blob: c5f6812ca06a9628ee3ad5559b7a12cf4c81d25e [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * net/sunrpc/rpc_pipe.c
3 *
4 * Userland/kernel interface for rpcauth_gss.
5 * Code shamelessly plagiarized from fs/nfsd/nfsctl.c
Rolf Eike Beerd51fe1b2005-09-02 08:59:25 +02006 * and fs/sysfs/inode.c
Linus Torvalds1da177e2005-04-16 15:20:36 -07007 *
8 * Copyright (c) 2002, Trond Myklebust <trond.myklebust@fys.uio.no>
9 *
10 */
Linus Torvalds1da177e2005-04-16 15:20:36 -070011#include <linux/module.h>
12#include <linux/slab.h>
13#include <linux/string.h>
14#include <linux/pagemap.h>
15#include <linux/mount.h>
16#include <linux/namei.h>
Trond Myklebust50e437d2007-06-07 22:44:34 -040017#include <linux/fsnotify.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070018#include <linux/kernel.h>
Trond Myklebust2446ab62012-03-01 17:00:56 -050019#include <linux/rcupdate.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070020
21#include <asm/ioctls.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070022#include <linux/poll.h>
23#include <linux/wait.h>
24#include <linux/seq_file.h>
25
26#include <linux/sunrpc/clnt.h>
27#include <linux/workqueue.h>
28#include <linux/sunrpc/rpc_pipe_fs.h>
Trond Myklebust8854e822009-08-09 15:14:30 -040029#include <linux/sunrpc/cache.h>
Stanislav Kinsbursky021c68d2011-12-26 15:39:04 +030030#include <linux/nsproxy.h>
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +030031#include <linux/notifier.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070032
Stanislav Kinsbursky021c68d2011-12-26 15:39:04 +030033#include "netns.h"
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +030034#include "sunrpc.h"
Linus Torvalds1da177e2005-04-16 15:20:36 -070035
Stanislav Kinsburskyefc46bf2011-12-26 15:39:47 +030036#define RPCDBG_FACILITY RPCDBG_DEBUG
37
38#define NET_NAME(net) ((net == &init_net) ? " (init_net)" : "")
Linus Torvalds1da177e2005-04-16 15:20:36 -070039
40static struct file_system_type rpc_pipe_fs_type;
41
42
Christoph Lametere18b8902006-12-06 20:33:20 -080043static struct kmem_cache *rpc_inode_cachep __read_mostly;
Linus Torvalds1da177e2005-04-16 15:20:36 -070044
45#define RPC_UPCALL_TIMEOUT (30*HZ)
46
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +030047static BLOCKING_NOTIFIER_HEAD(rpc_pipefs_notifier_list);
48
49int rpc_pipefs_notifier_register(struct notifier_block *nb)
50{
51 return blocking_notifier_chain_cond_register(&rpc_pipefs_notifier_list, nb);
52}
53EXPORT_SYMBOL_GPL(rpc_pipefs_notifier_register);
54
55void rpc_pipefs_notifier_unregister(struct notifier_block *nb)
56{
57 blocking_notifier_chain_unregister(&rpc_pipefs_notifier_list, nb);
58}
59EXPORT_SYMBOL_GPL(rpc_pipefs_notifier_unregister);
60
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +040061static void rpc_purge_list(wait_queue_head_t *waitq, struct list_head *head,
Trond Myklebust9842ef32006-02-01 12:18:44 -050062 void (*destroy_msg)(struct rpc_pipe_msg *), int err)
Trond Myklebustb3eb67a2005-11-25 17:10:11 -050063{
64 struct rpc_pipe_msg *msg;
Trond Myklebustb3eb67a2005-11-25 17:10:11 -050065
Trond Myklebust9842ef32006-02-01 12:18:44 -050066 if (list_empty(head))
67 return;
68 do {
Trond Myklebustb3eb67a2005-11-25 17:10:11 -050069 msg = list_entry(head->next, struct rpc_pipe_msg, list);
Trond Myklebust5a676572010-09-12 19:55:25 -040070 list_del_init(&msg->list);
Trond Myklebustb3eb67a2005-11-25 17:10:11 -050071 msg->errno = err;
72 destroy_msg(msg);
Trond Myklebust9842ef32006-02-01 12:18:44 -050073 } while (!list_empty(head));
Jeff Layton92123e02012-06-11 10:03:42 -040074
75 if (waitq)
76 wake_up(waitq);
Linus Torvalds1da177e2005-04-16 15:20:36 -070077}
78
79static void
David Howells65f27f32006-11-22 14:55:48 +000080rpc_timeout_upcall_queue(struct work_struct *work)
Linus Torvalds1da177e2005-04-16 15:20:36 -070081{
Trond Myklebust9842ef32006-02-01 12:18:44 -050082 LIST_HEAD(free_list);
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +030083 struct rpc_pipe *pipe =
84 container_of(work, struct rpc_pipe, queue_timeout.work);
Trond Myklebust9842ef32006-02-01 12:18:44 -050085 void (*destroy_msg)(struct rpc_pipe_msg *);
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +040086 struct dentry *dentry;
Linus Torvalds1da177e2005-04-16 15:20:36 -070087
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +030088 spin_lock(&pipe->lock);
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +030089 destroy_msg = pipe->ops->destroy_msg;
90 if (pipe->nreaders == 0) {
91 list_splice_init(&pipe->pipe, &free_list);
92 pipe->pipelen = 0;
Trond Myklebust9842ef32006-02-01 12:18:44 -050093 }
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +040094 dentry = dget(pipe->dentry);
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +030095 spin_unlock(&pipe->lock);
Jeff Layton92123e02012-06-11 10:03:42 -040096 rpc_purge_list(dentry ? &RPC_I(dentry->d_inode)->waitq : NULL,
97 &free_list, destroy_msg, -ETIMEDOUT);
98 dput(dentry);
Linus Torvalds1da177e2005-04-16 15:20:36 -070099}
100
Peng Taoc1225152011-09-22 21:50:10 -0400101ssize_t rpc_pipe_generic_upcall(struct file *filp, struct rpc_pipe_msg *msg,
102 char __user *dst, size_t buflen)
103{
104 char *data = (char *)msg->data + msg->copied;
105 size_t mlen = min(msg->len - msg->copied, buflen);
106 unsigned long left;
107
108 left = copy_to_user(dst, data, mlen);
109 if (left == mlen) {
110 msg->errno = -EFAULT;
111 return -EFAULT;
112 }
113
114 mlen -= left;
115 msg->copied += mlen;
116 msg->errno = 0;
117 return mlen;
118}
119EXPORT_SYMBOL_GPL(rpc_pipe_generic_upcall);
120
J. Bruce Fields93a44a72007-11-06 13:06:03 -0500121/**
Ben Hutchings1a5778a2010-02-14 22:35:47 -0800122 * rpc_queue_upcall - queue an upcall message to userspace
Randy Dunlapbda14602012-05-13 10:35:40 -0700123 * @pipe: upcall pipe on which to queue given message
J. Bruce Fields93a44a72007-11-06 13:06:03 -0500124 * @msg: message to queue
125 *
126 * Call with an @inode created by rpc_mkpipe() to queue an upcall.
127 * A userspace process may then later read the upcall by performing a
128 * read on an open file for this inode. It is up to the caller to
129 * initialize the fields of @msg (other than @msg->list) appropriately.
