]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - fs/lockd/host.c
lockd: reject reclaims outside the grace period
[mirror_ubuntu-artful-kernel.git] / fs / lockd / host.c
CommitLineData
1da177e4
LT
1/*
2 * linux/fs/lockd/host.c
3 *
4 * Management for NLM peer hosts. The nlm_host struct is shared
5 * between client and server implementation. The only reason to
6 * do so is to reduce code bloat.
7 *
8 * Copyright (C) 1996, Olaf Kirch <okir@monad.swb.de>
9 */
10
11#include <linux/types.h>
1da177e4
LT
12#include <linux/slab.h>
13#include <linux/in.h>
1b333c54 14#include <linux/in6.h>
1da177e4
LT
15#include <linux/sunrpc/clnt.h>
16#include <linux/sunrpc/svc.h>
17#include <linux/lockd/lockd.h>
18#include <linux/lockd/sm_inter.h>
353ab6e9 19#include <linux/mutex.h>
1da177e4 20
1b333c54 21#include <net/ipv6.h>
1da177e4
LT
22
23#define NLMDBG_FACILITY NLMDBG_HOSTCACHE
1da177e4 24#define NLM_HOST_NRHASH 32
1da177e4 25#define NLM_HOST_REBIND (60 * HZ)
1447d25e
N
26#define NLM_HOST_EXPIRE (300 * HZ)
27#define NLM_HOST_COLLECT (120 * HZ)
1da177e4 28
0cea3276 29static struct hlist_head nlm_hosts[NLM_HOST_NRHASH];
1da177e4
LT
30static unsigned long next_gc;
31static int nrhosts;
353ab6e9 32static DEFINE_MUTEX(nlm_host_mutex);
1da177e4 33
1da177e4 34static void nlm_gc_hosts(void);
e018040a
CL
35static struct nsm_handle *nsm_find(const struct sockaddr *sap,
36 const size_t salen,
bc48e4d6
CL
37 const char *hostname,
38 const size_t hostname_len,
39 const int create);
1da177e4 40
ede2fea0
CL
41/*
42 * Hash function must work well on big- and little-endian platforms
43 */
44static unsigned int __nlm_hash32(const __be32 n)
45{
46 unsigned int hash = (__force u32)n ^ ((__force u32)n >> 16);
47 return hash ^ (hash >> 8);
48}
49
50static unsigned int __nlm_hash_addr4(const struct sockaddr *sap)
51{
52 const struct sockaddr_in *sin = (struct sockaddr_in *)sap;
53 return __nlm_hash32(sin->sin_addr.s_addr);
54}
55
56static unsigned int __nlm_hash_addr6(const struct sockaddr *sap)
57{
58 const struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap;
59 const struct in6_addr addr = sin6->sin6_addr;
60 return __nlm_hash32(addr.s6_addr32[0]) ^
61 __nlm_hash32(addr.s6_addr32[1]) ^
62 __nlm_hash32(addr.s6_addr32[2]) ^
63 __nlm_hash32(addr.s6_addr32[3]);
64}
65
66static unsigned int nlm_hash_address(const struct sockaddr *sap)
67{
68 unsigned int hash;
69
70 switch (sap->sa_family) {
71 case AF_INET:
72 hash = __nlm_hash_addr4(sap);
73 break;
74 case AF_INET6:
75 hash = __nlm_hash_addr6(sap);
76 break;
77 default:
78 hash = 0;
79 }
80 return hash & (NLM_HOST_NRHASH - 1);
81}
82
396cb3d0
CL
83static void nlm_clear_port(struct sockaddr *sap)
84{
85 switch (sap->sa_family) {
86 case AF_INET:
87 ((struct sockaddr_in *)sap)->sin_port = 0;
88 break;
89 case AF_INET6:
90 ((struct sockaddr_in6 *)sap)->sin6_port = 0;
91 break;
92 }
93}
94
1b333c54
CL
95static void nlm_display_address(const struct sockaddr *sap,
