blob: abdd75d44dd46c3ff5b468d355eec03594d31bc6 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * linux/fs/lockd/host.c
3 *
4 * Management for NLM peer hosts. The nlm_host struct is shared
5 * between client and server implementation. The only reason to
6 * do so is to reduce code bloat.
7 *
8 * Copyright (C) 1996, Olaf Kirch <okir@monad.swb.de>
9 */
10
11#include <linux/types.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070012#include <linux/slab.h>
13#include <linux/in.h>
Chuck Lever1b333c52008-08-27 16:57:23 -040014#include <linux/in6.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070015#include <linux/sunrpc/clnt.h>
16#include <linux/sunrpc/svc.h>
17#include <linux/lockd/lockd.h>
Ingo Molnar353ab6e2006-03-26 01:37:12 -080018#include <linux/mutex.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070019
Stanislav Kinsbursky66697bf2012-01-31 15:08:13 +040020#include <linux/sunrpc/svc_xprt.h>
21
Chuck Lever1b333c52008-08-27 16:57:23 -040022#include <net/ipv6.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070023
Stanislav Kinsbursky3cf7fb02012-07-25 16:56:11 +040024#include "netns.h"
25
Linus Torvalds1da177e2005-04-16 15:20:36 -070026#define NLMDBG_FACILITY NLMDBG_HOSTCACHE
Linus Torvalds1da177e2005-04-16 15:20:36 -070027#define NLM_HOST_NRHASH 32
Linus Torvalds1da177e2005-04-16 15:20:36 -070028#define NLM_HOST_REBIND (60 * HZ)
NeilBrown1447d252008-02-08 13:03:37 +110029#define NLM_HOST_EXPIRE (300 * HZ)
30#define NLM_HOST_COLLECT (120 * HZ)
Linus Torvalds1da177e2005-04-16 15:20:36 -070031
Chuck Leverd2df0482010-12-14 15:06:22 +000032static struct hlist_head nlm_server_hosts[NLM_HOST_NRHASH];
Chuck Lever8ea6ecc2010-12-14 15:05:52 +000033static struct hlist_head nlm_client_hosts[NLM_HOST_NRHASH];
J. Bruce Fieldsb1137462010-12-14 15:05:03 +000034
Sasha Levinb67bfe02013-02-27 17:06:00 -080035#define for_each_host(host, chain, table) \
J. Bruce Fieldsb1137462010-12-14 15:05:03 +000036 for ((chain) = (table); \
37 (chain) < (table) + NLM_HOST_NRHASH; ++(chain)) \
Sasha Levinb67bfe02013-02-27 17:06:00 -080038 hlist_for_each_entry((host), (chain), h_hash)
J. Bruce Fieldsb1137462010-12-14 15:05:03 +000039
Sasha Levinb67bfe02013-02-27 17:06:00 -080040#define for_each_host_safe(host, next, chain, table) \
J. Bruce Fieldsb1137462010-12-14 15:05:03 +000041 for ((chain) = (table); \
42 (chain) < (table) + NLM_HOST_NRHASH; ++(chain)) \
Sasha Levinb67bfe02013-02-27 17:06:00 -080043 hlist_for_each_entry_safe((host), (next), \
J. Bruce Fieldsb1137462010-12-14 15:05:03 +000044 (chain), h_hash)
45
Chuck Leverfcc072c2010-12-14 15:06:32 +000046static unsigned long nrhosts;
Ingo Molnar353ab6e2006-03-26 01:37:12 -080047static DEFINE_MUTEX(nlm_host_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -070048
Stanislav Kinsbursky27adadd2012-07-25 16:56:03 +040049static void nlm_gc_hosts(struct net *net);
Linus Torvalds1da177e2005-04-16 15:20:36 -070050
Chuck Lever7f1ed182008-10-03 12:50:07 -040051struct nlm_lookup_host_info {
52 const int server; /* search for server|client */
Chuck Lever88541c82008-10-03 12:50:14 -040053 const struct sockaddr *sap; /* address to search for */
54 const size_t salen; /* it's length */
Chuck Lever7f1ed182008-10-03 12:50:07 -040055 const unsigned short protocol; /* transport to search for*/
56 const u32 version; /* NLM version to search for */
57 const char *hostname; /* remote's hostname */
58 const size_t hostname_len; /* it's length */
