]>
Commit | Line | Data |
---|---|---|
50acfb2b | 1 | // SPDX-License-Identifier: GPL-2.0-only |
8adf0536 JB |
2 | /* -*- mode: c; c-basic-offset: 8; -*- |
3 | * vim: noexpandtab sw=8 ts=8 sts=0: | |
4 | * | |
5 | * stack_user.c | |
6 | * | |
7 | * Code which interfaces ocfs2 with fs/dlm and a userspace stack. | |
8 | * | |
9 | * Copyright (C) 2007 Oracle. All rights reserved. | |
8adf0536 JB |
10 | */ |
11 | ||
12 | #include <linux/module.h> | |
6427a727 JB |
13 | #include <linux/fs.h> |
14 | #include <linux/miscdevice.h> | |
15 | #include <linux/mutex.h> | |
5a0e3ad6 | 16 | #include <linux/slab.h> |
6427a727 | 17 | #include <linux/reboot.h> |
c994c2eb | 18 | #include <linux/sched.h> |
7c0f6ba6 | 19 | #include <linux/uaccess.h> |
8adf0536 JB |
20 | |
21 | #include "stackglue.h" | |
22 | ||
53da4939 | 23 | #include <linux/dlm_plock.h> |
8adf0536 | 24 | |
6427a727 JB |
25 | /* |
26 | * The control protocol starts with a handshake. Until the handshake | |
27 | * is complete, the control device will fail all write(2)s. | |
28 | * | |
29 | * The handshake is simple. First, the client reads until EOF. Each line | |
30 | * of output is a supported protocol tag. All protocol tags are a single | |
31 | * character followed by a two hex digit version number. Currently the | |
32 | * only things supported is T01, for "Text-base version 0x01". Next, the | |
de870ef0 JB |
33 | * client writes the version they would like to use, including the newline. |
34 | * Thus, the protocol tag is 'T01\n'. If the version tag written is | |
35 | * unknown, -EINVAL is returned. Once the negotiation is complete, the | |
36 | * client can start sending messages. | |
37 | * | |
d4b95eef | 38 | * The T01 protocol has three messages. First is the "SETN" message. |
3cfd4ab6 JB |
39 | * It has the following syntax: |
40 | * | |
41 | * SETN<space><8-char-hex-nodenum><newline> | |
42 | * | |
43 | * This is 14 characters. | |
44 | * | |
45 | * The "SETN" message must be the first message following the protocol. | |
46 | * It tells ocfs2_control the local node number. | |
47 | * | |
d4b95eef JB |
48 | * Next comes the "SETV" message. It has the following syntax: |
49 | * | |
50 | * SETV<space><2-char-hex-major><space><2-char-hex-minor><newline> | |
51 | * | |
52 | * This is 11 characters. | |
53 | * | |
54 | * The "SETV" message sets the filesystem locking protocol version as | |
55 | * negotiated by the client. The client negotiates based on the maximum | |
56 | * version advertised in /sys/fs/ocfs2/max_locking_protocol. The major | |
57 | * number from the "SETV" message must match | |
e603cfb0 JB |
58 | * ocfs2_user_plugin.sp_max_proto.pv_major, and the minor number |
59 | * must be less than or equal to ...sp_max_version.pv_minor. | |
d4b95eef JB |
60 | * |
61 | * Once this information has been set, mounts will be allowed. From this | |
62 | * point on, the "DOWN" message can be sent for node down notification. | |
63 | * It has the following syntax: | |
de870ef0 JB |
64 | * |
65 | * DOWN<space><32-char-cap-hex-uuid><space><8-char-hex-nodenum><newline> | |
66 | * | |
67 | * eg: | |
68 | * | |
69 | * DOWN 632A924FDD844190BDA93C0DF6B94899 00000001\n | |
70 | * | |
71 | * This is 47 characters. | |
6427a727 JB |
72 | */ |
73 | ||
462c7e6a JB |
74 | /* |
75 | * Whether or not the client has done the handshake. | |
76 | * For now, we have just one protocol version. | |
77 | */ | |
78 | #define OCFS2_CONTROL_PROTO "T01\n" | |
79 | #define OCFS2_CONTROL_PROTO_LEN 4 | |
3cfd4ab6 JB |
80 | |
81 | /* Handshake states */ | |
462c7e6a JB |
82 | #define OCFS2_CONTROL_HANDSHAKE_INVALID (0) |
83 | #define OCFS2_CONTROL_HANDSHAKE_READ (1) | |
3cfd4ab6 JB |
84 | #define OCFS2_CONTROL_HANDSHAKE_PROTOCOL (2) |
85 | #define OCFS2_CONTROL_HANDSHAKE_VALID (3) | |
86 | ||
87 | /* Messages */ | |
88 | #define OCFS2_CONTROL_MESSAGE_OP_LEN 4 | |
89 | #define OCFS2_CONTROL_MESSAGE_SETNODE_OP "SETN" | |
90 | #define OCFS2_CONTROL_MESSAGE_SETNODE_TOTAL_LEN 14 | |
d4b95eef JB |
91 | #define OCFS2_CONTROL_MESSAGE_SETVERSION_OP "SETV" |
92 | #define OCFS2_CONTROL_MESSAGE_SETVERSION_TOTAL_LEN 11 | |
3cfd4ab6 | 93 | #define OCFS2_CONTROL_MESSAGE_DOWN_OP "DOWN" |
de870ef0 JB |
94 | #define OCFS2_CONTROL_MESSAGE_DOWN_TOTAL_LEN 47 |
95 | #define OCFS2_TEXT_UUID_LEN 32 | |
d4b95eef | 96 | #define OCFS2_CONTROL_MESSAGE_VERNUM_LEN 2 |
de870ef0 | 97 | #define OCFS2_CONTROL_MESSAGE_NODENUM_LEN 8 |
41503630 | 98 | #define VERSION_LOCK "version_lock" |
462c7e6a | 99 | |
3e834151 GR |
100 | enum ocfs2_connection_type { |
101 | WITH_CONTROLD, | |
102 | NO_CONTROLD | |
103 | }; | |
104 | ||
6427a727 JB |
105 | /* |
106 | * ocfs2_live_connection is refcounted because the filesystem and | |
107 | * miscdevice sides can detach in different order. Let's just be safe. | |
108 | */ | |
109 | struct ocfs2_live_connection { | |
110 | struct list_head oc_list; | |
111 | struct ocfs2_cluster_connection *oc_conn; | |
3e834151 | 112 | enum ocfs2_connection_type oc_type; |
66e188fc GR |
113 | atomic_t oc_this_node; |
114 | int oc_our_slot; | |
41503630 GR |
115 | struct dlm_lksb oc_version_lksb; |
116 | char oc_lvb[DLM_LVB_LEN]; | |
117 | struct completion oc_sync_wait; | |
c994c2eb | 118 | wait_queue_head_t oc_wait; |
