mirror of
				https://git.proxmox.com/git/mirror_zfs
				synced 2025-11-01 09:24:29 +00:00 
			
		
		
		
	 93ce2b4ca5
			
		
	
	
		93ce2b4ca5
		
	
	
	
	
		
			
			Minimal changes required to integrate the SPL sources in to the
ZFS repository build infrastructure and packaging.
Build system and packaging:
  * Renamed SPL_* autoconf m4 macros to ZFS_*.
  * Removed redundant SPL_* autoconf m4 macros.
  * Updated the RPM spec files to remove SPL package dependency.
  * The zfs package obsoletes the spl package, and the zfs-kmod
    package obsoletes the spl-kmod package.
  * The zfs-kmod-devel* packages were updated to add compatibility
    symlinks under /usr/src/spl-x.y.z until all dependent packages
    can be updated.  They will be removed in a future release.
  * Updated copy-builtin script for in-kernel builds.
  * Updated DKMS package to include the spl.ko.
  * Updated stale AUTHORS file to include all contributors.
  * Updated stale COPYRIGHT and included the SPL as an exception.
  * Renamed README.markdown to README.md
  * Renamed OPENSOLARIS.LICENSE to LICENSE.
  * Renamed DISCLAIMER to NOTICE.
Required code changes:
  * Removed redundant HAVE_SPL macro.
  * Removed _BOOT from nvpairs since it doesn't apply for Linux.
  * Initial header cleanup (removal of empty headers, refactoring).
  * Remove SPL repository clone/build from zimport.sh.
  * Use of DEFINE_RATELIMIT_STATE and DEFINE_SPINLOCK removed due
    to build issues when forcing C99 compilation.
  * Replaced legacy ACCESS_ONCE with READ_ONCE.
  * Include needed headers for `current` and `EXPORT_SYMBOL`.
Reviewed-by: Tony Hutter <hutter2@llnl.gov>
Reviewed-by: Olaf Faaland <faaland1@llnl.gov>
Reviewed-by: Matthew Ahrens <mahrens@delphix.com>
Reviewed-by: Pavel Zakharov <pavel.zakharov@delphix.com>
Signed-off-by: Brian Behlendorf <behlendorf1@llnl.gov>
TEST_ZIMPORT_SKIP="yes"
Closes #7556
		
	
			
		
			
				
	
	
		
			128 lines
		
	
	
		
			3.6 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			128 lines
		
	
	
