]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * linux/fs/lockd/host.c | |
3 | * | |
4 | * Management for NLM peer hosts. The nlm_host struct is shared | |
5 | * between client and server implementation. The only reason to | |
6 | * do so is to reduce code bloat. | |
7 | * | |
8 | * Copyright (C) 1996, Olaf Kirch <okir@monad.swb.de> | |
9 | */ | |
10 | ||
11 | #include <linux/types.h> | |
1da177e4 LT |
12 | #include <linux/slab.h> |
13 | #include <linux/in.h> | |
1b333c54 | 14 | #include <linux/in6.h> |
1da177e4 LT |
15 | #include <linux/sunrpc/clnt.h> |
16 | #include <linux/sunrpc/svc.h> | |
17 | #include <linux/lockd/lockd.h> | |
18 | #include <linux/lockd/sm_inter.h> | |
353ab6e9 | 19 | #include <linux/mutex.h> |
1da177e4 | 20 | |
1b333c54 | 21 | #include <net/ipv6.h> |
1da177e4 LT |
22 | |
23 | #define NLMDBG_FACILITY NLMDBG_HOSTCACHE | |
1da177e4 LT |
24 | #define NLM_HOST_NRHASH 32 |
25 | #define NLM_ADDRHASH(addr) (ntohl(addr) & (NLM_HOST_NRHASH-1)) | |
26 | #define NLM_HOST_REBIND (60 * HZ) | |
1447d25e N |
27 | #define NLM_HOST_EXPIRE (300 * HZ) |
28 | #define NLM_HOST_COLLECT (120 * HZ) | |
1da177e4 | 29 | |
0cea3276 | 30 | static struct hlist_head nlm_hosts[NLM_HOST_NRHASH]; |
1da177e4 LT |
31 | static unsigned long next_gc; |
32 | static int nrhosts; | |
353ab6e9 | 33 | static DEFINE_MUTEX(nlm_host_mutex); |
1da177e4 LT |
34 | |
35 | ||
36 | static void nlm_gc_hosts(void); | |
8dead0db | 37 | static struct nsm_handle * __nsm_find(const struct sockaddr_in *, |
48df020a | 38 | const char *, unsigned int, int); |
c585646d AB |
39 | static struct nsm_handle * nsm_find(const struct sockaddr_in *sin, |
40 | const char *hostname, | |
48df020a | 41 | unsigned int hostname_len); |
1da177e4 | 42 | |
1b333c54 CL |
43 | static void nlm_display_address(const struct sockaddr *sap, |
44 | char *buf, const size_t len) | |
45 | { | |
46 | const struct sockaddr_in *sin = (struct sockaddr_in *)sap; | |
47 | const struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap; | |
48 | ||
49 | switch (sap->sa_family) { | |
50 | case AF_UNSPEC: | |
51 | snprintf(buf, len, "unspecified"); | |
52 | break; | |
53 | case AF_INET: | |
54 | snprintf(buf, len, NIPQUAD_FMT, NIPQUAD(sin->sin_addr.s_addr)); | |
55 | break; | |
56 | case AF_INET6: | |
57 | if (ipv6_addr_v4mapped(&sin6->sin6_addr)) | |
58 | snprintf(buf, len, NIPQUAD_FMT, | |
59 | NIPQUAD(sin6->sin6_addr.s6_addr32[3])); | |
60 | else | |
61 | snprintf(buf, len, NIP6_FMT, NIP6(sin6->sin6_addr)); | |
62 | break; | |
63 | default: | |
64 | snprintf(buf, len, "unsupported address family"); | |
65 | break; | |
66 | } | |
67 | } | |
68 | ||
1da177e4 LT |
69 | /* |
70 | * Common host lookup routine for server & client | |
71 | */ | |
eb18860e CL |
72 | static struct nlm_host *nlm_lookup_host(int server, |
73 | const struct sockaddr_in *sin, | |
74 | int proto, u32 version, | |
75 | const char *hostname, | |
76 | unsigned int hostname_len, | |
77 | const struct sockaddr_in *ssin) | |
1da177e4 | 78 | { |
0cea3276 OK |
79 | struct hlist_head *chain; |
80 | struct hlist_node *pos; | |
81 | struct nlm_host *host; | |
8dead0db | 82 | struct nsm_handle *nsm = NULL; |
