]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - fs/nfsd/nfs4recover.c
fs: fix fs/locks.c kernel-doc warning
[mirror_ubuntu-jammy-kernel.git] / fs / nfsd / nfs4recover.c
CommitLineData
a55370a3 1/*
a55370a3 2* Copyright (c) 2004 The Regents of the University of Michigan.
f3f80148 3* Copyright (c) 2012 Jeff Layton <jlayton@redhat.com>
a55370a3
N
4* All rights reserved.
5*
6* Andy Adamson <andros@citi.umich.edu>
7*
8* Redistribution and use in source and binary forms, with or without
9* modification, are permitted provided that the following conditions
10* are met:
11*
12* 1. Redistributions of source code must retain the above copyright
13* notice, this list of conditions and the following disclaimer.
14* 2. Redistributions in binary form must reproduce the above copyright
15* notice, this list of conditions and the following disclaimer in the
16* documentation and/or other materials provided with the distribution.
17* 3. Neither the name of the University nor the names of its
18* contributors may be used to endorse or promote products derived
19* from this software without specific prior written permission.
20*
21* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
22* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
23* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
24* DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
26* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
27* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
28* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
29* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
30* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
31* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32*
33*/
34
190e4fbf 35#include <linux/file.h>
5a0e3ad6 36#include <linux/slab.h>
190e4fbf 37#include <linux/namei.h>
a55370a3 38#include <linux/crypto.h>
e8edc6e0 39#include <linux/sched.h>
f3f80148 40#include <linux/fs.h>
813fd320 41#include <linux/module.h>
f3f80148
JL
42#include <net/net_namespace.h>
43#include <linux/sunrpc/rpc_pipe_fs.h>
44#include <linux/sunrpc/clnt.h>
45#include <linux/nfsd/cld.h>
9a74af21
BH
46
47#include "nfsd.h"
48#include "state.h"
0a3adade 49#include "vfs.h"
f3f80148 50#include "netns.h"
a55370a3
N
51
52#define NFSDDBG_FACILITY NFSDDBG_PROC
53
2a4317c5
JL
54/* Declarations */
55struct nfsd4_client_tracking_ops {
56 int (*init)(struct net *);
57 void (*exit)(struct net *);
58 void (*create)(struct nfs4_client *);
59 void (*remove)(struct nfs4_client *);
60 int (*check)(struct nfs4_client *);
919b8049 61 void (*grace_done)(struct nfsd_net *);
2a4317c5
JL
62};
63
190e4fbf 64/* Globals */
48483bf2 65static char user_recovery_dirname[PATH_MAX] = "/var/lib/nfs/v4recovery";
190e4fbf 66
d84f4f99
DH
67static int
68nfs4_save_creds(const struct cred **original_creds)
190e4fbf 69{
d84f4f99
DH
70 struct cred *new;
71
72 new = prepare_creds();
73 if (!new)
74 return -ENOMEM;
75
6fab8779
EB
76 new->fsuid = GLOBAL_ROOT_UID;
77 new->fsgid = GLOBAL_ROOT_GID;
d84f4f99
DH
78 *original_creds = override_creds(new);
79 put_cred(new);
80 return 0;
190e4fbf
N
81}
82
83static void
d84f4f99 84nfs4_reset_creds(const struct cred *original)
190e4fbf 85{
d84f4f99 86 revert_creds(original);
190e4fbf
N
87}
88
a55370a3
N
89static void
90md5_to_hex(char *out, char *md5)
91{
92 int i;
93
94 for (i=0; i<16; i++) {
95 unsigned char c = md5[i];
96
97 *out++ = '0' + ((c&0xf0)>>4) + (c>=0xa0)*('a'-'9'-1);
98 *out++ = '0' + (c&0x0f) + ((c&0x0f)>=0x0a)*('a'-'9'-1);
99 }
100 *out = '\0';
101}
102
2216d449
JL
103static int
104nfs4_make_rec_clidname(char *dname, const struct xdr_netobj *clname)
a55370a3
N
105{
106 struct xdr_netobj cksum;
35058687 107 struct hash_desc desc;
60c74f81 108 struct scatterlist sg;
2216d449 109 int status;
a55370a3
N
110
111 dprintk("NFSD: nfs4_make_rec_clidname for %.*s\n",
112 clname->len, clname->data);
35058687
HX
113 desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP;
114 desc.tfm = crypto_alloc_hash("md5", 0, CRYPTO_ALG_ASYNC);
2216d449
JL
115 if (IS_ERR(desc.tfm)) {
116 status = PTR_ERR(desc.tfm);
35058687 117 goto out_no_tfm;
2216d449
JL
118 }
119
35058687 120 cksum.len = crypto_hash_digestsize(desc.tfm);
a55370a3 121 cksum.data = kmalloc(cksum.len, GFP_KERNEL);
2216d449
JL
122 if (cksum.data == NULL) {
123 status = -ENOMEM;
a55370a3 124 goto out;
2216d449 125 }
a55370a3 126
60c74f81 127 sg_init_one(&sg, clname->data, clname->len);
a55370a3 128
2216d449
JL
129 status = crypto_hash_digest(&desc, &sg, sg.length, cksum.data);
130 if (status)
35058687 131 goto out;
a55370a3
N
132
133 md5_to_hex(dname, cksum.data);
134
2216d449 135 status = 0;
a55370a3 136out:
2bd9e7b6 137 kfree(cksum.data);
35058687
HX
138 crypto_free_hash(desc.tfm);
139out_no_tfm:
a55370a3
N
140 return status;
141}
190e4fbf 142
2216d449
JL
143/*
144 * If we had an error generating the recdir name for the legacy tracker
145 * then warn the admin. If the error doesn't appear to be transient,
146 * then disable recovery tracking.
147 */
148static void
7255e716 149legacy_recdir_name_error(struct nfs4_client *clp, int error)
2216d449
JL
150{
151 printk(KERN_ERR "NFSD: unable to generate recoverydir "
152 "name (%d).\n", error);
153
154 /*
155 * if the algorithm just doesn't exist, then disable the recovery
156 * tracker altogether. The crypto libs will generally return this if
157 * FIPS is enabled as well.
158 */
159 if (error == -ENOENT) {
160 printk(KERN_ERR "NFSD: disabling legacy clientid tracking. "
161 "Reboot recovery will not function correctly!\n");
7255e716 162 nfsd4_client_tracking_exit(clp->net);
2216d449
JL
163 }
164}
165
2a4317c5
JL
166static void
167nfsd4_create_clid_dir(struct nfs4_client *clp)
c7b9a459 168{
d84f4f99 169 const struct cred *original_cred;
2216d449 170 char dname[HEXDIR_LEN];
e970a573 171 struct dentry *dir, *dentry;
0ce0c2b5 172 struct nfs4_client_reclaim *crp;
c7b9a459 173 int status;
52e19c09 174 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
c7b9a459 175
a52d726b 176 if (test_and_set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
7a6ef8c7 177 return;
3a073369 178 if (!nn->rec_file)
7a6ef8c7 179 return;
2216d449
JL
180
181 status = nfs4_make_rec_clidname(dname, &clp->cl_name);
182 if (status)
7255e716 183 return legacy_recdir_name_error(clp, status);
2216d449 184
d84f4f99
DH
185 status = nfs4_save_creds(&original_cred);
186 if (status < 0)
7a6ef8c7 187 return;
c7b9a459 188
3a073369 189 status = mnt_want_write_file(nn->rec_file);
4a55c101 190 if (status)
c2236f14 191 goto out_creds;
4a55c101 192
3a073369 193 dir = nn->rec_file->f_path.dentry;
c7b9a459 194 /* lock the parent */
2b0143b5 195 mutex_lock(&d_inode(dir)->i_mutex);
c7b9a459 196
e970a573 197 dentry = lookup_one_len(dname, dir, HEXDIR_LEN-1);
c7b9a459
N
198 if (IS_ERR(dentry)) {
199 status = PTR_ERR(dentry);
200 goto out_unlock;
201 }
2b0143b5 202 if (d_really_is_positive(dentry))
aec39680
BF
203 /*
204 * In the 4.1 case, where we're called from
205 * reclaim_complete(), records from the previous reboot
206 * may still be left, so this is OK.