Chuck Lever0cb26592008-12-23 15:21:38 -050059 const int noresvport; /* use non-priv port */
Stanislav Kinsbursky66697bf2012-01-31 15:08:13 +040060 struct net *net; /* network namespace to bind */
Chuck Lever7f1ed182008-10-03 12:50:07 -040061};
62
Chuck Leverede2fea2008-09-03 14:36:08 -040063/*
64 * Hash function must work well on big- and little-endian platforms
65 */
66static unsigned int __nlm_hash32(const __be32 n)
67{
68 unsigned int hash = (__force u32)n ^ ((__force u32)n >> 16);
69 return hash ^ (hash >> 8);
70}
71
72static unsigned int __nlm_hash_addr4(const struct sockaddr *sap)
73{
74 const struct sockaddr_in *sin = (struct sockaddr_in *)sap;
75 return __nlm_hash32(sin->sin_addr.s_addr);
76}
77
78static unsigned int __nlm_hash_addr6(const struct sockaddr *sap)
79{
80 const struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap;
81 const struct in6_addr addr = sin6->sin6_addr;
82 return __nlm_hash32(addr.s6_addr32[0]) ^
83 __nlm_hash32(addr.s6_addr32[1]) ^
84 __nlm_hash32(addr.s6_addr32[2]) ^
85 __nlm_hash32(addr.s6_addr32[3]);
86}
87
88static unsigned int nlm_hash_address(const struct sockaddr *sap)
89{
90 unsigned int hash;
91
92 switch (sap->sa_family) {
93 case AF_INET:
94 hash = __nlm_hash_addr4(sap);
95 break;
96 case AF_INET6:
97 hash = __nlm_hash_addr6(sap);
98 break;
99 default:
100 hash = 0;
101 }
102 return hash & (NLM_HOST_NRHASH - 1);
103}
104
Linus Torvalds1da177e2005-04-16 15:20:36 -0700105/*
Chuck Levera7952f42010-12-14 15:05:23 +0000106 * Allocate and initialize an nlm_host. Common to both client and server.
107 */
108static struct nlm_host *nlm_alloc_host(struct nlm_lookup_host_info *ni,
109 struct nsm_handle *nsm)
110{
111 struct nlm_host *host = NULL;
112 unsigned long now = jiffies;
113
114 if (nsm != NULL)
115 atomic_inc(&nsm->sm_count);
116 else {
117 host = NULL;
118 nsm = nsm_get_handle(ni->sap, ni->salen,
119 ni->hostname, ni->hostname_len);
120 if (unlikely(nsm == NULL)) {
121 dprintk("lockd: %s failed; no nsm handle\n",
122 __func__);
123 goto out;
124 }
125 }
126
127 host = kmalloc(sizeof(*host), GFP_KERNEL);
128 if (unlikely(host == NULL)) {
129 dprintk("lockd: %s failed; no memory\n", __func__);
130 nsm_release(nsm);
131 goto out;
132 }
133
134 memcpy(nlm_addr(host), ni->sap, ni->salen);
135 host->h_addrlen = ni->salen;
136 rpc_set_port(nlm_addr(host), 0);
137 host->h_srcaddrlen = 0;
138
139 host->h_rpcclnt = NULL;
140 host->h_name = nsm->sm_name;
141 host->h_version = ni->version;
142 host->h_proto = ni->protocol;
143 host->h_reclaiming = 0;
144 host->h_server = ni->server;
145 host->h_noresvport = ni->noresvport;
146 host->h_inuse = 0;
147 init_waitqueue_head(&host->h_gracewait);
148 init_rwsem(&host->h_rwsem);
149 host->h_state = 0;
150 host->h_nsmstate = 0;
151 host->h_pidcount = 0;
152 atomic_set(&host->h_count, 1);
153 mutex_init(&host->h_mutex);
154 host->h_nextrebind = now + NLM_HOST_REBIND;
155 host->h_expires = now + NLM_HOST_EXPIRE;
156 INIT_LIST_HEAD(&host->h_lockowners);
157 spin_lock_init(&host->h_lock);
158 INIT_LIST_HEAD(&host->h_granted);
159 INIT_LIST_HEAD(&host->h_reclaim);
160 host->h_nsmhandle = nsm;
161 host->h_addrbuf = nsm->sm_addrbuf;
Stanislav Kinsbursky66697bf2012-01-31 15:08:13 +0400162 host->net = ni->net;
Chuck Levera7952f42010-12-14 15:05:23 +0000163
164out:
165 return host;
166}
167
168/*
Chuck Lever723bb5b2010-12-14 15:05:33 +0000169 * Destroy an nlm_host and free associated resources
170 *
171 * Caller must hold nlm_host_mutex.
