blob: a25490ae6c62dea32e5b5cff447e1f7e027a9778 [file] [log] [blame]
NeilBrowna55370a2005-06-23 22:03:52 -07001/*
NeilBrowna55370a2005-06-23 22:03:52 -07002* Copyright (c) 2004 The Regents of the University of Michigan.
Jeff Laytonf3f80142012-03-21 09:52:07 -04003* Copyright (c) 2012 Jeff Layton <jlayton@redhat.com>
NeilBrowna55370a2005-06-23 22:03:52 -07004* All rights reserved.
5*
6* Andy Adamson <andros@citi.umich.edu>
7*
8* Redistribution and use in source and binary forms, with or without
9* modification, are permitted provided that the following conditions
10* are met:
11*
12* 1. Redistributions of source code must retain the above copyright
13* notice, this list of conditions and the following disclaimer.
14* 2. Redistributions in binary form must reproduce the above copyright
15* notice, this list of conditions and the following disclaimer in the
16* documentation and/or other materials provided with the distribution.
17* 3. Neither the name of the University nor the names of its
18* contributors may be used to endorse or promote products derived
19* from this software without specific prior written permission.
20*
21* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
22* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
23* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
24* DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
26* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
27* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
28* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
29* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
30* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
31* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32*
33*/
34
NeilBrown190e4fb2005-06-23 22:04:25 -070035#include <linux/file.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090036#include <linux/slab.h>
NeilBrown190e4fb2005-06-23 22:04:25 -070037#include <linux/namei.h>
NeilBrowna55370a2005-06-23 22:03:52 -070038#include <linux/crypto.h>
Alexey Dobriyane8edc6e2007-05-21 01:22:52 +040039#include <linux/sched.h>
Jeff Laytonf3f80142012-03-21 09:52:07 -040040#include <linux/fs.h>
Jeff Layton813fd322012-03-21 09:52:08 -040041#include <linux/module.h>
Jeff Laytonf3f80142012-03-21 09:52:07 -040042#include <net/net_namespace.h>
43#include <linux/sunrpc/rpc_pipe_fs.h>
44#include <linux/sunrpc/clnt.h>
45#include <linux/nfsd/cld.h>
Boaz Harrosh9a74af22009-12-03 20:30:56 +020046
47#include "nfsd.h"
48#include "state.h"
J. Bruce Fields0a3adad2009-11-04 18:12:35 -050049#include "vfs.h"
Jeff Laytonf3f80142012-03-21 09:52:07 -040050#include "netns.h"
NeilBrowna55370a2005-06-23 22:03:52 -070051
52#define NFSDDBG_FACILITY NFSDDBG_PROC
53
Jeff Layton2a4317c2012-03-21 16:42:43 -040054/* Declarations */
55struct nfsd4_client_tracking_ops {
56 int (*init)(struct net *);
57 void (*exit)(struct net *);
58 void (*create)(struct nfs4_client *);
59 void (*remove)(struct nfs4_client *);
60 int (*check)(struct nfs4_client *);
Jeff Layton919b8042014-09-12 16:40:20 -040061 void (*grace_done)(struct nfsd_net *);
Jeff Layton2a4317c2012-03-21 16:42:43 -040062};
63
NeilBrown190e4fb2005-06-23 22:04:25 -070064/* Globals */
J. Bruce Fields48483bf2011-08-26 20:40:28 -040065static char user_recovery_dirname[PATH_MAX] = "/var/lib/nfs/v4recovery";
NeilBrown190e4fb2005-06-23 22:04:25 -070066
David Howellsd84f4f92008-11-14 10:39:23 +110067static int
68nfs4_save_creds(const struct cred **original_creds)
NeilBrown190e4fb2005-06-23 22:04:25 -070069{
David Howellsd84f4f92008-11-14 10:39:23 +110070 struct cred *new;
71
72 new = prepare_creds();
73 if (!new)
74 return -ENOMEM;
75
Eric W. Biederman6fab8772013-02-02 06:53:11 -080076 new->fsuid = GLOBAL_ROOT_UID;
77 new->fsgid = GLOBAL_ROOT_GID;
David Howellsd84f4f92008-11-14 10:39:23 +110078 *original_creds = override_creds(new);
79 put_cred(new);
80 return 0;
NeilBrown190e4fb2005-06-23 22:04:25 -070081}
82
83static void
David Howellsd84f4f92008-11-14 10:39:23 +110084nfs4_reset_creds(const struct cred *original)
NeilBrown190e4fb2005-06-23 22:04:25 -070085{
David Howellsd84f4f92008-11-14 10:39:23 +110086 revert_creds(original);
NeilBrown190e4fb2005-06-23 22:04:25 -070087}
88
NeilBrowna55370a2005-06-23 22:03:52 -070089static void
90md5_to_hex(char *out, char *md5)
91{
92 int i;
93
94 for (i=0; i<16; i++) {
95 unsigned char c = md5[i];
96
97 *out++ = '0' + ((c&0xf0)>>4) + (c>=0xa0)*('a'-'9'-1);
98 *out++ = '0' + (c&0x0f) + ((c&0x0f)>=0x0a)*('a'-'9'-1);
99 }
100 *out = '\0';
101}
102
Jeff Layton2216d442012-11-12 15:00:57 -0500103static int
104nfs4_make_rec_clidname(char *dname, const struct xdr_netobj *clname)
NeilBrowna55370a2005-06-23 22:03:52 -0700105{
106 struct xdr_netobj cksum;
Herbert Xu35058682006-08-24 19:10:20 +1000107 struct hash_desc desc;
Jens Axboe60c74f82007-10-22 19:43:30 +0200108 struct scatterlist sg;
Jeff Layton2216d442012-11-12 15:00:57 -0500109 int status;
NeilBrowna55370a2005-06-23 22:03:52 -0700110
111 dprintk("NFSD: nfs4_make_rec_clidname for %.*s\n",
112 clname->len, clname->data);
Herbert Xu35058682006-08-24 19:10:20 +1000113 desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP;
114 desc.tfm = crypto_alloc_hash("md5", 0, CRYPTO_ALG_ASYNC);
Jeff Layton2216d442012-11-12 15:00:57 -0500115 if (IS_ERR(desc.tfm)) {
116 status = PTR_ERR(desc.tfm);
Herbert Xu35058682006-08-24 19:10:20 +1000117 goto out_no_tfm;
Jeff Layton2216d442012-11-12 15:00:57 -0500118 }
119
Herbert Xu35058682006-08-24 19:10:20 +1000120 cksum.len = crypto_hash_digestsize(desc.tfm);
NeilBrowna55370a2005-06-23 22:03:52 -0700121 cksum.data = kmalloc(cksum.len, GFP_KERNEL);
Jeff Layton2216d442012-11-12 15:00:57 -0500122 if (cksum.data == NULL) {
123 status = -ENOMEM;
NeilBrowna55370a2005-06-23 22:03:52 -0700124 goto out;
Jeff Layton2216d442012-11-12 15:00:57 -0500125 }
NeilBrowna55370a2005-06-23 22:03:52 -0700126
Jens Axboe60c74f82007-10-22 19:43:30 +0200127 sg_init_one(&sg, clname->data, clname->len);
NeilBrowna55370a2005-06-23 22:03:52 -0700128
Jeff Layton2216d442012-11-12 15:00:57 -0500129 status = crypto_hash_digest(&desc, &sg, sg.length, cksum.data);
130 if (status)
Herbert Xu35058682006-08-24 19:10:20 +1000131 goto out;
NeilBrowna55370a2005-06-23 22:03:52 -0700132
133 md5_to_hex(dname, cksum.data);
134
Jeff Layton2216d442012-11-12 15:00:57 -0500135 status = 0;
NeilBrowna55370a2005-06-23 22:03:52 -0700136out:
Krishna Kumar2bd9e7b2008-10-20 11:47:09 +0530137 kfree(cksum.data);
Herbert Xu35058682006-08-24 19:10:20 +1000138 crypto_free_hash(desc.tfm);
139out_no_tfm:
NeilBrowna55370a2005-06-23 22:03:52 -0700140 return status;
141}
NeilBrown190e4fb2005-06-23 22:04:25 -0700142
Jeff Layton2216d442012-11-12 15:00:57 -0500143/*
144 * If we had an error generating the recdir name for the legacy tracker
145 * then warn the admin. If the error doesn't appear to be transient,
146 * then disable recovery tracking.
147 */
148static void
Jeff Layton7255e712013-05-09 08:36:23 -0400149legacy_recdir_name_error(struct nfs4_client *clp, int error)
Jeff Layton2216d442012-11-12 15:00:57 -0500150{
151 printk(KERN_ERR "NFSD: unable to generate recoverydir "
152 "name (%d).\n", error);
153
154 /*
155 * if the algorithm just doesn't exist, then disable the recovery
156 * tracker altogether. The crypto libs will generally return this if
157 * FIPS is enabled as well.
