License cleanup: add SPDX GPL-2.0 license identifier to files with no license
Many source files in the tree are missing licensing information, which
makes it harder for compliance tools to determine the correct license.
By default all files without license information are under the default
license of the kernel, which is GPL version 2.
Update the files which contain no license information with the 'GPL-2.0'
SPDX license identifier. The SPDX identifier is a legally binding
shorthand, which can be used instead of the full boiler plate text.
This patch is based on work done by Thomas Gleixner and Kate Stewart and
Philippe Ombredanne.
How this work was done:
Patches were generated and checked against linux-4.14-rc6 for a subset of
the use cases:
- file had no licensing information it it.
- file was a */uapi/* one with no licensing information in it,
- file was a */uapi/* one with existing licensing information,
Further patches will be generated in subsequent months to fix up cases
where non-standard license headers were used, and references to license
had to be inferred by heuristics based on keywords.
The analysis to determine which SPDX License Identifier to be applied to
a file was done in a spreadsheet of side by side results from of the
output of two independent scanners (ScanCode & Windriver) producing SPDX
tag:value files created by Philippe Ombredanne. Philippe prepared the
base worksheet, and did an initial spot review of a few 1000 files.
The 4.13 kernel was the starting point of the analysis with 60,537 files
assessed. Kate Stewart did a file by file comparison of the scanner
results in the spreadsheet to determine which SPDX license identifier(s)
to be applied to the file. She confirmed any determination that was not
immediately clear with lawyers working with the Linux Foundation.
Criteria used to select files for SPDX license identifier tagging was:
- Files considered eligible had to be source code files.
- Make and config files were included as candidates if they contained >5
lines of source
- File already had some variant of a license header in it (even if <5
lines).
All documentation files were explicitly excluded.
The following heuristics were used to determine which SPDX license
identifiers to apply.
- when both scanners couldn't find any license traces, file was
considered to have no license information in it, and the top level
COPYING file license applied.
For non */uapi/* files that summary was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 11139
and resulted in the first patch in this series.
If that file was a */uapi/* path one, it was "GPL-2.0 WITH
Linux-syscall-note" otherwise it was "GPL-2.0". Results of that was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 WITH Linux-syscall-note 930
and resulted in the second patch in this series.
- if a file had some form of licensing information in it, and was one
of the */uapi/* ones, it was denoted with the Linux-syscall-note if
any GPL family license was found in the file or had no licensing in
it (per prior point). Results summary:
SPDX license identifier # files
---------------------------------------------------|------
GPL-2.0 WITH Linux-syscall-note 270
GPL-2.0+ WITH Linux-syscall-note 169
((GPL-2.0 WITH Linux-syscall-note) OR BSD-2-Clause) 21
((GPL-2.0 WITH Linux-syscall-note) OR BSD-3-Clause) 17
LGPL-2.1+ WITH Linux-syscall-note 15
GPL-1.0+ WITH Linux-syscall-note 14
((GPL-2.0+ WITH Linux-syscall-note) OR BSD-3-Clause) 5
LGPL-2.0+ WITH Linux-syscall-note 4
LGPL-2.1 WITH Linux-syscall-note 3
((GPL-2.0 WITH Linux-syscall-note) OR MIT) 3
((GPL-2.0 WITH Linux-syscall-note) AND MIT) 1
and that resulted in the third patch in this series.
- when the two scanners agreed on the detected license(s), that became
the concluded license(s).
- when there was disagreement between the two scanners (one detected a
license but the other didn't, or they both detected different
licenses) a manual inspection of the file occurred.
- In most cases a manual inspection of the information in the file
resulted in a clear resolution of the license that should apply (and
which scanner probably needed to revisit its heuristics).
- When it was not immediately clear, the license identifier was
confirmed with lawyers working with the Linux Foundation.
- If there was any question as to the appropriate license identifier,
the file was flagged for further research and to be revisited later
in time.
In total, over 70 hours of logged manual review was done on the
spreadsheet to determine the SPDX license identifiers to apply to the
source files by Kate, Philippe, Thomas and, in some cases, confirmation
by lawyers working with the Linux Foundation.
Kate also obtained a third independent scan of the 4.13 code base from
FOSSology, and compared selected files where the other two scanners
disagreed against that SPDX file, to see if there was new insights. The
Windriver scanner is based on an older version of FOSSology in part, so
they are related.
Thomas did random spot checks in about 500 files from the spreadsheets
for the uapi headers and agreed with SPDX license identifier in the
files he inspected. For the non-uapi files Thomas did random spot checks
in about 15000 files.
In initial set of patches against 4.14-rc6, 3 files were found to have
copy/paste license identifier errors, and have been fixed to reflect the
correct identifier.
Additionally Philippe spent 10 hours this week doing a detailed manual
inspection and review of the 12,461 patched files from the initial patch
version early this week with:
- a full scancode scan run, collecting the matched texts, detected
license ids and scores
- reviewing anything where there was a license detected (about 500+
files) to ensure that the applied SPDX license was correct
- reviewing anything where there was no detection but the patch license
was not GPL-2.0 WITH Linux-syscall-note to ensure that the applied
SPDX license was correct
This produced a worksheet with 20 files needing minor correction. This
worksheet was then exported into 3 different .csv files for the
different types of files to be modified.