1da177e4 LT |
83 | int hash; |
84 | ||
1b333c54 CL |
85 | dprintk("lockd: nlm_lookup_host(proto=%d, vers=%u," |
86 | " my role is %s, hostname=%.*s)\n", | |
87 | proto, version, server ? "server" : "client", | |
88 | hostname_len, hostname ? hostname : "<none>"); | |
1da177e4 LT |
89 | |
90 | hash = NLM_ADDRHASH(sin->sin_addr.s_addr); | |
91 | ||
92 | /* Lock hash table */ | |
353ab6e9 | 93 | mutex_lock(&nlm_host_mutex); |
1da177e4 LT |
94 | |
95 | if (time_after_eq(jiffies, next_gc)) | |
96 | nlm_gc_hosts(); | |
97 | ||
8dead0db OK |
98 | /* We may keep several nlm_host objects for a peer, because each |
99 | * nlm_host is identified by | |
100 | * (address, protocol, version, server/client) | |
101 | * We could probably simplify this a little by putting all those | |
102 | * different NLM rpc_clients into one single nlm_host object. | |
103 | * This would allow us to have one nlm_host per address. | |
104 | */ | |
0cea3276 OK |
105 | chain = &nlm_hosts[hash]; |
106 | hlist_for_each_entry(host, pos, chain, h_hash) { | |
8dead0db OK |
107 | if (!nlm_cmp_addr(&host->h_addr, sin)) |
108 | continue; | |
109 | ||
110 | /* See if we have an NSM handle for this client */ | |
6b54dae2 N |
111 | if (!nsm) |
112 | nsm = host->h_nsmhandle; | |
8dead0db | 113 | |
1da177e4 LT |
114 | if (host->h_proto != proto) |
115 | continue; | |
116 | if (host->h_version != version) | |
117 | continue; | |
118 | if (host->h_server != server) | |
119 | continue; | |
c98451bd FM |
120 | if (!nlm_cmp_addr(&host->h_saddr, ssin)) |
121 | continue; | |
1da177e4 | 122 | |
0cea3276 OK |
123 | /* Move to head of hash chain. */ |
124 | hlist_del(&host->h_hash); | |
125 | hlist_add_head(&host->h_hash, chain); | |
126 | ||
f0737a39 | 127 | nlm_get_host(host); |
1b333c54 CL |
128 | dprintk("lockd: nlm_lookup_host found host %s (%s)\n", |
129 | host->h_name, host->h_addrbuf); | |
f0737a39 | 130 | goto out; |
1da177e4 LT |
131 | } |
132 | ||
c2526f42 CL |
133 | /* |
134 | * The host wasn't in our hash table. If we don't | |
135 | * have an NSM handle for it yet, create one. | |
8dead0db | 136 | */ |
c2526f42 CL |
137 | if (nsm) |
138 | atomic_inc(&nsm->sm_count); | |
139 | else { | |
140 | host = NULL; | |
141 | nsm = nsm_find(sin, hostname, hostname_len); | |
1b333c54 CL |
142 | if (!nsm) { |
143 | dprintk("lockd: nlm_lookup_host failed; " | |
144 | "no nsm handle\n"); | |
c2526f42 | 145 | goto out; |
1b333c54 | 146 | } |
c2526f42 | 147 | } |
1da177e4 | 148 | |
f8314dc6 | 149 | host = kzalloc(sizeof(*host), GFP_KERNEL); |
8dead0db OK |
150 | if (!host) { |
151 | nsm_release(nsm); | |
1b333c54 | 152 | dprintk("lockd: nlm_lookup_host failed; no memory\n"); |
8dead0db OK |
153 | goto out; |
154 | } | |
155 | host->h_name = nsm->sm_name; | |
1da177e4 LT |
156 | host->h_addr = *sin; |
157 | host->h_addr.sin_port = 0; /* ouch! */ | |
c98451bd | 158 | host->h_saddr = *ssin; |
1da177e4 LT |
159 | host->h_version = version; |
160 | host->h_proto = proto; | |
161 | host->h_rpcclnt = NULL; | |
50467914 | 162 | mutex_init(&host->h_mutex); |
1da177e4 LT |
163 | host->h_nextrebind = jiffies + NLM_HOST_REBIND; |
