nfsd: use proper net while reading "exports" file
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / fs / nfsd / nfs4recover.c
CommitLineData
a55370a3 1/*
a55370a3 2* Copyright (c) 2004 The Regents of the University of Michigan.
f3f80148 3* Copyright (c) 2012 Jeff Layton <jlayton@redhat.com>
a55370a3
N
4* All rights reserved.
5*
6* Andy Adamson <andros@citi.umich.edu>
7*
8* Redistribution and use in source and binary forms, with or without
9* modification, are permitted provided that the following conditions
10* are met:
11*
12* 1. Redistributions of source code must retain the above copyright
13* notice, this list of conditions and the following disclaimer.
14* 2. Redistributions in binary form must reproduce the above copyright
15* notice, this list of conditions and the following disclaimer in the
16* documentation and/or other materials provided with the distribution.
17* 3. Neither the name of the University nor the names of its
18* contributors may be used to endorse or promote products derived
19* from this software without specific prior written permission.
20*
21* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
22* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
23* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
24* DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
26* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
27* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
28* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
29* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
30* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
31* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32*
33*/
34
190e4fbf 35#include <linux/file.h>
5a0e3ad6 36#include <linux/slab.h>
190e4fbf 37#include <linux/namei.h>
a55370a3 38#include <linux/crypto.h>
e8edc6e0 39#include <linux/sched.h>
f3f80148 40#include <linux/fs.h>
813fd320 41#include <linux/module.h>
f3f80148
JL
42#include <net/net_namespace.h>
43#include <linux/sunrpc/rpc_pipe_fs.h>
44#include <linux/sunrpc/clnt.h>
45#include <linux/nfsd/cld.h>
9a74af21
BH
46
47#include "nfsd.h"
48#include "state.h"
0a3adade 49#include "vfs.h"
f3f80148 50#include "netns.h"
a55370a3
N
51
52#define NFSDDBG_FACILITY NFSDDBG_PROC
53
2a4317c5
JL
54/* Declarations */
55struct nfsd4_client_tracking_ops {
56 int (*init)(struct net *);
57 void (*exit)(struct net *);
58 void (*create)(struct nfs4_client *);
59 void (*remove)(struct nfs4_client *);
60 int (*check)(struct nfs4_client *);
12760c66 61 void (*grace_done)(struct nfsd_net *, time_t);
2a4317c5
JL
62};
63
190e4fbf 64/* Globals */
48483bf2 65static char user_recovery_dirname[PATH_MAX] = "/var/lib/nfs/v4recovery";
190e4fbf 66
d84f4f99
DH
67static int
68nfs4_save_creds(const struct cred **original_creds)
190e4fbf 69{
d84f4f99
DH
70 struct cred *new;
71
72 new = prepare_creds();
73 if (!new)
74 return -ENOMEM;
75
76 new->fsuid = 0;
77 new->fsgid = 0;
78 *original_creds = override_creds(new);
79 put_cred(new);
80 return 0;
190e4fbf
N
81}
82
83static void
d84f4f99 84nfs4_reset_creds(const struct cred *original)
190e4fbf 85{
d84f4f99 86 revert_creds(original);
190e4fbf
N
87}
88
a55370a3
N
89static void
90md5_to_hex(char *out, char *md5)
91{
92 int i;
93
94 for (i=0; i<16; i++) {
95 unsigned char c = md5[i];
96
97 *out++ = '0' + ((c&0xf0)>>4) + (c>=0xa0)*('a'-'9'-1);
98 *out++ = '0' + (c&0x0f) + ((c&0x0f)>=0x0a)*('a'-'9'-1);
99 }
100 *out = '\0';
101}
102
2216d449
JL
103static int
104nfs4_make_rec_clidname(char *dname, const struct xdr_netobj *clname)
a55370a3
N
105{
106 struct xdr_netobj cksum;
35058687 107 struct hash_desc desc;
60c74f81 108 struct scatterlist sg;
2216d449 109 int status;
a55370a3
N
110
111 dprintk("NFSD: nfs4_make_rec_clidname for %.*s\n",
112 clname->len, clname->data);
35058687
HX
113 desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP;
114 desc.tfm = crypto_alloc_hash("md5", 0, CRYPTO_ALG_ASYNC);
2216d449
JL
115 if (IS_ERR(desc.tfm)) {
116 status = PTR_ERR(desc.tfm);
35058687 117 goto out_no_tfm;
2216d449
JL
118 }
119
35058687 120 cksum.len = crypto_hash_digestsize(desc.tfm);
a55370a3 121 cksum.data = kmalloc(cksum.len, GFP_KERNEL);
2216d449
JL
122 if (cksum.data == NULL) {
123 status = -ENOMEM;
a55370a3 124 goto out;
2216d449 125 }
a55370a3 126
60c74f81 127 sg_init_one(&sg, clname->data, clname->len);
a55370a3 128
2216d449
JL
129 status = crypto_hash_digest(&desc, &sg, sg.length, cksum.data);
130 if (status)
35058687 131 goto out;
a55370a3
N
132
133 md5_to_hex(dname, cksum.data);
134
2216d449 135 status = 0;
a55370a3 136out:
2bd9e7b6 137 kfree(cksum.data);
35058687
HX
138 crypto_free_hash(desc.tfm);
139out_no_tfm:
a55370a3
N
140 return status;
141}
190e4fbf 142
2216d449
JL
143/*
144 * If we had an error generating the recdir name for the legacy tracker
145 * then warn the admin. If the error doesn't appear to be transient,
146 * then disable recovery tracking.
147 */
148static void
149legacy_recdir_name_error(int error)
150{
151 printk(KERN_ERR "NFSD: unable to generate recoverydir "
152 "name (%d).\n", error);
153
154 /*
155 * if the algorithm just doesn't exist, then disable the recovery
156 * tracker altogether. The crypto libs will generally return this if
157 * FIPS is enabled as well.