158 */
159 if (error == -ENOENT) {
160 printk(KERN_ERR "NFSD: disabling legacy clientid tracking. "
161 "Reboot recovery will not function correctly!\n");
Jeff Layton7255e712013-05-09 08:36:23 -0400162 nfsd4_client_tracking_exit(clp->net);
Jeff Layton2216d442012-11-12 15:00:57 -0500163 }
164}
165
Jeff Layton2a4317c2012-03-21 16:42:43 -0400166static void
167nfsd4_create_clid_dir(struct nfs4_client *clp)
NeilBrownc7b9a452005-06-23 22:04:30 -0700168{
David Howellsd84f4f92008-11-14 10:39:23 +1100169 const struct cred *original_cred;
Jeff Layton2216d442012-11-12 15:00:57 -0500170 char dname[HEXDIR_LEN];
Christoph Hellwige970a572010-03-22 17:32:14 +0100171 struct dentry *dir, *dentry;
Jeff Layton0ce0c2b2012-11-12 15:00:55 -0500172 struct nfs4_client_reclaim *crp;
NeilBrownc7b9a452005-06-23 22:04:30 -0700173 int status;
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300174 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
NeilBrownc7b9a452005-06-23 22:04:30 -0700175
Jeff Laytona52d7262012-03-21 09:52:02 -0400176 if (test_and_set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
J. Bruce Fields7a6ef8c2012-01-05 15:38:41 -0500177 return;
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300178 if (!nn->rec_file)
J. Bruce Fields7a6ef8c2012-01-05 15:38:41 -0500179 return;
Jeff Layton2216d442012-11-12 15:00:57 -0500180
181 status = nfs4_make_rec_clidname(dname, &clp->cl_name);
182 if (status)
Jeff Layton7255e712013-05-09 08:36:23 -0400183 return legacy_recdir_name_error(clp, status);
Jeff Layton2216d442012-11-12 15:00:57 -0500184
David Howellsd84f4f92008-11-14 10:39:23 +1100185 status = nfs4_save_creds(&original_cred);
186 if (status < 0)
J. Bruce Fields7a6ef8c2012-01-05 15:38:41 -0500187 return;
NeilBrownc7b9a452005-06-23 22:04:30 -0700188
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300189 status = mnt_want_write_file(nn->rec_file);
Jan Kara4a55c102012-06-12 16:20:33 +0200190 if (status)
Kinglong Meec2236f1412014-09-02 22:11:27 +0800191 goto out_creds;
Jan Kara4a55c102012-06-12 16:20:33 +0200192
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300193 dir = nn->rec_file->f_path.dentry;
NeilBrownc7b9a452005-06-23 22:04:30 -0700194 /* lock the parent */
Christoph Hellwige970a572010-03-22 17:32:14 +0100195 mutex_lock(&dir->d_inode->i_mutex);
NeilBrownc7b9a452005-06-23 22:04:30 -0700196
Christoph Hellwige970a572010-03-22 17:32:14 +0100197 dentry = lookup_one_len(dname, dir, HEXDIR_LEN-1);
NeilBrownc7b9a452005-06-23 22:04:30 -0700198 if (IS_ERR(dentry)) {
199 status = PTR_ERR(dentry);
200 goto out_unlock;
201 }
Boaz Harrosh6577aac2011-08-12 17:30:12 -0700202 if (dentry->d_inode)
J. Bruce Fieldsaec39682012-01-02 17:30:05 -0500203 /*
204 * In the 4.1 case, where we're called from
205 * reclaim_complete(), records from the previous reboot
206 * may still be left, so this is OK.
207 *
208 * In the 4.0 case, we should never get here; but we may
209 * as well be forgiving and just succeed silently.
210 */
NeilBrownc7b9a452005-06-23 22:04:30 -0700211 goto out_put;
Christoph Hellwige970a572010-03-22 17:32:14 +0100212 status = vfs_mkdir(dir->d_inode, dentry, S_IRWXU);
NeilBrownc7b9a452005-06-23 22:04:30 -0700213out_put:
214 dput(dentry);
215out_unlock:
Christoph Hellwige970a572010-03-22 17:32:14 +0100216 mutex_unlock(&dir->d_inode->i_mutex);
Jeff Layton0ce0c2b2012-11-12 15:00:55 -0500217 if (status == 0) {
Stanislav Kinsburskyf141f792012-11-26 16:16:30 +0300218 if (nn->in_grace) {
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300219 crp = nfs4_client_to_reclaim(dname, nn);
Jeff Layton0ce0c2b2012-11-12 15:00:55 -0500220 if (crp)
221 crp->cr_clp = clp;
222 }
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300223 vfs_fsync(nn->rec_file, 0);
Jeff Layton0ce0c2b2012-11-12 15:00:55 -0500224 } else {
Boaz Harrosh6577aac2011-08-12 17:30:12 -0700225 printk(KERN_ERR "NFSD: failed to write recovery record"
226 " (err %d); please check that %s exists"
227 " and is writeable", status,
228 user_recovery_dirname);
Jeff Layton0ce0c2b2012-11-12 15:00:55 -0500229 }
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300230 mnt_drop_write_file(nn->rec_file);
Kinglong Meec2236f1412014-09-02 22:11:27 +0800231out_creds:
David Howellsd84f4f92008-11-14 10:39:23 +1100232 nfs4_reset_creds(original_cred);
NeilBrownc7b9a452005-06-23 22:04:30 -0700233}
234
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300235typedef int (recdir_func)(struct dentry *, struct dentry *, struct nfsd_net *);
NeilBrown190e4fb2005-06-23 22:04:25 -0700236
J. Bruce Fields05f4f672009-03-13 16:02:59 -0400237struct name_list {
238 char name[HEXDIR_LEN];
NeilBrown190e4fb2005-06-23 22:04:25 -0700239 struct list_head list;
240};
241
Al Virobb6f6192013-05-15 18:49:12 -0400242struct nfs4_dir_ctx {
243 struct dir_context ctx;
244 struct list_head names;
245};
246
NeilBrown190e4fb2005-06-23 22:04:25 -0700247static int
J. Bruce Fields05f4f672009-03-13 16:02:59 -0400248nfsd4_build_namelist(void *arg, const char *name, int namlen,
David Howellsafefdbb2006-10-03 01:13:46 -0700249 loff_t offset, u64 ino, unsigned int d_type)
NeilBrown190e4fb2005-06-23 22:04:25 -0700250{
Al Virobb6f6192013-05-15 18:49:12 -0400251 struct nfs4_dir_ctx *ctx = arg;
J. Bruce Fields05f4f672009-03-13 16:02:59 -0400252 struct name_list *entry;
NeilBrown190e4fb2005-06-23 22:04:25 -0700253
J. Bruce Fields05f4f672009-03-13 16:02:59 -0400254 if (namlen != HEXDIR_LEN - 1)
Al Virob37ad282006-10-19 23:28:59 -0700255 return 0;
J. Bruce Fields05f4f672009-03-13 16:02:59 -0400256 entry = kmalloc(sizeof(struct name_list), GFP_KERNEL);
257 if (entry == NULL)
NeilBrown190e4fb2005-06-23 22:04:25 -0700258 return -ENOMEM;
J. Bruce Fields05f4f672009-03-13 16:02:59 -0400259 memcpy(entry->name, name, HEXDIR_LEN - 1);
260 entry->name[HEXDIR_LEN - 1] = '\0';
Al Virobb6f6192013-05-15 18:49:12 -0400261 list_add(&entry->list, &ctx->names);
NeilBrown190e4fb2005-06-23 22:04:25 -0700262 return 0;
263}
264
265static int
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300266nfsd4_list_rec_dir(recdir_func *f, struct nfsd_net *nn)
NeilBrown190e4fb2005-06-23 22:04:25 -0700267{
David Howellsd84f4f92008-11-14 10:39:23 +1100268 const struct cred *original_cred;
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300269 struct dentry *dir = nn->rec_file->f_path.dentry;
Al Viroac6614b2013-05-22 22:22:04 -0400270 struct nfs4_dir_ctx ctx = {
271 .ctx.actor = nfsd4_build_namelist,
272 .names = LIST_HEAD_INIT(ctx.names)
273 };
NeilBrown190e4fb2005-06-23 22:04:25 -0700274 int status;
275
David Howellsd84f4f92008-11-14 10:39:23 +1100276 status = nfs4_save_creds(&original_cred);
277 if (status < 0)
278 return status;
NeilBrown190e4fb2005-06-23 22:04:25 -0700279
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300280 status = vfs_llseek(nn->rec_file, 0, SEEK_SET);
Al Viro5b4b2992011-07-07 18:43:21 -0400281 if (status < 0) {
282 nfs4_reset_creds(original_cred);
283 return status;
284 }
285
Al Viro5c0ba4e2013-05-15 13:52:59 -0400286 status = iterate_dir(nn->rec_file, &ctx.ctx);
J. Bruce Fields8daed1e2009-05-11 16:10:19 -0400287 mutex_lock_nested(&dir->d_inode->i_mutex, I_MUTEX_PARENT);
Al Viro5c0ba4e2013-05-15 13:52:59 -0400288 while (!list_empty(&ctx.names)) {
Al Viro5b4b2992011-07-07 18:43:21 -0400289 struct name_list *entry;
Al Viro5c0ba4e2013-05-15 13:52:59 -0400290 entry = list_entry(ctx.names.next, struct name_list, list);
Al Viro5b4b2992011-07-07 18:43:21 -0400291 if (!status) {
292 struct dentry *dentry;
293 dentry = lookup_one_len(entry->name, dir, HEXDIR_LEN-1);
294 if (IS_ERR(dentry)) {
295 status = PTR_ERR(dentry);
296 break;
297 }
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300298 status = f(dir, dentry, nn);
Al Viro5b4b2992011-07-07 18:43:21 -0400299 dput(dentry);
J. Bruce Fields05f4f672009-03-13 16:02:59 -0400300 }
J. Bruce Fields05f4f672009-03-13 16:02:59 -0400301 list_del(&entry->list);
302 kfree(entry);
NeilBrown190e4fb2005-06-23 22:04:25 -0700303 }
David Woodhouse2f9092e2009-04-20 23:18:37 +0100304 mutex_unlock(&dir->d_inode->i_mutex);
David Howellsd84f4f92008-11-14 10:39:23 +1100305 nfs4_reset_creds(original_cred);
