#
AC_DEFUN([LC_CONFIG_SRCDIR], [
AC_CONFIG_SRCDIR([lustre/obdclass/obdo.c])
-libcfs_is_module="yes"
ldiskfs_is_ext4="yes"
])
[], [enable_pinger="yes"])
AC_MSG_RESULT([$enable_pinger])
AS_IF([test "x$enable_pinger" != xno],
- [AC_DEFINE(ENABLE_PINGER, 1,[Use the Pinger])])
+ [AC_DEFINE(CONFIG_LUSTRE_FS_PINGER, 1,[Use the Pinger])])
]) # LC_CONFIG_PINGER
#
]) # LC_KIOCB_KI_LEFT
#
-# LC_INIT_LIST_HEAD_RCU
-#
-# 3.12 added INIT_LIST_HEAD_RCU in commit 2a855b644c310d5db5
-# which is unfortunately an inline function and not a macro
-# that can be tested directly, so it needs a configure check.
-#
-AC_DEFUN([LC_INIT_LIST_HEAD_RCU], [
-LB_CHECK_COMPILE([if 'INIT_LIST_HEAD_RCU' exists],
-init_list_head_rcu, [
- #include <linux/list.h>
- #include <linux/rculist.h>
-],[
- struct list_head list;
- INIT_LIST_HEAD_RCU(&list);
-],[
- AC_DEFINE(HAVE_INIT_LIST_HEAD_RCU, 1,
- [INIT_LIST_HEAD_RCU exists])
-])
-]) # LC_INIT_LIST_HEAD_RCU
-
-#
# LC_VFS_RENAME_5ARGS
#
# 3.13 has vfs_rename with 5 args
]) # LC_BI_BDEV
#
+# LC_IS_ENCRYPTED
+#
+# 4.14 introduced IS_ENCRYPTED and S_ENCRYPTED
+#
+AC_DEFUN([LC_IS_ENCRYPTED], [
+LB_CHECK_COMPILE([if IS_ENCRYPTED is defined],
+is_encrypted, [
+ #include <linux/fs.h>
+],[
+ IS_ENCRYPTED((struct inode *)0);
+],[
+ has_is_encrypted="yes"
+])
+]) # LC_IS_ENCRYPTED
+
+#
# LC_I_PAGES
#
# kernel 4.17 commit b93b016313b3ba8003c3b8bb71f569af91f19fc7
]) # LC_INODE_TIMESPEC64
#
-# LC_XA_IS_VALUE
-# kernel 4.19-rc6 commit 3159f943aafdbacb2f94c38fdaadabf2bbde2a14
-# xarray: Replace exceptional entries
-# adds xa_is_value
-#
-AC_DEFUN([LC_XA_IS_VALUE], [
-LB_CHECK_COMPILE([xa_is_value exist],
-xa_is_value, [
- #include <linux/xarray.h>
-],[
- xa_is_value(NULL);
-],[
- AC_DEFINE(HAVE_XA_IS_VALUE, 1, [xa_is_value exist])
-])
-]) # LC_XA_IS_VALUE
-
-#
# LC___XA_SET_MARK
#
# kernel 4.20 commit v4.19-rc5-248-g9b89a0355144
-# xarray: Add XArray marks
+# xarray: Add XArray marks - replaced radix_tree_tag_set
#
AC_DEFUN([LC___XA_SET_MARK], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
LB_CHECK_COMPILE([if '__xa_set_mark' exists],
__xa_set_mark, [
- #include <linux/xarray.h>
#include <linux/fs.h>
+ #include <linux/radix-tree.h>
],[
- struct xarray *xa = NULL;
-
- __xa_set_mark(xa, 0, PAGECACHE_TAG_DIRTY);
+ radix_tree_tag_set(NULL, 0, PAGECACHE_TAG_DIRTY);
],[
- AC_DEFINE(HAVE___XA_SET_MARK, 1,
+ AC_DEFINE(HAVE_RADIX_TREE_TAG_SET, 1,
[__xa_set_mark exists])
])
+EXTRA_KCFLAGS="$tmp_flags"
]) # LC___XA_SET_MARK
#
]) # LC_HAS_LINUX_SELINUX_ENABLED
#
+# LB_HAVE_BVEC_ITER_ALL
+#
+# kernel 5.1 commit 6dc4f100c175dd0511ae8674786e7c9006cdfbfa
+# block: allow bio_for_each_segment_all() to iterate over multi-page bvec
+#
+AC_DEFUN([LB_HAVE_BVEC_ITER_ALL], [
+tmp_flags="$EXTRA_KCFLAGS"
+EXTRA_KCFLAGS="-Werror"
+LB_CHECK_COMPILE([if bvec_iter_all exists for multi-page bvec iternation],
+ext4fs_dirhash, [
+ #include <linux/bvec.h>
+],[
+ struct bvec_iter_all iter;
+ (void)iter;
+],[
+ AC_DEFINE(HAVE_BVEC_ITER_ALL, 1,
+ [if bvec_iter_all exists for multi-page bvec iternation])
+])
+EXTRA_KCFLAGS="$tmp_flags"
+]) # LB_HAVE_BVEC_ITER_ALL
+
+#
# LC_ACCOUNT_PAGE_DIRTIED
#
# After 5.2 kernel page dirtied is not exported
]) # LC_ACCOUNT_PAGE_DIRTIED
#
+# LC_KEYRING_SEARCH_4ARGS
+#
+# Kernel 5.2 commit dcf49dbc8077
+# keys: Add a 'recurse' flag for keyring searches
+#
+AC_DEFUN([LC_KEYRING_SEARCH_4ARGS], [
