]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - fs/nfsd/nfs4recover.c
nfsd: add a usermodehelper upcall for NFSv4 client ID tracking
[mirror_ubuntu-artful-kernel.git] / fs / nfsd / nfs4recover.c
CommitLineData
a55370a3 1/*
a55370a3 2* Copyright (c) 2004 The Regents of the University of Michigan.
f3f80148 3* Copyright (c) 2012 Jeff Layton <jlayton@redhat.com>
a55370a3
N
4* All rights reserved.
5*
6* Andy Adamson <andros@citi.umich.edu>
7*
8* Redistribution and use in source and binary forms, with or without
9* modification, are permitted provided that the following conditions
10* are met:
11*
12* 1. Redistributions of source code must retain the above copyright
13* notice, this list of conditions and the following disclaimer.
14* 2. Redistributions in binary form must reproduce the above copyright
15* notice, this list of conditions and the following disclaimer in the
16* documentation and/or other materials provided with the distribution.
17* 3. Neither the name of the University nor the names of its
18* contributors may be used to endorse or promote products derived
19* from this software without specific prior written permission.
20*
21* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
22* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
23* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
24* DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
26* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
27* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
28* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
29* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
30* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
31* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32*
33*/
34
190e4fbf 35#include <linux/file.h>
5a0e3ad6 36#include <linux/slab.h>
190e4fbf 37#include <linux/namei.h>
a55370a3 38#include <linux/crypto.h>
e8edc6e0 39#include <linux/sched.h>
f3f80148 40#include <linux/fs.h>
813fd320 41#include <linux/module.h>
f3f80148
JL
42#include <net/net_namespace.h>
43#include <linux/sunrpc/rpc_pipe_fs.h>
44#include <linux/sunrpc/clnt.h>
45#include <linux/nfsd/cld.h>
9a74af21
BH
46
47#include "nfsd.h"
48#include "state.h"
0a3adade 49#include "vfs.h"
f3f80148 50#include "netns.h"
a55370a3
N
51
52#define NFSDDBG_FACILITY NFSDDBG_PROC
53
2a4317c5
JL
54/* Declarations */
55struct nfsd4_client_tracking_ops {
56 int (*init)(struct net *);
57 void (*exit)(struct net *);
58 void (*create)(struct nfs4_client *);
59 void (*remove)(struct nfs4_client *);
60 int (*check)(struct nfs4_client *);
61 void (*grace_done)(struct net *, time_t);
62};
63
190e4fbf 64/* Globals */
e970a573 65static struct file *rec_file;
48483bf2 66static char user_recovery_dirname[PATH_MAX] = "/var/lib/nfs/v4recovery";
2a4317c5 67static struct nfsd4_client_tracking_ops *client_tracking_ops;
190e4fbf 68
d84f4f99
DH
69static int
70nfs4_save_creds(const struct cred **original_creds)
190e4fbf 71{
d84f4f99
DH
72 struct cred *new;
73
74 new = prepare_creds();
75 if (!new)
76 return -ENOMEM;
77
78 new->fsuid = 0;
79 new->fsgid = 0;
80 *original_creds = override_creds(new);
81 put_cred(new);
82 return 0;
190e4fbf
N
83}
84
85static void
d84f4f99 86nfs4_reset_creds(const struct cred *original)
190e4fbf 87{
d84f4f99 88 revert_creds(original);
190e4fbf
N
89}
90
a55370a3
N
91static void
92md5_to_hex(char *out, char *md5)
93{
94 int i;
95
96 for (i=0; i<16; i++) {
97 unsigned char c = md5[i];
98
99 *out++ = '0' + ((c&0xf0)>>4) + (c>=0xa0)*('a'-'9'-1);
100 *out++ = '0' + (c&0x0f) + ((c&0x0f)>=0x0a)*('a'-'9'-1);
101 }
102 *out = '\0';
103}
104
b37ad28b 105__be32
a55370a3
N
106nfs4_make_rec_clidname(char *dname, struct xdr_netobj *clname)
107{
108 struct xdr_netobj cksum;
35058687 109 struct hash_desc desc;
60c74f81 110 struct scatterlist sg;
3e772463 111 __be32 status = nfserr_jukebox;
a55370a3
N
112
113 dprintk("NFSD: nfs4_make_rec_clidname for %.*s\n",
114 clname->len, clname->data);
35058687
HX
115 desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP;
116 desc.tfm = crypto_alloc_hash("md5", 0, CRYPTO_ALG_ASYNC);
117 if (IS_ERR(desc.tfm))