207 *
208 * In the 4.0 case, we should never get here; but we may
209 * as well be forgiving and just succeed silently.
210 */
c7b9a459 211 goto out_put;
2b0143b5 212 status = vfs_mkdir(d_inode(dir), dentry, S_IRWXU);
c7b9a459
N
213out_put:
214 dput(dentry);
215out_unlock:
2b0143b5 216 mutex_unlock(&d_inode(dir)->i_mutex);
0ce0c2b5 217 if (status == 0) {
f141f79d 218 if (nn->in_grace) {
52e19c09 219 crp = nfs4_client_to_reclaim(dname, nn);
0ce0c2b5
JL
220 if (crp)
221 crp->cr_clp = clp;
222 }
3a073369 223 vfs_fsync(nn->rec_file, 0);
0ce0c2b5 224 } else {
6577aac0
BH
225 printk(KERN_ERR "NFSD: failed to write recovery record"
226 " (err %d); please check that %s exists"
227 " and is writeable", status,
228 user_recovery_dirname);
0ce0c2b5 229 }
3a073369 230 mnt_drop_write_file(nn->rec_file);
c2236f14 231out_creds:
d84f4f99 232 nfs4_reset_creds(original_cred);
c7b9a459
N
233}
234
52e19c09 235typedef int (recdir_func)(struct dentry *, struct dentry *, struct nfsd_net *);
190e4fbf 236
05f4f678
BF
237struct name_list {
238 char name[HEXDIR_LEN];
190e4fbf
N
239 struct list_head list;
240};
241
bb6f619b
AV
242struct nfs4_dir_ctx {
243 struct dir_context ctx;
244 struct list_head names;
245};
246
190e4fbf 247static int
ac7576f4 248nfsd4_build_namelist(struct dir_context *__ctx, const char *name, int namlen,
afefdbb2 249 loff_t offset, u64 ino, unsigned int d_type)
190e4fbf 250{
ac7576f4
MS
251 struct nfs4_dir_ctx *ctx =
252 container_of(__ctx, struct nfs4_dir_ctx, ctx);
05f4f678 253 struct name_list *entry;
190e4fbf 254
05f4f678 255 if (namlen != HEXDIR_LEN - 1)
b37ad28b 256 return 0;
05f4f678
BF
257 entry = kmalloc(sizeof(struct name_list), GFP_KERNEL);
258 if (entry == NULL)
190e4fbf 259 return -ENOMEM;
05f4f678
BF
260 memcpy(entry->name, name, HEXDIR_LEN - 1);
261 entry->name[HEXDIR_LEN - 1] = '\0';
bb6f619b 262 list_add(&entry->list, &ctx->names);
190e4fbf
N
263 return 0;
264}
265
266static int
52e19c09 267nfsd4_list_rec_dir(recdir_func *f, struct nfsd_net *nn)
190e4fbf 268{
d84f4f99 269 const struct cred *original_cred;
3a073369 270 struct dentry *dir = nn->rec_file->f_path.dentry;
ac6614b7
AV
271 struct nfs4_dir_ctx ctx = {
272 .ctx.actor = nfsd4_build_namelist,
273 .names = LIST_HEAD_INIT(ctx.names)
274 };
4691b271 275 struct name_list *entry, *tmp;
190e4fbf
N
276 int status;
277
d84f4f99
DH
278 status = nfs4_save_creds(&original_cred);
279 if (status < 0)
280 return status;
190e4fbf 281
3a073369 282 status = vfs_llseek(nn->rec_file, 0, SEEK_SET);
5b4b299c
AV
283 if (status < 0) {
284 nfs4_reset_creds(original_cred);
285 return status;
286 }
287
5c0ba4e0 288 status = iterate_dir(nn->rec_file, &ctx.ctx);
2b0143b5 289 mutex_lock_nested(&d_inode(dir)->i_mutex, I_MUTEX_PARENT);
4691b271
KM
290
291 list_for_each_entry_safe(entry, tmp, &ctx.names, list) {
5b4b299c
AV
292 if (!status) {
293 struct dentry *dentry;
294 dentry = lookup_one_len(entry->name, dir, HEXDIR_LEN-1);
295 if (IS_ERR(dentry)) {
296 status = PTR_ERR(dentry);
297 break;
298 }
52e19c09 299 status = f(dir, dentry, nn);
5b4b299c 300 dput(dentry);
05f4f678 301 }
05f4f678
BF
302 list_del(&entry->list);
303 kfree(entry);
190e4fbf 304 }
2b0143b5 305 mutex_unlock(&d_inode(dir)->i_mutex);
d84f4f99 306 nfs4_reset_creds(original_cred);
4691b271
KM
307
308 list_for_each_entry_safe(entry, tmp, &ctx.names, list) {
309 dprintk("NFSD: %s. Left entry %s\n", __func__, entry->name);
310 list_del(&entry->list);
311 kfree(entry);
312 }
190e4fbf
N
313 return status;
314}
315
c7b9a459 316static int
3a073369 317nfsd4_unlink_clid_dir(char *name, int namlen, struct nfsd_net *nn)
c7b9a459 318{
e970a573 319 struct dentry *dir, *dentry;
c7b9a459
N
320 int status;
321
322 dprintk("NFSD: nfsd4_unlink_clid_dir. name %.*s\n", namlen, name);
323
3a073369 324 dir = nn->rec_file->f_path.dentry;
2b0143b5 325 mutex_lock_nested(&d_inode(dir)->i_mutex, I_MUTEX_PARENT);
e970a573 326 dentry = lookup_one_len(name, dir, namlen);
c7b9a459
N
327 if (IS_ERR(dentry)) {
328 status = PTR_ERR(dentry);
2f9092e1 329 goto out_unlock;
c7b9a459
N
330 }
331 status = -ENOENT;
2b0143b5 332 if (d_really_is_negative(dentry))
c7b9a459 333 goto out;
2b0143b5 334 status = vfs_rmdir(d_inode(dir), dentry);
c7b9a459
N
335out:
336 dput(dentry);
2f9092e1 337out_unlock:
2b0143b5 338 mutex_unlock(&d_inode(dir)->i_mutex);
c7b9a459
N
339 return status;
340}
341
2a4317c5 342static void
c7b9a459
N
343nfsd4_remove_clid_dir(struct nfs4_client *clp)
344{
d84f4f99 345 const struct cred *original_cred;
0ce0c2b5 346 struct nfs4_client_reclaim *crp;
2216d449 347 char dname[HEXDIR_LEN];
c7b9a459 348 int status;
52e19c09 349 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
c7b9a459 350
3a073369 351 if (!nn->rec_file || !test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
c7b9a459
N
352 return;
353
2216d449
JL
354 status = nfs4_make_rec_clidname(dname, &clp->cl_name);
355 if (status)
7255e716 356 return legacy_recdir_name_error(clp, status);
2216d449 357
3a073369 358 status = mnt_want_write_file(nn->rec_file);
0622753b
DH
359 if (status)
360 goto out;
a52d726b 361 clear_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
d84f4f99
DH
362
363 status = nfs4_save_creds(&original_cred);
364 if (status < 0)
698d8d87 365 goto out_drop_write;
d84f4f99 366
3a073369 367 status = nfsd4_unlink_clid_dir(dname, HEXDIR_LEN-1, nn);
d84f4f99 368 nfs4_reset_creds(original_cred);
0ce0c2b5 369 if (status == 0) {
3a073369 370 vfs_fsync(nn->rec_file, 0);
f141f79d 371 if (nn->in_grace) {
0ce0c2b5 372 /* remove reclaim record */
52e19c09 373 crp = nfsd4_find_reclaim_client(dname, nn);
0ce0c2b5 374 if (crp)
52e19c09 375 nfs4_remove_reclaim_record(crp, nn);
0ce0c2b5
JL
376 }
377 }
698d8d87 378out_drop_write:
3a073369 379 mnt_drop_write_file(nn->rec_file);
0622753b 380out:
c7b9a459
N
381 if (status)
382 printk("NFSD: Failed to remove expired client state directory"
2216d449 383 " %.*s\n", HEXDIR_LEN, dname);
c7b9a459
N
384}
385
386static int
52e19c09 387purge_old(struct dentry *parent, struct dentry *child, struct nfsd_net *nn)
c7b9a459
N
388{
389 int status;
390
52e19c09 391 if (nfs4_has_reclaimed_state(child->d_name.name, nn))
b37ad28b 392 return 0;
c7b9a459 393
2b0143b5 394 status = vfs_rmdir(d_inode(parent), child);
c7b9a459 395 if (status)
a6a9f18f
AV
396 printk("failed to remove client recovery directory %pd\n",
397 child);
c7b9a459 398 /* Keep trying, success or failure: */
b37ad28b 399 return 0;
c7b9a459
N
400}
401
2a4317c5 402static void
919b8049 403nfsd4_recdir_purge_old(struct nfsd_net *nn)
2a4317c5 404{
c7b9a459
N
405 int status;
406
f141f79d 407 nn->in_grace = false;
3a073369 408 if (!nn->rec_file)
c7b9a459 409 return;
3a073369 410 status = mnt_want_write_file(nn->rec_file);
0622753b
DH
411 if (status)
412 goto out;
52e19c09 413 status = nfsd4_list_rec_dir(purge_old, nn);
c7b9a459 414 if (status == 0)
3a073369
SK
415 vfs_fsync(nn->rec_file, 0);
416 mnt_drop_write_file(nn->rec_file);
0622753b 417out:
52e19c09 418 nfs4_release_reclaim(nn);
c7b9a459
N
419 if (status)
420 printk("nfsd4: failed to purge old clients from recovery"
a6a9f18f 421 " directory %pD\n", nn->rec_file);
c7b9a459
N
422}
423
190e4fbf 424static int
52e19c09 425load_recdir(struct dentry *parent, struct dentry *child, struct nfsd_net *nn)
190e4fbf
N
426{
427 if (child->d_name.len != HEXDIR_LEN - 1) {
a6a9f18f
AV
428 printk("nfsd4: illegal name %pd in recovery directory\n",
429 child);
190e4fbf 430 /* Keep trying; maybe the others are OK: */
b37ad28b 431 return 0;
190e4fbf 432 }
52e19c09 433 nfs4_client_to_reclaim(child->d_name.name, nn);
b37ad28b 434 return 0;
190e4fbf
N
435}
436
2a4317c5 437static int
52e19c09 438nfsd4_recdir_load(struct net *net) {
190e4fbf 439 int status;
52e19c09 440 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
190e4fbf 441
3a073369 442 if (!nn->rec_file)
e970a573
CH
443 return 0;
444
52e19c09 445 status = nfsd4_list_rec_dir(load_recdir, nn);
190e4fbf
N
446 if (status)
447 printk("nfsd4: failed loading clients from recovery"
a6a9f18f 448 " directory %pD\n", nn->rec_file);
190e4fbf
N
449 return status;
450}
451
452/*
453 * Hold reference to the recovery directory.
454 */
455
2a4317c5 456static int
3a073369 457nfsd4_init_recdir(struct net *net)
190e4fbf 458{
3a073369 459 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
d84f4f99
DH
460 const struct cred *original_cred;
461 int status;
190e4fbf
N
462
463 printk("NFSD: Using %s as the NFSv4 state recovery directory\n",
48483bf2 464 user_recovery_dirname);
190e4fbf 465
3a073369 466 BUG_ON(nn->rec_file);
190e4fbf 467
d84f4f99
DH
468 status = nfs4_save_creds(&original_cred);
469 if (status < 0) {
470 printk("NFSD: Unable to change credentials to find recovery"
471 " directory: error %d\n",
472 status);
2a4317c5 473 return status;
d84f4f99 474 }
190e4fbf 475
3a073369
SK
476 nn->rec_file = filp_open(user_recovery_dirname, O_RDONLY | O_DIRECTORY, 0);
477 if (IS_ERR(nn->rec_file)) {
c2642ab0 478 printk("NFSD: unable to find recovery directory %s\n",
48483bf2 479 user_recovery_dirname);
3a073369
SK
480 status = PTR_ERR(nn->rec_file);
481 nn->rec_file = NULL;
e970a573 482 }
190e4fbf 483
d84f4f99 484 nfs4_reset_creds(original_cred);
0ce0c2b5 485 if (!status)
f141f79d 486 nn->in_grace = true;
2a4317c5 487 return status;
190e4fbf
N
488}
489
15d176c1
KM
490static void
491nfsd4_shutdown_recdir(struct net *net)
492{
493 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
494
495 if (!nn->rec_file)
496 return;
497 fput(nn->rec_file);
498 nn->rec_file = NULL;
499}
52e19c09
SK
500
501static int
502nfs4_legacy_state_init(struct net *net)
503{
504 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
505 int i;
506
507 nn->reclaim_str_hashtbl = kmalloc(sizeof(struct list_head) *
508 CLIENT_HASH_SIZE, GFP_KERNEL);
509 if (!nn->reclaim_str_hashtbl)
510 return -ENOMEM;
511
512 for (i = 0; i < CLIENT_HASH_SIZE; i++)
513 INIT_LIST_HEAD(&nn->reclaim_str_hashtbl[i]);
514 nn->reclaim_str_hashtbl_size = 0;
515
516 return 0;
517}
518
519static void
520nfs4_legacy_state_shutdown(struct net *net)
521{
522 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
523
524 kfree(nn->reclaim_str_hashtbl);
525}
526
2a4317c5
JL
527static int
528nfsd4_load_reboot_recovery_data(struct net *net)
529{
530 int status;
531
3a073369 532 status = nfsd4_init_recdir(net);
52e19c09 533 if (status)
15d176c1
KM
534 return status;
535
536 status = nfsd4_recdir_load(net);
537 if (status)
538 nfsd4_shutdown_recdir(net);
539
52e19c09
SK
540 return status;
541}
542
543static int
544nfsd4_legacy_tracking_init(struct net *net)
545{
546 int status;
547
cc27e0d4
JL
548 /* XXX: The legacy code won't work in a container */
549 if (net != &init_net) {
550 WARN(1, KERN_ERR "NFSD: attempt to initialize legacy client "
551 "tracking in a container!\n");
552 return -EINVAL;
553 }
554
52e19c09 555 status = nfs4_legacy_state_init(net);
2a4317c5 556 if (status)
52e19c09
SK
557 return status;
558
559 status = nfsd4_load_reboot_recovery_data(net);
560 if (status)
561 goto err;
562 return 0;
563
564err:
565 nfs4_legacy_state_shutdown(net);
2a4317c5
JL
566 return status;
567}
568
2a4317c5
JL
569static void
570nfsd4_legacy_tracking_exit(struct net *net)
571{
52e19c09
SK
572 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
573
574 nfs4_release_reclaim(nn);
15d176c1 575 nfsd4_shutdown_recdir(net);
52e19c09 576 nfs4_legacy_state_shutdown(net);
2a4317c5
JL
577}
578
48483bf2
BF
579/*
580 * Change the NFSv4 recovery directory to recdir.