Olaf Kirchc53c1bb2006-10-04 02:16:00 -0700172 */
Chuck Lever723bb5b2010-12-14 15:05:33 +0000173static void nlm_destroy_host_locked(struct nlm_host *host)
Olaf Kirchc53c1bb2006-10-04 02:16:00 -0700174{
175 struct rpc_clnt *clnt;
Stanislav Kinsburskycaa4e762012-07-25 16:56:19 +0400176 struct lockd_net *ln = net_generic(host->net, lockd_net_id);
Olaf Kirchc53c1bb2006-10-04 02:16:00 -0700177
Chuck Lever723bb5b2010-12-14 15:05:33 +0000178 dprintk("lockd: destroy host %s\n", host->h_name);
179
Chuck Lever723bb5b2010-12-14 15:05:33 +0000180 hlist_del_init(&host->h_hash);
181
Olaf Kirchc53c1bb2006-10-04 02:16:00 -0700182 nsm_unmonitor(host);
Chuck Leverc8c23c42008-12-04 14:21:31 -0500183 nsm_release(host->h_nsmhandle);
Olaf Kirchc53c1bb2006-10-04 02:16:00 -0700184
Trond Myklebust34f52e32007-06-14 16:40:31 -0400185 clnt = host->h_rpcclnt;
186 if (clnt != NULL)
187 rpc_shutdown_client(clnt);
Olaf Kirchc53c1bb2006-10-04 02:16:00 -0700188 kfree(host);
Chuck Lever723bb5b2010-12-14 15:05:33 +0000189
Stanislav Kinsburskycaa4e762012-07-25 16:56:19 +0400190 ln->nrhosts--;
Chuck Lever723bb5b2010-12-14 15:05:33 +0000191 nrhosts--;
Olaf Kirchc53c1bb2006-10-04 02:16:00 -0700192}
193
Chuck Leverd7d20442008-10-03 12:50:21 -0400194/**
195 * nlmclnt_lookup_host - Find an NLM host handle matching a remote server
196 * @sap: network address of server
197 * @salen: length of server address
198 * @protocol: transport protocol to use
199 * @version: NLM protocol version
200 * @hostname: '\0'-terminated hostname of server
Chuck Lever0cb26592008-12-23 15:21:38 -0500201 * @noresvport: 1 if non-privileged port should be used
Chuck Leverd7d20442008-10-03 12:50:21 -0400202 *
203 * Returns an nlm_host structure that matches the passed-in
204 * [server address, transport protocol, NLM version, server hostname].
205 * If one doesn't already exist in the host cache, a new handle is
206 * created and returned.
Adrian Bunkc5856462006-12-06 20:38:29 -0800207 */
Chuck Leverd7d20442008-10-03 12:50:21 -0400208struct nlm_host *nlmclnt_lookup_host(const struct sockaddr *sap,
209 const size_t salen,
210 const unsigned short protocol,
Chuck Lever0cb26592008-12-23 15:21:38 -0500211 const u32 version,
212 const char *hostname,
Stanislav Kinsbursky66697bf2012-01-31 15:08:13 +0400213 int noresvport,
214 struct net *net)
Adrian Bunkc5856462006-12-06 20:38:29 -0800215{
Chuck Lever7f1ed182008-10-03 12:50:07 -0400216 struct nlm_lookup_host_info ni = {
217 .server = 0,
Chuck Leverd7d20442008-10-03 12:50:21 -0400218 .sap = sap,
219 .salen = salen,
220 .protocol = protocol,
Chuck Lever7f1ed182008-10-03 12:50:07 -0400221 .version = version,
222 .hostname = hostname,
Chuck Leverd7d20442008-10-03 12:50:21 -0400223 .hostname_len = strlen(hostname),
Chuck Lever0cb26592008-12-23 15:21:38 -0500224 .noresvport = noresvport,
Stanislav Kinsbursky66697bf2012-01-31 15:08:13 +0400225 .net = net,
Chuck Lever7f1ed182008-10-03 12:50:07 -0400226 };
Chuck Lever8ea6ecc2010-12-14 15:05:52 +0000227 struct hlist_head *chain;
Chuck Lever8ea6ecc2010-12-14 15:05:52 +0000228 struct nlm_host *host;
229 struct nsm_handle *nsm = NULL;
Stanislav Kinsburskycaa4e762012-07-25 16:56:19 +0400230 struct lockd_net *ln = net_generic(net, lockd_net_id);
Frank van Maarseveenc98451b2007-07-09 22:25:29 +0200231
Chuck Lever7f1ed182008-10-03 12:50:07 -0400232 dprintk("lockd: %s(host='%s', vers=%u, proto=%s)\n", __func__,
233 (hostname ? hostname : "<none>"), version,
Chuck Leverd7d20442008-10-03 12:50:21 -0400234 (protocol == IPPROTO_UDP ? "udp" : "tcp"));
Chuck Lever7f1ed182008-10-03 12:50:07 -0400235
Chuck Lever8ea6ecc2010-12-14 15:05:52 +0000236 mutex_lock(&nlm_host_mutex);
237
238 chain = &nlm_client_hosts[nlm_hash_address(sap)];
Sasha Levinb67bfe02013-02-27 17:06:00 -0800239 hlist_for_each_entry(host, chain, h_hash) {
Stanislav Kinsbursky66697bf2012-01-31 15:08:13 +0400240 if (host->net != net)
241 continue;
Chuck Lever8ea6ecc2010-12-14 15:05:52 +0000242 if (!rpc_cmp_addr(nlm_addr(host), sap))
243 continue;
