blob: b36bfb93924cebba123b11e603c3290333a1b31a [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * net/sunrpc/rpc_pipe.c
3 *
4 * Userland/kernel interface for rpcauth_gss.
5 * Code shamelessly plagiarized from fs/nfsd/nfsctl.c
Rolf Eike Beerd51fe1b2005-09-02 08:59:25 +02006 * and fs/sysfs/inode.c
Linus Torvalds1da177e2005-04-16 15:20:36 -07007 *
8 * Copyright (c) 2002, Trond Myklebust <trond.myklebust@fys.uio.no>
9 *
10 */
Linus Torvalds1da177e2005-04-16 15:20:36 -070011#include <linux/module.h>
12#include <linux/slab.h>
13#include <linux/string.h>
14#include <linux/pagemap.h>
15#include <linux/mount.h>
16#include <linux/namei.h>
Trond Myklebust50e437d2007-06-07 22:44:34 -040017#include <linux/fsnotify.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070018#include <linux/kernel.h>
Trond Myklebust2446ab62012-03-01 17:00:56 -050019#include <linux/rcupdate.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070020
21#include <asm/ioctls.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070022#include <linux/poll.h>
23#include <linux/wait.h>
24#include <linux/seq_file.h>
25
26#include <linux/sunrpc/clnt.h>
27#include <linux/workqueue.h>
28#include <linux/sunrpc/rpc_pipe_fs.h>
Trond Myklebust8854e822009-08-09 15:14:30 -040029#include <linux/sunrpc/cache.h>
Stanislav Kinsbursky021c68d2011-12-26 15:39:04 +030030#include <linux/nsproxy.h>
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +030031#include <linux/notifier.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070032
Stanislav Kinsbursky021c68d2011-12-26 15:39:04 +030033#include "netns.h"
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +030034#include "sunrpc.h"
Linus Torvalds1da177e2005-04-16 15:20:36 -070035
Stanislav Kinsburskyefc46bf2011-12-26 15:39:47 +030036#define RPCDBG_FACILITY RPCDBG_DEBUG
37
38#define NET_NAME(net) ((net == &init_net) ? " (init_net)" : "")
Linus Torvalds1da177e2005-04-16 15:20:36 -070039
40static struct file_system_type rpc_pipe_fs_type;
41
42
Christoph Lametere18b8902006-12-06 20:33:20 -080043static struct kmem_cache *rpc_inode_cachep __read_mostly;
Linus Torvalds1da177e2005-04-16 15:20:36 -070044
45#define RPC_UPCALL_TIMEOUT (30*HZ)
46
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +030047static BLOCKING_NOTIFIER_HEAD(rpc_pipefs_notifier_list);
48
49int rpc_pipefs_notifier_register(struct notifier_block *nb)
50{
51 return blocking_notifier_chain_cond_register(&rpc_pipefs_notifier_list, nb);
52}
53EXPORT_SYMBOL_GPL(rpc_pipefs_notifier_register);
54
55void rpc_pipefs_notifier_unregister(struct notifier_block *nb)
56{
57 blocking_notifier_chain_unregister(&rpc_pipefs_notifier_list, nb);
58}
59EXPORT_SYMBOL_GPL(rpc_pipefs_notifier_unregister);
60
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +040061static void rpc_purge_list(wait_queue_head_t *waitq, struct list_head *head,
Trond Myklebust9842ef32006-02-01 12:18:44 -050062 void (*destroy_msg)(struct rpc_pipe_msg *), int err)
Trond Myklebustb3eb67a2005-11-25 17:10:11 -050063{
64 struct rpc_pipe_msg *msg;
Trond Myklebustb3eb67a2005-11-25 17:10:11 -050065
Trond Myklebust9842ef32006-02-01 12:18:44 -050066 if (list_empty(head))
67 return;
68 do {
Trond Myklebustb3eb67a2005-11-25 17:10:11 -050069 msg = list_entry(head->next, struct rpc_pipe_msg, list);
Trond Myklebust5a676572010-09-12 19:55:25 -040070 list_del_init(&msg->list);
Trond Myklebustb3eb67a2005-11-25 17:10:11 -050071 msg->errno = err;
72 destroy_msg(msg);
Trond Myklebust9842ef32006-02-01 12:18:44 -050073 } while (!list_empty(head));
Jeff Layton92123e02012-06-11 10:03:42 -040074
75 if (waitq)
76 wake_up(waitq);
Linus Torvalds1da177e2005-04-16 15:20:36 -070077}
78
79static void
David Howells65f27f32006-11-22 14:55:48 +000080rpc_timeout_upcall_queue(struct work_struct *work)
Linus Torvalds1da177e2005-04-16 15:20:36 -070081{
Trond Myklebust9842ef32006-02-01 12:18:44 -050082 LIST_HEAD(free_list);
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +030083 struct rpc_pipe *pipe =
84 container_of(work, struct rpc_pipe, queue_timeout.work);
Trond Myklebust9842ef32006-02-01 12:18:44 -050085 void (*destroy_msg)(struct rpc_pipe_msg *);
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +040086 struct dentry *dentry;
Linus Torvalds1da177e2005-04-16 15:20:36 -070087
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +030088 spin_lock(&pipe->lock);
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +030089 destroy_msg = pipe->ops->destroy_msg;
90 if (pipe->nreaders == 0) {
91 list_splice_init(&pipe->pipe, &free_list);
92 pipe->pipelen = 0;
Trond Myklebust9842ef32006-02-01 12:18:44 -050093 }
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +040094 dentry = dget(pipe->dentry);
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +030095 spin_unlock(&pipe->lock);
Jeff Layton92123e02012-06-11 10:03:42 -040096 rpc_purge_list(dentry ? &RPC_I(dentry->d_inode)->waitq : NULL,
97 &free_list, destroy_msg, -ETIMEDOUT);
98 dput(dentry);
Linus Torvalds1da177e2005-04-16 15:20:36 -070099}
100
Peng Taoc1225152011-09-22 21:50:10 -0400101ssize_t rpc_pipe_generic_upcall(struct file *filp, struct rpc_pipe_msg *msg,
102 char __user *dst, size_t buflen)
103{
104 char *data = (char *)msg->data + msg->copied;
105 size_t mlen = min(msg->len - msg->copied, buflen);
106 unsigned long left;
107
108 left = copy_to_user(dst, data, mlen);
109 if (left == mlen) {
110 msg->errno = -EFAULT;
111 return -EFAULT;
112 }
113
114 mlen -= left;
115 msg->copied += mlen;
116 msg->errno = 0;
117 return mlen;
118}
119EXPORT_SYMBOL_GPL(rpc_pipe_generic_upcall);
120
J. Bruce Fields93a44a72007-11-06 13:06:03 -0500121/**
Ben Hutchings1a5778a2010-02-14 22:35:47 -0800122 * rpc_queue_upcall - queue an upcall message to userspace
Randy Dunlapbda14602012-05-13 10:35:40 -0700123 * @pipe: upcall pipe on which to queue given message
J. Bruce Fields93a44a72007-11-06 13:06:03 -0500124 * @msg: message to queue
125 *
126 * Call with an @inode created by rpc_mkpipe() to queue an upcall.
127 * A userspace process may then later read the upcall by performing a
128 * read on an open file for this inode. It is up to the caller to
129 * initialize the fields of @msg (other than @msg->list) appropriately.
