blob: ee5336d73fddc5965753afef1f41ac6a153b30cb [file] [log] [blame]
Thomas Gleixner457c8992019-05-19 13:08:55 +01001// SPDX-License-Identifier: GPL-2.0-only
Linus Torvalds1da177e2005-04-16 15:20:36 -07002/*
3 * net/sunrpc/rpc_pipe.c
4 *
5 * Userland/kernel interface for rpcauth_gss.
6 * Code shamelessly plagiarized from fs/nfsd/nfsctl.c
Rolf Eike Beerd51fe1b2005-09-02 08:59:25 +02007 * and fs/sysfs/inode.c
Linus Torvalds1da177e2005-04-16 15:20:36 -07008 *
9 * Copyright (c) 2002, Trond Myklebust <trond.myklebust@fys.uio.no>
10 *
11 */
Linus Torvalds1da177e2005-04-16 15:20:36 -070012#include <linux/module.h>
13#include <linux/slab.h>
14#include <linux/string.h>
15#include <linux/pagemap.h>
16#include <linux/mount.h>
David Howellsb9662f32019-03-25 16:38:28 +000017#include <linux/fs_context.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070018#include <linux/namei.h>
Trond Myklebust50e437d2007-06-07 22:44:34 -040019#include <linux/fsnotify.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070020#include <linux/kernel.h>
Trond Myklebust2446ab62012-03-01 17:00:56 -050021#include <linux/rcupdate.h>
Jeff Laytone2f0c832013-12-05 07:34:44 -050022#include <linux/utsname.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070023
24#include <asm/ioctls.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070025#include <linux/poll.h>
26#include <linux/wait.h>
27#include <linux/seq_file.h>
28
29#include <linux/sunrpc/clnt.h>
30#include <linux/workqueue.h>
31#include <linux/sunrpc/rpc_pipe_fs.h>
Trond Myklebust8854e822009-08-09 15:14:30 -040032#include <linux/sunrpc/cache.h>
Stanislav Kinsbursky021c68d2011-12-26 15:39:04 +030033#include <linux/nsproxy.h>
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +030034#include <linux/notifier.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070035
Stanislav Kinsbursky021c68d2011-12-26 15:39:04 +030036#include "netns.h"
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +030037#include "sunrpc.h"
Linus Torvalds1da177e2005-04-16 15:20:36 -070038
Stanislav Kinsburskyefc46bf2011-12-26 15:39:47 +030039#define RPCDBG_FACILITY RPCDBG_DEBUG
40
41#define NET_NAME(net) ((net == &init_net) ? " (init_net)" : "")
Linus Torvalds1da177e2005-04-16 15:20:36 -070042
43static struct file_system_type rpc_pipe_fs_type;
Jeff Layton4b9a4452013-11-14 07:25:17 -050044static const struct rpc_pipe_ops gssd_dummy_pipe_ops;
Linus Torvalds1da177e2005-04-16 15:20:36 -070045
Christoph Lametere18b8902006-12-06 20:33:20 -080046static struct kmem_cache *rpc_inode_cachep __read_mostly;
Linus Torvalds1da177e2005-04-16 15:20:36 -070047
48#define RPC_UPCALL_TIMEOUT (30*HZ)
49
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +030050static BLOCKING_NOTIFIER_HEAD(rpc_pipefs_notifier_list);
51
52int rpc_pipefs_notifier_register(struct notifier_block *nb)
53{
Xiaoming Ni260a2672019-12-04 16:50:47 -080054 return blocking_notifier_chain_register(&rpc_pipefs_notifier_list, nb);
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +030055}
56EXPORT_SYMBOL_GPL(rpc_pipefs_notifier_register);
57
58void rpc_pipefs_notifier_unregister(struct notifier_block *nb)
59{
60 blocking_notifier_chain_unregister(&rpc_pipefs_notifier_list, nb);
61}
62EXPORT_SYMBOL_GPL(rpc_pipefs_notifier_unregister);
63
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +040064static void rpc_purge_list(wait_queue_head_t *waitq, struct list_head *head,
Trond Myklebust9842ef32006-02-01 12:18:44 -050065 void (*destroy_msg)(struct rpc_pipe_msg *), int err)
Trond Myklebustb3eb67a2005-11-25 17:10:11 -050066{
67 struct rpc_pipe_msg *msg;
Trond Myklebustb3eb67a2005-11-25 17:10:11 -050068
Trond Myklebust9842ef32006-02-01 12:18:44 -050069 if (list_empty(head))
70 return;
71 do {
Trond Myklebustb3eb67a2005-11-25 17:10:11 -050072 msg = list_entry(head->next, struct rpc_pipe_msg, list);
Trond Myklebust5a676572010-09-12 19:55:25 -040073 list_del_init(&msg->list);
Trond Myklebustb3eb67a2005-11-25 17:10:11 -050074 msg->errno = err;
75 destroy_msg(msg);
Trond Myklebust9842ef32006-02-01 12:18:44 -050076 } while (!list_empty(head));
Jeff Layton92123e02012-06-11 10:03:42 -040077
78 if (waitq)
79 wake_up(waitq);
Linus Torvalds1da177e2005-04-16 15:20:36 -070080}
81
82static void
David Howells65f27f32006-11-22 14:55:48 +000083rpc_timeout_upcall_queue(struct work_struct *work)
Linus Torvalds1da177e2005-04-16 15:20:36 -070084{
Trond Myklebust9842ef32006-02-01 12:18:44 -050085 LIST_HEAD(free_list);
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +030086 struct rpc_pipe *pipe =
87 container_of(work, struct rpc_pipe, queue_timeout.work);
Trond Myklebust9842ef32006-02-01 12:18:44 -050088 void (*destroy_msg)(struct rpc_pipe_msg *);
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +040089 struct dentry *dentry;
Linus Torvalds1da177e2005-04-16 15:20:36 -070090
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +030091 spin_lock(&pipe->lock);
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +030092 destroy_msg = pipe->ops->destroy_msg;
93 if (pipe->nreaders == 0) {
94 list_splice_init(&pipe->pipe, &free_list);
95 pipe->pipelen = 0;
Trond Myklebust9842ef32006-02-01 12:18:44 -050096 }
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +040097 dentry = dget(pipe->dentry);
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +030098 spin_unlock(&pipe->lock);
David Howellsc5ef6032015-03-17 22:26:16 +000099 rpc_purge_list(dentry ? &RPC_I(d_inode(dentry))->waitq : NULL,
Jeff Layton92123e02012-06-11 10:03:42 -0400100 &free_list, destroy_msg, -ETIMEDOUT);
101 dput(dentry);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700102}
103
Peng Taoc1225152011-09-22 21:50:10 -0400104ssize_t rpc_pipe_generic_upcall(struct file *filp, struct rpc_pipe_msg *msg,
105 char __user *dst, size_t buflen)
106{
107 char *data = (char *)msg->data + msg->copied;
108 size_t mlen = min(msg->len - msg->copied, buflen);
109 unsigned long left;
110
111 left = copy_to_user(dst, data, mlen);
112 if (left == mlen) {
113 msg->errno = -EFAULT;
114 return -EFAULT;
115 }
116
117 mlen -= left;
118 msg->copied += mlen;
119 msg->errno = 0;
120 return mlen;
121}
122EXPORT_SYMBOL_GPL(rpc_pipe_generic_upcall);
123
J. Bruce Fields93a44a72007-11-06 13:06:03 -0500124/**
Ben Hutchings1a5778a2010-02-14 22:35:47 -0800125 * rpc_queue_upcall - queue an upcall message to userspace
Randy Dunlapbda14602012-05-13 10:35:40 -0700126 * @pipe: upcall pipe on which to queue given message
J. Bruce Fields93a44a72007-11-06 13:06:03 -0500127 * @msg: message to queue
128 *
129 * Call with an @inode created by rpc_mkpipe() to queue an upcall.
130 * A userspace process may then later read the upcall by performing a
131 * read on an open file for this inode. It is up to the caller to
132 * initialize the fields of @msg (other than @msg->list) appropriately.
