]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - include/linux/lockd/lockd.h
new helper: file_inode(file)
[mirror_ubuntu-artful-kernel.git] / include / linux / lockd / lockd.h
CommitLineData
1da177e4
LT
1/*
2 * linux/include/linux/lockd/lockd.h
3 *
4 * General-purpose lockd include file.
5 *
6 * Copyright (C) 1996 Olaf Kirch <okir@monad.swb.de>
7 */
8
9#ifndef LINUX_LOCKD_LOCKD_H
10#define LINUX_LOCKD_LOCKD_H
11
12#ifdef __KERNEL__
13
1da177e4 14#include <linux/in.h>
781b61a6
CL
15#include <linux/in6.h>
16#include <net/ipv6.h>
1da177e4 17#include <linux/fs.h>
6849c0ca 18#include <linux/kref.h>
1da177e4
LT
19#include <linux/utsname.h>
20#include <linux/nfsd/nfsfh.h>
21#include <linux/lockd/bind.h>
22#include <linux/lockd/xdr.h>
23#ifdef CONFIG_LOCKD_V4
24#include <linux/lockd/xdr4.h>
25#endif
26#include <linux/lockd/debug.h>
27
28/*
29 * Version string
30 */
31#define LOCKD_VERSION "0.5"
32
33/*
34 * Default timeout for RPC calls (seconds)
35 */
36#define LOCKD_DFLT_TIMEO 10
37
38/*
39 * Lockd host handle (used both by the client and server personality).
40 */
41struct nlm_host {
0cea3276 42 struct hlist_node h_hash; /* doubly linked list */
b4ed58fd
CL
43 struct sockaddr_storage h_addr; /* peer address */
44 size_t h_addrlen;
90151e6e 45 struct sockaddr_storage h_srcaddr; /* our address (optional) */
8e35f8e7 46 size_t h_srcaddrlen;
7538ce1e
CL
47 struct rpc_clnt *h_rpcclnt; /* RPC client to talk to peer */
48 char *h_name; /* remote hostname */
1da177e4
LT
49 u32 h_version; /* interface version */
50 unsigned short h_proto; /* transport proto */
51 unsigned short h_reclaiming : 1,
52 h_server : 1, /* server side, not client side */
0cb2659b 53 h_noresvport : 1,
350fce8d 54 h_inuse : 1;
1da177e4 55 wait_queue_head_t h_gracewait; /* wait while reclaiming */
28df955a 56 struct rw_semaphore h_rwsem; /* Reboot recovery lock */
1da177e4
LT
57 u32 h_state; /* pseudo-state counter */
58 u32 h_nsmstate; /* true remote NSM state */
59 u32 h_pidcount; /* Pseudopids */
60 atomic_t h_count; /* reference count */
50467914 61 struct mutex h_mutex; /* mutex for pmap binding */
1da177e4
LT
62 unsigned long h_nextrebind; /* next portmap call */
63 unsigned long h_expires; /* eligible for GC */
64 struct list_head h_lockowners; /* Lockowners for the client */
65 spinlock_t h_lock;
26bcbf96
CH
66 struct list_head h_granted; /* Locks in GRANTED state */
67 struct list_head h_reclaim; /* Locks in RECLAIM state */
7538ce1e 68 struct nsm_handle *h_nsmhandle; /* NSM status handle */
1df40b60 69 char *h_addrbuf; /* address eyecatcher */
66697bfd 70 struct net *net; /* host net */
8dead0db
OK
71};
72
bc995801
CL
73/*
74 * The largest string sm_addrbuf should hold is a full-size IPv6 address
75 * (no "::" anywhere) with a scope ID. The buffer size is computed to
76 * hold eight groups of colon-separated four-hex-digit numbers, a
77 * percent sign, a scope id (at most 32 bits, in decimal), and NUL.