130 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700131int
Stanislav Kinsburskyd706ed12011-12-26 15:43:49 +0300132rpc_queue_upcall(struct rpc_pipe *pipe, struct rpc_pipe_msg *msg)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700133{
Trond Myklebust6070fe62005-10-27 22:12:46 -0400134 int res = -EPIPE;
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400135 struct dentry *dentry;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700136
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300137 spin_lock(&pipe->lock);
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300138 if (pipe->nreaders) {
139 list_add_tail(&msg->list, &pipe->pipe);
140 pipe->pipelen += msg->len;
Trond Myklebust6070fe62005-10-27 22:12:46 -0400141 res = 0;
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300142 } else if (pipe->flags & RPC_PIPE_WAIT_FOR_OPEN) {
143 if (list_empty(&pipe->pipe))
Trond Myklebust24c5d9d2006-03-20 13:44:08 -0500144 queue_delayed_work(rpciod_workqueue,
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300145 &pipe->queue_timeout,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700146 RPC_UPCALL_TIMEOUT);
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300147 list_add_tail(&msg->list, &pipe->pipe);
148 pipe->pipelen += msg->len;
Trond Myklebust6070fe62005-10-27 22:12:46 -0400149 res = 0;
150 }
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400151 dentry = dget(pipe->dentry);
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300152 spin_unlock(&pipe->lock);
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400153 if (dentry) {
154 wake_up(&RPC_I(dentry->d_inode)->waitq);
155 dput(dentry);
156 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700157 return res;
158}
Trond Myklebust468039e2008-12-23 15:21:31 -0500159EXPORT_SYMBOL_GPL(rpc_queue_upcall);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700160
Trond Myklebust6070fe62005-10-27 22:12:46 -0400161static inline void
162rpc_inode_setowner(struct inode *inode, void *private)
163{
164 RPC_I(inode)->private = private;
165}
166
Linus Torvalds1da177e2005-04-16 15:20:36 -0700167static void
168rpc_close_pipes(struct inode *inode)
169{
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300170 struct rpc_pipe *pipe = RPC_I(inode)->pipe;
\"J. Bruce Fields\e7128042008-12-23 16:09:47 -0500171 int need_release;
Stanislav Kinsburskyad6b1342012-01-10 16:12:38 +0400172 LIST_HEAD(free_list);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700173
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800174 mutex_lock(&inode->i_mutex);
Stanislav Kinsburskyad6b1342012-01-10 16:12:38 +0400175 spin_lock(&pipe->lock);
176 need_release = pipe->nreaders != 0 || pipe->nwriters != 0;
177 pipe->nreaders = 0;
178 list_splice_init(&pipe->in_upcall, &free_list);
179 list_splice_init(&pipe->pipe, &free_list);
180 pipe->pipelen = 0;
181 pipe->dentry = NULL;
182 spin_unlock(&pipe->lock);
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400183 rpc_purge_list(&RPC_I(inode)->waitq, &free_list, pipe->ops->destroy_msg, -EPIPE);
Stanislav Kinsburskyad6b1342012-01-10 16:12:38 +0400184 pipe->nwriters = 0;
185 if (need_release && pipe->ops->release_pipe)
186 pipe->ops->release_pipe(inode);
187 cancel_delayed_work_sync(&pipe->queue_timeout);
Trond Myklebust6070fe62005-10-27 22:12:46 -0400188 rpc_inode_setowner(inode, NULL);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400189 RPC_I(inode)->pipe = NULL;
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800190 mutex_unlock(&inode->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700191}
192
Linus Torvalds1da177e2005-04-16 15:20:36 -0700193static struct inode *
194rpc_alloc_inode(struct super_block *sb)
195{
196 struct rpc_inode *rpci;
Christoph Lametere94b1762006-12-06 20:33:17 -0800197 rpci = (struct rpc_inode *)kmem_cache_alloc(rpc_inode_cachep, GFP_KERNEL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700198 if (!rpci)
199 return NULL;
200 return &rpci->vfs_inode;
201}
202
203static void
Nick Pigginfa0d7e3d2011-01-07 17:49:49 +1100204rpc_i_callback(struct rcu_head *head)
205{
206 struct inode *inode = container_of(head, struct inode, i_rcu);
Nick Pigginfa0d7e3d2011-01-07 17:49:49 +1100207 kmem_cache_free(rpc_inode_cachep, RPC_I(inode));
208}
209
210static void
Linus Torvalds1da177e2005-04-16 15:20:36 -0700211rpc_destroy_inode(struct inode *inode)
212{
Nick Pigginfa0d7e3d2011-01-07 17:49:49 +1100213 call_rcu(&inode->i_rcu, rpc_i_callback);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700214}
215
216static int
217rpc_pipe_open(struct inode *inode, struct file *filp)
218{
Trond Myklebustabfdbd52013-05-15 11:28:54 -0700219 struct net *net = inode->i_sb->s_fs_info;
220 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400221 struct rpc_pipe *pipe;
\"J. Bruce Fields\c3810602008-12-23 16:08:32 -0500222 int first_open;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700223 int res = -ENXIO;
224
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800225 mutex_lock(&inode->i_mutex);
Trond Myklebustabfdbd52013-05-15 11:28:54 -0700226 sn->gssd_running = 1;
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400227 pipe = RPC_I(inode)->pipe;
228 if (pipe == NULL)
\"J. Bruce Fields\c3810602008-12-23 16:08:32 -0500229 goto out;
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300230 first_open = pipe->nreaders == 0 && pipe->nwriters == 0;
231 if (first_open && pipe->ops->open_pipe) {
232 res = pipe->ops->open_pipe(inode);
\"J. Bruce Fields\c3810602008-12-23 16:08:32 -0500233 if (res)
234 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700235 }
\"J. Bruce Fields\c3810602008-12-23 16:08:32 -0500236 if (filp->f_mode & FMODE_READ)
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300237 pipe->nreaders++;
\"J. Bruce Fields\c3810602008-12-23 16:08:32 -0500238 if (filp->f_mode & FMODE_WRITE)
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300239 pipe->nwriters++;
\"J. Bruce Fields\c3810602008-12-23 16:08:32 -0500240 res = 0;
241out:
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800242 mutex_unlock(&inode->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700243 return res;
244}
245
246static int
247rpc_pipe_release(struct inode *inode, struct file *filp)
248{
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400249 struct rpc_pipe *pipe;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700250 struct rpc_pipe_msg *msg;
\"J. Bruce Fields\e7128042008-12-23 16:09:47 -0500251 int last_close;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700252
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800253 mutex_lock(&inode->i_mutex);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400254 pipe = RPC_I(inode)->pipe;
255 if (pipe == NULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700256 goto out;
Joe Perches655b5bb2010-09-04 18:52:53 -0700257 msg = filp->private_data;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700258 if (msg != NULL) {
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300259 spin_lock(&pipe->lock);
Trond Myklebust48e49182005-12-19 17:11:22 -0500260 msg->errno = -EAGAIN;
Trond Myklebust5a676572010-09-12 19:55:25 -0400261 list_del_init(&msg->list);
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300262 spin_unlock(&pipe->lock);
263 pipe->ops->destroy_msg(msg);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700264 }
265 if (filp->f_mode & FMODE_WRITE)
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300266 pipe->nwriters --;
Trond Myklebust9842ef32006-02-01 12:18:44 -0500267 if (filp->f_mode & FMODE_READ) {
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300268 pipe->nreaders --;
269 if (pipe->nreaders == 0) {
Trond Myklebust9842ef32006-02-01 12:18:44 -0500270 LIST_HEAD(free_list);
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300271 spin_lock(&pipe->lock);
272 list_splice_init(&pipe->pipe, &free_list);
273 pipe->pipelen = 0;
274 spin_unlock(&pipe->lock);
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400275 rpc_purge_list(&RPC_I(inode)->waitq, &free_list,
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300276 pipe->ops->destroy_msg, -EAGAIN);
Trond Myklebust9842ef32006-02-01 12:18:44 -0500277 }
278 }
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300279 last_close = pipe->nwriters == 0 && pipe->nreaders == 0;
280 if (last_close && pipe->ops->release_pipe)
281 pipe->ops->release_pipe(inode);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700282out:
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800283 mutex_unlock(&inode->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700284 return 0;
285}
286
287static ssize_t
