2 * linux/fs/lockd/host.c
4 * Management for NLM peer hosts. The nlm_host struct is shared
5 * between client and server implementation. The only reason to
6 * do so is to reduce code bloat.
8 * Copyright (C) 1996, Olaf Kirch <okir@monad.swb.de>
11 #include <linux/types.h>
12 #include <linux/slab.h>
14 #include <linux/in6.h>
15 #include <linux/sunrpc/clnt.h>
16 #include <linux/sunrpc/svc.h>
17 #include <linux/lockd/lockd.h>
18 #include <linux/mutex.h>
22 #define NLMDBG_FACILITY NLMDBG_HOSTCACHE
23 #define NLM_HOST_NRHASH 32
24 #define NLM_HOST_REBIND (60 * HZ)
25 #define NLM_HOST_EXPIRE (300 * HZ)
26 #define NLM_HOST_COLLECT (120 * HZ)
28 static struct hlist_head nlm_hosts[NLM_HOST_NRHASH];
29 static unsigned long next_gc;
31 static DEFINE_MUTEX(nlm_host_mutex);
33 static void nlm_gc_hosts(void);
35 struct nlm_lookup_host_info {
36 const int server; /* search for server|client */
37 const struct sockaddr *sap; /* address to search for */
38 const size_t salen; /* it's length */
39 const unsigned short protocol; /* transport to search for*/
40 const u32 version; /* NLM version to search for */
41 const char *hostname; /* remote's hostname */
42 const size_t hostname_len; /* it's length */
43 const struct sockaddr *src_sap; /* our address (optional) */
44 const size_t src_len; /* it's length */
45 const int noresvport; /* use non-priv port */
49 * Hash function must work well on big- and little-endian platforms
51 static unsigned int __nlm_hash32(const __be32 n)
53 unsigned int hash = (__force u32)n ^ ((__force u32)n >> 16);
54 return hash ^ (hash >> 8);
57 static unsigned int __nlm_hash_addr4(const struct sockaddr *sap)
59 const struct sockaddr_in *sin = (struct sockaddr_in *)sap;
60 return __nlm_hash32(sin->sin_addr.s_addr);
63 static unsigned int __nlm_hash_addr6(const struct sockaddr *sap)
65 const struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap;
66 const struct in6_addr addr = sin6->sin6_addr;
67 return __nlm_hash32(addr.s6_addr32[0]) ^
68 __nlm_hash32(addr.s6_addr32[1]) ^
69 __nlm_hash32(addr.s6_addr32[2]) ^
70 __nlm_hash32(addr.s6_addr32[3]);
73 static unsigned int nlm_hash_address(const struct sockaddr *sap)
77 switch (sap->sa_family) {
79 hash = __nlm_hash_addr4(sap);
82 hash = __nlm_hash_addr6(sap);
87 return hash & (NLM_HOST_NRHASH - 1);
90 static void nlm_clear_port(struct sockaddr *sap)
92 switch (sap->sa_family) {
94 ((struct sockaddr_in *)sap)->sin_port = 0;
97 ((struct sockaddr_in6 *)sap)->sin6_port = 0;
103 * Common host lookup routine for server & client
105 static struct nlm_host *nlm_lookup_host(struct nlm_lookup_host_info *ni)
107 struct hlist_head *chain;
108 struct hlist_node *pos;
109 struct nlm_host *host;
110 struct nsm_handle *nsm = NULL;
112 mutex_lock(&nlm_host_mutex);
114 if (time_after_eq(jiffies, next_gc))
117 /* We may keep several nlm_host objects for a peer, because each
118 * nlm_host is identified by
119 * (address, protocol, version, server/client)
120 * We could probably simplify this a little by putting all those
121 * different NLM rpc_clients into one single nlm_host object.
122 * This would allow us to have one nlm_host per address.
124 chain = &nlm_hosts[nlm_hash_address(ni->sap)];
125 hlist_for_each_entry(host, pos, chain, h_hash) {
126 if (!nlm_cmp_addr(nlm_addr(host), ni->sap))
129 /* See if we have an NSM handle for this client */
131 nsm = host->h_nsmhandle;
133 if (host->h_proto != ni->protocol)
135 if (host->h_version != ni->version)
137 if (host->h_server != ni->server)
140 !nlm_cmp_addr(nlm_srcaddr(host), ni->src_sap))
143 /* Move to head of hash chain. */
144 hlist_del(&host->h_hash);
145 hlist_add_head(&host->h_hash, chain);
148 dprintk("lockd: nlm_lookup_host found host %s (%s)\n",
149 host->h_name, host->h_addrbuf);
154 * The host wasn't in our hash table. If we don't
155 * have an NSM handle for it yet, create one.