78 */
79#define NSM_ADDRBUF ((8 * 4 + 7) + (1 + 10) + 1)
80
8dead0db
OK
81struct nsm_handle {
82 struct list_head sm_link;
83 atomic_t sm_count;
29ed1407 84 char *sm_mon_name;
f47534f7 85 char *sm_name;
7e9d7746
CL
86 struct sockaddr_storage sm_addr;
87 size_t sm_addrlen;
8dead0db
OK
88 unsigned int sm_monitored : 1,
89 sm_sticky : 1; /* don't unmonitor */
7e44d3be 90 struct nsm_private sm_priv;
bc995801 91 char sm_addrbuf[NSM_ADDRBUF];
1da177e4
LT
92};
93
b4ed58fd
CL
94/*
95 * Rigorous type checking on sockaddr type conversions
96 */
97static inline struct sockaddr_in *nlm_addr_in(const struct nlm_host *host)
98{
99 return (struct sockaddr_in *)&host->h_addr;
100}
101
102static inline struct sockaddr *nlm_addr(const struct nlm_host *host)
103{
104 return (struct sockaddr *)&host->h_addr;
105}
106
90151e6e
CL
107static inline struct sockaddr_in *nlm_srcaddr_in(const struct nlm_host *host)
108{
109 return (struct sockaddr_in *)&host->h_srcaddr;
110}
111
112static inline struct sockaddr *nlm_srcaddr(const struct nlm_host *host)
113{
114 return (struct sockaddr *)&host->h_srcaddr;
115}
116
1da177e4
LT
117/*
118 * Map an fl_owner_t into a unique 32-bit "pid"
119 */
120struct nlm_lockowner {
121 struct list_head list;
122 atomic_t count;
123
124 struct nlm_host *host;
125 fl_owner_t owner;
126 uint32_t pid;
127};
128
ecdbf769
TM
129struct nlm_wait;
130
1da177e4
LT
131/*
132 * Memory chunk for NLM client RPC request.
133 */
511d2e88 134#define NLMCLNT_OHSIZE ((__NEW_UTS_LEN) + 10u)
1da177e4 135struct nlm_rqst {
5e7f37a7 136 atomic_t a_count;
1da177e4
LT
137 unsigned int a_flags; /* initial RPC task flags */
138 struct nlm_host * a_host; /* host handle */
139 struct nlm_args a_args; /* arguments */
140 struct nlm_res a_res; /* result */
92737230 141 struct nlm_block * a_block;
aaaa9942 142 unsigned int a_retries; /* Retry count */
92737230 143 u8 a_owner[NLMCLNT_OHSIZE];
1da177e4
LT
144};
145
146/*
147 * This struct describes a file held open by lockd on behalf of
148 * an NFS client.
149 */
150struct nlm_file {
07ba8063 151 struct hlist_node f_list; /* linked list */
1da177e4
LT
152 struct nfs_fh f_handle; /* NFS file handle */
153 struct file * f_file; /* VFS file pointer */
154 struct nlm_share * f_shares; /* DOS shares */
68a2d76c 155 struct list_head f_blocks; /* blocked locks */
1da177e4
LT
156 unsigned int f_locks; /* guesstimate # of locks */
157 unsigned int f_count; /* reference count */
89e63ef6 158 struct mutex f_mutex; /* avoid concurrent access */
1da177e4
LT
159};
160
161/*
162 * This is a server block (i.e. a lock requested by some client which
163 * couldn't be granted because of a conflicting lock).
164 */
165#define NLM_NEVER (~(unsigned long) 0)
2b36f412
ME
166/* timeout on non-blocking call: */
167#define NLM_TIMEOUT (7 * HZ)
168
1da177e4 169struct nlm_block {
6849c0ca 170 struct kref b_count; /* Reference count */
68a2d76c
OK
171 struct list_head b_list; /* linked list of all blocks */
172 struct list_head b_flist; /* linked list (per file) */
92737230 173 struct nlm_rqst * b_call; /* RPC args & callback info */
1da177e4
LT
174 struct svc_serv * b_daemon; /* NLM service */
175 struct nlm_host * b_host; /* host handle for RPC clnt */
176 unsigned long b_when; /* next re-xmit */
177 unsigned int b_id; /* block id */
1da177e4 178 unsigned char b_granted; /* VFS granted lock */
1da177e4 179 struct nlm_file * b_file; /* file in question */
2b36f412
ME
180 struct cache_req * b_cache_req; /* deferred request handling */
181 struct file_lock * b_fl; /* set for GETLK */