133 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700134int
Stanislav Kinsburskyd706ed12011-12-26 15:43:49 +0300135rpc_queue_upcall(struct rpc_pipe *pipe, struct rpc_pipe_msg *msg)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700136{
Trond Myklebust6070fe62005-10-27 22:12:46 -0400137 int res = -EPIPE;
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400138 struct dentry *dentry;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700139
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300140 spin_lock(&pipe->lock);
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300141 if (pipe->nreaders) {
142 list_add_tail(&msg->list, &pipe->pipe);
143 pipe->pipelen += msg->len;
Trond Myklebust6070fe62005-10-27 22:12:46 -0400144 res = 0;
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300145 } else if (pipe->flags & RPC_PIPE_WAIT_FOR_OPEN) {
146 if (list_empty(&pipe->pipe))
Trond Myklebust24c5d9d2006-03-20 13:44:08 -0500147 queue_delayed_work(rpciod_workqueue,
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300148 &pipe->queue_timeout,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700149 RPC_UPCALL_TIMEOUT);
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300150 list_add_tail(&msg->list, &pipe->pipe);
151 pipe->pipelen += msg->len;
Trond Myklebust6070fe62005-10-27 22:12:46 -0400152 res = 0;
153 }
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400154 dentry = dget(pipe->dentry);
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300155 spin_unlock(&pipe->lock);
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400156 if (dentry) {
David Howellsc5ef6032015-03-17 22:26:16 +0000157 wake_up(&RPC_I(d_inode(dentry))->waitq);
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400158 dput(dentry);
159 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700160 return res;
161}
Trond Myklebust468039e2008-12-23 15:21:31 -0500162EXPORT_SYMBOL_GPL(rpc_queue_upcall);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700163
Trond Myklebust6070fe62005-10-27 22:12:46 -0400164static inline void
165rpc_inode_setowner(struct inode *inode, void *private)
166{
167 RPC_I(inode)->private = private;
168}
169
Linus Torvalds1da177e2005-04-16 15:20:36 -0700170static void
171rpc_close_pipes(struct inode *inode)
172{
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300173 struct rpc_pipe *pipe = RPC_I(inode)->pipe;
\"J. Bruce Fields\e7128042008-12-23 16:09:47 -0500174 int need_release;
Stanislav Kinsburskyad6b1342012-01-10 16:12:38 +0400175 LIST_HEAD(free_list);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700176
Al Viro59551022016-01-22 15:40:57 -0500177 inode_lock(inode);
Stanislav Kinsburskyad6b1342012-01-10 16:12:38 +0400178 spin_lock(&pipe->lock);
179 need_release = pipe->nreaders != 0 || pipe->nwriters != 0;
180 pipe->nreaders = 0;
181 list_splice_init(&pipe->in_upcall, &free_list);
182 list_splice_init(&pipe->pipe, &free_list);
183 pipe->pipelen = 0;
184 pipe->dentry = NULL;
185 spin_unlock(&pipe->lock);
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400186 rpc_purge_list(&RPC_I(inode)->waitq, &free_list, pipe->ops->destroy_msg, -EPIPE);
Stanislav Kinsburskyad6b1342012-01-10 16:12:38 +0400187 pipe->nwriters = 0;
188 if (need_release && pipe->ops->release_pipe)
189 pipe->ops->release_pipe(inode);
190 cancel_delayed_work_sync(&pipe->queue_timeout);
Trond Myklebust6070fe62005-10-27 22:12:46 -0400191 rpc_inode_setowner(inode, NULL);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400192 RPC_I(inode)->pipe = NULL;
Al Viro59551022016-01-22 15:40:57 -0500193 inode_unlock(inode);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700194}
195
Linus Torvalds1da177e2005-04-16 15:20:36 -0700196static struct inode *
197rpc_alloc_inode(struct super_block *sb)
198{
199 struct rpc_inode *rpci;
Himangi Saraogiadcda652014-06-10 20:19:17 +0530200 rpci = kmem_cache_alloc(rpc_inode_cachep, GFP_KERNEL);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700201 if (!rpci)
202 return NULL;
203 return &rpci->vfs_inode;
204}
205
206static void
Al Virobef252f2019-04-15 22:32:27 -0400207rpc_free_inode(struct inode *inode)
Nick Pigginfa0d7e3d2011-01-07 17:49:49 +1100208{
Nick Pigginfa0d7e3d2011-01-07 17:49:49 +1100209 kmem_cache_free(rpc_inode_cachep, RPC_I(inode));
210}
211
Linus Torvalds1da177e2005-04-16 15:20:36 -0700212static int
213rpc_pipe_open(struct inode *inode, struct file *filp)
214{
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400215 struct rpc_pipe *pipe;
\"J. Bruce Fields\c3810602008-12-23 16:08:32 -0500216 int first_open;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700217 int res = -ENXIO;
218
Al Viro59551022016-01-22 15:40:57 -0500219 inode_lock(inode);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400220 pipe = RPC_I(inode)->pipe;
221 if (pipe == NULL)
\"J. Bruce Fields\c3810602008-12-23 16:08:32 -0500222 goto out;
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300223 first_open = pipe->nreaders == 0 && pipe->nwriters == 0;
224 if (first_open && pipe->ops->open_pipe) {
225 res = pipe->ops->open_pipe(inode);
\"J. Bruce Fields\c3810602008-12-23 16:08:32 -0500226 if (res)
227 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700228 }
\"J. Bruce Fields\c3810602008-12-23 16:08:32 -0500229 if (filp->f_mode & FMODE_READ)
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300230 pipe->nreaders++;
\"J. Bruce Fields\c3810602008-12-23 16:08:32 -0500231 if (filp->f_mode & FMODE_WRITE)
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300232 pipe->nwriters++;
\"J. Bruce Fields\c3810602008-12-23 16:08:32 -0500233 res = 0;
234out:
Al Viro59551022016-01-22 15:40:57 -0500235 inode_unlock(inode);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700236 return res;
237}
238
239static int
240rpc_pipe_release(struct inode *inode, struct file *filp)
241{
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400242 struct rpc_pipe *pipe;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700243 struct rpc_pipe_msg *msg;
\"J. Bruce Fields\e7128042008-12-23 16:09:47 -0500244 int last_close;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700245
Al Viro59551022016-01-22 15:40:57 -0500246 inode_lock(inode);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400247 pipe = RPC_I(inode)->pipe;
248 if (pipe == NULL)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700249 goto out;
Joe Perches655b5bb2010-09-04 18:52:53 -0700250 msg = filp->private_data;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700251 if (msg != NULL) {
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300252 spin_lock(&pipe->lock);
Trond Myklebust48e49182005-12-19 17:11:22 -0500253 msg->errno = -EAGAIN;
Trond Myklebust5a676572010-09-12 19:55:25 -0400254 list_del_init(&msg->list);
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300255 spin_unlock(&pipe->lock);
256 pipe->ops->destroy_msg(msg);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700257 }
258 if (filp->f_mode & FMODE_WRITE)
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300259 pipe->nwriters --;
Trond Myklebust9842ef32006-02-01 12:18:44 -0500260 if (filp->f_mode & FMODE_READ) {
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300261 pipe->nreaders --;
262 if (pipe->nreaders == 0) {
Trond Myklebust9842ef32006-02-01 12:18:44 -0500263 LIST_HEAD(free_list);
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300264 spin_lock(&pipe->lock);
265 list_splice_init(&pipe->pipe, &free_list);
266 pipe->pipelen = 0;
267 spin_unlock(&pipe->lock);
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400268 rpc_purge_list(&RPC_I(inode)->waitq, &free_list,
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300269 pipe->ops->destroy_msg, -EAGAIN);
Trond Myklebust9842ef32006-02-01 12:18:44 -0500270 }
271 }
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300272 last_close = pipe->nwriters == 0 && pipe->nreaders == 0;
273 if (last_close && pipe->ops->release_pipe)
274 pipe->ops->release_pipe(inode);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700275out:
Al Viro59551022016-01-22 15:40:57 -0500276 inode_unlock(inode);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700277 return 0;
278}
279
280static ssize_t
281rpc_pipe_read(struct file *filp, char __user *buf, size_t len, loff_t *offset)
282{
Al Viro496ad9a2013-01-23 17:07:38 -0500283 struct inode *inode = file_inode(filp);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400284 struct rpc_pipe *pipe;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700285 struct rpc_pipe_msg *msg;
286 int res = 0;
287
Al Viro59551022016-01-22 15:40:57 -0500288 inode_lock(inode);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400289 pipe = RPC_I(inode)->pipe;
290 if (pipe == NULL) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700291 res = -EPIPE;
292 goto out_unlock;
293 }
294 msg = filp->private_data;
295 if (msg == NULL) {
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300296 spin_lock(&pipe->lock);
297 if (!list_empty(&pipe->pipe)) {
298 msg = list_entry(pipe->pipe.next,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700299 struct rpc_pipe_msg,
300 list);
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300301 list_move(&msg->list, &pipe->in_upcall);
302 pipe->pipelen -= msg->len;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700303 filp->private_data = msg;
304 msg->copied = 0;
305 }
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300306 spin_unlock(&pipe->lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700307 if (msg == NULL)
308 goto out_unlock;
309 }
310 /* NOTE: it is up to the callback to update msg->copied */
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300311 res = pipe->ops->upcall(filp, msg, buf, len);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700312 if (res < 0 || msg->len == msg->copied) {
313 filp->private_data = NULL;
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300314 spin_lock(&pipe->lock);
Trond Myklebust5a676572010-09-12 19:55:25 -0400315 list_del_init(&msg->list);
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300316 spin_unlock(&pipe->lock);
317 pipe->ops->destroy_msg(msg);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700318 }
319out_unlock:
Al Viro59551022016-01-22 15:40:57 -0500320 inode_unlock(inode);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700321 return res;
322}
323
324static ssize_t
325rpc_pipe_write(struct file *filp, const char __user *buf, size_t len, loff_t *offset)
326{
Al Viro496ad9a2013-01-23 17:07:38 -0500327 struct inode *inode = file_inode(filp);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700328 int res;
329