164 | host->h_expires = jiffies + NLM_HOST_EXPIRE; | |
165 | atomic_set(&host->h_count, 1); | |
166 | init_waitqueue_head(&host->h_gracewait); | |
28df955a | 167 | init_rwsem(&host->h_rwsem); |
1da177e4 LT |
168 | host->h_state = 0; /* pseudo NSM state */ |
169 | host->h_nsmstate = 0; /* real NSM state */ | |
8dead0db | 170 | host->h_nsmhandle = nsm; |
1da177e4 | 171 | host->h_server = server; |
0cea3276 | 172 | hlist_add_head(&host->h_hash, chain); |
1da177e4 LT |
173 | INIT_LIST_HEAD(&host->h_lockowners); |
174 | spin_lock_init(&host->h_lock); | |
26bcbf96 CH |
175 | INIT_LIST_HEAD(&host->h_granted); |
176 | INIT_LIST_HEAD(&host->h_reclaim); | |
1da177e4 | 177 | |
1447d25e | 178 | nrhosts++; |
1b333c54 CL |
179 | |
180 | nlm_display_address((struct sockaddr *)&host->h_addr, | |
181 | host->h_addrbuf, sizeof(host->h_addrbuf)); | |
182 | nlm_display_address((struct sockaddr *)&host->h_saddr, | |
183 | host->h_saddrbuf, sizeof(host->h_saddrbuf)); | |
184 | ||
185 | dprintk("lockd: nlm_lookup_host created host %s\n", | |
186 | host->h_name); | |
187 | ||
8dead0db | 188 | out: |
353ab6e9 | 189 | mutex_unlock(&nlm_host_mutex); |
1da177e4 LT |
190 | return host; |
191 | } | |
192 | ||
c53c1bb9 OK |
193 | /* |
194 | * Destroy a host | |
195 | */ | |
196 | static void | |
197 | nlm_destroy_host(struct nlm_host *host) | |
198 | { | |
199 | struct rpc_clnt *clnt; | |
200 | ||
201 | BUG_ON(!list_empty(&host->h_lockowners)); | |
202 | BUG_ON(atomic_read(&host->h_count)); | |
203 | ||
204 | /* | |
205 | * Release NSM handle and unmonitor host. | |
206 | */ | |
207 | nsm_unmonitor(host); | |
208 | ||
34f52e35 TM |
209 | clnt = host->h_rpcclnt; |
210 | if (clnt != NULL) | |
211 | rpc_shutdown_client(clnt); | |
c53c1bb9 OK |
212 | kfree(host); |
213 | } | |
214 | ||
c585646d AB |
215 | /* |
216 | * Find an NLM server handle in the cache. If there is none, create it. | |
217 | */ | |
eb18860e CL |
218 | struct nlm_host *nlmclnt_lookup_host(const struct sockaddr_in *sin, |
219 | int proto, u32 version, | |
220 | const char *hostname, | |
221 | unsigned int hostname_len) | |
c585646d | 222 | { |
2860a022 CL |
223 | const struct sockaddr_in source = { |
224 | .sin_family = AF_UNSPEC, | |
225 | }; | |
c98451bd | 226 | |
c585646d | 227 | return nlm_lookup_host(0, sin, proto, version, |
2860a022 | 228 | hostname, hostname_len, &source); |
c585646d AB |
229 | } |
230 | ||
231 | /* | |
232 | * Find an NLM client handle in the cache. If there is none, create it. | |
233 | */ | |
234 | struct nlm_host * | |
235 | nlmsvc_lookup_host(struct svc_rqst *rqstp, | |
48df020a | 236 | const char *hostname, unsigned int hostname_len) |
c585646d | 237 | { |
2860a022 CL |
238 | const struct sockaddr_in source = { |
239 | .sin_family = AF_INET, | |
240 | .sin_addr = rqstp->rq_daddr.addr, | |
241 | }; | |
c98451bd | 242 | |
27459f09 | 243 | return nlm_lookup_host(1, svc_addr_in(rqstp), |
c585646d | 244 | rqstp->rq_prot, rqstp->rq_vers, |
2860a022 | 245 | hostname, hostname_len, &source); |
c585646d AB |
246 | } |
247 | ||
1da177e4 LT |
248 | /* |
249 | * Create the NLM RPC client for an NLM peer | |
250 | */ | |
251 | struct rpc_clnt * | |