158 atomic_inc(&nsm->sm_count);
161 nsm = nsm_get_handle(ni->sap, ni->salen,
162 ni->hostname, ni->hostname_len);
164 dprintk("lockd: nlm_lookup_host failed; "
170 host = kzalloc(sizeof(*host), GFP_KERNEL);
173 dprintk("lockd: nlm_lookup_host failed; no memory\n");
176 host->h_name = nsm->sm_name;
177 host->h_addrbuf = nsm->sm_addrbuf;
178 memcpy(nlm_addr(host), ni->sap, ni->salen);
179 host->h_addrlen = ni->salen;
180 nlm_clear_port(nlm_addr(host));
181 memcpy(nlm_srcaddr(host), ni->src_sap, ni->src_len);
182 host->h_version = ni->version;
183 host->h_proto = ni->protocol;
184 host->h_rpcclnt = NULL;
185 mutex_init(&host->h_mutex);
186 host->h_nextrebind = jiffies + NLM_HOST_REBIND;
187 host->h_expires = jiffies + NLM_HOST_EXPIRE;
188 atomic_set(&host->h_count, 1);
189 init_waitqueue_head(&host->h_gracewait);
190 init_rwsem(&host->h_rwsem);
191 host->h_state = 0; /* pseudo NSM state */
192 host->h_nsmstate = 0; /* real NSM state */
193 host->h_nsmhandle = nsm;
194 host->h_server = ni->server;
195 host->h_noresvport = ni->noresvport;
196 hlist_add_head(&host->h_hash, chain);
197 INIT_LIST_HEAD(&host->h_lockowners);
198 spin_lock_init(&host->h_lock);
199 INIT_LIST_HEAD(&host->h_granted);
200 INIT_LIST_HEAD(&host->h_reclaim);
204 dprintk("lockd: nlm_lookup_host created host %s\n",
208 mutex_unlock(&nlm_host_mutex);
216 nlm_destroy_host(struct nlm_host *host)
218 struct rpc_clnt *clnt;
220 BUG_ON(!list_empty(&host->h_lockowners));
221 BUG_ON(atomic_read(&host->h_count));
224 nsm_release(host->h_nsmhandle);
226 clnt = host->h_rpcclnt;
228 rpc_shutdown_client(clnt);
233 * nlmclnt_lookup_host - Find an NLM host handle matching a remote server
234 * @sap: network address of server
235 * @salen: length of server address
236 * @protocol: transport protocol to use
237 * @version: NLM protocol version
238 * @hostname: '\0'-terminated hostname of server
239 * @noresvport: 1 if non-privileged port should be used
241 * Returns an nlm_host structure that matches the passed-in
242 * [server address, transport protocol, NLM version, server hostname].
243 * If one doesn't already exist in the host cache, a new handle is
244 * created and returned.
246 struct nlm_host *nlmclnt_lookup_host(const struct sockaddr *sap,
248 const unsigned short protocol,
250 const char *hostname,
253 const struct sockaddr source = {
254 .sa_family = AF_UNSPEC,
256 struct nlm_lookup_host_info ni = {
260 .protocol = protocol,
262 .hostname = hostname,
263 .hostname_len = strlen(hostname),
265 .src_len = sizeof(source),
266 .noresvport = noresvport,
269 dprintk("lockd: %s(host='%s', vers=%u, proto=%s)\n", __func__,
270 (hostname ? hostname : "<none>"), version,
271 (protocol == IPPROTO_UDP ? "udp" : "tcp"));
273 return nlm_lookup_host(&ni);
277 * nlmsvc_lookup_host - Find an NLM host handle matching a remote client
278 * @rqstp: incoming NLM request
279 * @hostname: name of client host
280 * @hostname_len: length of client hostname
282 * Returns an nlm_host structure that matches the [client address,
283 * transport protocol, NLM version, client hostname] of the passed-in
284 * NLM request. If one doesn't already exist in the host cache, a
285 * new handle is created and returned.
287 * Before possibly creating a new nlm_host, construct a sockaddr
288 * for a specific source address in case the local system has
289 * multiple network addresses. The family of the address in
290 * rq_daddr is guaranteed to be the same as the family of the
291 * address in rq_addr, so it's safe to use the same family for
292 * the source address.