Al Viro59551022016-01-22 15:40:57 -0500330 inode_lock(inode);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700331 res = -EPIPE;
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400332 if (RPC_I(inode)->pipe != NULL)
333 res = RPC_I(inode)->pipe->ops->downcall(filp, buf, len);
Al Viro59551022016-01-22 15:40:57 -0500334 inode_unlock(inode);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700335 return res;
336}
337
Al Viroade994f2017-07-03 00:01:49 -0400338static __poll_t
Linus Torvalds1da177e2005-04-16 15:20:36 -0700339rpc_pipe_poll(struct file *filp, struct poll_table_struct *wait)
340{
Al Viro496ad9a2013-01-23 17:07:38 -0500341 struct inode *inode = file_inode(filp);
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400342 struct rpc_inode *rpci = RPC_I(inode);
Linus Torvaldsa9a08842018-02-11 14:34:03 -0800343 __poll_t mask = EPOLLOUT | EPOLLWRNORM;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700344
Linus Torvalds1da177e2005-04-16 15:20:36 -0700345 poll_wait(filp, &rpci->waitq, wait);
346
Al Viro59551022016-01-22 15:40:57 -0500347 inode_lock(inode);
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400348 if (rpci->pipe == NULL)
Linus Torvaldsa9a08842018-02-11 14:34:03 -0800349 mask |= EPOLLERR | EPOLLHUP;
Stanislav Kinsbursky591ad7f2012-02-27 22:05:54 +0400350 else if (filp->private_data || !list_empty(&rpci->pipe->pipe))
Linus Torvaldsa9a08842018-02-11 14:34:03 -0800351 mask |= EPOLLIN | EPOLLRDNORM;
Al Viro59551022016-01-22 15:40:57 -0500352 inode_unlock(inode);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700353 return mask;
354}
355
Arnd Bergmanna6f8dbc2010-10-04 21:18:23 +0200356static long
357rpc_pipe_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700358{
Al Viro496ad9a2013-01-23 17:07:38 -0500359 struct inode *inode = file_inode(filp);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400360 struct rpc_pipe *pipe;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700361 int len;
362
363 switch (cmd) {
364 case FIONREAD:
Al Viro59551022016-01-22 15:40:57 -0500365 inode_lock(inode);
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400366 pipe = RPC_I(inode)->pipe;
367 if (pipe == NULL) {
Al Viro59551022016-01-22 15:40:57 -0500368 inode_unlock(inode);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700369 return -EPIPE;
Arnd Bergmanna6f8dbc2010-10-04 21:18:23 +0200370 }
Stanislav Kinsbursky2c9030e2012-02-27 22:05:45 +0400371 spin_lock(&pipe->lock);
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300372 len = pipe->pipelen;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700373 if (filp->private_data) {
374 struct rpc_pipe_msg *msg;
Joe Perches655b5bb2010-09-04 18:52:53 -0700375 msg = filp->private_data;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700376 len += msg->len - msg->copied;
377 }
Stanislav Kinsburskyd0fe13b2011-12-26 15:43:41 +0300378 spin_unlock(&pipe->lock);
Al Viro59551022016-01-22 15:40:57 -0500379 inode_unlock(inode);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700380 return put_user(len, (int __user *)arg);
381 default:
382 return -EINVAL;
383 }
384}
385
Arjan van de Venda7071d2007-02-12 00:55:36 -0800386static const struct file_operations rpc_pipe_fops = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700387 .owner = THIS_MODULE,
388 .llseek = no_llseek,
389 .read = rpc_pipe_read,
390 .write = rpc_pipe_write,
391 .poll = rpc_pipe_poll,
Frederic Weisbecker674b6042010-05-19 15:08:17 +0200392 .unlocked_ioctl = rpc_pipe_ioctl,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700393 .open = rpc_pipe_open,
394 .release = rpc_pipe_release,
395};
396
397static int
398rpc_show_info(struct seq_file *m, void *v)
399{
400 struct rpc_clnt *clnt = m->private;
401
Trond Myklebust2446ab62012-03-01 17:00:56 -0500402 rcu_read_lock();
Trond Myklebust4e0038b2012-03-01 17:01:05 -0500403 seq_printf(m, "RPC server: %s\n",
404 rcu_dereference(clnt->cl_xprt)->servername);
Trond Myklebust55909f22013-08-23 11:48:15 -0400405 seq_printf(m, "service: %s (%d) version %d\n", clnt->cl_program->name,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700406 clnt->cl_prog, clnt->cl_vers);
Chuck Levere7f78652006-08-22 20:06:19 -0400407 seq_printf(m, "address: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_ADDR));
408 seq_printf(m, "protocol: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_PROTO));
J. Bruce Fieldsbf19aac2007-09-26 14:38:09 -0400409 seq_printf(m, "port: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_PORT));
Trond Myklebust2446ab62012-03-01 17:00:56 -0500410 rcu_read_unlock();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700411 return 0;
412}
413
414static int
415rpc_info_open(struct inode *inode, struct file *file)
416{
Trond Myklebust006abe82010-09-12 19:55:25 -0400417 struct rpc_clnt *clnt = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700418 int ret = single_open(file, rpc_show_info, NULL);
419
420 if (!ret) {
421 struct seq_file *m = file->private_data;
Trond Myklebust006abe82010-09-12 19:55:25 -0400422
423 spin_lock(&file->f_path.dentry->d_lock);
424 if (!d_unhashed(file->f_path.dentry))
425 clnt = RPC_I(inode)->private;
Trond Myklebust71d3d0e2021-07-26 08:01:27 -0400426 if (clnt != NULL && refcount_inc_not_zero(&clnt->cl_count)) {
Trond Myklebust006abe82010-09-12 19:55:25 -0400427 spin_unlock(&file->f_path.dentry->d_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700428 m->private = clnt;
429 } else {
Trond Myklebust006abe82010-09-12 19:55:25 -0400430 spin_unlock(&file->f_path.dentry->d_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700431 single_release(inode, file);
432 ret = -EINVAL;
433 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700434 }
435 return ret;
436}
437
438static int
439rpc_info_release(struct inode *inode, struct file *file)
440{
441 struct seq_file *m = file->private_data;
442 struct rpc_clnt *clnt = (struct rpc_clnt *)m->private;
443
444 if (clnt)
445 rpc_release_client(clnt);
446 return single_release(inode, file);
447}
448
Arjan van de Venda7071d2007-02-12 00:55:36 -0800449static const struct file_operations rpc_info_operations = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700450 .owner = THIS_MODULE,
451 .open = rpc_info_open,
452 .read = seq_read,
453 .llseek = seq_lseek,
454 .release = rpc_info_release,
455};
456
457
458/*
Linus Torvalds1da177e2005-04-16 15:20:36 -0700459 * Description of fs contents.
460 */
461struct rpc_filelist {
Trond Myklebustac6fece2009-08-09 15:14:20 -0400462 const char *name;
Arjan van de Ven99ac48f2006-03-28 01:56:41 -0800463 const struct file_operations *i_fop;
Trond Myklebust7364af62009-08-09 15:14:16 -0400464 umode_t mode;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700465};
466
Linus Torvalds1da177e2005-04-16 15:20:36 -0700467static struct inode *
Trond Myklebust7364af62009-08-09 15:14:16 -0400468rpc_get_inode(struct super_block *sb, umode_t mode)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700469{
470 struct inode *inode = new_inode(sb);
471 if (!inode)
472 return NULL;
Christoph Hellwig85fe4022010-10-23 11:19:54 -0400473 inode->i_ino = get_next_ino();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700474 inode->i_mode = mode;
Deepa Dinamani078cd822016-09-14 07:48:04 -0700475 inode->i_atime = inode->i_mtime = inode->i_ctime = current_time(inode);
Joe Perches89f0e4f2011-07-01 09:43:12 +0000476 switch (mode & S_IFMT) {
477 case S_IFDIR:
478 inode->i_fop = &simple_dir_operations;
Jeff Layton275448e2013-07-16 09:16:45 -0400479 inode->i_op = &simple_dir_inode_operations;
Joe Perches89f0e4f2011-07-01 09:43:12 +0000480 inc_nlink(inode);
Gustavo A. R. Silva93f479d2020-11-20 12:40:02 -0600481 break;
Joe Perches89f0e4f2011-07-01 09:43:12 +0000482 default:
483 break;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700484 }
485 return inode;
486}
487
Trond Myklebust75898062009-08-09 15:14:17 -0400488static int __rpc_create_common(struct inode *dir, struct dentry *dentry,
489 umode_t mode,
490 const struct file_operations *i_fop,
491 void *private)
492{
493 struct inode *inode;
494
Trond Myklebustbeb0f0a2010-12-20 21:19:26 +0000495 d_drop(dentry);
Trond Myklebust75898062009-08-09 15:14:17 -0400496 inode = rpc_get_inode(dir->i_sb, mode);
497 if (!inode)
498 goto out_err;
499 inode->i_ino = iunique(dir->i_sb, 100);
500 if (i_fop)
501 inode->i_fop = i_fop;
502 if (private)
503 rpc_inode_setowner(inode, private);
504 d_add(dentry, inode);
505 return 0;
506out_err:
Al Viro1e903ed2013-09-16 10:57:41 -0400507 printk(KERN_WARNING "%s: %s failed to allocate inode for dentry %pd\n",
508 __FILE__, __func__, dentry);
Trond Myklebust75898062009-08-09 15:14:17 -0400509 dput(dentry);
510 return -ENOMEM;
511}
512
Trond Myklebustac6fece2009-08-09 15:14:20 -0400513static int __rpc_create(struct inode *dir, struct dentry *dentry,
514 umode_t mode,
515 const struct file_operations *i_fop,
516 void *private)
517{
518 int err;
519
520 err = __rpc_create_common(dir, dentry, S_IFREG | mode, i_fop, private);
521 if (err)
522 return err;
523 fsnotify_create(dir, dentry);
524 return 0;
525}
526
Trond Myklebust75898062009-08-09 15:14:17 -0400527static int __rpc_mkdir(struct inode *dir, struct dentry *dentry,
528 umode_t mode,
529 const struct file_operations *i_fop,
530 void *private)
531{
532 int err;
533
534 err = __rpc_create_common(dir, dentry, S_IFDIR | mode, i_fop, private);
535 if (err)
536 return err;
537 inc_nlink(dir);
538 fsnotify_mkdir(dir, dentry);
539 return 0;
540}
541
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300542static void
543init_pipe(struct rpc_pipe *pipe)
544{
545 pipe->nreaders = 0;
546 pipe->nwriters = 0;
547 INIT_LIST_HEAD(&pipe->in_upcall);
548 INIT_LIST_HEAD(&pipe->in_downcall);
549 INIT_LIST_HEAD(&pipe->pipe);
550 pipe->pipelen = 0;
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300551 INIT_DELAYED_WORK(&pipe->queue_timeout,
552 rpc_timeout_upcall_queue);
553 pipe->ops = NULL;
554 spin_lock_init(&pipe->lock);
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300555 pipe->dentry = NULL;
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300556}
557
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300558void rpc_destroy_pipe_data(struct rpc_pipe *pipe)
559{
560 kfree(pipe);
561}
562EXPORT_SYMBOL_GPL(rpc_destroy_pipe_data);
563
564struct rpc_pipe *rpc_mkpipe_data(const struct rpc_pipe_ops *ops, int flags)
Trond Myklebust75898062009-08-09 15:14:17 -0400565{
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300566 struct rpc_pipe *pipe;
Trond Myklebust75898062009-08-09 15:14:17 -0400567
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300568 pipe = kzalloc(sizeof(struct rpc_pipe), GFP_KERNEL);