6427a727 JB |
119 | }; |
120 | ||
462c7e6a JB |
121 | struct ocfs2_control_private { |
122 | struct list_head op_list; | |
123 | int op_state; | |
3cfd4ab6 | 124 | int op_this_node; |
d4b95eef | 125 | struct ocfs2_protocol_version op_proto; |
3cfd4ab6 JB |
126 | }; |
127 | ||
128 | /* SETN<space><8-char-hex-nodenum><newline> */ | |
129 | struct ocfs2_control_message_setn { | |
130 | char tag[OCFS2_CONTROL_MESSAGE_OP_LEN]; | |
131 | char space; | |
132 | char nodestr[OCFS2_CONTROL_MESSAGE_NODENUM_LEN]; | |
133 | char newline; | |
134 | }; | |
135 | ||
d4b95eef JB |
136 | /* SETV<space><2-char-hex-major><space><2-char-hex-minor><newline> */ |
137 | struct ocfs2_control_message_setv { | |
138 | char tag[OCFS2_CONTROL_MESSAGE_OP_LEN]; | |
139 | char space1; | |
140 | char major[OCFS2_CONTROL_MESSAGE_VERNUM_LEN]; | |
141 | char space2; | |
142 | char minor[OCFS2_CONTROL_MESSAGE_VERNUM_LEN]; | |
143 | char newline; | |
144 | }; | |
145 | ||
3cfd4ab6 JB |
146 | /* DOWN<space><32-char-cap-hex-uuid><space><8-char-hex-nodenum><newline> */ |
147 | struct ocfs2_control_message_down { | |
148 | char tag[OCFS2_CONTROL_MESSAGE_OP_LEN]; | |
149 | char space1; | |
150 | char uuid[OCFS2_TEXT_UUID_LEN]; | |
151 | char space2; | |
152 | char nodestr[OCFS2_CONTROL_MESSAGE_NODENUM_LEN]; | |
153 | char newline; | |
154 | }; | |
155 | ||
156 | union ocfs2_control_message { | |
157 | char tag[OCFS2_CONTROL_MESSAGE_OP_LEN]; | |
158 | struct ocfs2_control_message_setn u_setn; | |
d4b95eef | 159 | struct ocfs2_control_message_setv u_setv; |
3cfd4ab6 | 160 | struct ocfs2_control_message_down u_down; |
462c7e6a JB |
161 | }; |
162 | ||
a12630b1 | 163 | static struct ocfs2_stack_plugin ocfs2_user_plugin; |
cf4d8d75 | 164 | |
6427a727 | 165 | static atomic_t ocfs2_control_opened; |
3cfd4ab6 | 166 | static int ocfs2_control_this_node = -1; |
d4b95eef | 167 | static struct ocfs2_protocol_version running_proto; |
6427a727 JB |
168 | |
169 | static LIST_HEAD(ocfs2_live_connection_list); | |
462c7e6a | 170 | static LIST_HEAD(ocfs2_control_private_list); |
6427a727 JB |
171 | static DEFINE_MUTEX(ocfs2_control_lock); |
172 | ||
462c7e6a JB |
173 | static inline void ocfs2_control_set_handshake_state(struct file *file, |
174 | int state) | |
175 | { | |
176 | struct ocfs2_control_private *p = file->private_data; | |
177 | p->op_state = state; | |
178 | } | |
179 | ||
180 | static inline int ocfs2_control_get_handshake_state(struct file *file) | |
181 | { | |
182 | struct ocfs2_control_private *p = file->private_data; | |
183 | return p->op_state; | |
184 | } | |
185 | ||
6427a727 JB |
186 | static struct ocfs2_live_connection *ocfs2_connection_find(const char *name) |
187 | { | |
188 | size_t len = strlen(name); | |
189 | struct ocfs2_live_connection *c; | |
190 | ||
191 | BUG_ON(!mutex_is_locked(&ocfs2_control_lock)); | |
192 | ||
193 | list_for_each_entry(c, &ocfs2_live_connection_list, oc_list) { | |
194 | if ((c->oc_conn->cc_namelen == len) && | |
195 | !strncmp(c->oc_conn->cc_name, name, len)) | |
196 | return c; | |
197 | } | |
198 | ||
226291aa | 199 | return NULL; |
6427a727 JB |
200 | } |
201 | ||
202 | /* | |
203 | * ocfs2_live_connection structures are created underneath the ocfs2 | |
204 | * mount path. Since the VFS prevents multiple calls to | |
205 | * fill_super(), we can't get dupes here. | |
206 | */ | |
24aa3386 GR |
207 | static int ocfs2_live_connection_attach(struct ocfs2_cluster_connection *conn, |
208 | struct ocfs2_live_connection *c) | |
6427a727 JB |
209 | { |
210 | int rc = 0; | |
6427a727 JB |
211 | |
212 | mutex_lock(&ocfs2_control_lock); | |
213 | c->oc_conn = conn; | |
214 | ||
c994c2eb | 215 | if ((c->oc_type == NO_CONTROLD) || atomic_read(&ocfs2_control_opened)) |
6427a727 JB |
216 | list_add(&c->oc_list, &ocfs2_live_connection_list); |
217 | else { | |
218 | printk(KERN_ERR | |
219 | "ocfs2: Userspace control daemon is not present\n"); | |
220 | rc = -ESRCH; | |
221 | } | |
222 | ||
223 | mutex_unlock(&ocfs2_control_lock); | |
6427a727 JB |
224 | return rc; |
225 | } | |
226 | ||
227 | /* | |
228 | * This function disconnects the cluster connection from ocfs2_control. | |
229 | * Afterwards, userspace can't affect the cluster connection. | |
230 | */ | |
231 | static void ocfs2_live_connection_drop(struct ocfs2_live_connection *c) | |
232 | { | |
233 | mutex_lock(&ocfs2_control_lock); | |
234 | list_del_init(&c->oc_list); | |
235 | c->oc_conn = NULL; | |
236 | mutex_unlock(&ocfs2_control_lock); | |
237 | ||
238 | kfree(c); | |
239 | } | |
240 | ||
3cfd4ab6 JB |
241 | static int ocfs2_control_cfu(void *target, size_t target_len, |
242 | const char __user *buf, size_t count) | |
462c7e6a JB |
243 | { |
244 | /* The T01 expects write(2) calls to have exactly one command */ | |
3cfd4ab6 JB |
245 | if ((count != target_len) || |
246 | (count > sizeof(union ocfs2_control_message))) | |
462c7e6a JB |
247 | return -EINVAL; |
248 | ||
249 | if (copy_from_user(target, buf, target_len)) | |
250 | return -EFAULT; | |
251 | ||
3cfd4ab6 | 252 | return 0; |
462c7e6a JB |
253 | } |
254 | ||
3cfd4ab6 JB |
255 | static ssize_t ocfs2_control_validate_protocol(struct file *file, |
256 | const char __user *buf, | |
257 | size_t count) | |