130 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700131int
Stanislav Kinsburskyd706ed12011-12-26 15:43:49 +0300132rpc_queue_upcall(struct rpc_pipe *pipe, struct rpc_pipe_msg *msg)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700133{
Trond Myklebust6070fe62005-10-27 22:12:46 -0400134 int res = -EPIPE;
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400135 struct dentry *dentry;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700136
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300137 spin_lock(&pipe->lock);
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300138 if (pipe->nreaders) {
139 list_add_tail(&msg->list, &pipe->pipe);
140 pipe->pipelen += msg->len;
Trond Myklebust6070fe62005-10-27 22:12:46 -0400141 res = 0;
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300142 } else if (pipe->flags & RPC_PIPE_WAIT_FOR_OPEN) {
143 if (list_empty(&pipe->pipe))
Trond Myklebust24c5d9d2006-03-20 13:44:08 -0500144 queue_delayed_work(rpciod_workqueue,
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300145 &pipe->queue_timeout,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700146 RPC_UPCALL_TIMEOUT);
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300147 list_add_tail(&msg->list, &pipe->pipe);
148 pipe->pipelen += msg->len;
Trond Myklebust6070fe62005-10-27 22:12:46 -0400149 res = 0;
150 }
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400151 dentry = dget(pipe->dentry);
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300152 spin_unlock(&pipe->lock);
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400153 if (dentry) {
154 wake_up(&RPC_I(dentry->d_inode)->waitq);
155 dput(dentry);
156 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700157 return res;
158}
Trond Myklebust468039e2008-12-23 15:21:31 -0500159EXPORT_SYMBOL_GPL(rpc_queue_upcall);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700160
Trond Myklebust6070fe62005-10-27 22:12:46 -0400161static inline void
162rpc_inode_setowner(struct inode *inode, void *private)
163{
164 RPC_I(inode)->private = private;
165}
166
Linus Torvalds1da177e2005-04-16 15:20:36 -0700167static void
168rpc_close_pipes(struct inode *inode)
169{
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300170 struct rpc_pipe *pipe = RPC_I(inode)->pipe;
\"J. Bruce Fields\e7128042008-12-23 16:09:47 -0500171 int need_release;
Stanislav Kinsburskyad6b1342012-01-10 16:12:38 +0400172 LIST_HEAD(free_list);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700173
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800174 mutex_lock(&inode->i_mutex);
Stanislav Kinsburskyad6b1342012-01-10 16:12:38 +0400175 spin_lock(&pipe->lock);
176 need_release = pipe->nreaders != 0 || pipe->nwriters != 0;
177 pipe->nreaders = 0;
178 list_splice_init(&pipe->in_upcall, &free_list);
179 list_splice_init(&pipe->pipe, &free_list);
180 pipe->pipelen = 0;
181 pipe->dentry = NULL;
182 spin_unlock(&pipe->lock);
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400183 rpc_purge_list(&RPC_I(inode)->waitq, &free_list, pipe->ops->destroy_msg, -EPIPE);
Stanislav Kinsburskyad6b1342012-01-10 16:12:38 +0400184 pipe->nwriters = 0;
185 if (need_release && pipe->ops->release_pipe)
186 pipe->ops->release_pipe(inode);
187 cancel_delayed_work_sync(&pipe->queue_timeout);
Trond Myklebust6070fe62005-10-27 22:12:46 -0400188 rpc_inode_setowner(inode, NULL);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400189 RPC_I(inode)->pipe = NULL;
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800190 mutex_unlock(&inode->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700191}
192
Linus Torvalds1da177e2005-04-16 15:20:36 -0700193static struct inode *
194rpc_alloc_inode(struct super_block *sb)
195{
196 struct rpc_inode *rpci;
Christoph Lametere94b1762006-12-06 20:33:17 -0800197 rpci = (struct rpc_inode *)kmem_cache_alloc(rpc_inode_cachep, GFP_KERNEL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700198 if (!rpci)
199 return NULL;
200 return &rpci->vfs_inode;
201}
202
203static void
Nick Pigginfa0d7e3d2011-01-07 17:49:49 +1100204rpc_i_callback(struct rcu_head *head)
205{
206 struct inode *inode = container_of(head, struct inode, i_rcu);
Nick Pigginfa0d7e3d2011-01-07 17:49:49 +1100207 kmem_cache_free(rpc_inode_cachep, RPC_I(inode));
208}
209
210static void
Linus Torvalds1da177e2005-04-16 15:20:36 -0700211rpc_destroy_inode(struct inode *inode)
212{
Nick Pigginfa0d7e3d2011-01-07 17:49:49 +1100213 call_rcu(&inode->i_rcu, rpc_i_callback);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700214}
215
216static int
217rpc_pipe_open(struct inode *inode, struct file *filp)
218{
Trond Myklebustabfdbd52013-05-15 11:28:54 -0700219 struct net *net = inode->i_sb->s_fs_info;
220 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400221 struct rpc_pipe *pipe;
\"J. Bruce Fields\c3810602008-12-23 16:08:32 -0500222 int first_open;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700223 int res = -ENXIO;
224
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800225 mutex_lock(&inode->i_mutex);
Trond Myklebustabfdbd52013-05-15 11:28:54 -0700226 sn->gssd_running = 1;
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400227 pipe = RPC_I(inode)->pipe;
228 if (pipe == NULL)
\"J. Bruce Fields\c3810602008-12-23 16:08:32 -0500229 goto out;
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300230 first_open = pipe->nreaders == 0 && pipe->nwriters == 0;
231 if (first_open && pipe->ops->open_pipe) {
232 res = pipe->ops->open_pipe(inode);
\"J. Bruce Fields\c3810602008-12-23 16:08:32 -0500233 if (res)
234 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700235 }
\"J. Bruce Fields\c3810602008-12-23 16:08:32 -0500236 if (filp->f_mode & FMODE_READ)
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300237 pipe->nreaders++;
\"J. Bruce Fields\c3810602008-12-23 16:08:32 -0500238 if (filp->f_mode & FMODE_WRITE)
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300239 pipe->nwriters++;
\"J. Bruce Fields\c3810602008-12-23 16:08:32 -0500240 res = 0;
241out:
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800242 mutex_unlock(&inode->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700243 return res;
244}
245
246static int
247rpc_pipe_release(struct inode *inode, struct file *filp)
248{
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400249 struct rpc_pipe *pipe;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700250 struct rpc_pipe_msg *msg;
\"J. Bruce Fields\e7128042008-12-23 16:09:47 -0500251 int last_close;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700252
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800253 mutex_lock(&inode->i_mutex);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400254 pipe = RPC_I(inode)->pipe;
255 if (pipe == NULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700256 goto out;
Joe Perches655b5bb2010-09-04 18:52:53 -0700257 msg = filp->private_data;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700258 if (msg != NULL) {
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300259 spin_lock(&pipe->lock);
Trond Myklebust48e49182005-12-19 17:11:22 -0500260 msg->errno = -EAGAIN;
Trond Myklebust5a676572010-09-12 19:55:25 -0400261 list_del_init(&msg->list);
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300262 spin_unlock(&pipe->lock);
263 pipe->ops->destroy_msg(msg);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700264 }
265 if (filp->f_mode & FMODE_WRITE)
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300266 pipe->nwriters --;
Trond Myklebust9842ef32006-02-01 12:18:44 -0500267 if (filp->f_mode & FMODE_READ) {
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300268 pipe->nreaders --;
269 if (pipe->nreaders == 0) {
Trond Myklebust9842ef32006-02-01 12:18:44 -0500270 LIST_HEAD(free_list);
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300271 spin_lock(&pipe->lock);
272 list_splice_init(&pipe->pipe, &free_list);
273 pipe->pipelen = 0;
274 spin_unlock(&pipe->lock);
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400275 rpc_purge_list(&RPC_I(inode)->waitq, &free_list,
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300276 pipe->ops->destroy_msg, -EAGAIN);
Trond Myklebust9842ef32006-02-01 12:18:44 -0500277 }
278 }
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300279 last_close = pipe->nwriters == 0 && pipe->nreaders == 0;
280 if (last_close && pipe->ops->release_pipe)
281 pipe->ops->release_pipe(inode);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700282out:
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800283 mutex_unlock(&inode->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700284 return 0;
285}
286