288rpc_pipe_read(struct file *filp, char __user *buf, size_t len, loff_t *offset)
289{
Al Viro496ad9a2013-01-23 17:07:38 -0500290 struct inode *inode = file_inode(filp);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400291 struct rpc_pipe *pipe;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700292 struct rpc_pipe_msg *msg;
293 int res = 0;
294
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800295 mutex_lock(&inode->i_mutex);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400296 pipe = RPC_I(inode)->pipe;
297 if (pipe == NULL) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700298 res = -EPIPE;
299 goto out_unlock;
300 }
301 msg = filp->private_data;
302 if (msg == NULL) {
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300303 spin_lock(&pipe->lock);
304 if (!list_empty(&pipe->pipe)) {
305 msg = list_entry(pipe->pipe.next,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700306 struct rpc_pipe_msg,
307 list);
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300308 list_move(&msg->list, &pipe->in_upcall);
309 pipe->pipelen -= msg->len;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700310 filp->private_data = msg;
311 msg->copied = 0;
312 }
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300313 spin_unlock(&pipe->lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700314 if (msg == NULL)
315 goto out_unlock;
316 }
317 /* NOTE: it is up to the callback to update msg->copied */
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300318 res = pipe->ops->upcall(filp, msg, buf, len);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700319 if (res < 0 || msg->len == msg->copied) {
320 filp->private_data = NULL;
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300321 spin_lock(&pipe->lock);
Trond Myklebust5a676572010-09-12 19:55:25 -0400322 list_del_init(&msg->list);
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300323 spin_unlock(&pipe->lock);
324 pipe->ops->destroy_msg(msg);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700325 }
326out_unlock:
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800327 mutex_unlock(&inode->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700328 return res;
329}
330
331static ssize_t
332rpc_pipe_write(struct file *filp, const char __user *buf, size_t len, loff_t *offset)
333{
Al Viro496ad9a2013-01-23 17:07:38 -0500334 struct inode *inode = file_inode(filp);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700335 int res;
336
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800337 mutex_lock(&inode->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700338 res = -EPIPE;
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400339 if (RPC_I(inode)->pipe != NULL)
340 res = RPC_I(inode)->pipe->ops->downcall(filp, buf, len);
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800341 mutex_unlock(&inode->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700342 return res;
343}
344
345static unsigned int
346rpc_pipe_poll(struct file *filp, struct poll_table_struct *wait)
347{
Al Viro496ad9a2013-01-23 17:07:38 -0500348 struct inode *inode = file_inode(filp);
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400349 struct rpc_inode *rpci = RPC_I(inode);
350 unsigned int mask = POLLOUT | POLLWRNORM;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700351
Linus Torvalds1da177e2005-04-16 15:20:36 -0700352 poll_wait(filp, &rpci->waitq, wait);
353
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400354 mutex_lock(&inode->i_mutex);
355 if (rpci->pipe == NULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700356 mask |= POLLERR | POLLHUP;
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400357 else if (filp->private_data || !list_empty(&rpci->pipe->pipe))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700358 mask |= POLLIN | POLLRDNORM;
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400359 mutex_unlock(&inode->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700360 return mask;
361}
362
Arnd Bergmanna6f8dbc2010-10-04 21:18:23 +0200363static long
364rpc_pipe_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700365{
Al Viro496ad9a2013-01-23 17:07:38 -0500366 struct inode *inode = file_inode(filp);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400367 struct rpc_pipe *pipe;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700368 int len;
369
370 switch (cmd) {
371 case FIONREAD:
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400372 mutex_lock(&inode->i_mutex);
373 pipe = RPC_I(inode)->pipe;
374 if (pipe == NULL) {
375 mutex_unlock(&inode->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700376 return -EPIPE;
Arnd Bergmanna6f8dbc2010-10-04 21:18:23 +0200377 }
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400378 spin_lock(&pipe->lock);
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300379 len = pipe->pipelen;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700380 if (filp->private_data) {
381 struct rpc_pipe_msg *msg;
Joe Perches655b5bb2010-09-04 18:52:53 -0700382 msg = filp->private_data;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700383 len += msg->len - msg->copied;
384 }
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300385 spin_unlock(&pipe->lock);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400386 mutex_unlock(&inode->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700387 return put_user(len, (int __user *)arg);
388 default:
389 return -EINVAL;
390 }
391}
392
Arjan van de Venda7071d2007-02-12 00:55:36 -0800393static const struct file_operations rpc_pipe_fops = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700394 .owner = THIS_MODULE,
395 .llseek = no_llseek,
396 .read = rpc_pipe_read,
397 .write = rpc_pipe_write,
398 .poll = rpc_pipe_poll,
Frederic Weisbecker674b6042010-05-19 15:08:17 +0200399 .unlocked_ioctl = rpc_pipe_ioctl,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700400 .open = rpc_pipe_open,
401 .release = rpc_pipe_release,
402};
403
404static int
405rpc_show_info(struct seq_file *m, void *v)
406{
407 struct rpc_clnt *clnt = m->private;
408
Trond Myklebust2446ab62012-03-01 17:00:56 -0500409 rcu_read_lock();
Trond Myklebust4e0038b2012-03-01 17:01:05 -0500410 seq_printf(m, "RPC server: %s\n",
411 rcu_dereference(clnt->cl_xprt)->servername);
Trond Myklebust55909f22013-08-23 11:48:15 -0400412 seq_printf(m, "service: %s (%d) version %d\n", clnt->cl_program->name,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700413 clnt->cl_prog, clnt->cl_vers);
Chuck Levere7f78652006-08-22 20:06:19 -0400414 seq_printf(m, "address: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_ADDR));
415 seq_printf(m, "protocol: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_PROTO));
J. Bruce Fieldsbf19aac2007-09-26 14:38:09 -0400416 seq_printf(m, "port: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_PORT));
Trond Myklebust2446ab62012-03-01 17:00:56 -0500417 rcu_read_unlock();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700418 return 0;
419}
420
421static int
422rpc_info_open(struct inode *inode, struct file *file)
423{
Trond Myklebust006abe82010-09-12 19:55:25 -0400424 struct rpc_clnt *clnt = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700425 int ret = single_open(file, rpc_show_info, NULL);
426
427 if (!ret) {
428 struct seq_file *m = file->private_data;
Trond Myklebust006abe82010-09-12 19:55:25 -0400429
430 spin_lock(&file->f_path.dentry->d_lock);
431 if (!d_unhashed(file->f_path.dentry))
432 clnt = RPC_I(inode)->private;
433 if (clnt != NULL && atomic_inc_not_zero(&clnt->cl_count)) {
434 spin_unlock(&file->f_path.dentry->d_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700435 m->private = clnt;
436 } else {
Trond Myklebust006abe82010-09-12 19:55:25 -0400437 spin_unlock(&file->f_path.dentry->d_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700438 single_release(inode, file);
439 ret = -EINVAL;
440 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700441 }
442 return ret;
443}
444
445static int
446rpc_info_release(struct inode *inode, struct file *file)
447{
448 struct seq_file *m = file->private_data;
449 struct rpc_clnt *clnt = (struct rpc_clnt *)m->private;
450
451 if (clnt)
452 rpc_release_client(clnt);
453 return single_release(inode, file);
454}
455
Arjan van de Venda7071d2007-02-12 00:55:36 -0800456static const struct file_operations rpc_info_operations = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700457 .owner = THIS_MODULE,
458 .open = rpc_info_open,
459 .read = seq_read,
460 .llseek = seq_lseek,
461 .release = rpc_info_release,
462};
463
464
465/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700466 * Description of fs contents.