462c7e6a JB |
258 | { |
259 | ssize_t ret; | |
260 | char kbuf[OCFS2_CONTROL_PROTO_LEN]; | |
261 | ||
262 | ret = ocfs2_control_cfu(kbuf, OCFS2_CONTROL_PROTO_LEN, | |
263 | buf, count); | |
3cfd4ab6 | 264 | if (ret) |
462c7e6a JB |
265 | return ret; |
266 | ||
267 | if (strncmp(kbuf, OCFS2_CONTROL_PROTO, OCFS2_CONTROL_PROTO_LEN)) | |
268 | return -EINVAL; | |
269 | ||
462c7e6a | 270 | ocfs2_control_set_handshake_state(file, |
3cfd4ab6 | 271 | OCFS2_CONTROL_HANDSHAKE_PROTOCOL); |
462c7e6a JB |
272 | |
273 | return count; | |
274 | } | |
275 | ||
de870ef0 JB |
276 | static void ocfs2_control_send_down(const char *uuid, |
277 | int nodenum) | |
278 | { | |
279 | struct ocfs2_live_connection *c; | |
280 | ||
281 | mutex_lock(&ocfs2_control_lock); | |
282 | ||
283 | c = ocfs2_connection_find(uuid); | |
284 | if (c) { | |
285 | BUG_ON(c->oc_conn == NULL); | |
286 | c->oc_conn->cc_recovery_handler(nodenum, | |
287 | c->oc_conn->cc_recovery_data); | |
288 | } | |
289 | ||
290 | mutex_unlock(&ocfs2_control_lock); | |
291 | } | |
292 | ||
3cfd4ab6 JB |
293 | /* |
294 | * Called whenever configuration elements are sent to /dev/ocfs2_control. | |
295 | * If all configuration elements are present, try to set the global | |
d4b95eef JB |
296 | * values. If there is a problem, return an error. Skip any missing |
297 | * elements, and only bump ocfs2_control_opened when we have all elements | |
298 | * and are successful. | |
3cfd4ab6 JB |
299 | */ |
300 | static int ocfs2_control_install_private(struct file *file) | |
301 | { | |
302 | int rc = 0; | |
303 | int set_p = 1; | |
304 | struct ocfs2_control_private *p = file->private_data; | |
de870ef0 | 305 | |
3cfd4ab6 JB |
306 | BUG_ON(p->op_state != OCFS2_CONTROL_HANDSHAKE_PROTOCOL); |
307 | ||
d4b95eef JB |
308 | mutex_lock(&ocfs2_control_lock); |
309 | ||
310 | if (p->op_this_node < 0) { | |
3cfd4ab6 | 311 | set_p = 0; |
d4b95eef JB |
312 | } else if ((ocfs2_control_this_node >= 0) && |
313 | (ocfs2_control_this_node != p->op_this_node)) { | |
314 | rc = -EINVAL; | |
315 | goto out_unlock; | |
316 | } | |
3cfd4ab6 | 317 | |
d4b95eef JB |
318 | if (!p->op_proto.pv_major) { |
319 | set_p = 0; | |
320 | } else if (!list_empty(&ocfs2_live_connection_list) && | |
321 | ((running_proto.pv_major != p->op_proto.pv_major) || | |
322 | (running_proto.pv_minor != p->op_proto.pv_minor))) { | |
3cfd4ab6 | 323 | rc = -EINVAL; |
d4b95eef JB |
324 | goto out_unlock; |
325 | } | |
326 | ||
327 | if (set_p) { | |
328 | ocfs2_control_this_node = p->op_this_node; | |
329 | running_proto.pv_major = p->op_proto.pv_major; | |
330 | running_proto.pv_minor = p->op_proto.pv_minor; | |
331 | } | |
332 | ||
333 | out_unlock: | |
3cfd4ab6 JB |
334 | mutex_unlock(&ocfs2_control_lock); |
335 | ||
336 | if (!rc && set_p) { | |
337 | /* We set the global values successfully */ | |
338 | atomic_inc(&ocfs2_control_opened); | |
339 | ocfs2_control_set_handshake_state(file, | |
340 | OCFS2_CONTROL_HANDSHAKE_VALID); | |
341 | } | |
342 | ||
343 | return rc; | |
344 | } | |
345 | ||
cf4d8d75 DT |
346 | static int ocfs2_control_get_this_node(void) |
347 | { | |
348 | int rc; | |
349 | ||
350 | mutex_lock(&ocfs2_control_lock); | |
351 | if (ocfs2_control_this_node < 0) | |
352 | rc = -EINVAL; | |
353 | else | |
354 | rc = ocfs2_control_this_node; | |
355 | mutex_unlock(&ocfs2_control_lock); | |
356 | ||
357 | return rc; | |
358 | } | |
359 | ||
3cfd4ab6 JB |
360 | static int ocfs2_control_do_setnode_msg(struct file *file, |
361 | struct ocfs2_control_message_setn *msg) | |
de870ef0 | 362 | { |
de870ef0 | 363 | long nodenum; |
3cfd4ab6 JB |
364 | char *ptr = NULL; |
365 | struct ocfs2_control_private *p = file->private_data; | |
de870ef0 | 366 | |
3cfd4ab6 JB |
367 | if (ocfs2_control_get_handshake_state(file) != |
368 | OCFS2_CONTROL_HANDSHAKE_PROTOCOL) | |
369 | return -EINVAL; | |
de870ef0 | 370 | |
3cfd4ab6 JB |
371 | if (strncmp(msg->tag, OCFS2_CONTROL_MESSAGE_SETNODE_OP, |
372 | OCFS2_CONTROL_MESSAGE_OP_LEN)) | |
373 | return -EINVAL; | |
374 | ||
375 | if ((msg->space != ' ') || (msg->newline != '\n')) | |
376 | return -EINVAL; | |
377 | msg->space = msg->newline = '\0'; | |
378 | ||
379 | nodenum = simple_strtol(msg->nodestr, &ptr, 16); | |
380 | if (!ptr || *ptr) | |
381 | return -EINVAL; | |
382 | ||
383 | if ((nodenum == LONG_MIN) || (nodenum == LONG_MAX) || | |
384 | (nodenum > INT_MAX) || (nodenum < 0)) | |
385 | return -ERANGE; | |
386 | p->op_this_node = nodenum; | |
387 | ||
388 | return ocfs2_control_install_private(file); | |
389 | } | |
390 | ||
d4b95eef JB |
391 | static int ocfs2_control_do_setversion_msg(struct file *file, |
392 | struct ocfs2_control_message_setv *msg) | |
447a5647 | 393 | { |
d4b95eef JB |
394 | long major, minor; |
395 | char *ptr = NULL; | |
396 | struct ocfs2_control_private *p = file->private_data; | |
397 | struct ocfs2_protocol_version *max = | |
e603cfb0 | 398 | &ocfs2_user_plugin.sp_max_proto; |
d4b95eef JB |
399 | |
400 | if (ocfs2_control_get_handshake_state(file) != | |
401 | OCFS2_CONTROL_HANDSHAKE_PROTOCOL) | |
402 | return -EINVAL; | |
403 | ||
404 | if (strncmp(msg->tag, OCFS2_CONTROL_MESSAGE_SETVERSION_OP, | |
405 | OCFS2_CONTROL_MESSAGE_OP_LEN)) | |