287static ssize_t
288rpc_pipe_read(struct file *filp, char __user *buf, size_t len, loff_t *offset)
289{
Al Viro496ad9a2013-01-23 17:07:38 -0500290 struct inode *inode = file_inode(filp);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400291 struct rpc_pipe *pipe;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700292 struct rpc_pipe_msg *msg;
293 int res = 0;
294
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800295 mutex_lock(&inode->i_mutex);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400296 pipe = RPC_I(inode)->pipe;
297 if (pipe == NULL) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700298 res = -EPIPE;
299 goto out_unlock;
300 }
301 msg = filp->private_data;
302 if (msg == NULL) {
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300303 spin_lock(&pipe->lock);
304 if (!list_empty(&pipe->pipe)) {
305 msg = list_entry(pipe->pipe.next,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700306 struct rpc_pipe_msg,
307 list);
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300308 list_move(&msg->list, &pipe->in_upcall);
309 pipe->pipelen -= msg->len;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700310 filp->private_data = msg;
311 msg->copied = 0;
312 }
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300313 spin_unlock(&pipe->lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700314 if (msg == NULL)
315 goto out_unlock;
316 }
317 /* NOTE: it is up to the callback to update msg->copied */
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300318 res = pipe->ops->upcall(filp, msg, buf, len);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700319 if (res < 0 || msg->len == msg->copied) {
320 filp->private_data = NULL;
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300321 spin_lock(&pipe->lock);
Trond Myklebust5a676572010-09-12 19:55:25 -0400322 list_del_init(&msg->list);
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300323 spin_unlock(&pipe->lock);
324 pipe->ops->destroy_msg(msg);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700325 }
326out_unlock:
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800327 mutex_unlock(&inode->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700328 return res;
329}
330
331static ssize_t
332rpc_pipe_write(struct file *filp, const char __user *buf, size_t len, loff_t *offset)
333{
Al Viro496ad9a2013-01-23 17:07:38 -0500334 struct inode *inode = file_inode(filp);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700335 int res;
336
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800337 mutex_lock(&inode->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700338 res = -EPIPE;
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400339 if (RPC_I(inode)->pipe != NULL)
340 res = RPC_I(inode)->pipe->ops->downcall(filp, buf, len);
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800341 mutex_unlock(&inode->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700342 return res;
343}
344
345static unsigned int
346rpc_pipe_poll(struct file *filp, struct poll_table_struct *wait)
347{
Al Viro496ad9a2013-01-23 17:07:38 -0500348 struct inode *inode = file_inode(filp);
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400349 struct rpc_inode *rpci = RPC_I(inode);
350 unsigned int mask = POLLOUT | POLLWRNORM;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700351
Linus Torvalds1da177e2005-04-16 15:20:36 -0700352 poll_wait(filp, &rpci->waitq, wait);
353
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400354 mutex_lock(&inode->i_mutex);
355 if (rpci->pipe == NULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700356 mask |= POLLERR | POLLHUP;
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400357 else if (filp->private_data || !list_empty(&rpci->pipe->pipe))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700358 mask |= POLLIN | POLLRDNORM;
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400359 mutex_unlock(&inode->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700360 return mask;
361}
362
Arnd Bergmanna6f8dbc2010-10-04 21:18:23 +0200363static long
364rpc_pipe_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700365{
Al Viro496ad9a2013-01-23 17:07:38 -0500366 struct inode *inode = file_inode(filp);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400367 struct rpc_pipe *pipe;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700368 int len;
369
370 switch (cmd) {
371 case FIONREAD:
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400372 mutex_lock(&inode->i_mutex);
373 pipe = RPC_I(inode)->pipe;
374 if (pipe == NULL) {
375 mutex_unlock(&inode->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700376 return -EPIPE;
Arnd Bergmanna6f8dbc2010-10-04 21:18:23 +0200377 }
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400378 spin_lock(&pipe->lock);
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300379 len = pipe->pipelen;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700380 if (filp->private_data) {
381 struct rpc_pipe_msg *msg;
Joe Perches655b5bb2010-09-04 18:52:53 -0700382 msg = filp->private_data;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700383 len += msg->len - msg->copied;
384 }
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300385 spin_unlock(&pipe->lock);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400386 mutex_unlock(&inode->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700387 return put_user(len, (int __user *)arg);
388 default:
389 return -EINVAL;
390 }
391}
392
Arjan van de Venda7071d2007-02-12 00:55:36 -0800393static const struct file_operations rpc_pipe_fops = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700394 .owner = THIS_MODULE,
395 .llseek = no_llseek,
396 .read = rpc_pipe_read,
397 .write = rpc_pipe_write,
398 .poll = rpc_pipe_poll,
Frederic Weisbecker674b6042010-05-19 15:08:17 +0200399 .unlocked_ioctl = rpc_pipe_ioctl,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700400 .open = rpc_pipe_open,
401 .release = rpc_pipe_release,
402};
403
404static int
405rpc_show_info(struct seq_file *m, void *v)
406{
407 struct rpc_clnt *clnt = m->private;
408
Trond Myklebust2446ab62012-03-01 17:00:56 -0500409 rcu_read_lock();
Trond Myklebust4e0038b2012-03-01 17:01:05 -0500410 seq_printf(m, "RPC server: %s\n",
411 rcu_dereference(clnt->cl_xprt)->servername);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700412 seq_printf(m, "service: %s (%d) version %d\n", clnt->cl_protname,
413 clnt->cl_prog, clnt->cl_vers);
Chuck Levere7f78652006-08-22 20:06:19 -0400414 seq_printf(m, "address: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_ADDR));
415 seq_printf(m, "protocol: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_PROTO));
J. Bruce Fieldsbf19aac2007-09-26 14:38:09 -0400416 seq_printf(m, "port: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_PORT));
Trond Myklebust2446ab62012-03-01 17:00:56 -0500417 rcu_read_unlock();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700418 return 0;
419}
420
421static int
422rpc_info_open(struct inode *inode, struct file *file)
423{
Trond Myklebust006abe82010-09-12 19:55:25 -0400424 struct rpc_clnt *clnt = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700425 int ret = single_open(file, rpc_show_info, NULL);
426
427 if (!ret) {
428 struct seq_file *m = file->private_data;
Trond Myklebust006abe82010-09-12 19:55:25 -0400429
430 spin_lock(&file->f_path.dentry->d_lock);
431 if (!d_unhashed(file->f_path.dentry))
432 clnt = RPC_I(inode)->private;
433 if (clnt != NULL && atomic_inc_not_zero(&clnt->cl_count)) {
434 spin_unlock(&file->f_path.dentry->d_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700435 m->private = clnt;
436 } else {
Trond Myklebust006abe82010-09-12 19:55:25 -0400437 spin_unlock(&file->f_path.dentry->d_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700438 single_release(inode, file);
439 ret = -EINVAL;
440 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700441 }
442 return ret;
443}
444
445static int
446rpc_info_release(struct inode *inode, struct file *file)
447{
448 struct seq_file *m = file->private_data;
449 struct rpc_clnt *clnt = (struct rpc_clnt *)m->private;
450
451 if (clnt)
452 rpc_release_client(clnt);
453 return single_release(inode, file);
454}
455
Arjan van de Venda7071d2007-02-12 00:55:36 -0800456static const struct file_operations rpc_info_operations = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700457 .owner = THIS_MODULE,
458 .open = rpc_info_open,
459 .read = seq_read,
460 .llseek = seq_lseek,
461 .release = rpc_info_release,
462};
463
464
465/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700466 * Description of fs contents.