158 */
159 if (error == -ENOENT) {
160 printk(KERN_ERR "NFSD: disabling legacy clientid tracking. "
161 "Reboot recovery will not function correctly!\n");
162
163 /* the argument is ignored by the legacy exit function */
164 nfsd4_client_tracking_exit(NULL);
165 }
166}
167
2a4317c5
JL
168static void
169nfsd4_create_clid_dir(struct nfs4_client *clp)
c7b9a459 170{
d84f4f99 171 const struct cred *original_cred;
2216d449 172 char dname[HEXDIR_LEN];
e970a573 173 struct dentry *dir, *dentry;
0ce0c2b5 174 struct nfs4_client_reclaim *crp;
c7b9a459 175 int status;
52e19c09 176 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
c7b9a459
N
177
178 dprintk("NFSD: nfsd4_create_clid_dir for \"%s\"\n", dname);
179
a52d726b 180 if (test_and_set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
7a6ef8c7 181 return;
3a073369 182 if (!nn->rec_file)
7a6ef8c7 183 return;
2216d449
JL
184
185 status = nfs4_make_rec_clidname(dname, &clp->cl_name);
186 if (status)
187 return legacy_recdir_name_error(status);
188
d84f4f99
DH
189 status = nfs4_save_creds(&original_cred);
190 if (status < 0)
7a6ef8c7 191 return;
c7b9a459 192
3a073369 193 status = mnt_want_write_file(nn->rec_file);
4a55c101
JK
194 if (status)
195 return;
196
3a073369 197 dir = nn->rec_file->f_path.dentry;
c7b9a459 198 /* lock the parent */
e970a573 199 mutex_lock(&dir->d_inode->i_mutex);
c7b9a459 200
e970a573 201 dentry = lookup_one_len(dname, dir, HEXDIR_LEN-1);
c7b9a459
N
202 if (IS_ERR(dentry)) {
203 status = PTR_ERR(dentry);
204 goto out_unlock;
205 }
6577aac0 206 if (dentry->d_inode)
aec39680
BF
207 /*
208 * In the 4.1 case, where we're called from
209 * reclaim_complete(), records from the previous reboot
210 * may still be left, so this is OK.
211 *
212 * In the 4.0 case, we should never get here; but we may
213 * as well be forgiving and just succeed silently.
214 */
c7b9a459 215 goto out_put;
e970a573 216 status = vfs_mkdir(dir->d_inode, dentry, S_IRWXU);
c7b9a459
N
217out_put:
218 dput(dentry);
219out_unlock:
e970a573 220 mutex_unlock(&dir->d_inode->i_mutex);
0ce0c2b5 221 if (status == 0) {
f141f79d 222 if (nn->in_grace) {
52e19c09 223 crp = nfs4_client_to_reclaim(dname, nn);
0ce0c2b5
JL
224 if (crp)
225 crp->cr_clp = clp;
226 }
3a073369 227 vfs_fsync(nn->rec_file, 0);
0ce0c2b5 228 } else {
6577aac0
BH
229 printk(KERN_ERR "NFSD: failed to write recovery record"
230 " (err %d); please check that %s exists"
231 " and is writeable", status,
232 user_recovery_dirname);
0ce0c2b5 233 }
3a073369 234 mnt_drop_write_file(nn->rec_file);
d84f4f99 235 nfs4_reset_creds(original_cred);
c7b9a459
N
236}
237
52e19c09 238typedef int (recdir_func)(struct dentry *, struct dentry *, struct nfsd_net *);
190e4fbf 239
05f4f678
BF
240struct name_list {
241 char name[HEXDIR_LEN];
190e4fbf
N
242 struct list_head list;
243};
244
190e4fbf 245static int
05f4f678 246nfsd4_build_namelist(void *arg, const char *name, int namlen,
afefdbb2 247 loff_t offset, u64 ino, unsigned int d_type)
190e4fbf 248{
05f4f678
BF
249 struct list_head *names = arg;
250 struct name_list *entry;
190e4fbf 251
05f4f678 252 if (namlen != HEXDIR_LEN - 1)
b37ad28b 253 return 0;
05f4f678
BF
254 entry = kmalloc(sizeof(struct name_list), GFP_KERNEL);
255 if (entry == NULL)
190e4fbf 256 return -ENOMEM;
05f4f678
BF
257 memcpy(entry->name, name, HEXDIR_LEN - 1);
258 entry->name[HEXDIR_LEN - 1] = '\0';
259 list_add(&entry->list, names);
190e4fbf
N
260 return 0;
261}
262
263static int
52e19c09 264nfsd4_list_rec_dir(recdir_func *f, struct nfsd_net *nn)
190e4fbf 265{
d84f4f99 266 const struct cred *original_cred;
3a073369 267 struct dentry *dir = nn->rec_file->f_path.dentry;
05f4f678 268 LIST_HEAD(names);
190e4fbf
N
269 int status;
270
d84f4f99
DH
271 status = nfs4_save_creds(&original_cred);
272 if (status < 0)
273 return status;
190e4fbf 274
3a073369 275 status = vfs_llseek(nn->rec_file, 0, SEEK_SET);
5b4b299c
AV
276 if (status < 0) {
277 nfs4_reset_creds(original_cred);
278 return status;
279 }
280
3a073369 281 status = vfs_readdir(nn->rec_file, nfsd4_build_namelist, &names);
8daed1e5 282 mutex_lock_nested(&dir->d_inode->i_mutex, I_MUTEX_PARENT);
05f4f678 283 while (!list_empty(&names)) {
5b4b299c 284 struct name_list *entry;
05f4f678 285 entry = list_entry(names.next, struct name_list, list);
5b4b299c
AV
286 if (!status) {
287 struct dentry *dentry;
288 dentry = lookup_one_len(entry->name, dir, HEXDIR_LEN-1);
289 if (IS_ERR(dentry)) {
290 status = PTR_ERR(dentry);
291 break;
292 }
52e19c09 293 status = f(dir, dentry, nn);
5b4b299c 294 dput(dentry);
05f4f678 295 }
05f4f678
BF
296 list_del(&entry->list);
297 kfree(entry);
190e4fbf 298 }
2f9092e1 299 mutex_unlock(&dir->d_inode->i_mutex);