252 | nlm_bind_host(struct nlm_host *host) | |
253 | { | |
254 | struct rpc_clnt *clnt; | |
1da177e4 | 255 | |
1b333c54 CL |
256 | dprintk("lockd: nlm_bind_host %s (%s), my addr=%s\n", |
257 | host->h_name, host->h_addrbuf, host->h_saddrbuf); | |
1da177e4 LT |
258 | |
259 | /* Lock host handle */ | |
50467914 | 260 | mutex_lock(&host->h_mutex); |
1da177e4 LT |
261 | |
262 | /* If we've already created an RPC client, check whether | |
263 | * RPC rebind is required | |
1da177e4 LT |
264 | */ |
265 | if ((clnt = host->h_rpcclnt) != NULL) { | |
43118c29 | 266 | if (time_after_eq(jiffies, host->h_nextrebind)) { |
35f5a422 | 267 | rpc_force_rebind(clnt); |
1da177e4 | 268 | host->h_nextrebind = jiffies + NLM_HOST_REBIND; |
1b333c54 | 269 | dprintk("lockd: next rebind in %lu jiffies\n", |
1da177e4 LT |
270 | host->h_nextrebind - jiffies); |
271 | } | |
272 | } else { | |
21051ba6 | 273 | unsigned long increment = nlmsvc_timeout; |
e1ec7892 CL |
274 | struct rpc_timeout timeparms = { |
275 | .to_initval = increment, | |
276 | .to_increment = increment, | |
277 | .to_maxval = increment * 6UL, | |
278 | .to_retries = 5U, | |
279 | }; | |
280 | struct rpc_create_args args = { | |
281 | .protocol = host->h_proto, | |
282 | .address = (struct sockaddr *)&host->h_addr, | |
283 | .addrsize = sizeof(host->h_addr), | |
c98451bd | 284 | .saddress = (struct sockaddr *)&host->h_saddr, |
e1ec7892 CL |
285 | .timeout = &timeparms, |
286 | .servername = host->h_name, | |
287 | .program = &nlm_program, | |
288 | .version = host->h_version, | |
289 | .authflavor = RPC_AUTH_UNIX, | |
90bd17c8 | 290 | .flags = (RPC_CLNT_CREATE_NOPING | |
e1ec7892 CL |
291 | RPC_CLNT_CREATE_AUTOBIND), |
292 | }; | |
293 | ||
90bd17c8 JL |
294 | /* |
295 | * lockd retries server side blocks automatically so we want | |
296 | * those to be soft RPC calls. Client side calls need to be | |
297 | * hard RPC tasks. | |
298 | */ | |
299 | if (!host->h_server) | |
300 | args.flags |= RPC_CLNT_CREATE_HARDRTRY; | |
301 | ||
e1ec7892 CL |
302 | clnt = rpc_create(&args); |
303 | if (!IS_ERR(clnt)) | |
304 | host->h_rpcclnt = clnt; | |
305 | else { | |
306 | printk("lockd: couldn't create RPC handle for %s\n", host->h_name); | |
307 | clnt = NULL; | |
308 | } | |
1da177e4 LT |
309 | } |
310 | ||
50467914 | 311 | mutex_unlock(&host->h_mutex); |
1da177e4 | 312 | return clnt; |
1da177e4 LT |
313 | } |
314 | ||
315 | /* | |
316 | * Force a portmap lookup of the remote lockd port | |
317 | */ | |
318 | void | |
319 | nlm_rebind_host(struct nlm_host *host) | |
320 | { | |
321 | dprintk("lockd: rebind host %s\n", host->h_name); | |
322 | if (host->h_rpcclnt && time_after_eq(jiffies, host->h_nextrebind)) { | |
35f5a422 | 323 | rpc_force_rebind(host->h_rpcclnt); |
1da177e4 LT |
324 | host->h_nextrebind = jiffies + NLM_HOST_REBIND; |
325 | } | |
326 | } | |
327 | ||
328 | /* | |
329 | * Increment NLM host count | |
330 | */ | |
331 | struct nlm_host * nlm_get_host(struct nlm_host *host) | |
332 | { | |
333 | if (host) { | |
334 | dprintk("lockd: get host %s\n", host->h_name); | |
335 | atomic_inc(&host->h_count); | |
