]) # LC_EXPORT_TRUNCATE_COMPLETE_PAGE
#
-# LC_CAPA_CRYPTO
-#
-AC_DEFUN([LC_CAPA_CRYPTO], [
-LB_CHECK_CONFIG_IM([CRYPTO], [],
- [AC_MSG_ERROR([Lustre capability require that CONFIG_CRYPTO is enabled in your kernel.])])
-LB_CHECK_CONFIG_IM([CRYPTO_HMAC], [],
- [AC_MSG_ERROR([Lustre capability require that CONFIG_CRYPTO_HMAC is enabled in your kernel.])])
-LB_CHECK_CONFIG_IM([CRYPTO_SHA1], [],
- [AC_MSG_ERROR([Lustre capability require that CONFIG_CRYPTO_SHA1 is enabled in your kernel.])])
-]) # LC_CAPA_CRYPTO
-
-#
# LC_CONFIG_RMTCLIENT
#
dnl FIXME
]) # LC_CONFIG_GSS_KEYRING
#
+# LC_HAVE_CRED_TGCRED
+#
+# rhel7 struct cred has no member tgcred
+#
+AC_DEFUN([LC_HAVE_CRED_TGCRED], [
+LB_CHECK_COMPILE([if 'struct cred' has member 'tgcred'],
+cred_tgcred, [
+ #include <linux/cred.h>
+],[
+ ((struct cred *)0)->tgcred = NULL;
+],[
+ AC_DEFINE(HAVE_CRED_TGCRED, 1,
+ [struct cred has member tgcred])
+])
+]) # LC_HAVE_CRED_TGCRED
+
+#
+# LC_KEY_TYPE_INSTANTIATE_2ARGS
+#
+# rhel7 key_type->instantiate takes 2 args (struct key, struct key_preparsed_payload)
+#
+AC_DEFUN([LC_KEY_TYPE_INSTANTIATE_2ARGS], [
+LB_CHECK_COMPILE([if 'key_type->instantiate' has two args],
+key_type_instantiate_2args, [
+ #include <linux/key-type.h>
+],[
+ ((struct key_type *)0)->instantiate(0, NULL);
+],[
+ AC_DEFINE(HAVE_KEY_TYPE_INSTANTIATE_2ARGS, 1,
+ [key_type->instantiate has two args])
+])
+]) # LC_KEY_TYPE_INSTANTIATE_2ARGS
+
+#
# LC_CONFIG_SUNRPC
#
AC_DEFUN([LC_CONFIG_SUNRPC], [
AS_IF([test "x$enable_gss" != xno], [
LC_CONFIG_GSS_KEYRING
+ LC_HAVE_CRED_TGCRED
+ LC_KEY_TYPE_INSTANTIATE_2ARGS
sunrpc_required=$enable_gss
LC_CONFIG_SUNRPC
sunrpc_required="no"
require_krb5="no"
AS_IF([test -n "$KRBDIR"], [
- AC_CHECK_LIB([gssapi], [gss_export_lucid_sec_context], [
- GSSAPI_LIBS="$GSSAPI_LDFLAGS -lgssapi"
- gss_conf_test="success"
- ], [
- AC_CHECK_LIB([gssglue], [gss_export_lucid_sec_context], [
- GSSAPI_LIBS="$GSSAPI_LDFLAGS -lgssglue"
- gss_conf_test="success"
- ], [
- AS_IF([test "x$enable_gss" = xyes], [
- AC_MSG_ERROR([
-
-libgssapi or libgssglue is not found, which is required by GSS.
-])
- ], [
- AC_MSG_WARN([
-
-libgssapi or libgssglue is not found, which is required by GSS.
-])
- ])
- ])
- ])
- AC_SUBST(GSSAPI_LIBS)
+ gss_conf_test="success"
+ ], [
+ AC_MSG_WARN([not found!])