406 | return -EINVAL; | |
407 | ||
408 | if ((msg->space1 != ' ') || (msg->space2 != ' ') || | |
409 | (msg->newline != '\n')) | |
410 | return -EINVAL; | |
411 | msg->space1 = msg->space2 = msg->newline = '\0'; | |
412 | ||
413 | major = simple_strtol(msg->major, &ptr, 16); | |
414 | if (!ptr || *ptr) | |
415 | return -EINVAL; | |
416 | minor = simple_strtol(msg->minor, &ptr, 16); | |
417 | if (!ptr || *ptr) | |
418 | return -EINVAL; | |
419 | ||
420 | /* | |
421 | * The major must be between 1 and 255, inclusive. The minor | |
422 | * must be between 0 and 255, inclusive. The version passed in | |
423 | * must be within the maximum version supported by the filesystem. | |
424 | */ | |
425 | if ((major == LONG_MIN) || (major == LONG_MAX) || | |
426 | (major > (u8)-1) || (major < 1)) | |
427 | return -ERANGE; | |
428 | if ((minor == LONG_MIN) || (minor == LONG_MAX) || | |
429 | (minor > (u8)-1) || (minor < 0)) | |
430 | return -ERANGE; | |
431 | if ((major != max->pv_major) || | |
432 | (minor > max->pv_minor)) | |
433 | return -EINVAL; | |
434 | ||
435 | p->op_proto.pv_major = major; | |
436 | p->op_proto.pv_minor = minor; | |
437 | ||
438 | return ocfs2_control_install_private(file); | |
439 | } | |
440 | ||
3cfd4ab6 JB |
441 | static int ocfs2_control_do_down_msg(struct file *file, |
442 | struct ocfs2_control_message_down *msg) | |
443 | { | |
444 | long nodenum; | |
445 | char *p = NULL; | |
446 | ||
447 | if (ocfs2_control_get_handshake_state(file) != | |
448 | OCFS2_CONTROL_HANDSHAKE_VALID) | |
449 | return -EINVAL; | |
de870ef0 | 450 | |
3cfd4ab6 JB |
451 | if (strncmp(msg->tag, OCFS2_CONTROL_MESSAGE_DOWN_OP, |
452 | OCFS2_CONTROL_MESSAGE_OP_LEN)) | |
de870ef0 JB |
453 | return -EINVAL; |
454 | ||
3cfd4ab6 JB |
455 | if ((msg->space1 != ' ') || (msg->space2 != ' ') || |
456 | (msg->newline != '\n')) | |
de870ef0 | 457 | return -EINVAL; |
3cfd4ab6 | 458 | msg->space1 = msg->space2 = msg->newline = '\0'; |
de870ef0 | 459 | |
3cfd4ab6 | 460 | nodenum = simple_strtol(msg->nodestr, &p, 16); |
de870ef0 JB |
461 | if (!p || *p) |
462 | return -EINVAL; | |
463 | ||
464 | if ((nodenum == LONG_MIN) || (nodenum == LONG_MAX) || | |
465 | (nodenum > INT_MAX) || (nodenum < 0)) | |
466 | return -ERANGE; | |
467 | ||
3cfd4ab6 | 468 | ocfs2_control_send_down(msg->uuid, nodenum); |
de870ef0 | 469 | |
3cfd4ab6 JB |
470 | return 0; |
471 | } | |
472 | ||
473 | static ssize_t ocfs2_control_message(struct file *file, | |
474 | const char __user *buf, | |
475 | size_t count) | |
476 | { | |
477 | ssize_t ret; | |
478 | union ocfs2_control_message msg; | |
479 | ||
480 | /* Try to catch padding issues */ | |
481 | WARN_ON(offsetof(struct ocfs2_control_message_down, uuid) != | |
482 | (sizeof(msg.u_down.tag) + sizeof(msg.u_down.space1))); | |
483 | ||
484 | memset(&msg, 0, sizeof(union ocfs2_control_message)); | |
485 | ret = ocfs2_control_cfu(&msg, count, buf, count); | |
486 | if (ret) | |
487 | goto out; | |
488 | ||
489 | if ((count == OCFS2_CONTROL_MESSAGE_SETNODE_TOTAL_LEN) && | |
490 | !strncmp(msg.tag, OCFS2_CONTROL_MESSAGE_SETNODE_OP, | |
491 | OCFS2_CONTROL_MESSAGE_OP_LEN)) | |
492 | ret = ocfs2_control_do_setnode_msg(file, &msg.u_setn); | |
d4b95eef JB |
493 | else if ((count == OCFS2_CONTROL_MESSAGE_SETVERSION_TOTAL_LEN) && |
494 | !strncmp(msg.tag, OCFS2_CONTROL_MESSAGE_SETVERSION_OP, | |
495 | OCFS2_CONTROL_MESSAGE_OP_LEN)) | |
496 | ret = ocfs2_control_do_setversion_msg(file, &msg.u_setv); | |
3cfd4ab6 JB |
497 | else if ((count == OCFS2_CONTROL_MESSAGE_DOWN_TOTAL_LEN) && |
498 | !strncmp(msg.tag, OCFS2_CONTROL_MESSAGE_DOWN_OP, | |
499 | OCFS2_CONTROL_MESSAGE_OP_LEN)) | |
500 | ret = ocfs2_control_do_down_msg(file, &msg.u_down); | |
501 | else | |
502 | ret = -EINVAL; | |
503 | ||
504 | out: | |
505 | return ret ? ret : count; | |
de870ef0 | 506 | } |
6427a727 JB |
507 | |
508 | static ssize_t ocfs2_control_write(struct file *file, | |
509 | const char __user *buf, | |
510 | size_t count, | |
511 | loff_t *ppos) | |
8adf0536 | 512 | { |
462c7e6a JB |
513 | ssize_t ret; |
514 | ||
515 | switch (ocfs2_control_get_handshake_state(file)) { | |
516 | case OCFS2_CONTROL_HANDSHAKE_INVALID: | |
517 | ret = -EINVAL; | |
518 | break; | |
519 | ||
520 | case OCFS2_CONTROL_HANDSHAKE_READ: | |
3cfd4ab6 JB |
521 | ret = ocfs2_control_validate_protocol(file, buf, |
522 | count); | |
462c7e6a JB |
523 | break; |
524 | ||
3cfd4ab6 | 525 | case OCFS2_CONTROL_HANDSHAKE_PROTOCOL: |
462c7e6a | 526 | case OCFS2_CONTROL_HANDSHAKE_VALID: |
de870ef0 | 527 | ret = ocfs2_control_message(file, buf, count); |
462c7e6a JB |
528 | break; |
529 | ||
530 | default: | |
531 | BUG(); | |
532 | ret = -EIO; | |
533 | break; | |
534 | } | |
535 | ||
536 | return ret; | |
8adf0536 JB |
537 | } |
538 | ||
462c7e6a JB |
539 | /* |
540 | * This is a naive version. If we ever have a new protocol, we'll expand | |
541 | * it. Probably using seq_file. | |
542 | */ | |
6427a727 JB |
543 | static ssize_t ocfs2_control_read(struct file *file, |
544 | char __user *buf, | |
545 | size_t count, | |
546 | loff_t *ppos) | |
547 | { | |
7600c72b | 548 | ssize_t ret; |
462c7e6a | 549 | |
7600c72b AM |
550 | ret = simple_read_from_buffer(buf, count, ppos, |