244
245 /* Same address. Share an NSM handle if we already have one */
246 if (nsm == NULL)
247 nsm = host->h_nsmhandle;
248
249 if (host->h_proto != protocol)
250 continue;
251 if (host->h_version != version)
252 continue;
253
254 nlm_get_host(host);
255 dprintk("lockd: %s found host %s (%s)\n", __func__,
256 host->h_name, host->h_addrbuf);
257 goto out;
258 }
259
260 host = nlm_alloc_host(&ni, nsm);
261 if (unlikely(host == NULL))
262 goto out;
263
264 hlist_add_head(&host->h_hash, chain);
Stanislav Kinsburskycaa4e762012-07-25 16:56:19 +0400265 ln->nrhosts++;
Chuck Lever8ea6ecc2010-12-14 15:05:52 +0000266 nrhosts++;
267
268 dprintk("lockd: %s created host %s (%s)\n", __func__,
269 host->h_name, host->h_addrbuf);
270
271out:
272 mutex_unlock(&nlm_host_mutex);
273 return host;
274}
275
276/**
277 * nlmclnt_release_host - release client nlm_host
278 * @host: nlm_host to release
279 *
280 */
281void nlmclnt_release_host(struct nlm_host *host)
282{
283 if (host == NULL)
284 return;
285
286 dprintk("lockd: release client host %s\n", host->h_name);
287
Trond Myklebusta2d30a52012-10-15 17:26:20 -0400288 WARN_ON_ONCE(host->h_server);
Chuck Lever8ea6ecc2010-12-14 15:05:52 +0000289
290 if (atomic_dec_and_test(&host->h_count)) {
Trond Myklebusta2d30a52012-10-15 17:26:20 -0400291 WARN_ON_ONCE(!list_empty(&host->h_lockowners));
292 WARN_ON_ONCE(!list_empty(&host->h_granted));
293 WARN_ON_ONCE(!list_empty(&host->h_reclaim));
Chuck Lever8ea6ecc2010-12-14 15:05:52 +0000294
295 mutex_lock(&nlm_host_mutex);
296 nlm_destroy_host_locked(host);
297 mutex_unlock(&nlm_host_mutex);
298 }
Adrian Bunkc5856462006-12-06 20:38:29 -0800299}
300
Chuck Lever6bfbe8a2008-10-03 12:50:29 -0400301/**
302 * nlmsvc_lookup_host - Find an NLM host handle matching a remote client
303 * @rqstp: incoming NLM request
304 * @hostname: name of client host
305 * @hostname_len: length of client hostname
306 *
307 * Returns an nlm_host structure that matches the [client address,
308 * transport protocol, NLM version, client hostname] of the passed-in
309 * NLM request. If one doesn't already exist in the host cache, a
310 * new handle is created and returned.
311 *
312 * Before possibly creating a new nlm_host, construct a sockaddr
313 * for a specific source address in case the local system has
314 * multiple network addresses. The family of the address in
315 * rq_daddr is guaranteed to be the same as the family of the
316 * address in rq_addr, so it's safe to use the same family for
317 * the source address.
Adrian Bunkc5856462006-12-06 20:38:29 -0800318 */
Chuck Lever6bfbe8a2008-10-03 12:50:29 -0400319struct nlm_host *nlmsvc_lookup_host(const struct svc_rqst *rqstp,
320 const char *hostname,
321 const size_t hostname_len)
Adrian Bunkc5856462006-12-06 20:38:29 -0800322{
Chuck Lever67216b92010-12-14 15:06:12 +0000323 struct hlist_head *chain;
Chuck Lever67216b92010-12-14 15:06:12 +0000324 struct nlm_host *host = NULL;
325 struct nsm_handle *nsm = NULL;
Mi Jinlong849a1cf2011-08-30 17:18:41 +0800326 struct sockaddr *src_sap = svc_daddr(rqstp);
327 size_t src_len = rqstp->rq_daddrlen;
Stanislav Kinsbursky9695c702012-07-25 16:57:06 +0400328 struct net *net = SVC_NET(rqstp);
Chuck Lever7f1ed182008-10-03 12:50:07 -0400329 struct nlm_lookup_host_info ni = {
330 .server = 1,
Chuck Lever88541c82008-10-03 12:50:14 -0400331 .sap = svc_addr(rqstp),
332 .salen = rqstp->rq_addrlen,
Chuck Lever7f1ed182008-10-03 12:50:07 -0400333 .protocol = rqstp->rq_prot,
334 .version = rqstp->rq_vers,
335 .hostname = hostname,
336 .hostname_len = hostname_len,
Stanislav Kinsbursky66697bf2012-01-31 15:08:13 +0400337 .net = net,
Chuck Lever7f1ed182008-10-03 12:50:07 -0400338 };
Stanislav Kinsbursky3cf7fb02012-07-25 16:56:11 +0400339 struct lockd_net *ln = net_generic(net, lockd_net_id);
Frank van Maarseveenc98451b2007-07-09 22:25:29 +0200340
Chuck Lever7f1ed182008-10-03 12:50:07 -0400341 dprintk("lockd: %s(host='%*s', vers=%u, proto=%s)\n", __func__,
342 (int)hostname_len, hostname, rqstp->rq_vers,