569 if (!pipe)
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300570 return ERR_PTR(-ENOMEM);
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300571 init_pipe(pipe);
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300572 pipe->ops = ops;
573 pipe->flags = flags;
574 return pipe;
575}
576EXPORT_SYMBOL_GPL(rpc_mkpipe_data);
577
578static int __rpc_mkpipe_dentry(struct inode *dir, struct dentry *dentry,
579 umode_t mode,
580 const struct file_operations *i_fop,
581 void *private,
582 struct rpc_pipe *pipe)
Trond Myklebust75898062009-08-09 15:14:17 -0400583{
584 struct rpc_inode *rpci;
585 int err;
586
587 err = __rpc_create_common(dir, dentry, S_IFIFO | mode, i_fop, private);
588 if (err)
589 return err;
David Howellsc5ef6032015-03-17 22:26:16 +0000590 rpci = RPC_I(d_inode(dentry));
Trond Myklebust75898062009-08-09 15:14:17 -0400591 rpci->private = private;
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +0300592 rpci->pipe = pipe;
Trond Myklebust75898062009-08-09 15:14:17 -0400593 fsnotify_create(dir, dentry);
594 return 0;
595}
596
Trond Myklebustac6fece2009-08-09 15:14:20 -0400597static int __rpc_rmdir(struct inode *dir, struct dentry *dentry)
598{
599 int ret;
600
601 dget(dentry);
602 ret = simple_rmdir(dir, dentry);
Amir Goldsteina35d6322019-05-26 17:34:04 +0300603 if (!ret)
604 fsnotify_rmdir(dir, dentry);
Trond Myklebustac6fece2009-08-09 15:14:20 -0400605 d_delete(dentry);
606 dput(dentry);
607 return ret;
608}
609
Trond Myklebust810d90b2009-08-09 15:14:18 -0400610static int __rpc_unlink(struct inode *dir, struct dentry *dentry)
611{
612 int ret;
613
614 dget(dentry);
615 ret = simple_unlink(dir, dentry);
Amir Goldsteina35d6322019-05-26 17:34:04 +0300616 if (!ret)
617 fsnotify_unlink(dir, dentry);
Trond Myklebust810d90b2009-08-09 15:14:18 -0400618 d_delete(dentry);
619 dput(dentry);
620 return ret;
621}
622
623static int __rpc_rmpipe(struct inode *dir, struct dentry *dentry)
624{
David Howellsc5ef6032015-03-17 22:26:16 +0000625 struct inode *inode = d_inode(dentry);
Trond Myklebust810d90b2009-08-09 15:14:18 -0400626
Trond Myklebust810d90b2009-08-09 15:14:18 -0400627 rpc_close_pipes(inode);
628 return __rpc_unlink(dir, dentry);
629}
630
Trond Myklebustcfeaa4a2009-08-09 15:14:20 -0400631static struct dentry *__rpc_lookup_create_exclusive(struct dentry *parent,
Al Virod3db90b2013-07-14 17:09:57 +0400632 const char *name)
Trond Myklebustcfeaa4a2009-08-09 15:14:20 -0400633{
Al Virod3db90b2013-07-14 17:09:57 +0400634 struct qstr q = QSTR_INIT(name, strlen(name));
635 struct dentry *dentry = d_hash_and_lookup(parent, &q);
Stanislav Kinsbursky5bff0382011-11-08 15:09:19 +0300636 if (!dentry) {
Al Virod3db90b2013-07-14 17:09:57 +0400637 dentry = d_alloc(parent, &q);
Stanislav Kinsbursky5bff0382011-11-08 15:09:19 +0300638 if (!dentry)
639 return ERR_PTR(-ENOMEM);
640 }
David Howellsc5ef6032015-03-17 22:26:16 +0000641 if (d_really_is_negative(dentry))
Dan Carpenterf1f0abe12010-03-21 12:10:34 -0400642 return dentry;
Trond Myklebustcfeaa4a2009-08-09 15:14:20 -0400643 dput(dentry);
644 return ERR_PTR(-EEXIST);
645}
646
Linus Torvalds1da177e2005-04-16 15:20:36 -0700647/*
648 * FIXME: This probably has races.
649 */
Trond Myklebustac6fece2009-08-09 15:14:20 -0400650static void __rpc_depopulate(struct dentry *parent,
651 const struct rpc_filelist *files,
652 int start, int eof)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700653{
David Howellsc5ef6032015-03-17 22:26:16 +0000654 struct inode *dir = d_inode(parent);
Trond Myklebustac6fece2009-08-09 15:14:20 -0400655 struct dentry *dentry;
656 struct qstr name;
657 int i;
658
659 for (i = start; i < eof; i++) {
660 name.name = files[i].name;
661 name.len = strlen(files[i].name);
Al Virod3db90b2013-07-14 17:09:57 +0400662 dentry = d_hash_and_lookup(parent, &name);
Trond Myklebustac6fece2009-08-09 15:14:20 -0400663
664 if (dentry == NULL)
665 continue;
David Howellsc5ef6032015-03-17 22:26:16 +0000666 if (d_really_is_negative(dentry))
Trond Myklebustac6fece2009-08-09 15:14:20 -0400667 goto next;
David Howellsc5ef6032015-03-17 22:26:16 +0000668 switch (d_inode(dentry)->i_mode & S_IFMT) {
Trond Myklebustac6fece2009-08-09 15:14:20 -0400669 default:
670 BUG();
671 case S_IFREG:
672 __rpc_unlink(dir, dentry);
673 break;
674 case S_IFDIR:
675 __rpc_rmdir(dir, dentry);
676 }
677next:
678 dput(dentry);
679 }
680}
681
682static void rpc_depopulate(struct dentry *parent,
683 const struct rpc_filelist *files,
684 int start, int eof)
685{
David Howellsc5ef6032015-03-17 22:26:16 +0000686 struct inode *dir = d_inode(parent);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700687
Al Viro59551022016-01-22 15:40:57 -0500688 inode_lock_nested(dir, I_MUTEX_CHILD);
Trond Myklebustac6fece2009-08-09 15:14:20 -0400689 __rpc_depopulate(parent, files, start, eof);
Al Viro59551022016-01-22 15:40:57 -0500690 inode_unlock(dir);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700691}
692
Trond Myklebustac6fece2009-08-09 15:14:20 -0400693static int rpc_populate(struct dentry *parent,
694 const struct rpc_filelist *files,
695 int start, int eof,
696 void *private)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700697{
David Howellsc5ef6032015-03-17 22:26:16 +0000698 struct inode *dir = d_inode(parent);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700699 struct dentry *dentry;
Trond Myklebustac6fece2009-08-09 15:14:20 -0400700 int i, err;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700701
Al Viro59551022016-01-22 15:40:57 -0500702 inode_lock(dir);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700703 for (i = start; i < eof; i++) {
Al Virod3db90b2013-07-14 17:09:57 +0400704 dentry = __rpc_lookup_create_exclusive(parent, files[i].name);
Trond Myklebustac6fece2009-08-09 15:14:20 -0400705 err = PTR_ERR(dentry);
706 if (IS_ERR(dentry))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700707 goto out_bad;
Trond Myklebustac6fece2009-08-09 15:14:20 -0400708 switch (files[i].mode & S_IFMT) {
709 default:
710 BUG();
711 case S_IFREG:
712 err = __rpc_create(dir, dentry,
713 files[i].mode,
714 files[i].i_fop,
715 private);
716 break;
717 case S_IFDIR:
718 err = __rpc_mkdir(dir, dentry,
719 files[i].mode,
720 NULL,
721 private);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700722 }
Trond Myklebustac6fece2009-08-09 15:14:20 -0400723 if (err != 0)
724 goto out_bad;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700725 }
Al Viro59551022016-01-22 15:40:57 -0500726 inode_unlock(dir);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700727 return 0;
728out_bad:
Trond Myklebustac6fece2009-08-09 15:14:20 -0400729 __rpc_depopulate(parent, files, start, eof);
Al Viro59551022016-01-22 15:40:57 -0500730 inode_unlock(dir);
Al Viro1e903ed2013-09-16 10:57:41 -0400731 printk(KERN_WARNING "%s: %s failed to populate directory %pd\n",
732 __FILE__, __func__, parent);
Trond Myklebustac6fece2009-08-09 15:14:20 -0400733 return err;
Trond Myklebustf1345852005-09-23 11:08:25 -0400734}
Christoph Hellwig278c9952005-07-24 23:53:01 +0100735
Trond Myklebuste57aed72009-08-09 15:14:26 -0400736static struct dentry *rpc_mkdir_populate(struct dentry *parent,
Al Viroa95e6912013-07-14 16:43:54 +0400737 const char *name, umode_t mode, void *private,
Trond Myklebuste57aed72009-08-09 15:14:26 -0400738 int (*populate)(struct dentry *, void *), void *args_populate)
Trond Myklebustf1345852005-09-23 11:08:25 -0400739{
Trond Myklebustf1345852005-09-23 11:08:25 -0400740 struct dentry *dentry;
David Howellsc5ef6032015-03-17 22:26:16 +0000741 struct inode *dir = d_inode(parent);
Trond Myklebustf1345852005-09-23 11:08:25 -0400742 int error;
743
Al Viro59551022016-01-22 15:40:57 -0500744 inode_lock_nested(dir, I_MUTEX_PARENT);
Trond Myklebust7d59d1e2009-08-09 15:14:23 -0400745 dentry = __rpc_lookup_create_exclusive(parent, name);
Trond Myklebustf1345852005-09-23 11:08:25 -0400746 if (IS_ERR(dentry))
Trond Myklebust7d59d1e2009-08-09 15:14:23 -0400747 goto out;
748 error = __rpc_mkdir(dir, dentry, mode, NULL, private);
Trond Myklebust75898062009-08-09 15:14:17 -0400749 if (error != 0)
750 goto out_err;
Trond Myklebuste57aed72009-08-09 15:14:26 -0400751 if (populate != NULL) {
752 error = populate(dentry, args_populate);
753 if (error)
754 goto err_rmdir;
755 }
Trond Myklebustf1345852005-09-23 11:08:25 -0400756out:
Al Viro59551022016-01-22 15:40:57 -0500757 inode_unlock(dir);
Trond Myklebust5c3e9852006-07-29 17:37:40 -0400758 return dentry;
Trond Myklebustac6fece2009-08-09 15:14:20 -0400759err_rmdir:
Trond Myklebustf1345852005-09-23 11:08:25 -0400760 __rpc_rmdir(dir, dentry);
Trond Myklebust75898062009-08-09 15:14:17 -0400761out_err:
Trond Myklebustf1345852005-09-23 11:08:25 -0400762 dentry = ERR_PTR(error);
763 goto out;
764}
765
Trond Myklebuste57aed72009-08-09 15:14:26 -0400766static int rpc_rmdir_depopulate(struct dentry *dentry,
767 void (*depopulate)(struct dentry *))
Trond Myklebustf1345852005-09-23 11:08:25 -0400768{
Trond Myklebustdff02cc2006-07-31 14:17:18 -0700769 struct dentry *parent;
Trond Myklebustf1345852005-09-23 11:08:25 -0400770 struct inode *dir;
771 int error;
772
Trond Myklebustdff02cc2006-07-31 14:17:18 -0700773 parent = dget_parent(dentry);
David Howellsc5ef6032015-03-17 22:26:16 +0000774 dir = d_inode(parent);
Al Viro59551022016-01-22 15:40:57 -0500775 inode_lock_nested(dir, I_MUTEX_PARENT);
Trond Myklebuste57aed72009-08-09 15:14:26 -0400776 if (depopulate != NULL)
777 depopulate(dentry);
Trond Myklebustf1345852005-09-23 11:08:25 -0400778 error = __rpc_rmdir(dir, dentry);
Al Viro59551022016-01-22 15:40:57 -0500779 inode_unlock(dir);
Trond Myklebustdff02cc2006-07-31 14:17:18 -0700780 dput(parent);
Trond Myklebustf1345852005-09-23 11:08:25 -0400781 return error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700782}
783
J. Bruce Fields93a44a72007-11-06 13:06:03 -0500784/**
Mauro Carvalho Chehabc1639be2020-11-16 11:17:58 +0100785 * rpc_mkpipe_dentry - make an rpc_pipefs file for kernel<->userspace
786 * communication
J. Bruce Fields93a44a72007-11-06 13:06:03 -0500787 * @parent: dentry of directory to create new "pipe" in
788 * @name: name of pipe
789 * @private: private data to associate with the pipe, for the caller's use
Randy Dunlapbda14602012-05-13 10:35:40 -0700790 * @pipe: &rpc_pipe containing input parameters
J. Bruce Fields93a44a72007-11-06 13:06:03 -0500791 *
792 * Data is made available for userspace to read by calls to
793 * rpc_queue_upcall(). The actual reads will result in calls to
794 * @ops->upcall, which will be called with the file pointer,
795 * message, and userspace buffer to copy to.