These .csv files were then reviewed by Greg. Thomas wrote a script to
parse the csv files and add the proper SPDX tag to the file, in the
format that the file expected. This script was further refined by Greg
based on the output to detect more types of files automatically and to
distinguish between header and source .c files (which need different
comment types.) Finally Greg ran the script using the .csv files to
generate the patches.
Reviewed-by: Kate Stewart <kstewart@linuxfoundation.org>
Reviewed-by: Philippe Ombredanne <pombredanne@nexb.com>
Reviewed-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2017-11-01 21:07:57 +07:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0 */
|
2005-04-17 05:20:36 +07:00
|
|
|
/*
|
|
|
|
* linux/include/linux/lockd/lockd.h
|
|
|
|
*
|
|
|
|
* General-purpose lockd include file.
|
|
|
|
*
|
|
|
|
* Copyright (C) 1996 Olaf Kirch <okir@monad.swb.de>
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef LINUX_LOCKD_LOCKD_H
|
|
|
|
#define LINUX_LOCKD_LOCKD_H
|
|
|
|
|
|
|
|
#ifdef __KERNEL__
|
|
|
|
|
|
|
|
#include <linux/in.h>
|
2008-09-04 01:36:01 +07:00
|
|
|
#include <linux/in6.h>
|
|
|
|
#include <net/ipv6.h>
|
2005-04-17 05:20:36 +07:00
|
|
|
#include <linux/fs.h>
|
2006-03-21 01:44:39 +07:00
|
|
|
#include <linux/kref.h>
|
2017-11-29 18:15:43 +07:00
|
|
|
#include <linux/refcount.h>
|
2005-04-17 05:20:36 +07:00
|
|
|
#include <linux/utsname.h>
|
|
|
|
#include <linux/lockd/bind.h>
|
|
|
|
#include <linux/lockd/xdr.h>
|
|
|
|
#ifdef CONFIG_LOCKD_V4
|
|
|
|
#include <linux/lockd/xdr4.h>
|
|
|
|
#endif
|
|
|
|
#include <linux/lockd/debug.h>
|
2014-05-07 00:37:13 +07:00
|
|
|
#include <linux/sunrpc/svc.h>
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Version string
|
|
|
|
*/
|
|
|
|
#define LOCKD_VERSION "0.5"
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Default timeout for RPC calls (seconds)
|
|
|
|
*/
|
|
|
|
#define LOCKD_DFLT_TIMEO 10
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Lockd host handle (used both by the client and server personality).
|
|
|
|
*/
|
|
|
|
struct nlm_host {
|
2006-10-04 16:15:56 +07:00
|
|
|
struct hlist_node h_hash; /* doubly linked list */
|
2008-09-04 01:35:39 +07:00
|
|
|
struct sockaddr_storage h_addr; /* peer address */
|
|
|
|
size_t h_addrlen;
|
2008-09-04 01:35:46 +07:00
|
|
|
struct sockaddr_storage h_srcaddr; /* our address (optional) */
|
2010-11-02 20:11:55 +07:00
|
|
|
size_t h_srcaddrlen;
|
2008-12-05 02:19:45 +07:00
|
|
|
struct rpc_clnt *h_rpcclnt; /* RPC client to talk to peer */
|
|
|
|
char *h_name; /* remote hostname */
|
2005-04-17 05:20:36 +07:00
|
|
|
u32 h_version; /* interface version */
|
|
|
|
unsigned short h_proto; /* transport proto */
|
|
|
|
unsigned short h_reclaiming : 1,
|
|
|
|
h_server : 1, /* server side, not client side */
|
2008-12-24 03:21:38 +07:00
|
|
|
h_noresvport : 1,
|
2006-10-04 16:16:00 +07:00
|
|
|
h_inuse : 1;
|
2005-04-17 05:20:36 +07:00
|
|
|
wait_queue_head_t h_gracewait; /* wait while reclaiming */
|
2006-06-09 20:40:27 +07:00
|
|
|
struct rw_semaphore h_rwsem; /* Reboot recovery lock */
|
2005-04-17 05:20:36 +07:00
|
|
|
u32 h_state; /* pseudo-state counter */
|
|
|
|
u32 h_nsmstate; /* true remote NSM state */
|
|
|
|
u32 h_pidcount; /* Pseudopids */
|
2017-11-29 18:15:43 +07:00
|
|
|
refcount_t h_count; /* reference count */
|
2006-06-09 20:40:24 +07:00
|
|
|
struct mutex h_mutex; /* mutex for pmap binding */
|
2005-04-17 05:20:36 +07:00
|
|
|
unsigned long h_nextrebind; /* next portmap call */
|
|
|
|
unsigned long h_expires; /* eligible for GC */
|
|
|
|
struct list_head h_lockowners; /* Lockowners for the client */
|
|
|
|
spinlock_t h_lock;
|
2006-03-21 01:44:40 +07:00
|
|
|
struct list_head h_granted; /* Locks in GRANTED state */
|
|
|
|
struct list_head h_reclaim; /* Locks in RECLAIM state */
|
2008-12-05 02:19:45 +07:00
|
|
|
struct nsm_handle *h_nsmhandle; /* NSM status handle */
|
2008-12-05 02:19:53 +07:00
|
|
|
char *h_addrbuf; /* address eyecatcher */
|
2012-01-31 18:08:13 +07:00
|
|
|
struct net *net; /* host net */
|
2019-04-25 04:46:50 +07:00
|
|
|
const struct cred *h_cred;
|
2015-10-07 18:39:55 +07:00
|
|
|
char nodename[UNX_MAXNODENAME + 1];
|
2017-04-11 23:50:11 +07:00
|
|
|
const struct nlmclnt_operations *h_nlmclnt_ops; /* Callback ops for NLM users */
|
2006-10-04 16:15:53 +07:00
|
|
|
};
|
|
|
|
|
2008-12-05 02:20:08 +07:00
|
|
|
/*
|
|
|
|
* The largest string sm_addrbuf should hold is a full-size IPv6 address
|
|
|
|
* (no "::" anywhere) with a scope ID. The buffer size is computed to
|
|
|
|
* hold eight groups of colon-separated four-hex-digit numbers, a
|
|
|
|
* percent sign, a scope id (at most 32 bits, in decimal), and NUL.