118 goto out_no_tfm;
119 cksum.len = crypto_hash_digestsize(desc.tfm);
a55370a3
N
120 cksum.data = kmalloc(cksum.len, GFP_KERNEL);
121 if (cksum.data == NULL)
122 goto out;
a55370a3 123
60c74f81 124 sg_init_one(&sg, clname->data, clname->len);
a55370a3 125
60c74f81 126 if (crypto_hash_digest(&desc, &sg, sg.length, cksum.data))
35058687 127 goto out;
a55370a3
N
128
129 md5_to_hex(dname, cksum.data);
130
a55370a3
N
131 status = nfs_ok;
132out:
2bd9e7b6 133 kfree(cksum.data);
35058687
HX
134 crypto_free_hash(desc.tfm);
135out_no_tfm:
a55370a3
N
136 return status;
137}
190e4fbf 138
2a4317c5
JL
139static void
140nfsd4_create_clid_dir(struct nfs4_client *clp)
c7b9a459 141{
d84f4f99 142 const struct cred *original_cred;
c7b9a459 143 char *dname = clp->cl_recdir;
e970a573 144 struct dentry *dir, *dentry;
c7b9a459
N
145 int status;
146
147 dprintk("NFSD: nfsd4_create_clid_dir for \"%s\"\n", dname);
148
a52d726b 149 if (test_and_set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
7a6ef8c7 150 return;
b8548894 151 if (!rec_file)
7a6ef8c7 152 return;
d84f4f99
DH
153 status = nfs4_save_creds(&original_cred);
154 if (status < 0)
7a6ef8c7 155 return;
c7b9a459 156
4a55c101
JK
157 status = mnt_want_write_file(rec_file);
158 if (status)
159 return;
160
e970a573 161 dir = rec_file->f_path.dentry;
c7b9a459 162 /* lock the parent */
e970a573 163 mutex_lock(&dir->d_inode->i_mutex);
c7b9a459 164
e970a573 165 dentry = lookup_one_len(dname, dir, HEXDIR_LEN-1);
c7b9a459
N
166 if (IS_ERR(dentry)) {
167 status = PTR_ERR(dentry);
168 goto out_unlock;
169 }
6577aac0 170 if (dentry->d_inode)
aec39680
BF
171 /*
172 * In the 4.1 case, where we're called from
173 * reclaim_complete(), records from the previous reboot
174 * may still be left, so this is OK.
175 *
176 * In the 4.0 case, we should never get here; but we may
177 * as well be forgiving and just succeed silently.
178 */
c7b9a459 179 goto out_put;
e970a573 180 status = vfs_mkdir(dir->d_inode, dentry, S_IRWXU);
c7b9a459
N
181out_put:
182 dput(dentry);
183out_unlock:
e970a573 184 mutex_unlock(&dir->d_inode->i_mutex);
6577aac0 185 if (status == 0)
8018ab05 186 vfs_fsync(rec_file, 0);
6577aac0
BH
187 else
188 printk(KERN_ERR "NFSD: failed to write recovery record"
189 " (err %d); please check that %s exists"
190 " and is writeable", status,
191 user_recovery_dirname);
4a55c101 192 mnt_drop_write_file(rec_file);
d84f4f99 193 nfs4_reset_creds(original_cred);
c7b9a459
N
194}
195
190e4fbf
N
196typedef int (recdir_func)(struct dentry *, struct dentry *);
197
05f4f678
BF
198struct name_list {
199 char name[HEXDIR_LEN];
190e4fbf
N
200 struct list_head list;
201};
202
190e4fbf 203static int
05f4f678 204nfsd4_build_namelist(void *arg, const char *name, int namlen,
afefdbb2 205 loff_t offset, u64 ino, unsigned int d_type)
190e4fbf 206{
05f4f678
BF
207 struct list_head *names = arg;
208 struct name_list *entry;
190e4fbf 209
05f4f678 210 if (namlen != HEXDIR_LEN - 1)
b37ad28b 211 return 0;
05f4f678
BF
212 entry = kmalloc(sizeof(struct name_list), GFP_KERNEL);
213 if (entry == NULL)
190e4fbf 214 return -ENOMEM;
05f4f678
BF
215 memcpy(entry->name, name, HEXDIR_LEN - 1);
216 entry->name[HEXDIR_LEN - 1] = '\0';
217 list_add(&entry->list, names);
190e4fbf
N
218 return 0;
219}
220
221static int
5b4b299c 222nfsd4_list_rec_dir(recdir_func *f)
190e4fbf 223{
d84f4f99 224 const struct cred *original_cred;
5b4b299c 225 struct dentry *dir = rec_file->f_path.dentry;
05f4f678 226 LIST_HEAD(names);
190e4fbf
N
227 int status;
228
d84f4f99
DH
229 status = nfs4_save_creds(&original_cred);
230 if (status < 0)
231 return status;
190e4fbf 232
5b4b299c
AV
233 status = vfs_llseek(rec_file, 0, SEEK_SET);
234 if (status < 0) {
235 nfs4_reset_creds(original_cred);
236 return status;
237 }
238
239 status = vfs_readdir(rec_file, nfsd4_build_namelist, &names);
8daed1e5 240 mutex_lock_nested(&dir->d_inode->i_mutex, I_MUTEX_PARENT);
05f4f678 241 while (!list_empty(&names)) {
5b4b299c 242 struct name_list *entry;
05f4f678 243 entry = list_entry(names.next, struct name_list, list);
5b4b299c
AV
244 if (!status) {
245 struct dentry *dentry;