182 struct cache_deferred_req * b_deferred_req;
183 unsigned int b_flags; /* block flags */
184#define B_QUEUED 1 /* lock queued */
185#define B_GOT_CALLBACK 2 /* got lock or conflicting lock */
186#define B_TIMED_OUT 4 /* filesystem too slow to respond */
1da177e4
LT
187};
188
1da177e4
LT
189/*
190 * Global variables
191 */
a613fa16 192extern const struct rpc_program nlm_program;
1da177e4
LT
193extern struct svc_procedure nlmsvc_procedures[];
194#ifdef CONFIG_LOCKD_V4
195extern struct svc_procedure nlmsvc_procedures4[];
196#endif
197extern int nlmsvc_grace_period;
198extern unsigned long nlmsvc_timeout;
90ab5ee9 199extern bool nsm_use_hostnames;
6c9dc425 200extern u32 nsm_local_state;
1da177e4
LT
201
202/*
203 * Lockd client functions
204 */
92737230 205struct nlm_rqst * nlm_alloc_call(struct nlm_host *host);
92737230 206int nlm_async_call(struct nlm_rqst *, u32, const struct rpc_call_ops *);
d4716624 207int nlm_async_reply(struct nlm_rqst *, u32, const struct rpc_call_ops *);
7db836d4 208void nlmclnt_release_call(struct nlm_rqst *);
3a649b88
TM
209struct nlm_wait * nlmclnt_prepare_block(struct nlm_host *host, struct file_lock *fl);
210void nlmclnt_finish_block(struct nlm_wait *block);
211int nlmclnt_block(struct nlm_wait *block, struct nlm_rqst *req, long timeout);
dcff09f1
CL
212__be32 nlmclnt_grant(const struct sockaddr *addr,
213 const struct nlm_lock *lock);
5c8dd29c 214void nlmclnt_recovery(struct nlm_host *);
1da177e4 215int nlmclnt_reclaim(struct nlm_host *, struct file_lock *);
031d869d 216void nlmclnt_next_cookie(struct nlm_cookie *);
1da177e4
LT
217
218/*
219 * Host cache
220 */
d7d20440
CL
221struct nlm_host *nlmclnt_lookup_host(const struct sockaddr *sap,
222 const size_t salen,
223 const unsigned short protocol,
224 const u32 version,
0cb2659b 225 const char *hostname,
66697bfd
SK
226 int noresvport,
227 struct net *net);
8ea6ecc8 228void nlmclnt_release_host(struct nlm_host *);
6bfbe8af
CL
229struct nlm_host *nlmsvc_lookup_host(const struct svc_rqst *rqstp,
230 const char *hostname,
231 const size_t hostname_len);
67216b94 232void nlmsvc_release_host(struct nlm_host *);
1da177e4
LT
233struct rpc_clnt * nlm_bind_host(struct nlm_host *);
234void nlm_rebind_host(struct nlm_host *);
235struct nlm_host * nlm_get_host(struct nlm_host *);
1da177e4 236void nlm_shutdown_hosts(void);
3b64739f 237void nlm_shutdown_hosts_net(struct net *net);
7fefc9cb 238void nlm_host_rebooted(const struct nlm_reboot *);
1da177e4 239
1e49323c
CL
240/*
241 * Host monitoring
242 */
243int nsm_monitor(const struct nlm_host *host);
356c3eb4 244void nsm_unmonitor(const struct nlm_host *host);
1da177e4 245
92fd91b9
CL
246struct nsm_handle *nsm_get_handle(const struct sockaddr *sap,
247 const size_t salen,
67c6d107 248 const char *hostname,
92fd91b9 249 const size_t hostname_len);
3420a8c4 250struct nsm_handle *nsm_reboot_lookup(const struct nlm_reboot *info);
67c6d107
CL
251void nsm_release(struct nsm_handle *nsm);
252
f2af793d
OK
253/*
254 * This is used in garbage collection and resource reclaim
255 * A return value != 0 means destroy the lock/block/share
256 */
4373ea84 257typedef int (*nlm_host_match_fn_t)(void *cur, struct nlm_host *ref);
f2af793d 258
1da177e4
LT
259/*
260 * Server-side lock handling
261 */
52921e02 262__be32 nlmsvc_lock(struct svc_rqst *, struct nlm_file *,
6cde4de8 263 struct nlm_host *, struct nlm_lock *, int,
b2b50289 264 struct nlm_cookie *, int);
5ccb0066 265__be32 nlmsvc_unlock(struct net *net, struct nlm_file *, struct nlm_lock *);