|
|
|
|
*/
|
|
|
|
#define NSM_ADDRBUF ((8 * 4 + 7) + (1 + 10) + 1)
|
|
|
|
|
2006-10-04 16:15:53 +07:00
|
|
|
struct nsm_handle {
|
|
|
|
struct list_head sm_link;
|
2017-11-29 18:15:44 +07:00
|
|
|
refcount_t sm_count;
|
NSM: Support IPv6 version of mon_name
The "mon_name" argument of the NSMPROC_MON and NSMPROC_UNMON upcalls
is a string that contains the hostname or IP address of the remote peer
to be notified when this host has rebooted. The sm-notify command uses
this identifier to contact the peer when we reboot, so it must be
either a well-qualified DNS hostname or a presentation format IP
address string.
When the "nsm_use_hostnames" sysctl is set to zero, the kernel's NSM
provides a presentation format IP address in the "mon_name" argument.
Otherwise, the "caller_name" argument from NLM requests is used,
which is usually just the DNS hostname of the peer.
To support IPv6 addresses for the mon_name argument, we use the
nsm_handle's address eye-catcher, which already contains an appropriate
presentation format address string. Using the eye-catcher string
obviates the need to use a large buffer on the stack to form the
presentation address string for the upcall.
This patch also addresses a subtle bug.
An NSMPROC_MON request and the subsequent NSMPROC_UNMON request for the
same peer are required to use the same value for the "mon_name"
argument. Otherwise, rpc.statd's NSMPROC_UNMON processing cannot
locate the database entry for that peer and remove it.
If the setting of nsm_use_hostnames is changed between the time the
kernel sends an NSMPROC_MON request and the time it sends the
NSMPROC_UNMON request for the same peer, the "mon_name" argument for
these two requests may not be the same. This is because the value of
"mon_name" is currently chosen at the moment the call is made based on
the setting of nsm_use_hostnames
To ensure both requests pass identical contents in the "mon_name"
argument, we now select which string to use for the argument in the
nsm_monitor() function. A pointer to this string is saved in the
nsm_handle so it can be used for a subsequent NSMPROC_UNMON upcall.
NB: There are other potential problems, such as how nlm_host_rebooted()
might behave if nsm_use_hostnames were changed while hosts are still
being monitored. This patch does not attempt to address those
problems.
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
Signed-off-by: J. Bruce Fields <bfields@citi.umich.edu>
2008-12-05 02:20:46 +07:00
|
|
|
char *sm_mon_name;
|
2008-12-05 02:20:38 +07:00
|
|
|
char *sm_name;
|
2008-09-04 01:35:54 +07:00
|
|
|
struct sockaddr_storage sm_addr;
|
|
|
|
size_t sm_addrlen;
|
2006-10-04 16:15:53 +07:00
|
|
|
unsigned int sm_monitored : 1,
|
|
|
|
sm_sticky : 1; /* don't unmonitor */
|
2008-12-06 07:03:16 +07:00
|
|
|
struct nsm_private sm_priv;
|
2008-12-05 02:20:08 +07:00
|
|
|
char sm_addrbuf[NSM_ADDRBUF];
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
|
2008-09-04 01:35:39 +07:00
|
|
|
/*
|
|
|
|
* Rigorous type checking on sockaddr type conversions
|
|
|
|
*/
|
|
|
|
static inline struct sockaddr_in *nlm_addr_in(const struct nlm_host *host)
|
|
|
|
{
|
|
|
|
return (struct sockaddr_in *)&host->h_addr;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline struct sockaddr *nlm_addr(const struct nlm_host *host)
|
|
|
|
{
|
|
|
|
return (struct sockaddr *)&host->h_addr;
|
|
|
|
}
|
|
|
|
|
2008-09-04 01:35:46 +07:00
|
|
|
static inline struct sockaddr_in *nlm_srcaddr_in(const struct nlm_host *host)
|
|
|
|
{
|
|
|
|
return (struct sockaddr_in *)&host->h_srcaddr;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline struct sockaddr *nlm_srcaddr(const struct nlm_host *host)
|
|
|
|
{
|
|
|
|
return (struct sockaddr *)&host->h_srcaddr;
|
|
|
|
}
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
/*
|
|
|
|
* Map an fl_owner_t into a unique 32-bit "pid"
|
|
|
|
*/
|
|
|
|
struct nlm_lockowner {
|
|
|
|
struct list_head list;
|
2017-11-29 18:15:45 +07:00
|
|
|
refcount_t count;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
struct nlm_host *host;
|
|
|
|
fl_owner_t owner;
|
|
|
|
uint32_t pid;
|
|
|
|
};
|
|
|
|
|
2005-06-23 00:16:31 +07:00
|
|
|
struct nlm_wait;
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
/*
|
|
|
|
* Memory chunk for NLM client RPC request.