NeilBrown190e4fb2005-06-23 22:04:25 -0700306 return status;
307}
308
309static int
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300310nfsd4_unlink_clid_dir(char *name, int namlen, struct nfsd_net *nn)
NeilBrownc7b9a452005-06-23 22:04:30 -0700311{
Christoph Hellwige970a572010-03-22 17:32:14 +0100312 struct dentry *dir, *dentry;
NeilBrownc7b9a452005-06-23 22:04:30 -0700313 int status;
314
315 dprintk("NFSD: nfsd4_unlink_clid_dir. name %.*s\n", namlen, name);
316
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300317 dir = nn->rec_file->f_path.dentry;
Christoph Hellwige970a572010-03-22 17:32:14 +0100318 mutex_lock_nested(&dir->d_inode->i_mutex, I_MUTEX_PARENT);
319 dentry = lookup_one_len(name, dir, namlen);
NeilBrownc7b9a452005-06-23 22:04:30 -0700320 if (IS_ERR(dentry)) {
321 status = PTR_ERR(dentry);
David Woodhouse2f9092e2009-04-20 23:18:37 +0100322 goto out_unlock;
NeilBrownc7b9a452005-06-23 22:04:30 -0700323 }
324 status = -ENOENT;
325 if (!dentry->d_inode)
326 goto out;
Christoph Hellwige970a572010-03-22 17:32:14 +0100327 status = vfs_rmdir(dir->d_inode, dentry);
NeilBrownc7b9a452005-06-23 22:04:30 -0700328out:
329 dput(dentry);
David Woodhouse2f9092e2009-04-20 23:18:37 +0100330out_unlock:
Christoph Hellwige970a572010-03-22 17:32:14 +0100331 mutex_unlock(&dir->d_inode->i_mutex);
NeilBrownc7b9a452005-06-23 22:04:30 -0700332 return status;
333}
334
Jeff Layton2a4317c2012-03-21 16:42:43 -0400335static void
NeilBrownc7b9a452005-06-23 22:04:30 -0700336nfsd4_remove_clid_dir(struct nfs4_client *clp)
337{
David Howellsd84f4f92008-11-14 10:39:23 +1100338 const struct cred *original_cred;
Jeff Layton0ce0c2b2012-11-12 15:00:55 -0500339 struct nfs4_client_reclaim *crp;
Jeff Layton2216d442012-11-12 15:00:57 -0500340 char dname[HEXDIR_LEN];
NeilBrownc7b9a452005-06-23 22:04:30 -0700341 int status;
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300342 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
NeilBrownc7b9a452005-06-23 22:04:30 -0700343
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300344 if (!nn->rec_file || !test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
NeilBrownc7b9a452005-06-23 22:04:30 -0700345 return;
346
Jeff Layton2216d442012-11-12 15:00:57 -0500347 status = nfs4_make_rec_clidname(dname, &clp->cl_name);
348 if (status)
Jeff Layton7255e712013-05-09 08:36:23 -0400349 return legacy_recdir_name_error(clp, status);
Jeff Layton2216d442012-11-12 15:00:57 -0500350
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300351 status = mnt_want_write_file(nn->rec_file);
Dave Hansen06227532008-02-15 14:37:34 -0800352 if (status)
353 goto out;
Jeff Laytona52d7262012-03-21 09:52:02 -0400354 clear_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
David Howellsd84f4f92008-11-14 10:39:23 +1100355
356 status = nfs4_save_creds(&original_cred);
357 if (status < 0)
Jeff Layton698d8d82012-11-09 15:31:53 -0500358 goto out_drop_write;
David Howellsd84f4f92008-11-14 10:39:23 +1100359
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300360 status = nfsd4_unlink_clid_dir(dname, HEXDIR_LEN-1, nn);
David Howellsd84f4f92008-11-14 10:39:23 +1100361 nfs4_reset_creds(original_cred);
Jeff Layton0ce0c2b2012-11-12 15:00:55 -0500362 if (status == 0) {
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300363 vfs_fsync(nn->rec_file, 0);
Stanislav Kinsburskyf141f792012-11-26 16:16:30 +0300364 if (nn->in_grace) {
Jeff Layton0ce0c2b2012-11-12 15:00:55 -0500365 /* remove reclaim record */
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300366 crp = nfsd4_find_reclaim_client(dname, nn);
Jeff Layton0ce0c2b2012-11-12 15:00:55 -0500367 if (crp)
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300368 nfs4_remove_reclaim_record(crp, nn);
Jeff Layton0ce0c2b2012-11-12 15:00:55 -0500369 }
370 }
Jeff Layton698d8d82012-11-09 15:31:53 -0500371out_drop_write:
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300372 mnt_drop_write_file(nn->rec_file);
Dave Hansen06227532008-02-15 14:37:34 -0800373out:
NeilBrownc7b9a452005-06-23 22:04:30 -0700374 if (status)
375 printk("NFSD: Failed to remove expired client state directory"
Jeff Layton2216d442012-11-12 15:00:57 -0500376 " %.*s\n", HEXDIR_LEN, dname);
NeilBrownc7b9a452005-06-23 22:04:30 -0700377}
378
379static int
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300380purge_old(struct dentry *parent, struct dentry *child, struct nfsd_net *nn)
NeilBrownc7b9a452005-06-23 22:04:30 -0700381{
382 int status;
383
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300384 if (nfs4_has_reclaimed_state(child->d_name.name, nn))
Al Virob37ad282006-10-19 23:28:59 -0700385 return 0;
NeilBrownc7b9a452005-06-23 22:04:30 -0700386
David Woodhouse2f9092e2009-04-20 23:18:37 +0100387 status = vfs_rmdir(parent->d_inode, child);
NeilBrownc7b9a452005-06-23 22:04:30 -0700388 if (status)
Al Viroa6a9f182013-09-16 10:57:01 -0400389 printk("failed to remove client recovery directory %pd\n",
390 child);
NeilBrownc7b9a452005-06-23 22:04:30 -0700391 /* Keep trying, success or failure: */
Al Virob37ad282006-10-19 23:28:59 -0700392 return 0;
NeilBrownc7b9a452005-06-23 22:04:30 -0700393}
394
Jeff Layton2a4317c2012-03-21 16:42:43 -0400395static void
Jeff Layton919b8042014-09-12 16:40:20 -0400396nfsd4_recdir_purge_old(struct nfsd_net *nn)
Jeff Layton2a4317c2012-03-21 16:42:43 -0400397{
NeilBrownc7b9a452005-06-23 22:04:30 -0700398 int status;
399
Stanislav Kinsburskyf141f792012-11-26 16:16:30 +0300400 nn->in_grace = false;
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300401 if (!nn->rec_file)
NeilBrownc7b9a452005-06-23 22:04:30 -0700402 return;
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300403 status = mnt_want_write_file(nn->rec_file);
Dave Hansen06227532008-02-15 14:37:34 -0800404 if (status)
405 goto out;
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300406 status = nfsd4_list_rec_dir(purge_old, nn);
NeilBrownc7b9a452005-06-23 22:04:30 -0700407 if (status == 0)
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300408 vfs_fsync(nn->rec_file, 0);
409 mnt_drop_write_file(nn->rec_file);
Dave Hansen06227532008-02-15 14:37:34 -0800410out:
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300411 nfs4_release_reclaim(nn);
NeilBrownc7b9a452005-06-23 22:04:30 -0700412 if (status)
413 printk("nfsd4: failed to purge old clients from recovery"
Al Viroa6a9f182013-09-16 10:57:01 -0400414 " directory %pD\n", nn->rec_file);
NeilBrownc7b9a452005-06-23 22:04:30 -0700415}
416
417static int
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300418load_recdir(struct dentry *parent, struct dentry *child, struct nfsd_net *nn)
NeilBrown190e4fb2005-06-23 22:04:25 -0700419{
420 if (child->d_name.len != HEXDIR_LEN - 1) {
Al Viroa6a9f182013-09-16 10:57:01 -0400421 printk("nfsd4: illegal name %pd in recovery directory\n",
422 child);
NeilBrown190e4fb2005-06-23 22:04:25 -0700423 /* Keep trying; maybe the others are OK: */
Al Virob37ad282006-10-19 23:28:59 -0700424 return 0;
NeilBrown190e4fb2005-06-23 22:04:25 -0700425 }
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300426 nfs4_client_to_reclaim(child->d_name.name, nn);
Al Virob37ad282006-10-19 23:28:59 -0700427 return 0;
NeilBrown190e4fb2005-06-23 22:04:25 -0700428}
429
Jeff Layton2a4317c2012-03-21 16:42:43 -0400430static int
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300431nfsd4_recdir_load(struct net *net) {
NeilBrown190e4fb2005-06-23 22:04:25 -0700432 int status;
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300433 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
NeilBrown190e4fb2005-06-23 22:04:25 -0700434
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300435 if (!nn->rec_file)
Christoph Hellwige970a572010-03-22 17:32:14 +0100436 return 0;
437
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300438 status = nfsd4_list_rec_dir(load_recdir, nn);
NeilBrown190e4fb2005-06-23 22:04:25 -0700439 if (status)
440 printk("nfsd4: failed loading clients from recovery"
Al Viroa6a9f182013-09-16 10:57:01 -0400441 " directory %pD\n", nn->rec_file);
NeilBrown190e4fb2005-06-23 22:04:25 -0700442 return status;
443}
444
445/*
446 * Hold reference to the recovery directory.