85f3f1b3 266__be32 nlmsvc_testlock(struct svc_rqst *, struct nlm_file *,
8f920d5e
JL
267 struct nlm_host *, struct nlm_lock *,
268 struct nlm_lock *, struct nlm_cookie *);
5ccb0066 269__be32 nlmsvc_cancel_blocked(struct net *net, struct nlm_file *, struct nlm_lock *);
1da177e4 270unsigned long nlmsvc_retry_blocked(void);
f3ee439f 271void nlmsvc_traverse_blocks(struct nlm_host *, struct nlm_file *,
f2af793d 272 nlm_host_match_fn_t match);
e8c5c045 273void nlmsvc_grant_reply(struct nlm_cookie *, __be32);
7db836d4 274void nlmsvc_release_call(struct nlm_rqst *);
1da177e4
LT
275
276/*
277 * File handling for the server personality
278 */
52921e02 279__be32 nlm_lookup_file(struct svc_rqst *, struct nlm_file **,
1da177e4
LT
280 struct nfs_fh *);
281void nlm_release_file(struct nlm_file *);
b26411f8 282void nlmsvc_mark_resources(struct net *);
1da177e4
LT
283void nlmsvc_free_host_resources(struct nlm_host *);
284void nlmsvc_invalidate_all(void);
285
4373ea84
WC
286/*
287 * Cluster failover support
288 */
17efa372 289int nlmsvc_unlock_all_by_sb(struct super_block *sb);
367c8c7b 290int nlmsvc_unlock_all_by_ip(struct sockaddr *server_addr);
4373ea84 291
f34ec991 292static inline struct inode *nlmsvc_file_inode(struct nlm_file *file)
1da177e4 293{
496ad9aa 294 return file_inode(file->f_file);
1da177e4
LT
295}
296
b85e4676
CL
297static inline int __nlm_privileged_request4(const struct sockaddr *sap)
298{
299 const struct sockaddr_in *sin = (struct sockaddr_in *)sap;
57ef6925
CL
300
301 if (ntohs(sin->sin_port) > 1023)
302 return 0;
303
304 return ipv4_is_loopback(sin->sin_addr.s_addr);
b85e4676
CL
305}
306
dfd56b8b 307#if IS_ENABLED(CONFIG_IPV6)
b85e4676
CL
308static inline int __nlm_privileged_request6(const struct sockaddr *sap)
309{
310 const struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap;
d1208f70
CL
311
312 if (ntohs(sin6->sin6_port) > 1023)
313 return 0;
314
315 if (ipv6_addr_type(&sin6->sin6_addr) & IPV6_ADDR_MAPPED)
316 return ipv4_is_loopback(sin6->sin6_addr.s6_addr32[3]);
317
318 return ipv6_addr_type(&sin6->sin6_addr) & IPV6_ADDR_LOOPBACK;
b85e4676 319}
dfd56b8b 320#else /* IS_ENABLED(CONFIG_IPV6) */
b85e4676
CL
321static inline int __nlm_privileged_request6(const struct sockaddr *sap)
322{
323 return 0;
324}
dfd56b8b 325#endif /* IS_ENABLED(CONFIG_IPV6) */
b85e4676
CL
326
327/*
328 * Ensure incoming requests are from local privileged callers.
329 *
330 * Return TRUE if sender is local and is connecting via a privileged port;
331 * otherwise return FALSE.
332 */
333static inline int nlm_privileged_requester(const struct svc_rqst *rqstp)
334{
335 const struct sockaddr *sap = svc_addr(rqstp);
336
337 switch (sap->sa_family) {
338 case AF_INET:
339 return __nlm_privileged_request4(sap);
340 case AF_INET6:
341 return __nlm_privileged_request6(sap);
342 default:
343 return 0;
344 }
345}
346
1da177e4
LT
347/*
348 * Compare two NLM locks.
349 * When the second lock is of type F_UNLCK, this acts like a wildcard.
350 */
f34ec991
CL
351static inline int nlm_compare_locks(const struct file_lock *fl1,
352 const struct file_lock *fl2)
1da177e4
LT
353{
354 return fl1->fl_pid == fl2->fl_pid
3134cbec 355 && fl1->fl_owner == fl2->fl_owner
1da177e4
LT
356 && fl1->fl_start == fl2->fl_start
357 && fl1->fl_end == fl2->fl_end
358 &&(fl1->fl_type == fl2->fl_type || fl2->fl_type == F_UNLCK);
359}
360
7b021967 361extern const struct lock_manager_operations nlmsvc_lock_operations;
1da177e4
LT
362
363#endif /* __KERNEL__ */
364
365#endif /* LINUX_LOCKD_LOCKD_H */