96 char *buf, const size_t len)
97{
98 const struct sockaddr_in *sin = (struct sockaddr_in *)sap;
99 const struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap;
100
101 switch (sap->sa_family) {
102 case AF_UNSPEC:
103 snprintf(buf, len, "unspecified");
104 break;
105 case AF_INET:
106 snprintf(buf, len, NIPQUAD_FMT, NIPQUAD(sin->sin_addr.s_addr));
107 break;
108 case AF_INET6:
109 if (ipv6_addr_v4mapped(&sin6->sin6_addr))
110 snprintf(buf, len, NIPQUAD_FMT,
111 NIPQUAD(sin6->sin6_addr.s6_addr32[3]));
112 else
113 snprintf(buf, len, NIP6_FMT, NIP6(sin6->sin6_addr));
114 break;
115 default:
116 snprintf(buf, len, "unsupported address family");
117 break;
118 }
119}
120
1da177e4
LT
121/*
122 * Common host lookup routine for server & client
123 */
eb18860e
CL
124static struct nlm_host *nlm_lookup_host(int server,
125 const struct sockaddr_in *sin,
126 int proto, u32 version,
127 const char *hostname,
128 unsigned int hostname_len,
129 const struct sockaddr_in *ssin)
1da177e4 130{
0cea3276
OK
131 struct hlist_head *chain;
132 struct hlist_node *pos;
133 struct nlm_host *host;
8dead0db 134 struct nsm_handle *nsm = NULL;
1da177e4 135
1b333c54
CL
136 dprintk("lockd: nlm_lookup_host(proto=%d, vers=%u,"
137 " my role is %s, hostname=%.*s)\n",
138 proto, version, server ? "server" : "client",
139 hostname_len, hostname ? hostname : "<none>");
1da177e4 140
353ab6e9 141 mutex_lock(&nlm_host_mutex);
1da177e4
LT
142
143 if (time_after_eq(jiffies, next_gc))
144 nlm_gc_hosts();
145
8dead0db
OK
146 /* We may keep several nlm_host objects for a peer, because each
147 * nlm_host is identified by
148 * (address, protocol, version, server/client)
149 * We could probably simplify this a little by putting all those
150 * different NLM rpc_clients into one single nlm_host object.
151 * This would allow us to have one nlm_host per address.
152 */
ede2fea0 153 chain = &nlm_hosts[nlm_hash_address((struct sockaddr *)sin)];
0cea3276 154 hlist_for_each_entry(host, pos, chain, h_hash) {
781b61a6 155 if (!nlm_cmp_addr(nlm_addr(host), (struct sockaddr *)sin))
8dead0db
OK
156 continue;
157
158 /* See if we have an NSM handle for this client */
6b54dae2
N
159 if (!nsm)
160 nsm = host->h_nsmhandle;
8dead0db 161
1da177e4
LT
162 if (host->h_proto != proto)
163 continue;
164 if (host->h_version != version)
165 continue;
166 if (host->h_server != server)
167 continue;
781b61a6 168 if (!nlm_cmp_addr(nlm_srcaddr(host), (struct sockaddr *)ssin))
c98451bd 169 continue;
1da177e4 170
0cea3276
OK
171 /* Move to head of hash chain. */
172 hlist_del(&host->h_hash);
173 hlist_add_head(&host->h_hash, chain);
174
f0737a39 175 nlm_get_host(host);
1b333c54
CL
176 dprintk("lockd: nlm_lookup_host found host %s (%s)\n",
177 host->h_name, host->h_addrbuf);
f0737a39 178 goto out;
1da177e4
LT
179 }
180
c2526f42
CL
181 /*
182 * The host wasn't in our hash table. If we don't
183 * have an NSM handle for it yet, create one.