447 */
448
Jeff Layton2a4317c2012-03-21 16:42:43 -0400449static int
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300450nfsd4_init_recdir(struct net *net)
NeilBrown190e4fb2005-06-23 22:04:25 -0700451{
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300452 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
David Howellsd84f4f92008-11-14 10:39:23 +1100453 const struct cred *original_cred;
454 int status;
NeilBrown190e4fb2005-06-23 22:04:25 -0700455
456 printk("NFSD: Using %s as the NFSv4 state recovery directory\n",
J. Bruce Fields48483bf2011-08-26 20:40:28 -0400457 user_recovery_dirname);
NeilBrown190e4fb2005-06-23 22:04:25 -0700458
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300459 BUG_ON(nn->rec_file);
NeilBrown190e4fb2005-06-23 22:04:25 -0700460
David Howellsd84f4f92008-11-14 10:39:23 +1100461 status = nfs4_save_creds(&original_cred);
462 if (status < 0) {
463 printk("NFSD: Unable to change credentials to find recovery"
464 " directory: error %d\n",
465 status);
Jeff Layton2a4317c2012-03-21 16:42:43 -0400466 return status;
David Howellsd84f4f92008-11-14 10:39:23 +1100467 }
NeilBrown190e4fb2005-06-23 22:04:25 -0700468
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300469 nn->rec_file = filp_open(user_recovery_dirname, O_RDONLY | O_DIRECTORY, 0);
470 if (IS_ERR(nn->rec_file)) {
J. Bruce Fieldsc2642ab2006-01-18 17:43:29 -0800471 printk("NFSD: unable to find recovery directory %s\n",
J. Bruce Fields48483bf2011-08-26 20:40:28 -0400472 user_recovery_dirname);
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300473 status = PTR_ERR(nn->rec_file);
474 nn->rec_file = NULL;
Christoph Hellwige970a572010-03-22 17:32:14 +0100475 }
NeilBrown190e4fb2005-06-23 22:04:25 -0700476
David Howellsd84f4f92008-11-14 10:39:23 +1100477 nfs4_reset_creds(original_cred);
Jeff Layton0ce0c2b2012-11-12 15:00:55 -0500478 if (!status)
Stanislav Kinsburskyf141f792012-11-26 16:16:30 +0300479 nn->in_grace = true;
Jeff Layton2a4317c2012-03-21 16:42:43 -0400480 return status;
NeilBrown190e4fb2005-06-23 22:04:25 -0700481}
482
Kinglong Mee15d176c2014-09-02 22:12:17 +0800483static void
484nfsd4_shutdown_recdir(struct net *net)
485{
486 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
487
488 if (!nn->rec_file)
489 return;
490 fput(nn->rec_file);
491 nn->rec_file = NULL;
492}
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300493
494static int
495nfs4_legacy_state_init(struct net *net)
496{
497 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
498 int i;
499
500 nn->reclaim_str_hashtbl = kmalloc(sizeof(struct list_head) *
501 CLIENT_HASH_SIZE, GFP_KERNEL);
502 if (!nn->reclaim_str_hashtbl)
503 return -ENOMEM;
504
505 for (i = 0; i < CLIENT_HASH_SIZE; i++)
506 INIT_LIST_HEAD(&nn->reclaim_str_hashtbl[i]);
507 nn->reclaim_str_hashtbl_size = 0;
508
509 return 0;
510}
511
512static void
513nfs4_legacy_state_shutdown(struct net *net)
514{
515 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
516
517 kfree(nn->reclaim_str_hashtbl);
518}
519
Jeff Layton2a4317c2012-03-21 16:42:43 -0400520static int
521nfsd4_load_reboot_recovery_data(struct net *net)
522{
523 int status;
524
Stanislav Kinsbursky3a073362012-11-26 16:16:25 +0300525 status = nfsd4_init_recdir(net);
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300526 if (status)
Kinglong Mee15d176c2014-09-02 22:12:17 +0800527 return status;
528
529 status = nfsd4_recdir_load(net);
530 if (status)
531 nfsd4_shutdown_recdir(net);
532
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300533 return status;
534}
535
536static int
537nfsd4_legacy_tracking_init(struct net *net)
538{
539 int status;
540
Jeff Laytoncc27e0d2012-03-21 09:52:09 -0400541 /* XXX: The legacy code won't work in a container */
542 if (net != &init_net) {
543 WARN(1, KERN_ERR "NFSD: attempt to initialize legacy client "
544 "tracking in a container!\n");
545 return -EINVAL;
546 }
547
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300548 status = nfs4_legacy_state_init(net);
Jeff Layton2a4317c2012-03-21 16:42:43 -0400549 if (status)
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300550 return status;
551
552 status = nfsd4_load_reboot_recovery_data(net);
553 if (status)
554 goto err;
555 return 0;
556
557err:
558 nfs4_legacy_state_shutdown(net);
Jeff Layton2a4317c2012-03-21 16:42:43 -0400559 return status;
560}
561
562static void
Jeff Layton2a4317c2012-03-21 16:42:43 -0400563nfsd4_legacy_tracking_exit(struct net *net)
564{
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300565 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
566
567 nfs4_release_reclaim(nn);
Kinglong Mee15d176c2014-09-02 22:12:17 +0800568 nfsd4_shutdown_recdir(net);
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300569 nfs4_legacy_state_shutdown(net);
Jeff Layton2a4317c2012-03-21 16:42:43 -0400570}
571
J. Bruce Fields48483bf2011-08-26 20:40:28 -0400572/*
573 * Change the NFSv4 recovery directory to recdir.
574 */
575int
576nfs4_reset_recoverydir(char *recdir)
577{
578 int status;
579 struct path path;
580
581 status = kern_path(recdir, LOOKUP_FOLLOW, &path);
582 if (status)
583 return status;
584 status = -ENOTDIR;
585 if (S_ISDIR(path.dentry->d_inode->i_mode)) {
586 strcpy(user_recovery_dirname, recdir);
587 status = 0;
588 }
589 path_put(&path);
590 return status;
591}
592
593char *
594nfs4_recoverydir(void)
595{
596 return user_recovery_dirname;
597}
Jeff Layton2a4317c2012-03-21 16:42:43 -0400598
599static int
600nfsd4_check_legacy_client(struct nfs4_client *clp)
601{
Jeff Layton2216d442012-11-12 15:00:57 -0500602 int status;
603 char dname[HEXDIR_LEN];
Jeff Layton0ce0c2b2012-11-12 15:00:55 -0500604 struct nfs4_client_reclaim *crp;
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300605 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
Jeff Layton0ce0c2b2012-11-12 15:00:55 -0500606
Jeff Layton2a4317c2012-03-21 16:42:43 -0400607 /* did we already find that this client is stable? */
608 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
609 return 0;
610
Jeff Layton2216d442012-11-12 15:00:57 -0500611 status = nfs4_make_rec_clidname(dname, &clp->cl_name);
612 if (status) {
Jeff Layton7255e712013-05-09 08:36:23 -0400613 legacy_recdir_name_error(clp, status);
Jeff Layton2216d442012-11-12 15:00:57 -0500614 return status;
615 }
616
Jeff Layton2a4317c2012-03-21 16:42:43 -0400617 /* look for it in the reclaim hashtable otherwise */
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300618 crp = nfsd4_find_reclaim_client(dname, nn);
Jeff Layton0ce0c2b2012-11-12 15:00:55 -0500619 if (crp) {
Jeff Layton2a4317c2012-03-21 16:42:43 -0400620 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
Jeff Layton0ce0c2b2012-11-12 15:00:55 -0500621 crp->cr_clp = clp;
Jeff Layton2a4317c2012-03-21 16:42:43 -0400622 return 0;
623 }
624
625 return -ENOENT;
626}
627
628static struct nfsd4_client_tracking_ops nfsd4_legacy_tracking_ops = {
Stanislav Kinsbursky52e19c02012-11-14 18:21:16 +0300629 .init = nfsd4_legacy_tracking_init,
Jeff Layton2a4317c2012-03-21 16:42:43 -0400630 .exit = nfsd4_legacy_tracking_exit,
631 .create = nfsd4_create_clid_dir,
632 .remove = nfsd4_remove_clid_dir,
633 .check = nfsd4_check_legacy_client,
634 .grace_done = nfsd4_recdir_purge_old,
635};
636
Jeff Laytonf3f80142012-03-21 09:52:07 -0400637/* Globals */
638#define NFSD_PIPE_DIR "nfsd"
639#define NFSD_CLD_PIPE "cld"
640
641/* per-net-ns structure for holding cld upcall info */
642struct cld_net {
643 struct rpc_pipe *cn_pipe;
644 spinlock_t cn_lock;
645 struct list_head cn_list;
646 unsigned int cn_xid;
647};
648
649struct cld_upcall {
650 struct list_head cu_list;
651 struct cld_net *cu_net;
652 struct task_struct *cu_task;
653 struct cld_msg cu_msg;
654};
655
656static int
657__cld_pipe_upcall(struct rpc_pipe *pipe, struct cld_msg *cmsg)
658{
659 int ret;
660 struct rpc_pipe_msg msg;
661
662 memset(&msg, 0, sizeof(msg));
663 msg.data = cmsg;
664 msg.len = sizeof(*cmsg);
665
666 /*
667 * Set task state before we queue the upcall. That prevents
668 * wake_up_process in the downcall from racing with schedule.