d84f4f99 300 nfs4_reset_creds(original_cred);
190e4fbf
N
301 return status;
302}
303
c7b9a459 304static int
3a073369 305nfsd4_unlink_clid_dir(char *name, int namlen, struct nfsd_net *nn)
c7b9a459 306{
e970a573 307 struct dentry *dir, *dentry;
c7b9a459
N
308 int status;
309
310 dprintk("NFSD: nfsd4_unlink_clid_dir. name %.*s\n", namlen, name);
311
3a073369 312 dir = nn->rec_file->f_path.dentry;
e970a573
CH
313 mutex_lock_nested(&dir->d_inode->i_mutex, I_MUTEX_PARENT);
314 dentry = lookup_one_len(name, dir, namlen);
c7b9a459
N
315 if (IS_ERR(dentry)) {
316 status = PTR_ERR(dentry);
2f9092e1 317 goto out_unlock;
c7b9a459
N
318 }
319 status = -ENOENT;
320 if (!dentry->d_inode)
321 goto out;
e970a573 322 status = vfs_rmdir(dir->d_inode, dentry);
c7b9a459
N
323out:
324 dput(dentry);
2f9092e1 325out_unlock:
e970a573 326 mutex_unlock(&dir->d_inode->i_mutex);
c7b9a459
N
327 return status;
328}
329
2a4317c5 330static void
c7b9a459
N
331nfsd4_remove_clid_dir(struct nfs4_client *clp)
332{
d84f4f99 333 const struct cred *original_cred;
0ce0c2b5 334 struct nfs4_client_reclaim *crp;
2216d449 335 char dname[HEXDIR_LEN];
c7b9a459 336 int status;
52e19c09 337 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
c7b9a459 338
3a073369 339 if (!nn->rec_file || !test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
c7b9a459
N
340 return;
341
2216d449
JL
342 status = nfs4_make_rec_clidname(dname, &clp->cl_name);
343 if (status)
344 return legacy_recdir_name_error(status);
345
3a073369 346 status = mnt_want_write_file(nn->rec_file);
0622753b
DH
347 if (status)
348 goto out;
a52d726b 349 clear_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
d84f4f99
DH
350
351 status = nfs4_save_creds(&original_cred);
352 if (status < 0)
698d8d87 353 goto out_drop_write;
d84f4f99 354
3a073369 355 status = nfsd4_unlink_clid_dir(dname, HEXDIR_LEN-1, nn);
d84f4f99 356 nfs4_reset_creds(original_cred);
0ce0c2b5 357 if (status == 0) {
3a073369 358 vfs_fsync(nn->rec_file, 0);
f141f79d 359 if (nn->in_grace) {
0ce0c2b5 360 /* remove reclaim record */
52e19c09 361 crp = nfsd4_find_reclaim_client(dname, nn);
0ce0c2b5 362 if (crp)
52e19c09 363 nfs4_remove_reclaim_record(crp, nn);
0ce0c2b5
JL
364 }
365 }
698d8d87 366out_drop_write:
3a073369 367 mnt_drop_write_file(nn->rec_file);
0622753b 368out:
c7b9a459
N
369 if (status)
370 printk("NFSD: Failed to remove expired client state directory"
2216d449 371 " %.*s\n", HEXDIR_LEN, dname);
c7b9a459
N
372}
373
374static int
52e19c09 375purge_old(struct dentry *parent, struct dentry *child, struct nfsd_net *nn)
c7b9a459
N
376{
377 int status;
378
52e19c09 379 if (nfs4_has_reclaimed_state(child->d_name.name, nn))
b37ad28b 380 return 0;
c7b9a459 381
2f9092e1 382 status = vfs_rmdir(parent->d_inode, child);
c7b9a459
N
383 if (status)
384 printk("failed to remove client recovery directory %s\n",
385 child->d_name.name);
386 /* Keep trying, success or failure: */
b37ad28b 387 return 0;
c7b9a459
N
388}
389
2a4317c5 390static void
12760c66 391nfsd4_recdir_purge_old(struct nfsd_net *nn, time_t boot_time)
2a4317c5 392{
c7b9a459
N
393 int status;
394
f141f79d 395 nn->in_grace = false;
3a073369 396 if (!nn->rec_file)
c7b9a459 397 return;
3a073369 398 status = mnt_want_write_file(nn->rec_file);
0622753b
DH
399 if (status)
400 goto out;
52e19c09 401 status = nfsd4_list_rec_dir(purge_old, nn);
c7b9a459 402 if (status == 0)
3a073369
SK
403 vfs_fsync(nn->rec_file, 0);
404 mnt_drop_write_file(nn->rec_file);
0622753b 405out:
52e19c09 406 nfs4_release_reclaim(nn);
c7b9a459
N
407 if (status)
408 printk("nfsd4: failed to purge old clients from recovery"
3a073369 409 " directory %s\n", nn->rec_file->f_path.dentry->d_name.name);
c7b9a459
N
410}
411
190e4fbf 412static int
52e19c09 413load_recdir(struct dentry *parent, struct dentry *child, struct nfsd_net *nn)
190e4fbf
N
414{
415 if (child->d_name.len != HEXDIR_LEN - 1) {
416 printk("nfsd4: illegal name %s in recovery directory\n",
417 child->d_name.name);
418 /* Keep trying; maybe the others are OK: */
b37ad28b 419 return 0;
190e4fbf 420 }
52e19c09 421 nfs4_client_to_reclaim(child->d_name.name, nn);
b37ad28b 422 return 0;
190e4fbf
N
423}
424
2a4317c5 425static int
52e19c09 426nfsd4_recdir_load(struct net *net) {
190e4fbf 427 int status;
52e19c09 428 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
190e4fbf 429
3a073369 430 if (!nn->rec_file)
e970a573
CH
431 return 0;
432
52e19c09 433 status = nfsd4_list_rec_dir(load_recdir, nn);
190e4fbf
N
434 if (status)
435 printk("nfsd4: failed loading clients from recovery"
3a073369 436 " directory %s\n", nn->rec_file->f_path.dentry->d_name.name);
190e4fbf
N
437 return status;
438}
439
440/*
441 * Hold reference to the recovery directory.