+ gss_conf_test="failure"
])
AS_IF([test "x$gss_conf_test" = xsuccess], [
AC_DEFINE([HAVE_GSS], [1], [Define this is if you enable gss])
enable_gss="yes"
+ ], [
+ enable_gss="no"
])
])
]) # LC_CONFIG_GSS
]) # LC_HAVE_PROTECT_I_NLINK
#
+# 2.6.39 security_inode_init_security takes a 'struct qstr' parameter
+#
+# 3.2 security_inode_init_security takes a callback to set xattrs
+#
+AC_DEFUN([LC_HAVE_SECURITY_IINITSEC], [
+LB_CHECK_COMPILE([if security_inode_init_security takes a callback],
+security_inode_init_security_callback, [
+ #include <linux/security.h>
+],[
+ security_inode_init_security(NULL, NULL, NULL, (const initxattrs)NULL, NULL);
+],[
+ AC_DEFINE(HAVE_SECURITY_IINITSEC_CALLBACK, 1,
+ [security_inode_init_security takes a callback to set xattrs])
+],[
+ LB_CHECK_COMPILE([if security_inode_init_security takes a 'struct qstr' parameter],
+ security_inode_init_security_qstr, [
+ #include <linux/security.h>
+ ],[
+ security_inode_init_security(NULL, NULL, (struct qstr *)NULL, NULL, NULL, NULL);
+ ],[
+ AC_DEFINE(HAVE_SECURITY_IINITSEC_QSTR, 1,
+ [security_inode_init_security takes a 'struct qstr' parameter])
+ ])
+])
+]) # LC_HAVE_SECURITY_IINITSEC
+
+#
# LC_HAVE_MIGRATE_HEADER
#
# 3.3 introduces migrate_mode.h and migratepage has 4 args
]) # LC_DIRECTIO_USE_ITER
#
+# LC_HAVE_IOV_ITER_INIT_DIRECTION
+#
+#
+# 3.16 linux commit 71d8e532b1549a478e6a6a8a44f309d050294d00
+# changed iov_iter_init api to start accepting a tag
+# that defines if its a read or write operation
+#
+AC_DEFUN([LC_HAVE_IOV_ITER_INIT_DIRECTION], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if 'iov_iter_init' takes a tag],
+iter_init, [
+ #include <linux/uio.h>
+ #include <linux/fs.h>
+],[
+ const struct iovec *iov = NULL;
+
+ iov_iter_init(NULL, READ, iov, 1, 0);
+],[
+ AC_DEFINE(HAVE_IOV_ITER_INIT_DIRECTION, 1,
+ [iov_iter_init handles directional tag])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LC_HAVE_IOV_ITER_INIT_DIRECTION
+
+#
+# LC_HAVE_FILE_OPERATIONS_READ_WRITE_ITER
+#
+# 3.16 introduces [read|write]_iter to struct file_operations
+#
+AC_DEFUN([LC_HAVE_FILE_OPERATIONS_READ_WRITE_ITER], [
+LB_CHECK_COMPILE([if 'file_operations.[read|write]_iter' exist],
+file_function_iter, [
+ #include <linux/fs.h>
+],[
+ ((struct file_operations *)NULL)->read_iter(NULL, NULL);
+ ((struct file_operations *)NULL)->write_iter(NULL, NULL);
+],[
+ AC_DEFINE(HAVE_FILE_OPERATIONS_READ_WRITE_ITER, 1,
+ [file_operations.[read|write]_iter functions exist])
+])
+]) # LC_HAVE_FILE_OPERATIONS_READ_WRITE_ITER
+
+#
+# LC_KEY_MATCH_DATA
+#
+# 3.17 replaces key_type::match with match_preparse
+# and has new struct key_match_data
+#
+AC_DEFUN([LC_KEY_MATCH_DATA], [