467 */
468struct rpc_filelist {
Trond Myklebustac6fece2009-08-09 15:14:20 -0400469 const char *name;
Arjan van de Ven99ac48f2006-03-28 01:56:41 -0800470 const struct file_operations *i_fop;
Trond Myklebust7364af62009-08-09 15:14:16 -0400471 umode_t mode;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700472};
473
Nick Pigginfe15ce42011-01-07 17:49:23 +1100474static int rpc_delete_dentry(const struct dentry *dentry)
Trond Myklebust62e17612007-06-08 14:14:46 -0400475{
476 return 1;
477}
478
Al Viro3ba13d12009-02-20 06:02:22 +0000479static const struct dentry_operations rpc_dentry_operations = {
Trond Myklebust62e17612007-06-08 14:14:46 -0400480 .d_delete = rpc_delete_dentry,
481};
482
Jeff Layton76fa6662013-07-02 13:00:52 -0400483/*
484 * Lookup the data. This is trivial - if the dentry didn't already
485 * exist, we know it is negative.
486 */
487static struct dentry *
488rpc_lookup(struct inode *dir, struct dentry *dentry, unsigned int flags)
489{
490 if (dentry->d_name.len > NAME_MAX)
491 return ERR_PTR(-ENAMETOOLONG);
492 d_add(dentry, NULL);
493 return NULL;
494}
495
496const struct inode_operations rpc_dir_inode_operations = {
497 .lookup = rpc_lookup,
498};
499
Linus Torvalds1da177e2005-04-16 15:20:36 -0700500static struct inode *
Trond Myklebust7364af62009-08-09 15:14:16 -0400501rpc_get_inode(struct super_block *sb, umode_t mode)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700502{
503 struct inode *inode = new_inode(sb);
504 if (!inode)
505 return NULL;
Christoph Hellwig85fe4022010-10-23 11:19:54 -0400506 inode->i_ino = get_next_ino();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700507 inode->i_mode = mode;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700508 inode->i_atime = inode->i_mtime = inode->i_ctime = CURRENT_TIME;
Joe Perches89f0e4f2011-07-01 09:43:12 +0000509 switch (mode & S_IFMT) {
510 case S_IFDIR:
511 inode->i_fop = &simple_dir_operations;
Jeff Layton76fa6662013-07-02 13:00:52 -0400512 inode->i_op = &rpc_dir_inode_operations;
Joe Perches89f0e4f2011-07-01 09:43:12 +0000513 inc_nlink(inode);
514 default:
515 break;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700516 }
517 return inode;
518}
519
Trond Myklebust75898062009-08-09 15:14:17 -0400520static int __rpc_create_common(struct inode *dir, struct dentry *dentry,
521 umode_t mode,
522 const struct file_operations *i_fop,
523 void *private)
524{
525 struct inode *inode;
526
Trond Myklebustbeb0f0a2010-12-20 21:19:26 +0000527 d_drop(dentry);
Trond Myklebust75898062009-08-09 15:14:17 -0400528 inode = rpc_get_inode(dir->i_sb, mode);
529 if (!inode)
530 goto out_err;
531 inode->i_ino = iunique(dir->i_sb, 100);
532 if (i_fop)
533 inode->i_fop = i_fop;
534 if (private)
535 rpc_inode_setowner(inode, private);
536 d_add(dentry, inode);
537 return 0;
538out_err:
539 printk(KERN_WARNING "%s: %s failed to allocate inode for dentry %s\n",
540 __FILE__, __func__, dentry->d_name.name);
541 dput(dentry);
542 return -ENOMEM;
543}
544
Trond Myklebustac6fece2009-08-09 15:14:20 -0400545static int __rpc_create(struct inode *dir, struct dentry *dentry,
546 umode_t mode,
547 const struct file_operations *i_fop,
548 void *private)
549{
550 int err;
551
552 err = __rpc_create_common(dir, dentry, S_IFREG | mode, i_fop, private);
553 if (err)
554 return err;
555 fsnotify_create(dir, dentry);
556 return 0;
557}
558
Trond Myklebust75898062009-08-09 15:14:17 -0400559static int __rpc_mkdir(struct inode *dir, struct dentry *dentry,
560 umode_t mode,
561 const struct file_operations *i_fop,
562 void *private)
563{
564 int err;
565
566 err = __rpc_create_common(dir, dentry, S_IFDIR | mode, i_fop, private);
567 if (err)
568 return err;
569 inc_nlink(dir);
570 fsnotify_mkdir(dir, dentry);
571 return 0;
572}
573
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300574static void
575init_pipe(struct rpc_pipe *pipe)
576{
577 pipe->nreaders = 0;
578 pipe->nwriters = 0;
579 INIT_LIST_HEAD(&pipe->in_upcall);
580 INIT_LIST_HEAD(&pipe->in_downcall);
581 INIT_LIST_HEAD(&pipe->pipe);
582 pipe->pipelen = 0;
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300583 INIT_DELAYED_WORK(&pipe->queue_timeout,
584 rpc_timeout_upcall_queue);
585 pipe->ops = NULL;
586 spin_lock_init(&pipe->lock);
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300587 pipe->dentry = NULL;
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300588}
589
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300590void rpc_destroy_pipe_data(struct rpc_pipe *pipe)
591{
592 kfree(pipe);
593}
594EXPORT_SYMBOL_GPL(rpc_destroy_pipe_data);
595
596struct rpc_pipe *rpc_mkpipe_data(const struct rpc_pipe_ops *ops, int flags)
Trond Myklebust75898062009-08-09 15:14:17 -0400597{
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300598 struct rpc_pipe *pipe;
Trond Myklebust75898062009-08-09 15:14:17 -0400599
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300600 pipe = kzalloc(sizeof(struct rpc_pipe), GFP_KERNEL);
601 if (!pipe)
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300602 return ERR_PTR(-ENOMEM);
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300603 init_pipe(pipe);
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300604 pipe->ops = ops;
605 pipe->flags = flags;
606 return pipe;
607}
608EXPORT_SYMBOL_GPL(rpc_mkpipe_data);
609
610static int __rpc_mkpipe_dentry(struct inode *dir, struct dentry *dentry,
611 umode_t mode,
612 const struct file_operations *i_fop,
613 void *private,
614 struct rpc_pipe *pipe)
Trond Myklebust75898062009-08-09 15:14:17 -0400615{
616 struct rpc_inode *rpci;
617 int err;
618
619 err = __rpc_create_common(dir, dentry, S_IFIFO | mode, i_fop, private);
620 if (err)
621 return err;
622 rpci = RPC_I(dentry->d_inode);
Trond Myklebust75898062009-08-09 15:14:17 -0400623 rpci->private = private;
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300624 rpci->pipe = pipe;
Trond Myklebust75898062009-08-09 15:14:17 -0400625 fsnotify_create(dir, dentry);
626 return 0;
627}
628
Trond Myklebustac6fece2009-08-09 15:14:20 -0400629static int __rpc_rmdir(struct inode *dir, struct dentry *dentry)
630{
631 int ret;
632
633 dget(dentry);
634 ret = simple_rmdir(dir, dentry);
635 d_delete(dentry);
636 dput(dentry);
637 return ret;
638}
639
Stanislav Kinsburskyeee17322012-01-10 16:13:19 +0400640int rpc_rmdir(struct dentry *dentry)
641{
642 struct dentry *parent;
643 struct inode *dir;
644 int error;
645
646 parent = dget_parent(dentry);
647 dir = parent->d_inode;
648 mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT);
649 error = __rpc_rmdir(dir, dentry);
650 mutex_unlock(&dir->i_mutex);
651 dput(parent);
652 return error;
653}
654EXPORT_SYMBOL_GPL(rpc_rmdir);
655
Trond Myklebust810d90b2009-08-09 15:14:18 -0400656static int __rpc_unlink(struct inode *dir, struct dentry *dentry)
657{
658 int ret;
659
660 dget(dentry);
661 ret = simple_unlink(dir, dentry);
662 d_delete(dentry);
663 dput(dentry);
664 return ret;
665}
666
667static int __rpc_rmpipe(struct inode *dir, struct dentry *dentry)
668{
669 struct inode *inode = dentry->d_inode;
Trond Myklebust810d90b2009-08-09 15:14:18 -0400670
Trond Myklebust810d90b2009-08-09 15:14:18 -0400671 rpc_close_pipes(inode);
672 return __rpc_unlink(dir, dentry);
673}
674
Trond Myklebustcfeaa4a2009-08-09 15:14:20 -0400675static struct dentry *__rpc_lookup_create_exclusive(struct dentry *parent,
676 struct qstr *name)
677{
678 struct dentry *dentry;
679
Stanislav Kinsbursky5bff0382011-11-08 15:09:19 +0300680 dentry = d_lookup(parent, name);
681 if (!dentry) {
682 dentry = d_alloc(parent, name);
683 if (!dentry)
684 return ERR_PTR(-ENOMEM);
685 }
Jeff Layton76fa6662013-07-02 13:00:52 -0400686 if (dentry->d_inode == NULL)
Dan Carpenterf1f0abe12010-03-21 12:10:34 -0400687 return dentry;
Trond Myklebustcfeaa4a2009-08-09 15:14:20 -0400688 dput(dentry);
689 return ERR_PTR(-EEXIST);
690}
691
Linus Torvalds1da177e2005-04-16 15:20:36 -0700692/*
693 * FIXME: This probably has races.