442 */
443
2a4317c5 444static int
3a073369 445nfsd4_init_recdir(struct net *net)
190e4fbf 446{
3a073369 447 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
d84f4f99
DH
448 const struct cred *original_cred;
449 int status;
190e4fbf
N
450
451 printk("NFSD: Using %s as the NFSv4 state recovery directory\n",
48483bf2 452 user_recovery_dirname);
190e4fbf 453
3a073369 454 BUG_ON(nn->rec_file);
190e4fbf 455
d84f4f99
DH
456 status = nfs4_save_creds(&original_cred);
457 if (status < 0) {
458 printk("NFSD: Unable to change credentials to find recovery"
459 " directory: error %d\n",
460 status);
2a4317c5 461 return status;
d84f4f99 462 }
190e4fbf 463
3a073369
SK
464 nn->rec_file = filp_open(user_recovery_dirname, O_RDONLY | O_DIRECTORY, 0);
465 if (IS_ERR(nn->rec_file)) {
c2642ab0 466 printk("NFSD: unable to find recovery directory %s\n",
48483bf2 467 user_recovery_dirname);
3a073369
SK
468 status = PTR_ERR(nn->rec_file);
469 nn->rec_file = NULL;
e970a573 470 }
190e4fbf 471
d84f4f99 472 nfs4_reset_creds(original_cred);
0ce0c2b5 473 if (!status)
f141f79d 474 nn->in_grace = true;
2a4317c5 475 return status;
190e4fbf
N
476}
477
52e19c09
SK
478
479static int
480nfs4_legacy_state_init(struct net *net)
481{
482 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
483 int i;
484
485 nn->reclaim_str_hashtbl = kmalloc(sizeof(struct list_head) *
486 CLIENT_HASH_SIZE, GFP_KERNEL);
487 if (!nn->reclaim_str_hashtbl)
488 return -ENOMEM;
489
490 for (i = 0; i < CLIENT_HASH_SIZE; i++)
491 INIT_LIST_HEAD(&nn->reclaim_str_hashtbl[i]);
492 nn->reclaim_str_hashtbl_size = 0;
493
494 return 0;
495}
496
497static void
498nfs4_legacy_state_shutdown(struct net *net)
499{
500 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
501
502 kfree(nn->reclaim_str_hashtbl);
503}
504
2a4317c5
JL
505static int
506nfsd4_load_reboot_recovery_data(struct net *net)
507{
508 int status;
509
3a073369 510 status = nfsd4_init_recdir(net);
52e19c09
SK
511 if (!status)
512 status = nfsd4_recdir_load(net);
52e19c09
SK
513 if (status)
514 printk(KERN_ERR "NFSD: Failure reading reboot recovery data\n");
515 return status;
516}
517
518static int
519nfsd4_legacy_tracking_init(struct net *net)
520{
521 int status;
522
cc27e0d4
JL
523 /* XXX: The legacy code won't work in a container */
524 if (net != &init_net) {
525 WARN(1, KERN_ERR "NFSD: attempt to initialize legacy client "
526 "tracking in a container!\n");
527 return -EINVAL;
528 }
529
52e19c09 530 status = nfs4_legacy_state_init(net);
2a4317c5 531 if (status)
52e19c09
SK
532 return status;
533
534 status = nfsd4_load_reboot_recovery_data(net);
535 if (status)
536 goto err;
537 return 0;
538
539err:
540 nfs4_legacy_state_shutdown(net);
2a4317c5
JL
541 return status;
542}
543
544static void
3a073369 545nfsd4_shutdown_recdir(struct nfsd_net *nn)
190e4fbf 546{
3a073369 547 if (!nn->rec_file)
190e4fbf 548 return;
3a073369
SK
549 fput(nn->rec_file);
550 nn->rec_file = NULL;
190e4fbf 551}
48483bf2 552
2a4317c5
JL
553static void
554nfsd4_legacy_tracking_exit(struct net *net)
555{
52e19c09
SK
556 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
557
558 nfs4_release_reclaim(nn);
3a073369 559 nfsd4_shutdown_recdir(nn);
52e19c09 560 nfs4_legacy_state_shutdown(net);
2a4317c5
JL
561}
562
48483bf2
BF
563/*
564 * Change the NFSv4 recovery directory to recdir.
565 */
566int
567nfs4_reset_recoverydir(char *recdir)
568{
569 int status;
570 struct path path;
571
572 status = kern_path(recdir, LOOKUP_FOLLOW, &path);
573 if (status)
574 return status;
575 status = -ENOTDIR;
576 if (S_ISDIR(path.dentry->d_inode->i_mode)) {
577 strcpy(user_recovery_dirname, recdir);
578 status = 0;
579 }
580 path_put(&path);
581 return status;
582}
583
584char *
585nfs4_recoverydir(void)
586{
587 return user_recovery_dirname;
588}
2a4317c5
JL
589
590static int
591nfsd4_check_legacy_client(struct nfs4_client *clp)
592{
2216d449
JL
593 int status;
594 char dname[HEXDIR_LEN];
0ce0c2b5 595 struct nfs4_client_reclaim *crp;
52e19c09 596 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
0ce0c2b5 597
2a4317c5
JL
598 /* did we already find that this client is stable? */
599 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
600 return 0;
601
2216d449
JL
602 status = nfs4_make_rec_clidname(dname, &clp->cl_name);
603 if (status) {
604 legacy_recdir_name_error(status);
605 return status;
606 }
607
2a4317c5 608 /* look for it in the reclaim hashtable otherwise */
52e19c09 609 crp = nfsd4_find_reclaim_client(dname, nn);
0ce0c2b5 610 if (crp) {
2a4317c5 611 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
0ce0c2b5 612 crp->cr_clp = clp;
2a4317c5
JL
613 return 0;
614 }
615
616 return -ENOENT;
617}
618
619static struct nfsd4_client_tracking_ops nfsd4_legacy_tracking_ops = {
52e19c09 620 .init = nfsd4_legacy_tracking_init,
2a4317c5
JL
621 .exit = nfsd4_legacy_tracking_exit,
622 .create = nfsd4_create_clid_dir,
623 .remove = nfsd4_remove_clid_dir,
624 .check = nfsd4_check_legacy_client,
625 .grace_done = nfsd4_recdir_purge_old,
626};
627
f3f80148
JL
628/* Globals */
629#define NFSD_PIPE_DIR "nfsd"
630#define NFSD_CLD_PIPE "cld"
631
632/* per-net-ns structure for holding cld upcall info */
633struct cld_net {
634 struct rpc_pipe *cn_pipe;
635 spinlock_t cn_lock;
636 struct list_head cn_list;
637 unsigned int cn_xid;
638};
639
640struct cld_upcall {
641 struct list_head cu_list;
642 struct cld_net *cu_net;
643 struct task_struct *cu_task;
644 struct cld_msg cu_msg;
645};
646
647static int
648__cld_pipe_upcall(struct rpc_pipe *pipe, struct cld_msg *cmsg)
649{
650 int ret;
651 struct rpc_pipe_msg msg;
652
653 memset(&msg, 0, sizeof(msg));
654 msg.data = cmsg;
655 msg.len = sizeof(*cmsg);
656
657 /*
658 * Set task state before we queue the upcall. That prevents
659 * wake_up_process in the downcall from racing with schedule.
660 */
661 set_current_state(TASK_UNINTERRUPTIBLE);
662 ret = rpc_queue_upcall(pipe, &msg);
663 if (ret < 0) {
664 set_current_state(TASK_RUNNING);
665 goto out;
666 }
667
668 schedule();
669 set_current_state(TASK_RUNNING);
670
671 if (msg.errno < 0)
672 ret = msg.errno;
673out:
674 return ret;
675}
676
677static int
678cld_pipe_upcall(struct rpc_pipe *pipe, struct cld_msg *cmsg)
679{
680 int ret;
681
682 /*
683 * -EAGAIN occurs when pipe is closed and reopened while there are
684 * upcalls queued.