		
			3.6 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * CDDL HEADER START
 | |
|  *
 | |
|  * The contents of this file are subject to the terms of the
 | |
|  * Common Development and Distribution License (the "License").
 | |
|  * You may not use this file except in compliance with the License.
 | |
|  *
 | |
|  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
 | |
|  * or http://www.opensolaris.org/os/licensing.
 | |
|  * See the License for the specific language governing permissions
 | |
|  * and limitations under the License.
 | |
|  *
 | |
|  * When distributing Covered Code, include this CDDL HEADER in each
 | |
|  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
 | |
|  * If applicable, add the following below this CDDL HEADER, with the
 | |
|  * fields enclosed by brackets "[]" replaced with your own identifying
 | |
|  * information: Portions Copyright [yyyy] [name of copyright owner]
 | |
|  *
 | |
|  * CDDL HEADER END
 | |
|  */
 | |
| /*
 | |
|  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
 | |
|  * Use is subject to license terms.
 | |
|  */
 | |
| 
 | |
| #include <sys/zfs_context.h>
 | |
| #include <sys/crypto/common.h>
 | |
| #include <sys/crypto/api.h>
 | |
| #include <sys/crypto/impl.h>
 | |
| #include <sys/crypto/sched_impl.h>
 | |
| 
 | |
| /*
 | |
|  * All event subscribers are put on a list. kcf_notify_list_lock
 | |
|  * protects changes to this list.
 | |
|  *
 | |
|  * The following locking order is maintained in the code - The
 | |
|  * global kcf_notify_list_lock followed by the individual lock
 | |
|  * in a kcf_ntfy_elem structure (kn_lock).
 | |
|  */
 | |
| kmutex_t		ntfy_list_lock;
 | |
| kcondvar_t		ntfy_list_cv;   /* cv the service thread waits on */
 | |
| static kcf_ntfy_elem_t *ntfy_list_head;
 | |
| 
 | |
| /*
 | |
|  * crypto_mech2id()
 | |
|  *
 | |
|  * Arguments:
 | |
|  *	. mechname: A null-terminated string identifying the mechanism name.
 | |
|  *
 | |
|  * Description:
 | |
|  *	Walks the mechanisms tables, looking for an entry that matches the
 | |
|  *	mechname. Once it find it, it builds the 64-bit mech_type and returns
 | |
|  *	it.  If there are no hardware or software providers for the mechanism,
 | |
|  *	but there is an unloaded software provider, this routine will attempt
 | |
|  *	to load it.
 | |
|  *
 | |
|  * Context:
 | |
|  *	Process and interruption.
 | |
|  *
 | |
|  * Returns:
 | |
|  *	The unique mechanism identified by 'mechname', if found.
 | |
|  *	CRYPTO_MECH_INVALID otherwise.
 | |
|  */
 | |
| crypto_mech_type_t
 | |
| crypto_mech2id(char *mechname)
 | |
| {
 | |
| 	return (crypto_mech2id_common(mechname, B_TRUE));
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * We walk the notification list and do the callbacks.
 | |
|  */
 | |
| void
 | |
| kcf_walk_ntfylist(uint32_t event, void *event_arg)
 | |
| {
 | |
| 	kcf_ntfy_elem_t *nep;
 | |
| 	int nelem = 0;
 | |
| 
 | |
| 	mutex_enter(&ntfy_list_lock);
 | |
| 
 | |
| 	/*
 | |
| 	 * Count how many clients are on the notification list. We need
 | |
| 	 * this count to ensure that clients which joined the list after we
 | |
| 	 * have started this walk, are not wrongly notified.
 | |
| 	 */
 | |
| 	for (nep = ntfy_list_head; nep != NULL; nep = nep->kn_next)
 | |
| 		nelem++;
 | |
| 
 | |
| 	for (nep = ntfy_list_head; (nep != NULL && nelem); nep = nep->kn_next) {
 | |
| 		nelem--;
 | |
| 
 | |
| 		/*
 | |
| 		 * Check if this client is interested in the
 | |
| 		 * event.
 | |
| 		 */
 | |
| 		if (!(nep->kn_event_mask & event))
 | |
| 			continue;
 | |
| 
 | |
| 		mutex_enter(&nep->kn_lock);
 | |
| 		nep->kn_state = NTFY_RUNNING;
 | |
| 		mutex_exit(&nep->kn_lock);
 | |
| 		mutex_exit(&ntfy_list_lock);
 | |
| 
 | |
| 		/*
 | |
| 		 * We invoke the callback routine with no locks held. Another
 | |
| 		 * client could have joined the list meanwhile. This is fine
 | |
| 		 * as we maintain nelem as stated above. The NULL check in the
 | |
| 		 * for loop guards against shrinkage. Also, any callers of
 | |
| 		 * crypto_unnotify_events() at this point cv_wait till kn_state
 | |
| 		 * changes to NTFY_WAITING. Hence, nep is assured to be valid.
 | |
| 		 */
 | |
| 		(*nep->kn_func)(event, event_arg);
 | |
| 
 | |
| 		mutex_enter(&nep->kn_lock);
 | |
| 		nep->kn_state = NTFY_WAITING;
 | |
| 		cv_broadcast(&nep->kn_cv);
 | |
| 		mutex_exit(&nep->kn_lock);
 | |
| 
 | |
| 		mutex_enter(&ntfy_list_lock);
 | |
| 	}
 | |
| 
 | |
| 	mutex_exit(&ntfy_list_lock);
 | |
| }
 | |
| 
 | |
| #if defined(_KERNEL)
 | |
| EXPORT_SYMBOL(crypto_mech2id);
 | |
| #endif
 |