581 */
582int
583nfs4_reset_recoverydir(char *recdir)
584{
585 int status;
586 struct path path;
587
588 status = kern_path(recdir, LOOKUP_FOLLOW, &path);
589 if (status)
590 return status;
591 status = -ENOTDIR;
e36cb0b8 592 if (d_is_dir(path.dentry)) {
48483bf2
BF
593 strcpy(user_recovery_dirname, recdir);
594 status = 0;
595 }
596 path_put(&path);
597 return status;
598}
599
600char *
601nfs4_recoverydir(void)
602{
603 return user_recovery_dirname;
604}
2a4317c5
JL
605
606static int
607nfsd4_check_legacy_client(struct nfs4_client *clp)
608{
2216d449
JL
609 int status;
610 char dname[HEXDIR_LEN];
0ce0c2b5 611 struct nfs4_client_reclaim *crp;
52e19c09 612 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
0ce0c2b5 613
2a4317c5
JL
614 /* did we already find that this client is stable? */
615 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
616 return 0;
617
2216d449
JL
618 status = nfs4_make_rec_clidname(dname, &clp->cl_name);
619 if (status) {
7255e716 620 legacy_recdir_name_error(clp, status);
2216d449
JL
621 return status;
622 }
623
2a4317c5 624 /* look for it in the reclaim hashtable otherwise */
52e19c09 625 crp = nfsd4_find_reclaim_client(dname, nn);
0ce0c2b5 626 if (crp) {
2a4317c5 627 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
0ce0c2b5 628 crp->cr_clp = clp;
2a4317c5
JL
629 return 0;
630 }
631
632 return -ENOENT;
633}
634
635static struct nfsd4_client_tracking_ops nfsd4_legacy_tracking_ops = {
52e19c09 636 .init = nfsd4_legacy_tracking_init,
2a4317c5
JL
637 .exit = nfsd4_legacy_tracking_exit,
638 .create = nfsd4_create_clid_dir,
639 .remove = nfsd4_remove_clid_dir,
640 .check = nfsd4_check_legacy_client,
641 .grace_done = nfsd4_recdir_purge_old,
642};
643
f3f80148
JL
644/* Globals */
645#define NFSD_PIPE_DIR "nfsd"
646#define NFSD_CLD_PIPE "cld"
647
648/* per-net-ns structure for holding cld upcall info */
649struct cld_net {
650 struct rpc_pipe *cn_pipe;
651 spinlock_t cn_lock;
652 struct list_head cn_list;
653 unsigned int cn_xid;
654};
655
656struct cld_upcall {
657 struct list_head cu_list;
658 struct cld_net *cu_net;
659 struct task_struct *cu_task;
660 struct cld_msg cu_msg;
661};
662
663static int
664__cld_pipe_upcall(struct rpc_pipe *pipe, struct cld_msg *cmsg)
665{
666 int ret;
667 struct rpc_pipe_msg msg;
668
669 memset(&msg, 0, sizeof(msg));
670 msg.data = cmsg;
671 msg.len = sizeof(*cmsg);
672
673 /*
674 * Set task state before we queue the upcall. That prevents
675 * wake_up_process in the downcall from racing with schedule.
676 */
677 set_current_state(TASK_UNINTERRUPTIBLE);
678 ret = rpc_queue_upcall(pipe, &msg);
679 if (ret < 0) {
680 set_current_state(TASK_RUNNING);
681 goto out;
682 }
683
684 schedule();
f3f80148
JL
685
686 if (msg.errno < 0)
687 ret = msg.errno;
688out:
689 return ret;
690}
691
692static int
693cld_pipe_upcall(struct rpc_pipe *pipe, struct cld_msg *cmsg)
694{
695 int ret;
696
697 /*
698 * -EAGAIN occurs when pipe is closed and reopened while there are
699 * upcalls queued.
700 */
701 do {
702 ret = __cld_pipe_upcall(pipe, cmsg);
703 } while (ret == -EAGAIN);
704
705 return ret;
706}
707
708static ssize_t
709cld_pipe_downcall(struct file *filp, const char __user *src, size_t mlen)
710{
711 struct cld_upcall *tmp, *cup;
bc1b542b 712 struct cld_msg __user *cmsg = (struct cld_msg __user *)src;
f3f80148 713 uint32_t xid;
ef8a1a10 714 struct nfsd_net *nn = net_generic(file_inode(filp)->i_sb->s_fs_info,
f3f80148
JL
715 nfsd_net_id);
716 struct cld_net *cn = nn->cld_net;
717
718 if (mlen != sizeof(*cmsg)) {
8a7dc4b0 719 dprintk("%s: got %zu bytes, expected %zu\n", __func__, mlen,
f3f80148
JL
720 sizeof(*cmsg));
721 return -EINVAL;
722 }
723
724 /* copy just the xid so we can try to find that */
725 if (copy_from_user(&xid, &cmsg->cm_xid, sizeof(xid)) != 0) {
726 dprintk("%s: error when copying xid from userspace", __func__);
727 return -EFAULT;
728 }
729
730 /* walk the list and find corresponding xid */
731 cup = NULL;
732 spin_lock(&cn->cn_lock);
733 list_for_each_entry(tmp, &cn->cn_list, cu_list) {
734 if (get_unaligned(&tmp->cu_msg.cm_xid) == xid) {
735 cup = tmp;
736 list_del_init(&cup->cu_list);
737 break;
738 }
739 }
740 spin_unlock(&cn->cn_lock);
741
742 /* couldn't find upcall? */
743 if (!cup) {
21f72c9f 744 dprintk("%s: couldn't find upcall -- xid=%u\n", __func__, xid);
f3f80148
JL
745 return -EINVAL;
746 }
747
748 if (copy_from_user(&cup->cu_msg, src, mlen) != 0)
749 return -EFAULT;
750
751 wake_up_process(cup->cu_task);
752 return mlen;
753}
754
755static void
756cld_pipe_destroy_msg(struct rpc_pipe_msg *msg)
757{
758 struct cld_msg *cmsg = msg->data;
759 struct cld_upcall *cup = container_of(cmsg, struct cld_upcall,
760 cu_msg);
761
762 /* errno >= 0 means we got a downcall */
763 if (msg->errno >= 0)
764 return;
765
766 wake_up_process(cup->cu_task);
767}
768
769static const struct rpc_pipe_ops cld_upcall_ops = {
770 .upcall = rpc_pipe_generic_upcall,
771 .downcall = cld_pipe_downcall,
772 .destroy_msg = cld_pipe_destroy_msg,
773};
774
775static struct dentry *
776nfsd4_cld_register_sb(struct super_block *sb, struct rpc_pipe *pipe)
777{
778 struct dentry *dir, *dentry;
779
780 dir = rpc_d_lookup_sb(sb, NFSD_PIPE_DIR);
781 if (dir == NULL)
782 return ERR_PTR(-ENOENT);
783 dentry = rpc_mkpipe_dentry(dir, NFSD_CLD_PIPE, NULL, pipe);
784 dput(dir);
785 return dentry;
786}
787
788static void
789nfsd4_cld_unregister_sb(struct rpc_pipe *pipe)
790{
791 if (pipe->dentry)
792 rpc_unlink(pipe->dentry);
793}
794
795static struct dentry *
796nfsd4_cld_register_net(struct net *net, struct rpc_pipe *pipe)
797{
798 struct super_block *sb;
799 struct dentry *dentry;
800
801 sb = rpc_get_sb_net(net);