796 *
797 * Writes can come at any time, and do not necessarily have to be
798 * responses to upcalls. They will result in calls to @msg->downcall.
799 *
800 * The @private argument passed here will be available to all these methods
Al Viro496ad9a2013-01-23 17:07:38 -0500801 * from the file pointer, via RPC_I(file_inode(file))->private.
J. Bruce Fields93a44a72007-11-06 13:06:03 -0500802 */
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300803struct dentry *rpc_mkpipe_dentry(struct dentry *parent, const char *name,
804 void *private, struct rpc_pipe *pipe)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700805{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700806 struct dentry *dentry;
David Howellsc5ef6032015-03-17 22:26:16 +0000807 struct inode *dir = d_inode(parent);
Joe Perchesd6444062018-03-23 15:54:38 -0700808 umode_t umode = S_IFIFO | 0600;
Trond Myklebust75898062009-08-09 15:14:17 -0400809 int err;
Trond Myklebust7364af62009-08-09 15:14:16 -0400810
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300811 if (pipe->ops->upcall == NULL)
Joe Perchesd6444062018-03-23 15:54:38 -0700812 umode &= ~0444;
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300813 if (pipe->ops->downcall == NULL)
Joe Perchesd6444062018-03-23 15:54:38 -0700814 umode &= ~0222;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700815
Al Viro59551022016-01-22 15:40:57 -0500816 inode_lock_nested(dir, I_MUTEX_PARENT);
Al Virod3db90b2013-07-14 17:09:57 +0400817 dentry = __rpc_lookup_create_exclusive(parent, name);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700818 if (IS_ERR(dentry))
Trond Myklebustcfeaa4a2009-08-09 15:14:20 -0400819 goto out;
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300820 err = __rpc_mkpipe_dentry(dir, dentry, umode, &rpc_pipe_fops,
821 private, pipe);
Trond Myklebust75898062009-08-09 15:14:17 -0400822 if (err)
823 goto out_err;
Trond Myklebustf1345852005-09-23 11:08:25 -0400824out:
Al Viro59551022016-01-22 15:40:57 -0500825 inode_unlock(dir);
Trond Myklebust5c3e9852006-07-29 17:37:40 -0400826 return dentry;
Trond Myklebust75898062009-08-09 15:14:17 -0400827out_err:
828 dentry = ERR_PTR(err);
Al Viro1e903ed2013-09-16 10:57:41 -0400829 printk(KERN_WARNING "%s: %s() failed to create pipe %pd/%s (errno = %d)\n",
830 __FILE__, __func__, parent, name,
Trond Myklebust75898062009-08-09 15:14:17 -0400831 err);
Trond Myklebustf1345852005-09-23 11:08:25 -0400832 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700833}
Stanislav Kinsburskyc239d832011-12-26 15:44:06 +0300834EXPORT_SYMBOL_GPL(rpc_mkpipe_dentry);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700835
J. Bruce Fields93a44a72007-11-06 13:06:03 -0500836/**
837 * rpc_unlink - remove a pipe
838 * @dentry: dentry for the pipe, as returned from rpc_mkpipe
839 *
840 * After this call, lookups will no longer find the pipe, and any
841 * attempts to read or write using preexisting opens of the pipe will
842 * return -EPIPE.
843 */
Trond Myklebustf1345852005-09-23 11:08:25 -0400844int
Trond Myklebust5d674762006-07-31 14:11:48 -0700845rpc_unlink(struct dentry *dentry)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700846{
Trond Myklebust5d674762006-07-31 14:11:48 -0700847 struct dentry *parent;
Trond Myklebustf1345852005-09-23 11:08:25 -0400848 struct inode *dir;
Trond Myklebust5d674762006-07-31 14:11:48 -0700849 int error = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700850
Trond Myklebust5d674762006-07-31 14:11:48 -0700851 parent = dget_parent(dentry);
David Howellsc5ef6032015-03-17 22:26:16 +0000852 dir = d_inode(parent);
Al Viro59551022016-01-22 15:40:57 -0500853 inode_lock_nested(dir, I_MUTEX_PARENT);
Trond Myklebust810d90b2009-08-09 15:14:18 -0400854 error = __rpc_rmpipe(dir, dentry);
Al Viro59551022016-01-22 15:40:57 -0500855 inode_unlock(dir);
Trond Myklebust5d674762006-07-31 14:11:48 -0700856 dput(parent);
Trond Myklebustf1345852005-09-23 11:08:25 -0400857 return error;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700858}
Trond Myklebust468039e2008-12-23 15:21:31 -0500859EXPORT_SYMBOL_GPL(rpc_unlink);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700860
Trond Myklebust6739ffb2013-08-26 15:38:11 -0400861/**
862 * rpc_init_pipe_dir_head - initialise a struct rpc_pipe_dir_head
863 * @pdh: pointer to struct rpc_pipe_dir_head
864 */
865void rpc_init_pipe_dir_head(struct rpc_pipe_dir_head *pdh)
866{
867 INIT_LIST_HEAD(&pdh->pdh_entries);
868 pdh->pdh_dentry = NULL;
869}
870EXPORT_SYMBOL_GPL(rpc_init_pipe_dir_head);
871
872/**
873 * rpc_init_pipe_dir_object - initialise a struct rpc_pipe_dir_object
874 * @pdo: pointer to struct rpc_pipe_dir_object
875 * @pdo_ops: pointer to const struct rpc_pipe_dir_object_ops
876 * @pdo_data: pointer to caller-defined data
877 */
878void rpc_init_pipe_dir_object(struct rpc_pipe_dir_object *pdo,
879 const struct rpc_pipe_dir_object_ops *pdo_ops,
880 void *pdo_data)
881{
882 INIT_LIST_HEAD(&pdo->pdo_head);
883 pdo->pdo_ops = pdo_ops;
884 pdo->pdo_data = pdo_data;
885}
886EXPORT_SYMBOL_GPL(rpc_init_pipe_dir_object);
887
888static int
889rpc_add_pipe_dir_object_locked(struct net *net,
890 struct rpc_pipe_dir_head *pdh,
891 struct rpc_pipe_dir_object *pdo)
892{
893 int ret = 0;
894
895 if (pdh->pdh_dentry)
896 ret = pdo->pdo_ops->create(pdh->pdh_dentry, pdo);
897 if (ret == 0)
898 list_add_tail(&pdo->pdo_head, &pdh->pdh_entries);
899 return ret;
900}
901
902static void
903rpc_remove_pipe_dir_object_locked(struct net *net,
904 struct rpc_pipe_dir_head *pdh,
905 struct rpc_pipe_dir_object *pdo)
906{
907 if (pdh->pdh_dentry)
908 pdo->pdo_ops->destroy(pdh->pdh_dentry, pdo);
909 list_del_init(&pdo->pdo_head);
910}
911
912/**
913 * rpc_add_pipe_dir_object - associate a rpc_pipe_dir_object to a directory
914 * @net: pointer to struct net
915 * @pdh: pointer to struct rpc_pipe_dir_head
916 * @pdo: pointer to struct rpc_pipe_dir_object
917 *
918 */
919int
920rpc_add_pipe_dir_object(struct net *net,
921 struct rpc_pipe_dir_head *pdh,
922 struct rpc_pipe_dir_object *pdo)
923{
924 int ret = 0;
925
926 if (list_empty(&pdo->pdo_head)) {
927 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
928
929 mutex_lock(&sn->pipefs_sb_lock);
930 ret = rpc_add_pipe_dir_object_locked(net, pdh, pdo);
931 mutex_unlock(&sn->pipefs_sb_lock);
932 }
933 return ret;
934}
935EXPORT_SYMBOL_GPL(rpc_add_pipe_dir_object);
936
937/**
938 * rpc_remove_pipe_dir_object - remove a rpc_pipe_dir_object from a directory
939 * @net: pointer to struct net
940 * @pdh: pointer to struct rpc_pipe_dir_head
941 * @pdo: pointer to struct rpc_pipe_dir_object
942 *
943 */
944void
945rpc_remove_pipe_dir_object(struct net *net,
946 struct rpc_pipe_dir_head *pdh,
947 struct rpc_pipe_dir_object *pdo)
948{
949 if (!list_empty(&pdo->pdo_head)) {
950 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
951
952 mutex_lock(&sn->pipefs_sb_lock);
953 rpc_remove_pipe_dir_object_locked(net, pdh, pdo);