|
|
|
|
*/
|
2007-03-30 03:47:47 +07:00
|
|
|
#define NLMCLNT_OHSIZE ((__NEW_UTS_LEN) + 10u)
|
2005-04-17 05:20:36 +07:00
|
|
|
struct nlm_rqst {
|
2017-11-29 18:15:46 +07:00
|
|
|
refcount_t a_count;
|
2005-04-17 05:20:36 +07:00
|
|
|
unsigned int a_flags; /* initial RPC task flags */
|
|
|
|
struct nlm_host * a_host; /* host handle */
|
|
|
|
struct nlm_args a_args; /* arguments */
|
|
|
|
struct nlm_res a_res; /* result */
|
2006-03-21 01:44:45 +07:00
|
|
|
struct nlm_block * a_block;
|
2006-02-02 00:18:25 +07:00
|
|
|
unsigned int a_retries; /* Retry count */
|
2006-03-21 01:44:45 +07:00
|
|
|
u8 a_owner[NLMCLNT_OHSIZE];
|
2017-04-11 23:50:11 +07:00
|
|
|
void * a_callback_data; /* sent to nlmclnt_operations callbacks */
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This struct describes a file held open by lockd on behalf of
|
|
|
|
* an NFS client.
|
|
|
|
*/
|
|
|
|
struct nlm_file {
|
2006-10-04 16:15:58 +07:00
|
|
|
struct hlist_node f_list; /* linked list */
|
2005-04-17 05:20:36 +07:00
|
|
|
struct nfs_fh f_handle; /* NFS file handle */
|
|
|
|
struct file * f_file; /* VFS file pointer */
|
|
|
|
struct nlm_share * f_shares; /* DOS shares */
|
2006-10-04 16:15:57 +07:00
|
|
|
struct list_head f_blocks; /* blocked locks */
|
2005-04-17 05:20:36 +07:00
|
|
|
unsigned int f_locks; /* guesstimate # of locks */
|
|
|
|
unsigned int f_count; /* reference count */
|
2006-10-04 16:16:06 +07:00
|
|
|
struct mutex f_mutex; /* avoid concurrent access */
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This is a server block (i.e. a lock requested by some client which
|
|
|
|
* couldn't be granted because of a conflicting lock).
|
|
|
|
*/
|
|
|
|
#define NLM_NEVER (~(unsigned long) 0)
|
2006-11-29 04:26:47 +07:00
|
|
|
/* timeout on non-blocking call: */
|
|
|
|
#define NLM_TIMEOUT (7 * HZ)
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
struct nlm_block {
|
2006-03-21 01:44:39 +07:00
|
|
|
struct kref b_count; /* Reference count */
|
2006-10-04 16:15:57 +07:00
|
|
|
struct list_head b_list; /* linked list of all blocks */
|
|
|
|
struct list_head b_flist; /* linked list (per file) */
|
2006-03-21 01:44:45 +07:00
|
|
|
struct nlm_rqst * b_call; /* RPC args & callback info */
|
2005-04-17 05:20:36 +07:00
|
|
|
struct svc_serv * b_daemon; /* NLM service */
|
|
|
|
struct nlm_host * b_host; /* host handle for RPC clnt */
|
|
|
|
unsigned long b_when; /* next re-xmit */
|
|
|
|
unsigned int b_id; /* block id */
|
|
|
|
unsigned char b_granted; /* VFS granted lock */
|
|
|
|
struct nlm_file * b_file; /* file in question */
|
2006-11-29 04:26:47 +07:00
|
|
|
struct cache_req * b_cache_req; /* deferred request handling */
|
|
|
|
struct cache_deferred_req * b_deferred_req;
|
|
|
|
unsigned int b_flags; /* block flags */
|
|
|
|
#define B_QUEUED 1 /* lock queued */
|
|
|
|
#define B_GOT_CALLBACK 2 /* got lock or conflicting lock */
|
|
|
|
#define B_TIMED_OUT 4 /* filesystem too slow to respond */
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Global variables
|
|
|
|
*/
|
2012-01-21 01:53:56 +07:00
|
|
|
extern const struct rpc_program nlm_program;
|
2017-05-12 21:11:49 +07:00
|
|
|
extern const struct svc_procedure nlmsvc_procedures[];
|
2005-04-17 05:20:36 +07:00
|
|
|
#ifdef CONFIG_LOCKD_V4
|
2017-05-12 21:11:49 +07:00
|
|
|
extern const struct svc_procedure nlmsvc_procedures4[];
|
2005-04-17 05:20:36 +07:00
|
|
|
#endif
|
|
|
|
extern int nlmsvc_grace_period;
|
|
|
|
extern unsigned long nlmsvc_timeout;
|
2012-01-13 06:02:20 +07:00
|
|
|
extern bool nsm_use_hostnames;
|
lockd: Update NSM state from SM_MON replies
When rpc.statd starts up in user space at boot time, it attempts to
write the latest NSM local state number into
/proc/sys/fs/nfs/nsm_local_state.