336 | host->h_expires = jiffies + NLM_HOST_EXPIRE; | |
337 | } | |
338 | return host; | |
339 | } | |
340 | ||
341 | /* | |
342 | * Release NLM host after use | |
343 | */ | |
344 | void nlm_release_host(struct nlm_host *host) | |
345 | { | |
346 | if (host != NULL) { | |
347 | dprintk("lockd: release host %s\n", host->h_name); | |
1da177e4 | 348 | BUG_ON(atomic_read(&host->h_count) < 0); |
4c060b53 TM |
349 | if (atomic_dec_and_test(&host->h_count)) { |
350 | BUG_ON(!list_empty(&host->h_lockowners)); | |
351 | BUG_ON(!list_empty(&host->h_granted)); | |
352 | BUG_ON(!list_empty(&host->h_reclaim)); | |
353 | } | |
1da177e4 LT |
354 | } |
355 | } | |
356 | ||
cf712c24 OK |
357 | /* |
358 | * We were notified that the host indicated by address &sin | |
359 | * has rebooted. | |
360 | * Release all resources held by that peer. | |
361 | */ | |
5c8dd29c | 362 | void nlm_host_rebooted(const struct sockaddr_in *sin, |
48df020a CL |
363 | const char *hostname, |
364 | unsigned int hostname_len, | |
5c8dd29c | 365 | u32 new_state) |
cf712c24 | 366 | { |
0cea3276 OK |
367 | struct hlist_head *chain; |
368 | struct hlist_node *pos; | |
5c8dd29c | 369 | struct nsm_handle *nsm; |
0cea3276 | 370 | struct nlm_host *host; |
cf712c24 | 371 | |
5c8dd29c | 372 | /* Find the NSM handle for this peer */ |
1b333c54 CL |
373 | nsm = __nsm_find(sin, hostname, hostname_len, 0); |
374 | if (nsm == NULL) { | |
375 | dprintk("lockd: never saw rebooted peer '%.*s' before\n", | |
376 | hostname_len, hostname); | |
db4e4c9a | 377 | return; |
1b333c54 CL |
378 | } |
379 | ||
380 | dprintk("lockd: nlm_host_rebooted(%.*s, %s)\n", | |
381 | hostname_len, hostname, nsm->sm_addrbuf); | |
db4e4c9a | 382 | |
5c8dd29c OK |
383 | /* When reclaiming locks on this peer, make sure that |
384 | * we set up a new notification */ | |
385 | nsm->sm_monitored = 0; | |
386 | ||
387 | /* Mark all hosts tied to this NSM state as having rebooted. | |
388 | * We run the loop repeatedly, because we drop the host table | |
389 | * lock for this. | |
390 | * To avoid processing a host several times, we match the nsmstate. | |
391 | */ | |
392 | again: mutex_lock(&nlm_host_mutex); | |
0cea3276 OK |
393 | for (chain = nlm_hosts; chain < nlm_hosts + NLM_HOST_NRHASH; ++chain) { |
394 | hlist_for_each_entry(host, pos, chain, h_hash) { | |
5c8dd29c OK |
395 | if (host->h_nsmhandle == nsm |
396 | && host->h_nsmstate != new_state) { | |
397 | host->h_nsmstate = new_state; | |
398 | host->h_state++; | |
399 | ||
400 | nlm_get_host(host); | |
401 | mutex_unlock(&nlm_host_mutex); | |
402 | ||
403 | if (host->h_server) { | |
404 | /* We're server for this guy, just ditch | |
405 | * all the locks he held. */ | |
406 | nlmsvc_free_host_resources(host); | |
407 | } else { | |
408 | /* He's the server, initiate lock recovery. */ | |
409 | nlmclnt_recovery(host); | |
410 | } | |
411 | ||
412 | nlm_release_host(host); | |
413 | goto again; | |
414 | } | |
415 | } | |
cf712c24 | 416 | } |
5c8dd29c OK |
417 | |
418 | mutex_unlock(&nlm_host_mutex); | |
cf712c24 OK |
419 | } |
420 | ||
1da177e4 LT |
421 | /* |
422 | * Shut down the hosts module. | |