246 dentry = lookup_one_len(entry->name, dir, HEXDIR_LEN-1);
247 if (IS_ERR(dentry)) {
248 status = PTR_ERR(dentry);
249 break;
250 }
251 status = f(dir, dentry);
252 dput(dentry);
05f4f678 253 }
05f4f678
BF
254 list_del(&entry->list);
255 kfree(entry);
190e4fbf 256 }
2f9092e1 257 mutex_unlock(&dir->d_inode->i_mutex);
d84f4f99 258 nfs4_reset_creds(original_cred);
190e4fbf
N
259 return status;
260}
261
c7b9a459
N
262static int
263nfsd4_unlink_clid_dir(char *name, int namlen)
264{
e970a573 265 struct dentry *dir, *dentry;
c7b9a459
N
266 int status;
267
268 dprintk("NFSD: nfsd4_unlink_clid_dir. name %.*s\n", namlen, name);
269
e970a573
CH
270 dir = rec_file->f_path.dentry;
271 mutex_lock_nested(&dir->d_inode->i_mutex, I_MUTEX_PARENT);
272 dentry = lookup_one_len(name, dir, namlen);
c7b9a459
N
273 if (IS_ERR(dentry)) {
274 status = PTR_ERR(dentry);
2f9092e1 275 goto out_unlock;
c7b9a459
N
276 }
277 status = -ENOENT;
278 if (!dentry->d_inode)
279 goto out;
e970a573 280 status = vfs_rmdir(dir->d_inode, dentry);
c7b9a459
N
281out:
282 dput(dentry);
2f9092e1 283out_unlock:
e970a573 284 mutex_unlock(&dir->d_inode->i_mutex);
c7b9a459
N
285 return status;
286}
287
2a4317c5 288static void
c7b9a459
N
289nfsd4_remove_clid_dir(struct nfs4_client *clp)
290{
d84f4f99 291 const struct cred *original_cred;
c7b9a459
N
292 int status;
293
a52d726b 294 if (!rec_file || !test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
c7b9a459
N
295 return;
296
a561be71 297 status = mnt_want_write_file(rec_file);
0622753b
DH
298 if (status)
299 goto out;
a52d726b 300 clear_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
d84f4f99
DH
301
302 status = nfs4_save_creds(&original_cred);
303 if (status < 0)
698d8d87 304 goto out_drop_write;
d84f4f99 305
c7b9a459 306 status = nfsd4_unlink_clid_dir(clp->cl_recdir, HEXDIR_LEN-1);
d84f4f99 307 nfs4_reset_creds(original_cred);
c7b9a459 308 if (status == 0)
8018ab05 309 vfs_fsync(rec_file, 0);
698d8d87 310out_drop_write:
2a79f17e 311 mnt_drop_write_file(rec_file);
0622753b 312out:
c7b9a459
N
313 if (status)
314 printk("NFSD: Failed to remove expired client state directory"
315 " %.*s\n", HEXDIR_LEN, clp->cl_recdir);
c7b9a459
N
316}
317
318static int
319purge_old(struct dentry *parent, struct dentry *child)
320{
321 int status;
322
a0af710a 323 if (nfs4_has_reclaimed_state(child->d_name.name))
b37ad28b 324 return 0;
c7b9a459 325
2f9092e1 326 status = vfs_rmdir(parent->d_inode, child);
c7b9a459
N
327 if (status)
328 printk("failed to remove client recovery directory %s\n",
329 child->d_name.name);
330 /* Keep trying, success or failure: */
b37ad28b 331 return 0;
c7b9a459
N
332}
333
2a4317c5
JL
334static void
335nfsd4_recdir_purge_old(struct net *net, time_t boot_time)
336{
c7b9a459
N
337 int status;
338
e970a573 339 if (!rec_file)
c7b9a459 340 return;
a561be71 341 status = mnt_want_write_file(rec_file);
0622753b
DH
342 if (status)
343 goto out;
5b4b299c 344 status = nfsd4_list_rec_dir(purge_old);
c7b9a459 345 if (status == 0)
8018ab05 346 vfs_fsync(rec_file, 0);
2a79f17e 347 mnt_drop_write_file(rec_file);
0622753b 348out:
c7b9a459
N
349 if (status)
350 printk("nfsd4: failed to purge old clients from recovery"
e970a573 351 " directory %s\n", rec_file->f_path.dentry->d_name.name);
c7b9a459
N
352}
353
190e4fbf
N
354static int
355load_recdir(struct dentry *parent, struct dentry *child)
356{
357 if (child->d_name.len != HEXDIR_LEN - 1) {
358 printk("nfsd4: illegal name %s in recovery directory\n",
359 child->d_name.name);
360 /* Keep trying; maybe the others are OK: */
b37ad28b 361 return 0;
190e4fbf
N
362 }
363 nfs4_client_to_reclaim(child->d_name.name);
b37ad28b 364 return 0;
190e4fbf
N
365}
366
2a4317c5 367static int
190e4fbf
N
368nfsd4_recdir_load(void) {
369 int status;
370
e970a573
CH
371 if (!rec_file)
372 return 0;
373
5b4b299c 374 status = nfsd4_list_rec_dir(load_recdir);
190e4fbf
N
375 if (status)
376 printk("nfsd4: failed loading clients from recovery"
e970a573 377 " directory %s\n", rec_file->f_path.dentry->d_name.name);
190e4fbf
N
378 return status;
379}
380
381/*
382 * Hold reference to the recovery directory.