343 (rqstp->rq_prot == IPPROTO_UDP ? "udp" : "tcp"));
344
Chuck Lever67216b92010-12-14 15:06:12 +0000345 mutex_lock(&nlm_host_mutex);
346
Stanislav Kinsbursky3cf7fb02012-07-25 16:56:11 +0400347 if (time_after_eq(jiffies, ln->next_gc))
Stanislav Kinsbursky27adadd2012-07-25 16:56:03 +0400348 nlm_gc_hosts(net);
Chuck Lever67216b92010-12-14 15:06:12 +0000349
Chuck Leverd2df0482010-12-14 15:06:22 +0000350 chain = &nlm_server_hosts[nlm_hash_address(ni.sap)];
Sasha Levinb67bfe02013-02-27 17:06:00 -0800351 hlist_for_each_entry(host, chain, h_hash) {
Stanislav Kinsbursky66697bf2012-01-31 15:08:13 +0400352 if (host->net != net)
353 continue;
Chuck Lever67216b92010-12-14 15:06:12 +0000354 if (!rpc_cmp_addr(nlm_addr(host), ni.sap))
355 continue;
356
357 /* Same address. Share an NSM handle if we already have one */
358 if (nsm == NULL)
359 nsm = host->h_nsmhandle;
360
361 if (host->h_proto != ni.protocol)
362 continue;
363 if (host->h_version != ni.version)
364 continue;
Chuck Lever79691832010-12-14 15:06:52 +0000365 if (!rpc_cmp_addr(nlm_srcaddr(host), src_sap))
Chuck Lever67216b92010-12-14 15:06:12 +0000366 continue;
367
368 /* Move to head of hash chain. */
369 hlist_del(&host->h_hash);
370 hlist_add_head(&host->h_hash, chain);
371
372 nlm_get_host(host);
373 dprintk("lockd: %s found host %s (%s)\n",
374 __func__, host->h_name, host->h_addrbuf);
375 goto out;
376 }
377
378 host = nlm_alloc_host(&ni, nsm);
379 if (unlikely(host == NULL))
380 goto out;
381
Chuck Lever79691832010-12-14 15:06:52 +0000382 memcpy(nlm_srcaddr(host), src_sap, src_len);
383 host->h_srcaddrlen = src_len;
Chuck Lever67216b92010-12-14 15:06:12 +0000384 hlist_add_head(&host->h_hash, chain);
Stanislav Kinsburskycaa4e762012-07-25 16:56:19 +0400385 ln->nrhosts++;
Chuck Lever67216b92010-12-14 15:06:12 +0000386 nrhosts++;
387
388 dprintk("lockd: %s created host %s (%s)\n",
389 __func__, host->h_name, host->h_addrbuf);
390
391out:
392 mutex_unlock(&nlm_host_mutex);
393 return host;
394}
395
396/**
397 * nlmsvc_release_host - release server nlm_host
398 * @host: nlm_host to release
399 *
400 * Host is destroyed later in nlm_gc_host().
401 */
402void nlmsvc_release_host(struct nlm_host *host)
403{
404 if (host == NULL)
405 return;
406
407 dprintk("lockd: release server host %s\n", host->h_name);
408
Trond Myklebusta2d30a52012-10-15 17:26:20 -0400409 WARN_ON_ONCE(!host->h_server);
Chuck Lever67216b92010-12-14 15:06:12 +0000410 atomic_dec(&host->h_count);
Adrian Bunkc5856462006-12-06 20:38:29 -0800411}
412
413/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700414 * Create the NLM RPC client for an NLM peer
415 */
416struct rpc_clnt *
417nlm_bind_host(struct nlm_host *host)
418{
419 struct rpc_clnt *clnt;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700420
Chuck Lever1df40b62008-12-04 14:19:53 -0500421 dprintk("lockd: nlm_bind_host %s (%s)\n",
422 host->h_name, host->h_addrbuf);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700423
424 /* Lock host handle */
Trond Myklebust50467912006-06-09 09:40:24 -0400425 mutex_lock(&host->h_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700426
427 /* If we've already created an RPC client, check whether
428 * RPC rebind is required
Linus Torvalds1da177e2005-04-16 15:20:36 -0700429 */
430 if ((clnt = host->h_rpcclnt) != NULL) {
Chuck Lever43118c22005-08-25 16:25:49 -0700431 if (time_after_eq(jiffies, host->h_nextrebind)) {
Chuck Lever35f5a422006-01-03 09:55:50 +0100432 rpc_force_rebind(clnt);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700433 host->h_nextrebind = jiffies + NLM_HOST_REBIND;
Chuck Lever1b333c52008-08-27 16:57:23 -0400434 dprintk("lockd: next rebind in %lu jiffies\n",
Linus Torvalds1da177e2005-04-16 15:20:36 -0700435 host->h_nextrebind - jiffies);
436 }
437 } else {
Trond Myklebust21051ba2007-05-14 16:50:44 -0400438 unsigned long increment = nlmsvc_timeout;
Chuck Levere1ec7892006-08-22 20:06:20 -0400439 struct rpc_timeout timeparms = {
440 .to_initval = increment,