802 if (!sb)
803 return NULL;
804 dentry = nfsd4_cld_register_sb(sb, pipe);
805 rpc_put_sb_net(net);
806 return dentry;
807}
808
809static void
810nfsd4_cld_unregister_net(struct net *net, struct rpc_pipe *pipe)
811{
812 struct super_block *sb;
813
814 sb = rpc_get_sb_net(net);
815 if (sb) {
816 nfsd4_cld_unregister_sb(pipe);
817 rpc_put_sb_net(net);
818 }
819}
820
821/* Initialize rpc_pipefs pipe for communication with client tracking daemon */
822static int
823nfsd4_init_cld_pipe(struct net *net)
824{
825 int ret;
826 struct dentry *dentry;
827 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
828 struct cld_net *cn;
829
830 if (nn->cld_net)
831 return 0;
832
833 cn = kzalloc(sizeof(*cn), GFP_KERNEL);
834 if (!cn) {
835 ret = -ENOMEM;
836 goto err;
837 }
838
839 cn->cn_pipe = rpc_mkpipe_data(&cld_upcall_ops, RPC_PIPE_WAIT_FOR_OPEN);
840 if (IS_ERR(cn->cn_pipe)) {
841 ret = PTR_ERR(cn->cn_pipe);
842 goto err;
843 }
844 spin_lock_init(&cn->cn_lock);
845 INIT_LIST_HEAD(&cn->cn_list);
846
847 dentry = nfsd4_cld_register_net(net, cn->cn_pipe);
848 if (IS_ERR(dentry)) {
849 ret = PTR_ERR(dentry);
850 goto err_destroy_data;
851 }
852
853 cn->cn_pipe->dentry = dentry;
854 nn->cld_net = cn;
855 return 0;
856
857err_destroy_data:
858 rpc_destroy_pipe_data(cn->cn_pipe);
859err:
860 kfree(cn);
861 printk(KERN_ERR "NFSD: unable to create nfsdcld upcall pipe (%d)\n",
862 ret);
863 return ret;
864}
865
866static void
867nfsd4_remove_cld_pipe(struct net *net)
868{
869 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
870 struct cld_net *cn = nn->cld_net;
871
872 nfsd4_cld_unregister_net(net, cn->cn_pipe);
873 rpc_destroy_pipe_data(cn->cn_pipe);
874 kfree(nn->cld_net);
875 nn->cld_net = NULL;
876}
877
878static struct cld_upcall *
879alloc_cld_upcall(struct cld_net *cn)
880{
881 struct cld_upcall *new, *tmp;
882
883 new = kzalloc(sizeof(*new), GFP_KERNEL);
884 if (!new)
885 return new;
886
887 /* FIXME: hard cap on number in flight? */
888restart_search:
889 spin_lock(&cn->cn_lock);
890 list_for_each_entry(tmp, &cn->cn_list, cu_list) {
891 if (tmp->cu_msg.cm_xid == cn->cn_xid) {
892 cn->cn_xid++;
893 spin_unlock(&cn->cn_lock);
894 goto restart_search;
895 }
896 }
897 new->cu_task = current;
898 new->cu_msg.cm_vers = CLD_UPCALL_VERSION;
899 put_unaligned(cn->cn_xid++, &new->cu_msg.cm_xid);
900 new->cu_net = cn;
901 list_add(&new->cu_list, &cn->cn_list);
902 spin_unlock(&cn->cn_lock);
903
904 dprintk("%s: allocated xid %u\n", __func__, new->cu_msg.cm_xid);
905
906 return new;
907}
908
909static void
910free_cld_upcall(struct cld_upcall *victim)
911{
912 struct cld_net *cn = victim->cu_net;
913
914 spin_lock(&cn->cn_lock);
915 list_del(&victim->cu_list);
916 spin_unlock(&cn->cn_lock);
917 kfree(victim);
918}
919
920/* Ask daemon to create a new record */
921static void
922nfsd4_cld_create(struct nfs4_client *clp)
923{
924 int ret;
925 struct cld_upcall *cup;
c212cecf 926 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
f3f80148
JL
927 struct cld_net *cn = nn->cld_net;
928
929 /* Don't upcall if it's already stored */
930 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
931 return;
932
933 cup = alloc_cld_upcall(cn);
934 if (!cup) {
935 ret = -ENOMEM;
936 goto out_err;
937 }
938
939 cup->cu_msg.cm_cmd = Cld_Create;
940 cup->cu_msg.cm_u.cm_name.cn_len = clp->cl_name.len;
941 memcpy(cup->cu_msg.cm_u.cm_name.cn_id, clp->cl_name.data,
942 clp->cl_name.len);
943
944 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
945 if (!ret) {
946 ret = cup->cu_msg.cm_status;
947 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
948 }
949
950 free_cld_upcall(cup);
951out_err:
952 if (ret)
953 printk(KERN_ERR "NFSD: Unable to create client "
954 "record on stable storage: %d\n", ret);
955}
956
957/* Ask daemon to create a new record */
958static void
959nfsd4_cld_remove(struct nfs4_client *clp)
960{
961 int ret;
962 struct cld_upcall *cup;
c212cecf 963 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
f3f80148
JL
964 struct cld_net *cn = nn->cld_net;
965
966 /* Don't upcall if it's already removed */
967 if (!test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
968 return;
969
970 cup = alloc_cld_upcall(cn);
971 if (!cup) {
972 ret = -ENOMEM;
973 goto out_err;
974 }
975
976 cup->cu_msg.cm_cmd = Cld_Remove;
977 cup->cu_msg.cm_u.cm_name.cn_len = clp->cl_name.len;
978 memcpy(cup->cu_msg.cm_u.cm_name.cn_id, clp->cl_name.data,
979 clp->cl_name.len);
980
981 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
982 if (!ret) {
983 ret = cup->cu_msg.cm_status;
984 clear_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
985 }
986
987 free_cld_upcall(cup);
988out_err:
989 if (ret)
990 printk(KERN_ERR "NFSD: Unable to remove client "
991 "record from stable storage: %d\n", ret);
992}
993
994/* Check for presence of a record, and update its timestamp */
995static int
996nfsd4_cld_check(struct nfs4_client *clp)
997{
998 int ret;
999 struct cld_upcall *cup;
c212cecf 1000 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
f3f80148
JL
1001 struct cld_net *cn = nn->cld_net;
1002
1003 /* Don't upcall if one was already stored during this grace pd */
1004 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
1005 return 0;
1006
1007 cup = alloc_cld_upcall(cn);
1008 if (!cup) {
1009 printk(KERN_ERR "NFSD: Unable to check client record on "
1010 "stable storage: %d\n", -ENOMEM);
1011 return -ENOMEM;
1012 }
1013
1014 cup->cu_msg.cm_cmd = Cld_Check;
1015 cup->cu_msg.cm_u.cm_name.cn_len = clp->cl_name.len;
1016 memcpy(cup->cu_msg.cm_u.cm_name.cn_id, clp->cl_name.data,
1017 clp->cl_name.len);
1018
1019 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
1020 if (!ret) {