383 */
384
2a4317c5
JL
385static int
386nfsd4_init_recdir(void)
190e4fbf 387{
d84f4f99
DH
388 const struct cred *original_cred;
389 int status;
190e4fbf
N
390
391 printk("NFSD: Using %s as the NFSv4 state recovery directory\n",
48483bf2 392 user_recovery_dirname);
190e4fbf 393
e970a573 394 BUG_ON(rec_file);
190e4fbf 395
d84f4f99
DH
396 status = nfs4_save_creds(&original_cred);
397 if (status < 0) {
398 printk("NFSD: Unable to change credentials to find recovery"
399 " directory: error %d\n",
400 status);
2a4317c5 401 return status;
d84f4f99 402 }
190e4fbf 403
48483bf2 404 rec_file = filp_open(user_recovery_dirname, O_RDONLY | O_DIRECTORY, 0);
e970a573 405 if (IS_ERR(rec_file)) {
c2642ab0 406 printk("NFSD: unable to find recovery directory %s\n",
48483bf2 407 user_recovery_dirname);
2a4317c5 408 status = PTR_ERR(rec_file);
e970a573
CH
409 rec_file = NULL;
410 }
190e4fbf 411
d84f4f99 412 nfs4_reset_creds(original_cred);
2a4317c5 413 return status;
190e4fbf
N
414}
415
2a4317c5
JL
416static int
417nfsd4_load_reboot_recovery_data(struct net *net)
418{
419 int status;
420
cc27e0d4
JL
421 /* XXX: The legacy code won't work in a container */
422 if (net != &init_net) {
423 WARN(1, KERN_ERR "NFSD: attempt to initialize legacy client "
424 "tracking in a container!\n");
425 return -EINVAL;
426 }
427
2a4317c5
JL
428 nfs4_lock_state();
429 status = nfsd4_init_recdir();
430 if (!status)
431 status = nfsd4_recdir_load();
432 nfs4_unlock_state();
433 if (status)
434 printk(KERN_ERR "NFSD: Failure reading reboot recovery data\n");
435 return status;
436}
437
438static void
190e4fbf
N
439nfsd4_shutdown_recdir(void)
440{
e970a573 441 if (!rec_file)
190e4fbf 442 return;
e970a573
CH
443 fput(rec_file);
444 rec_file = NULL;
190e4fbf 445}
48483bf2 446
2a4317c5
JL
447static void
448nfsd4_legacy_tracking_exit(struct net *net)
449{
450 nfs4_release_reclaim();
451 nfsd4_shutdown_recdir();
452}
453
48483bf2
BF
454/*
455 * Change the NFSv4 recovery directory to recdir.
456 */
457int
458nfs4_reset_recoverydir(char *recdir)
459{
460 int status;
461 struct path path;
462
463 status = kern_path(recdir, LOOKUP_FOLLOW, &path);
464 if (status)
465 return status;
466 status = -ENOTDIR;
467 if (S_ISDIR(path.dentry->d_inode->i_mode)) {
468 strcpy(user_recovery_dirname, recdir);
469 status = 0;
470 }
471 path_put(&path);
472 return status;
473}
474
475char *
476nfs4_recoverydir(void)
477{
478 return user_recovery_dirname;
479}
2a4317c5
JL
480
481static int
482nfsd4_check_legacy_client(struct nfs4_client *clp)
483{
484 /* did we already find that this client is stable? */
485 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
486 return 0;
487
488 /* look for it in the reclaim hashtable otherwise */
489 if (nfsd4_find_reclaim_client(clp)) {
490 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
491 return 0;
492 }
493
494 return -ENOENT;
495}
496
497static struct nfsd4_client_tracking_ops nfsd4_legacy_tracking_ops = {
498 .init = nfsd4_load_reboot_recovery_data,
499 .exit = nfsd4_legacy_tracking_exit,
500 .create = nfsd4_create_clid_dir,
501 .remove = nfsd4_remove_clid_dir,
502 .check = nfsd4_check_legacy_client,
503 .grace_done = nfsd4_recdir_purge_old,
504};
505
f3f80148
JL
506/* Globals */
507#define NFSD_PIPE_DIR "nfsd"
508#define NFSD_CLD_PIPE "cld"
509
510/* per-net-ns structure for holding cld upcall info */
511struct cld_net {
512 struct rpc_pipe *cn_pipe;
513 spinlock_t cn_lock;
514 struct list_head cn_list;
515 unsigned int cn_xid;
516};
517
518struct cld_upcall {
519 struct list_head cu_list;
520 struct cld_net *cu_net;
521 struct task_struct *cu_task;
522 struct cld_msg cu_msg;
523};
524
525static int
526__cld_pipe_upcall(struct rpc_pipe *pipe, struct cld_msg *cmsg)
527{
528 int ret;
529 struct rpc_pipe_msg msg;
530
531 memset(&msg, 0, sizeof(msg));
532 msg.data = cmsg;
533 msg.len = sizeof(*cmsg);
534
535 /*
536 * Set task state before we queue the upcall. That prevents
537 * wake_up_process in the downcall from racing with schedule.
538 */
539 set_current_state(TASK_UNINTERRUPTIBLE);
540 ret = rpc_queue_upcall(pipe, &msg);
541 if (ret < 0) {
542 set_current_state(TASK_RUNNING);
543 goto out;
544 }
545
546 schedule();
547 set_current_state(TASK_RUNNING);
548
549 if (msg.errno < 0)
550 ret = msg.errno;
551out:
552 return ret;
553}
554
555static int
556cld_pipe_upcall(struct rpc_pipe *pipe, struct cld_msg *cmsg)
557{
558 int ret;
559
560 /*
561 * -EAGAIN occurs when pipe is closed and reopened while there are
562 * upcalls queued.