694 */
Trond Myklebustac6fece2009-08-09 15:14:20 -0400695static void __rpc_depopulate(struct dentry *parent,
696 const struct rpc_filelist *files,
697 int start, int eof)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700698{
699 struct inode *dir = parent->d_inode;
Trond Myklebustac6fece2009-08-09 15:14:20 -0400700 struct dentry *dentry;
701 struct qstr name;
702 int i;
703
704 for (i = start; i < eof; i++) {
705 name.name = files[i].name;
706 name.len = strlen(files[i].name);
707 name.hash = full_name_hash(name.name, name.len);
708 dentry = d_lookup(parent, &name);
709
710 if (dentry == NULL)
711 continue;
712 if (dentry->d_inode == NULL)
713 goto next;
714 switch (dentry->d_inode->i_mode & S_IFMT) {
715 default:
716 BUG();
717 case S_IFREG:
718 __rpc_unlink(dir, dentry);
719 break;
720 case S_IFDIR:
721 __rpc_rmdir(dir, dentry);
722 }
723next:
724 dput(dentry);
725 }
726}
727
728static void rpc_depopulate(struct dentry *parent,
729 const struct rpc_filelist *files,
730 int start, int eof)
731{
732 struct inode *dir = parent->d_inode;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700733
Arjan van de Venc6573c22006-07-03 00:25:16 -0700734 mutex_lock_nested(&dir->i_mutex, I_MUTEX_CHILD);
Trond Myklebustac6fece2009-08-09 15:14:20 -0400735 __rpc_depopulate(parent, files, start, eof);
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800736 mutex_unlock(&dir->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700737}
738
Trond Myklebustac6fece2009-08-09 15:14:20 -0400739static int rpc_populate(struct dentry *parent,
740 const struct rpc_filelist *files,
741 int start, int eof,
742 void *private)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700743{
Trond Myklebustac6fece2009-08-09 15:14:20 -0400744 struct inode *dir = parent->d_inode;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700745 struct dentry *dentry;
Trond Myklebustac6fece2009-08-09 15:14:20 -0400746 int i, err;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700747
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800748 mutex_lock(&dir->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700749 for (i = start; i < eof; i++) {
Trond Myklebustac6fece2009-08-09 15:14:20 -0400750 struct qstr q;
751
752 q.name = files[i].name;
753 q.len = strlen(files[i].name);
754 q.hash = full_name_hash(q.name, q.len);
755 dentry = __rpc_lookup_create_exclusive(parent, &q);
756 err = PTR_ERR(dentry);
757 if (IS_ERR(dentry))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700758 goto out_bad;
Trond Myklebustac6fece2009-08-09 15:14:20 -0400759 switch (files[i].mode & S_IFMT) {
760 default:
761 BUG();
762 case S_IFREG:
763 err = __rpc_create(dir, dentry,
764 files[i].mode,
765 files[i].i_fop,
766 private);
767 break;
768 case S_IFDIR:
769 err = __rpc_mkdir(dir, dentry,
770 files[i].mode,
771 NULL,
772 private);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700773 }
Trond Myklebustac6fece2009-08-09 15:14:20 -0400774 if (err != 0)
775 goto out_bad;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700776 }
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800777 mutex_unlock(&dir->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700778 return 0;
779out_bad:
Trond Myklebustac6fece2009-08-09 15:14:20 -0400780 __rpc_depopulate(parent, files, start, eof);
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800781 mutex_unlock(&dir->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700782 printk(KERN_WARNING "%s: %s failed to populate directory %s\n",
Harvey Harrison0dc47872008-03-05 20:47:47 -0800783 __FILE__, __func__, parent->d_name.name);
Trond Myklebustac6fece2009-08-09 15:14:20 -0400784 return err;
Trond Myklebustf1345852005-09-23 11:08:25 -0400785}
Christoph Hellwig278c9952005-07-24 23:53:01 +0100786
Trond Myklebuste57aed72009-08-09 15:14:26 -0400787static struct dentry *rpc_mkdir_populate(struct dentry *parent,
788 struct qstr *name, umode_t mode, void *private,
789 int (*populate)(struct dentry *, void *), void *args_populate)
Trond Myklebustf1345852005-09-23 11:08:25 -0400790{
Trond Myklebustf1345852005-09-23 11:08:25 -0400791 struct dentry *dentry;
Trond Myklebust7d59d1e2009-08-09 15:14:23 -0400792 struct inode *dir = parent->d_inode;
Trond Myklebustf1345852005-09-23 11:08:25 -0400793 int error;
794
Trond Myklebust7d59d1e2009-08-09 15:14:23 -0400795 mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT);
796 dentry = __rpc_lookup_create_exclusive(parent, name);
Trond Myklebustf1345852005-09-23 11:08:25 -0400797 if (IS_ERR(dentry))
Trond Myklebust7d59d1e2009-08-09 15:14:23 -0400798 goto out;
799 error = __rpc_mkdir(dir, dentry, mode, NULL, private);
Trond Myklebust75898062009-08-09 15:14:17 -0400800 if (error != 0)
801 goto out_err;
Trond Myklebuste57aed72009-08-09 15:14:26 -0400802 if (populate != NULL) {
803 error = populate(dentry, args_populate);
804 if (error)
805 goto err_rmdir;
806 }
Trond Myklebustf1345852005-09-23 11:08:25 -0400807out:
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800808 mutex_unlock(&dir->i_mutex);
Trond Myklebust5c3e9852006-07-29 17:37:40 -0400809 return dentry;
Trond Myklebustac6fece2009-08-09 15:14:20 -0400810err_rmdir:
Trond Myklebustf1345852005-09-23 11:08:25 -0400811 __rpc_rmdir(dir, dentry);
Trond Myklebust75898062009-08-09 15:14:17 -0400812out_err:
Trond Myklebustf1345852005-09-23 11:08:25 -0400813 dentry = ERR_PTR(error);
814 goto out;
815}
816
Trond Myklebuste57aed72009-08-09 15:14:26 -0400817static int rpc_rmdir_depopulate(struct dentry *dentry,
818 void (*depopulate)(struct dentry *))
Trond Myklebustf1345852005-09-23 11:08:25 -0400819{
Trond Myklebustdff02cc2006-07-31 14:17:18 -0700820 struct dentry *parent;
Trond Myklebustf1345852005-09-23 11:08:25 -0400821 struct inode *dir;
822 int error;
823
Trond Myklebustdff02cc2006-07-31 14:17:18 -0700824 parent = dget_parent(dentry);
825 dir = parent->d_inode;
Arjan van de Venc6573c22006-07-03 00:25:16 -0700826 mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT);
Trond Myklebuste57aed72009-08-09 15:14:26 -0400827 if (depopulate != NULL)
828 depopulate(dentry);
Trond Myklebustf1345852005-09-23 11:08:25 -0400829 error = __rpc_rmdir(dir, dentry);
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800830 mutex_unlock(&dir->i_mutex);
Trond Myklebustdff02cc2006-07-31 14:17:18 -0700831 dput(parent);
Trond Myklebustf1345852005-09-23 11:08:25 -0400832 return error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700833}
834
J. Bruce Fields93a44a72007-11-06 13:06:03 -0500835/**
836 * rpc_mkpipe - make an rpc_pipefs file for kernel<->userspace communication
837 * @parent: dentry of directory to create new "pipe" in
838 * @name: name of pipe
839 * @private: private data to associate with the pipe, for the caller's use
Randy Dunlapbda14602012-05-13 10:35:40 -0700840 * @pipe: &rpc_pipe containing input parameters
J. Bruce Fields93a44a72007-11-06 13:06:03 -0500841 *
842 * Data is made available for userspace to read by calls to
843 * rpc_queue_upcall(). The actual reads will result in calls to
844 * @ops->upcall, which will be called with the file pointer,
845 * message, and userspace buffer to copy to.