1021 ret = cup->cu_msg.cm_status;
1022 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
1023 }
1024
1025 free_cld_upcall(cup);
1026 return ret;
1027}
1028
1029static void
919b8049 1030nfsd4_cld_grace_done(struct nfsd_net *nn)
f3f80148
JL
1031{
1032 int ret;
1033 struct cld_upcall *cup;
f3f80148
JL
1034 struct cld_net *cn = nn->cld_net;
1035
1036 cup = alloc_cld_upcall(cn);
1037 if (!cup) {
1038 ret = -ENOMEM;
1039 goto out_err;
1040 }
1041
1042 cup->cu_msg.cm_cmd = Cld_GraceDone;
919b8049 1043 cup->cu_msg.cm_u.cm_gracetime = (int64_t)nn->boot_time;
f3f80148
JL
1044 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
1045 if (!ret)
1046 ret = cup->cu_msg.cm_status;
1047
1048 free_cld_upcall(cup);
1049out_err:
1050 if (ret)
1051 printk(KERN_ERR "NFSD: Unable to end grace period: %d\n", ret);
1052}
1053
1054static struct nfsd4_client_tracking_ops nfsd4_cld_tracking_ops = {
1055 .init = nfsd4_init_cld_pipe,
1056 .exit = nfsd4_remove_cld_pipe,
1057 .create = nfsd4_cld_create,
1058 .remove = nfsd4_cld_remove,
1059 .check = nfsd4_cld_check,
1060 .grace_done = nfsd4_cld_grace_done,
1061};
1062
2873d214
JL
1063/* upcall via usermodehelper */
1064static char cltrack_prog[PATH_MAX] = "/sbin/nfsdcltrack";
1065module_param_string(cltrack_prog, cltrack_prog, sizeof(cltrack_prog),
1066 S_IRUGO|S_IWUSR);
1067MODULE_PARM_DESC(cltrack_prog, "Path to the nfsdcltrack upcall program");
1068
f3aa7e24
JL
1069static bool cltrack_legacy_disable;
1070module_param(cltrack_legacy_disable, bool, S_IRUGO|S_IWUSR);
1071MODULE_PARM_DESC(cltrack_legacy_disable,
1072 "Disable legacy recoverydir conversion. Default: false");
1073
1074#define LEGACY_TOPDIR_ENV_PREFIX "NFSDCLTRACK_LEGACY_TOPDIR="
1075#define LEGACY_RECDIR_ENV_PREFIX "NFSDCLTRACK_LEGACY_RECDIR="
d4318acd
JL
1076#define HAS_SESSION_ENV_PREFIX "NFSDCLTRACK_CLIENT_HAS_SESSION="
1077#define GRACE_START_ENV_PREFIX "NFSDCLTRACK_GRACE_START="
f3aa7e24
JL
1078
1079static char *
1080nfsd4_cltrack_legacy_topdir(void)
1081{
1082 int copied;
1083 size_t len;
1084 char *result;
1085
1086 if (cltrack_legacy_disable)
1087 return NULL;
1088
1089 len = strlen(LEGACY_TOPDIR_ENV_PREFIX) +
1090 strlen(nfs4_recoverydir()) + 1;
1091
1092 result = kmalloc(len, GFP_KERNEL);
1093 if (!result)
1094 return result;
1095
1096 copied = snprintf(result, len, LEGACY_TOPDIR_ENV_PREFIX "%s",
1097 nfs4_recoverydir());
1098 if (copied >= len) {
1099 /* just return nothing if output was truncated */
1100 kfree(result);
1101 return NULL;
1102 }
1103
1104 return result;
1105}
1106
1107static char *
2216d449 1108nfsd4_cltrack_legacy_recdir(const struct xdr_netobj *name)
f3aa7e24
JL
1109{
1110 int copied;
1111 size_t len;
1112 char *result;
1113
1114 if (cltrack_legacy_disable)
1115 return NULL;
1116
1117 /* +1 is for '/' between "topdir" and "recdir" */
1118 len = strlen(LEGACY_RECDIR_ENV_PREFIX) +
1119 strlen(nfs4_recoverydir()) + 1 + HEXDIR_LEN;
1120
1121 result = kmalloc(len, GFP_KERNEL);
1122 if (!result)
1123 return result;
1124
2216d449
JL
1125 copied = snprintf(result, len, LEGACY_RECDIR_ENV_PREFIX "%s/",
1126 nfs4_recoverydir());
1127 if (copied > (len - HEXDIR_LEN)) {
1128 /* just return nothing if output will be truncated */
1129 kfree(result);
1130 return NULL;
1131 }
1132
1133 copied = nfs4_make_rec_clidname(result + copied, name);
1134 if (copied) {
f3aa7e24
JL
1135 kfree(result);
1136 return NULL;
1137 }
1138
1139 return result;
1140}
1141
d4318acd
JL
1142static char *
1143nfsd4_cltrack_client_has_session(struct nfs4_client *clp)
1144{
1145 int copied;
1146 size_t len;
1147 char *result;
1148
1149 /* prefix + Y/N character + terminating NULL */
1150 len = strlen(HAS_SESSION_ENV_PREFIX) + 1 + 1;
1151
1152 result = kmalloc(len, GFP_KERNEL);
1153 if (!result)
1154 return result;
1155
1156 copied = snprintf(result, len, HAS_SESSION_ENV_PREFIX "%c",
1157 clp->cl_minorversion ? 'Y' : 'N');
1158 if (copied >= len) {
1159 /* just return nothing if output was truncated */
1160 kfree(result);
1161 return NULL;
1162 }
1163
1164 return result;
1165}
1166
1167static char *
1168nfsd4_cltrack_grace_start(time_t grace_start)
1169{
1170 int copied;
1171 size_t len;
1172 char *result;
1173
1174 /* prefix + max width of int64_t string + terminating NULL */
1175 len = strlen(GRACE_START_ENV_PREFIX) + 22 + 1;
1176
1177 result = kmalloc(len, GFP_KERNEL);
1178 if (!result)
1179 return result;
1180
1181 copied = snprintf(result, len, GRACE_START_ENV_PREFIX "%ld",
1182 grace_start);
1183 if (copied >= len) {
1184 /* just return nothing if output was truncated */
1185 kfree(result);
1186 return NULL;
1187 }
1188
1189 return result;
1190}
1191
2873d214 1192static int
d4318acd 1193nfsd4_umh_cltrack_upcall(char *cmd, char *arg, char *env0, char *env1)
2873d214 1194{
d4318acd 1195 char *envp[3];
2873d214
JL
1196 char *argv[4];
1197 int ret;
1198
1199 if (unlikely(!cltrack_prog[0])) {
1200 dprintk("%s: cltrack_prog is disabled\n", __func__);
1201 return -EACCES;
1202 }
1203
1204 dprintk("%s: cmd: %s\n", __func__, cmd);
1205 dprintk("%s: arg: %s\n", __func__, arg ? arg : "(null)");
d4318acd
JL
1206 dprintk("%s: env0: %s\n", __func__, env0 ? env0 : "(null)");
1207 dprintk("%s: env1: %s\n", __func__, env1 ? env1 : "(null)");
f3aa7e24 1208
d4318acd
JL
1209 envp[0] = env0;
1210 envp[1] = env1;
1211 envp[2] = NULL;
2873d214
JL
1212
1213 argv[0] = (char *)cltrack_prog;
1214 argv[1] = cmd;
1215 argv[2] = arg;
1216 argv[3] = NULL;
1217
1218 ret = call_usermodehelper(argv[0], argv, envp, UMH_WAIT_PROC);
1219 /*
1220 * Disable the upcall mechanism if we're getting an ENOENT or EACCES
1221 * error. The admin can re-enable it on the fly by using sysfs
1222 * once the problem has been fixed.