+LB_CHECK_COMPILE([if 'keyring_search' has 4 args],
+keyring_search_4args, [
+ #include <linux/key.h>
+],[
+ key_ref_t keyring;
+ keyring_search(keyring, NULL, NULL, false);
+],[
+ AC_DEFINE(HAVE_KEYRING_SEARCH_4ARGS, 1,
+ [keyring_search has 4 args])
+])
+]) # LC_KEYRING_SEARCH_4ARGS
+
+#
# LC_BIO_BI_PHYS_SEGMENTS
#
# kernel 5.3-rc1 commit 14ccb66b3f585b2bc21e7256c96090abed5a512c
]) # LC_LM_COMPARE_OWNER_EXISTS
#
+# LC_FSCRYPT_SUPPORT
+#
+# 5.4 introduced fscrypt encryption policies v2
+#
+AC_DEFUN([LC_FSCRYPT_SUPPORT], [
+LB_CHECK_COMPILE([for fscrypt in-kernel support],
+fscrypt_support, [
+ #define __FS_HAS_ENCRYPTION 0
+ #include <linux/fscrypt.h>
+],[
+ fscrypt_ioctl_get_policy_ex(NULL, NULL);
+],[
+ has_fscrypt_support="yes"
+])
+]) # LC_FSCRYPT_SUPPORT
+
+#
# LC_PROG_LINUX
#
# Lustre linux kernel checks
LC_OLDSIZE_TRUNCATE_PAGECACHE
LC_PTR_ERR_OR_ZERO_MISSING
LC_KIOCB_KI_LEFT
- LC_INIT_LIST_HEAD_RCU
# 3.13
LC_VFS_RENAME_5ARGS
# 4.18
LC_INODE_TIMESPEC64
- LC_XA_IS_VALUE
# 4.20
LC___XA_SET_MARK
LC_UAPI_LINUX_MOUNT_H
LC_HAVE_SUNRPC_CACHE_HASH_LOCK_IS_A_SPINLOCK
- LC_REPLACE_EXCEPTIONAL_ENTRIES
# 5.1
LC_HAS_LINUX_SELINUX_ENABLED
+ LB_HAVE_BVEC_ITER_ALL
# 5.2
LC_ACCOUNT_PAGE_DIRTIED
+ LC_KEYRING_SEARCH_4ARGS
# 5.3
LC_BIO_BI_PHYS_SEGMENTS
]) # LC_OSD_ADDON
#
+# LC_CONFIG_CRYPTO
+#
+# Check whether to enable Lustre client crypto
+#
+AC_DEFUN([LC_CONFIG_CRYPTO], [
+AC_MSG_CHECKING([whether to enable Lustre client crypto])
+AC_ARG_ENABLE([crypto],
+ AC_HELP_STRING([--enable-crypto],
+ [enable Lustre client crypto]),
+ [], [enable_crypto="auto"])
+AS_IF([test "x$enable_crypto" != xno -a "x$enable_dist" = xno], [
+ AC_MSG_RESULT(
+ )
+ LC_IS_ENCRYPTED
+ LC_FSCRYPT_SUPPORT])
+AS_IF([test "x$has_fscrypt_support" = xyes], [
+ AC_DEFINE(HAVE_LUSTRE_CRYPTO, 1, [Enable Lustre client crypto via in-kernel fscrypt])
+ enable_crypto=yes],
+ [AS_IF([test "x$has_is_encrypted" = xyes], [
+ AC_DEFINE(HAVE_LUSTRE_CRYPTO, 1, [Enable Lustre client crypto via embedded llcrypt])
+ AC_DEFINE(CONFIG_LL_ENCRYPTION, 1, [embedded llcrypt])
+ enable_crypto=yes
+ enable_llcrypt=yes], [
+ AS_IF([test "x$enable_crypto" = xyes],
+ [AC_MSG_ERROR([Lustre client crypto cannot be enabled because of lack of encryption support in your kernel.])])
+ AS_IF([test "x$enable_crypto" != xno -a "x$enable_dist" = xno],
+ [AC_MSG_WARN(Lustre client crypto cannot be enabled because of lack of encryption support in your kernel.)])
+ enable_crypto=no])])
+AS_IF([test "x$enable_dist" != xno], [
+ enable_crypto=yes
+ enable_llcrypt=yes])
+AC_MSG_RESULT([$enable_crypto])
+]) # LC_CONFIG_CRYPTO
+
+#
# LC_CONFIGURE
#
# other configure checks
])
])
+# lustre/tests/statx_test.c
+AC_CHECK_FUNCS([statx])
+
# lustre/utils/lfs.c
AS_IF([test "$enable_dist" = "no"], [
AC_CHECK_LIB([z], [crc32], [
AM_CONDITIONAL(XATTR_HANDLER, test "x$lb_cv_compile_xattr_handler_flags" = xyes)
AM_CONDITIONAL(SELINUX, test "$SELINUX" = "-lselinux")
AM_CONDITIONAL(GETSEPOL, test x$enable_getsepol = xyes)
+AM_CONDITIONAL(LLCRYPT, test x$enable_llcrypt = xyes)
]) # LC_CONDITIONALS
#
lustre/include/uapi/linux/lustre/Makefile
lustre/kernel_patches/targets/4.18-rhel8.1.target
lustre/kernel_patches/targets/4.18-rhel8.target
+lustre/kernel_patches/targets/3.10-rhel7.8.target
lustre/kernel_patches/targets/3.10-rhel7.7.target
lustre/kernel_patches/targets/3.10-rhel7.6.target
lustre/kernel_patches/targets/3.10-rhel7.5.target