441 .to_increment = increment,
442 .to_maxval = increment * 6UL,
443 .to_retries = 5U,
444 };
445 struct rpc_create_args args = {
Stanislav Kinsbursky66697bf2012-01-31 15:08:13 +0400446 .net = host->net,
Chuck Levere1ec7892006-08-22 20:06:20 -0400447 .protocol = host->h_proto,
Chuck Leverb4ed58f2008-09-03 14:35:39 -0400448 .address = nlm_addr(host),
449 .addrsize = host->h_addrlen,
Chuck Levere1ec7892006-08-22 20:06:20 -0400450 .timeout = &timeparms,
451 .servername = host->h_name,
452 .program = &nlm_program,
453 .version = host->h_version,
454 .authflavor = RPC_AUTH_UNIX,
Jeff Layton90bd17c2008-02-06 11:34:11 -0500455 .flags = (RPC_CLNT_CREATE_NOPING |
Chuck Levere1ec7892006-08-22 20:06:20 -0400456 RPC_CLNT_CREATE_AUTOBIND),
457 };
Linus Torvalds1da177e2005-04-16 15:20:36 -0700458
Jeff Layton90bd17c2008-02-06 11:34:11 -0500459 /*
460 * lockd retries server side blocks automatically so we want
461 * those to be soft RPC calls. Client side calls need to be
462 * hard RPC tasks.
463 */
464 if (!host->h_server)
465 args.flags |= RPC_CLNT_CREATE_HARDRTRY;
Chuck Lever0cb26592008-12-23 15:21:38 -0500466 if (host->h_noresvport)
467 args.flags |= RPC_CLNT_CREATE_NONPRIVPORT;
Trond Myklebust8e35f8e2010-11-02 09:11:55 -0400468 if (host->h_srcaddrlen)
469 args.saddress = nlm_srcaddr(host);
Jeff Layton90bd17c2008-02-06 11:34:11 -0500470
Chuck Levere1ec7892006-08-22 20:06:20 -0400471 clnt = rpc_create(&args);
472 if (!IS_ERR(clnt))
473 host->h_rpcclnt = clnt;
474 else {
475 printk("lockd: couldn't create RPC handle for %s\n", host->h_name);
476 clnt = NULL;
477 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700478 }
479
Trond Myklebust50467912006-06-09 09:40:24 -0400480 mutex_unlock(&host->h_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700481 return clnt;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700482}
483
484/*
485 * Force a portmap lookup of the remote lockd port
486 */
487void
488nlm_rebind_host(struct nlm_host *host)
489{
490 dprintk("lockd: rebind host %s\n", host->h_name);
491 if (host->h_rpcclnt && time_after_eq(jiffies, host->h_nextrebind)) {
Chuck Lever35f5a422006-01-03 09:55:50 +0100492 rpc_force_rebind(host->h_rpcclnt);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700493 host->h_nextrebind = jiffies + NLM_HOST_REBIND;
494 }
495}
496
497/*
498 * Increment NLM host count
499 */
500struct nlm_host * nlm_get_host(struct nlm_host *host)
501{
502 if (host) {
503 dprintk("lockd: get host %s\n", host->h_name);
504 atomic_inc(&host->h_count);
505 host->h_expires = jiffies + NLM_HOST_EXPIRE;
506 }
507 return host;
508}
509
J. Bruce Fieldsb10e30f2010-12-14 15:05:13 +0000510static struct nlm_host *next_host_state(struct hlist_head *cache,
511 struct nsm_handle *nsm,
512 const struct nlm_reboot *info)
513{
Chuck Lever80c30e82011-01-24 20:50:26 +0000514 struct nlm_host *host;
J. Bruce Fieldsb10e30f2010-12-14 15:05:13 +0000515 struct hlist_head *chain;
J. Bruce Fieldsb10e30f2010-12-14 15:05:13 +0000516
517 mutex_lock(&nlm_host_mutex);
Sasha Levinb67bfe02013-02-27 17:06:00 -0800518 for_each_host(host, chain, cache) {
J. Bruce Fieldsb10e30f2010-12-14 15:05:13 +0000519 if (host->h_nsmhandle == nsm
520 && host->h_nsmstate != info->state) {
521 host->h_nsmstate = info->state;
522 host->h_state++;
523
524 nlm_get_host(host);
Chuck Lever80c30e82011-01-24 20:50:26 +0000525 mutex_unlock(&nlm_host_mutex);
526 return host;
J. Bruce Fieldsb10e30f2010-12-14 15:05:13 +0000527 }
528 }
Chuck Lever80c30e82011-01-24 20:50:26 +0000529
J. Bruce Fieldsb10e30f2010-12-14 15:05:13 +0000530 mutex_unlock(&nlm_host_mutex);
Chuck Lever80c30e82011-01-24 20:50:26 +0000531 return NULL;
J. Bruce Fieldsb10e30f2010-12-14 15:05:13 +0000532}
533
Chuck Lever7fefc9c2008-12-05 19:03:31 -0500534/**
535 * nlm_host_rebooted - Release all resources held by rebooted host
536 * @info: pointer to decoded results of NLM_SM_NOTIFY call
537 *
538 * We were notified that the specified host has rebooted. Release
539 * all resources held by that peer.
