introduce ->iterate(), ctx->pos, dir_emit()
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / fs / nfsd / nfs4recover.c
CommitLineData
a55370a3 1/*
a55370a3 2* Copyright (c) 2004 The Regents of the University of Michigan.
f3f80148 3* Copyright (c) 2012 Jeff Layton <jlayton@redhat.com>
a55370a3
N
4* All rights reserved.
5*
6* Andy Adamson <andros@citi.umich.edu>
7*
8* Redistribution and use in source and binary forms, with or without
9* modification, are permitted provided that the following conditions
10* are met:
11*
12* 1. Redistributions of source code must retain the above copyright
13* notice, this list of conditions and the following disclaimer.
14* 2. Redistributions in binary form must reproduce the above copyright
15* notice, this list of conditions and the following disclaimer in the
16* documentation and/or other materials provided with the distribution.
17* 3. Neither the name of the University nor the names of its
18* contributors may be used to endorse or promote products derived
19* from this software without specific prior written permission.
20*
21* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
22* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
23* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
24* DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
26* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
27* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
28* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
29* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
30* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
31* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32*
33*/
34
190e4fbf 35#include <linux/file.h>
5a0e3ad6 36#include <linux/slab.h>
190e4fbf 37#include <linux/namei.h>
a55370a3 38#include <linux/crypto.h>
e8edc6e0 39#include <linux/sched.h>
f3f80148 40#include <linux/fs.h>
813fd320 41#include <linux/module.h>
f3f80148
JL
42#include <net/net_namespace.h>
43#include <linux/sunrpc/rpc_pipe_fs.h>
44#include <linux/sunrpc/clnt.h>
45#include <linux/nfsd/cld.h>
9a74af21
BH
46
47#include "nfsd.h"
48#include "state.h"
0a3adade 49#include "vfs.h"
f3f80148 50#include "netns.h"
a55370a3
N
51
52#define NFSDDBG_FACILITY NFSDDBG_PROC
53
2a4317c5
JL
54/* Declarations */
55struct nfsd4_client_tracking_ops {
56 int (*init)(struct net *);
57 void (*exit)(struct net *);
58 void (*create)(struct nfs4_client *);
59 void (*remove)(struct nfs4_client *);
60 int (*check)(struct nfs4_client *);
12760c66 61 void (*grace_done)(struct nfsd_net *, time_t);
2a4317c5
JL
62};
63
190e4fbf 64/* Globals */
48483bf2 65static char user_recovery_dirname[PATH_MAX] = "/var/lib/nfs/v4recovery";
190e4fbf 66
d84f4f99
DH
67static int
68nfs4_save_creds(const struct cred **original_creds)
190e4fbf 69{
d84f4f99
DH
70 struct cred *new;
71
72 new = prepare_creds();
73 if (!new)
74 return -ENOMEM;
75
6fab8779
EB
76 new->fsuid = GLOBAL_ROOT_UID;
77 new->fsgid = GLOBAL_ROOT_GID;
d84f4f99
DH
78 *original_creds = override_creds(new);
79 put_cred(new);
80 return 0;
190e4fbf
N
81}
82
83static void
d84f4f99 84nfs4_reset_creds(const struct cred *original)
190e4fbf 85{
d84f4f99 86 revert_creds(original);
190e4fbf
N
87}
88
a55370a3
N
89static void
90md5_to_hex(char *out, char *md5)
91{
92 int i;
93
94 for (i=0; i<16; i++) {
95 unsigned char c = md5[i];
96
97 *out++ = '0' + ((c&0xf0)>>4) + (c>=0xa0)*('a'-'9'-1);
98 *out++ = '0' + (c&0x0f) + ((c&0x0f)>=0x0a)*('a'-'9'-1);
99 }
100 *out = '\0';
101}
102
2216d449
JL
103static int
104nfs4_make_rec_clidname(char *dname, const struct xdr_netobj *clname)
a55370a3
N
105{
106 struct xdr_netobj cksum;
35058687 107 struct hash_desc desc;
60c74f81 108 struct scatterlist sg;
2216d449 109 int status;
a55370a3
N
110
111 dprintk("NFSD: nfs4_make_rec_clidname for %.*s\n",
112 clname->len, clname->data);
35058687
HX
113 desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP;
114 desc.tfm = crypto_alloc_hash("md5", 0, CRYPTO_ALG_ASYNC);
2216d449
JL
115 if (IS_ERR(desc.tfm)) {
116 status = PTR_ERR(desc.tfm);
35058687 117 goto out_no_tfm;
2216d449
JL
118 }
119
35058687 120 cksum.len = crypto_hash_digestsize(desc.tfm);
a55370a3 121 cksum.data = kmalloc(cksum.len, GFP_KERNEL);
2216d449
JL
122 if (cksum.data == NULL) {
123 status = -ENOMEM;
a55370a3 124 goto out;
2216d449 125 }
a55370a3 126
60c74f81 127 sg_init_one(&sg, clname->data, clname->len);
a55370a3 128
2216d449
JL
129 status = crypto_hash_digest(&desc, &sg, sg.length, cksum.data);
130 if (status)
35058687 131 goto out;
a55370a3
N
132
133 md5_to_hex(dname, cksum.data);
134
2216d449 135 status = 0;
a55370a3 136out:
2bd9e7b6 137 kfree(cksum.data);
35058687
HX
138 crypto_free_hash(desc.tfm);
139out_no_tfm:
a55370a3
N
140 return status;
141}
190e4fbf 142
2216d449
JL
143/*
144 * If we had an error generating the recdir name for the legacy tracker
145 * then warn the admin. If the error doesn't appear to be transient,
146 * then disable recovery tracking.
147 */
148static void
7255e716 149legacy_recdir_name_error(struct nfs4_client *clp, int error)
2216d449
JL
150{
151 printk(KERN_ERR "NFSD: unable to generate recoverydir "
152 "name (%d).\n", error);
153
154 /*
155 * if the algorithm just doesn't exist, then disable the recovery
156 * tracker altogether. The crypto libs will generally return this if
157 * FIPS is enabled as well.