563 */
564 do {
565 ret = __cld_pipe_upcall(pipe, cmsg);
566 } while (ret == -EAGAIN);
567
568 return ret;
569}
570
571static ssize_t
572cld_pipe_downcall(struct file *filp, const char __user *src, size_t mlen)
573{
574 struct cld_upcall *tmp, *cup;
bc1b542b 575 struct cld_msg __user *cmsg = (struct cld_msg __user *)src;
f3f80148
JL
576 uint32_t xid;
577 struct nfsd_net *nn = net_generic(filp->f_dentry->d_sb->s_fs_info,
578 nfsd_net_id);
579 struct cld_net *cn = nn->cld_net;
580
581 if (mlen != sizeof(*cmsg)) {
8a7dc4b0 582 dprintk("%s: got %zu bytes, expected %zu\n", __func__, mlen,
f3f80148
JL
583 sizeof(*cmsg));
584 return -EINVAL;
585 }
586
587 /* copy just the xid so we can try to find that */
588 if (copy_from_user(&xid, &cmsg->cm_xid, sizeof(xid)) != 0) {
589 dprintk("%s: error when copying xid from userspace", __func__);
590 return -EFAULT;
591 }
592
593 /* walk the list and find corresponding xid */
594 cup = NULL;
595 spin_lock(&cn->cn_lock);
596 list_for_each_entry(tmp, &cn->cn_list, cu_list) {
597 if (get_unaligned(&tmp->cu_msg.cm_xid) == xid) {
598 cup = tmp;
599 list_del_init(&cup->cu_list);
600 break;
601 }
602 }
603 spin_unlock(&cn->cn_lock);
604
605 /* couldn't find upcall? */
606 if (!cup) {
21f72c9f 607 dprintk("%s: couldn't find upcall -- xid=%u\n", __func__, xid);
f3f80148
JL
608 return -EINVAL;
609 }
610
611 if (copy_from_user(&cup->cu_msg, src, mlen) != 0)
612 return -EFAULT;
613
614 wake_up_process(cup->cu_task);
615 return mlen;
616}
617
618static void
619cld_pipe_destroy_msg(struct rpc_pipe_msg *msg)
620{
621 struct cld_msg *cmsg = msg->data;
622 struct cld_upcall *cup = container_of(cmsg, struct cld_upcall,
623 cu_msg);
624
625 /* errno >= 0 means we got a downcall */
626 if (msg->errno >= 0)
627 return;
628
629 wake_up_process(cup->cu_task);
630}
631
632static const struct rpc_pipe_ops cld_upcall_ops = {
633 .upcall = rpc_pipe_generic_upcall,
634 .downcall = cld_pipe_downcall,
635 .destroy_msg = cld_pipe_destroy_msg,
636};
637
638static struct dentry *
639nfsd4_cld_register_sb(struct super_block *sb, struct rpc_pipe *pipe)
640{
641 struct dentry *dir, *dentry;
642
643 dir = rpc_d_lookup_sb(sb, NFSD_PIPE_DIR);
644 if (dir == NULL)
645 return ERR_PTR(-ENOENT);
646 dentry = rpc_mkpipe_dentry(dir, NFSD_CLD_PIPE, NULL, pipe);
647 dput(dir);
648 return dentry;
649}
650
651static void
652nfsd4_cld_unregister_sb(struct rpc_pipe *pipe)
653{
654 if (pipe->dentry)
655 rpc_unlink(pipe->dentry);
656}
657
658static struct dentry *
659nfsd4_cld_register_net(struct net *net, struct rpc_pipe *pipe)
660{
661 struct super_block *sb;
662 struct dentry *dentry;
663
664 sb = rpc_get_sb_net(net);
665 if (!sb)
666 return NULL;
667 dentry = nfsd4_cld_register_sb(sb, pipe);
668 rpc_put_sb_net(net);
669 return dentry;
670}
671
672static void
673nfsd4_cld_unregister_net(struct net *net, struct rpc_pipe *pipe)
674{
675 struct super_block *sb;
676
677 sb = rpc_get_sb_net(net);
678 if (sb) {
679 nfsd4_cld_unregister_sb(pipe);
680 rpc_put_sb_net(net);
681 }
682}
683
684/* Initialize rpc_pipefs pipe for communication with client tracking daemon */
685static int
686nfsd4_init_cld_pipe(struct net *net)
687{
688 int ret;
689 struct dentry *dentry;
690 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
691 struct cld_net *cn;
692
693 if (nn->cld_net)
694 return 0;
695
696 cn = kzalloc(sizeof(*cn), GFP_KERNEL);
697 if (!cn) {
698 ret = -ENOMEM;
699 goto err;
700 }
701
702 cn->cn_pipe = rpc_mkpipe_data(&cld_upcall_ops, RPC_PIPE_WAIT_FOR_OPEN);
703 if (IS_ERR(cn->cn_pipe)) {
704 ret = PTR_ERR(cn->cn_pipe);
705 goto err;
706 }
707 spin_lock_init(&cn->cn_lock);
708 INIT_LIST_HEAD(&cn->cn_list);
709
710 dentry = nfsd4_cld_register_net(net, cn->cn_pipe);
711 if (IS_ERR(dentry)) {
712 ret = PTR_ERR(dentry);
713 goto err_destroy_data;
714 }
715
716 cn->cn_pipe->dentry = dentry;
717 nn->cld_net = cn;
718 return 0;
719
720err_destroy_data:
721 rpc_destroy_pipe_data(cn->cn_pipe);
722err:
723 kfree(cn);