685 */
686 do {
687 ret = __cld_pipe_upcall(pipe, cmsg);
688 } while (ret == -EAGAIN);
689
690 return ret;
691}
692
693static ssize_t
694cld_pipe_downcall(struct file *filp, const char __user *src, size_t mlen)
695{
696 struct cld_upcall *tmp, *cup;
bc1b542b 697 struct cld_msg __user *cmsg = (struct cld_msg __user *)src;
f3f80148
JL
698 uint32_t xid;
699 struct nfsd_net *nn = net_generic(filp->f_dentry->d_sb->s_fs_info,
700 nfsd_net_id);
701 struct cld_net *cn = nn->cld_net;
702
703 if (mlen != sizeof(*cmsg)) {
8a7dc4b0 704 dprintk("%s: got %zu bytes, expected %zu\n", __func__, mlen,
f3f80148
JL
705 sizeof(*cmsg));
706 return -EINVAL;
707 }
708
709 /* copy just the xid so we can try to find that */
710 if (copy_from_user(&xid, &cmsg->cm_xid, sizeof(xid)) != 0) {
711 dprintk("%s: error when copying xid from userspace", __func__);
712 return -EFAULT;
713 }
714
715 /* walk the list and find corresponding xid */
716 cup = NULL;
717 spin_lock(&cn->cn_lock);
718 list_for_each_entry(tmp, &cn->cn_list, cu_list) {
719 if (get_unaligned(&tmp->cu_msg.cm_xid) == xid) {
720 cup = tmp;
721 list_del_init(&cup->cu_list);
722 break;
723 }
724 }
725 spin_unlock(&cn->cn_lock);
726
727 /* couldn't find upcall? */
728 if (!cup) {
21f72c9f 729 dprintk("%s: couldn't find upcall -- xid=%u\n", __func__, xid);
f3f80148
JL
730 return -EINVAL;
731 }
732
733 if (copy_from_user(&cup->cu_msg, src, mlen) != 0)
734 return -EFAULT;
735
736 wake_up_process(cup->cu_task);
737 return mlen;
738}
739
740static void
741cld_pipe_destroy_msg(struct rpc_pipe_msg *msg)
742{
743 struct cld_msg *cmsg = msg->data;
744 struct cld_upcall *cup = container_of(cmsg, struct cld_upcall,
745 cu_msg);
746
747 /* errno >= 0 means we got a downcall */
748 if (msg->errno >= 0)
749 return;
750
751 wake_up_process(cup->cu_task);
752}
753
754static const struct rpc_pipe_ops cld_upcall_ops = {
755 .upcall = rpc_pipe_generic_upcall,
756 .downcall = cld_pipe_downcall,
757 .destroy_msg = cld_pipe_destroy_msg,
758};
759
760static struct dentry *
761nfsd4_cld_register_sb(struct super_block *sb, struct rpc_pipe *pipe)
762{
763 struct dentry *dir, *dentry;
764
765 dir = rpc_d_lookup_sb(sb, NFSD_PIPE_DIR);
766 if (dir == NULL)
767 return ERR_PTR(-ENOENT);
768 dentry = rpc_mkpipe_dentry(dir, NFSD_CLD_PIPE, NULL, pipe);
769 dput(dir);
770 return dentry;
771}
772
773static void
774nfsd4_cld_unregister_sb(struct rpc_pipe *pipe)
775{
776 if (pipe->dentry)
777 rpc_unlink(pipe->dentry);
778}
779
780static struct dentry *
781nfsd4_cld_register_net(struct net *net, struct rpc_pipe *pipe)
782{
783 struct super_block *sb;
784 struct dentry *dentry;
785
786 sb = rpc_get_sb_net(net);
787 if (!sb)
788 return NULL;
789 dentry = nfsd4_cld_register_sb(sb, pipe);
790 rpc_put_sb_net(net);
791 return dentry;
792}
793
794static void
795nfsd4_cld_unregister_net(struct net *net, struct rpc_pipe *pipe)
796{
797 struct super_block *sb;
798
799 sb = rpc_get_sb_net(net);
800 if (sb) {
801 nfsd4_cld_unregister_sb(pipe);
802 rpc_put_sb_net(net);
803 }
804}
805
806/* Initialize rpc_pipefs pipe for communication with client tracking daemon */
807static int
808nfsd4_init_cld_pipe(struct net *net)
809{
810 int ret;
811 struct dentry *dentry;
812 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
813 struct cld_net *cn;
814
815 if (nn->cld_net)
816 return 0;
817
818 cn = kzalloc(sizeof(*cn), GFP_KERNEL);
819 if (!cn) {
820 ret = -ENOMEM;
821 goto err;
822 }
823
824 cn->cn_pipe = rpc_mkpipe_data(&cld_upcall_ops, RPC_PIPE_WAIT_FOR_OPEN);
825 if (IS_ERR(cn->cn_pipe)) {
826 ret = PTR_ERR(cn->cn_pipe);
827 goto err;
828 }
829 spin_lock_init(&cn->cn_lock);
830 INIT_LIST_HEAD(&cn->cn_list);
831
832 dentry = nfsd4_cld_register_net(net, cn->cn_pipe);
833 if (IS_ERR(dentry)) {
834 ret = PTR_ERR(dentry);
835 goto err_destroy_data;
836 }
837
838 cn->cn_pipe->dentry = dentry;
839 nn->cld_net = cn;
840 return 0;
841
842err_destroy_data:
843 rpc_destroy_pipe_data(cn->cn_pipe);
844err:
845 kfree(cn);
846 printk(KERN_ERR "NFSD: unable to create nfsdcld upcall pipe (%d)\n",
847 ret);
848 return ret;
849}
850
851static void
852nfsd4_remove_cld_pipe(struct net *net)
853{
854 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
855 struct cld_net *cn = nn->cld_net;
856
857 nfsd4_cld_unregister_net(net, cn->cn_pipe);
858 rpc_destroy_pipe_data(cn->cn_pipe);
859 kfree(nn->cld_net);
860 nn->cld_net = NULL;
861}
862
863static struct cld_upcall *
864alloc_cld_upcall(struct cld_net *cn)
865{
866 struct cld_upcall *new, *tmp;
867
868 new = kzalloc(sizeof(*new), GFP_KERNEL);
869 if (!new)
870 return new;
871
872 /* FIXME: hard cap on number in flight? */
873restart_search:
874 spin_lock(&cn->cn_lock);
875 list_for_each_entry(tmp, &cn->cn_list, cu_list) {
876 if (tmp->cu_msg.cm_xid == cn->cn_xid) {
877 cn->cn_xid++;
878 spin_unlock(&cn->cn_lock);
879 goto restart_search;
880 }
881 }
882 new->cu_task = current;
883 new->cu_msg.cm_vers = CLD_UPCALL_VERSION;
884 put_unaligned(cn->cn_xid++, &new->cu_msg.cm_xid);
885 new->cu_net = cn;
886 list_add(&new->cu_list, &cn->cn_list);
887 spin_unlock(&cn->cn_lock);
888
889 dprintk("%s: allocated xid %u\n", __func__, new->cu_msg.cm_xid);
890
891 return new;
892}
893
894static void
895free_cld_upcall(struct cld_upcall *victim)
896{
897 struct cld_net *cn = victim->cu_net;
898
899 spin_lock(&cn->cn_lock);