158 */
159 if (error == -ENOENT) {
160 printk(KERN_ERR "NFSD: disabling legacy clientid tracking. "
161 "Reboot recovery will not function correctly!\n");
7255e716 162 nfsd4_client_tracking_exit(clp->net);
2216d449
JL
163 }
164}
165
2a4317c5
JL
166static void
167nfsd4_create_clid_dir(struct nfs4_client *clp)
c7b9a459 168{
d84f4f99 169 const struct cred *original_cred;
2216d449 170 char dname[HEXDIR_LEN];
e970a573 171 struct dentry *dir, *dentry;
0ce0c2b5 172 struct nfs4_client_reclaim *crp;
c7b9a459 173 int status;
52e19c09 174 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
c7b9a459
N
175
176 dprintk("NFSD: nfsd4_create_clid_dir for \"%s\"\n", dname);
177
a52d726b 178 if (test_and_set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
7a6ef8c7 179 return;
3a073369 180 if (!nn->rec_file)
7a6ef8c7 181 return;
2216d449
JL
182
183 status = nfs4_make_rec_clidname(dname, &clp->cl_name);
184 if (status)
7255e716 185 return legacy_recdir_name_error(clp, status);
2216d449 186
d84f4f99
DH
187 status = nfs4_save_creds(&original_cred);
188 if (status < 0)
7a6ef8c7 189 return;
c7b9a459 190
3a073369 191 status = mnt_want_write_file(nn->rec_file);
4a55c101
JK
192 if (status)
193 return;
194
3a073369 195 dir = nn->rec_file->f_path.dentry;
c7b9a459 196 /* lock the parent */
e970a573 197 mutex_lock(&dir->d_inode->i_mutex);
c7b9a459 198
e970a573 199 dentry = lookup_one_len(dname, dir, HEXDIR_LEN-1);
c7b9a459
N
200 if (IS_ERR(dentry)) {
201 status = PTR_ERR(dentry);
202 goto out_unlock;
203 }
6577aac0 204 if (dentry->d_inode)
aec39680
BF
205 /*
206 * In the 4.1 case, where we're called from
207 * reclaim_complete(), records from the previous reboot
208 * may still be left, so this is OK.
209 *
210 * In the 4.0 case, we should never get here; but we may
211 * as well be forgiving and just succeed silently.
212 */
c7b9a459 213 goto out_put;
e970a573 214 status = vfs_mkdir(dir->d_inode, dentry, S_IRWXU);
c7b9a459
N
215out_put:
216 dput(dentry);
217out_unlock:
e970a573 218 mutex_unlock(&dir->d_inode->i_mutex);
0ce0c2b5 219 if (status == 0) {
f141f79d 220 if (nn->in_grace) {
52e19c09 221 crp = nfs4_client_to_reclaim(dname, nn);
0ce0c2b5
JL
222 if (crp)
223 crp->cr_clp = clp;
224 }
3a073369 225 vfs_fsync(nn->rec_file, 0);
0ce0c2b5 226 } else {
6577aac0
BH
227 printk(KERN_ERR "NFSD: failed to write recovery record"
228 " (err %d); please check that %s exists"
229 " and is writeable", status,
230 user_recovery_dirname);
0ce0c2b5 231 }
3a073369 232 mnt_drop_write_file(nn->rec_file);
d84f4f99 233 nfs4_reset_creds(original_cred);
c7b9a459
N
234}
235
52e19c09 236typedef int (recdir_func)(struct dentry *, struct dentry *, struct nfsd_net *);
190e4fbf 237
05f4f678
BF
238struct name_list {
239 char name[HEXDIR_LEN];
190e4fbf
N
240 struct list_head list;
241};
242
0f63c0e8
AV
243struct nfs4_dir_ctx {
244 struct dir_context ctx;
245 struct list_head names;
246};
247
190e4fbf 248static int
05f4f678 249nfsd4_build_namelist(void *arg, const char *name, int namlen,
afefdbb2 250 loff_t offset, u64 ino, unsigned int d_type)
190e4fbf 251{
05f4f678
BF
252 struct list_head *names = arg;
253 struct name_list *entry;
190e4fbf 254
05f4f678 255 if (namlen != HEXDIR_LEN - 1)
b37ad28b 256 return 0;
05f4f678
BF
257 entry = kmalloc(sizeof(struct name_list), GFP_KERNEL);
258 if (entry == NULL)
190e4fbf 259 return -ENOMEM;
05f4f678
BF
260 memcpy(entry->name, name, HEXDIR_LEN - 1);
261 entry->name[HEXDIR_LEN - 1] = '\0';
0f63c0e8 262 list_add(&entry->list, &ctx->names);
190e4fbf
N
263 return 0;
264}
265
266static int
52e19c09 267nfsd4_list_rec_dir(recdir_func *f, struct nfsd_net *nn)
190e4fbf 268{
d84f4f99 269 const struct cred *original_cred;
3a073369 270 struct dentry *dir = nn->rec_file->f_path.dentry;
0f63c0e8 271 struct nfs4_dir_ctx ctx;
190e4fbf
N
272 int status;
273
d84f4f99
DH
274 status = nfs4_save_creds(&original_cred);
275 if (status < 0)
276 return status;
190e4fbf 277
3a073369 278 status = vfs_llseek(nn->rec_file, 0, SEEK_SET);
5b4b299c
AV
279 if (status < 0) {
280 nfs4_reset_creds(original_cred);
281 return status;
282 }
283
0f837692
AV
284 INIT_LIST_HEAD(&ctx.names);
285 ctx.ctx.actor = nfsd4_build_namelist;
286 status = iterate_dir(nn->rec_file, &ctx.ctx);
8daed1e5 287 mutex_lock_nested(&dir->d_inode->i_mutex, I_MUTEX_PARENT);
0f837692 288 while (!list_empty(&ctx.names)) {
5b4b299c 289 struct name_list *entry;
0f837692 290 entry = list_entry(ctx.names.next, struct name_list, list);
5b4b299c
AV
291 if (!status) {
292 struct dentry *dentry;
293 dentry = lookup_one_len(entry->name, dir, HEXDIR_LEN-1);
294 if (IS_ERR(dentry)) {
295 status = PTR_ERR(dentry);
296 break;
297 }
52e19c09 298 status = f(dir, dentry, nn);
5b4b299c 299 dput(dentry);
05f4f678 300 }
05f4f678
BF
301 list_del(&entry->list);
302 kfree(entry);