669 */
670 set_current_state(TASK_UNINTERRUPTIBLE);
671 ret = rpc_queue_upcall(pipe, &msg);
672 if (ret < 0) {
673 set_current_state(TASK_RUNNING);
674 goto out;
675 }
676
677 schedule();
Jeff Laytonf3f80142012-03-21 09:52:07 -0400678
679 if (msg.errno < 0)
680 ret = msg.errno;
681out:
682 return ret;
683}
684
685static int
686cld_pipe_upcall(struct rpc_pipe *pipe, struct cld_msg *cmsg)
687{
688 int ret;
689
690 /*
691 * -EAGAIN occurs when pipe is closed and reopened while there are
692 * upcalls queued.
693 */
694 do {
695 ret = __cld_pipe_upcall(pipe, cmsg);
696 } while (ret == -EAGAIN);
697
698 return ret;
699}
700
701static ssize_t
702cld_pipe_downcall(struct file *filp, const char __user *src, size_t mlen)
703{
704 struct cld_upcall *tmp, *cup;
J. Bruce Fieldsbc1b5422012-04-25 16:58:05 -0400705 struct cld_msg __user *cmsg = (struct cld_msg __user *)src;
Jeff Laytonf3f80142012-03-21 09:52:07 -0400706 uint32_t xid;
707 struct nfsd_net *nn = net_generic(filp->f_dentry->d_sb->s_fs_info,
708 nfsd_net_id);
709 struct cld_net *cn = nn->cld_net;
710
711 if (mlen != sizeof(*cmsg)) {
Randy Dunlap8a7dc4b2012-04-30 12:25:31 -0700712 dprintk("%s: got %zu bytes, expected %zu\n", __func__, mlen,
Jeff Laytonf3f80142012-03-21 09:52:07 -0400713 sizeof(*cmsg));
714 return -EINVAL;
715 }
716
717 /* copy just the xid so we can try to find that */
718 if (copy_from_user(&xid, &cmsg->cm_xid, sizeof(xid)) != 0) {
719 dprintk("%s: error when copying xid from userspace", __func__);
720 return -EFAULT;
721 }
722
723 /* walk the list and find corresponding xid */
724 cup = NULL;
725 spin_lock(&cn->cn_lock);
726 list_for_each_entry(tmp, &cn->cn_list, cu_list) {
727 if (get_unaligned(&tmp->cu_msg.cm_xid) == xid) {
728 cup = tmp;
729 list_del_init(&cup->cu_list);
730 break;
731 }
732 }
733 spin_unlock(&cn->cn_lock);
734
735 /* couldn't find upcall? */
736 if (!cup) {
Jeff Layton21f72c92012-03-28 07:36:01 -0400737 dprintk("%s: couldn't find upcall -- xid=%u\n", __func__, xid);
Jeff Laytonf3f80142012-03-21 09:52:07 -0400738 return -EINVAL;
739 }
740
741 if (copy_from_user(&cup->cu_msg, src, mlen) != 0)
742 return -EFAULT;
743
744 wake_up_process(cup->cu_task);
745 return mlen;
746}
747
748static void
749cld_pipe_destroy_msg(struct rpc_pipe_msg *msg)
750{
751 struct cld_msg *cmsg = msg->data;
752 struct cld_upcall *cup = container_of(cmsg, struct cld_upcall,
753 cu_msg);
754
755 /* errno >= 0 means we got a downcall */
756 if (msg->errno >= 0)
757 return;
758
759 wake_up_process(cup->cu_task);
760}
761
762static const struct rpc_pipe_ops cld_upcall_ops = {
763 .upcall = rpc_pipe_generic_upcall,
764 .downcall = cld_pipe_downcall,
765 .destroy_msg = cld_pipe_destroy_msg,
766};
767
768static struct dentry *
769nfsd4_cld_register_sb(struct super_block *sb, struct rpc_pipe *pipe)
770{
771 struct dentry *dir, *dentry;
772
773 dir = rpc_d_lookup_sb(sb, NFSD_PIPE_DIR);
774 if (dir == NULL)
775 return ERR_PTR(-ENOENT);
776 dentry = rpc_mkpipe_dentry(dir, NFSD_CLD_PIPE, NULL, pipe);
777 dput(dir);
778 return dentry;
779}
780
781static void
782nfsd4_cld_unregister_sb(struct rpc_pipe *pipe)
783{
784 if (pipe->dentry)
785 rpc_unlink(pipe->dentry);
786}
787
788static struct dentry *
789nfsd4_cld_register_net(struct net *net, struct rpc_pipe *pipe)
790{
791 struct super_block *sb;
792 struct dentry *dentry;
793
794 sb = rpc_get_sb_net(net);
795 if (!sb)
796 return NULL;
797 dentry = nfsd4_cld_register_sb(sb, pipe);
798 rpc_put_sb_net(net);
799 return dentry;
800}
801
802static void
803nfsd4_cld_unregister_net(struct net *net, struct rpc_pipe *pipe)
804{
805 struct super_block *sb;
806
807 sb = rpc_get_sb_net(net);
808 if (sb) {
809 nfsd4_cld_unregister_sb(pipe);
810 rpc_put_sb_net(net);
811 }
812}
813
814/* Initialize rpc_pipefs pipe for communication with client tracking daemon */
815static int
816nfsd4_init_cld_pipe(struct net *net)
817{
818 int ret;
819 struct dentry *dentry;
820 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
821 struct cld_net *cn;
822
823 if (nn->cld_net)
824 return 0;
825
826 cn = kzalloc(sizeof(*cn), GFP_KERNEL);
827 if (!cn) {
828 ret = -ENOMEM;
829 goto err;
830 }
831
832 cn->cn_pipe = rpc_mkpipe_data(&cld_upcall_ops, RPC_PIPE_WAIT_FOR_OPEN);
833 if (IS_ERR(cn->cn_pipe)) {
834 ret = PTR_ERR(cn->cn_pipe);
835 goto err;
836 }
837 spin_lock_init(&cn->cn_lock);
838 INIT_LIST_HEAD(&cn->cn_list);
839
840 dentry = nfsd4_cld_register_net(net, cn->cn_pipe);
841 if (IS_ERR(dentry)) {
842 ret = PTR_ERR(dentry);
843 goto err_destroy_data;
844 }
845
846 cn->cn_pipe->dentry = dentry;
847 nn->cld_net = cn;
848 return 0;
849
850err_destroy_data:
851 rpc_destroy_pipe_data(cn->cn_pipe);
852err:
853 kfree(cn);
854 printk(KERN_ERR "NFSD: unable to create nfsdcld upcall pipe (%d)\n",
855 ret);
856 return ret;
857}
858
859static void
860nfsd4_remove_cld_pipe(struct net *net)
861{
862 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
863 struct cld_net *cn = nn->cld_net;
864
865 nfsd4_cld_unregister_net(net, cn->cn_pipe);
866 rpc_destroy_pipe_data(cn->cn_pipe);
867 kfree(nn->cld_net);
868 nn->cld_net = NULL;
869}
870
871static struct cld_upcall *
872alloc_cld_upcall(struct cld_net *cn)
873{
874 struct cld_upcall *new, *tmp;
875
876 new = kzalloc(sizeof(*new), GFP_KERNEL);
877 if (!new)
878 return new;
879
880 /* FIXME: hard cap on number in flight? */
881restart_search:
882 spin_lock(&cn->cn_lock);
883 list_for_each_entry(tmp, &cn->cn_list, cu_list) {
884 if (tmp->cu_msg.cm_xid == cn->cn_xid) {
885 cn->cn_xid++;
886 spin_unlock(&cn->cn_lock);
887 goto restart_search;
888 }
889 }
890 new->cu_task = current;
891 new->cu_msg.cm_vers = CLD_UPCALL_VERSION;
892 put_unaligned(cn->cn_xid++, &new->cu_msg.cm_xid);
893 new->cu_net = cn;
894 list_add(&new->cu_list, &cn->cn_list);
895 spin_unlock(&cn->cn_lock);
896
897 dprintk("%s: allocated xid %u\n", __func__, new->cu_msg.cm_xid);
898
899 return new;
900}
901
902static void
903free_cld_upcall(struct cld_upcall *victim)
904{
905 struct cld_net *cn = victim->cu_net;
906
907 spin_lock(&cn->cn_lock);
908 list_del(&victim->cu_list);
909 spin_unlock(&cn->cn_lock);
910 kfree(victim);
911}
912
913/* Ask daemon to create a new record */
914static void
915nfsd4_cld_create(struct nfs4_client *clp)
916{
917 int ret;
918 struct cld_upcall *cup;
Stanislav Kinsburskyc212cec2012-11-14 18:21:10 +0300919 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
Jeff Laytonf3f80142012-03-21 09:52:07 -0400920 struct cld_net *cn = nn->cld_net;
921
922 /* Don't upcall if it's already stored */
923 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
924 return;
925
926 cup = alloc_cld_upcall(cn);
927 if (!cup) {
928 ret = -ENOMEM;
929 goto out_err;
930 }
931
932 cup->cu_msg.cm_cmd = Cld_Create;
933 cup->cu_msg.cm_u.cm_name.cn_len = clp->cl_name.len;
934 memcpy(cup->cu_msg.cm_u.cm_name.cn_id, clp->cl_name.data,
935 clp->cl_name.len);
936
937 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
938 if (!ret) {
939 ret = cup->cu_msg.cm_status;
940 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
941 }
942
943 free_cld_upcall(cup);
944out_err:
945 if (ret)
946 printk(KERN_ERR "NFSD: Unable to create client "
947 "record on stable storage: %d\n", ret);
948}
949
950/* Ask daemon to create a new record */
951static void
952nfsd4_cld_remove(struct nfs4_client *clp)
953{
954 int ret;
955 struct cld_upcall *cup;
Stanislav Kinsburskyc212cec2012-11-14 18:21:10 +0300956 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
Jeff Laytonf3f80142012-03-21 09:52:07 -0400957 struct cld_net *cn = nn->cld_net;
958
959 /* Don't upcall if it's already removed */
960 if (!test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
961 return;
962
963 cup = alloc_cld_upcall(cn);
964 if (!cup) {
965 ret = -ENOMEM;
966 goto out_err;
967 }
968
969 cup->cu_msg.cm_cmd = Cld_Remove;
970 cup->cu_msg.cm_u.cm_name.cn_len = clp->cl_name.len;