467 */
468struct rpc_filelist {
Trond Myklebustac6fece2009-08-09 15:14:20 -0400469 const char *name;
Arjan van de Ven99ac48f2006-03-28 01:56:41 -0800470 const struct file_operations *i_fop;
Trond Myklebust7364af62009-08-09 15:14:16 -0400471 umode_t mode;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700472};
473
Nick Pigginfe15ce42011-01-07 17:49:23 +1100474static int rpc_delete_dentry(const struct dentry *dentry)
Trond Myklebust62e17612007-06-08 14:14:46 -0400475{
476 return 1;
477}
478
Al Viro3ba13d12009-02-20 06:02:22 +0000479static const struct dentry_operations rpc_dentry_operations = {
Trond Myklebust62e17612007-06-08 14:14:46 -0400480 .d_delete = rpc_delete_dentry,
481};
482
Linus Torvalds1da177e2005-04-16 15:20:36 -0700483static struct inode *
Trond Myklebust7364af62009-08-09 15:14:16 -0400484rpc_get_inode(struct super_block *sb, umode_t mode)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700485{
486 struct inode *inode = new_inode(sb);
487 if (!inode)
488 return NULL;
Christoph Hellwig85fe4022010-10-23 11:19:54 -0400489 inode->i_ino = get_next_ino();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700490 inode->i_mode = mode;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700491 inode->i_atime = inode->i_mtime = inode->i_ctime = CURRENT_TIME;
Joe Perches89f0e4f2011-07-01 09:43:12 +0000492 switch (mode & S_IFMT) {
493 case S_IFDIR:
494 inode->i_fop = &simple_dir_operations;
Jeff Layton275448e2013-07-16 09:16:45 -0400495 inode->i_op = &simple_dir_inode_operations;
Joe Perches89f0e4f2011-07-01 09:43:12 +0000496 inc_nlink(inode);
497 default:
498 break;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700499 }
500 return inode;
501}
502
Trond Myklebust75898062009-08-09 15:14:17 -0400503static int __rpc_create_common(struct inode *dir, struct dentry *dentry,
504 umode_t mode,
505 const struct file_operations *i_fop,
506 void *private)
507{
508 struct inode *inode;
509
Trond Myklebustbeb0f0a2010-12-20 21:19:26 +0000510 d_drop(dentry);
Trond Myklebust75898062009-08-09 15:14:17 -0400511 inode = rpc_get_inode(dir->i_sb, mode);
512 if (!inode)
513 goto out_err;
514 inode->i_ino = iunique(dir->i_sb, 100);
515 if (i_fop)
516 inode->i_fop = i_fop;
517 if (private)
518 rpc_inode_setowner(inode, private);
519 d_add(dentry, inode);
520 return 0;
521out_err:
522 printk(KERN_WARNING "%s: %s failed to allocate inode for dentry %s\n",
523 __FILE__, __func__, dentry->d_name.name);
524 dput(dentry);
525 return -ENOMEM;
526}
527
Trond Myklebustac6fece2009-08-09 15:14:20 -0400528static int __rpc_create(struct inode *dir, struct dentry *dentry,
529 umode_t mode,
530 const struct file_operations *i_fop,
531 void *private)
532{
533 int err;
534
535 err = __rpc_create_common(dir, dentry, S_IFREG | mode, i_fop, private);
536 if (err)
537 return err;
538 fsnotify_create(dir, dentry);
539 return 0;
540}
541
Trond Myklebust75898062009-08-09 15:14:17 -0400542static int __rpc_mkdir(struct inode *dir, struct dentry *dentry,
543 umode_t mode,
544 const struct file_operations *i_fop,
545 void *private)
546{
547 int err;
548
549 err = __rpc_create_common(dir, dentry, S_IFDIR | mode, i_fop, private);
550 if (err)
551 return err;
552 inc_nlink(dir);
553 fsnotify_mkdir(dir, dentry);
554 return 0;
555}
556
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300557static void
558init_pipe(struct rpc_pipe *pipe)
559{
560 pipe->nreaders = 0;
561 pipe->nwriters = 0;
562 INIT_LIST_HEAD(&pipe->in_upcall);
563 INIT_LIST_HEAD(&pipe->in_downcall);
564 INIT_LIST_HEAD(&pipe->pipe);
565 pipe->pipelen = 0;
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300566 INIT_DELAYED_WORK(&pipe->queue_timeout,
567 rpc_timeout_upcall_queue);
568 pipe->ops = NULL;
569 spin_lock_init(&pipe->lock);
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300570 pipe->dentry = NULL;
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300571}
572
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300573void rpc_destroy_pipe_data(struct rpc_pipe *pipe)
574{
575 kfree(pipe);
576}
577EXPORT_SYMBOL_GPL(rpc_destroy_pipe_data);
578
579struct rpc_pipe *rpc_mkpipe_data(const struct rpc_pipe_ops *ops, int flags)
Trond Myklebust75898062009-08-09 15:14:17 -0400580{
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300581 struct rpc_pipe *pipe;
Trond Myklebust75898062009-08-09 15:14:17 -0400582
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300583 pipe = kzalloc(sizeof(struct rpc_pipe), GFP_KERNEL);
584 if (!pipe)
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300585 return ERR_PTR(-ENOMEM);
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300586 init_pipe(pipe);
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300587 pipe->ops = ops;
588 pipe->flags = flags;
589 return pipe;
590}
591EXPORT_SYMBOL_GPL(rpc_mkpipe_data);
592
593static int __rpc_mkpipe_dentry(struct inode *dir, struct dentry *dentry,
594 umode_t mode,
595 const struct file_operations *i_fop,
596 void *private,
597 struct rpc_pipe *pipe)
Trond Myklebust75898062009-08-09 15:14:17 -0400598{
599 struct rpc_inode *rpci;
600 int err;
601
602 err = __rpc_create_common(dir, dentry, S_IFIFO | mode, i_fop, private);
603 if (err)
604 return err;
605 rpci = RPC_I(dentry->d_inode);
Trond Myklebust75898062009-08-09 15:14:17 -0400606 rpci->private = private;
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300607 rpci->pipe = pipe;
Trond Myklebust75898062009-08-09 15:14:17 -0400608 fsnotify_create(dir, dentry);
609 return 0;
610}
611
Trond Myklebustac6fece2009-08-09 15:14:20 -0400612static int __rpc_rmdir(struct inode *dir, struct dentry *dentry)
613{
614 int ret;
615
616 dget(dentry);
617 ret = simple_rmdir(dir, dentry);
618 d_delete(dentry);
619 dput(dentry);
620 return ret;
621}
622
Stanislav Kinsburskyeee173252012-01-10 16:13:19 +0400623int rpc_rmdir(struct dentry *dentry)
624{
625 struct dentry *parent;
626 struct inode *dir;
627 int error;
628
629 parent = dget_parent(dentry);
630 dir = parent->d_inode;
631 mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT);
632 error = __rpc_rmdir(dir, dentry);
633 mutex_unlock(&dir->i_mutex);
634 dput(parent);
635 return error;
636}
637EXPORT_SYMBOL_GPL(rpc_rmdir);
638
Trond Myklebust810d90b2009-08-09 15:14:18 -0400639static int __rpc_unlink(struct inode *dir, struct dentry *dentry)
640{
641 int ret;
642
643 dget(dentry);
644 ret = simple_unlink(dir, dentry);
645 d_delete(dentry);
646 dput(dentry);
647 return ret;
648}
649
650static int __rpc_rmpipe(struct inode *dir, struct dentry *dentry)
651{
652 struct inode *inode = dentry->d_inode;
Trond Myklebust810d90b2009-08-09 15:14:18 -0400653
Trond Myklebust810d90b2009-08-09 15:14:18 -0400654 rpc_close_pipes(inode);
655 return __rpc_unlink(dir, dentry);
656}
657
Trond Myklebustcfeaa4a2009-08-09 15:14:20 -0400658static struct dentry *__rpc_lookup_create_exclusive(struct dentry *parent,
Al Virod3db90b2013-07-14 17:09:57 +0400659 const char *name)
Trond Myklebustcfeaa4a2009-08-09 15:14:20 -0400660{
Al Virod3db90b2013-07-14 17:09:57 +0400661 struct qstr q = QSTR_INIT(name, strlen(name));
662 struct dentry *dentry = d_hash_and_lookup(parent, &q);
Stanislav Kinsbursky5bff0382011-11-08 15:09:19 +0300663 if (!dentry) {
Al Virod3db90b2013-07-14 17:09:57 +0400664 dentry = d_alloc(parent, &q);
Stanislav Kinsbursky5bff0382011-11-08 15:09:19 +0300665 if (!dentry)
666 return ERR_PTR(-ENOMEM);
667 }
Jeff Layton76fa6662013-07-02 13:00:52 -0400668 if (dentry->d_inode == NULL)
Dan Carpenterf1f0abe12010-03-21 12:10:34 -0400669 return dentry;
Trond Myklebustcfeaa4a2009-08-09 15:14:20 -0400670 dput(dentry);
671 return ERR_PTR(-EEXIST);
672}
673
Linus Torvalds1da177e2005-04-16 15:20:36 -0700674/*
675 * FIXME: This probably has races.