190e4fbf 303 }
2f9092e1 304 mutex_unlock(&dir->d_inode->i_mutex);
d84f4f99 305 nfs4_reset_creds(original_cred);
190e4fbf
N
306 return status;
307}
308
c7b9a459 309static int
3a073369 310nfsd4_unlink_clid_dir(char *name, int namlen, struct nfsd_net *nn)
c7b9a459 311{
e970a573 312 struct dentry *dir, *dentry;
c7b9a459
N
313 int status;
314
315 dprintk("NFSD: nfsd4_unlink_clid_dir. name %.*s\n", namlen, name);
316
3a073369 317 dir = nn->rec_file->f_path.dentry;
e970a573
CH
318 mutex_lock_nested(&dir->d_inode->i_mutex, I_MUTEX_PARENT);
319 dentry = lookup_one_len(name, dir, namlen);
c7b9a459
N
320 if (IS_ERR(dentry)) {
321 status = PTR_ERR(dentry);
2f9092e1 322 goto out_unlock;
c7b9a459
N
323 }
324 status = -ENOENT;
325 if (!dentry->d_inode)
326 goto out;
e970a573 327 status = vfs_rmdir(dir->d_inode, dentry);
c7b9a459
N
328out:
329 dput(dentry);
2f9092e1 330out_unlock:
e970a573 331 mutex_unlock(&dir->d_inode->i_mutex);
c7b9a459
N
332 return status;
333}
334
2a4317c5 335static void
c7b9a459
N
336nfsd4_remove_clid_dir(struct nfs4_client *clp)
337{
d84f4f99 338 const struct cred *original_cred;
0ce0c2b5 339 struct nfs4_client_reclaim *crp;
2216d449 340 char dname[HEXDIR_LEN];
c7b9a459 341 int status;
52e19c09 342 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
c7b9a459 343
3a073369 344 if (!nn->rec_file || !test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
c7b9a459
N
345 return;
346
2216d449
JL
347 status = nfs4_make_rec_clidname(dname, &clp->cl_name);
348 if (status)
7255e716 349 return legacy_recdir_name_error(clp, status);
2216d449 350
3a073369 351 status = mnt_want_write_file(nn->rec_file);
0622753b
DH
352 if (status)
353 goto out;
a52d726b 354 clear_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
d84f4f99
DH
355
356 status = nfs4_save_creds(&original_cred);
357 if (status < 0)
698d8d87 358 goto out_drop_write;
d84f4f99 359
3a073369 360 status = nfsd4_unlink_clid_dir(dname, HEXDIR_LEN-1, nn);
d84f4f99 361 nfs4_reset_creds(original_cred);
0ce0c2b5 362 if (status == 0) {
3a073369 363 vfs_fsync(nn->rec_file, 0);
f141f79d 364 if (nn->in_grace) {
0ce0c2b5 365 /* remove reclaim record */
52e19c09 366 crp = nfsd4_find_reclaim_client(dname, nn);
0ce0c2b5 367 if (crp)
52e19c09 368 nfs4_remove_reclaim_record(crp, nn);
0ce0c2b5
JL
369 }
370 }
698d8d87 371out_drop_write:
3a073369 372 mnt_drop_write_file(nn->rec_file);
0622753b 373out:
c7b9a459
N
374 if (status)
375 printk("NFSD: Failed to remove expired client state directory"
2216d449 376 " %.*s\n", HEXDIR_LEN, dname);
c7b9a459
N
377}
378
379static int
52e19c09 380purge_old(struct dentry *parent, struct dentry *child, struct nfsd_net *nn)
c7b9a459
N
381{
382 int status;
383
52e19c09 384 if (nfs4_has_reclaimed_state(child->d_name.name, nn))
b37ad28b 385 return 0;
c7b9a459 386
2f9092e1 387 status = vfs_rmdir(parent->d_inode, child);
c7b9a459
N
388 if (status)
389 printk("failed to remove client recovery directory %s\n",
390 child->d_name.name);
391 /* Keep trying, success or failure: */
b37ad28b 392 return 0;
c7b9a459
N
393}
394
2a4317c5 395static void
12760c66 396nfsd4_recdir_purge_old(struct nfsd_net *nn, time_t boot_time)
2a4317c5 397{
c7b9a459
N
398 int status;
399
f141f79d 400 nn->in_grace = false;
3a073369 401 if (!nn->rec_file)
c7b9a459 402 return;
3a073369 403 status = mnt_want_write_file(nn->rec_file);
0622753b
DH
404 if (status)
405 goto out;
52e19c09 406 status = nfsd4_list_rec_dir(purge_old, nn);
c7b9a459 407 if (status == 0)
3a073369
SK
408 vfs_fsync(nn->rec_file, 0);
409 mnt_drop_write_file(nn->rec_file);
0622753b 410out:
52e19c09 411 nfs4_release_reclaim(nn);
c7b9a459
N
412 if (status)
413 printk("nfsd4: failed to purge old clients from recovery"
3a073369 414 " directory %s\n", nn->rec_file->f_path.dentry->d_name.name);
c7b9a459
N
415}
416
190e4fbf 417static int
52e19c09 418load_recdir(struct dentry *parent, struct dentry *child, struct nfsd_net *nn)
190e4fbf
N
419{
420 if (child->d_name.len != HEXDIR_LEN - 1) {
421 printk("nfsd4: illegal name %s in recovery directory\n",
422 child->d_name.name);
423 /* Keep trying; maybe the others are OK: */
b37ad28b 424 return 0;
190e4fbf 425 }
52e19c09 426 nfs4_client_to_reclaim(child->d_name.name, nn);
b37ad28b 427 return 0;
190e4fbf
N
428}
429
2a4317c5 430static int
52e19c09 431nfsd4_recdir_load(struct net *net) {
190e4fbf 432 int status;
52e19c09 433 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
190e4fbf 434
3a073369 435 if (!nn->rec_file)
e970a573
CH
436 return 0;
437
52e19c09 438 status = nfsd4_list_rec_dir(load_recdir, nn);
190e4fbf
N
439 if (status)
440 printk("nfsd4: failed loading clients from recovery"
3a073369 441 " directory %s\n", nn->rec_file->f_path.dentry->d_name.name);
190e4fbf
N
442 return status;
443}
444
445/*
446 * Hold reference to the recovery directory.