724 printk(KERN_ERR "NFSD: unable to create nfsdcld upcall pipe (%d)\n",
725 ret);
726 return ret;
727}
728
729static void
730nfsd4_remove_cld_pipe(struct net *net)
731{
732 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
733 struct cld_net *cn = nn->cld_net;
734
735 nfsd4_cld_unregister_net(net, cn->cn_pipe);
736 rpc_destroy_pipe_data(cn->cn_pipe);
737 kfree(nn->cld_net);
738 nn->cld_net = NULL;
739}
740
741static struct cld_upcall *
742alloc_cld_upcall(struct cld_net *cn)
743{
744 struct cld_upcall *new, *tmp;
745
746 new = kzalloc(sizeof(*new), GFP_KERNEL);
747 if (!new)
748 return new;
749
750 /* FIXME: hard cap on number in flight? */
751restart_search:
752 spin_lock(&cn->cn_lock);
753 list_for_each_entry(tmp, &cn->cn_list, cu_list) {
754 if (tmp->cu_msg.cm_xid == cn->cn_xid) {
755 cn->cn_xid++;
756 spin_unlock(&cn->cn_lock);
757 goto restart_search;
758 }
759 }
760 new->cu_task = current;
761 new->cu_msg.cm_vers = CLD_UPCALL_VERSION;
762 put_unaligned(cn->cn_xid++, &new->cu_msg.cm_xid);
763 new->cu_net = cn;
764 list_add(&new->cu_list, &cn->cn_list);
765 spin_unlock(&cn->cn_lock);
766
767 dprintk("%s: allocated xid %u\n", __func__, new->cu_msg.cm_xid);
768
769 return new;
770}
771
772static void
773free_cld_upcall(struct cld_upcall *victim)
774{
775 struct cld_net *cn = victim->cu_net;
776
777 spin_lock(&cn->cn_lock);
778 list_del(&victim->cu_list);
779 spin_unlock(&cn->cn_lock);
780 kfree(victim);
781}
782
783/* Ask daemon to create a new record */
784static void
785nfsd4_cld_create(struct nfs4_client *clp)
786{
787 int ret;
788 struct cld_upcall *cup;
789 /* FIXME: determine net from clp */
790 struct nfsd_net *nn = net_generic(&init_net, nfsd_net_id);
791 struct cld_net *cn = nn->cld_net;
792
793 /* Don't upcall if it's already stored */
794 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
795 return;
796
797 cup = alloc_cld_upcall(cn);
798 if (!cup) {
799 ret = -ENOMEM;
800 goto out_err;
801 }
802
803 cup->cu_msg.cm_cmd = Cld_Create;
804 cup->cu_msg.cm_u.cm_name.cn_len = clp->cl_name.len;
805 memcpy(cup->cu_msg.cm_u.cm_name.cn_id, clp->cl_name.data,
806 clp->cl_name.len);
807
808 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
809 if (!ret) {
810 ret = cup->cu_msg.cm_status;
811 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
812 }
813
814 free_cld_upcall(cup);
815out_err:
816 if (ret)
817 printk(KERN_ERR "NFSD: Unable to create client "
818 "record on stable storage: %d\n", ret);
819}
820
821/* Ask daemon to create a new record */
822static void
823nfsd4_cld_remove(struct nfs4_client *clp)
824{
825 int ret;
826 struct cld_upcall *cup;
827 /* FIXME: determine net from clp */
828 struct nfsd_net *nn = net_generic(&init_net, nfsd_net_id);
829 struct cld_net *cn = nn->cld_net;
830
831 /* Don't upcall if it's already removed */
832 if (!test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
833 return;
834
835 cup = alloc_cld_upcall(cn);
836 if (!cup) {
837 ret = -ENOMEM;
838 goto out_err;
839 }
840
841 cup->cu_msg.cm_cmd = Cld_Remove;
842 cup->cu_msg.cm_u.cm_name.cn_len = clp->cl_name.len;
843 memcpy(cup->cu_msg.cm_u.cm_name.cn_id, clp->cl_name.data,
844 clp->cl_name.len);
845
846 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
847 if (!ret) {
848 ret = cup->cu_msg.cm_status;
849 clear_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
850 }
851
852 free_cld_upcall(cup);
853out_err:
854 if (ret)
855 printk(KERN_ERR "NFSD: Unable to remove client "
856 "record from stable storage: %d\n", ret);
857}
858
859/* Check for presence of a record, and update its timestamp */
860static int
861nfsd4_cld_check(struct nfs4_client *clp)
862{
863 int ret;
864 struct cld_upcall *cup;
865 /* FIXME: determine net from clp */
866 struct nfsd_net *nn = net_generic(&init_net, nfsd_net_id);
867 struct cld_net *cn = nn->cld_net;
868
869 /* Don't upcall if one was already stored during this grace pd */
870 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
871 return 0;
872