+LB_CHECK_COMPILE([if struct key_match field exist],
+key_match, [
+ #include <linux/key-type.h>
+],[
+ struct key_match_data data;
+],[
+ AC_DEFINE(HAVE_KEY_MATCH_DATA, 1,
+ [struct key_match_data exist])
+])
+]) # LC_KEY_MATCH_DATA
+
+#
+# LC_NFS_FILLDIR_USE_CTX
+#
+# 3.18 kernel moved from void cookie to struct dir_context
+#
+AC_DEFUN([LC_NFS_FILLDIR_USE_CTX], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if filldir_t uses struct dir_context],
+filldir_ctx, [
+ #include <linux/fs.h>
+],[
+ int filldir(struct dir_context *ctx, const char* name,
+ int i, loff_t off, u64 tmp, unsigned temp)
+ {
+ return 0;
+ }
+
+ struct dir_context ctx = {
+ .actor = filldir,
+ };
+
+ ctx.actor(NULL, "test", 0, (loff_t) 0, 0, 0);
+],[
+ AC_DEFINE(HAVE_FILLDIR_USE_CTX, 1,
+ [filldir_t needs struct dir_context as argument])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LC_NFS_FILLDIR_USE_CTX
+
+#
+# LC_KIOCB_HAS_NBYTES
+#
+# 3.19 kernel removed ki_nbytes from struct kiocb
+#
+AC_DEFUN([LC_KIOCB_HAS_NBYTES], [
+LB_CHECK_COMPILE([if struct kiocb has ki_nbytes field],
+ki_nbytes, [
+ #include <linux/fs.h>
+],[
+ struct kiocb iocb;
+
+ iocb.ki_nbytes = 0;
+],[
+ AC_DEFINE(HAVE_KI_NBYTES, 1, [ki_nbytes field exist])
+])
+]) # LC_KIOCB_HAS_NBYTES
+
+#
+# LC_CANCEL_DIRTY_PAGE
+#
+# 4.0.0 kernel removed cancle_dirty_page
+#
+AC_DEFUN([LC_CANCEL_DIRTY_PAGE], [
+LB_CHECK_COMPILE([if cancel_dirty_page still exist],
+cancel_dirty_page, [
+ #include <linux/mm.h>
+],[
+ cancel_dirty_page(NULL, PAGE_SIZE);
+],[
+ AC_DEFINE(HAVE_CANCEL_DIRTY_PAGE, 1,
+ [cancel_dirty_page is still available])
+])
+]) # LC_CANCEL_DIRTY_PAGE
+
+#
# LC_IOV_ITER_RW
#
# 4.1 kernel has iov_iter_rw
LC_LLITE_LLOOP_MODULE
LC_GLIBC_SUPPORT_FHANDLES
- LC_CAPA_CRYPTO
LC_CONFIG_RMTCLIENT
LC_CONFIG_GSS
LC_HAVE_FSTYPE_MOUNT
LC_IOP_TRUNCATE
LC_HAVE_INODE_OWNER_OR_CAPABLE
+ LC_HAVE_SECURITY_IINITSEC
# 3.0
LC_DIRTY_INODE_WITH_FLAG
# 3.16
LC_DIRECTIO_USE_ITER
+ LC_HAVE_IOV_ITER_INIT_DIRECTION
+ LC_HAVE_FILE_OPERATIONS_READ_WRITE_ITER
+
+ # 3.17
+ LC_KEY_MATCH_DATA
+
+ # 3.18
+ LC_NFS_FILLDIR_USE_CTX
+
+ # 3.19
+ LC_KIOCB_HAS_NBYTES
+
+ # 4.0.0
+ LC_CANCEL_DIRTY_PAGE
# 4.1.0
LC_IOV_ITER_RW
LC_CONFIG_OBD_BUFFER_SIZE
AS_IF([test $target_cpu == "i686" -o $target_cpu == "x86_64"],
- [CFLAGS="$CFLAGS -Werror"])
+ [CFLAGS="$CFLAGS -Wall -Werror"])
# maximum MDS thread count
LC_MDS_MAX_THREADS
lustre/kernel_patches/targets/2.6-sles11.target
lustre/kernel_patches/targets/3.0-sles11.target
lustre/kernel_patches/targets/3.0-sles11sp3.target
+lustre/kernel_patches/targets/3.12-sles12.target
lustre/kernel_patches/targets/2.6-fc11.target
lustre/kernel_patches/targets/2.6-fc12.target
lustre/kernel_patches/targets/2.6-fc15.target