8dead0db 184 */
c2526f42
CL
185 if (nsm)
186 atomic_inc(&nsm->sm_count);
187 else {
188 host = NULL;
e018040a
CL
189 nsm = nsm_find((struct sockaddr *)sin, sizeof(*sin),
190 hostname, hostname_len, 1);
1b333c54
CL
191 if (!nsm) {
192 dprintk("lockd: nlm_lookup_host failed; "
193 "no nsm handle\n");
c2526f42 194 goto out;
1b333c54 195 }
c2526f42 196 }
1da177e4 197
f8314dc6 198 host = kzalloc(sizeof(*host), GFP_KERNEL);
8dead0db
OK
199 if (!host) {
200 nsm_release(nsm);
1b333c54 201 dprintk("lockd: nlm_lookup_host failed; no memory\n");
8dead0db
OK
202 goto out;
203 }
204 host->h_name = nsm->sm_name;
b4ed58fd
CL
205 memcpy(nlm_addr(host), sin, sizeof(*sin));
206 host->h_addrlen = sizeof(*sin);
207 nlm_clear_port(nlm_addr(host));
90151e6e 208 memcpy(nlm_srcaddr(host), ssin, sizeof(*ssin));
1da177e4
LT
209 host->h_version = version;
210 host->h_proto = proto;
211 host->h_rpcclnt = NULL;
50467914 212 mutex_init(&host->h_mutex);
1da177e4
LT
213 host->h_nextrebind = jiffies + NLM_HOST_REBIND;
214 host->h_expires = jiffies + NLM_HOST_EXPIRE;
215 atomic_set(&host->h_count, 1);
216 init_waitqueue_head(&host->h_gracewait);
28df955a 217 init_rwsem(&host->h_rwsem);
1da177e4
LT
218 host->h_state = 0; /* pseudo NSM state */
219 host->h_nsmstate = 0; /* real NSM state */
8dead0db 220 host->h_nsmhandle = nsm;
1da177e4 221 host->h_server = server;
0cea3276 222 hlist_add_head(&host->h_hash, chain);
1da177e4
LT
223 INIT_LIST_HEAD(&host->h_lockowners);
224 spin_lock_init(&host->h_lock);
26bcbf96
CH
225 INIT_LIST_HEAD(&host->h_granted);
226 INIT_LIST_HEAD(&host->h_reclaim);
1da177e4 227
1447d25e 228 nrhosts++;
1b333c54
CL
229
230 nlm_display_address((struct sockaddr *)&host->h_addr,
231 host->h_addrbuf, sizeof(host->h_addrbuf));
90151e6e
CL
232 nlm_display_address((struct sockaddr *)&host->h_srcaddr,
233 host->h_srcaddrbuf, sizeof(host->h_srcaddrbuf));
1b333c54
CL
234
235 dprintk("lockd: nlm_lookup_host created host %s\n",
236 host->h_name);
237
8dead0db 238out:
353ab6e9 239 mutex_unlock(&nlm_host_mutex);
1da177e4
LT
240 return host;
241}
242
c53c1bb9
OK
243/*
244 * Destroy a host
245 */
246static void
247nlm_destroy_host(struct nlm_host *host)
248{
249 struct rpc_clnt *clnt;
250
251 BUG_ON(!list_empty(&host->h_lockowners));
252 BUG_ON(atomic_read(&host->h_count));
253
254 /*
255 * Release NSM handle and unmonitor host.
256 */
257 nsm_unmonitor(host);
258
34f52e35
TM
259 clnt = host->h_rpcclnt;
260 if (clnt != NULL)
261 rpc_shutdown_client(clnt);
c53c1bb9
OK
262 kfree(host);
263}
264
c585646d
AB
265/*
266 * Find an NLM server handle in the cache. If there is none, create it.
267 */
eb18860e
CL
268struct nlm_host *nlmclnt_lookup_host(const struct sockaddr_in *sin,
269 int proto, u32 version,
270 const char *hostname,
271 unsigned int hostname_len)
c585646d 272{
2860a022
CL
273 const struct sockaddr_in source = {
274 .sin_family = AF_UNSPEC,
275 };
c98451bd 276
c585646d 277 return nlm_lookup_host(0, sin, proto, version,
2860a022 278 hostname, hostname_len, &source);
c585646d
AB
279}
280
281/*
282 * Find an NLM client handle in the cache. If there is none, create it.
283 */
284struct nlm_host *
285nlmsvc_lookup_host(struct svc_rqst *rqstp,
48df020a 286 const char *hostname, unsigned int hostname_len)
c585646d 287{
2860a022
CL
288 const struct sockaddr_in source = {
289 .sin_family = AF_INET,
290 .sin_addr = rqstp->rq_daddr.addr,
291 };
c98451bd 292
27459f09 293 return nlm_lookup_host(1, svc_addr_in(rqstp),
c585646d 294 rqstp->rq_prot, rqstp->rq_vers,
2860a022 295 hostname, hostname_len, &source);
c585646d
AB
296}
297
1da177e4
LT
298/*
299 * Create the NLM RPC client for an NLM peer
300 */
301struct rpc_clnt *
302nlm_bind_host(struct nlm_host *host)
303{
304 struct rpc_clnt *clnt;
1da177e4 305
1b333c54 306 dprintk("lockd: nlm_bind_host %s (%s), my addr=%s\n",
90151e6e 307 host->h_name, host->h_addrbuf, host->h_srcaddrbuf);
1da177e4
LT
308
309 /* Lock host handle */