294 struct nlm_host *nlmsvc_lookup_host(const struct svc_rqst *rqstp,
295 const char *hostname,
296 const size_t hostname_len)
298 struct sockaddr_in sin = {
299 .sin_family = AF_INET,
301 struct sockaddr_in6 sin6 = {
302 .sin6_family = AF_INET6,
304 struct nlm_lookup_host_info ni = {
306 .sap = svc_addr(rqstp),
307 .salen = rqstp->rq_addrlen,
308 .protocol = rqstp->rq_prot,
309 .version = rqstp->rq_vers,
310 .hostname = hostname,
311 .hostname_len = hostname_len,
312 .src_len = rqstp->rq_addrlen,
315 dprintk("lockd: %s(host='%*s', vers=%u, proto=%s)\n", __func__,
316 (int)hostname_len, hostname, rqstp->rq_vers,
317 (rqstp->rq_prot == IPPROTO_UDP ? "udp" : "tcp"));
319 switch (ni.sap->sa_family) {
321 sin.sin_addr.s_addr = rqstp->rq_daddr.addr.s_addr;
322 ni.src_sap = (struct sockaddr *)&sin;
325 ipv6_addr_copy(&sin6.sin6_addr, &rqstp->rq_daddr.addr6);
326 ni.src_sap = (struct sockaddr *)&sin6;
332 return nlm_lookup_host(&ni);
336 * Create the NLM RPC client for an NLM peer
339 nlm_bind_host(struct nlm_host *host)
341 struct rpc_clnt *clnt;
343 dprintk("lockd: nlm_bind_host %s (%s)\n",
344 host->h_name, host->h_addrbuf);
346 /* Lock host handle */
347 mutex_lock(&host->h_mutex);
349 /* If we've already created an RPC client, check whether
350 * RPC rebind is required
352 if ((clnt = host->h_rpcclnt) != NULL) {
353 if (time_after_eq(jiffies, host->h_nextrebind)) {
354 rpc_force_rebind(clnt);
355 host->h_nextrebind = jiffies + NLM_HOST_REBIND;
356 dprintk("lockd: next rebind in %lu jiffies\n",
357 host->h_nextrebind - jiffies);
360 unsigned long increment = nlmsvc_timeout;
361 struct rpc_timeout timeparms = {
362 .to_initval = increment,
363 .to_increment = increment,
364 .to_maxval = increment * 6UL,
367 struct rpc_create_args args = {
368 .protocol = host->h_proto,
369 .address = nlm_addr(host),
370 .addrsize = host->h_addrlen,
371 .saddress = nlm_srcaddr(host),
372 .timeout = &timeparms,
373 .servername = host->h_name,
374 .program = &nlm_program,
375 .version = host->h_version,
376 .authflavor = RPC_AUTH_UNIX,
377 .flags = (RPC_CLNT_CREATE_NOPING |
378 RPC_CLNT_CREATE_AUTOBIND),
382 * lockd retries server side blocks automatically so we want
383 * those to be soft RPC calls. Client side calls need to be
387 args.flags |= RPC_CLNT_CREATE_HARDRTRY;
388 if (host->h_noresvport)
389 args.flags |= RPC_CLNT_CREATE_NONPRIVPORT;
391 clnt = rpc_create(&args);
393 host->h_rpcclnt = clnt;
395 printk("lockd: couldn't create RPC handle for %s\n", host->h_name);
400 mutex_unlock(&host->h_mutex);
405 * Force a portmap lookup of the remote lockd port
408 nlm_rebind_host(struct nlm_host *host)
410 dprintk("lockd: rebind host %s\n", host->h_name);
411 if (host->h_rpcclnt && time_after_eq(jiffies, host->h_nextrebind)) {
412 rpc_force_rebind(host->h_rpcclnt);
413 host->h_nextrebind = jiffies + NLM_HOST_REBIND;
418 * Increment NLM host count
420 struct nlm_host * nlm_get_host(struct nlm_host *host)
423 dprintk("lockd: get host %s\n", host->h_name);
424 atomic_inc(&host->h_count);
425 host->h_expires = jiffies + NLM_HOST_EXPIRE;
431 * Release NLM host after use
433 void nlm_release_host(struct nlm_host *host)
436 dprintk("lockd: release host %s\n", host->h_name);
437 BUG_ON(atomic_read(&host->h_count) < 0);
438 if (atomic_dec_and_test(&host->h_count)) {
439 BUG_ON(!list_empty(&host->h_lockowners));
440 BUG_ON(!list_empty(&host->h_granted));
441 BUG_ON(!list_empty(&host->h_reclaim));
447 * nlm_host_rebooted - Release all resources held by rebooted host
448 * @info: pointer to decoded results of NLM_SM_NOTIFY call
450 * We were notified that the specified host has rebooted. Release
451 * all resources held by that peer.
