd_net;
dd453dfd 599
af90f707 600extern __be32 nfs4_preprocess_stateid_op(struct svc_rqst *rqstp,
aa0d6aed
AS
601 struct nfsd4_compound_state *cstate, struct svc_fh *fhp,
602 stateid_t *stateid, int flags, struct file **filp, bool *tmp_file);
cd61c522
CH
603__be32 nfsd4_lookup_stateid(struct nfsd4_compound_state *cstate,
604 stateid_t *stateid, unsigned char typemask,
605 struct nfs4_stid **s, struct nfsd_net *nn);
d19fb70d
KM
606struct nfs4_stid *nfs4_alloc_stid(struct nfs4_client *cl, struct kmem_cache *slab,
607 void (*sc_free)(struct nfs4_stid *));
cd61c522 608void nfs4_unhash_stid(struct nfs4_stid *s);
6011695d 609void nfs4_put_stid(struct nfs4_stid *s);
9767feb2 610void nfs4_inc_and_copy_stateid(stateid_t *dst, struct nfs4_stid *stid);
52e19c09
SK
611void nfs4_remove_reclaim_record(struct nfs4_client_reclaim *, struct nfsd_net *);
612extern void nfs4_release_reclaim(struct nfsd_net *);
613extern struct nfs4_client_reclaim *nfsd4_find_reclaim_client(const char *recdir,
614 struct nfsd_net *nn);
0fe492db
TM
615extern __be32 nfs4_check_open_reclaim(clientid_t *clid,
616 struct nfsd4_compound_state *cstate, struct nfsd_net *nn);
80fc015b 617extern int set_callback_cred(void);
5a3c9d71 618extern void nfsd4_probe_callback(struct nfs4_client *clp);
84f5f7cc 619extern void nfsd4_probe_callback_sync(struct nfs4_client *clp);
5a3c9d71 620extern void nfsd4_change_callback(struct nfs4_client *clp, struct nfs4_cb_conn *);
f0b5de1b 621extern void nfsd4_init_cb(struct nfsd4_callback *cb, struct nfs4_client *clp,
c4cb8974 622 const struct nfsd4_callback_ops *ops, enum nfsd4_cb_op op);
f0b5de1b 623extern void nfsd4_run_cb(struct nfsd4_callback *cb);
b5a1a81e
BF
624extern int nfsd4_create_callback_queue(void);
625extern void nfsd4_destroy_callback_queue(void);
6ff8da08 626extern void nfsd4_shutdown_callback(struct nfs4_client *);
02e1215f 627extern void nfsd4_prepare_cb_recall(struct nfs4_delegation *dp);
52e19c09
SK
628extern struct nfs4_client_reclaim *nfs4_client_to_reclaim(const char *name,
629 struct nfsd_net *nn);
630extern bool nfs4_has_reclaimed_state(const char *name, struct nfsd_net *nn);
1da177e4 631
e6ba76e1
CH
632struct nfs4_file *find_file(struct knfsd_fh *fh);
633void put_nfs4_file(struct nfs4_file *fi);
634static inline void get_nfs4_file(struct nfs4_file *fi)
635{
636 atomic_inc(&fi->fi_ref);
637}
4d227fca 638struct file *find_any_file(struct nfs4_file *f);
e6ba76e1 639
7f5ef2e9
JL
640/* grace period management */
641void nfsd4_end_grace(struct nfsd_net *nn);
642
2a4317c5
JL
643/* nfs4recover operations */
644extern int nfsd4_client_tracking_init(struct net *net);
645extern void nfsd4_client_tracking_exit(struct net *net);
646extern void nfsd4_client_record_create(struct nfs4_client *clp);
647extern void nfsd4_client_record_remove(struct nfs4_client *clp);
648extern int nfsd4_client_record_check(struct nfs4_client *clp);
919b8049 649extern void nfsd4_record_grace_done(struct nfsd_net *nn);
f3c7521f
BS
650
651/* nfs fault injection functions */
652#ifdef CONFIG_NFSD_FAULT_INJECTION
653int nfsd_fault_inject_init(void);
654void nfsd_fault_inject_cleanup(void);
285abdee
JL
655
656u64 nfsd_inject_print_clients(void);
657u64 nfsd_inject_forget_client(struct sockaddr_storage *, size_t);
658u64 nfsd_inject_forget_clients(u64);
659
660u64 nfsd_inject_print_locks(void);
661u64 nfsd_inject_forget_client_locks(struct sockaddr_storage *, size_t);
662u64 nfsd_inject_forget_locks(u64);
663
664u64 nfsd_inject_print_openowners(void);
665u64 nfsd_inject_forget_client_openowners(struct sockaddr_storage *, size_t);
666u64 nfsd_inject_forget_openowners(u64);
667
668u64 nfsd_inject_print_delegations(void);
669u64 nfsd_inject_forget_client_delegations(struct sockaddr_storage *, size_t);
670u64 nfsd_inject_forget_delegations(u64);
671u64 nfsd_inject_recall_client_delegations(struct sockaddr_storage *, size_t);
672u64 nfsd_inject_recall_delegations(u64);
f3c7521f
BS
673#else /* CONFIG_NFSD_FAULT_INJECTION */
674static inline int nfsd_fault_inject_init(void) { return 0; }
675static inline void nfsd_fault_inject_cleanup(void) {}
676#endif /* CONFIG_NFSD_FAULT_INJECTION */
677
1da177e4 678#endif /* NFSD4_STATE_H */