50467914 310 mutex_lock(&host->h_mutex);
1da177e4
LT
311
312 /* If we've already created an RPC client, check whether
313 * RPC rebind is required
1da177e4
LT
314 */
315 if ((clnt = host->h_rpcclnt) != NULL) {
43118c29 316 if (time_after_eq(jiffies, host->h_nextrebind)) {
35f5a422 317 rpc_force_rebind(clnt);
1da177e4 318 host->h_nextrebind = jiffies + NLM_HOST_REBIND;
1b333c54 319 dprintk("lockd: next rebind in %lu jiffies\n",
1da177e4
LT
320 host->h_nextrebind - jiffies);
321 }
322 } else {
21051ba6 323 unsigned long increment = nlmsvc_timeout;
e1ec7892
CL
324 struct rpc_timeout timeparms = {
325 .to_initval = increment,
326 .to_increment = increment,
327 .to_maxval = increment * 6UL,
328 .to_retries = 5U,
329 };
330 struct rpc_create_args args = {
331 .protocol = host->h_proto,
b4ed58fd
CL
332 .address = nlm_addr(host),
333 .addrsize = host->h_addrlen,
90151e6e 334 .saddress = nlm_srcaddr(host),
e1ec7892
CL
335 .timeout = &timeparms,
336 .servername = host->h_name,
337 .program = &nlm_program,
338 .version = host->h_version,
339 .authflavor = RPC_AUTH_UNIX,
90bd17c8 340 .flags = (RPC_CLNT_CREATE_NOPING |
e1ec7892
CL
341 RPC_CLNT_CREATE_AUTOBIND),
342 };
343
90bd17c8
JL
344 /*
345 * lockd retries server side blocks automatically so we want
346 * those to be soft RPC calls. Client side calls need to be
347 * hard RPC tasks.
348 */
349 if (!host->h_server)
350 args.flags |= RPC_CLNT_CREATE_HARDRTRY;
351
e1ec7892
CL
352 clnt = rpc_create(&args);
353 if (!IS_ERR(clnt))
354 host->h_rpcclnt = clnt;
355 else {
356 printk("lockd: couldn't create RPC handle for %s\n", host->h_name);
357 clnt = NULL;
358 }
1da177e4
LT
359 }
360
50467914 361 mutex_unlock(&host->h_mutex);
1da177e4 362 return clnt;
1da177e4
LT
363}
364
365/*
366 * Force a portmap lookup of the remote lockd port
367 */
368void
369nlm_rebind_host(struct nlm_host *host)
370{
371 dprintk("lockd: rebind host %s\n", host->h_name);
372 if (host->h_rpcclnt && time_after_eq(jiffies, host->h_nextrebind)) {
35f5a422 373 rpc_force_rebind(host->h_rpcclnt);
1da177e4
LT
374 host->h_nextrebind = jiffies + NLM_HOST_REBIND;
375 }
376}
377
378/*
379 * Increment NLM host count
380 */
381struct nlm_host * nlm_get_host(struct nlm_host *host)
382{
383 if (host) {
384 dprintk("lockd: get host %s\n", host->h_name);
385 atomic_inc(&host->h_count);
386 host->h_expires = jiffies + NLM_HOST_EXPIRE;
387 }
388 return host;
389}
390
391/*
392 * Release NLM host after use
393 */
394void nlm_release_host(struct nlm_host *host)
395{
396 if (host != NULL) {
397 dprintk("lockd: release host %s\n", host->h_name);
1da177e4 398 BUG_ON(atomic_read(&host->h_count) < 0);
4c060b53
TM
399 if (atomic_dec_and_test(&host->h_count)) {
400 BUG_ON(!list_empty(&host->h_lockowners));
401 BUG_ON(!list_empty(&host->h_granted));
402 BUG_ON(!list_empty(&host->h_reclaim));
403 }
1da177e4
LT
404 }
405}
406
cf712c24
OK
407/*
408 * We were notified that the host indicated by address &sin
409 * has rebooted.
410 * Release all resources held by that peer.
411 */
5c8dd29c 412void nlm_host_rebooted(const struct sockaddr_in *sin,
48df020a
CL
413 const char *hostname,
414 unsigned int hostname_len,
5c8dd29c 415 u32 new_state)
cf712c24 416{
0cea3276
OK
417 struct hlist_head *chain;
418 struct hlist_node *pos;
5c8dd29c 419 struct nsm_handle *nsm;
0cea3276 420 struct nlm_host *host;
cf712c24 421
e018040a
CL
422 nsm = nsm_find((struct sockaddr *)sin, sizeof(*sin),
423 hostname, hostname_len, 0);
1b333c54
CL
424 if (nsm == NULL) {
425 dprintk("lockd: never saw rebooted peer '%.*s' before\n",
426 hostname_len, hostname);
db4e4c9a 427 return;
1b333c54
CL
428 }
429
430 dprintk("lockd: nlm_host_rebooted(%.*s, %s)\n",
431 hostname_len, hostname, nsm->sm_addrbuf);
db4e4c9a 432
5c8dd29c
OK
433 /* When reclaiming locks on this peer, make sure that
434 * we set up a new notification */
435 nsm->sm_monitored = 0;
436
437 /* Mark all hosts tied to this NSM state as having rebooted.