423 | * Note that this routine is called only at server shutdown time. | |
424 | */ | |
425 | void | |
426 | nlm_shutdown_hosts(void) | |
427 | { | |
0cea3276 OK |
428 | struct hlist_head *chain; |
429 | struct hlist_node *pos; | |
1da177e4 | 430 | struct nlm_host *host; |
1da177e4 LT |
431 | |
432 | dprintk("lockd: shutting down host module\n"); | |
353ab6e9 | 433 | mutex_lock(&nlm_host_mutex); |
1da177e4 LT |
434 | |
435 | /* First, make all hosts eligible for gc */ | |
436 | dprintk("lockd: nuking all hosts...\n"); | |
0cea3276 | 437 | for (chain = nlm_hosts; chain < nlm_hosts + NLM_HOST_NRHASH; ++chain) { |
d801b861 | 438 | hlist_for_each_entry(host, pos, chain, h_hash) { |
1da177e4 | 439 | host->h_expires = jiffies - 1; |
d801b861 JL |
440 | if (host->h_rpcclnt) { |
441 | rpc_shutdown_client(host->h_rpcclnt); | |
442 | host->h_rpcclnt = NULL; | |
443 | } | |
444 | } | |
1da177e4 LT |
445 | } |
446 | ||
447 | /* Then, perform a garbage collection pass */ | |
448 | nlm_gc_hosts(); | |
353ab6e9 | 449 | mutex_unlock(&nlm_host_mutex); |
1da177e4 LT |
450 | |
451 | /* complain if any hosts are left */ | |
452 | if (nrhosts) { | |
453 | printk(KERN_WARNING "lockd: couldn't shutdown host module!\n"); | |
454 | dprintk("lockd: %d hosts left:\n", nrhosts); | |
0cea3276 OK |
455 | for (chain = nlm_hosts; chain < nlm_hosts + NLM_HOST_NRHASH; ++chain) { |
456 | hlist_for_each_entry(host, pos, chain, h_hash) { | |
1da177e4 LT |
457 | dprintk(" %s (cnt %d use %d exp %ld)\n", |
458 | host->h_name, atomic_read(&host->h_count), | |
459 | host->h_inuse, host->h_expires); | |
460 | } | |
461 | } | |
462 | } | |
463 | } | |
464 | ||
465 | /* | |
466 | * Garbage collect any unused NLM hosts. | |
467 | * This GC combines reference counting for async operations with | |
468 | * mark & sweep for resources held by remote clients. | |
469 | */ | |
470 | static void | |
471 | nlm_gc_hosts(void) | |
472 | { | |
0cea3276 OK |
473 | struct hlist_head *chain; |
474 | struct hlist_node *pos, *next; | |
475 | struct nlm_host *host; | |
1da177e4 LT |
476 | |
477 | dprintk("lockd: host garbage collection\n"); | |
0cea3276 OK |
478 | for (chain = nlm_hosts; chain < nlm_hosts + NLM_HOST_NRHASH; ++chain) { |
479 | hlist_for_each_entry(host, pos, chain, h_hash) | |
1da177e4 LT |
480 | host->h_inuse = 0; |
481 | } | |
482 | ||
483 | /* Mark all hosts that hold locks, blocks or shares */ | |
484 | nlmsvc_mark_resources(); | |
485 | ||
0cea3276 OK |
486 | for (chain = nlm_hosts; chain < nlm_hosts + NLM_HOST_NRHASH; ++chain) { |
487 | hlist_for_each_entry_safe(host, pos, next, chain, h_hash) { | |
1da177e4 LT |
488 | if (atomic_read(&host->h_count) || host->h_inuse |
489 | || time_before(jiffies, host->h_expires)) { | |
490 | dprintk("nlm_gc_hosts skipping %s (cnt %d use %d exp %ld)\n", | |
491 | host->h_name, atomic_read(&host->h_count), | |
492 | host->h_inuse, host->h_expires); | |
1da177e4 LT |
493 | continue; |
494 | } | |
495 | dprintk("lockd: delete host %s\n", host->h_name); | |
0cea3276 | 496 | hlist_del_init(&host->h_hash); |
977faf39 | 497 | |
c53c1bb9 | 498 | nlm_destroy_host(host); |
1da177e4 LT |
499 | nrhosts--; |
500 | } | |
501 | } | |