551 | OCFS2_CONTROL_PROTO, OCFS2_CONTROL_PROTO_LEN); | |
462c7e6a JB |
552 | |
553 | /* Have we read the whole protocol list? */ | |
7600c72b | 554 | if (ret > 0 && *ppos >= OCFS2_CONTROL_PROTO_LEN) |
462c7e6a JB |
555 | ocfs2_control_set_handshake_state(file, |
556 | OCFS2_CONTROL_HANDSHAKE_READ); | |
557 | ||
7600c72b | 558 | return ret; |
6427a727 JB |
559 | } |
560 | ||
561 | static int ocfs2_control_release(struct inode *inode, struct file *file) | |
562 | { | |
462c7e6a JB |
563 | struct ocfs2_control_private *p = file->private_data; |
564 | ||
565 | mutex_lock(&ocfs2_control_lock); | |
566 | ||
567 | if (ocfs2_control_get_handshake_state(file) != | |
568 | OCFS2_CONTROL_HANDSHAKE_VALID) | |
569 | goto out; | |
570 | ||
6427a727 | 571 | if (atomic_dec_and_test(&ocfs2_control_opened)) { |
6427a727 JB |
572 | if (!list_empty(&ocfs2_live_connection_list)) { |
573 | /* XXX: Do bad things! */ | |
574 | printk(KERN_ERR | |
575 | "ocfs2: Unexpected release of ocfs2_control!\n" | |
576 | " Loss of cluster connection requires " | |
577 | "an emergency restart!\n"); | |
578 | emergency_restart(); | |
579 | } | |
d4b95eef JB |
580 | /* |
581 | * Last valid close clears the node number and resets | |
582 | * the locking protocol version | |
583 | */ | |
3cfd4ab6 | 584 | ocfs2_control_this_node = -1; |
d4b95eef | 585 | running_proto.pv_major = 0; |
98acbf63 | 586 | running_proto.pv_minor = 0; |
6427a727 JB |
587 | } |
588 | ||
462c7e6a JB |
589 | out: |
590 | list_del_init(&p->op_list); | |
591 | file->private_data = NULL; | |
592 | ||
593 | mutex_unlock(&ocfs2_control_lock); | |
594 | ||
595 | kfree(p); | |
596 | ||
6427a727 JB |
597 | return 0; |
598 | } | |
599 | ||
600 | static int ocfs2_control_open(struct inode *inode, struct file *file) | |
601 | { | |
462c7e6a JB |
602 | struct ocfs2_control_private *p; |
603 | ||
604 | p = kzalloc(sizeof(struct ocfs2_control_private), GFP_KERNEL); | |
605 | if (!p) | |
606 | return -ENOMEM; | |
3cfd4ab6 | 607 | p->op_this_node = -1; |
462c7e6a JB |
608 | |
609 | mutex_lock(&ocfs2_control_lock); | |
610 | file->private_data = p; | |
611 | list_add(&p->op_list, &ocfs2_control_private_list); | |
612 | mutex_unlock(&ocfs2_control_lock); | |
6427a727 JB |
613 | |
614 | return 0; | |
615 | } | |
616 | ||
617 | static const struct file_operations ocfs2_control_fops = { | |
618 | .open = ocfs2_control_open, | |
619 | .release = ocfs2_control_release, | |
620 | .read = ocfs2_control_read, | |
621 | .write = ocfs2_control_write, | |
622 | .owner = THIS_MODULE, | |
6038f373 | 623 | .llseek = default_llseek, |
6427a727 JB |
624 | }; |
625 | ||
4d8755b5 | 626 | static struct miscdevice ocfs2_control_device = { |
6427a727 JB |
627 | .minor = MISC_DYNAMIC_MINOR, |
628 | .name = "ocfs2_control", | |
629 | .fops = &ocfs2_control_fops, | |
630 | }; | |
631 | ||
632 | static int ocfs2_control_init(void) | |
633 | { | |
634 | int rc; | |
635 | ||
636 | atomic_set(&ocfs2_control_opened, 0); | |
637 | ||
638 | rc = misc_register(&ocfs2_control_device); | |
639 | if (rc) | |
640 | printk(KERN_ERR | |
641 | "ocfs2: Unable to register ocfs2_control device " | |
642 | "(errno %d)\n", | |
643 | -rc); | |
644 | ||
645 | return rc; | |
646 | } | |
647 | ||
648 | static void ocfs2_control_exit(void) | |
649 | { | |
f368ed60 | 650 | misc_deregister(&ocfs2_control_device); |
6427a727 JB |
651 | } |
652 | ||
cf4d8d75 DT |
653 | static void fsdlm_lock_ast_wrapper(void *astarg) |
654 | { | |
c0e41338 | 655 | struct ocfs2_dlm_lksb *lksb = astarg; |
a796d286 | 656 | int status = lksb->lksb_fsdlm.sb_status; |
cf4d8d75 | 657 | |
cf4d8d75 DT |
658 | /* |
659 | * For now we're punting on the issue of other non-standard errors | |
660 | * where we can't tell if the unlock_ast or lock_ast should be called. | |
661 | * The main "other error" that's possible is EINVAL which means the | |
662 | * function was called with invalid args, which shouldn't be possible | |
663 | * since the caller here is under our control. Other non-standard | |
664 | * errors probably fall into the same category, or otherwise are fatal | |
665 | * which means we can't carry on anyway. | |
666 | */ | |
667 | ||
668 | if (status == -DLM_EUNLOCK || status == -DLM_ECANCEL) | |
110946c8 | 669 | lksb->lksb_conn->cc_proto->lp_unlock_ast(lksb, 0); |
cf4d8d75 | 670 | else |
110946c8 | 671 | lksb->lksb_conn->cc_proto->lp_lock_ast(lksb); |
cf4d8d75 DT |
672 | } |
673 | ||
674 | static void fsdlm_blocking_ast_wrapper(void *astarg, int level) | |
675 | { | |
c0e41338 | 676 | struct ocfs2_dlm_lksb *lksb = astarg; |
a796d286 | 677 | |
110946c8 | 678 | lksb->lksb_conn->cc_proto->lp_blocking_ast(lksb, level); |
cf4d8d75 DT |
679 | } |
680 | ||
681 | static int user_dlm_lock(struct ocfs2_cluster_connection *conn, | |
682 | int mode, | |
c0e41338 | 683 | struct ocfs2_dlm_lksb *lksb, |
cf4d8d75 DT |
684 | u32 flags, |
685 | void *name, | |
a796d286 | 686 | unsigned int namelen) |
cf4d8d75 DT |
687 | { |
688 | int ret; | |
689 | ||
690 | if (!lksb->lksb_fsdlm.sb_lvbptr) | |
691 | lksb->lksb_fsdlm.sb_lvbptr = (char *)lksb + | |
692 | sizeof(struct dlm_lksb); | |
693 | ||
694 | ret = dlm_lock(conn->cc_lockspace, mode, &lksb->lksb_fsdlm, | |
695 | flags|DLM_LKF_NODLCKWT, name, namelen, 0, | |