If lockd.ko isn't loaded yet (as is the case in most configurations),
that file doesn't exist, thus the kernel's NSM state remains set to
its initial value of zero during lockd operation.
This is a problem because rpc.statd and lockd use the NSM state number
to prevent repeated lock recovery on rebooted hosts. If lockd sends
a zero NSM state, but then a delayed SM_NOTIFY with a real NSM state
number is received, there is no way for lockd or rpc.statd to
distinguish that stale SM_NOTIFY from an actual reboot. Thus lock
recovery could be performed after the rebooted host has already
started reclaiming locks, and those locks will be lost.
We could change /etc/init.d/nfslock so it always modprobes lockd.ko
before starting rpc.statd. However, if lockd.ko is ever unloaded
and reloaded, we are back at square one, since the NSM state is not
preserved across an unload/reload cycle. This may happen frequently
on clients that use automounter. A period of NFS inactivity causes
lockd.ko to be unloaded, and the kernel loses its NSM state setting.
Instead, let's use the fact that rpc.statd plants the local system's
NSM state in every SM_MON (and SM_UNMON) reply. lockd performs a
synchronous SM_MON upcall to the local rpc.statd _before_ sending its
first NLM request to a new remote. This would permit rpc.statd to
provide the current NSM state to lockd, even after lockd.ko had been
unloaded and reloaded.
Note that NLMPROC_LOCK arguments are constructed before the
nsm_monitor() call, so we have to rearrange argument construction very
slightly to make this all work out.
And, the kernel appears to treat NSM state as a u32 (see struct
nlm_args and nsm_res). Make nsm_local_state a u32 as well, to ensure
we don't get bogus comparison results.
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com>
2009-06-18 08:02:10 +07:00
|
|
|
extern u32 nsm_local_state;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Lockd client functions
|
|
|
|
*/
|
2006-03-21 01:44:45 +07:00
|
|
|
struct nlm_rqst * nlm_alloc_call(struct nlm_host *host);
|
|
|
|
int nlm_async_call(struct nlm_rqst *, u32, const struct rpc_call_ops *);
|
2006-03-21 01:44:45 +07:00
|
|
|
int nlm_async_reply(struct nlm_rqst *, u32, const struct rpc_call_ops *);
|
2010-12-14 22:05:42 +07:00
|
|
|
void nlmclnt_release_call(struct nlm_rqst *);
|
2006-03-21 01:44:44 +07:00
|
|
|
struct nlm_wait * nlmclnt_prepare_block(struct nlm_host *host, struct file_lock *fl);
|
|
|
|
void nlmclnt_finish_block(struct nlm_wait *block);
|
|
|
|
int nlmclnt_block(struct nlm_wait *block, struct nlm_rqst *req, long timeout);
|
2008-10-03 23:50:36 +07:00
|
|
|
__be32 nlmclnt_grant(const struct sockaddr *addr,
|
|
|
|
const struct nlm_lock *lock);
|
2006-10-04 16:15:55 +07:00
|
|
|
void nlmclnt_recovery(struct nlm_host *);
|
2013-02-13 22:40:16 +07:00
|
|
|
int nlmclnt_reclaim(struct nlm_host *, struct file_lock *,
|
|
|
|
struct nlm_rqst *);
|
2006-10-04 16:16:02 +07:00
|
|
|
void nlmclnt_next_cookie(struct nlm_cookie *);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Host cache
|
|
|
|
*/
|
2008-10-03 23:50:21 +07:00
|
|
|
struct nlm_host *nlmclnt_lookup_host(const struct sockaddr *sap,
|
|
|
|
const size_t salen,
|
|
|
|
const unsigned short protocol,
|
|
|
|
const u32 version,
|
2008-12-24 03:21:38 +07:00
|
|
|
const char *hostname,
|
2012-01-31 18:08:13 +07:00
|
|
|
int noresvport,
|
2019-04-25 04:46:50 +07:00
|
|
|
struct net *net,
|
|
|
|
const struct cred *cred);
|
lockd: Create client-side nlm_host cache
NFS clients don't need the garbage collection processing that is
performed on nlm_host structures. The client picks up an nlm_host at
mount time and holds a reference to it until the file system is
unmounted.
Servers, on the other hand, don't have a precise way to tell when an
nlm_host is no longer being used, so zero refcount nlm_host entries
are left to expire in the cache after a time.
Basically there's nothing holding a reference to an nlm_host between
individual server-side NLM requests, but we can't afford the expense
of recreating them for every new NLM request from a client. The
nlm_host cache adds some lifetime hysteresis to entries in the cache
so the next time a particular nlm_host is needed, it's likely to be
discovered by a lookup rather than created from whole cloth.