447 */
448
2a4317c5 449static int
3a073369 450nfsd4_init_recdir(struct net *net)
190e4fbf 451{
3a073369 452 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
d84f4f99
DH
453 const struct cred *original_cred;
454 int status;
190e4fbf
N
455
456 printk("NFSD: Using %s as the NFSv4 state recovery directory\n",
48483bf2 457 user_recovery_dirname);
190e4fbf 458
3a073369 459 BUG_ON(nn->rec_file);
190e4fbf 460
d84f4f99
DH
461 status = nfs4_save_creds(&original_cred);
462 if (status < 0) {
463 printk("NFSD: Unable to change credentials to find recovery"
464 " directory: error %d\n",
465 status);
2a4317c5 466 return status;
d84f4f99 467 }
190e4fbf 468
3a073369
SK
469 nn->rec_file = filp_open(user_recovery_dirname, O_RDONLY | O_DIRECTORY, 0);
470 if (IS_ERR(nn->rec_file)) {
c2642ab0 471 printk("NFSD: unable to find recovery directory %s\n",
48483bf2 472 user_recovery_dirname);
3a073369
SK
473 status = PTR_ERR(nn->rec_file);
474 nn->rec_file = NULL;
e970a573 475 }
190e4fbf 476
d84f4f99 477 nfs4_reset_creds(original_cred);
0ce0c2b5 478 if (!status)
f141f79d 479 nn->in_grace = true;
2a4317c5 480 return status;
190e4fbf
N
481}
482
52e19c09
SK
483
484static int
485nfs4_legacy_state_init(struct net *net)
486{
487 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
488 int i;
489
490 nn->reclaim_str_hashtbl = kmalloc(sizeof(struct list_head) *
491 CLIENT_HASH_SIZE, GFP_KERNEL);
492 if (!nn->reclaim_str_hashtbl)
493 return -ENOMEM;
494
495 for (i = 0; i < CLIENT_HASH_SIZE; i++)
496 INIT_LIST_HEAD(&nn->reclaim_str_hashtbl[i]);
497 nn->reclaim_str_hashtbl_size = 0;
498
499 return 0;
500}
501
502static void
503nfs4_legacy_state_shutdown(struct net *net)
504{
505 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
506
507 kfree(nn->reclaim_str_hashtbl);
508}
509
2a4317c5
JL
510static int
511nfsd4_load_reboot_recovery_data(struct net *net)
512{
513 int status;
514
3a073369 515 status = nfsd4_init_recdir(net);
52e19c09
SK
516 if (!status)
517 status = nfsd4_recdir_load(net);
52e19c09
SK
518 if (status)
519 printk(KERN_ERR "NFSD: Failure reading reboot recovery data\n");
520 return status;
521}
522
523static int
524nfsd4_legacy_tracking_init(struct net *net)
525{
526 int status;
527
cc27e0d4
JL
528 /* XXX: The legacy code won't work in a container */
529 if (net != &init_net) {
530 WARN(1, KERN_ERR "NFSD: attempt to initialize legacy client "
531 "tracking in a container!\n");
532 return -EINVAL;
533 }
534
52e19c09 535 status = nfs4_legacy_state_init(net);
2a4317c5 536 if (status)
52e19c09
SK
537 return status;
538
539 status = nfsd4_load_reboot_recovery_data(net);
540 if (status)
541 goto err;
542 return 0;
543
544err:
545 nfs4_legacy_state_shutdown(net);
2a4317c5
JL
546 return status;
547}
548
549static void
3a073369 550nfsd4_shutdown_recdir(struct nfsd_net *nn)
190e4fbf 551{
3a073369 552 if (!nn->rec_file)
190e4fbf 553 return;
3a073369
SK
554 fput(nn->rec_file);
555 nn->rec_file = NULL;
190e4fbf 556}
48483bf2 557
2a4317c5
JL
558static void
559nfsd4_legacy_tracking_exit(struct net *net)
560{
52e19c09
SK
561 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
562
563 nfs4_release_reclaim(nn);
3a073369 564 nfsd4_shutdown_recdir(nn);
52e19c09 565 nfs4_legacy_state_shutdown(net);
2a4317c5
JL
566}
567
48483bf2
BF
568/*
569 * Change the NFSv4 recovery directory to recdir.
570 */
571int
572nfs4_reset_recoverydir(char *recdir)
573{
574 int status;
575 struct path path;
576
577 status = kern_path(recdir, LOOKUP_FOLLOW, &path);
578 if (status)
579 return status;
580 status = -ENOTDIR;
581 if (S_ISDIR(path.dentry->d_inode->i_mode)) {
582 strcpy(user_recovery_dirname, recdir);
583 status = 0;
584 }
585 path_put(&path);
586 return status;
587}
588
589char *
590nfs4_recoverydir(void)
591{
592 return user_recovery_dirname;
593}
2a4317c5
JL
594
595static int
596nfsd4_check_legacy_client(struct nfs4_client *clp)
597{
2216d449
JL
598 int status;
599 char dname[HEXDIR_LEN];
0ce0c2b5 600 struct nfs4_client_reclaim *crp;
52e19c09 601 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
0ce0c2b5 602
2a4317c5
JL
603 /* did we already find that this client is stable? */
604 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
605 return 0;
606
2216d449
JL
607 status = nfs4_make_rec_clidname(dname, &clp->cl_name);
608 if (status) {
7255e716 609 legacy_recdir_name_error(clp, status);
2216d449
JL
610 return status;
611 }
612
2a4317c5 613 /* look for it in the reclaim hashtable otherwise */
52e19c09 614 crp = nfsd4_find_reclaim_client(dname, nn);
0ce0c2b5 615 if (crp) {
2a4317c5 616 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
0ce0c2b5 617 crp->cr_clp = clp;
2a4317c5
JL
618 return 0;
619 }
620
621 return -ENOENT;
622}
623
624static struct nfsd4_client_tracking_ops nfsd4_legacy_tracking_ops = {
52e19c09 625 .init = nfsd4_legacy_tracking_init,
2a4317c5
JL
626 .exit = nfsd4_legacy_tracking_exit,
627 .create = nfsd4_create_clid_dir,
628 .remove = nfsd4_remove_clid_dir,
629 .check = nfsd4_check_legacy_client,
630 .grace_done = nfsd4_recdir_purge_old,
631};
632
f3f80148
JL
633/* Globals */
634#define NFSD_PIPE_DIR "nfsd"
635#define NFSD_CLD_PIPE "cld"
636
637/* per-net-ns structure for holding cld upcall info */
638struct cld_net {
639 struct rpc_pipe *cn_pipe;
640 spinlock_t cn_lock;
641 struct list_head cn_list;
642 unsigned int cn_xid;
643};
644
645struct cld_upcall {
646 struct list_head cu_list;
647 struct cld_net *cu_net;
648 struct task_struct *cu_task;
649 struct cld_msg cu_msg;
650};
651
652static int
653__cld_pipe_upcall(struct rpc_pipe *pipe, struct cld_msg *cmsg)
654{
655 int ret;
656 struct rpc_pipe_msg msg;
657
658 memset(&msg, 0, sizeof(msg));
659 msg.data = cmsg;
660 msg.len = sizeof(*cmsg);
661
662 /*
663 * Set task state before we queue the upcall. That prevents
664 * wake_up_process in the downcall from racing with schedule.
665 */
666 set_current_state(TASK_UNINTERRUPTIBLE);
667 ret = rpc_queue_upcall(pipe, &msg);
668 if (ret < 0) {
669 set_current_state(TASK_RUNNING);
670 goto out;
671 }
672
673 schedule();
674 set_current_state(TASK_RUNNING);
675
676 if (msg.errno < 0)
677 ret = msg.errno;
678out:
679 return ret;
680}
681
682static int
683cld_pipe_upcall(struct rpc_pipe *pipe, struct cld_msg *cmsg)
684{
685 int ret;
686
687 /*
688 * -EAGAIN occurs when pipe is closed and reopened while there are
689 * upcalls queued.