a796d286 | 696 | fsdlm_lock_ast_wrapper, lksb, |
cf4d8d75 DT |
697 | fsdlm_blocking_ast_wrapper); |
698 | return ret; | |
699 | } | |
700 | ||
701 | static int user_dlm_unlock(struct ocfs2_cluster_connection *conn, | |
c0e41338 | 702 | struct ocfs2_dlm_lksb *lksb, |
a796d286 | 703 | u32 flags) |
cf4d8d75 DT |
704 | { |
705 | int ret; | |
706 | ||
707 | ret = dlm_unlock(conn->cc_lockspace, lksb->lksb_fsdlm.sb_lkid, | |
a796d286 | 708 | flags, &lksb->lksb_fsdlm, lksb); |
cf4d8d75 DT |
709 | return ret; |
710 | } | |
711 | ||
c0e41338 | 712 | static int user_dlm_lock_status(struct ocfs2_dlm_lksb *lksb) |
cf4d8d75 DT |
713 | { |
714 | return lksb->lksb_fsdlm.sb_status; | |
715 | } | |
716 | ||
c0e41338 | 717 | static int user_dlm_lvb_valid(struct ocfs2_dlm_lksb *lksb) |
1c520dfb JB |
718 | { |
719 | int invalid = lksb->lksb_fsdlm.sb_flags & DLM_SBF_VALNOTVALID; | |
720 | ||
721 | return !invalid; | |
722 | } | |
723 | ||
c0e41338 | 724 | static void *user_dlm_lvb(struct ocfs2_dlm_lksb *lksb) |
cf4d8d75 | 725 | { |
66f502a4 DT |
726 | if (!lksb->lksb_fsdlm.sb_lvbptr) |
727 | lksb->lksb_fsdlm.sb_lvbptr = (char *)lksb + | |
728 | sizeof(struct dlm_lksb); | |
cf4d8d75 DT |
729 | return (void *)(lksb->lksb_fsdlm.sb_lvbptr); |
730 | } | |
731 | ||
c0e41338 | 732 | static void user_dlm_dump_lksb(struct ocfs2_dlm_lksb *lksb) |
cf4d8d75 DT |
733 | { |
734 | } | |
735 | ||
53da4939 MF |
736 | static int user_plock(struct ocfs2_cluster_connection *conn, |
737 | u64 ino, | |
738 | struct file *file, | |
739 | int cmd, | |
740 | struct file_lock *fl) | |
741 | { | |
742 | /* | |
743 | * This more or less just demuxes the plock request into any | |
744 | * one of three dlm calls. | |
745 | * | |
746 | * Internally, fs/dlm will pass these to a misc device, which | |
747 | * a userspace daemon will read and write to. | |
748 | * | |
749 | * For now, cancel requests (which happen internally only), | |
750 | * are turned into unlocks. Most of this function taken from | |
751 | * gfs2_lock. | |
752 | */ | |
753 | ||
754 | if (cmd == F_CANCELLK) { | |
755 | cmd = F_SETLK; | |
756 | fl->fl_type = F_UNLCK; | |
757 | } | |
758 | ||
759 | if (IS_GETLK(cmd)) | |
760 | return dlm_posix_get(conn->cc_lockspace, ino, file, fl); | |
761 | else if (fl->fl_type == F_UNLCK) | |
762 | return dlm_posix_unlock(conn->cc_lockspace, ino, file, fl); | |
763 | else | |
764 | return dlm_posix_lock(conn->cc_lockspace, ino, file, cmd, fl); | |
765 | } | |
766 | ||
cf4d8d75 DT |
767 | /* |
768 | * Compare a requested locking protocol version against the current one. | |
769 | * | |
770 | * If the major numbers are different, they are incompatible. | |
771 | * If the current minor is greater than the request, they are incompatible. | |
772 | * If the current minor is less than or equal to the request, they are | |
773 | * compatible, and the requester should run at the current minor version. | |
774 | */ | |
775 | static int fs_protocol_compare(struct ocfs2_protocol_version *existing, | |
776 | struct ocfs2_protocol_version *request) | |
777 | { | |
778 | if (existing->pv_major != request->pv_major) | |
779 | return 1; | |
780 | ||
781 | if (existing->pv_minor > request->pv_minor) | |
782 | return 1; | |
783 | ||
784 | if (existing->pv_minor < request->pv_minor) | |
785 | request->pv_minor = existing->pv_minor; | |
786 | ||
787 | return 0; | |
788 | } | |
789 | ||
41503630 GR |
790 | static void lvb_to_version(char *lvb, struct ocfs2_protocol_version *ver) |
791 | { | |
792 | struct ocfs2_protocol_version *pv = | |
793 | (struct ocfs2_protocol_version *)lvb; | |
794 | /* | |
795 | * ocfs2_protocol_version has two u8 variables, so we don't | |
796 | * need any endian conversion. | |
797 | */ | |
798 | ver->pv_major = pv->pv_major; | |
799 | ver->pv_minor = pv->pv_minor; | |
800 | } | |
801 | ||
802 | static void version_to_lvb(struct ocfs2_protocol_version *ver, char *lvb) | |
803 | { | |
804 | struct ocfs2_protocol_version *pv = | |
805 | (struct ocfs2_protocol_version *)lvb; | |
806 | /* | |
807 | * ocfs2_protocol_version has two u8 variables, so we don't | |
808 | * need any endian conversion. | |
809 | */ | |
810 | pv->pv_major = ver->pv_major; | |
811 | pv->pv_minor = ver->pv_minor; | |
812 | } | |
813 | ||
814 | static void sync_wait_cb(void *arg) | |
815 | { | |
816 | struct ocfs2_cluster_connection *conn = arg; | |
817 | struct ocfs2_live_connection *lc = conn->cc_private; | |
818 | complete(&lc->oc_sync_wait); | |
819 | } | |
820 | ||
821 | static int sync_unlock(struct ocfs2_cluster_connection *conn, | |
822 | struct dlm_lksb *lksb, char *name) | |
823 | { | |
824 | int error; | |
825 | struct ocfs2_live_connection *lc = conn->cc_private; | |
826 | ||
827 | error = dlm_unlock(conn->cc_lockspace, lksb->sb_lkid, 0, lksb, conn); | |
828 | if (error) { | |
829 | printk(KERN_ERR "%s lkid %x error %d\n", | |
830 | name, lksb->sb_lkid, error); | |
831 | return error; | |
832 | } | |
833 | ||
834 | wait_for_completion(&lc->oc_sync_wait); | |
835 | ||
836 | if (lksb->sb_status != -DLM_EUNLOCK) { | |
837 | printk(KERN_ERR "%s lkid %x status %d\n", | |
838 | name, lksb->sb_lkid, lksb->sb_status); | |
839 | return -1; | |
840 | } | |
841 | return 0; | |
842 | } | |