502 | ||
503 | next_gc = jiffies + NLM_HOST_COLLECT; | |
504 | } | |
505 | ||
8dead0db OK |
506 | |
507 | /* | |
508 | * Manage NSM handles | |
509 | */ | |
510 | static LIST_HEAD(nsm_handles); | |
d8421202 | 511 | static DEFINE_SPINLOCK(nsm_lock); |
8dead0db OK |
512 | |
513 | static struct nsm_handle * | |
514 | __nsm_find(const struct sockaddr_in *sin, | |
48df020a | 515 | const char *hostname, unsigned int hostname_len, |
8dead0db OK |
516 | int create) |
517 | { | |
518 | struct nsm_handle *nsm = NULL; | |
a95e56e7 | 519 | struct nsm_handle *pos; |
8dead0db OK |
520 | |
521 | if (!sin) | |
522 | return NULL; | |
523 | ||
524 | if (hostname && memchr(hostname, '/', hostname_len) != NULL) { | |
525 | if (printk_ratelimit()) { | |
526 | printk(KERN_WARNING "Invalid hostname \"%.*s\" " | |
527 | "in NFS lock request\n", | |
528 | hostname_len, hostname); | |
529 | } | |
530 | return NULL; | |
531 | } | |
532 | ||
d8421202 BF |
533 | retry: |
534 | spin_lock(&nsm_lock); | |
a95e56e7 | 535 | list_for_each_entry(pos, &nsm_handles, sm_link) { |
8dead0db | 536 | |
abd1f500 | 537 | if (hostname && nsm_use_hostnames) { |
a95e56e7 BF |
538 | if (strlen(pos->sm_name) != hostname_len |
539 | || memcmp(pos->sm_name, hostname, hostname_len)) | |
abd1f500 | 540 | continue; |
a95e56e7 | 541 | } else if (!nlm_cmp_addr(&pos->sm_addr, sin)) |
8dead0db | 542 | continue; |
a95e56e7 | 543 | atomic_inc(&pos->sm_count); |
d8421202 | 544 | kfree(nsm); |
a95e56e7 | 545 | nsm = pos; |
d8421202 | 546 | goto found; |
8dead0db | 547 | } |
d8421202 BF |
548 | if (nsm) { |
549 | list_add(&nsm->sm_link, &nsm_handles); | |
550 | goto found; | |
8dead0db | 551 | } |
d8421202 BF |
552 | spin_unlock(&nsm_lock); |
553 | ||
554 | if (!create) | |
555 | return NULL; | |
8dead0db OK |
556 | |
557 | nsm = kzalloc(sizeof(*nsm) + hostname_len + 1, GFP_KERNEL); | |
a95e56e7 | 558 | if (nsm == NULL) |
d8421202 BF |
559 | return NULL; |
560 | ||
a95e56e7 BF |
561 | nsm->sm_addr = *sin; |
562 | nsm->sm_name = (char *) (nsm + 1); | |
563 | memcpy(nsm->sm_name, hostname, hostname_len); | |
564 | nsm->sm_name[hostname_len] = '\0'; | |
1b333c54 CL |
565 | nlm_display_address((struct sockaddr *)&nsm->sm_addr, |
566 | nsm->sm_addrbuf, sizeof(nsm->sm_addrbuf)); | |
a95e56e7 | 567 | atomic_set(&nsm->sm_count, 1); |
d8421202 | 568 | goto retry; |
a95e56e7 | 569 | |
d8421202 BF |
570 | found: |
571 | spin_unlock(&nsm_lock); | |
8dead0db OK |
572 | return nsm; |
573 | } | |
574 | ||
c585646d | 575 | static struct nsm_handle * |
48df020a CL |
576 | nsm_find(const struct sockaddr_in *sin, const char *hostname, |
577 | unsigned int hostname_len) | |
8dead0db OK |
578 | { |
579 | return __nsm_find(sin, hostname, hostname_len, 1); | |
580 | } | |
581 | ||
582 | /* | |
583 | * Release an NSM handle | |
584 | */ | |
585 | void | |
586 | nsm_release(struct nsm_handle *nsm) | |
587 | { | |
588 | if (!nsm) | |
589 | return; | |
d8421202 | 590 | if (atomic_dec_and_lock(&nsm->sm_count, &nsm_lock)) { |
164f98ad | 591 | list_del(&nsm->sm_link); |
d8421202 | 592 | spin_unlock(&nsm_lock); |
164f98ad | 593 | kfree(nsm); |
8dead0db OK |
594 | } |
595 | } |