676 */
Trond Myklebustac6fece2009-08-09 15:14:20 -0400677static void __rpc_depopulate(struct dentry *parent,
678 const struct rpc_filelist *files,
679 int start, int eof)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700680{
681 struct inode *dir = parent->d_inode;
Trond Myklebustac6fece2009-08-09 15:14:20 -0400682 struct dentry *dentry;
683 struct qstr name;
684 int i;
685
686 for (i = start; i < eof; i++) {
687 name.name = files[i].name;
688 name.len = strlen(files[i].name);
Al Virod3db90b2013-07-14 17:09:57 +0400689 dentry = d_hash_and_lookup(parent, &name);
Trond Myklebustac6fece2009-08-09 15:14:20 -0400690
691 if (dentry == NULL)
692 continue;
693 if (dentry->d_inode == NULL)
694 goto next;
695 switch (dentry->d_inode->i_mode & S_IFMT) {
696 default:
697 BUG();
698 case S_IFREG:
699 __rpc_unlink(dir, dentry);
700 break;
701 case S_IFDIR:
702 __rpc_rmdir(dir, dentry);
703 }
704next:
705 dput(dentry);
706 }
707}
708
709static void rpc_depopulate(struct dentry *parent,
710 const struct rpc_filelist *files,
711 int start, int eof)
712{
713 struct inode *dir = parent->d_inode;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700714
Arjan van de Venc6573c22006-07-03 00:25:16 -0700715 mutex_lock_nested(&dir->i_mutex, I_MUTEX_CHILD);
Trond Myklebustac6fece2009-08-09 15:14:20 -0400716 __rpc_depopulate(parent, files, start, eof);
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800717 mutex_unlock(&dir->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700718}
719
Trond Myklebustac6fece2009-08-09 15:14:20 -0400720static int rpc_populate(struct dentry *parent,
721 const struct rpc_filelist *files,
722 int start, int eof,
723 void *private)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700724{
Trond Myklebustac6fece2009-08-09 15:14:20 -0400725 struct inode *dir = parent->d_inode;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700726 struct dentry *dentry;
Trond Myklebustac6fece2009-08-09 15:14:20 -0400727 int i, err;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700728
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800729 mutex_lock(&dir->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700730 for (i = start; i < eof; i++) {
Al Virod3db90b2013-07-14 17:09:57 +0400731 dentry = __rpc_lookup_create_exclusive(parent, files[i].name);
Trond Myklebustac6fece2009-08-09 15:14:20 -0400732 err = PTR_ERR(dentry);
733 if (IS_ERR(dentry))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700734 goto out_bad;
Trond Myklebustac6fece2009-08-09 15:14:20 -0400735 switch (files[i].mode & S_IFMT) {
736 default:
737 BUG();
738 case S_IFREG:
739 err = __rpc_create(dir, dentry,
740 files[i].mode,
741 files[i].i_fop,
742 private);
743 break;
744 case S_IFDIR:
745 err = __rpc_mkdir(dir, dentry,
746 files[i].mode,
747 NULL,
748 private);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700749 }
Trond Myklebustac6fece2009-08-09 15:14:20 -0400750 if (err != 0)
751 goto out_bad;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700752 }
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800753 mutex_unlock(&dir->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700754 return 0;
755out_bad:
Trond Myklebustac6fece2009-08-09 15:14:20 -0400756 __rpc_depopulate(parent, files, start, eof);
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800757 mutex_unlock(&dir->i_mutex);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700758 printk(KERN_WARNING "%s: %s failed to populate directory %s\n",
Harvey Harrison0dc47872008-03-05 20:47:47 -0800759 __FILE__, __func__, parent->d_name.name);
Trond Myklebustac6fece2009-08-09 15:14:20 -0400760 return err;
Trond Myklebustf1345852005-09-23 11:08:25 -0400761}
Christoph Hellwig278c9952005-07-24 23:53:01 +0100762
Trond Myklebuste57aed72009-08-09 15:14:26 -0400763static struct dentry *rpc_mkdir_populate(struct dentry *parent,
Al Viroa95e6912013-07-14 16:43:54 +0400764 const char *name, umode_t mode, void *private,
Trond Myklebuste57aed72009-08-09 15:14:26 -0400765 int (*populate)(struct dentry *, void *), void *args_populate)
Trond Myklebustf1345852005-09-23 11:08:25 -0400766{
Trond Myklebustf1345852005-09-23 11:08:25 -0400767 struct dentry *dentry;
Trond Myklebust7d59d1e2009-08-09 15:14:23 -0400768 struct inode *dir = parent->d_inode;
Trond Myklebustf1345852005-09-23 11:08:25 -0400769 int error;
770
Trond Myklebust7d59d1e2009-08-09 15:14:23 -0400771 mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT);
772 dentry = __rpc_lookup_create_exclusive(parent, name);
Trond Myklebustf1345852005-09-23 11:08:25 -0400773 if (IS_ERR(dentry))
Trond Myklebust7d59d1e2009-08-09 15:14:23 -0400774 goto out;
775 error = __rpc_mkdir(dir, dentry, mode, NULL, private);
Trond Myklebust75898062009-08-09 15:14:17 -0400776 if (error != 0)
777 goto out_err;
Trond Myklebuste57aed72009-08-09 15:14:26 -0400778 if (populate != NULL) {
779 error = populate(dentry, args_populate);
780 if (error)
781 goto err_rmdir;
782 }
Trond Myklebustf1345852005-09-23 11:08:25 -0400783out:
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800784 mutex_unlock(&dir->i_mutex);
Trond Myklebust5c3e9852006-07-29 17:37:40 -0400785 return dentry;
Trond Myklebustac6fece2009-08-09 15:14:20 -0400786err_rmdir:
Trond Myklebustf1345852005-09-23 11:08:25 -0400787 __rpc_rmdir(dir, dentry);
Trond Myklebust75898062009-08-09 15:14:17 -0400788out_err:
Trond Myklebustf1345852005-09-23 11:08:25 -0400789 dentry = ERR_PTR(error);
790 goto out;
791}
792
Trond Myklebuste57aed72009-08-09 15:14:26 -0400793static int rpc_rmdir_depopulate(struct dentry *dentry,
794 void (*depopulate)(struct dentry *))
Trond Myklebustf1345852005-09-23 11:08:25 -0400795{
Trond Myklebustdff02cc2006-07-31 14:17:18 -0700796 struct dentry *parent;
Trond Myklebustf1345852005-09-23 11:08:25 -0400797 struct inode *dir;
798 int error;
799
Trond Myklebustdff02cc2006-07-31 14:17:18 -0700800 parent = dget_parent(dentry);
801 dir = parent->d_inode;
Arjan van de Venc6573c22006-07-03 00:25:16 -0700802 mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT);
Trond Myklebuste57aed72009-08-09 15:14:26 -0400803 if (depopulate != NULL)
804 depopulate(dentry);
Trond Myklebustf1345852005-09-23 11:08:25 -0400805 error = __rpc_rmdir(dir, dentry);
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800806 mutex_unlock(&dir->i_mutex);
Trond Myklebustdff02cc2006-07-31 14:17:18 -0700807 dput(parent);
Trond Myklebustf1345852005-09-23 11:08:25 -0400808 return error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700809}
810
J. Bruce Fields93a44a72007-11-06 13:06:03 -0500811/**
812 * rpc_mkpipe - make an rpc_pipefs file for kernel<->userspace communication
813 * @parent: dentry of directory to create new "pipe" in
814 * @name: name of pipe
815 * @private: private data to associate with the pipe, for the caller's use
Randy Dunlapbda14602012-05-13 10:35:40 -0700816 * @pipe: &rpc_pipe containing input parameters
J. Bruce Fields93a44a72007-11-06 13:06:03 -0500817 *
818 * Data is made available for userspace to read by calls to
819 * rpc_queue_upcall(). The actual reads will result in calls to
820 * @ops->upcall, which will be called with the file pointer,
821 * message, and userspace buffer to copy to.