954 mutex_unlock(&sn->pipefs_sb_lock);
955 }
956}
957EXPORT_SYMBOL_GPL(rpc_remove_pipe_dir_object);
958
Trond Myklebust298fc352013-08-27 16:27:04 -0400959/**
960 * rpc_find_or_alloc_pipe_dir_object
961 * @net: pointer to struct net
962 * @pdh: pointer to struct rpc_pipe_dir_head
963 * @match: match struct rpc_pipe_dir_object to data
964 * @alloc: allocate a new struct rpc_pipe_dir_object
965 * @data: user defined data for match() and alloc()
966 *
967 */
968struct rpc_pipe_dir_object *
969rpc_find_or_alloc_pipe_dir_object(struct net *net,
970 struct rpc_pipe_dir_head *pdh,
971 int (*match)(struct rpc_pipe_dir_object *, void *),
972 struct rpc_pipe_dir_object *(*alloc)(void *),
973 void *data)
974{
975 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
976 struct rpc_pipe_dir_object *pdo;
977
978 mutex_lock(&sn->pipefs_sb_lock);
979 list_for_each_entry(pdo, &pdh->pdh_entries, pdo_head) {
980 if (!match(pdo, data))
981 continue;
982 goto out;
983 }
984 pdo = alloc(data);
985 if (!pdo)
986 goto out;
987 rpc_add_pipe_dir_object_locked(net, pdh, pdo);
988out:
989 mutex_unlock(&sn->pipefs_sb_lock);
990 return pdo;
991}
992EXPORT_SYMBOL_GPL(rpc_find_or_alloc_pipe_dir_object);
993
Trond Myklebust6739ffb2013-08-26 15:38:11 -0400994static void
995rpc_create_pipe_dir_objects(struct rpc_pipe_dir_head *pdh)
996{
997 struct rpc_pipe_dir_object *pdo;
998 struct dentry *dir = pdh->pdh_dentry;
999
1000 list_for_each_entry(pdo, &pdh->pdh_entries, pdo_head)
1001 pdo->pdo_ops->create(dir, pdo);
1002}
1003
1004static void
1005rpc_destroy_pipe_dir_objects(struct rpc_pipe_dir_head *pdh)
1006{
1007 struct rpc_pipe_dir_object *pdo;
1008 struct dentry *dir = pdh->pdh_dentry;
1009
1010 list_for_each_entry(pdo, &pdh->pdh_entries, pdo_head)
1011 pdo->pdo_ops->destroy(dir, pdo);
1012}
1013
Trond Myklebuste57aed72009-08-09 15:14:26 -04001014enum {
1015 RPCAUTH_info,
1016 RPCAUTH_EOF
1017};
1018
1019static const struct rpc_filelist authfiles[] = {
1020 [RPCAUTH_info] = {
1021 .name = "info",
1022 .i_fop = &rpc_info_operations,
Joe Perchesd6444062018-03-23 15:54:38 -07001023 .mode = S_IFREG | 0400,
Trond Myklebuste57aed72009-08-09 15:14:26 -04001024 },
1025};
1026
1027static int rpc_clntdir_populate(struct dentry *dentry, void *private)
1028{
1029 return rpc_populate(dentry,
1030 authfiles, RPCAUTH_info, RPCAUTH_EOF,
1031 private);
1032}
1033
1034static void rpc_clntdir_depopulate(struct dentry *dentry)
1035{
1036 rpc_depopulate(dentry, authfiles, RPCAUTH_info, RPCAUTH_EOF);
1037}
1038
Trond Myklebust7d59d1e2009-08-09 15:14:23 -04001039/**
1040 * rpc_create_client_dir - Create a new rpc_client directory in rpc_pipefs
Al Viroa95e6912013-07-14 16:43:54 +04001041 * @dentry: the parent of new directory
1042 * @name: the name of new directory
Trond Myklebust7d59d1e2009-08-09 15:14:23 -04001043 * @rpc_client: rpc client to associate with this directory
1044 *
1045 * This creates a directory at the given @path associated with
1046 * @rpc_clnt, which will contain a file named "info" with some basic
1047 * information about the client, together with any "pipes" that may
1048 * later be created using rpc_mkpipe().
1049 */
Trond Myklebust23ac6582009-08-09 15:14:25 -04001050struct dentry *rpc_create_client_dir(struct dentry *dentry,
Al Viroa95e6912013-07-14 16:43:54 +04001051 const char *name,
Trond Myklebuste57aed72009-08-09 15:14:26 -04001052 struct rpc_clnt *rpc_client)
Trond Myklebust7d59d1e2009-08-09 15:14:23 -04001053{
Trond Myklebust6739ffb2013-08-26 15:38:11 -04001054 struct dentry *ret;
1055
Joe Perchesd6444062018-03-23 15:54:38 -07001056 ret = rpc_mkdir_populate(dentry, name, 0555, NULL,
1057 rpc_clntdir_populate, rpc_client);
Trond Myklebust6739ffb2013-08-26 15:38:11 -04001058 if (!IS_ERR(ret)) {
1059 rpc_client->cl_pipedir_objects.pdh_dentry = ret;
1060 rpc_create_pipe_dir_objects(&rpc_client->cl_pipedir_objects);
1061 }
1062 return ret;
Trond Myklebuste57aed72009-08-09 15:14:26 -04001063}
1064
1065/**
1066 * rpc_remove_client_dir - Remove a directory created with rpc_create_client_dir()
Trond Myklebust6739ffb2013-08-26 15:38:11 -04001067 * @rpc_client: rpc_client for the pipe
Trond Myklebuste57aed72009-08-09 15:14:26 -04001068 */
Trond Myklebustc36dcfe12013-08-26 17:44:26 -04001069int rpc_remove_client_dir(struct rpc_clnt *rpc_client)
Trond Myklebuste57aed72009-08-09 15:14:26 -04001070{
Trond Myklebustc36dcfe12013-08-26 17:44:26 -04001071 struct dentry *dentry = rpc_client->cl_pipedir_objects.pdh_dentry;
1072
1073 if (dentry == NULL)
1074 return 0;
1075 rpc_destroy_pipe_dir_objects(&rpc_client->cl_pipedir_objects);
1076 rpc_client->cl_pipedir_objects.pdh_dentry = NULL;
Trond Myklebuste57aed72009-08-09 15:14:26 -04001077 return rpc_rmdir_depopulate(dentry, rpc_clntdir_depopulate);
Trond Myklebust7d59d1e2009-08-09 15:14:23 -04001078}
1079
Trond Myklebust8854e822009-08-09 15:14:30 -04001080static const struct rpc_filelist cache_pipefs_files[3] = {
1081 [0] = {
1082 .name = "channel",
1083 .i_fop = &cache_file_operations_pipefs,
Joe Perchesd6444062018-03-23 15:54:38 -07001084 .mode = S_IFREG | 0600,
Trond Myklebust8854e822009-08-09 15:14:30 -04001085 },
1086 [1] = {
1087 .name = "content",
1088 .i_fop = &content_file_operations_pipefs,
Joe Perchesd6444062018-03-23 15:54:38 -07001089 .mode = S_IFREG | 0400,
Trond Myklebust8854e822009-08-09 15:14:30 -04001090 },
1091 [2] = {
1092 .name = "flush",
1093 .i_fop = &cache_flush_operations_pipefs,
Joe Perchesd6444062018-03-23 15:54:38 -07001094 .mode = S_IFREG | 0600,
Trond Myklebust8854e822009-08-09 15:14:30 -04001095 },
1096};
1097
1098static int rpc_cachedir_populate(struct dentry *dentry, void *private)
1099{
1100 return rpc_populate(dentry,
1101 cache_pipefs_files, 0, 3,
1102 private);
1103}
1104
1105static void rpc_cachedir_depopulate(struct dentry *dentry)
1106{
1107 rpc_depopulate(dentry, cache_pipefs_files, 0, 3);
1108}
1109
Al Viroa95e6912013-07-14 16:43:54 +04001110struct dentry *rpc_create_cache_dir(struct dentry *parent, const char *name,
Al Viro64f14262011-07-25 00:35:13 -04001111 umode_t umode, struct cache_detail *cd)
Trond Myklebust8854e822009-08-09 15:14:30 -04001112{
1113 return rpc_mkdir_populate(parent, name, umode, NULL,
1114 rpc_cachedir_populate, cd);
1115}
1116
1117void rpc_remove_cache_dir(struct dentry *dentry)
1118{
1119 rpc_rmdir_depopulate(dentry, rpc_cachedir_depopulate);
1120}
1121
Linus Torvalds1da177e2005-04-16 15:20:36 -07001122/*
1123 * populate the filesystem
1124 */
Alexey Dobriyanb87221d2009-09-21 17:01:09 -07001125static const struct super_operations s_ops = {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001126 .alloc_inode = rpc_alloc_inode,
Al Virobef252f2019-04-15 22:32:27 -04001127 .free_inode = rpc_free_inode,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001128 .statfs = simple_statfs,
1129};
1130
1131#define RPCAUTH_GSSMAGIC 0x67596969
1132
Trond Myklebustbb156742009-08-09 15:14:21 -04001133/*
1134 * We have a single directory with 1 node in it.