873 cup = alloc_cld_upcall(cn);
874 if (!cup) {
875 printk(KERN_ERR "NFSD: Unable to check client record on "
876 "stable storage: %d\n", -ENOMEM);
877 return -ENOMEM;
878 }
879
880 cup->cu_msg.cm_cmd = Cld_Check;
881 cup->cu_msg.cm_u.cm_name.cn_len = clp->cl_name.len;
882 memcpy(cup->cu_msg.cm_u.cm_name.cn_id, clp->cl_name.data,
883 clp->cl_name.len);
884
885 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
886 if (!ret) {
887 ret = cup->cu_msg.cm_status;
888 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
889 }
890
891 free_cld_upcall(cup);
892 return ret;
893}
894
895static void
896nfsd4_cld_grace_done(struct net *net, time_t boot_time)
897{
898 int ret;
899 struct cld_upcall *cup;
900 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
901 struct cld_net *cn = nn->cld_net;
902
903 cup = alloc_cld_upcall(cn);
904 if (!cup) {
905 ret = -ENOMEM;
906 goto out_err;
907 }
908
909 cup->cu_msg.cm_cmd = Cld_GraceDone;
910 cup->cu_msg.cm_u.cm_gracetime = (int64_t)boot_time;
911 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
912 if (!ret)
913 ret = cup->cu_msg.cm_status;
914
915 free_cld_upcall(cup);
916out_err:
917 if (ret)
918 printk(KERN_ERR "NFSD: Unable to end grace period: %d\n", ret);
919}
920
921static struct nfsd4_client_tracking_ops nfsd4_cld_tracking_ops = {
922 .init = nfsd4_init_cld_pipe,
923 .exit = nfsd4_remove_cld_pipe,
924 .create = nfsd4_cld_create,
925 .remove = nfsd4_cld_remove,
926 .check = nfsd4_cld_check,
927 .grace_done = nfsd4_cld_grace_done,
928};
929
2873d214
JL
930/* upcall via usermodehelper */
931static char cltrack_prog[PATH_MAX] = "/sbin/nfsdcltrack";
932module_param_string(cltrack_prog, cltrack_prog, sizeof(cltrack_prog),
933 S_IRUGO|S_IWUSR);
934MODULE_PARM_DESC(cltrack_prog, "Path to the nfsdcltrack upcall program");
935
936static int
937nfsd4_umh_cltrack_upcall(char *cmd, char *arg)
938{
939 char *envp[] = { NULL };
940 char *argv[4];
941 int ret;
942
943 if (unlikely(!cltrack_prog[0])) {
944 dprintk("%s: cltrack_prog is disabled\n", __func__);
945 return -EACCES;
946 }
947
948 dprintk("%s: cmd: %s\n", __func__, cmd);
949 dprintk("%s: arg: %s\n", __func__, arg ? arg : "(null)");
950
951 argv[0] = (char *)cltrack_prog;
952 argv[1] = cmd;
953 argv[2] = arg;
954 argv[3] = NULL;
955
956 ret = call_usermodehelper(argv[0], argv, envp, UMH_WAIT_PROC);
957 /*
958 * Disable the upcall mechanism if we're getting an ENOENT or EACCES
959 * error. The admin can re-enable it on the fly by using sysfs
960 * once the problem has been fixed.
961 */
962 if (ret == -ENOENT || ret == -EACCES) {
963 dprintk("NFSD: %s was not found or isn't executable (%d). "
964 "Setting cltrack_prog to blank string!",
965 cltrack_prog, ret);
966 cltrack_prog[0] = '\0';
967 }
968 dprintk("%s: %s return value: %d\n", __func__, cltrack_prog, ret);
969
970 return ret;
971}
972
973static char *
974bin_to_hex_dup(const unsigned char *src, int srclen)
975{
976 int i;
977 char *buf, *hex;
978
979 /* +1 for terminating NULL */
980 buf = kmalloc((srclen * 2) + 1, GFP_KERNEL);
981 if (!buf)
982 return buf;
983
984 hex = buf;
985 for (i = 0; i < srclen; i++) {
986 sprintf(hex, "%2.2x", *src++);
987 hex += 2;
988 }
989 return buf;
990}
991
992static int
993nfsd4_umh_cltrack_init(struct net __attribute__((unused)) *net)
994{
995 return nfsd4_umh_cltrack_upcall("init", NULL);
996}
997
998static void
999nfsd4_umh_cltrack_create(struct nfs4_client *clp)
1000{
1001 char *hexid;
1002
1003 hexid = bin_to_hex_dup(clp->cl_name.data, clp->cl_name.len);
1004 if (!hexid) {
1005 dprintk("%s: can't allocate memory for upcall!\n", __func__);
1006 return;
1007 }
1008 nfsd4_umh_cltrack_upcall("create", hexid);
1009 kfree(hexid);
1010}
1011
1012static void
1013nfsd4_umh_cltrack_remove(struct nfs4_client *clp)
1014{
1015 char *hexid;
1016
1017 hexid = bin_to_hex_dup(clp->cl_name.data, clp->cl_name.len);
1018 if (!hexid) {
1019 dprintk("%s: can't allocate memory for upcall!\n", __func__);
1020 return;
1021 }