822 *
823 * Writes can come at any time, and do not necessarily have to be
824 * responses to upcalls. They will result in calls to @msg->downcall.
825 *
826 * The @private argument passed here will be available to all these methods
Al Viro496ad9a2013-01-23 17:07:38 -0500827 * from the file pointer, via RPC_I(file_inode(file))->private.
J. Bruce Fields93a44a72007-11-06 13:06:03 -0500828 */
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300829struct dentry *rpc_mkpipe_dentry(struct dentry *parent, const char *name,
830 void *private, struct rpc_pipe *pipe)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700831{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700832 struct dentry *dentry;
Trond Myklebust75898062009-08-09 15:14:17 -0400833 struct inode *dir = parent->d_inode;
Trond Myklebust7364af62009-08-09 15:14:16 -0400834 umode_t umode = S_IFIFO | S_IRUSR | S_IWUSR;
Trond Myklebust75898062009-08-09 15:14:17 -0400835 int err;
Trond Myklebust7364af62009-08-09 15:14:16 -0400836
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300837 if (pipe->ops->upcall == NULL)
Trond Myklebust7364af62009-08-09 15:14:16 -0400838 umode &= ~S_IRUGO;
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300839 if (pipe->ops->downcall == NULL)
Trond Myklebust7364af62009-08-09 15:14:16 -0400840 umode &= ~S_IWUGO;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700841
Trond Myklebustcfeaa4a2009-08-09 15:14:20 -0400842 mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT);
Al Virod3db90b2013-07-14 17:09:57 +0400843 dentry = __rpc_lookup_create_exclusive(parent, name);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700844 if (IS_ERR(dentry))
Trond Myklebustcfeaa4a2009-08-09 15:14:20 -0400845 goto out;
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300846 err = __rpc_mkpipe_dentry(dir, dentry, umode, &rpc_pipe_fops,
847 private, pipe);
Trond Myklebust75898062009-08-09 15:14:17 -0400848 if (err)
849 goto out_err;
Trond Myklebustf1345852005-09-23 11:08:25 -0400850out:
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800851 mutex_unlock(&dir->i_mutex);
Trond Myklebust5c3e9852006-07-29 17:37:40 -0400852 return dentry;
Trond Myklebust75898062009-08-09 15:14:17 -0400853out_err:
854 dentry = ERR_PTR(err);
Trond Myklebust158998b2006-08-24 01:03:17 -0400855 printk(KERN_WARNING "%s: %s() failed to create pipe %s/%s (errno = %d)\n",
Harvey Harrison0dc47872008-03-05 20:47:47 -0800856 __FILE__, __func__, parent->d_name.name, name,
Trond Myklebust75898062009-08-09 15:14:17 -0400857 err);
Trond Myklebustf1345852005-09-23 11:08:25 -0400858 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700859}
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300860EXPORT_SYMBOL_GPL(rpc_mkpipe_dentry);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700861
J. Bruce Fields93a44a72007-11-06 13:06:03 -0500862/**
863 * rpc_unlink - remove a pipe
864 * @dentry: dentry for the pipe, as returned from rpc_mkpipe
865 *
866 * After this call, lookups will no longer find the pipe, and any
867 * attempts to read or write using preexisting opens of the pipe will
868 * return -EPIPE.
869 */
Trond Myklebustf1345852005-09-23 11:08:25 -0400870int
Trond Myklebust5d674762006-07-31 14:11:48 -0700871rpc_unlink(struct dentry *dentry)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700872{
Trond Myklebust5d674762006-07-31 14:11:48 -0700873 struct dentry *parent;
Trond Myklebustf1345852005-09-23 11:08:25 -0400874 struct inode *dir;
Trond Myklebust5d674762006-07-31 14:11:48 -0700875 int error = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700876
Trond Myklebust5d674762006-07-31 14:11:48 -0700877 parent = dget_parent(dentry);
878 dir = parent->d_inode;
Arjan van de Venc6573c22006-07-03 00:25:16 -0700879 mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT);
Trond Myklebust810d90b2009-08-09 15:14:18 -0400880 error = __rpc_rmpipe(dir, dentry);
Jes Sorensen1b1dcc12006-01-09 15:59:24 -0800881 mutex_unlock(&dir->i_mutex);
Trond Myklebust5d674762006-07-31 14:11:48 -0700882 dput(parent);
Trond Myklebustf1345852005-09-23 11:08:25 -0400883 return error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700884}
Trond Myklebust468039e2008-12-23 15:21:31 -0500885EXPORT_SYMBOL_GPL(rpc_unlink);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700886
Trond Myklebuste57aed72009-08-09 15:14:26 -0400887enum {
888 RPCAUTH_info,
889 RPCAUTH_EOF
890};
891
892static const struct rpc_filelist authfiles[] = {
893 [RPCAUTH_info] = {
894 .name = "info",
895 .i_fop = &rpc_info_operations,
896 .mode = S_IFREG | S_IRUSR,
897 },
898};
899
900static int rpc_clntdir_populate(struct dentry *dentry, void *private)
901{
902 return rpc_populate(dentry,
903 authfiles, RPCAUTH_info, RPCAUTH_EOF,
904 private);
905}
906
907static void rpc_clntdir_depopulate(struct dentry *dentry)
908{
909 rpc_depopulate(dentry, authfiles, RPCAUTH_info, RPCAUTH_EOF);
910}
911
Trond Myklebust7d59d1e2009-08-09 15:14:23 -0400912/**
913 * rpc_create_client_dir - Create a new rpc_client directory in rpc_pipefs
Al Viroa95e6912013-07-14 16:43:54 +0400914 * @dentry: the parent of new directory
915 * @name: the name of new directory
Trond Myklebust7d59d1e2009-08-09 15:14:23 -0400916 * @rpc_client: rpc client to associate with this directory
917 *
918 * This creates a directory at the given @path associated with
919 * @rpc_clnt, which will contain a file named "info" with some basic
920 * information about the client, together with any "pipes" that may
921 * later be created using rpc_mkpipe().