1135 */
1136enum {
1137 RPCAUTH_lockd,
1138 RPCAUTH_mount,
1139 RPCAUTH_nfs,
1140 RPCAUTH_portmap,
1141 RPCAUTH_statd,
1142 RPCAUTH_nfsd4_cb,
Trond Myklebuste571cbf2009-08-19 18:12:27 -04001143 RPCAUTH_cache,
Jeff Laytonb3537c32012-03-21 09:52:04 -04001144 RPCAUTH_nfsd,
Jeff Layton4b9a4452013-11-14 07:25:17 -05001145 RPCAUTH_gssd,
Trond Myklebustbb156742009-08-09 15:14:21 -04001146 RPCAUTH_RootEOF
1147};
1148
1149static const struct rpc_filelist files[] = {
1150 [RPCAUTH_lockd] = {
1151 .name = "lockd",
Joe Perchesd6444062018-03-23 15:54:38 -07001152 .mode = S_IFDIR | 0555,
Trond Myklebustbb156742009-08-09 15:14:21 -04001153 },
1154 [RPCAUTH_mount] = {
1155 .name = "mount",
Joe Perchesd6444062018-03-23 15:54:38 -07001156 .mode = S_IFDIR | 0555,
Trond Myklebustbb156742009-08-09 15:14:21 -04001157 },
1158 [RPCAUTH_nfs] = {
1159 .name = "nfs",
Joe Perchesd6444062018-03-23 15:54:38 -07001160 .mode = S_IFDIR | 0555,
Trond Myklebustbb156742009-08-09 15:14:21 -04001161 },
1162 [RPCAUTH_portmap] = {
1163 .name = "portmap",
Joe Perchesd6444062018-03-23 15:54:38 -07001164 .mode = S_IFDIR | 0555,
Trond Myklebustbb156742009-08-09 15:14:21 -04001165 },
1166 [RPCAUTH_statd] = {
1167 .name = "statd",
Joe Perchesd6444062018-03-23 15:54:38 -07001168 .mode = S_IFDIR | 0555,
Trond Myklebustbb156742009-08-09 15:14:21 -04001169 },
1170 [RPCAUTH_nfsd4_cb] = {
1171 .name = "nfsd4_cb",
Joe Perchesd6444062018-03-23 15:54:38 -07001172 .mode = S_IFDIR | 0555,
Trond Myklebustbb156742009-08-09 15:14:21 -04001173 },
Trond Myklebuste571cbf2009-08-19 18:12:27 -04001174 [RPCAUTH_cache] = {
1175 .name = "cache",
Joe Perchesd6444062018-03-23 15:54:38 -07001176 .mode = S_IFDIR | 0555,
Trond Myklebuste571cbf2009-08-19 18:12:27 -04001177 },
Jeff Laytonb3537c32012-03-21 09:52:04 -04001178 [RPCAUTH_nfsd] = {
1179 .name = "nfsd",
Joe Perchesd6444062018-03-23 15:54:38 -07001180 .mode = S_IFDIR | 0555,
Jeff Laytonb3537c32012-03-21 09:52:04 -04001181 },
Jeff Layton4b9a4452013-11-14 07:25:17 -05001182 [RPCAUTH_gssd] = {
1183 .name = "gssd",
Joe Perchesd6444062018-03-23 15:54:38 -07001184 .mode = S_IFDIR | 0555,
Jeff Layton4b9a4452013-11-14 07:25:17 -05001185 },
Trond Myklebustbb156742009-08-09 15:14:21 -04001186};
1187
Stanislav Kinsbursky432eb1a2011-12-26 15:39:22 +03001188/*
1189 * This call can be used only in RPC pipefs mount notification hooks.
1190 */
1191struct dentry *rpc_d_lookup_sb(const struct super_block *sb,
1192 const unsigned char *dir_name)
1193{
Linus Torvalds26fe5752012-05-10 13:14:12 -07001194 struct qstr dir = QSTR_INIT(dir_name, strlen(dir_name));
Al Virod3db90b2013-07-14 17:09:57 +04001195 return d_hash_and_lookup(sb->s_root, &dir);
Stanislav Kinsbursky432eb1a2011-12-26 15:39:22 +03001196}
1197EXPORT_SYMBOL_GPL(rpc_d_lookup_sb);
1198
Jeff Layton4b9a4452013-11-14 07:25:17 -05001199int rpc_pipefs_init_net(struct net *net)
Stanislav Kinsburskyc21a5882011-12-26 15:39:39 +03001200{
1201 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1202
Jeff Layton4b9a4452013-11-14 07:25:17 -05001203 sn->gssd_dummy = rpc_mkpipe_data(&gssd_dummy_pipe_ops, 0);
1204 if (IS_ERR(sn->gssd_dummy))
1205 return PTR_ERR(sn->gssd_dummy);
1206
Stanislav Kinsburskyc21a5882011-12-26 15:39:39 +03001207 mutex_init(&sn->pipefs_sb_lock);
Trond Myklebust2aed8b42013-05-15 10:27:32 -07001208 sn->pipe_version = -1;
Jeff Layton4b9a4452013-11-14 07:25:17 -05001209 return 0;
1210}
1211
1212void rpc_pipefs_exit_net(struct net *net)
1213{
1214 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1215
1216 rpc_destroy_pipe_data(sn->gssd_dummy);
Stanislav Kinsburskyc21a5882011-12-26 15:39:39 +03001217}
1218
1219/*
1220 * This call will be used for per network namespace operations calls.
1221 * Note: Function will be returned with pipefs_sb_lock taken if superblock was
1222 * found. This lock have to be released by rpc_put_sb_net() when all operations
1223 * will be completed.
1224 */
1225struct super_block *rpc_get_sb_net(const struct net *net)
1226{
1227 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1228
1229 mutex_lock(&sn->pipefs_sb_lock);
1230 if (sn->pipefs_sb)
1231 return sn->pipefs_sb;
1232 mutex_unlock(&sn->pipefs_sb_lock);
1233 return NULL;
1234}
1235EXPORT_SYMBOL_GPL(rpc_get_sb_net);
1236
1237void rpc_put_sb_net(const struct net *net)
1238{
1239 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1240
Weston Andros Adamson749386e2012-10-23 10:43:37 -04001241 WARN_ON(sn->pipefs_sb == NULL);
Stanislav Kinsburskyc21a5882011-12-26 15:39:39 +03001242 mutex_unlock(&sn->pipefs_sb_lock);
1243}
1244EXPORT_SYMBOL_GPL(rpc_put_sb_net);
1245
Jeff Layton4b9a4452013-11-14 07:25:17 -05001246static const struct rpc_filelist gssd_dummy_clnt_dir[] = {
1247 [0] = {
1248 .name = "clntXX",
Joe Perchesd6444062018-03-23 15:54:38 -07001249 .mode = S_IFDIR | 0555,
Jeff Layton4b9a4452013-11-14 07:25:17 -05001250 },
1251};
1252
1253static ssize_t
1254dummy_downcall(struct file *filp, const char __user *src, size_t len)
1255{
1256 return -EINVAL;
1257}
1258
1259static const struct rpc_pipe_ops gssd_dummy_pipe_ops = {
1260 .upcall = rpc_pipe_generic_upcall,
1261 .downcall = dummy_downcall,
1262};
1263
Jeff Laytone2f0c832013-12-05 07:34:44 -05001264/*
1265 * Here we present a bogus "info" file to keep rpc.gssd happy. We don't expect
1266 * that it will ever use this info to handle an upcall, but rpc.gssd expects
1267 * that this file will be there and have a certain format.
1268 */
1269static int
Yangtao Li260f71e2018-12-21 10:59:36 -05001270rpc_dummy_info_show(struct seq_file *m, void *v)
Jeff Laytone2f0c832013-12-05 07:34:44 -05001271{
1272 seq_printf(m, "RPC server: %s\n", utsname()->nodename);
1273 seq_printf(m, "service: foo (1) version 0\n");
1274 seq_printf(m, "address: 127.0.0.1\n");
1275 seq_printf(m, "protocol: tcp\n");
1276 seq_printf(m, "port: 0\n");
1277 return 0;
1278}
Yangtao Li260f71e2018-12-21 10:59:36 -05001279DEFINE_SHOW_ATTRIBUTE(rpc_dummy_info);
Jeff Laytone2f0c832013-12-05 07:34:44 -05001280
1281static const struct rpc_filelist gssd_dummy_info_file[] = {
1282 [0] = {
1283 .name = "info",
Yangtao Li260f71e2018-12-21 10:59:36 -05001284 .i_fop = &rpc_dummy_info_fops,
Joe Perchesd6444062018-03-23 15:54:38 -07001285 .mode = S_IFREG | 0400,
Jeff Laytone2f0c832013-12-05 07:34:44 -05001286 },
1287};
1288
Jeff Layton4b9a4452013-11-14 07:25:17 -05001289/**
1290 * rpc_gssd_dummy_populate - create a dummy gssd pipe
1291 * @root: root of the rpc_pipefs filesystem
1292 * @pipe_data: pipe data created when netns is initialized
1293 *
1294 * Create a dummy set of directories and a pipe that gssd can hold open to
1295 * indicate that it is up and running.