846 *
847 * Writes can come at any time, and do not necessarily have to be
848 * responses to upcalls. They will result in calls to @msg->downcall.
849 *
850 * The @private argument passed here will be available to all these methods
Al Viro496ad9a2013-01-23 17:07:38 -0500851 * from the file pointer, via RPC_I(file_inode(file))->private.
J. Bruce Fields93a44a72007-11-06 13:06:03 -0500852 */
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300853struct dentry *rpc_mkpipe_dentry(struct dentry *parent, const char *name,
854 void *private, struct rpc_pipe *pipe)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700855{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700856 struct dentry *dentry;
Trond Myklebust75898062009-08-09 15:14:17 -0400857 struct inode *dir = parent->d_inode;
Trond Myklebust7364af62009-08-09 15:14:16 -0400858 umode_t umode = S_IFIFO | S_IRUSR | S_IWUSR;
Trond Myklebustcfeaa4a2009-08-09 15:14:20 -0400859 struct qstr q;
Trond Myklebust75898062009-08-09 15:14:17 -0400860 int err;
Trond Myklebust7364af62009-08-09 15:14:16 -0400861
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300862 if (pipe->ops->upcall == NULL)
Trond Myklebust7364af62009-08-09 15:14:16 -0400863 umode &= ~S_IRUGO;
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300864 if (pipe->ops->downcall == NULL)
Trond Myklebust7364af62009-08-09 15:14:16 -0400865 umode &= ~S_IWUGO;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700866
Trond Myklebustcfeaa4a2009-08-09 15:14:20 -0400867 q.name = name;
868 q.len = strlen(name);
869 q.hash = full_name_hash(q.name, q.len),
870
871 mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT);
Stanislav Kinsbursky5bff0382011-11-08 15:09:19 +0300872 dentry = __rpc_lookup_create_exclusive(parent, &q);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700873 if (IS_ERR(dentry))
Trond Myklebustcfeaa4a2009-08-09 15:14:20 -0400874 goto out;
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300875 err = __rpc_mkpipe_dentry(dir, dentry, umode, &rpc_pipe_fops,
876 private, pipe);
Trond Myklebust75898062009-08-09 15:14:17 -0400877 if (err)
878 goto out_err;
Trond Myklebustf1345852005-09-23 11:08:25 -0400879out:
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800880 mutex_unlock(&dir->i_mutex);
Trond Myklebust5c3e9852006-07-29 17:37:40 -0400881 return dentry;
Trond Myklebust75898062009-08-09 15:14:17 -0400882out_err:
883 dentry = ERR_PTR(err);
Trond Myklebust158998b2006-08-24 01:03:17 -0400884 printk(KERN_WARNING "%s: %s() failed to create pipe %s/%s (errno = %d)\n",
Harvey Harrison0dc47872008-03-05 20:47:47 -0800885 __FILE__, __func__, parent->d_name.name, name,
Trond Myklebust75898062009-08-09 15:14:17 -0400886 err);
Trond Myklebustf1345852005-09-23 11:08:25 -0400887 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700888}
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300889EXPORT_SYMBOL_GPL(rpc_mkpipe_dentry);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700890
J. Bruce Fields93a44a72007-11-06 13:06:03 -0500891/**
892 * rpc_unlink - remove a pipe
893 * @dentry: dentry for the pipe, as returned from rpc_mkpipe
894 *
895 * After this call, lookups will no longer find the pipe, and any
896 * attempts to read or write using preexisting opens of the pipe will
897 * return -EPIPE.
898 */
Trond Myklebustf1345852005-09-23 11:08:25 -0400899int
Trond Myklebust5d674762006-07-31 14:11:48 -0700900rpc_unlink(struct dentry *dentry)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700901{
Trond Myklebust5d674762006-07-31 14:11:48 -0700902 struct dentry *parent;
Trond Myklebustf1345852005-09-23 11:08:25 -0400903 struct inode *dir;
Trond Myklebust5d674762006-07-31 14:11:48 -0700904 int error = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700905
Trond Myklebust5d674762006-07-31 14:11:48 -0700906 parent = dget_parent(dentry);
907 dir = parent->d_inode;
Arjan van de Venc6573c22006-07-03 00:25:16 -0700908 mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT);
Trond Myklebust810d90b2009-08-09 15:14:18 -0400909 error = __rpc_rmpipe(dir, dentry);
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800910 mutex_unlock(&dir->i_mutex);
Trond Myklebust5d674762006-07-31 14:11:48 -0700911 dput(parent);
Trond Myklebustf1345852005-09-23 11:08:25 -0400912 return error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700913}
Trond Myklebust468039e2008-12-23 15:21:31 -0500914EXPORT_SYMBOL_GPL(rpc_unlink);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700915
Trond Myklebuste57aed72009-08-09 15:14:26 -0400916enum {
917 RPCAUTH_info,
918 RPCAUTH_EOF
919};
920
921static const struct rpc_filelist authfiles[] = {
922 [RPCAUTH_info] = {
923 .name = "info",
924 .i_fop = &rpc_info_operations,
925 .mode = S_IFREG | S_IRUSR,
926 },
927};
928
929static int rpc_clntdir_populate(struct dentry *dentry, void *private)
930{
931 return rpc_populate(dentry,
932 authfiles, RPCAUTH_info, RPCAUTH_EOF,
933 private);
934}
935
936static void rpc_clntdir_depopulate(struct dentry *dentry)
937{
938 rpc_depopulate(dentry, authfiles, RPCAUTH_info, RPCAUTH_EOF);
939}
940
Trond Myklebust7d59d1e2009-08-09 15:14:23 -0400941/**
942 * rpc_create_client_dir - Create a new rpc_client directory in rpc_pipefs
Randy Dunlap4111d4f2009-09-23 14:36:38 -0400943 * @dentry: dentry from the rpc_pipefs root to the new directory
944 * @name: &struct qstr for the name
Trond Myklebust7d59d1e2009-08-09 15:14:23 -0400945 * @rpc_client: rpc client to associate with this directory
946 *
947 * This creates a directory at the given @path associated with
948 * @rpc_clnt, which will contain a file named "info" with some basic
949 * information about the client, together with any "pipes" that may
950 * later be created using rpc_mkpipe().