922 */
Trond Myklebust23ac6582009-08-09 15:14:25 -0400923struct dentry *rpc_create_client_dir(struct dentry *dentry,
Al Viroa95e6912013-07-14 16:43:54 +0400924 const char *name,
Trond Myklebuste57aed72009-08-09 15:14:26 -0400925 struct rpc_clnt *rpc_client)
Trond Myklebust7d59d1e2009-08-09 15:14:23 -0400926{
Trond Myklebuste57aed72009-08-09 15:14:26 -0400927 return rpc_mkdir_populate(dentry, name, S_IRUGO | S_IXUGO, NULL,
928 rpc_clntdir_populate, rpc_client);
929}
930
931/**
932 * rpc_remove_client_dir - Remove a directory created with rpc_create_client_dir()
Randy Dunlapbda14602012-05-13 10:35:40 -0700933 * @dentry: dentry for the pipe
Trond Myklebuste57aed72009-08-09 15:14:26 -0400934 */
935int rpc_remove_client_dir(struct dentry *dentry)
936{
937 return rpc_rmdir_depopulate(dentry, rpc_clntdir_depopulate);
Trond Myklebust7d59d1e2009-08-09 15:14:23 -0400938}
939
Trond Myklebust8854e822009-08-09 15:14:30 -0400940static const struct rpc_filelist cache_pipefs_files[3] = {
941 [0] = {
942 .name = "channel",
943 .i_fop = &cache_file_operations_pipefs,
Trond Myklebust96c61cb2009-08-19 18:12:21 -0400944 .mode = S_IFREG|S_IRUSR|S_IWUSR,
Trond Myklebust8854e822009-08-09 15:14:30 -0400945 },
946 [1] = {
947 .name = "content",
948 .i_fop = &content_file_operations_pipefs,
949 .mode = S_IFREG|S_IRUSR,
950 },
951 [2] = {
952 .name = "flush",
953 .i_fop = &cache_flush_operations_pipefs,
954 .mode = S_IFREG|S_IRUSR|S_IWUSR,
955 },
956};
957
958static int rpc_cachedir_populate(struct dentry *dentry, void *private)
959{
960 return rpc_populate(dentry,
961 cache_pipefs_files, 0, 3,
962 private);
963}
964
965static void rpc_cachedir_depopulate(struct dentry *dentry)
966{
967 rpc_depopulate(dentry, cache_pipefs_files, 0, 3);
968}
969
Al Viroa95e6912013-07-14 16:43:54 +0400970struct dentry *rpc_create_cache_dir(struct dentry *parent, const char *name,
Al Viro64f14262011-07-25 00:35:13 -0400971 umode_t umode, struct cache_detail *cd)
Trond Myklebust8854e822009-08-09 15:14:30 -0400972{
973 return rpc_mkdir_populate(parent, name, umode, NULL,
974 rpc_cachedir_populate, cd);
975}
976
977void rpc_remove_cache_dir(struct dentry *dentry)
978{
979 rpc_rmdir_depopulate(dentry, rpc_cachedir_depopulate);
980}
981
Linus Torvalds1da177e2005-04-16 15:20:36 -0700982/*
983 * populate the filesystem
984 */
Alexey Dobriyanb87221d2009-09-21 17:01:09 -0700985static const struct super_operations s_ops = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700986 .alloc_inode = rpc_alloc_inode,
987 .destroy_inode = rpc_destroy_inode,
988 .statfs = simple_statfs,
989};
990
991#define RPCAUTH_GSSMAGIC 0x67596969
992
Trond Myklebustbb156742009-08-09 15:14:21 -0400993/*
994 * We have a single directory with 1 node in it.
995 */
996enum {
997 RPCAUTH_lockd,
998 RPCAUTH_mount,
999 RPCAUTH_nfs,
1000 RPCAUTH_portmap,
1001 RPCAUTH_statd,
1002 RPCAUTH_nfsd4_cb,
Trond Myklebuste571cbf2009-08-19 18:12:27 -04001003 RPCAUTH_cache,
Jeff Laytonb3537c32012-03-21 09:52:04 -04001004 RPCAUTH_nfsd,
Trond Myklebustbb156742009-08-09 15:14:21 -04001005 RPCAUTH_RootEOF
1006};
1007
1008static const struct rpc_filelist files[] = {
1009 [RPCAUTH_lockd] = {
1010 .name = "lockd",
1011 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1012 },
1013 [RPCAUTH_mount] = {
1014 .name = "mount",
1015 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1016 },
1017 [RPCAUTH_nfs] = {
1018 .name = "nfs",
1019 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1020 },
1021 [RPCAUTH_portmap] = {
1022 .name = "portmap",
1023 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1024 },
1025 [RPCAUTH_statd] = {
1026 .name = "statd",
1027 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1028 },
1029 [RPCAUTH_nfsd4_cb] = {
1030 .name = "nfsd4_cb",
1031 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1032 },
Trond Myklebuste571cbf2009-08-19 18:12:27 -04001033 [RPCAUTH_cache] = {
1034 .name = "cache",
1035 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1036 },
Jeff Laytonb3537c32012-03-21 09:52:04 -04001037 [RPCAUTH_nfsd] = {
1038 .name = "nfsd",
1039 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1040 },
Trond Myklebustbb156742009-08-09 15:14:21 -04001041};
1042
Stanislav Kinsbursky432eb1a2011-12-26 15:39:22 +03001043/*
1044 * This call can be used only in RPC pipefs mount notification hooks.
1045 */
1046struct dentry *rpc_d_lookup_sb(const struct super_block *sb,
1047 const unsigned char *dir_name)
1048{
Linus Torvalds26fe5752012-05-10 13:14:12 -07001049 struct qstr dir = QSTR_INIT(dir_name, strlen(dir_name));
Al Virod3db90b2013-07-14 17:09:57 +04001050 return d_hash_and_lookup(sb->s_root, &dir);
Stanislav Kinsbursky432eb1a2011-12-26 15:39:22 +03001051}
1052EXPORT_SYMBOL_GPL(rpc_d_lookup_sb);
1053
Stanislav Kinsburskyc21a5882011-12-26 15:39:39 +03001054void rpc_pipefs_init_net(struct net *net)
1055{
1056 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1057
1058 mutex_init(&sn->pipefs_sb_lock);
Trond Myklebustabfdbd52013-05-15 11:28:54 -07001059 sn->gssd_running = 1;
Trond Myklebust2aed8b42013-05-15 10:27:32 -07001060 sn->pipe_version = -1;
Stanislav Kinsburskyc21a5882011-12-26 15:39:39 +03001061}
1062
1063/*
1064 * This call will be used for per network namespace operations calls.
1065 * Note: Function will be returned with pipefs_sb_lock taken if superblock was
1066 * found. This lock have to be released by rpc_put_sb_net() when all operations
1067 * will be completed.