971 memcpy(cup->cu_msg.cm_u.cm_name.cn_id, clp->cl_name.data,
972 clp->cl_name.len);
973
974 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
975 if (!ret) {
976 ret = cup->cu_msg.cm_status;
977 clear_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
978 }
979
980 free_cld_upcall(cup);
981out_err:
982 if (ret)
983 printk(KERN_ERR "NFSD: Unable to remove client "
984 "record from stable storage: %d\n", ret);
985}
986
987/* Check for presence of a record, and update its timestamp */
988static int
989nfsd4_cld_check(struct nfs4_client *clp)
990{
991 int ret;
992 struct cld_upcall *cup;
Stanislav Kinsburskyc212cec2012-11-14 18:21:10 +0300993 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
Jeff Laytonf3f80142012-03-21 09:52:07 -0400994 struct cld_net *cn = nn->cld_net;
995
996 /* Don't upcall if one was already stored during this grace pd */
997 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
998 return 0;
999
1000 cup = alloc_cld_upcall(cn);
1001 if (!cup) {
1002 printk(KERN_ERR "NFSD: Unable to check client record on "
1003 "stable storage: %d\n", -ENOMEM);
1004 return -ENOMEM;
1005 }
1006
1007 cup->cu_msg.cm_cmd = Cld_Check;
1008 cup->cu_msg.cm_u.cm_name.cn_len = clp->cl_name.len;
1009 memcpy(cup->cu_msg.cm_u.cm_name.cn_id, clp->cl_name.data,
1010 clp->cl_name.len);
1011
1012 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
1013 if (!ret) {
1014 ret = cup->cu_msg.cm_status;
1015 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
1016 }
1017
1018 free_cld_upcall(cup);
1019 return ret;
1020}
1021
1022static void
Jeff Layton919b8042014-09-12 16:40:20 -04001023nfsd4_cld_grace_done(struct nfsd_net *nn)
Jeff Laytonf3f80142012-03-21 09:52:07 -04001024{
1025 int ret;
1026 struct cld_upcall *cup;
Jeff Laytonf3f80142012-03-21 09:52:07 -04001027 struct cld_net *cn = nn->cld_net;
1028
1029 cup = alloc_cld_upcall(cn);
1030 if (!cup) {
1031 ret = -ENOMEM;
1032 goto out_err;
1033 }
1034
1035 cup->cu_msg.cm_cmd = Cld_GraceDone;
Jeff Layton919b8042014-09-12 16:40:20 -04001036 cup->cu_msg.cm_u.cm_gracetime = (int64_t)nn->boot_time;
Jeff Laytonf3f80142012-03-21 09:52:07 -04001037 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
1038 if (!ret)
1039 ret = cup->cu_msg.cm_status;
1040
1041 free_cld_upcall(cup);
1042out_err:
1043 if (ret)
1044 printk(KERN_ERR "NFSD: Unable to end grace period: %d\n", ret);
1045}
1046
1047static struct nfsd4_client_tracking_ops nfsd4_cld_tracking_ops = {
1048 .init = nfsd4_init_cld_pipe,
1049 .exit = nfsd4_remove_cld_pipe,
1050 .create = nfsd4_cld_create,
1051 .remove = nfsd4_cld_remove,
1052 .check = nfsd4_cld_check,
1053 .grace_done = nfsd4_cld_grace_done,
1054};
1055
Jeff Layton2873d212012-11-12 15:00:48 -05001056/* upcall via usermodehelper */
1057static char cltrack_prog[PATH_MAX] = "/sbin/nfsdcltrack";
1058module_param_string(cltrack_prog, cltrack_prog, sizeof(cltrack_prog),
1059 S_IRUGO|S_IWUSR);
1060MODULE_PARM_DESC(cltrack_prog, "Path to the nfsdcltrack upcall program");
1061
Jeff Laytonf3aa7e242012-11-12 15:00:50 -05001062static bool cltrack_legacy_disable;
1063module_param(cltrack_legacy_disable, bool, S_IRUGO|S_IWUSR);
1064MODULE_PARM_DESC(cltrack_legacy_disable,
1065 "Disable legacy recoverydir conversion. Default: false");
1066
1067#define LEGACY_TOPDIR_ENV_PREFIX "NFSDCLTRACK_LEGACY_TOPDIR="
1068#define LEGACY_RECDIR_ENV_PREFIX "NFSDCLTRACK_LEGACY_RECDIR="
Jeff Laytond4318ac2014-09-12 16:40:21 -04001069#define HAS_SESSION_ENV_PREFIX "NFSDCLTRACK_CLIENT_HAS_SESSION="
1070#define GRACE_START_ENV_PREFIX "NFSDCLTRACK_GRACE_START="
Jeff Laytonf3aa7e242012-11-12 15:00:50 -05001071
1072static char *
1073nfsd4_cltrack_legacy_topdir(void)
Jeff Layton2873d212012-11-12 15:00:48 -05001074{
Jeff Laytonf3aa7e242012-11-12 15:00:50 -05001075 int copied;
1076 size_t len;
1077 char *result;
1078
1079 if (cltrack_legacy_disable)
1080 return NULL;
1081
1082 len = strlen(LEGACY_TOPDIR_ENV_PREFIX) +
1083 strlen(nfs4_recoverydir()) + 1;
1084
1085 result = kmalloc(len, GFP_KERNEL);
1086 if (!result)
1087 return result;
1088
1089 copied = snprintf(result, len, LEGACY_TOPDIR_ENV_PREFIX "%s",
1090 nfs4_recoverydir());
1091 if (copied >= len) {
1092 /* just return nothing if output was truncated */
1093 kfree(result);
1094 return NULL;
1095 }
1096
1097 return result;
1098}
1099
1100static char *
Jeff Layton2216d442012-11-12 15:00:57 -05001101nfsd4_cltrack_legacy_recdir(const struct xdr_netobj *name)
Jeff Laytonf3aa7e242012-11-12 15:00:50 -05001102{
1103 int copied;
1104 size_t len;
1105 char *result;
1106
1107 if (cltrack_legacy_disable)
1108 return NULL;
1109
1110 /* +1 is for '/' between "topdir" and "recdir" */
1111 len = strlen(LEGACY_RECDIR_ENV_PREFIX) +
1112 strlen(nfs4_recoverydir()) + 1 + HEXDIR_LEN;
1113
1114 result = kmalloc(len, GFP_KERNEL);
1115 if (!result)
1116 return result;
1117
Jeff Layton2216d442012-11-12 15:00:57 -05001118 copied = snprintf(result, len, LEGACY_RECDIR_ENV_PREFIX "%s/",
1119 nfs4_recoverydir());
1120 if (copied > (len - HEXDIR_LEN)) {
1121 /* just return nothing if output will be truncated */
1122 kfree(result);
1123 return NULL;
1124 }
1125
1126 copied = nfs4_make_rec_clidname(result + copied, name);
1127 if (copied) {
Jeff Laytonf3aa7e242012-11-12 15:00:50 -05001128 kfree(result);
1129 return NULL;
1130 }
1131
1132 return result;
1133}
1134
Jeff Laytond4318ac2014-09-12 16:40:21 -04001135static char *
1136nfsd4_cltrack_client_has_session(struct nfs4_client *clp)
Jeff Laytonf3aa7e242012-11-12 15:00:50 -05001137{
Jeff Laytond4318ac2014-09-12 16:40:21 -04001138 int copied;
1139 size_t len;
1140 char *result;
1141
1142 /* prefix + Y/N character + terminating NULL */
1143 len = strlen(HAS_SESSION_ENV_PREFIX) + 1 + 1;
1144
1145 result = kmalloc(len, GFP_KERNEL);
1146 if (!result)
1147 return result;
1148
1149 copied = snprintf(result, len, HAS_SESSION_ENV_PREFIX "%c",
1150 clp->cl_minorversion ? 'Y' : 'N');
1151 if (copied >= len) {
1152 /* just return nothing if output was truncated */
1153 kfree(result);
1154 return NULL;
1155 }
1156
1157 return result;
1158}
1159
1160static char *
1161nfsd4_cltrack_grace_start(time_t grace_start)
1162{
1163 int copied;
1164 size_t len;
1165 char *result;
1166
1167 /* prefix + max width of int64_t string + terminating NULL */
1168 len = strlen(GRACE_START_ENV_PREFIX) + 22 + 1;
1169
1170 result = kmalloc(len, GFP_KERNEL);
1171 if (!result)
1172 return result;
1173
1174 copied = snprintf(result, len, GRACE_START_ENV_PREFIX "%ld",
1175 grace_start);
1176 if (copied >= len) {
1177 /* just return nothing if output was truncated */
1178 kfree(result);
1179 return NULL;
1180 }
1181
1182 return result;
1183}
1184
1185static int
1186nfsd4_umh_cltrack_upcall(char *cmd, char *arg, char *env0, char *env1)
1187{
1188 char *envp[3];
Jeff Layton2873d212012-11-12 15:00:48 -05001189 char *argv[4];
1190 int ret;
1191
1192 if (unlikely(!cltrack_prog[0])) {
1193 dprintk("%s: cltrack_prog is disabled\n", __func__);
1194 return -EACCES;
1195 }
1196
1197 dprintk("%s: cmd: %s\n", __func__, cmd);
1198 dprintk("%s: arg: %s\n", __func__, arg ? arg : "(null)");
Jeff Laytond4318ac2014-09-12 16:40:21 -04001199 dprintk("%s: env0: %s\n", __func__, env0 ? env0 : "(null)");
1200 dprintk("%s: env1: %s\n", __func__, env1 ? env1 : "(null)");
Jeff Laytonf3aa7e242012-11-12 15:00:50 -05001201
Jeff Laytond4318ac2014-09-12 16:40:21 -04001202 envp[0] = env0;
1203 envp[1] = env1;
1204 envp[2] = NULL;
Jeff Layton2873d212012-11-12 15:00:48 -05001205
1206 argv[0] = (char *)cltrack_prog;
1207 argv[1] = cmd;
1208 argv[2] = arg;
1209 argv[3] = NULL;
1210
1211 ret = call_usermodehelper(argv[0], argv, envp, UMH_WAIT_PROC);
1212 /*
1213 * Disable the upcall mechanism if we're getting an ENOENT or EACCES
1214 * error. The admin can re-enable it on the fly by using sysfs
1215 * once the problem has been fixed.