900 list_del(&victim->cu_list);
901 spin_unlock(&cn->cn_lock);
902 kfree(victim);
903}
904
905/* Ask daemon to create a new record */
906static void
907nfsd4_cld_create(struct nfs4_client *clp)
908{
909 int ret;
910 struct cld_upcall *cup;
c212cecf 911 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
f3f80148
JL
912 struct cld_net *cn = nn->cld_net;
913
914 /* Don't upcall if it's already stored */
915 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
916 return;
917
918 cup = alloc_cld_upcall(cn);
919 if (!cup) {
920 ret = -ENOMEM;
921 goto out_err;
922 }
923
924 cup->cu_msg.cm_cmd = Cld_Create;
925 cup->cu_msg.cm_u.cm_name.cn_len = clp->cl_name.len;
926 memcpy(cup->cu_msg.cm_u.cm_name.cn_id, clp->cl_name.data,
927 clp->cl_name.len);
928
929 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
930 if (!ret) {
931 ret = cup->cu_msg.cm_status;
932 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
933 }
934
935 free_cld_upcall(cup);
936out_err:
937 if (ret)
938 printk(KERN_ERR "NFSD: Unable to create client "
939 "record on stable storage: %d\n", ret);
940}
941
942/* Ask daemon to create a new record */
943static void
944nfsd4_cld_remove(struct nfs4_client *clp)
945{
946 int ret;
947 struct cld_upcall *cup;
c212cecf 948 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
f3f80148
JL
949 struct cld_net *cn = nn->cld_net;
950
951 /* Don't upcall if it's already removed */
952 if (!test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
953 return;
954
955 cup = alloc_cld_upcall(cn);
956 if (!cup) {
957 ret = -ENOMEM;
958 goto out_err;
959 }
960
961 cup->cu_msg.cm_cmd = Cld_Remove;
962 cup->cu_msg.cm_u.cm_name.cn_len = clp->cl_name.len;
963 memcpy(cup->cu_msg.cm_u.cm_name.cn_id, clp->cl_name.data,
964 clp->cl_name.len);
965
966 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
967 if (!ret) {
968 ret = cup->cu_msg.cm_status;
969 clear_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
970 }
971
972 free_cld_upcall(cup);
973out_err:
974 if (ret)
975 printk(KERN_ERR "NFSD: Unable to remove client "
976 "record from stable storage: %d\n", ret);
977}
978
979/* Check for presence of a record, and update its timestamp */
980static int
981nfsd4_cld_check(struct nfs4_client *clp)
982{
983 int ret;
984 struct cld_upcall *cup;
c212cecf 985 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
f3f80148
JL
986 struct cld_net *cn = nn->cld_net;
987
988 /* Don't upcall if one was already stored during this grace pd */
989 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
990 return 0;
991
992 cup = alloc_cld_upcall(cn);
993 if (!cup) {
994 printk(KERN_ERR "NFSD: Unable to check client record on "
995 "stable storage: %d\n", -ENOMEM);
996 return -ENOMEM;
997 }
998
999 cup->cu_msg.cm_cmd = Cld_Check;
1000 cup->cu_msg.cm_u.cm_name.cn_len = clp->cl_name.len;
1001 memcpy(cup->cu_msg.cm_u.cm_name.cn_id, clp->cl_name.data,
1002 clp->cl_name.len);
1003
1004 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
1005 if (!ret) {
1006 ret = cup->cu_msg.cm_status;
1007 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
1008 }
1009
1010 free_cld_upcall(cup);
1011 return ret;
1012}
1013
1014static void
12760c66 1015nfsd4_cld_grace_done(struct nfsd_net *nn, time_t boot_time)
f3f80148
JL
1016{
1017 int ret;
1018 struct cld_upcall *cup;
f3f80148
JL
1019 struct cld_net *cn = nn->cld_net;
1020
1021 cup = alloc_cld_upcall(cn);
1022 if (!cup) {
1023 ret = -ENOMEM;
1024 goto out_err;
1025 }
1026
1027 cup->cu_msg.cm_cmd = Cld_GraceDone;
1028 cup->cu_msg.cm_u.cm_gracetime = (int64_t)boot_time;
1029 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
1030 if (!ret)
1031 ret = cup->cu_msg.cm_status;
1032
1033 free_cld_upcall(cup);
1034out_err:
1035 if (ret)
1036 printk(KERN_ERR "NFSD: Unable to end grace period: %d\n", ret);
1037}
1038
1039static struct nfsd4_client_tracking_ops nfsd4_cld_tracking_ops = {
1040 .init = nfsd4_init_cld_pipe,
1041 .exit = nfsd4_remove_cld_pipe,
1042 .create = nfsd4_cld_create,
1043 .remove = nfsd4_cld_remove,
1044 .check = nfsd4_cld_check,
1045 .grace_done = nfsd4_cld_grace_done,
1046};
1047
2873d214
JL
1048/* upcall via usermodehelper */
1049static char cltrack_prog[PATH_MAX] = "/sbin/nfsdcltrack";
1050module_param_string(cltrack_prog, cltrack_prog, sizeof(cltrack_prog),
1051 S_IRUGO|S_IWUSR);
1052MODULE_PARM_DESC(cltrack_prog, "Path to the nfsdcltrack upcall program");
1053
f3aa7e24
JL
1054static bool cltrack_legacy_disable;
1055module_param(cltrack_legacy_disable, bool, S_IRUGO|S_IWUSR);
1056MODULE_PARM_DESC(cltrack_legacy_disable,
1057 "Disable legacy recoverydir conversion. Default: false");
1058
1059#define LEGACY_TOPDIR_ENV_PREFIX "NFSDCLTRACK_LEGACY_TOPDIR="
1060#define LEGACY_RECDIR_ENV_PREFIX "NFSDCLTRACK_LEGACY_RECDIR="
1061
1062static char *
1063nfsd4_cltrack_legacy_topdir(void)
1064{
1065 int copied;
1066 size_t len;
1067 char *result;
1068
1069 if (cltrack_legacy_disable)
1070 return NULL;
1071
1072 len = strlen(LEGACY_TOPDIR_ENV_PREFIX) +
1073 strlen(nfs4_recoverydir()) + 1;
1074
1075 result = kmalloc(len, GFP_KERNEL);
1076 if (!result)
1077 return result;
1078
1079 copied = snprintf(result, len, LEGACY_TOPDIR_ENV_PREFIX "%s",
1080 nfs4_recoverydir());
1081 if (copied >= len) {
1082 /* just return nothing if output was truncated */
1083 kfree(result);
1084 return NULL;