Olaf Kirchcf712c22006-10-04 02:15:52 -0700540 */
Chuck Lever7fefc9c2008-12-05 19:03:31 -0500541void nlm_host_rebooted(const struct nlm_reboot *info)
Olaf Kirchcf712c22006-10-04 02:15:52 -0700542{
Olaf Kirch5c8dd292006-10-04 02:15:55 -0700543 struct nsm_handle *nsm;
Olaf Kirch0cea3272006-10-04 02:15:56 -0700544 struct nlm_host *host;
Olaf Kirchcf712c22006-10-04 02:15:52 -0700545
Chuck Lever8c7378f2008-12-05 19:03:54 -0500546 nsm = nsm_reboot_lookup(info);
547 if (unlikely(nsm == NULL))
Olaf Kirchdb4e4c92006-10-04 02:15:52 -0700548 return;
Olaf Kirch5c8dd292006-10-04 02:15:55 -0700549
550 /* Mark all hosts tied to this NSM state as having rebooted.
551 * We run the loop repeatedly, because we drop the host table
552 * lock for this.
553 * To avoid processing a host several times, we match the nsmstate.
554 */
Chuck Leverd2df0482010-12-14 15:06:22 +0000555 while ((host = next_host_state(nlm_server_hosts, nsm, info)) != NULL) {
Chuck Lever8ea6ecc2010-12-14 15:05:52 +0000556 nlmsvc_free_host_resources(host);
Chuck Lever67216b92010-12-14 15:06:12 +0000557 nlmsvc_release_host(host);
Olaf Kirchcf712c22006-10-04 02:15:52 -0700558 }
Chuck Lever8ea6ecc2010-12-14 15:05:52 +0000559 while ((host = next_host_state(nlm_client_hosts, nsm, info)) != NULL) {
560 nlmclnt_recovery(host);
561 nlmclnt_release_host(host);
562 }
563
Jeff Laytoncdd30fa2010-02-05 15:09:12 -0500564 nsm_release(nsm);
Olaf Kirchcf712c22006-10-04 02:15:52 -0700565}
566
Stanislav Kinsburskyd5850ff2012-07-25 16:56:27 +0400567static void nlm_complain_hosts(struct net *net)
568{
569 struct hlist_head *chain;
Stanislav Kinsburskyd5850ff2012-07-25 16:56:27 +0400570 struct nlm_host *host;
571
572 if (net) {
573 struct lockd_net *ln = net_generic(net, lockd_net_id);
574
575 if (ln->nrhosts == 0)
576 return;
577 printk(KERN_WARNING "lockd: couldn't shutdown host module for net %p!\n", net);
578 dprintk("lockd: %lu hosts left in net %p:\n", ln->nrhosts, net);
579 } else {
580 if (nrhosts == 0)
581 return;
582 printk(KERN_WARNING "lockd: couldn't shutdown host module!\n");
583 dprintk("lockd: %lu hosts left:\n", nrhosts);
584 }
585
Sasha Levinb67bfe02013-02-27 17:06:00 -0800586 for_each_host(host, chain, nlm_server_hosts) {
Stanislav Kinsburskyd5850ff2012-07-25 16:56:27 +0400587 if (net && host->net != net)
588 continue;
589 dprintk(" %s (cnt %d use %d exp %ld net %p)\n",
590 host->h_name, atomic_read(&host->h_count),
591 host->h_inuse, host->h_expires, host->net);
592 }
593}
594
Linus Torvalds1da177e2005-04-16 15:20:36 -0700595void
Stanislav Kinsbursky3b647392012-01-31 15:08:29 +0400596nlm_shutdown_hosts_net(struct net *net)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700597{
Olaf Kirch0cea3272006-10-04 02:15:56 -0700598 struct hlist_head *chain;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700599 struct nlm_host *host;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700600
Ingo Molnar353ab6e2006-03-26 01:37:12 -0800601 mutex_lock(&nlm_host_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700602
603 /* First, make all hosts eligible for gc */
Stanislav Kinsburskye2edaa92012-07-25 16:56:35 +0400604 dprintk("lockd: nuking all hosts in net %p...\n", net);
Sasha Levinb67bfe02013-02-27 17:06:00 -0800605 for_each_host(host, chain, nlm_server_hosts) {
Stanislav Kinsbursky3b647392012-01-31 15:08:29 +0400606 if (net && host->net != net)
607 continue;
J. Bruce Fieldsb1137462010-12-14 15:05:03 +0000608 host->h_expires = jiffies - 1;
609 if (host->h_rpcclnt) {