1216 */
1217 if (ret == -ENOENT || ret == -EACCES) {
1218 dprintk("NFSD: %s was not found or isn't executable (%d). "
1219 "Setting cltrack_prog to blank string!",
1220 cltrack_prog, ret);
1221 cltrack_prog[0] = '\0';
1222 }
1223 dprintk("%s: %s return value: %d\n", __func__, cltrack_prog, ret);
1224
1225 return ret;
1226}
1227
1228static char *
1229bin_to_hex_dup(const unsigned char *src, int srclen)
1230{
1231 int i;
1232 char *buf, *hex;
1233
1234 /* +1 for terminating NULL */
1235 buf = kmalloc((srclen * 2) + 1, GFP_KERNEL);
1236 if (!buf)
1237 return buf;
1238
1239 hex = buf;
1240 for (i = 0; i < srclen; i++) {
1241 sprintf(hex, "%2.2x", *src++);
1242 hex += 2;
1243 }
1244 return buf;
1245}
1246
1247static int
Jeff Laytond4318ac2014-09-12 16:40:21 -04001248nfsd4_umh_cltrack_init(struct net *net)
Jeff Layton2873d212012-11-12 15:00:48 -05001249{
Jeff Laytond4318ac2014-09-12 16:40:21 -04001250 int ret;
1251 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
1252 char *grace_start = nfsd4_cltrack_grace_start(nn->boot_time);
1253
Stanislav Kinsbursky71a50302013-02-01 15:56:22 +03001254 /* XXX: The usermode helper s not working in container yet. */
1255 if (net != &init_net) {
1256 WARN(1, KERN_ERR "NFSD: attempt to initialize umh client "
1257 "tracking in a container!\n");
1258 return -EINVAL;
1259 }
Jeff Laytond4318ac2014-09-12 16:40:21 -04001260
1261 ret = nfsd4_umh_cltrack_upcall("init", NULL, grace_start, NULL);
1262 kfree(grace_start);
1263 return ret;
Jeff Layton2873d212012-11-12 15:00:48 -05001264}
1265
1266static void
Jeff Laytond682e752014-09-12 16:40:21 -04001267nfsd4_cltrack_upcall_lock(struct nfs4_client *clp)
1268{
1269 wait_on_bit_lock(&clp->cl_flags, NFSD4_CLIENT_UPCALL_LOCK,
1270 TASK_UNINTERRUPTIBLE);
1271}
1272
1273static void
1274nfsd4_cltrack_upcall_unlock(struct nfs4_client *clp)
1275{
1276 smp_mb__before_atomic();
1277 clear_bit(NFSD4_CLIENT_UPCALL_LOCK, &clp->cl_flags);
1278 smp_mb__after_atomic();
1279 wake_up_bit(&clp->cl_flags, NFSD4_CLIENT_UPCALL_LOCK);
1280}
1281
1282static void
Jeff Layton2873d212012-11-12 15:00:48 -05001283nfsd4_umh_cltrack_create(struct nfs4_client *clp)
1284{
Jeff Laytond4318ac2014-09-12 16:40:21 -04001285 char *hexid, *has_session, *grace_start;
1286 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
Jeff Layton2873d212012-11-12 15:00:48 -05001287
Jeff Layton65decb62014-09-12 16:40:22 -04001288 /*
1289 * With v4.0 clients, there's little difference in outcome between a
1290 * create and check operation, and we can end up calling into this
1291 * function multiple times per client (once for each openowner). So,
1292 * for v4.0 clients skip upcalling once the client has been recorded
1293 * on stable storage.
1294 *
1295 * For v4.1+ clients, the outcome of the two operations is different,
1296 * so we must ensure that we upcall for the create operation. v4.1+
1297 * clients call this on RECLAIM_COMPLETE though, so we should only end
1298 * up doing a single create upcall per client.
1299 */
1300 if (clp->cl_minorversion == 0 &&
1301 test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
1302 return;
1303
Jeff Layton2873d212012-11-12 15:00:48 -05001304 hexid = bin_to_hex_dup(clp->cl_name.data, clp->cl_name.len);
1305 if (!hexid) {
1306 dprintk("%s: can't allocate memory for upcall!\n", __func__);
1307 return;
1308 }
Jeff Laytond682e752014-09-12 16:40:21 -04001309
Jeff Laytond4318ac2014-09-12 16:40:21 -04001310 has_session = nfsd4_cltrack_client_has_session(clp);
1311 grace_start = nfsd4_cltrack_grace_start(nn->boot_time);
Jeff Laytond682e752014-09-12 16:40:21 -04001312
1313 nfsd4_cltrack_upcall_lock(clp);
Jeff Layton788a7912014-09-12 16:40:21 -04001314 if (!nfsd4_umh_cltrack_upcall("create", hexid, has_session, grace_start))
1315 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
Jeff Laytond682e752014-09-12 16:40:21 -04001316 nfsd4_cltrack_upcall_unlock(clp);
1317
Jeff Laytond4318ac2014-09-12 16:40:21 -04001318 kfree(has_session);
1319 kfree(grace_start);
Jeff Layton2873d212012-11-12 15:00:48 -05001320 kfree(hexid);
1321}
1322
1323static void
1324nfsd4_umh_cltrack_remove(struct nfs4_client *clp)
1325{
1326 char *hexid;
1327
Jeff Layton788a7912014-09-12 16:40:21 -04001328 if (!test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
1329 return;
1330
Jeff Layton2873d212012-11-12 15:00:48 -05001331 hexid = bin_to_hex_dup(clp->cl_name.data, clp->cl_name.len);
1332 if (!hexid) {
1333 dprintk("%s: can't allocate memory for upcall!\n", __func__);
1334 return;
1335 }
Jeff Laytond682e752014-09-12 16:40:21 -04001336
1337 nfsd4_cltrack_upcall_lock(clp);
Jeff Layton788a7912014-09-12 16:40:21 -04001338 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags) &&
1339 nfsd4_umh_cltrack_upcall("remove", hexid, NULL, NULL) == 0)
1340 clear_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
Jeff Laytond682e752014-09-12 16:40:21 -04001341 nfsd4_cltrack_upcall_unlock(clp);
1342
Jeff Layton2873d212012-11-12 15:00:48 -05001343 kfree(hexid);
1344}
1345
1346static int
1347nfsd4_umh_cltrack_check(struct nfs4_client *clp)
1348{
1349 int ret;
Jeff Laytond4318ac2014-09-12 16:40:21 -04001350 char *hexid, *has_session, *legacy;
Jeff Layton2873d212012-11-12 15:00:48 -05001351
Jeff Layton788a7912014-09-12 16:40:21 -04001352 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
1353 return 0;
1354
Jeff Layton2873d212012-11-12 15:00:48 -05001355 hexid = bin_to_hex_dup(clp->cl_name.data, clp->cl_name.len);
1356 if (!hexid) {
1357 dprintk("%s: can't allocate memory for upcall!\n", __func__);
1358 return -ENOMEM;
1359 }
Jeff Laytond4318ac2014-09-12 16:40:21 -04001360
1361 has_session = nfsd4_cltrack_client_has_session(clp);
Jeff Layton2216d442012-11-12 15:00:57 -05001362 legacy = nfsd4_cltrack_legacy_recdir(&clp->cl_name);
Jeff Laytond682e752014-09-12 16:40:21 -04001363
1364 nfsd4_cltrack_upcall_lock(clp);
Jeff Layton788a7912014-09-12 16:40:21 -04001365 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags)) {
1366 ret = 0;
1367 } else {
1368 ret = nfsd4_umh_cltrack_upcall("check", hexid, has_session, legacy);
1369 if (ret == 0)
1370 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
1371 }
Jeff Laytond682e752014-09-12 16:40:21 -04001372 nfsd4_cltrack_upcall_unlock(clp);
Jeff Laytond4318ac2014-09-12 16:40:21 -04001373 kfree(has_session);
Jeff Laytonf3aa7e242012-11-12 15:00:50 -05001374 kfree(legacy);
Jeff Layton2873d212012-11-12 15:00:48 -05001375 kfree(hexid);
Jeff Laytond4318ac2014-09-12 16:40:21 -04001376
Jeff Layton2873d212012-11-12 15:00:48 -05001377 return ret;
1378}
1379
1380static void