1068 */
1069struct super_block *rpc_get_sb_net(const struct net *net)
1070{
1071 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1072
1073 mutex_lock(&sn->pipefs_sb_lock);
1074 if (sn->pipefs_sb)
1075 return sn->pipefs_sb;
1076 mutex_unlock(&sn->pipefs_sb_lock);
1077 return NULL;
1078}
1079EXPORT_SYMBOL_GPL(rpc_get_sb_net);
1080
1081void rpc_put_sb_net(const struct net *net)
1082{
1083 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1084
Weston Andros Adamson749386e2012-10-23 10:43:37 -04001085 WARN_ON(sn->pipefs_sb == NULL);
Stanislav Kinsburskyc21a5882011-12-26 15:39:39 +03001086 mutex_unlock(&sn->pipefs_sb_lock);
1087}
1088EXPORT_SYMBOL_GPL(rpc_put_sb_net);
1089
Linus Torvalds1da177e2005-04-16 15:20:36 -07001090static int
1091rpc_fill_super(struct super_block *sb, void *data, int silent)
1092{
1093 struct inode *inode;
1094 struct dentry *root;
Stanislav Kinsbursky38b0da72011-12-26 15:38:56 +03001095 struct net *net = data;
Stanislav Kinsbursky90c4e822011-12-26 15:39:30 +03001096 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +03001097 int err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001098
1099 sb->s_blocksize = PAGE_CACHE_SIZE;
1100 sb->s_blocksize_bits = PAGE_CACHE_SHIFT;
1101 sb->s_magic = RPCAUTH_GSSMAGIC;
1102 sb->s_op = &s_ops;
Jeff Layton76fa6662013-07-02 13:00:52 -04001103 sb->s_d_op = &rpc_dentry_operations;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001104 sb->s_time_gran = 1;
1105
Jeff Layton7e450b42012-05-16 13:04:26 -04001106 inode = rpc_get_inode(sb, S_IFDIR | S_IRUGO | S_IXUGO);
Al Viro48fde702012-01-08 22:15:13 -05001107 sb->s_root = root = d_make_root(inode);
1108 if (!root)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001109 return -ENOMEM;
Trond Myklebustac6fece2009-08-09 15:14:20 -04001110 if (rpc_populate(root, files, RPCAUTH_lockd, RPCAUTH_RootEOF, NULL))
Al Virofc7bed82010-01-25 18:30:38 -05001111 return -ENOMEM;
Chuck Leverd8af9bc12012-09-14 17:23:34 -04001112 dprintk("RPC: sending pipefs MOUNT notification for net %p%s\n",
1113 net, NET_NAME(net));
Stanislav Kinsbursky38481602013-06-24 11:52:38 +04001114 mutex_lock(&sn->pipefs_sb_lock);
Stanislav Kinsbursky37629b52012-04-20 18:19:56 +04001115 sn->pipefs_sb = sb;
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +03001116 err = blocking_notifier_call_chain(&rpc_pipefs_notifier_list,
1117 RPC_PIPEFS_MOUNT,
1118 sb);
1119 if (err)
1120 goto err_depopulate;
Stanislav Kinsbursky021c68d2011-12-26 15:39:04 +03001121 sb->s_fs_info = get_net(net);
Stanislav Kinsbursky38481602013-06-24 11:52:38 +04001122 mutex_unlock(&sn->pipefs_sb_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001123 return 0;
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +03001124
1125err_depopulate:
1126 blocking_notifier_call_chain(&rpc_pipefs_notifier_list,
1127 RPC_PIPEFS_UMOUNT,
1128 sb);
Stanislav Kinsbursky37629b52012-04-20 18:19:56 +04001129 sn->pipefs_sb = NULL;
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +03001130 __rpc_depopulate(root, files, RPCAUTH_lockd, RPCAUTH_RootEOF);
Stanislav Kinsbursky38481602013-06-24 11:52:38 +04001131 mutex_unlock(&sn->pipefs_sb_lock);
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +03001132 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001133}
1134
Al Virofc14f2f2010-07-25 01:48:30 +04001135static struct dentry *
1136rpc_mount(struct file_system_type *fs_type,
1137 int flags, const char *dev_name, void *data)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001138{
Stanislav Kinsbursky38b0da72011-12-26 15:38:56 +03001139 return mount_ns(fs_type, flags, current->nsproxy->net_ns, rpc_fill_super);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001140}
1141
Trond Myklebust09acfea2012-03-11 15:22:54 -04001142static void rpc_kill_sb(struct super_block *sb)
Stanislav Kinsbursky021c68d2011-12-26 15:39:04 +03001143{
1144 struct net *net = sb->s_fs_info;
Stanislav Kinsbursky90c4e822011-12-26 15:39:30 +03001145 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
Stanislav Kinsbursky021c68d2011-12-26 15:39:04 +03001146
Stanislav Kinsburskyc21a5882011-12-26 15:39:39 +03001147 mutex_lock(&sn->pipefs_sb_lock);
Trond Myklebust642fe4d2012-11-08 10:01:26 -05001148 if (sn->pipefs_sb != sb) {
1149 mutex_unlock(&sn->pipefs_sb_lock);
1150 goto out;
1151 }
Stanislav Kinsbursky90c4e822011-12-26 15:39:30 +03001152 sn->pipefs_sb = NULL;
Chuck Leverd8af9bc12012-09-14 17:23:34 -04001153 dprintk("RPC: sending pipefs UMOUNT notification for net %p%s\n",
1154 net, NET_NAME(net));
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +03001155 blocking_notifier_call_chain(&rpc_pipefs_notifier_list,
1156 RPC_PIPEFS_UMOUNT,
1157 sb);
Stanislav Kinsburskyadb6fa72013-06-26 10:15:14 +04001158 mutex_unlock(&sn->pipefs_sb_lock);
Trond Myklebust642fe4d2012-11-08 10:01:26 -05001159 put_net(net);
1160out:
Stanislav Kinsbursky021c68d2011-12-26 15:39:04 +03001161 kill_litter_super(sb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001162}
1163
1164static struct file_system_type rpc_pipe_fs_type = {
1165 .owner = THIS_MODULE,
1166 .name = "rpc_pipefs",
Al Virofc14f2f2010-07-25 01:48:30 +04001167 .mount = rpc_mount,
Stanislav Kinsbursky021c68d2011-12-26 15:39:04 +03001168 .kill_sb = rpc_kill_sb,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001169};
Eric W. Biederman7f78e032013-03-02 19:39:14 -08001170MODULE_ALIAS_FS("rpc_pipefs");
Eric W. Biedermanfa7614dd2013-03-12 18:27:41 -07001171MODULE_ALIAS("rpc_pipefs");
Linus Torvalds1da177e2005-04-16 15:20:36 -07001172
1173static void
Alexey Dobriyan51cc5062008-07-25 19:45:34 -07001174init_once(void *foo)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001175{
1176 struct rpc_inode *rpci = (struct rpc_inode *) foo;
1177
Christoph Lametera35afb82007-05-16 22:10:57 -07001178 inode_init_once(&rpci->vfs_inode);
1179 rpci->private = NULL;
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +03001180 rpci->pipe = NULL;
Christoph Lametera35afb82007-05-16 22:10:57 -07001181 init_waitqueue_head(&rpci->waitq);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001182}
1183
1184int register_rpc_pipefs(void)
1185{
Akinobu Mita5bd5f582007-05-09 02:34:51 -07001186 int err;
1187
Linus Torvalds1da177e2005-04-16 15:20:36 -07001188 rpc_inode_cachep = kmem_cache_create("rpc_inode_cache",
Paul Jacksonfffb60f2006-03-24 03:16:06 -08001189 sizeof(struct rpc_inode),
1190 0, (SLAB_HWCACHE_ALIGN|SLAB_RECLAIM_ACCOUNT|
1191 SLAB_MEM_SPREAD),
Paul Mundt20c2df82007-07-20 10:11:58 +09001192 init_once);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001193 if (!rpc_inode_cachep)
1194 return -ENOMEM;
Stanislav Kinsbursky80df9d22012-01-11 19:18:17 +04001195 err = rpc_clients_notifier_register();
1196 if (err)
1197 goto err_notifier;
Akinobu Mita5bd5f582007-05-09 02:34:51 -07001198 err = register_filesystem(&rpc_pipe_fs_type);
Stanislav Kinsbursky80df9d22012-01-11 19:18:17 +04001199 if (err)
1200 goto err_register;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001201 return 0;
Stanislav Kinsbursky80df9d22012-01-11 19:18:17 +04001202
1203err_register:
1204 rpc_clients_notifier_unregister();
1205err_notifier:
1206 kmem_cache_destroy(rpc_inode_cachep);
1207 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001208}
1209
1210void unregister_rpc_pipefs(void)
1211{
Stanislav Kinsbursky80df9d22012-01-11 19:18:17 +04001212 rpc_clients_notifier_unregister();
Alexey Dobriyan1a1d92c2006-09-27 01:49:40 -07001213 kmem_cache_destroy(rpc_inode_cachep);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001214 unregister_filesystem(&rpc_pipe_fs_type);
1215}