690 */
691 do {
692 ret = __cld_pipe_upcall(pipe, cmsg);
693 } while (ret == -EAGAIN);
694
695 return ret;
696}
697
698static ssize_t
699cld_pipe_downcall(struct file *filp, const char __user *src, size_t mlen)
700{
701 struct cld_upcall *tmp, *cup;
bc1b542b 702 struct cld_msg __user *cmsg = (struct cld_msg __user *)src;
f3f80148
JL
703 uint32_t xid;
704 struct nfsd_net *nn = net_generic(filp->f_dentry->d_sb->s_fs_info,
705 nfsd_net_id);
706 struct cld_net *cn = nn->cld_net;
707
708 if (mlen != sizeof(*cmsg)) {
8a7dc4b0 709 dprintk("%s: got %zu bytes, expected %zu\n", __func__, mlen,
f3f80148
JL
710 sizeof(*cmsg));
711 return -EINVAL;
712 }
713
714 /* copy just the xid so we can try to find that */
715 if (copy_from_user(&xid, &cmsg->cm_xid, sizeof(xid)) != 0) {
716 dprintk("%s: error when copying xid from userspace", __func__);
717 return -EFAULT;
718 }
719
720 /* walk the list and find corresponding xid */
721 cup = NULL;
722 spin_lock(&cn->cn_lock);
723 list_for_each_entry(tmp, &cn->cn_list, cu_list) {
724 if (get_unaligned(&tmp->cu_msg.cm_xid) == xid) {
725 cup = tmp;
726 list_del_init(&cup->cu_list);
727 break;
728 }
729 }
730 spin_unlock(&cn->cn_lock);
731
732 /* couldn't find upcall? */
733 if (!cup) {
21f72c9f 734 dprintk("%s: couldn't find upcall -- xid=%u\n", __func__, xid);
f3f80148
JL
735 return -EINVAL;
736 }
737
738 if (copy_from_user(&cup->cu_msg, src, mlen) != 0)
739 return -EFAULT;
740
741 wake_up_process(cup->cu_task);
742 return mlen;
743}
744
745static void
746cld_pipe_destroy_msg(struct rpc_pipe_msg *msg)
747{
748 struct cld_msg *cmsg = msg->data;
749 struct cld_upcall *cup = container_of(cmsg, struct cld_upcall,
750 cu_msg);
751
752 /* errno >= 0 means we got a downcall */
753 if (msg->errno >= 0)
754 return;
755
756 wake_up_process(cup->cu_task);
757}
758
759static const struct rpc_pipe_ops cld_upcall_ops = {
760 .upcall = rpc_pipe_generic_upcall,
761 .downcall = cld_pipe_downcall,
762 .destroy_msg = cld_pipe_destroy_msg,
763};
764
765static struct dentry *
766nfsd4_cld_register_sb(struct super_block *sb, struct rpc_pipe *pipe)
767{
768 struct dentry *dir, *dentry;
769
770 dir = rpc_d_lookup_sb(sb, NFSD_PIPE_DIR);
771 if (dir == NULL)
772 return ERR_PTR(-ENOENT);
773 dentry = rpc_mkpipe_dentry(dir, NFSD_CLD_PIPE, NULL, pipe);
774 dput(dir);
775 return dentry;
776}
777
778static void
779nfsd4_cld_unregister_sb(struct rpc_pipe *pipe)
780{
781 if (pipe->dentry)
782 rpc_unlink(pipe->dentry);
783}
784
785static struct dentry *
786nfsd4_cld_register_net(struct net *net, struct rpc_pipe *pipe)
787{
788 struct super_block *sb;
789 struct dentry *dentry;
790
791 sb = rpc_get_sb_net(net);
792 if (!sb)
793 return NULL;
794 dentry = nfsd4_cld_register_sb(sb, pipe);
795 rpc_put_sb_net(net);
796 return dentry;
797}
798
799static void
800nfsd4_cld_unregister_net(struct net *net, struct rpc_pipe *pipe)
801{
802 struct super_block *sb;
803
804 sb = rpc_get_sb_net(net);
805 if (sb) {
806 nfsd4_cld_unregister_sb(pipe);
807 rpc_put_sb_net(net);
808 }
809}
810
811/* Initialize rpc_pipefs pipe for communication with client tracking daemon */
812static int
813nfsd4_init_cld_pipe(struct net *net)
814{
815 int ret;
816 struct dentry *dentry;
817 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
818 struct cld_net *cn;
819
820 if (nn->cld_net)
821 return 0;
822
823 cn = kzalloc(sizeof(*cn), GFP_KERNEL);
824 if (!cn) {
825 ret = -ENOMEM;
826 goto err;
827 }
828
829 cn->cn_pipe = rpc_mkpipe_data(&cld_upcall_ops, RPC_PIPE_WAIT_FOR_OPEN);
830 if (IS_ERR(cn->cn_pipe)) {
831 ret = PTR_ERR(cn->cn_pipe);
832 goto err;
833 }
834 spin_lock_init(&cn->cn_lock);
835 INIT_LIST_HEAD(&cn->cn_list);
836
837 dentry = nfsd4_cld_register_net(net, cn->cn_pipe);
838 if (IS_ERR(dentry)) {
839 ret = PTR_ERR(dentry);
840 goto err_destroy_data;
841 }
842
843 cn->cn_pipe->dentry = dentry;
844 nn->cld_net = cn;
845 return 0;
846
847err_destroy_data:
848 rpc_destroy_pipe_data(cn->cn_pipe);
849err:
850 kfree(cn);
851 printk(KERN_ERR "NFSD: unable to create nfsdcld upcall pipe (%d)\n",
852 ret);
853 return ret;
854}
855
856static void
857nfsd4_remove_cld_pipe(struct net *net)
858{
859 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
860 struct cld_net *cn = nn->cld_net;
861
862 nfsd4_cld_unregister_net(net, cn->cn_pipe);
863 rpc_destroy_pipe_data(cn->cn_pipe);
864 kfree(nn->cld_net);
865 nn->cld_net = NULL;
866}
867
868static struct cld_upcall *
869alloc_cld_upcall(struct cld_net *cn)
870{
871 struct cld_upcall *new, *tmp;
872
873 new = kzalloc(sizeof(*new), GFP_KERNEL);
874 if (!new)
875 return new;
876
877 /* FIXME: hard cap on number in flight? */
878restart_search:
879 spin_lock(&cn->cn_lock);
880 list_for_each_entry(tmp, &cn->cn_list, cu_list) {
881 if (tmp->cu_msg.cm_xid == cn->cn_xid) {
882 cn->cn_xid++;
883 spin_unlock(&cn->cn_lock);
884 goto restart_search;
885 }
886 }
887 new->cu_task = current;
888 new->cu_msg.cm_vers = CLD_UPCALL_VERSION;
889 put_unaligned(cn->cn_xid++, &new->cu_msg.cm_xid);
890 new->cu_net = cn;
891 list_add(&new->cu_list, &cn->cn_list);
892 spin_unlock(&cn->cn_lock);
893
894 dprintk("%s: allocated xid %u\n", __func__, new->cu_msg.cm_xid);
895
896 return new;
897}
898
899static void
900free_cld_upcall(struct cld_upcall *victim)
901{
902 struct cld_net *cn = victim->cu_net;
903
904 spin_lock(&cn->cn_lock);
905 list_del(&victim->cu_list);
906 spin_unlock(&cn->cn_lock);
907 kfree(victim);