1085 }
1086
1087 return result;
1088}
1089
1090static char *
2216d449 1091nfsd4_cltrack_legacy_recdir(const struct xdr_netobj *name)
f3aa7e24
JL
1092{
1093 int copied;
1094 size_t len;
1095 char *result;
1096
1097 if (cltrack_legacy_disable)
1098 return NULL;
1099
1100 /* +1 is for '/' between "topdir" and "recdir" */
1101 len = strlen(LEGACY_RECDIR_ENV_PREFIX) +
1102 strlen(nfs4_recoverydir()) + 1 + HEXDIR_LEN;
1103
1104 result = kmalloc(len, GFP_KERNEL);
1105 if (!result)
1106 return result;
1107
2216d449
JL
1108 copied = snprintf(result, len, LEGACY_RECDIR_ENV_PREFIX "%s/",
1109 nfs4_recoverydir());
1110 if (copied > (len - HEXDIR_LEN)) {
1111 /* just return nothing if output will be truncated */
1112 kfree(result);
1113 return NULL;
1114 }
1115
1116 copied = nfs4_make_rec_clidname(result + copied, name);
1117 if (copied) {
f3aa7e24
JL
1118 kfree(result);
1119 return NULL;
1120 }
1121
1122 return result;
1123}
1124
2873d214 1125static int
f3aa7e24 1126nfsd4_umh_cltrack_upcall(char *cmd, char *arg, char *legacy)
2873d214 1127{
f3aa7e24 1128 char *envp[2];
2873d214
JL
1129 char *argv[4];
1130 int ret;
1131
1132 if (unlikely(!cltrack_prog[0])) {
1133 dprintk("%s: cltrack_prog is disabled\n", __func__);
1134 return -EACCES;
1135 }
1136
1137 dprintk("%s: cmd: %s\n", __func__, cmd);
1138 dprintk("%s: arg: %s\n", __func__, arg ? arg : "(null)");
f3aa7e24
JL
1139 dprintk("%s: legacy: %s\n", __func__, legacy ? legacy : "(null)");
1140
1141 envp[0] = legacy;
1142 envp[1] = NULL;
2873d214
JL
1143
1144 argv[0] = (char *)cltrack_prog;
1145 argv[1] = cmd;
1146 argv[2] = arg;
1147 argv[3] = NULL;
1148
1149 ret = call_usermodehelper(argv[0], argv, envp, UMH_WAIT_PROC);
1150 /*
1151 * Disable the upcall mechanism if we're getting an ENOENT or EACCES
1152 * error. The admin can re-enable it on the fly by using sysfs
1153 * once the problem has been fixed.
1154 */
1155 if (ret == -ENOENT || ret == -EACCES) {
1156 dprintk("NFSD: %s was not found or isn't executable (%d). "
1157 "Setting cltrack_prog to blank string!",
1158 cltrack_prog, ret);
1159 cltrack_prog[0] = '\0';
1160 }
1161 dprintk("%s: %s return value: %d\n", __func__, cltrack_prog, ret);
1162
1163 return ret;
1164}
1165
1166static char *
1167bin_to_hex_dup(const unsigned char *src, int srclen)
1168{
1169 int i;
1170 char *buf, *hex;
1171
1172 /* +1 for terminating NULL */
1173 buf = kmalloc((srclen * 2) + 1, GFP_KERNEL);
1174 if (!buf)
1175 return buf;
1176
1177 hex = buf;
1178 for (i = 0; i < srclen; i++) {
1179 sprintf(hex, "%2.2x", *src++);
1180 hex += 2;
1181 }
1182 return buf;
1183}
1184
1185static int
1186nfsd4_umh_cltrack_init(struct net __attribute__((unused)) *net)
1187{
f3aa7e24 1188 return nfsd4_umh_cltrack_upcall("init", NULL, NULL);
2873d214
JL
1189}
1190
1191static void
1192nfsd4_umh_cltrack_create(struct nfs4_client *clp)
1193{
1194 char *hexid;
1195
1196 hexid = bin_to_hex_dup(clp->cl_name.data, clp->cl_name.len);
1197 if (!hexid) {
1198 dprintk("%s: can't allocate memory for upcall!\n", __func__);
1199 return;
1200 }
f3aa7e24 1201 nfsd4_umh_cltrack_upcall("create", hexid, NULL);
2873d214
JL
1202 kfree(hexid);
1203}
1204
1205static void
1206nfsd4_umh_cltrack_remove(struct nfs4_client *clp)
1207{
1208 char *hexid;
1209
1210 hexid = bin_to_hex_dup(clp->cl_name.data, clp->cl_name.len);
1211 if (!hexid) {
1212 dprintk("%s: can't allocate memory for upcall!\n", __func__);
1213 return;
1214 }
f3aa7e24 1215 nfsd4_umh_cltrack_upcall("remove", hexid, NULL);
2873d214
JL
1216 kfree(hexid);
1217}
1218
1219static int
1220nfsd4_umh_cltrack_check(struct nfs4_client *clp)
1221{
1222 int ret;
f3aa7e24 1223 char *hexid, *legacy;
2873d214
JL
1224
1225 hexid = bin_to_hex_dup(clp->cl_name.data, clp->cl_name.len);
1226 if (!hexid) {
1227 dprintk("%s: can't allocate memory for upcall!\n", __func__);
1228 return -ENOMEM;
1229 }
2216d449 1230 legacy = nfsd4_cltrack_legacy_recdir(&clp->cl_name);
f3aa7e24
JL
1231 ret = nfsd4_umh_cltrack_upcall("check", hexid, legacy);
1232 kfree(legacy);
2873d214
JL
1233 kfree(hexid);
1234 return ret;
1235}
1236
1237static void
12760c66 1238nfsd4_umh_cltrack_grace_done(struct nfsd_net __attribute__((unused)) *nn,
2873d214
JL
1239 time_t boot_time)
1240{
f3aa7e24 1241 char *legacy;
2873d214
JL
1242 char timestr[22]; /* FIXME: better way to determine max size? */
1243
1244 sprintf(timestr, "%ld", boot_time);
f3aa7e24
JL
1245 legacy = nfsd4_cltrack_legacy_topdir();
1246 nfsd4_umh_cltrack_upcall("gracedone", timestr, legacy);
1247 kfree(legacy);
2873d214
JL
1248}
1249
1250static struct nfsd4_client_tracking_ops nfsd4_umh_tracking_ops = {
1251 .init = nfsd4_umh_cltrack_init,
1252 .exit = NULL,
1253 .create = nfsd4_umh_cltrack_create,
1254 .remove = nfsd4_umh_cltrack_remove,
1255 .check = nfsd4_umh_cltrack_check,
1256 .grace_done = nfsd4_umh_cltrack_grace_done,
1257};
1258
2a4317c5
JL
1259int
1260nfsd4_client_tracking_init(struct net *net)
1261{
1262 int status;
f3f80148 1263 struct path path;
9a9c6478 1264 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
2a4317c5 1265
2d77bf0a 1266 /* just run the init if it the method is already decided */
9a9c6478 1267 if (nn->client_tracking_ops)
2d77bf0a
JL
1268 goto do_init;
1269
1270 /*
1271 * First, try a UMH upcall. It should succeed or fail quickly, so
1272 * there's little harm in trying that first.