843 | ||
844 | static int sync_lock(struct ocfs2_cluster_connection *conn, | |
845 | int mode, uint32_t flags, | |
846 | struct dlm_lksb *lksb, char *name) | |
847 | { | |
848 | int error, status; | |
849 | struct ocfs2_live_connection *lc = conn->cc_private; | |
850 | ||
851 | error = dlm_lock(conn->cc_lockspace, mode, lksb, flags, | |
852 | name, strlen(name), | |
853 | 0, sync_wait_cb, conn, NULL); | |
854 | if (error) { | |
855 | printk(KERN_ERR "%s lkid %x flags %x mode %d error %d\n", | |
856 | name, lksb->sb_lkid, flags, mode, error); | |
857 | return error; | |
858 | } | |
859 | ||
860 | wait_for_completion(&lc->oc_sync_wait); | |
861 | ||
862 | status = lksb->sb_status; | |
863 | ||
864 | if (status && status != -EAGAIN) { | |
865 | printk(KERN_ERR "%s lkid %x flags %x mode %d status %d\n", | |
866 | name, lksb->sb_lkid, flags, mode, status); | |
867 | } | |
868 | ||
869 | return status; | |
870 | } | |
871 | ||
872 | ||
873 | static int version_lock(struct ocfs2_cluster_connection *conn, int mode, | |
874 | int flags) | |
875 | { | |
876 | struct ocfs2_live_connection *lc = conn->cc_private; | |
877 | return sync_lock(conn, mode, flags, | |
878 | &lc->oc_version_lksb, VERSION_LOCK); | |
879 | } | |
880 | ||
881 | static int version_unlock(struct ocfs2_cluster_connection *conn) | |
882 | { | |
883 | struct ocfs2_live_connection *lc = conn->cc_private; | |
884 | return sync_unlock(conn, &lc->oc_version_lksb, VERSION_LOCK); | |
885 | } | |
886 | ||
c994c2eb GR |
887 | /* get_protocol_version() |
888 | * | |
889 | * To exchange ocfs2 versioning, we use the LVB of the version dlm lock. | |
890 | * The algorithm is: | |
891 | * 1. Attempt to take the lock in EX mode (non-blocking). | |
892 | * 2. If successful (which means it is the first mount), write the | |
893 | * version number and downconvert to PR lock. | |
894 | * 3. If unsuccessful (returns -EAGAIN), read the version from the LVB after | |
895 | * taking the PR lock. | |
896 | */ | |
897 | ||
898 | static int get_protocol_version(struct ocfs2_cluster_connection *conn) | |
899 | { | |
900 | int ret; | |
901 | struct ocfs2_live_connection *lc = conn->cc_private; | |
902 | struct ocfs2_protocol_version pv; | |
903 | ||
904 | running_proto.pv_major = | |
905 | ocfs2_user_plugin.sp_max_proto.pv_major; | |
906 | running_proto.pv_minor = | |
907 | ocfs2_user_plugin.sp_max_proto.pv_minor; | |
908 | ||
909 | lc->oc_version_lksb.sb_lvbptr = lc->oc_lvb; | |
910 | ret = version_lock(conn, DLM_LOCK_EX, | |
911 | DLM_LKF_VALBLK|DLM_LKF_NOQUEUE); | |
912 | if (!ret) { | |
913 | conn->cc_version.pv_major = running_proto.pv_major; | |
914 | conn->cc_version.pv_minor = running_proto.pv_minor; | |
915 | version_to_lvb(&running_proto, lc->oc_lvb); | |
916 | version_lock(conn, DLM_LOCK_PR, DLM_LKF_CONVERT|DLM_LKF_VALBLK); | |
917 | } else if (ret == -EAGAIN) { | |
918 | ret = version_lock(conn, DLM_LOCK_PR, DLM_LKF_VALBLK); | |
919 | if (ret) | |
920 | goto out; | |
921 | lvb_to_version(lc->oc_lvb, &pv); | |
922 | ||
923 | if ((pv.pv_major != running_proto.pv_major) || | |
924 | (pv.pv_minor > running_proto.pv_minor)) { | |
925 | ret = -EINVAL; | |
926 | goto out; | |
927 | } | |
928 | ||
929 | conn->cc_version.pv_major = pv.pv_major; | |
930 | conn->cc_version.pv_minor = pv.pv_minor; | |
931 | } | |
932 | out: | |
933 | return ret; | |
934 | } | |
935 | ||
66e188fc GR |
936 | static void user_recover_prep(void *arg) |
937 | { | |
938 | } | |
939 | ||
940 | static void user_recover_slot(void *arg, struct dlm_slot *slot) | |
941 | { | |
942 | struct ocfs2_cluster_connection *conn = arg; | |
943 | printk(KERN_INFO "ocfs2: Node %d/%d down. Initiating recovery.\n", | |
944 | slot->nodeid, slot->slot); | |
945 | conn->cc_recovery_handler(slot->nodeid, conn->cc_recovery_data); | |
946 | ||
947 | } | |
948 | ||
949 | static void user_recover_done(void *arg, struct dlm_slot *slots, | |
950 | int num_slots, int our_slot, | |
951 | uint32_t generation) | |
952 | { | |
953 | struct ocfs2_cluster_connection *conn = arg; | |
954 | struct ocfs2_live_connection *lc = conn->cc_private; | |
955 | int i; | |
956 | ||
957 | for (i = 0; i < num_slots; i++) | |
958 | if (slots[i].slot == our_slot) { | |
959 | atomic_set(&lc->oc_this_node, slots[i].nodeid); | |
960 | break; | |
961 | } | |
962 | ||
963 | lc->oc_our_slot = our_slot; | |
c994c2eb | 964 | wake_up(&lc->oc_wait); |
66e188fc GR |
965 | } |
966 | ||
16eac4be | 967 | static const struct dlm_lockspace_ops ocfs2_ls_ops = { |
66e188fc GR |
968 | .recover_prep = user_recover_prep, |
969 | .recover_slot = user_recover_slot, | |
970 | .recover_done = user_recover_done, | |
971 | }; | |
972 | ||
c994c2eb GR |
973 | static int user_cluster_disconnect(struct ocfs2_cluster_connection *conn) |
974 | { | |
975 | version_unlock(conn); | |
976 | dlm_release_lockspace(conn->cc_lockspace, 2); | |
977 | conn->cc_lockspace = NULL; | |
978 | ocfs2_live_connection_drop(conn->cc_private); | |
979 | conn->cc_private = NULL; | |
980 | return 0; | |
981 | } | |
982 | ||
cf4d8d75 DT |
983 | static int user_cluster_connect(struct ocfs2_cluster_connection *conn) |
984 | { | |
985 | dlm_lockspace_t *fsdlm; | |
24aa3386 | 986 | struct ocfs2_live_connection *lc; |