1223 */
1224 if (ret == -ENOENT || ret == -EACCES) {
1225 dprintk("NFSD: %s was not found or isn't executable (%d). "
1226 "Setting cltrack_prog to blank string!",
1227 cltrack_prog, ret);
1228 cltrack_prog[0] = '\0';
1229 }
1230 dprintk("%s: %s return value: %d\n", __func__, cltrack_prog, ret);
1231
1232 return ret;
1233}
1234
1235static char *
1236bin_to_hex_dup(const unsigned char *src, int srclen)
1237{
1238 int i;
1239 char *buf, *hex;
1240
1241 /* +1 for terminating NULL */
1242 buf = kmalloc((srclen * 2) + 1, GFP_KERNEL);
1243 if (!buf)
1244 return buf;
1245
1246 hex = buf;
1247 for (i = 0; i < srclen; i++) {
1248 sprintf(hex, "%2.2x", *src++);
1249 hex += 2;
1250 }
1251 return buf;
1252}
1253
1254static int
d4318acd 1255nfsd4_umh_cltrack_init(struct net *net)
2873d214 1256{
d4318acd
JL
1257 int ret;
1258 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
1259 char *grace_start = nfsd4_cltrack_grace_start(nn->boot_time);
1260
71a50306
SK
1261 /* XXX: The usermode helper s not working in container yet. */
1262 if (net != &init_net) {
1263 WARN(1, KERN_ERR "NFSD: attempt to initialize umh client "
1264 "tracking in a container!\n");
1265 return -EINVAL;
1266 }
d4318acd
JL
1267
1268 ret = nfsd4_umh_cltrack_upcall("init", NULL, grace_start, NULL);
1269 kfree(grace_start);
1270 return ret;
2873d214
JL
1271}
1272
d682e750
JL
1273static void
1274nfsd4_cltrack_upcall_lock(struct nfs4_client *clp)
1275{
1276 wait_on_bit_lock(&clp->cl_flags, NFSD4_CLIENT_UPCALL_LOCK,
1277 TASK_UNINTERRUPTIBLE);
1278}
1279
1280static void
1281nfsd4_cltrack_upcall_unlock(struct nfs4_client *clp)
1282{
1283 smp_mb__before_atomic();
1284 clear_bit(NFSD4_CLIENT_UPCALL_LOCK, &clp->cl_flags);
1285 smp_mb__after_atomic();
1286 wake_up_bit(&clp->cl_flags, NFSD4_CLIENT_UPCALL_LOCK);
1287}
1288
2873d214
JL
1289static void
1290nfsd4_umh_cltrack_create(struct nfs4_client *clp)
1291{
d4318acd
JL
1292 char *hexid, *has_session, *grace_start;
1293 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
2873d214 1294
65decb65
JL
1295 /*
1296 * With v4.0 clients, there's little difference in outcome between a
1297 * create and check operation, and we can end up calling into this
1298 * function multiple times per client (once for each openowner). So,
1299 * for v4.0 clients skip upcalling once the client has been recorded
1300 * on stable storage.
1301 *
1302 * For v4.1+ clients, the outcome of the two operations is different,
1303 * so we must ensure that we upcall for the create operation. v4.1+
1304 * clients call this on RECLAIM_COMPLETE though, so we should only end
1305 * up doing a single create upcall per client.
1306 */
1307 if (clp->cl_minorversion == 0 &&
1308 test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
1309 return;
1310
2873d214
JL
1311 hexid = bin_to_hex_dup(clp->cl_name.data, clp->cl_name.len);
1312 if (!hexid) {
1313 dprintk("%s: can't allocate memory for upcall!\n", __func__);
1314 return;
1315 }
d682e750 1316
d4318acd
JL
1317 has_session = nfsd4_cltrack_client_has_session(clp);
1318 grace_start = nfsd4_cltrack_grace_start(nn->boot_time);
d682e750
JL
1319
1320 nfsd4_cltrack_upcall_lock(clp);
788a7914
JL
1321 if (!nfsd4_umh_cltrack_upcall("create", hexid, has_session, grace_start))
1322 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
d682e750
JL
1323 nfsd4_cltrack_upcall_unlock(clp);
1324
d4318acd
JL
1325 kfree(has_session);
1326 kfree(grace_start);
2873d214
JL
1327 kfree(hexid);
1328}
1329
1330static void
1331nfsd4_umh_cltrack_remove(struct nfs4_client *clp)
1332{
1333 char *hexid;
1334
788a7914
JL
1335 if (!test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
1336 return;
1337
2873d214
JL
1338 hexid = bin_to_hex_dup(clp->cl_name.data, clp->cl_name.len);
1339 if (!hexid) {
1340 dprintk("%s: can't allocate memory for upcall!\n", __func__);
1341 return;
1342 }
d682e750
JL
1343
1344 nfsd4_cltrack_upcall_lock(clp);
788a7914
JL
1345 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags) &&
1346 nfsd4_umh_cltrack_upcall("remove", hexid, NULL, NULL) == 0)
1347 clear_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
d682e750
JL
1348 nfsd4_cltrack_upcall_unlock(clp);
1349
2873d214
JL
1350 kfree(hexid);
1351}
1352
1353static int
1354nfsd4_umh_cltrack_check(struct nfs4_client *clp)
1355{
1356 int ret;
d4318acd 1357 char *hexid, *has_session, *legacy;
2873d214 1358
788a7914
JL
1359 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
1360 return 0;
1361
2873d214
JL
1362 hexid = bin_to_hex_dup(clp->cl_name.data, clp->cl_name.len);
1363 if (!hexid) {
1364 dprintk("%s: can't allocate memory for upcall!\n", __func__);
1365 return -ENOMEM;
1366 }
d4318acd
JL
1367
1368 has_session = nfsd4_cltrack_client_has_session(clp);
2216d449 1369 legacy = nfsd4_cltrack_legacy_recdir(&clp->cl_name);
d682e750
JL
1370
1371 nfsd4_cltrack_upcall_lock(clp);
788a7914
JL
1372 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags)) {
1373 ret = 0;
1374 } else {
1375 ret = nfsd4_umh_cltrack_upcall("check", hexid, has_session, legacy);
1376 if (ret == 0)
1377 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
1378 }
d682e750 1379 nfsd4_cltrack_upcall_unlock(clp);