1273 */
9a9c6478
SK
1274 nn->client_tracking_ops = &nfsd4_umh_tracking_ops;
1275 status = nn->client_tracking_ops->init(net);
2d77bf0a
JL
1276 if (!status)
1277 return status;
1278
1279 /*
1280 * See if the recoverydir exists and is a directory. If it is,
1281 * then use the legacy ops.
1282 */
9a9c6478 1283 nn->client_tracking_ops = &nfsd4_legacy_tracking_ops;
2d77bf0a
JL
1284 status = kern_path(nfs4_recoverydir(), LOOKUP_FOLLOW, &path);
1285 if (!status) {
1286 status = S_ISDIR(path.dentry->d_inode->i_mode);
1287 path_put(&path);
1288 if (status)
1289 goto do_init;
f3f80148 1290 }
2a4317c5 1291
2d77bf0a 1292 /* Finally, try to use nfsdcld */
9a9c6478 1293 nn->client_tracking_ops = &nfsd4_cld_tracking_ops;
8b0554e9
JL
1294 printk(KERN_WARNING "NFSD: the nfsdcld client tracking upcall will be "
1295 "removed in 3.10. Please transition to using "
1296 "nfsdcltrack.\n");
2d77bf0a 1297do_init:
9a9c6478 1298 status = nn->client_tracking_ops->init(net);
2a4317c5
JL
1299 if (status) {
1300 printk(KERN_WARNING "NFSD: Unable to initialize client "
1301 "recovery tracking! (%d)\n", status);
9a9c6478 1302 nn->client_tracking_ops = NULL;
2a4317c5
JL
1303 }
1304 return status;
1305}
1306
1307void
1308nfsd4_client_tracking_exit(struct net *net)
1309{
9a9c6478
SK
1310 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
1311
1312 if (nn->client_tracking_ops) {
1313 if (nn->client_tracking_ops->exit)
1314 nn->client_tracking_ops->exit(net);
1315 nn->client_tracking_ops = NULL;
2a4317c5
JL
1316 }
1317}
1318
1319void
1320nfsd4_client_record_create(struct nfs4_client *clp)
1321{
9a9c6478
SK
1322 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
1323
1324 if (nn->client_tracking_ops)
1325 nn->client_tracking_ops->create(clp);
2a4317c5
JL
1326}
1327
1328void
1329nfsd4_client_record_remove(struct nfs4_client *clp)
1330{
9a9c6478
SK
1331 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
1332
1333 if (nn->client_tracking_ops)
1334 nn->client_tracking_ops->remove(clp);
2a4317c5
JL
1335}
1336
1337int
1338nfsd4_client_record_check(struct nfs4_client *clp)
1339{
9a9c6478
SK
1340 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
1341
1342 if (nn->client_tracking_ops)
1343 return nn->client_tracking_ops->check(clp);
2a4317c5
JL
1344
1345 return -EOPNOTSUPP;
1346}
1347
1348void
12760c66 1349nfsd4_record_grace_done(struct nfsd_net *nn, time_t boot_time)
2a4317c5 1350{
9a9c6478
SK
1351 if (nn->client_tracking_ops)
1352 nn->client_tracking_ops->grace_done(nn, boot_time);
2a4317c5 1353}
813fd320
JL
1354
1355static int
1356rpc_pipefs_event(struct notifier_block *nb, unsigned long event, void *ptr)
1357{
1358 struct super_block *sb = ptr;
1359 struct net *net = sb->s_fs_info;
1360 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
1361 struct cld_net *cn = nn->cld_net;
1362 struct dentry *dentry;
1363 int ret = 0;
1364
1365 if (!try_module_get(THIS_MODULE))
1366 return 0;
1367
1368 if (!cn) {
1369 module_put(THIS_MODULE);
1370 return 0;
1371 }
1372
1373 switch (event) {
1374 case RPC_PIPEFS_MOUNT:
1375 dentry = nfsd4_cld_register_sb(sb, cn->cn_pipe);
1376 if (IS_ERR(dentry)) {
1377 ret = PTR_ERR(dentry);
1378 break;
1379 }
1380 cn->cn_pipe->dentry = dentry;
1381 break;
1382 case RPC_PIPEFS_UMOUNT:
1383 if (cn->cn_pipe->dentry)
1384 nfsd4_cld_unregister_sb(cn->cn_pipe);
1385 break;
1386 default:
1387 ret = -ENOTSUPP;
1388 break;
1389 }
1390 module_put(THIS_MODULE);
1391 return ret;
1392}
1393
2355c596 1394static struct notifier_block nfsd4_cld_block = {
813fd320
JL
1395 .notifier_call = rpc_pipefs_event,
1396};
797a9d79
JL
1397
1398int
1399register_cld_notifier(void)
1400{
1401 return rpc_pipefs_notifier_register(&nfsd4_cld_block);
1402}
1403
1404void
1405unregister_cld_notifier(void)
1406{
1407 rpc_pipefs_notifier_unregister(&nfsd4_cld_block);
1408}