908}
909
910/* Ask daemon to create a new record */
911static void
912nfsd4_cld_create(struct nfs4_client *clp)
913{
914 int ret;
915 struct cld_upcall *cup;
c212cecf 916 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
f3f80148
JL
917 struct cld_net *cn = nn->cld_net;
918
919 /* Don't upcall if it's already stored */
920 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
921 return;
922
923 cup = alloc_cld_upcall(cn);
924 if (!cup) {
925 ret = -ENOMEM;
926 goto out_err;
927 }
928
929 cup->cu_msg.cm_cmd = Cld_Create;
930 cup->cu_msg.cm_u.cm_name.cn_len = clp->cl_name.len;
931 memcpy(cup->cu_msg.cm_u.cm_name.cn_id, clp->cl_name.data,
932 clp->cl_name.len);
933
934 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
935 if (!ret) {
936 ret = cup->cu_msg.cm_status;
937 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
938 }
939
940 free_cld_upcall(cup);
941out_err:
942 if (ret)
943 printk(KERN_ERR "NFSD: Unable to create client "
944 "record on stable storage: %d\n", ret);
945}
946
947/* Ask daemon to create a new record */
948static void
949nfsd4_cld_remove(struct nfs4_client *clp)
950{
951 int ret;
952 struct cld_upcall *cup;
c212cecf 953 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
f3f80148
JL
954 struct cld_net *cn = nn->cld_net;
955
956 /* Don't upcall if it's already removed */
957 if (!test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
958 return;
959
960 cup = alloc_cld_upcall(cn);
961 if (!cup) {
962 ret = -ENOMEM;
963 goto out_err;
964 }
965
966 cup->cu_msg.cm_cmd = Cld_Remove;
967 cup->cu_msg.cm_u.cm_name.cn_len = clp->cl_name.len;
968 memcpy(cup->cu_msg.cm_u.cm_name.cn_id, clp->cl_name.data,
969 clp->cl_name.len);
970
971 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
972 if (!ret) {
973 ret = cup->cu_msg.cm_status;
974 clear_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
975 }
976
977 free_cld_upcall(cup);
978out_err:
979 if (ret)
980 printk(KERN_ERR "NFSD: Unable to remove client "
981 "record from stable storage: %d\n", ret);
982}
983
984/* Check for presence of a record, and update its timestamp */
985static int
986nfsd4_cld_check(struct nfs4_client *clp)
987{
988 int ret;
989 struct cld_upcall *cup;
c212cecf 990 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
f3f80148
JL
991 struct cld_net *cn = nn->cld_net;
992
993 /* Don't upcall if one was already stored during this grace pd */
994 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
995 return 0;
996
997 cup = alloc_cld_upcall(cn);
998 if (!cup) {
999 printk(KERN_ERR "NFSD: Unable to check client record on "
1000 "stable storage: %d\n", -ENOMEM);
1001 return -ENOMEM;
1002 }
1003
1004 cup->cu_msg.cm_cmd = Cld_Check;
1005 cup->cu_msg.cm_u.cm_name.cn_len = clp->cl_name.len;
1006 memcpy(cup->cu_msg.cm_u.cm_name.cn_id, clp->cl_name.data,
1007 clp->cl_name.len);
1008
1009 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
1010 if (!ret) {
1011 ret = cup->cu_msg.cm_status;
1012 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
1013 }
1014
1015 free_cld_upcall(cup);
1016 return ret;
1017}
1018
1019static void
12760c66 1020nfsd4_cld_grace_done(struct nfsd_net *nn, time_t boot_time)
f3f80148
JL
1021{
1022 int ret;
1023 struct cld_upcall *cup;
f3f80148
JL
1024 struct cld_net *cn = nn->cld_net;
1025
1026 cup = alloc_cld_upcall(cn);
1027 if (!cup) {
1028 ret = -ENOMEM;
1029 goto out_err;
1030 }
1031
1032 cup->cu_msg.cm_cmd = Cld_GraceDone;
1033 cup->cu_msg.cm_u.cm_gracetime = (int64_t)boot_time;
1034 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
1035 if (!ret)
1036 ret = cup->cu_msg.cm_status;
1037
1038 free_cld_upcall(cup);
1039out_err:
1040 if (ret)
1041 printk(KERN_ERR "NFSD: Unable to end grace period: %d\n", ret);
1042}
1043
1044static struct nfsd4_client_tracking_ops nfsd4_cld_tracking_ops = {
1045 .init = nfsd4_init_cld_pipe,
1046 .exit = nfsd4_remove_cld_pipe,
1047 .create = nfsd4_cld_create,
1048 .remove = nfsd4_cld_remove,
1049 .check = nfsd4_cld_check,
1050 .grace_done = nfsd4_cld_grace_done,
1051};
1052
2873d214
JL
1053/* upcall via usermodehelper */
1054static char cltrack_prog[PATH_MAX] = "/sbin/nfsdcltrack";
1055module_param_string(cltrack_prog, cltrack_prog, sizeof(cltrack_prog),
1056 S_IRUGO|S_IWUSR);
1057MODULE_PARM_DESC(cltrack_prog, "Path to the nfsdcltrack upcall program");
1058
f3aa7e24
JL
1059static bool cltrack_legacy_disable;
1060module_param(cltrack_legacy_disable, bool, S_IRUGO|S_IWUSR);
1061MODULE_PARM_DESC(cltrack_legacy_disable,
1062 "Disable legacy recoverydir conversion. Default: false");
1063
1064#define LEGACY_TOPDIR_ENV_PREFIX "NFSDCLTRACK_LEGACY_TOPDIR="
1065#define LEGACY_RECDIR_ENV_PREFIX "NFSDCLTRACK_LEGACY_RECDIR="
1066
1067static char *
1068nfsd4_cltrack_legacy_topdir(void)
1069{
1070 int copied;
1071 size_t len;
1072 char *result;
1073
1074 if (cltrack_legacy_disable)
1075 return NULL;
1076
1077 len = strlen(LEGACY_TOPDIR_ENV_PREFIX) +
1078 strlen(nfs4_recoverydir()) + 1;
1079
1080 result = kmalloc(len, GFP_KERNEL);
1081 if (!result)
1082 return result;
1083
1084 copied = snprintf(result, len, LEGACY_TOPDIR_ENV_PREFIX "%s",
1085 nfs4_recoverydir());
1086 if (copied >= len) {
1087 /* just return nothing if output was truncated */
1088 kfree(result);
1089 return NULL;
1090 }
1091
1092 return result;
1093}
1094
1095static char *
2216d449 1096nfsd4_cltrack_legacy_recdir(const struct xdr_netobj *name)
f3aa7e24
JL
1097{