951 */
Trond Myklebust23ac6582009-08-09 15:14:25 -0400952struct dentry *rpc_create_client_dir(struct dentry *dentry,
Trond Myklebuste57aed72009-08-09 15:14:26 -0400953 struct qstr *name,
954 struct rpc_clnt *rpc_client)
Trond Myklebust7d59d1e2009-08-09 15:14:23 -0400955{
Trond Myklebuste57aed72009-08-09 15:14:26 -0400956 return rpc_mkdir_populate(dentry, name, S_IRUGO | S_IXUGO, NULL,
957 rpc_clntdir_populate, rpc_client);
958}
959
960/**
961 * rpc_remove_client_dir - Remove a directory created with rpc_create_client_dir()
Randy Dunlapbda14602012-05-13 10:35:40 -0700962 * @dentry: dentry for the pipe
Trond Myklebuste57aed72009-08-09 15:14:26 -0400963 */
964int rpc_remove_client_dir(struct dentry *dentry)
965{
966 return rpc_rmdir_depopulate(dentry, rpc_clntdir_depopulate);
Trond Myklebust7d59d1e2009-08-09 15:14:23 -0400967}
968
Trond Myklebust8854e822009-08-09 15:14:30 -0400969static const struct rpc_filelist cache_pipefs_files[3] = {
970 [0] = {
971 .name = "channel",
972 .i_fop = &cache_file_operations_pipefs,
Trond Myklebust96c61cb2009-08-19 18:12:21 -0400973 .mode = S_IFREG|S_IRUSR|S_IWUSR,
Trond Myklebust8854e822009-08-09 15:14:30 -0400974 },
975 [1] = {
976 .name = "content",
977 .i_fop = &content_file_operations_pipefs,
978 .mode = S_IFREG|S_IRUSR,
979 },
980 [2] = {
981 .name = "flush",
982 .i_fop = &cache_flush_operations_pipefs,
983 .mode = S_IFREG|S_IRUSR|S_IWUSR,
984 },
985};
986
987static int rpc_cachedir_populate(struct dentry *dentry, void *private)
988{
989 return rpc_populate(dentry,
990 cache_pipefs_files, 0, 3,
991 private);
992}
993
994static void rpc_cachedir_depopulate(struct dentry *dentry)
995{
996 rpc_depopulate(dentry, cache_pipefs_files, 0, 3);
997}
998
999struct dentry *rpc_create_cache_dir(struct dentry *parent, struct qstr *name,
Al Viro64f14262011-07-25 00:35:13 -04001000 umode_t umode, struct cache_detail *cd)
Trond Myklebust8854e822009-08-09 15:14:30 -04001001{
1002 return rpc_mkdir_populate(parent, name, umode, NULL,
1003 rpc_cachedir_populate, cd);
1004}
1005
1006void rpc_remove_cache_dir(struct dentry *dentry)
1007{
1008 rpc_rmdir_depopulate(dentry, rpc_cachedir_depopulate);
1009}
1010
Linus Torvalds1da177e2005-04-16 15:20:36 -07001011/*
1012 * populate the filesystem
1013 */
Alexey Dobriyanb87221d2009-09-21 17:01:09 -07001014static const struct super_operations s_ops = {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001015 .alloc_inode = rpc_alloc_inode,
1016 .destroy_inode = rpc_destroy_inode,
1017 .statfs = simple_statfs,
1018};
1019
1020#define RPCAUTH_GSSMAGIC 0x67596969
1021
Trond Myklebustbb156742009-08-09 15:14:21 -04001022/*
1023 * We have a single directory with 1 node in it.
1024 */
1025enum {
1026 RPCAUTH_lockd,
1027 RPCAUTH_mount,
1028 RPCAUTH_nfs,
1029 RPCAUTH_portmap,
1030 RPCAUTH_statd,
1031 RPCAUTH_nfsd4_cb,
Trond Myklebuste571cbf2009-08-19 18:12:27 -04001032 RPCAUTH_cache,
Jeff Laytonb3537c32012-03-21 09:52:04 -04001033 RPCAUTH_nfsd,
Trond Myklebustbb156742009-08-09 15:14:21 -04001034 RPCAUTH_RootEOF
1035};
1036
1037static const struct rpc_filelist files[] = {
1038 [RPCAUTH_lockd] = {
1039 .name = "lockd",
1040 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1041 },
1042 [RPCAUTH_mount] = {
1043 .name = "mount",
1044 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1045 },
1046 [RPCAUTH_nfs] = {
1047 .name = "nfs",
1048 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1049 },
1050 [RPCAUTH_portmap] = {
1051 .name = "portmap",
1052 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1053 },
1054 [RPCAUTH_statd] = {
1055 .name = "statd",
1056 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1057 },
1058 [RPCAUTH_nfsd4_cb] = {
1059 .name = "nfsd4_cb",
1060 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1061 },
Trond Myklebuste571cbf2009-08-19 18:12:27 -04001062 [RPCAUTH_cache] = {
1063 .name = "cache",
1064 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1065 },
Jeff Laytonb3537c32012-03-21 09:52:04 -04001066 [RPCAUTH_nfsd] = {
1067 .name = "nfsd",
1068 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1069 },
Trond Myklebustbb156742009-08-09 15:14:21 -04001070};
1071
Stanislav Kinsbursky432eb1a2011-12-26 15:39:22 +03001072/*
1073 * This call can be used only in RPC pipefs mount notification hooks.
1074 */
1075struct dentry *rpc_d_lookup_sb(const struct super_block *sb,
1076 const unsigned char *dir_name)
1077{
Linus Torvalds26fe5752012-05-10 13:14:12 -07001078 struct qstr dir = QSTR_INIT(dir_name, strlen(dir_name));
Stanislav Kinsbursky432eb1a2011-12-26 15:39:22 +03001079
Linus Torvalds26fe5752012-05-10 13:14:12 -07001080 dir.hash = full_name_hash(dir.name, dir.len);
Stanislav Kinsbursky432eb1a2011-12-26 15:39:22 +03001081 return d_lookup(sb->s_root, &dir);
1082}
1083EXPORT_SYMBOL_GPL(rpc_d_lookup_sb);
1084
Stanislav Kinsburskyc21a5882011-12-26 15:39:39 +03001085void rpc_pipefs_init_net(struct net *net)
1086{
1087 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1088
1089 mutex_init(&sn->pipefs_sb_lock);
Trond Myklebustabfdbd52013-05-15 11:28:54 -07001090 sn->gssd_running = 1;
Trond Myklebust2aed8b42013-05-15 10:27:32 -07001091 sn->pipe_version = -1;
Stanislav Kinsburskyc21a5882011-12-26 15:39:39 +03001092}
1093
1094/*
1095 * This call will be used for per network namespace operations calls.
1096 * Note: Function will be returned with pipefs_sb_lock taken if superblock was
1097 * found. This lock have to be released by rpc_put_sb_net() when all operations
1098 * will be completed.