With the new implementation, client nlm_host cache items are no longer
garbage collected, and are destroyed directly by a new release
function specialized for client entries, nlmclnt_release_host(). They
are cached in their own data structure, and have their own lookup
logic, simplified and specialized for client nlm_host entries.
However, the client nlm_host cache still shares reboot recovery logic
with the server nlm_host cache. The NSM "peer rebooted" downcall for
clients and servers still come through the same RPC call. This is a
legacy formal API that would be difficult to alter, and besides, the
user space NSM implementation can't tell the difference between peers
that are clients or servers.
For this reason, the client cache continues to share the
nlm_host_mutex (and reboot recovery logic) with the server cache.
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com>
2010-12-14 22:05:52 +07:00
|
|
|
void nlmclnt_release_host(struct nlm_host *);
|
2008-10-03 23:50:29 +07:00
|
|
|
struct nlm_host *nlmsvc_lookup_host(const struct svc_rqst *rqstp,
|
|
|
|
const char *hostname,
|
|
|
|
const size_t hostname_len);
|
2010-12-14 22:06:12 +07:00
|
|
|
void nlmsvc_release_host(struct nlm_host *);
|
2005-04-17 05:20:36 +07:00
|
|
|
struct rpc_clnt * nlm_bind_host(struct nlm_host *);
|
|
|
|
void nlm_rebind_host(struct nlm_host *);
|
|
|
|
struct nlm_host * nlm_get_host(struct nlm_host *);
|
|
|
|
void nlm_shutdown_hosts(void);
|
2012-01-31 18:08:29 +07:00
|
|
|
void nlm_shutdown_hosts_net(struct net *net);
|
2015-09-23 19:49:29 +07:00
|
|
|
void nlm_host_rebooted(const struct net *net,
|
|
|
|
const struct nlm_reboot *);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2008-12-05 02:21:24 +07:00
|
|
|
/*
|
|
|
|
* Host monitoring
|
|
|
|
*/
|
|
|
|
int nsm_monitor(const struct nlm_host *host);
|
2008-12-05 02:21:38 +07:00
|
|
|
void nsm_unmonitor(const struct nlm_host *host);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2015-09-23 19:49:29 +07:00
|
|
|
struct nsm_handle *nsm_get_handle(const struct net *net,
|
|
|
|
const struct sockaddr *sap,
|
2008-12-06 07:04:01 +07:00
|
|
|
const size_t salen,
|
2008-12-06 07:02:45 +07:00
|
|
|
const char *hostname,
|
2008-12-06 07:04:01 +07:00
|
|
|
const size_t hostname_len);
|
2015-09-23 19:49:29 +07:00
|
|
|
struct nsm_handle *nsm_reboot_lookup(const struct net *net,
|
|
|
|
const struct nlm_reboot *info);
|
2008-12-06 07:02:45 +07:00
|
|
|
void nsm_release(struct nsm_handle *nsm);
|
|
|
|
|
2006-10-04 16:15:59 +07:00
|
|
|
/*
|
|
|
|
* This is used in garbage collection and resource reclaim
|
|
|
|
* A return value != 0 means destroy the lock/block/share
|
|
|
|
*/
|
lockd: unlock lockd locks associated with a given server ip
For high-availability NFS service, we generally need to be able to drop
file locks held on the exported filesystem before moving clients to a
new server. Currently the only way to do that is by shutting down lockd
entirely, which is often undesireable (for example, if you want to
continue exporting other filesystems).
This patch allows the administrator to release all locks held by clients
accessing the client through a given server ip address, by echoing that
address to a new file, /proc/fs/nfsd/unlock_ip, as in:
shell> echo 10.1.1.2 > /proc/fs/nfsd/unlock_ip
The expected sequence of events can be:
1. Tear down the IP address
2. Unexport the path
3. Write IP to /proc/fs/nfsd/unlock_ip to unlock files
4. Signal peer to begin take-over.
For now we only support IPv4 addresses and NFSv2/v3 (NFSv4 locks are not
affected).
Also, if unmounting the filesystem is required, we assume at step 3 that
clients using the given server ip are the only clients holding locks on
the given filesystem; otherwise, an additional patch is required to
allow revoking all locks held by lockd on a given filesystem.