1098 int copied;
1099 size_t len;
1100 char *result;
1101
1102 if (cltrack_legacy_disable)
1103 return NULL;
1104
1105 /* +1 is for '/' between "topdir" and "recdir" */
1106 len = strlen(LEGACY_RECDIR_ENV_PREFIX) +
1107 strlen(nfs4_recoverydir()) + 1 + HEXDIR_LEN;
1108
1109 result = kmalloc(len, GFP_KERNEL);
1110 if (!result)
1111 return result;
1112
2216d449
JL
1113 copied = snprintf(result, len, LEGACY_RECDIR_ENV_PREFIX "%s/",
1114 nfs4_recoverydir());
1115 if (copied > (len - HEXDIR_LEN)) {
1116 /* just return nothing if output will be truncated */
1117 kfree(result);
1118 return NULL;
1119 }
1120
1121 copied = nfs4_make_rec_clidname(result + copied, name);
1122 if (copied) {
f3aa7e24
JL
1123 kfree(result);
1124 return NULL;
1125 }
1126
1127 return result;
1128}
1129
2873d214 1130static int
f3aa7e24 1131nfsd4_umh_cltrack_upcall(char *cmd, char *arg, char *legacy)
2873d214 1132{
f3aa7e24 1133 char *envp[2];
2873d214
JL
1134 char *argv[4];
1135 int ret;
1136
1137 if (unlikely(!cltrack_prog[0])) {
1138 dprintk("%s: cltrack_prog is disabled\n", __func__);
1139 return -EACCES;
1140 }
1141
1142 dprintk("%s: cmd: %s\n", __func__, cmd);
1143 dprintk("%s: arg: %s\n", __func__, arg ? arg : "(null)");
f3aa7e24
JL
1144 dprintk("%s: legacy: %s\n", __func__, legacy ? legacy : "(null)");
1145
1146 envp[0] = legacy;
1147 envp[1] = NULL;
2873d214
JL
1148
1149 argv[0] = (char *)cltrack_prog;
1150 argv[1] = cmd;
1151 argv[2] = arg;
1152 argv[3] = NULL;
1153
1154 ret = call_usermodehelper(argv[0], argv, envp, UMH_WAIT_PROC);
1155 /*
1156 * Disable the upcall mechanism if we're getting an ENOENT or EACCES
1157 * error. The admin can re-enable it on the fly by using sysfs
1158 * once the problem has been fixed.
1159 */
1160 if (ret == -ENOENT || ret == -EACCES) {
1161 dprintk("NFSD: %s was not found or isn't executable (%d). "
1162 "Setting cltrack_prog to blank string!",
1163 cltrack_prog, ret);
1164 cltrack_prog[0] = '\0';
1165 }
1166 dprintk("%s: %s return value: %d\n", __func__, cltrack_prog, ret);
1167
1168 return ret;
1169}
1170
1171static char *
1172bin_to_hex_dup(const unsigned char *src, int srclen)
1173{
1174 int i;
1175 char *buf, *hex;
1176
1177 /* +1 for terminating NULL */
1178 buf = kmalloc((srclen * 2) + 1, GFP_KERNEL);
1179 if (!buf)
1180 return buf;
1181
1182 hex = buf;
1183 for (i = 0; i < srclen; i++) {
1184 sprintf(hex, "%2.2x", *src++);
1185 hex += 2;
1186 }
1187 return buf;
1188}
1189
1190static int
1191nfsd4_umh_cltrack_init(struct net __attribute__((unused)) *net)
1192{
71a50306
SK
1193 /* XXX: The usermode helper s not working in container yet. */
1194 if (net != &init_net) {
1195 WARN(1, KERN_ERR "NFSD: attempt to initialize umh client "
1196 "tracking in a container!\n");
1197 return -EINVAL;
1198 }
f3aa7e24 1199 return nfsd4_umh_cltrack_upcall("init", NULL, NULL);
2873d214
JL
1200}
1201
1202static void
1203nfsd4_umh_cltrack_create(struct nfs4_client *clp)
1204{
1205 char *hexid;
1206
1207 hexid = bin_to_hex_dup(clp->cl_name.data, clp->cl_name.len);
1208 if (!hexid) {
1209 dprintk("%s: can't allocate memory for upcall!\n", __func__);
1210 return;
1211 }
f3aa7e24 1212 nfsd4_umh_cltrack_upcall("create", hexid, NULL);
2873d214
JL
1213 kfree(hexid);
1214}
1215
1216static void
1217nfsd4_umh_cltrack_remove(struct nfs4_client *clp)
1218{
1219 char *hexid;
1220
1221 hexid = bin_to_hex_dup(clp->cl_name.data, clp->cl_name.len);
1222 if (!hexid) {
1223 dprintk("%s: can't allocate memory for upcall!\n", __func__);
1224 return;
1225 }
f3aa7e24 1226 nfsd4_umh_cltrack_upcall("remove", hexid, NULL);
2873d214
JL
1227 kfree(hexid);
1228}
1229
1230static int
1231nfsd4_umh_cltrack_check(struct nfs4_client *clp)
1232{
1233 int ret;
f3aa7e24 1234 char *hexid, *legacy;
2873d214
JL
1235
1236 hexid = bin_to_hex_dup(clp->cl_name.data, clp->cl_name.len);
1237 if (!hexid) {
1238 dprintk("%s: can't allocate memory for upcall!\n", __func__);
1239 return -ENOMEM;
1240 }
2216d449 1241 legacy = nfsd4_cltrack_legacy_recdir(&clp->cl_name);
f3aa7e24
JL
1242 ret = nfsd4_umh_cltrack_upcall("check", hexid, legacy);
1243 kfree(legacy);
2873d214
JL
1244 kfree(hexid);
1245 return ret;
1246}
1247
1248static void
12760c66 1249nfsd4_umh_cltrack_grace_done(struct nfsd_net __attribute__((unused)) *nn,
2873d214
JL
1250 time_t boot_time)
1251{
f3aa7e24 1252 char *legacy;
2873d214
JL
1253 char timestr[22]; /* FIXME: better way to determine max size? */
1254
1255 sprintf(timestr, "%ld", boot_time);
f3aa7e24
JL
1256 legacy = nfsd4_cltrack_legacy_topdir();
1257 nfsd4_umh_cltrack_upcall("gracedone", timestr, legacy);
1258 kfree(legacy);
2873d214
JL
1259}
1260
1261static struct nfsd4_client_tracking_ops nfsd4_umh_tracking_ops = {
1262 .init = nfsd4_umh_cltrack_init,
1263 .exit = NULL,
1264 .create = nfsd4_umh_cltrack_create,
1265 .remove = nfsd4_umh_cltrack_remove,
1266 .check = nfsd4_umh_cltrack_check,
1267 .grace_done = nfsd4_umh_cltrack_grace_done,
1268};
1269
2a4317c5
JL
1270int
1271nfsd4_client_tracking_init(struct net *net)
1272{
1273 int status;
f3f80148 1274 struct path path;
9a9c6478 1275 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
2a4317c5 1276
2d77bf0a 1277 /* just run the init if it the method is already decided */
9a9c6478 1278 if (nn->client_tracking_ops)
2d77bf0a
JL
1279 goto do_init;
1280
1281 /*
1282 * First, try a UMH upcall. It should succeed or fail quickly, so
1283 * there's little harm in trying that first.