1022 nfsd4_umh_cltrack_upcall("remove", hexid);
1023 kfree(hexid);
1024}
1025
1026static int
1027nfsd4_umh_cltrack_check(struct nfs4_client *clp)
1028{
1029 int ret;
1030 char *hexid;
1031
1032 hexid = bin_to_hex_dup(clp->cl_name.data, clp->cl_name.len);
1033 if (!hexid) {
1034 dprintk("%s: can't allocate memory for upcall!\n", __func__);
1035 return -ENOMEM;
1036 }
1037 ret = nfsd4_umh_cltrack_upcall("check", hexid);
1038 kfree(hexid);
1039 return ret;
1040}
1041
1042static void
1043nfsd4_umh_cltrack_grace_done(struct net __attribute__((unused)) *net,
1044 time_t boot_time)
1045{
1046 char timestr[22]; /* FIXME: better way to determine max size? */
1047
1048 sprintf(timestr, "%ld", boot_time);
1049 nfsd4_umh_cltrack_upcall("gracedone", timestr);
1050}
1051
1052static struct nfsd4_client_tracking_ops nfsd4_umh_tracking_ops = {
1053 .init = nfsd4_umh_cltrack_init,
1054 .exit = NULL,
1055 .create = nfsd4_umh_cltrack_create,
1056 .remove = nfsd4_umh_cltrack_remove,
1057 .check = nfsd4_umh_cltrack_check,
1058 .grace_done = nfsd4_umh_cltrack_grace_done,
1059};
1060
2a4317c5
JL
1061int
1062nfsd4_client_tracking_init(struct net *net)
1063{
1064 int status;
f3f80148 1065 struct path path;
2a4317c5 1066
f3f80148
JL
1067 if (!client_tracking_ops) {
1068 client_tracking_ops = &nfsd4_cld_tracking_ops;
1069 status = kern_path(nfs4_recoverydir(), LOOKUP_FOLLOW, &path);
1070 if (!status) {
1071 if (S_ISDIR(path.dentry->d_inode->i_mode))
1072 client_tracking_ops =
1073 &nfsd4_legacy_tracking_ops;
1074 path_put(&path);
1075 }
1076 }
2a4317c5
JL
1077
1078 status = client_tracking_ops->init(net);
1079 if (status) {
1080 printk(KERN_WARNING "NFSD: Unable to initialize client "
1081 "recovery tracking! (%d)\n", status);
1082 client_tracking_ops = NULL;
1083 }
1084 return status;
1085}
1086
1087void
1088nfsd4_client_tracking_exit(struct net *net)
1089{
1090 if (client_tracking_ops) {
2873d214
JL
1091 if (client_tracking_ops->exit)
1092 client_tracking_ops->exit(net);
2a4317c5
JL
1093 client_tracking_ops = NULL;
1094 }
1095}
1096
1097void
1098nfsd4_client_record_create(struct nfs4_client *clp)
1099{
1100 if (client_tracking_ops)
1101 client_tracking_ops->create(clp);
1102}
1103
1104void
1105nfsd4_client_record_remove(struct nfs4_client *clp)
1106{
1107 if (client_tracking_ops)
1108 client_tracking_ops->remove(clp);
1109}
1110
1111int
1112nfsd4_client_record_check(struct nfs4_client *clp)
1113{
1114 if (client_tracking_ops)
1115 return client_tracking_ops->check(clp);
1116
1117 return -EOPNOTSUPP;
1118}
1119
1120void
1121nfsd4_record_grace_done(struct net *net, time_t boot_time)
1122{
1123 if (client_tracking_ops)
1124 client_tracking_ops->grace_done(net, boot_time);
1125}
813fd320
JL
1126
1127static int
1128rpc_pipefs_event(struct notifier_block *nb, unsigned long event, void *ptr)
1129{
1130 struct super_block *sb = ptr;
1131 struct net *net = sb->s_fs_info;
1132 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
1133 struct cld_net *cn = nn->cld_net;
1134 struct dentry *dentry;
1135 int ret = 0;
1136
1137 if (!try_module_get(THIS_MODULE))
1138 return 0;
1139
1140 if (!cn) {
1141 module_put(THIS_MODULE);
1142 return 0;
1143 }
1144
1145 switch (event) {
1146 case RPC_PIPEFS_MOUNT:
1147 dentry = nfsd4_cld_register_sb(sb, cn->cn_pipe);
1148 if (IS_ERR(dentry)) {
1149 ret = PTR_ERR(dentry);
1150 break;
1151 }
1152 cn->cn_pipe->dentry = dentry;
1153 break;
1154 case RPC_PIPEFS_UMOUNT:
1155 if (cn->cn_pipe->dentry)
1156 nfsd4_cld_unregister_sb(cn->cn_pipe);
1157 break;
1158 default:
1159 ret = -ENOTSUPP;
1160 break;
1161 }
1162 module_put(THIS_MODULE);
1163 return ret;
1164}
1165
2355c596 1166static struct notifier_block nfsd4_cld_block = {
813fd320
JL
1167 .notifier_call = rpc_pipefs_event,
1168};
797a9d79
JL
1169
1170int
1171register_cld_notifier(void)
1172{
1173 return rpc_pipefs_notifier_register(&nfsd4_cld_block);
1174}
1175
1176void
1177unregister_cld_notifier(void)
1178{
1179 rpc_pipefs_notifier_unregister(&nfsd4_cld_block);
1180}