Signed-off-by: S. Wendy Cheng <wcheng@redhat.com>
Cc: Lon Hohberger <lhh@redhat.com>
Cc: Christoph Hellwig <hch@lst.de>
Signed-off-by: J. Bruce Fields <bfields@citi.umich.edu>
fs/lockd/svcsubs.c | 66 +++++++++++++++++++++++++++++++++++++++-----
fs/nfsd/nfsctl.c | 65 +++++++++++++++++++++++++++++++++++++++++++
include/linux/lockd/lockd.h | 7 ++++
3 files changed, 131 insertions(+), 7 deletions(-)
2008-01-17 23:10:12 +07:00
|
|
|
typedef int (*nlm_host_match_fn_t)(void *cur, struct nlm_host *ref);
|
2006-10-04 16:15:59 +07:00
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
/*
|
|
|
|
* Server-side lock handling
|
|
|
|
*/
|
2006-10-20 13:28:46 +07:00
|
|
|
__be32 nlmsvc_lock(struct svc_rqst *, struct nlm_file *,
|
2008-07-16 01:26:17 +07:00
|
|
|
struct nlm_host *, struct nlm_lock *, int,
|
2008-02-07 01:59:23 +07:00
|
|
|
struct nlm_cookie *, int);
|
2012-07-25 19:57:22 +07:00
|
|
|
__be32 nlmsvc_unlock(struct net *net, struct nlm_file *, struct nlm_lock *);
|
2006-11-29 04:27:06 +07:00
|
|
|
__be32 nlmsvc_testlock(struct svc_rqst *, struct nlm_file *,
|
2008-07-16 01:06:48 +07:00
|
|
|
struct nlm_host *, struct nlm_lock *,
|
|
|
|
struct nlm_lock *, struct nlm_cookie *);
|
2012-07-25 19:57:22 +07:00
|
|
|
__be32 nlmsvc_cancel_blocked(struct net *net, struct nlm_file *, struct nlm_lock *);
|
2005-04-17 05:20:36 +07:00
|
|
|
unsigned long nlmsvc_retry_blocked(void);
|
2006-03-21 11:24:13 +07:00
|
|
|
void nlmsvc_traverse_blocks(struct nlm_host *, struct nlm_file *,
|
2006-10-04 16:15:59 +07:00
|
|
|
nlm_host_match_fn_t match);
|
2006-12-13 15:35:03 +07:00
|
|
|
void nlmsvc_grant_reply(struct nlm_cookie *, __be32);
|
2010-12-14 22:05:42 +07:00
|
|
|
void nlmsvc_release_call(struct nlm_rqst *);
|
2019-05-23 21:45:45 +07:00
|
|
|
void nlmsvc_locks_init_private(struct file_lock *, struct nlm_host *, pid_t);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* File handling for the server personality
|
|
|
|
*/
|
2006-10-20 13:28:46 +07:00
|
|
|
__be32 nlm_lookup_file(struct svc_rqst *, struct nlm_file **,
|
2005-04-17 05:20:36 +07:00
|
|
|
struct nfs_fh *);
|
|
|
|
void nlm_release_file(struct nlm_file *);
|
2019-05-23 21:45:45 +07:00
|
|
|
void nlmsvc_release_lockowner(struct nlm_lock *);
|
2012-07-25 19:55:54 +07:00
|
|
|
void nlmsvc_mark_resources(struct net *);
|
2005-04-17 05:20:36 +07:00
|
|
|
void nlmsvc_free_host_resources(struct nlm_host *);
|
|
|
|
void nlmsvc_invalidate_all(void);
|
|
|
|
|
lockd: unlock lockd locks associated with a given server ip
For high-availability NFS service, we generally need to be able to drop
file locks held on the exported filesystem before moving clients to a
new server. Currently the only way to do that is by shutting down lockd
entirely, which is often undesireable (for example, if you want to
continue exporting other filesystems).
This patch allows the administrator to release all locks held by clients
accessing the client through a given server ip address, by echoing that
address to a new file, /proc/fs/nfsd/unlock_ip, as in:
shell> echo 10.1.1.2 > /proc/fs/nfsd/unlock_ip
The expected sequence of events can be:
1. Tear down the IP address
2. Unexport the path
3. Write IP to /proc/fs/nfsd/unlock_ip to unlock files
4. Signal peer to begin take-over.
For now we only support IPv4 addresses and NFSv2/v3 (NFSv4 locks are not
affected).
Also, if unmounting the filesystem is required, we assume at step 3 that
clients using the given server ip are the only clients holding locks on
the given filesystem; otherwise, an additional patch is required to
allow revoking all locks held by lockd on a given filesystem.
Signed-off-by: S. Wendy Cheng <wcheng@redhat.com>
Cc: Lon Hohberger <lhh@redhat.com>
Cc: Christoph Hellwig <hch@lst.de>
Signed-off-by: J. Bruce Fields <bfields@citi.umich.edu>
fs/lockd/svcsubs.c | 66 +++++++++++++++++++++++++++++++++++++++-----
fs/nfsd/nfsctl.c | 65 +++++++++++++++++++++++++++++++++++++++++++
include/linux/lockd/lockd.h | 7 ++++
3 files changed, 131 insertions(+), 7 deletions(-)
2008-01-17 23:10:12 +07:00
|
|
|
/*
|
|
|
|
* Cluster failover support
|
|
|
|
*/
|
2008-01-17 23:10:12 +07:00
|
|
|
int nlmsvc_unlock_all_by_sb(struct super_block *sb);
|
2008-07-01 05:58:14 +07:00
|
|
|
int nlmsvc_unlock_all_by_ip(struct sockaddr *server_addr);
|
lockd: unlock lockd locks associated with a given server ip
For high-availability NFS service, we generally need to be able to drop
file locks held on the exported filesystem before moving clients to a
new server. Currently the only way to do that is by shutting down lockd
entirely, which is often undesireable (for example, if you want to
continue exporting other filesystems).
This patch allows the administrator to release all locks held by clients
accessing the client through a given server ip address, by echoing that
address to a new file, /proc/fs/nfsd/unlock_ip, as in:
shell> echo 10.1.1.2 > /proc/fs/nfsd/unlock_ip
The expected sequence of events can be:
1. Tear down the IP address
2. Unexport the path
3. Write IP to /proc/fs/nfsd/unlock_ip to unlock files
4. Signal peer to begin take-over.
For now we only support IPv4 addresses and NFSv2/v3 (NFSv4 locks are not
affected).