438 * We run the loop repeatedly, because we drop the host table
439 * lock for this.
440 * To avoid processing a host several times, we match the nsmstate.
441 */
442again: mutex_lock(&nlm_host_mutex);
0cea3276
OK
443 for (chain = nlm_hosts; chain < nlm_hosts + NLM_HOST_NRHASH; ++chain) {
444 hlist_for_each_entry(host, pos, chain, h_hash) {
5c8dd29c
OK
445 if (host->h_nsmhandle == nsm
446 && host->h_nsmstate != new_state) {
447 host->h_nsmstate = new_state;
448 host->h_state++;
449
450 nlm_get_host(host);
451 mutex_unlock(&nlm_host_mutex);
452
453 if (host->h_server) {
454 /* We're server for this guy, just ditch
455 * all the locks he held. */
456 nlmsvc_free_host_resources(host);
457 } else {
458 /* He's the server, initiate lock recovery. */
459 nlmclnt_recovery(host);
460 }
461
462 nlm_release_host(host);
463 goto again;
464 }
465 }
cf712c24 466 }
5c8dd29c
OK
467
468 mutex_unlock(&nlm_host_mutex);
cf712c24
OK
469}
470
1da177e4
LT
471/*
472 * Shut down the hosts module.
473 * Note that this routine is called only at server shutdown time.
474 */
475void
476nlm_shutdown_hosts(void)
477{
0cea3276
OK
478 struct hlist_head *chain;
479 struct hlist_node *pos;
1da177e4 480 struct nlm_host *host;
1da177e4
LT
481
482 dprintk("lockd: shutting down host module\n");
353ab6e9 483 mutex_lock(&nlm_host_mutex);
1da177e4
LT
484
485 /* First, make all hosts eligible for gc */
486 dprintk("lockd: nuking all hosts...\n");
0cea3276 487 for (chain = nlm_hosts; chain < nlm_hosts + NLM_HOST_NRHASH; ++chain) {
d801b861 488 hlist_for_each_entry(host, pos, chain, h_hash) {
1da177e4 489 host->h_expires = jiffies - 1;
d801b861
JL
490 if (host->h_rpcclnt) {
491 rpc_shutdown_client(host->h_rpcclnt);
492 host->h_rpcclnt = NULL;
493 }
494 }
1da177e4
LT
495 }
496
497 /* Then, perform a garbage collection pass */
498 nlm_gc_hosts();
353ab6e9 499 mutex_unlock(&nlm_host_mutex);
1da177e4
LT
500
501 /* complain if any hosts are left */
502 if (nrhosts) {
503 printk(KERN_WARNING "lockd: couldn't shutdown host module!\n");
504 dprintk("lockd: %d hosts left:\n", nrhosts);
0cea3276
OK
505 for (chain = nlm_hosts; chain < nlm_hosts + NLM_HOST_NRHASH; ++chain) {
506 hlist_for_each_entry(host, pos, chain, h_hash) {
1da177e4
LT
507 dprintk(" %s (cnt %d use %d exp %ld)\n",
508 host->h_name, atomic_read(&host->h_count),
509 host->h_inuse, host->h_expires);
510 }
511 }
512 }
513}
514
515/*
516 * Garbage collect any unused NLM hosts.
517 * This GC combines reference counting for async operations with
518 * mark & sweep for resources held by remote clients.