Jeff Layton919b8042014-09-12 16:40:20 -04001381nfsd4_umh_cltrack_grace_done(struct nfsd_net *nn)
Jeff Layton2873d212012-11-12 15:00:48 -05001382{
Jeff Laytonf3aa7e242012-11-12 15:00:50 -05001383 char *legacy;
Jeff Layton2873d212012-11-12 15:00:48 -05001384 char timestr[22]; /* FIXME: better way to determine max size? */
1385
Jeff Layton919b8042014-09-12 16:40:20 -04001386 sprintf(timestr, "%ld", nn->boot_time);
Jeff Laytonf3aa7e242012-11-12 15:00:50 -05001387 legacy = nfsd4_cltrack_legacy_topdir();
Jeff Laytond4318ac2014-09-12 16:40:21 -04001388 nfsd4_umh_cltrack_upcall("gracedone", timestr, legacy, NULL);
Jeff Laytonf3aa7e242012-11-12 15:00:50 -05001389 kfree(legacy);
Jeff Layton2873d212012-11-12 15:00:48 -05001390}
1391
1392static struct nfsd4_client_tracking_ops nfsd4_umh_tracking_ops = {
1393 .init = nfsd4_umh_cltrack_init,
1394 .exit = NULL,
1395 .create = nfsd4_umh_cltrack_create,
1396 .remove = nfsd4_umh_cltrack_remove,
1397 .check = nfsd4_umh_cltrack_check,
1398 .grace_done = nfsd4_umh_cltrack_grace_done,
1399};
1400
Jeff Layton2a4317c2012-03-21 16:42:43 -04001401int
1402nfsd4_client_tracking_init(struct net *net)
1403{
1404 int status;
Jeff Laytonf3f80142012-03-21 09:52:07 -04001405 struct path path;
Stanislav Kinsbursky9a9c6472012-12-04 14:29:27 +03001406 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
Jeff Layton2a4317c2012-03-21 16:42:43 -04001407
Jeff Layton2d77bf02012-11-12 15:00:49 -05001408 /* just run the init if it the method is already decided */
Stanislav Kinsbursky9a9c6472012-12-04 14:29:27 +03001409 if (nn->client_tracking_ops)
Jeff Layton2d77bf02012-11-12 15:00:49 -05001410 goto do_init;
1411
1412 /*
1413 * First, try a UMH upcall. It should succeed or fail quickly, so
1414 * there's little harm in trying that first.
1415 */
Stanislav Kinsbursky9a9c6472012-12-04 14:29:27 +03001416 nn->client_tracking_ops = &nfsd4_umh_tracking_ops;
1417 status = nn->client_tracking_ops->init(net);
Jeff Layton2d77bf02012-11-12 15:00:49 -05001418 if (!status)
1419 return status;
1420
1421 /*
1422 * See if the recoverydir exists and is a directory. If it is,
1423 * then use the legacy ops.
1424 */
Stanislav Kinsbursky9a9c6472012-12-04 14:29:27 +03001425 nn->client_tracking_ops = &nfsd4_legacy_tracking_ops;
Jeff Layton2d77bf02012-11-12 15:00:49 -05001426 status = kern_path(nfs4_recoverydir(), LOOKUP_FOLLOW, &path);
1427 if (!status) {
1428 status = S_ISDIR(path.dentry->d_inode->i_mode);
1429 path_put(&path);
1430 if (status)
1431 goto do_init;
Jeff Laytonf3f80142012-03-21 09:52:07 -04001432 }
Jeff Layton2a4317c2012-03-21 16:42:43 -04001433
Jeff Layton2d77bf02012-11-12 15:00:49 -05001434 /* Finally, try to use nfsdcld */
Stanislav Kinsbursky9a9c6472012-12-04 14:29:27 +03001435 nn->client_tracking_ops = &nfsd4_cld_tracking_ops;
Jeff Layton8b0554e2012-11-12 15:00:51 -05001436 printk(KERN_WARNING "NFSD: the nfsdcld client tracking upcall will be "
1437 "removed in 3.10. Please transition to using "
1438 "nfsdcltrack.\n");
Jeff Layton2d77bf02012-11-12 15:00:49 -05001439do_init:
Stanislav Kinsbursky9a9c6472012-12-04 14:29:27 +03001440 status = nn->client_tracking_ops->init(net);
Jeff Layton2a4317c2012-03-21 16:42:43 -04001441 if (status) {
1442 printk(KERN_WARNING "NFSD: Unable to initialize client "
1443 "recovery tracking! (%d)\n", status);
Stanislav Kinsbursky9a9c6472012-12-04 14:29:27 +03001444 nn->client_tracking_ops = NULL;
Jeff Layton2a4317c2012-03-21 16:42:43 -04001445 }
1446 return status;
1447}
1448
1449void
1450nfsd4_client_tracking_exit(struct net *net)
1451{
Stanislav Kinsbursky9a9c6472012-12-04 14:29:27 +03001452 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
1453
1454 if (nn->client_tracking_ops) {
1455 if (nn->client_tracking_ops->exit)
1456 nn->client_tracking_ops->exit(net);
1457 nn->client_tracking_ops = NULL;
Jeff Layton2a4317c2012-03-21 16:42:43 -04001458 }
1459}
1460
1461void
1462nfsd4_client_record_create(struct nfs4_client *clp)
1463{
Stanislav Kinsbursky9a9c6472012-12-04 14:29:27 +03001464 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
1465
1466 if (nn->client_tracking_ops)
1467 nn->client_tracking_ops->create(clp);
Jeff Layton2a4317c2012-03-21 16:42:43 -04001468}
1469
1470void
1471nfsd4_client_record_remove(struct nfs4_client *clp)
1472{
Stanislav Kinsbursky9a9c6472012-12-04 14:29:27 +03001473 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
1474
1475 if (nn->client_tracking_ops)
1476 nn->client_tracking_ops->remove(clp);
Jeff Layton2a4317c2012-03-21 16:42:43 -04001477}
1478
1479int
1480nfsd4_client_record_check(struct nfs4_client *clp)
1481{
Stanislav Kinsbursky9a9c6472012-12-04 14:29:27 +03001482 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
1483
1484 if (nn->client_tracking_ops)
1485 return nn->client_tracking_ops->check(clp);
Jeff Layton2a4317c2012-03-21 16:42:43 -04001486
1487 return -EOPNOTSUPP;
1488}
1489
1490void
Jeff Layton919b8042014-09-12 16:40:20 -04001491nfsd4_record_grace_done(struct nfsd_net *nn)
Jeff Layton2a4317c2012-03-21 16:42:43 -04001492{
Stanislav Kinsbursky9a9c6472012-12-04 14:29:27 +03001493 if (nn->client_tracking_ops)
Jeff Layton919b8042014-09-12 16:40:20 -04001494 nn->client_tracking_ops->grace_done(nn);
Jeff Layton2a4317c2012-03-21 16:42:43 -04001495}
Jeff Layton813fd322012-03-21 09:52:08 -04001496
1497static int
1498rpc_pipefs_event(struct notifier_block *nb, unsigned long event, void *ptr)
1499{
1500 struct super_block *sb = ptr;
1501 struct net *net = sb->s_fs_info;
1502 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
1503 struct cld_net *cn = nn->cld_net;
1504 struct dentry *dentry;
1505 int ret = 0;
1506
1507 if (!try_module_get(THIS_MODULE))
1508 return 0;
1509
1510 if (!cn) {
1511 module_put(THIS_MODULE);
1512 return 0;
1513 }
1514
1515 switch (event) {
1516 case RPC_PIPEFS_MOUNT:
1517 dentry = nfsd4_cld_register_sb(sb, cn->cn_pipe);
1518 if (IS_ERR(dentry)) {
1519 ret = PTR_ERR(dentry);
1520 break;
1521 }
1522 cn->cn_pipe->dentry = dentry;
1523 break;
1524 case RPC_PIPEFS_UMOUNT:
1525 if (cn->cn_pipe->dentry)
1526 nfsd4_cld_unregister_sb(cn->cn_pipe);
1527 break;
1528 default:
1529 ret = -ENOTSUPP;
1530 break;
1531 }
1532 module_put(THIS_MODULE);
1533 return ret;
1534}
1535
J. Bruce Fields2355c592012-04-25 16:56:22 -04001536static struct notifier_block nfsd4_cld_block = {
Jeff Layton813fd322012-03-21 09:52:08 -04001537 .notifier_call = rpc_pipefs_event,
1538};
Jeff Layton797a9d72012-03-29 07:52:49 -04001539
1540int
1541register_cld_notifier(void)
1542{
1543 return rpc_pipefs_notifier_register(&nfsd4_cld_block);
1544}
1545
1546void
1547unregister_cld_notifier(void)
1548{
1549 rpc_pipefs_notifier_unregister(&nfsd4_cld_block);
1550}