Also, if unmounting the filesystem is required, we assume at step 3 that
clients using the given server ip are the only clients holding locks on
the given filesystem; otherwise, an additional patch is required to
allow revoking all locks held by lockd on a given filesystem.
Signed-off-by: S. Wendy Cheng <wcheng@redhat.com>
Cc: Lon Hohberger <lhh@redhat.com>
Cc: Christoph Hellwig <hch@lst.de>
Signed-off-by: J. Bruce Fields <bfields@citi.umich.edu>
fs/lockd/svcsubs.c | 66 +++++++++++++++++++++++++++++++++++++++-----
fs/nfsd/nfsctl.c | 65 +++++++++++++++++++++++++++++++++++++++++++
include/linux/lockd/lockd.h | 7 ++++
3 files changed, 131 insertions(+), 7 deletions(-)
2008-01-17 23:10:12 +07:00
|
|
|
|
2008-03-15 01:18:45 +07:00
|
|
|
static inline struct inode *nlmsvc_file_inode(struct nlm_file *file)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2018-07-13 21:22:24 +07:00
|
|
|
return locks_inode(file->f_file);
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2008-10-03 23:50:44 +07:00
|
|
|
static inline int __nlm_privileged_request4(const struct sockaddr *sap)
|
|
|
|
{
|
|
|
|
const struct sockaddr_in *sin = (struct sockaddr_in *)sap;
|
2008-12-12 05:56:52 +07:00
|
|
|
|
|
|
|
if (ntohs(sin->sin_port) > 1023)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return ipv4_is_loopback(sin->sin_addr.s_addr);
|
2008-10-03 23:50:44 +07:00
|
|
|
}
|
|
|
|
|
2011-12-10 16:48:31 +07:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2008-10-03 23:50:44 +07:00
|
|
|
static inline int __nlm_privileged_request6(const struct sockaddr *sap)
|
|
|
|
{
|
|
|
|
const struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap;
|
2008-12-12 05:56:44 +07:00
|
|
|
|
|
|
|
if (ntohs(sin6->sin6_port) > 1023)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (ipv6_addr_type(&sin6->sin6_addr) & IPV6_ADDR_MAPPED)
|
|
|
|
return ipv4_is_loopback(sin6->sin6_addr.s6_addr32[3]);
|
|
|
|
|
|
|
|
return ipv6_addr_type(&sin6->sin6_addr) & IPV6_ADDR_LOOPBACK;
|
2008-10-03 23:50:44 +07:00
|
|
|
}
|
2011-12-10 16:48:31 +07:00
|
|
|
#else /* IS_ENABLED(CONFIG_IPV6) */
|
2008-10-03 23:50:44 +07:00
|
|
|
static inline int __nlm_privileged_request6(const struct sockaddr *sap)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
2011-12-10 16:48:31 +07:00
|
|
|
#endif /* IS_ENABLED(CONFIG_IPV6) */
|
2008-10-03 23:50:44 +07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Ensure incoming requests are from local privileged callers.
|
|
|
|
*
|
|
|
|
* Return TRUE if sender is local and is connecting via a privileged port;
|
|
|
|
* otherwise return FALSE.
|
|
|
|
*/
|
|
|
|
static inline int nlm_privileged_requester(const struct svc_rqst *rqstp)
|
|
|
|
{
|
|
|
|
const struct sockaddr *sap = svc_addr(rqstp);
|
|
|
|
|
|
|
|
switch (sap->sa_family) {
|
|
|
|
case AF_INET:
|
|
|
|
return __nlm_privileged_request4(sap);
|
|
|
|
case AF_INET6:
|
|
|
|
return __nlm_privileged_request6(sap);
|
|
|
|
default:
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
/*
|
|
|
|
* Compare two NLM locks.
|
|
|
|
* When the second lock is of type F_UNLCK, this acts like a wildcard.
|
|
|
|
*/
|
2008-03-15 01:18:45 +07:00
|
|
|
static inline int nlm_compare_locks(const struct file_lock *fl1,
|
|
|
|
const struct file_lock *fl2)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2018-07-13 21:22:24 +07:00
|
|
|
return locks_inode(fl1->fl_file) == locks_inode(fl2->fl_file)
|
2017-02-11 22:37:38 +07:00
|
|
|
&& fl1->fl_pid == fl2->fl_pid
|
2006-06-09 20:40:20 +07:00
|
|
|
&& fl1->fl_owner == fl2->fl_owner
|
2005-04-17 05:20:36 +07:00
|
|
|
&& fl1->fl_start == fl2->fl_start
|
|
|
|
&& fl1->fl_end == fl2->fl_end
|
|
|
|
&&(fl1->fl_type == fl2->fl_type || fl2->fl_type == F_UNLCK);
|
|
|
|
}
|
|
|
|
|
2009-09-22 07:01:12 +07:00
|
|
|
extern const struct lock_manager_operations nlmsvc_lock_operations;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
#endif /* __KERNEL__ */
|
|
|
|
|
|
|
|
#endif /* LINUX_LOCKD_LOCKD_H */
|