1284 */
9a9c6478
SK
1285 nn->client_tracking_ops = &nfsd4_umh_tracking_ops;
1286 status = nn->client_tracking_ops->init(net);
2d77bf0a
JL
1287 if (!status)
1288 return status;
1289
1290 /*
1291 * See if the recoverydir exists and is a directory. If it is,
1292 * then use the legacy ops.
1293 */
9a9c6478 1294 nn->client_tracking_ops = &nfsd4_legacy_tracking_ops;
2d77bf0a
JL
1295 status = kern_path(nfs4_recoverydir(), LOOKUP_FOLLOW, &path);
1296 if (!status) {
1297 status = S_ISDIR(path.dentry->d_inode->i_mode);
1298 path_put(&path);
1299 if (status)
1300 goto do_init;
f3f80148 1301 }
2a4317c5 1302
2d77bf0a 1303 /* Finally, try to use nfsdcld */
9a9c6478 1304 nn->client_tracking_ops = &nfsd4_cld_tracking_ops;
8b0554e9
JL
1305 printk(KERN_WARNING "NFSD: the nfsdcld client tracking upcall will be "
1306 "removed in 3.10. Please transition to using "
1307 "nfsdcltrack.\n");
2d77bf0a 1308do_init:
9a9c6478 1309 status = nn->client_tracking_ops->init(net);
2a4317c5
JL
1310 if (status) {
1311 printk(KERN_WARNING "NFSD: Unable to initialize client "
1312 "recovery tracking! (%d)\n", status);
9a9c6478 1313 nn->client_tracking_ops = NULL;
2a4317c5
JL
1314 }
1315 return status;
1316}
1317
1318void
1319nfsd4_client_tracking_exit(struct net *net)
1320{
9a9c6478
SK
1321 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
1322
1323 if (nn->client_tracking_ops) {
1324 if (nn->client_tracking_ops->exit)
1325 nn->client_tracking_ops->exit(net);
1326 nn->client_tracking_ops = NULL;
2a4317c5
JL
1327 }
1328}
1329
1330void
1331nfsd4_client_record_create(struct nfs4_client *clp)
1332{
9a9c6478
SK
1333 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
1334
1335 if (nn->client_tracking_ops)
1336 nn->client_tracking_ops->create(clp);
2a4317c5
JL
1337}
1338
1339void
1340nfsd4_client_record_remove(struct nfs4_client *clp)
1341{
9a9c6478
SK
1342 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
1343
1344 if (nn->client_tracking_ops)
1345 nn->client_tracking_ops->remove(clp);
2a4317c5
JL
1346}
1347
1348int
1349nfsd4_client_record_check(struct nfs4_client *clp)
1350{
9a9c6478
SK
1351 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
1352
1353 if (nn->client_tracking_ops)
1354 return nn->client_tracking_ops->check(clp);
2a4317c5
JL
1355
1356 return -EOPNOTSUPP;
1357}
1358
1359void
12760c66 1360nfsd4_record_grace_done(struct nfsd_net *nn, time_t boot_time)
2a4317c5 1361{
9a9c6478
SK
1362 if (nn->client_tracking_ops)
1363 nn->client_tracking_ops->grace_done(nn, boot_time);
2a4317c5 1364}
813fd320
JL
1365
1366static int
1367rpc_pipefs_event(struct notifier_block *nb, unsigned long event, void *ptr)
1368{
1369 struct super_block *sb = ptr;
1370 struct net *net = sb->s_fs_info;
1371 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
1372 struct cld_net *cn = nn->cld_net;
1373 struct dentry *dentry;
1374 int ret = 0;
1375
1376 if (!try_module_get(THIS_MODULE))
1377 return 0;
1378
1379 if (!cn) {
1380 module_put(THIS_MODULE);
1381 return 0;
1382 }
1383
1384 switch (event) {
1385 case RPC_PIPEFS_MOUNT:
1386 dentry = nfsd4_cld_register_sb(sb, cn->cn_pipe);
1387 if (IS_ERR(dentry)) {
1388 ret = PTR_ERR(dentry);
1389 break;
1390 }
1391 cn->cn_pipe->dentry = dentry;
1392 break;
1393 case RPC_PIPEFS_UMOUNT:
1394 if (cn->cn_pipe->dentry)
1395 nfsd4_cld_unregister_sb(cn->cn_pipe);
1396 break;
1397 default:
1398 ret = -ENOTSUPP;
1399 break;
1400 }
1401 module_put(THIS_MODULE);
1402 return ret;
1403}
1404
2355c596 1405static struct notifier_block nfsd4_cld_block = {
813fd320
JL
1406 .notifier_call = rpc_pipefs_event,
1407};
797a9d79
JL
1408
1409int
1410register_cld_notifier(void)
1411{
1412 return rpc_pipefs_notifier_register(&nfsd4_cld_block);
1413}
1414
1415void
1416unregister_cld_notifier(void)
1417{
1418 rpc_pipefs_notifier_unregister(&nfsd4_cld_block);
1419}