d4318acd 1380 kfree(has_session);
f3aa7e24 1381 kfree(legacy);
2873d214 1382 kfree(hexid);
d4318acd 1383
2873d214
JL
1384 return ret;
1385}
1386
1387static void
919b8049 1388nfsd4_umh_cltrack_grace_done(struct nfsd_net *nn)
2873d214 1389{
f3aa7e24 1390 char *legacy;
2873d214
JL
1391 char timestr[22]; /* FIXME: better way to determine max size? */
1392
919b8049 1393 sprintf(timestr, "%ld", nn->boot_time);
f3aa7e24 1394 legacy = nfsd4_cltrack_legacy_topdir();
d4318acd 1395 nfsd4_umh_cltrack_upcall("gracedone", timestr, legacy, NULL);
f3aa7e24 1396 kfree(legacy);
2873d214
JL
1397}
1398
1399static struct nfsd4_client_tracking_ops nfsd4_umh_tracking_ops = {
1400 .init = nfsd4_umh_cltrack_init,
1401 .exit = NULL,
1402 .create = nfsd4_umh_cltrack_create,
1403 .remove = nfsd4_umh_cltrack_remove,
1404 .check = nfsd4_umh_cltrack_check,
1405 .grace_done = nfsd4_umh_cltrack_grace_done,
1406};
1407
2a4317c5
JL
1408int
1409nfsd4_client_tracking_init(struct net *net)
1410{
1411 int status;
f3f80148 1412 struct path path;
9a9c6478 1413 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
2a4317c5 1414
2d77bf0a 1415 /* just run the init if it the method is already decided */
9a9c6478 1416 if (nn->client_tracking_ops)
2d77bf0a
JL
1417 goto do_init;
1418
1419 /*
1420 * First, try a UMH upcall. It should succeed or fail quickly, so
1421 * there's little harm in trying that first.
1422 */
9a9c6478
SK
1423 nn->client_tracking_ops = &nfsd4_umh_tracking_ops;
1424 status = nn->client_tracking_ops->init(net);
2d77bf0a
JL
1425 if (!status)
1426 return status;
1427
1428 /*
1429 * See if the recoverydir exists and is a directory. If it is,
1430 * then use the legacy ops.
1431 */
9a9c6478 1432 nn->client_tracking_ops = &nfsd4_legacy_tracking_ops;
2d77bf0a
JL
1433 status = kern_path(nfs4_recoverydir(), LOOKUP_FOLLOW, &path);
1434 if (!status) {
e36cb0b8 1435 status = d_is_dir(path.dentry);
2d77bf0a
JL
1436 path_put(&path);
1437 if (status)
1438 goto do_init;
f3f80148 1439 }
2a4317c5 1440
2d77bf0a 1441 /* Finally, try to use nfsdcld */
9a9c6478 1442 nn->client_tracking_ops = &nfsd4_cld_tracking_ops;
8b0554e9
JL
1443 printk(KERN_WARNING "NFSD: the nfsdcld client tracking upcall will be "
1444 "removed in 3.10. Please transition to using "
1445 "nfsdcltrack.\n");
2d77bf0a 1446do_init:
9a9c6478 1447 status = nn->client_tracking_ops->init(net);
2a4317c5
JL
1448 if (status) {
1449 printk(KERN_WARNING "NFSD: Unable to initialize client "
1450 "recovery tracking! (%d)\n", status);
9a9c6478 1451 nn->client_tracking_ops = NULL;
2a4317c5
JL
1452 }
1453 return status;
1454}
1455
1456void
1457nfsd4_client_tracking_exit(struct net *net)
1458{
9a9c6478
SK
1459 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
1460
1461 if (nn->client_tracking_ops) {
1462 if (nn->client_tracking_ops->exit)
1463 nn->client_tracking_ops->exit(net);
1464 nn->client_tracking_ops = NULL;
2a4317c5
JL
1465 }
1466}
1467
1468void
1469nfsd4_client_record_create(struct nfs4_client *clp)
1470{
9a9c6478
SK
1471 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
1472
1473 if (nn->client_tracking_ops)
1474 nn->client_tracking_ops->create(clp);
2a4317c5
JL
1475}
1476
1477void
1478nfsd4_client_record_remove(struct nfs4_client *clp)
1479{
9a9c6478
SK
1480 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
1481
1482 if (nn->client_tracking_ops)
1483 nn->client_tracking_ops->remove(clp);
2a4317c5
JL
1484}
1485
1486int
1487nfsd4_client_record_check(struct nfs4_client *clp)
1488{
9a9c6478
SK
1489 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
1490
1491 if (nn->client_tracking_ops)
1492 return nn->client_tracking_ops->check(clp);
2a4317c5
JL
1493
1494 return -EOPNOTSUPP;
1495}
1496
1497void
919b8049 1498nfsd4_record_grace_done(struct nfsd_net *nn)
2a4317c5 1499{
9a9c6478 1500 if (nn->client_tracking_ops)
919b8049 1501 nn->client_tracking_ops->grace_done(nn);
2a4317c5 1502}
813fd320
JL
1503
1504static int
1505rpc_pipefs_event(struct notifier_block *nb, unsigned long event, void *ptr)
1506{
1507 struct super_block *sb = ptr;
1508 struct net *net = sb->s_fs_info;
1509 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
1510 struct cld_net *cn = nn->cld_net;
1511 struct dentry *dentry;
1512 int ret = 0;
1513
1514 if (!try_module_get(THIS_MODULE))
1515 return 0;
1516
1517 if (!cn) {
1518 module_put(THIS_MODULE);
1519 return 0;
1520 }
1521
1522 switch (event) {
1523 case RPC_PIPEFS_MOUNT:
1524 dentry = nfsd4_cld_register_sb(sb, cn->cn_pipe);
1525 if (IS_ERR(dentry)) {
1526 ret = PTR_ERR(dentry);
1527 break;
1528 }
1529 cn->cn_pipe->dentry = dentry;
1530 break;
1531 case RPC_PIPEFS_UMOUNT:
1532 if (cn->cn_pipe->dentry)
1533 nfsd4_cld_unregister_sb(cn->cn_pipe);
1534 break;
1535 default:
1536 ret = -ENOTSUPP;
1537 break;
1538 }
1539 module_put(THIS_MODULE);
1540 return ret;
1541}
1542
2355c596 1543static struct notifier_block nfsd4_cld_block = {
813fd320
JL
1544 .notifier_call = rpc_pipefs_event,
1545};
797a9d79
JL
1546
1547int
1548register_cld_notifier(void)
1549{
1550 return rpc_pipefs_notifier_register(&nfsd4_cld_block);
1551}
1552
1553void
1554unregister_cld_notifier(void)
1555{
1556 rpc_pipefs_notifier_unregister(&nfsd4_cld_block);
1557}