c994c2eb | 987 | int rc, ops_rv; |
cf4d8d75 DT |
988 | |
989 | BUG_ON(conn == NULL); | |
990 | ||
24aa3386 | 991 | lc = kzalloc(sizeof(struct ocfs2_live_connection), GFP_KERNEL); |
43ee9cad ME |
992 | if (!lc) |
993 | return -ENOMEM; | |
24aa3386 | 994 | |
c994c2eb GR |
995 | init_waitqueue_head(&lc->oc_wait); |
996 | init_completion(&lc->oc_sync_wait); | |
997 | atomic_set(&lc->oc_this_node, 0); | |
998 | conn->cc_private = lc; | |
999 | lc->oc_type = NO_CONTROLD; | |
1000 | ||
1001 | rc = dlm_new_lockspace(conn->cc_name, conn->cc_cluster_name, | |
01a36b67 | 1002 | DLM_LSFL_FS | DLM_LSFL_NEWEXCL, DLM_LVB_LEN, |
c994c2eb | 1003 | &ocfs2_ls_ops, conn, &ops_rv, &fsdlm); |
01a36b67 GH |
1004 | if (rc) { |
1005 | if (rc == -EEXIST || rc == -EPROTO) | |
1006 | printk(KERN_ERR "ocfs2: Unable to create the " | |
1007 | "lockspace %s (%d), because a ocfs2-tools " | |
1008 | "program is running on this file system " | |
1009 | "with the same name lockspace\n", | |
1010 | conn->cc_name, rc); | |
c994c2eb | 1011 | goto out; |
01a36b67 | 1012 | } |
c994c2eb GR |
1013 | |
1014 | if (ops_rv == -EOPNOTSUPP) { | |
1015 | lc->oc_type = WITH_CONTROLD; | |
1016 | printk(KERN_NOTICE "ocfs2: You seem to be using an older " | |
1017 | "version of dlm_controld and/or ocfs2-tools." | |
1018 | " Please consider upgrading.\n"); | |
1019 | } else if (ops_rv) { | |
1020 | rc = ops_rv; | |
1021 | goto out; | |
1022 | } | |
1023 | conn->cc_lockspace = fsdlm; | |
1024 | ||
24aa3386 | 1025 | rc = ocfs2_live_connection_attach(conn, lc); |
cf4d8d75 DT |
1026 | if (rc) |
1027 | goto out; | |
1028 | ||
c994c2eb GR |
1029 | if (lc->oc_type == NO_CONTROLD) { |
1030 | rc = get_protocol_version(conn); | |
1031 | if (rc) { | |
1032 | printk(KERN_ERR "ocfs2: Could not determine" | |
1033 | " locking version\n"); | |
1034 | user_cluster_disconnect(conn); | |
1035 | goto out; | |
1036 | } | |
1037 | wait_event(lc->oc_wait, (atomic_read(&lc->oc_this_node) > 0)); | |
1038 | } | |
1039 | ||
cf4d8d75 DT |
1040 | /* |
1041 | * running_proto must have been set before we allowed any mounts | |
1042 | * to proceed. | |
1043 | */ | |
1044 | if (fs_protocol_compare(&running_proto, &conn->cc_version)) { | |
1045 | printk(KERN_ERR | |
1046 | "Unable to mount with fs locking protocol version " | |
c994c2eb | 1047 | "%u.%u because negotiated protocol is %u.%u\n", |
cf4d8d75 DT |
1048 | conn->cc_version.pv_major, conn->cc_version.pv_minor, |
1049 | running_proto.pv_major, running_proto.pv_minor); | |
1050 | rc = -EPROTO; | |
24aa3386 GR |
1051 | ocfs2_live_connection_drop(lc); |
1052 | lc = NULL; | |
cf4d8d75 DT |
1053 | } |
1054 | ||
cf4d8d75 | 1055 | out: |
fd90d4df | 1056 | if (rc) |
24aa3386 | 1057 | kfree(lc); |
cf4d8d75 DT |
1058 | return rc; |
1059 | } | |
1060 | ||
cf4d8d75 | 1061 | |
3e834151 GR |
1062 | static int user_cluster_this_node(struct ocfs2_cluster_connection *conn, |
1063 | unsigned int *this_node) | |
cf4d8d75 DT |
1064 | { |
1065 | int rc; | |
3e834151 | 1066 | struct ocfs2_live_connection *lc = conn->cc_private; |
cf4d8d75 | 1067 | |
3e834151 GR |
1068 | if (lc->oc_type == WITH_CONTROLD) |
1069 | rc = ocfs2_control_get_this_node(); | |
c994c2eb GR |
1070 | else if (lc->oc_type == NO_CONTROLD) |
1071 | rc = atomic_read(&lc->oc_this_node); | |
3e834151 GR |
1072 | else |
1073 | rc = -EINVAL; | |
c994c2eb | 1074 | |
cf4d8d75 DT |
1075 | if (rc < 0) |
1076 | return rc; | |
1077 | ||
1078 | *this_node = rc; | |
1079 | return 0; | |
1080 | } | |
1081 | ||
a12630b1 | 1082 | static struct ocfs2_stack_operations ocfs2_user_plugin_ops = { |
cf4d8d75 DT |
1083 | .connect = user_cluster_connect, |
1084 | .disconnect = user_cluster_disconnect, | |
1085 | .this_node = user_cluster_this_node, | |
1086 | .dlm_lock = user_dlm_lock, | |
1087 | .dlm_unlock = user_dlm_unlock, | |
1088 | .lock_status = user_dlm_lock_status, | |
1c520dfb | 1089 | .lvb_valid = user_dlm_lvb_valid, |
cf4d8d75 | 1090 | .lock_lvb = user_dlm_lvb, |
53da4939 | 1091 | .plock = user_plock, |
cf4d8d75 DT |
1092 | .dump_lksb = user_dlm_dump_lksb, |
1093 | }; | |
1094 | ||
a12630b1 | 1095 | static struct ocfs2_stack_plugin ocfs2_user_plugin = { |
cf4d8d75 | 1096 | .sp_name = "user", |
a12630b1 | 1097 | .sp_ops = &ocfs2_user_plugin_ops, |
cf4d8d75 DT |
1098 | .sp_owner = THIS_MODULE, |
1099 | }; | |
1100 | ||
1101 | ||
a12630b1 | 1102 | static int __init ocfs2_user_plugin_init(void) |
6427a727 | 1103 | { |
cf4d8d75 DT |
1104 | int rc; |
1105 | ||
1106 | rc = ocfs2_control_init(); | |
1107 | if (!rc) { | |
a12630b1 | 1108 | rc = ocfs2_stack_glue_register(&ocfs2_user_plugin); |
cf4d8d75 DT |
1109 | if (rc) |
1110 | ocfs2_control_exit(); | |
1111 | } | |
1112 | ||
1113 | return rc; | |
6427a727 JB |
1114 | } |
1115 | ||
a12630b1 | 1116 | static void __exit ocfs2_user_plugin_exit(void) |
8adf0536 | 1117 | { |
a12630b1 | 1118 | ocfs2_stack_glue_unregister(&ocfs2_user_plugin); |
6427a727 | 1119 | ocfs2_control_exit(); |
8adf0536 JB |
1120 | } |
1121 | ||
1122 | MODULE_AUTHOR("Oracle"); | |
1123 | MODULE_DESCRIPTION("ocfs2 driver for userspace cluster stacks"); | |
1124 | MODULE_LICENSE("GPL"); | |
a12630b1 JB |
1125 | module_init(ocfs2_user_plugin_init); |
1126 | module_exit(ocfs2_user_plugin_exit); |