1099 */
1100struct super_block *rpc_get_sb_net(const struct net *net)
1101{
1102 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1103
1104 mutex_lock(&sn->pipefs_sb_lock);
1105 if (sn->pipefs_sb)
1106 return sn->pipefs_sb;
1107 mutex_unlock(&sn->pipefs_sb_lock);
1108 return NULL;
1109}
1110EXPORT_SYMBOL_GPL(rpc_get_sb_net);
1111
1112void rpc_put_sb_net(const struct net *net)
1113{
1114 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1115
Weston Andros Adamson749386e2012-10-23 10:43:37 -04001116 WARN_ON(sn->pipefs_sb == NULL);
Stanislav Kinsburskyc21a5882011-12-26 15:39:39 +03001117 mutex_unlock(&sn->pipefs_sb_lock);
1118}
1119EXPORT_SYMBOL_GPL(rpc_put_sb_net);
1120
Linus Torvalds1da177e2005-04-16 15:20:36 -07001121static int
1122rpc_fill_super(struct super_block *sb, void *data, int silent)
1123{
1124 struct inode *inode;
1125 struct dentry *root;
Stanislav Kinsbursky38b0da72011-12-26 15:38:56 +03001126 struct net *net = data;
Stanislav Kinsbursky90c4e822011-12-26 15:39:30 +03001127 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +03001128 int err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001129
1130 sb->s_blocksize = PAGE_CACHE_SIZE;
1131 sb->s_blocksize_bits = PAGE_CACHE_SHIFT;
1132 sb->s_magic = RPCAUTH_GSSMAGIC;
1133 sb->s_op = &s_ops;
Jeff Layton76fa6662013-07-02 13:00:52 -04001134 sb->s_d_op = &rpc_dentry_operations;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001135 sb->s_time_gran = 1;
1136
Jeff Layton7e450b42012-05-16 13:04:26 -04001137 inode = rpc_get_inode(sb, S_IFDIR | S_IRUGO | S_IXUGO);
Al Viro48fde702012-01-08 22:15:13 -05001138 sb->s_root = root = d_make_root(inode);
1139 if (!root)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001140 return -ENOMEM;
Trond Myklebustac6fece2009-08-09 15:14:20 -04001141 if (rpc_populate(root, files, RPCAUTH_lockd, RPCAUTH_RootEOF, NULL))
Al Virofc7bed82010-01-25 18:30:38 -05001142 return -ENOMEM;
Chuck Leverd8af9bc12012-09-14 17:23:34 -04001143 dprintk("RPC: sending pipefs MOUNT notification for net %p%s\n",
1144 net, NET_NAME(net));
Stanislav Kinsbursky38481602013-06-24 11:52:38 +04001145 mutex_lock(&sn->pipefs_sb_lock);
Stanislav Kinsbursky37629b52012-04-20 18:19:56 +04001146 sn->pipefs_sb = sb;
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +03001147 err = blocking_notifier_call_chain(&rpc_pipefs_notifier_list,
1148 RPC_PIPEFS_MOUNT,
1149 sb);
1150 if (err)
1151 goto err_depopulate;
Stanislav Kinsbursky021c68d2011-12-26 15:39:04 +03001152 sb->s_fs_info = get_net(net);
Stanislav Kinsbursky38481602013-06-24 11:52:38 +04001153 mutex_unlock(&sn->pipefs_sb_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001154 return 0;
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +03001155
1156err_depopulate:
1157 blocking_notifier_call_chain(&rpc_pipefs_notifier_list,
1158 RPC_PIPEFS_UMOUNT,
1159 sb);
Stanislav Kinsbursky37629b52012-04-20 18:19:56 +04001160 sn->pipefs_sb = NULL;
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +03001161 __rpc_depopulate(root, files, RPCAUTH_lockd, RPCAUTH_RootEOF);
Stanislav Kinsbursky38481602013-06-24 11:52:38 +04001162 mutex_unlock(&sn->pipefs_sb_lock);
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +03001163 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001164}
1165
Al Virofc14f2f2010-07-25 01:48:30 +04001166static struct dentry *
1167rpc_mount(struct file_system_type *fs_type,
1168 int flags, const char *dev_name, void *data)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001169{
Stanislav Kinsbursky38b0da72011-12-26 15:38:56 +03001170 return mount_ns(fs_type, flags, current->nsproxy->net_ns, rpc_fill_super);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001171}
1172
Trond Myklebust09acfea2012-03-11 15:22:54 -04001173static void rpc_kill_sb(struct super_block *sb)
Stanislav Kinsbursky021c68d2011-12-26 15:39:04 +03001174{
1175 struct net *net = sb->s_fs_info;
Stanislav Kinsbursky90c4e822011-12-26 15:39:30 +03001176 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
Stanislav Kinsbursky021c68d2011-12-26 15:39:04 +03001177
Stanislav Kinsburskyc21a5882011-12-26 15:39:39 +03001178 mutex_lock(&sn->pipefs_sb_lock);
Trond Myklebust642fe4d2012-11-08 10:01:26 -05001179 if (sn->pipefs_sb != sb) {
1180 mutex_unlock(&sn->pipefs_sb_lock);
1181 goto out;
1182 }
Stanislav Kinsbursky90c4e822011-12-26 15:39:30 +03001183 sn->pipefs_sb = NULL;
Chuck Leverd8af9bc12012-09-14 17:23:34 -04001184 dprintk("RPC: sending pipefs UMOUNT notification for net %p%s\n",
1185 net, NET_NAME(net));
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +03001186 blocking_notifier_call_chain(&rpc_pipefs_notifier_list,
1187 RPC_PIPEFS_UMOUNT,
1188 sb);
Stanislav Kinsburskyadb6fa72013-06-26 10:15:14 +04001189 mutex_unlock(&sn->pipefs_sb_lock);
Trond Myklebust642fe4d2012-11-08 10:01:26 -05001190 put_net(net);
1191out:
Stanislav Kinsbursky021c68d2011-12-26 15:39:04 +03001192 kill_litter_super(sb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001193}
1194
1195static struct file_system_type rpc_pipe_fs_type = {
1196 .owner = THIS_MODULE,
1197 .name = "rpc_pipefs",
Al Virofc14f2f2010-07-25 01:48:30 +04001198 .mount = rpc_mount,
Stanislav Kinsbursky021c68d2011-12-26 15:39:04 +03001199 .kill_sb = rpc_kill_sb,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001200};
Eric W. Biederman7f78e032013-03-02 19:39:14 -08001201MODULE_ALIAS_FS("rpc_pipefs");
Eric W. Biedermanfa7614dd2013-03-12 18:27:41 -07001202MODULE_ALIAS("rpc_pipefs");
Linus Torvalds1da177e2005-04-16 15:20:36 -07001203
1204static void
Alexey Dobriyan51cc5062008-07-25 19:45:34 -07001205init_once(void *foo)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001206{
1207 struct rpc_inode *rpci = (struct rpc_inode *) foo;
1208
Christoph Lametera35afb82007-05-16 22:10:57 -07001209 inode_init_once(&rpci->vfs_inode);
1210 rpci->private = NULL;
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +03001211 rpci->pipe = NULL;
Christoph Lametera35afb82007-05-16 22:10:57 -07001212 init_waitqueue_head(&rpci->waitq);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001213}
1214
1215int register_rpc_pipefs(void)
1216{
Akinobu Mita5bd5f582007-05-09 02:34:51 -07001217 int err;
1218
Linus Torvalds1da177e2005-04-16 15:20:36 -07001219 rpc_inode_cachep = kmem_cache_create("rpc_inode_cache",
Paul Jacksonfffb60f2006-03-24 03:16:06 -08001220 sizeof(struct rpc_inode),
1221 0, (SLAB_HWCACHE_ALIGN|SLAB_RECLAIM_ACCOUNT|
1222 SLAB_MEM_SPREAD),
Paul Mundt20c2df82007-07-20 10:11:58 +09001223 init_once);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001224 if (!rpc_inode_cachep)
1225 return -ENOMEM;
Stanislav Kinsbursky80df9d22012-01-11 19:18:17 +04001226 err = rpc_clients_notifier_register();
1227 if (err)
1228 goto err_notifier;
Akinobu Mita5bd5f582007-05-09 02:34:51 -07001229 err = register_filesystem(&rpc_pipe_fs_type);
Stanislav Kinsbursky80df9d22012-01-11 19:18:17 +04001230 if (err)
1231 goto err_register;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001232 return 0;
Stanislav Kinsbursky80df9d22012-01-11 19:18:17 +04001233
1234err_register:
1235 rpc_clients_notifier_unregister();
1236err_notifier:
1237 kmem_cache_destroy(rpc_inode_cachep);
1238 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001239}
1240
1241void unregister_rpc_pipefs(void)
1242{
Stanislav Kinsbursky80df9d22012-01-11 19:18:17 +04001243 rpc_clients_notifier_unregister();
Alexey Dobriyan1a1d92c2006-09-27 01:49:40 -07001244 kmem_cache_destroy(rpc_inode_cachep);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001245 unregister_filesystem(&rpc_pipe_fs_type);
1246}