610 rpc_shutdown_client(host->h_rpcclnt);
611 host->h_rpcclnt = NULL;
Jeff Laytond801b862008-01-29 10:30:55 -0500612 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700613 }
614
615 /* Then, perform a garbage collection pass */
Stanislav Kinsbursky27adadd2012-07-25 16:56:03 +0400616 nlm_gc_hosts(net);
Ingo Molnar353ab6e2006-03-26 01:37:12 -0800617 mutex_unlock(&nlm_host_mutex);
Stanislav Kinsburskycaa4e762012-07-25 16:56:19 +0400618
Stanislav Kinsburskyd5850ff2012-07-25 16:56:27 +0400619 nlm_complain_hosts(net);
Stanislav Kinsbursky3b647392012-01-31 15:08:29 +0400620}
621
622/*
623 * Shut down the hosts module.
624 * Note that this routine is called only at server shutdown time.
625 */
626void
627nlm_shutdown_hosts(void)
628{
Stanislav Kinsburskye2edaa92012-07-25 16:56:35 +0400629 dprintk("lockd: shutting down host module\n");
Stanislav Kinsbursky3b647392012-01-31 15:08:29 +0400630 nlm_shutdown_hosts_net(NULL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700631}
632
633/*
634 * Garbage collect any unused NLM hosts.
635 * This GC combines reference counting for async operations with
636 * mark & sweep for resources held by remote clients.
637 */
638static void
Stanislav Kinsbursky27adadd2012-07-25 16:56:03 +0400639nlm_gc_hosts(struct net *net)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700640{
Olaf Kirch0cea3272006-10-04 02:15:56 -0700641 struct hlist_head *chain;
Sasha Levinb67bfe02013-02-27 17:06:00 -0800642 struct hlist_node *next;
Olaf Kirch0cea3272006-10-04 02:15:56 -0700643 struct nlm_host *host;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700644
Stanislav Kinsbursky27adadd2012-07-25 16:56:03 +0400645 dprintk("lockd: host garbage collection for net %p\n", net);
Sasha Levinb67bfe02013-02-27 17:06:00 -0800646 for_each_host(host, chain, nlm_server_hosts) {
Stanislav Kinsbursky27adadd2012-07-25 16:56:03 +0400647 if (net && host->net != net)
648 continue;
J. Bruce Fieldsb1137462010-12-14 15:05:03 +0000649 host->h_inuse = 0;
Stanislav Kinsbursky27adadd2012-07-25 16:56:03 +0400650 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700651
652 /* Mark all hosts that hold locks, blocks or shares */
Stanislav Kinsburskyb26411f2012-07-25 16:55:54 +0400653 nlmsvc_mark_resources(net);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700654
Sasha Levinb67bfe02013-02-27 17:06:00 -0800655 for_each_host_safe(host, next, chain, nlm_server_hosts) {
Stanislav Kinsbursky27adadd2012-07-25 16:56:03 +0400656 if (net && host->net != net)
657 continue;
J. Bruce Fieldsb1137462010-12-14 15:05:03 +0000658 if (atomic_read(&host->h_count) || host->h_inuse
659 || time_before(jiffies, host->h_expires)) {
660 dprintk("nlm_gc_hosts skipping %s "
Stanislav Kinsbursky27adadd2012-07-25 16:56:03 +0400661 "(cnt %d use %d exp %ld net %p)\n",
J. Bruce Fieldsb1137462010-12-14 15:05:03 +0000662 host->h_name, atomic_read(&host->h_count),
Stanislav Kinsbursky27adadd2012-07-25 16:56:03 +0400663 host->h_inuse, host->h_expires, host->net);
J. Bruce Fieldsb1137462010-12-14 15:05:03 +0000664 continue;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700665 }
Chuck Lever723bb5b2010-12-14 15:05:33 +0000666 nlm_destroy_host_locked(host);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700667 }
668
Stanislav Kinsbursky3cf7fb02012-07-25 16:56:11 +0400669 if (net) {
670 struct lockd_net *ln = net_generic(net, lockd_net_id);
671
672 ln->next_gc = jiffies + NLM_HOST_COLLECT;
673 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700674}