519 */
520static void
521nlm_gc_hosts(void)
522{
0cea3276
OK
523 struct hlist_head *chain;
524 struct hlist_node *pos, *next;
525 struct nlm_host *host;
1da177e4
LT
526
527 dprintk("lockd: host garbage collection\n");
0cea3276
OK
528 for (chain = nlm_hosts; chain < nlm_hosts + NLM_HOST_NRHASH; ++chain) {
529 hlist_for_each_entry(host, pos, chain, h_hash)
1da177e4
LT
530 host->h_inuse = 0;
531 }
532
533 /* Mark all hosts that hold locks, blocks or shares */
534 nlmsvc_mark_resources();
535
0cea3276
OK
536 for (chain = nlm_hosts; chain < nlm_hosts + NLM_HOST_NRHASH; ++chain) {
537 hlist_for_each_entry_safe(host, pos, next, chain, h_hash) {
1da177e4
LT
538 if (atomic_read(&host->h_count) || host->h_inuse
539 || time_before(jiffies, host->h_expires)) {
540 dprintk("nlm_gc_hosts skipping %s (cnt %d use %d exp %ld)\n",
541 host->h_name, atomic_read(&host->h_count),
542 host->h_inuse, host->h_expires);
1da177e4
LT
543 continue;
544 }
545 dprintk("lockd: delete host %s\n", host->h_name);
0cea3276 546 hlist_del_init(&host->h_hash);
977faf39 547
c53c1bb9 548 nlm_destroy_host(host);
1da177e4
LT
549 nrhosts--;
550 }
551 }
552
553 next_gc = jiffies + NLM_HOST_COLLECT;
554}
555
8dead0db
OK
556
557/*
558 * Manage NSM handles
559 */
560static LIST_HEAD(nsm_handles);
d8421202 561static DEFINE_SPINLOCK(nsm_lock);
8dead0db 562
e018040a
CL
563static struct nsm_handle *nsm_find(const struct sockaddr *sap,
564 const size_t salen,
bc48e4d6
CL
565 const char *hostname,
566 const size_t hostname_len,
567 const int create)
8dead0db
OK
568{
569 struct nsm_handle *nsm = NULL;
a95e56e7 570 struct nsm_handle *pos;
8dead0db 571
e018040a 572 if (!sap)
8dead0db
OK
573 return NULL;
574
575 if (hostname && memchr(hostname, '/', hostname_len) != NULL) {
576 if (printk_ratelimit()) {
577 printk(KERN_WARNING "Invalid hostname \"%.*s\" "
578 "in NFS lock request\n",
bc48e4d6 579 (int)hostname_len, hostname);
8dead0db
OK
580 }
581 return NULL;
582 }
583
d8421202
BF
584retry:
585 spin_lock(&nsm_lock);
a95e56e7 586 list_for_each_entry(pos, &nsm_handles, sm_link) {
8dead0db 587
abd1f500 588 if (hostname && nsm_use_hostnames) {
a95e56e7
BF
589 if (strlen(pos->sm_name) != hostname_len
590 || memcmp(pos->sm_name, hostname, hostname_len))
abd1f500 591 continue;
e018040a 592 } else if (!nlm_cmp_addr(nsm_addr(pos), sap))
8dead0db 593 continue;
a95e56e7 594 atomic_inc(&pos->sm_count);
d8421202 595 kfree(nsm);
a95e56e7 596 nsm = pos;
d8421202 597 goto found;
8dead0db 598 }
d8421202
BF
599 if (nsm) {
600 list_add(&nsm->sm_link, &nsm_handles);
601 goto found;
8dead0db 602 }
d8421202
BF
603 spin_unlock(&nsm_lock);
604
605 if (!create)
606 return NULL;
8dead0db
OK
607
608 nsm = kzalloc(sizeof(*nsm) + hostname_len + 1, GFP_KERNEL);
a95e56e7 609 if (nsm == NULL)
d8421202
BF
610 return NULL;
611
e018040a
CL
612 memcpy(nsm_addr(nsm), sap, salen);
613 nsm->sm_addrlen = salen;
a95e56e7
BF
614 nsm->sm_name = (char *) (nsm + 1);
615 memcpy(nsm->sm_name, hostname, hostname_len);
616 nsm->sm_name[hostname_len] = '\0';
1b333c54
CL
617 nlm_display_address((struct sockaddr *)&nsm->sm_addr,
618 nsm->sm_addrbuf, sizeof(nsm->sm_addrbuf));
a95e56e7 619 atomic_set(&nsm->sm_count, 1);
d8421202 620 goto retry;
a95e56e7 621
d8421202
BF
622found:
623 spin_unlock(&nsm_lock);
8dead0db
OK
624 return nsm;
625}
626
8dead0db
OK
627/*
628 * Release an NSM handle
629 */
630void
631nsm_release(struct nsm_handle *nsm)
632{
633 if (!nsm)
634 return;
d8421202 635 if (atomic_dec_and_lock(&nsm->sm_count, &nsm_lock)) {
164f98ad 636 list_del(&nsm->sm_link);
d8421202 637 spin_unlock(&nsm_lock);
164f98ad 638 kfree(nsm);
8dead0db
OK
639 }
640}