453 void nlm_host_rebooted(const struct nlm_reboot *info)
455 struct hlist_head *chain;
456 struct hlist_node *pos;
457 struct nsm_handle *nsm;
458 struct nlm_host *host;
460 nsm = nsm_reboot_lookup(info);
461 if (unlikely(nsm == NULL))
464 /* Mark all hosts tied to this NSM state as having rebooted.
465 * We run the loop repeatedly, because we drop the host table
467 * To avoid processing a host several times, we match the nsmstate.
469 again: mutex_lock(&nlm_host_mutex);
470 for (chain = nlm_hosts; chain < nlm_hosts + NLM_HOST_NRHASH; ++chain) {
471 hlist_for_each_entry(host, pos, chain, h_hash) {
472 if (host->h_nsmhandle == nsm
473 && host->h_nsmstate != info->state) {
474 host->h_nsmstate = info->state;
478 mutex_unlock(&nlm_host_mutex);
480 if (host->h_server) {
481 /* We're server for this guy, just ditch
482 * all the locks he held. */
483 nlmsvc_free_host_resources(host);
485 /* He's the server, initiate lock recovery. */
486 nlmclnt_recovery(host);
489 nlm_release_host(host);
495 mutex_unlock(&nlm_host_mutex);
499 * Shut down the hosts module.
500 * Note that this routine is called only at server shutdown time.
503 nlm_shutdown_hosts(void)
505 struct hlist_head *chain;
506 struct hlist_node *pos;
507 struct nlm_host *host;
509 dprintk("lockd: shutting down host module\n");
510 mutex_lock(&nlm_host_mutex);
512 /* First, make all hosts eligible for gc */
513 dprintk("lockd: nuking all hosts...\n");
514 for (chain = nlm_hosts; chain < nlm_hosts + NLM_HOST_NRHASH; ++chain) {
515 hlist_for_each_entry(host, pos, chain, h_hash) {
516 host->h_expires = jiffies - 1;
517 if (host->h_rpcclnt) {
518 rpc_shutdown_client(host->h_rpcclnt);
519 host->h_rpcclnt = NULL;
524 /* Then, perform a garbage collection pass */
526 mutex_unlock(&nlm_host_mutex);
528 /* complain if any hosts are left */
530 printk(KERN_WARNING "lockd: couldn't shutdown host module!\n");
531 dprintk("lockd: %d hosts left:\n", nrhosts);
532 for (chain = nlm_hosts; chain < nlm_hosts + NLM_HOST_NRHASH; ++chain) {
533 hlist_for_each_entry(host, pos, chain, h_hash) {
534 dprintk(" %s (cnt %d use %d exp %ld)\n",
535 host->h_name, atomic_read(&host->h_count),
536 host->h_inuse, host->h_expires);
543 * Garbage collect any unused NLM hosts.
544 * This GC combines reference counting for async operations with
545 * mark & sweep for resources held by remote clients.
550 struct hlist_head *chain;
551 struct hlist_node *pos, *next;
552 struct nlm_host *host;
554 dprintk("lockd: host garbage collection\n");
555 for (chain = nlm_hosts; chain < nlm_hosts + NLM_HOST_NRHASH; ++chain) {
556 hlist_for_each_entry(host, pos, chain, h_hash)
560 /* Mark all hosts that hold locks, blocks or shares */
561 nlmsvc_mark_resources();
563 for (chain = nlm_hosts; chain < nlm_hosts + NLM_HOST_NRHASH; ++chain) {
564 hlist_for_each_entry_safe(host, pos, next, chain, h_hash) {
565 if (atomic_read(&host->h_count) || host->h_inuse
566 || time_before(jiffies, host->h_expires)) {
567 dprintk("nlm_gc_hosts skipping %s (cnt %d use %d exp %ld)\n",
568 host->h_name, atomic_read(&host->h_count),
569 host->h_inuse, host->h_expires);
572 dprintk("lockd: delete host %s\n", host->h_name);
573 hlist_del_init(&host->h_hash);
575 nlm_destroy_host(host);
580 next_gc = jiffies + NLM_HOST_COLLECT;