1296 */
1297static struct dentry *
1298rpc_gssd_dummy_populate(struct dentry *root, struct rpc_pipe *pipe_data)
1299{
1300 int ret = 0;
1301 struct dentry *gssd_dentry;
1302 struct dentry *clnt_dentry = NULL;
1303 struct dentry *pipe_dentry = NULL;
1304 struct qstr q = QSTR_INIT(files[RPCAUTH_gssd].name,
1305 strlen(files[RPCAUTH_gssd].name));
1306
1307 /* We should never get this far if "gssd" doesn't exist */
1308 gssd_dentry = d_hash_and_lookup(root, &q);
1309 if (!gssd_dentry)
1310 return ERR_PTR(-ENOENT);
1311
1312 ret = rpc_populate(gssd_dentry, gssd_dummy_clnt_dir, 0, 1, NULL);
1313 if (ret) {
1314 pipe_dentry = ERR_PTR(ret);
1315 goto out;
1316 }
1317
1318 q.name = gssd_dummy_clnt_dir[0].name;
1319 q.len = strlen(gssd_dummy_clnt_dir[0].name);
1320 clnt_dentry = d_hash_and_lookup(gssd_dentry, &q);
1321 if (!clnt_dentry) {
Vasily Averinb7ade382020-06-01 11:54:57 +03001322 __rpc_depopulate(gssd_dentry, gssd_dummy_clnt_dir, 0, 1);
Jeff Layton4b9a4452013-11-14 07:25:17 -05001323 pipe_dentry = ERR_PTR(-ENOENT);
1324 goto out;
1325 }
1326
Jeff Laytone2f0c832013-12-05 07:34:44 -05001327 ret = rpc_populate(clnt_dentry, gssd_dummy_info_file, 0, 1, NULL);
1328 if (ret) {
Jeff Layton3396f922013-12-05 07:33:49 -05001329 __rpc_depopulate(gssd_dentry, gssd_dummy_clnt_dir, 0, 1);
Jeff Laytone2f0c832013-12-05 07:34:44 -05001330 pipe_dentry = ERR_PTR(ret);
1331 goto out;
1332 }
1333
1334 pipe_dentry = rpc_mkpipe_dentry(clnt_dentry, "gssd", NULL, pipe_data);
1335 if (IS_ERR(pipe_dentry)) {
1336 __rpc_depopulate(clnt_dentry, gssd_dummy_info_file, 0, 1);
1337 __rpc_depopulate(gssd_dentry, gssd_dummy_clnt_dir, 0, 1);
1338 }
Jeff Layton4b9a4452013-11-14 07:25:17 -05001339out:
1340 dput(clnt_dentry);
1341 dput(gssd_dentry);
1342 return pipe_dentry;
1343}
1344
Jeff Layton23e66ba2013-12-09 09:38:00 -05001345static void
1346rpc_gssd_dummy_depopulate(struct dentry *pipe_dentry)
1347{
1348 struct dentry *clnt_dir = pipe_dentry->d_parent;
1349 struct dentry *gssd_dir = clnt_dir->d_parent;
1350
Al Viro4a3877c2018-04-03 01:15:46 -04001351 dget(pipe_dentry);
David Howellsc5ef6032015-03-17 22:26:16 +00001352 __rpc_rmpipe(d_inode(clnt_dir), pipe_dentry);
Jeff Layton23e66ba2013-12-09 09:38:00 -05001353 __rpc_depopulate(clnt_dir, gssd_dummy_info_file, 0, 1);
1354 __rpc_depopulate(gssd_dir, gssd_dummy_clnt_dir, 0, 1);
1355 dput(pipe_dentry);
1356}
1357
Linus Torvalds1da177e2005-04-16 15:20:36 -07001358static int
David Howellsb9662f32019-03-25 16:38:28 +00001359rpc_fill_super(struct super_block *sb, struct fs_context *fc)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001360{
1361 struct inode *inode;
Jeff Layton4b9a4452013-11-14 07:25:17 -05001362 struct dentry *root, *gssd_dentry;
David Howellsb9662f32019-03-25 16:38:28 +00001363 struct net *net = sb->s_fs_info;
Stanislav Kinsbursky90c4e822011-12-26 15:39:30 +03001364 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +03001365 int err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001366
Kirill A. Shutemov09cbfea2016-04-01 15:29:47 +03001367 sb->s_blocksize = PAGE_SIZE;
1368 sb->s_blocksize_bits = PAGE_SHIFT;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001369 sb->s_magic = RPCAUTH_GSSMAGIC;
1370 sb->s_op = &s_ops;
Al Virob26d4cd2013-10-25 18:47:37 -04001371 sb->s_d_op = &simple_dentry_operations;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001372 sb->s_time_gran = 1;
1373
Joe Perchesd6444062018-03-23 15:54:38 -07001374 inode = rpc_get_inode(sb, S_IFDIR | 0555);
Al Viro48fde702012-01-08 22:15:13 -05001375 sb->s_root = root = d_make_root(inode);
1376 if (!root)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001377 return -ENOMEM;
Trond Myklebustac6fece2009-08-09 15:14:20 -04001378 if (rpc_populate(root, files, RPCAUTH_lockd, RPCAUTH_RootEOF, NULL))
Al Virofc7bed82010-01-25 18:30:38 -05001379 return -ENOMEM;
Jeff Layton4b9a4452013-11-14 07:25:17 -05001380
1381 gssd_dentry = rpc_gssd_dummy_populate(root, sn->gssd_dummy);
1382 if (IS_ERR(gssd_dentry)) {
1383 __rpc_depopulate(root, files, RPCAUTH_lockd, RPCAUTH_RootEOF);
1384 return PTR_ERR(gssd_dentry);
1385 }
1386
Vasily Averin6c67a3e4a2017-11-08 08:57:32 +03001387 dprintk("RPC: sending pipefs MOUNT notification for net %x%s\n",
1388 net->ns.inum, NET_NAME(net));
Stanislav Kinsbursky38481602013-06-24 11:52:38 +04001389 mutex_lock(&sn->pipefs_sb_lock);
Stanislav Kinsbursky37629b52012-04-20 18:19:56 +04001390 sn->pipefs_sb = sb;
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +03001391 err = blocking_notifier_call_chain(&rpc_pipefs_notifier_list,
1392 RPC_PIPEFS_MOUNT,
1393 sb);
1394 if (err)
1395 goto err_depopulate;
Stanislav Kinsbursky38481602013-06-24 11:52:38 +04001396 mutex_unlock(&sn->pipefs_sb_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001397 return 0;
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +03001398
1399err_depopulate:
Jeff Layton23e66ba2013-12-09 09:38:00 -05001400 rpc_gssd_dummy_depopulate(gssd_dentry);
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +03001401 blocking_notifier_call_chain(&rpc_pipefs_notifier_list,
1402 RPC_PIPEFS_UMOUNT,
1403 sb);
Stanislav Kinsbursky37629b52012-04-20 18:19:56 +04001404 sn->pipefs_sb = NULL;
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +03001405 __rpc_depopulate(root, files, RPCAUTH_lockd, RPCAUTH_RootEOF);
Stanislav Kinsbursky38481602013-06-24 11:52:38 +04001406 mutex_unlock(&sn->pipefs_sb_lock);
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +03001407 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001408}
1409
Jeff Layton89f84242013-11-14 07:25:18 -05001410bool
1411gssd_running(struct net *net)
1412{
1413 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1414 struct rpc_pipe *pipe = sn->gssd_dummy;
1415
1416 return pipe->nreaders || pipe->nwriters;
1417}
1418EXPORT_SYMBOL_GPL(gssd_running);
1419
David Howellsb9662f32019-03-25 16:38:28 +00001420static int rpc_fs_get_tree(struct fs_context *fc)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001421{
Al Viro533770c2019-09-03 19:05:48 -04001422 return get_tree_keyed(fc, rpc_fill_super, get_net(fc->net_ns));
David Howellsb9662f32019-03-25 16:38:28 +00001423}
1424
1425static void rpc_fs_free_fc(struct fs_context *fc)
1426{
1427 if (fc->s_fs_info)
1428 put_net(fc->s_fs_info);
1429}
1430
1431static const struct fs_context_operations rpc_fs_context_ops = {
1432 .free = rpc_fs_free_fc,
1433 .get_tree = rpc_fs_get_tree,
1434};
1435
1436static int rpc_init_fs_context(struct fs_context *fc)
1437{
1438 put_user_ns(fc->user_ns);
1439 fc->user_ns = get_user_ns(fc->net_ns->user_ns);
1440 fc->ops = &rpc_fs_context_ops;
1441 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001442}
1443
Trond Myklebust09acfea2012-03-11 15:22:54 -04001444static void rpc_kill_sb(struct super_block *sb)
Stanislav Kinsbursky021c68d2011-12-26 15:39:04 +03001445{
1446 struct net *net = sb->s_fs_info;
Stanislav Kinsbursky90c4e822011-12-26 15:39:30 +03001447 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
Stanislav Kinsbursky021c68d2011-12-26 15:39:04 +03001448
Stanislav Kinsburskyc21a5882011-12-26 15:39:39 +03001449 mutex_lock(&sn->pipefs_sb_lock);
Trond Myklebust642fe4d2012-11-08 10:01:26 -05001450 if (sn->pipefs_sb != sb) {
1451 mutex_unlock(&sn->pipefs_sb_lock);
1452 goto out;
1453 }
Stanislav Kinsbursky90c4e822011-12-26 15:39:30 +03001454 sn->pipefs_sb = NULL;
Vasily Averin6c67a3e4a2017-11-08 08:57:32 +03001455 dprintk("RPC: sending pipefs UMOUNT notification for net %x%s\n",
1456 net->ns.inum, NET_NAME(net));
Stanislav Kinsbursky2d001312011-12-26 15:39:13 +03001457 blocking_notifier_call_chain(&rpc_pipefs_notifier_list,
1458 RPC_PIPEFS_UMOUNT,
1459 sb);
Stanislav Kinsburskyadb6fa72013-06-26 10:15:14 +04001460 mutex_unlock(&sn->pipefs_sb_lock);
Trond Myklebust642fe4d2012-11-08 10:01:26 -05001461out:
Stanislav Kinsbursky021c68d2011-12-26 15:39:04 +03001462 kill_litter_super(sb);
Eric W. Biedermand91ee872016-05-23 14:51:59 -05001463 put_net(net);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001464}
1465
1466static struct file_system_type rpc_pipe_fs_type = {
1467 .owner = THIS_MODULE,
1468 .name = "rpc_pipefs",
David Howellsb9662f32019-03-25 16:38:28 +00001469 .init_fs_context = rpc_init_fs_context,
Stanislav Kinsbursky021c68d2011-12-26 15:39:04 +03001470 .kill_sb = rpc_kill_sb,
Linus Torvalds1da177e2005-04-16 15:20:36 -07001471};
Eric W. Biederman7f78e032013-03-02 19:39:14 -08001472MODULE_ALIAS_FS("rpc_pipefs");
Eric W. Biedermanfa7614dd2013-03-12 18:27:41 -07001473MODULE_ALIAS("rpc_pipefs");
Linus Torvalds1da177e2005-04-16 15:20:36 -07001474
1475static void
Alexey Dobriyan51cc5062008-07-25 19:45:34 -07001476init_once(void *foo)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001477{
1478 struct rpc_inode *rpci = (struct rpc_inode *) foo;
1479
Christoph Lametera35afb82007-05-16 22:10:57 -07001480 inode_init_once(&rpci->vfs_inode);
1481 rpci->private = NULL;
Stanislav Kinsburskyba9e0972011-12-26 15:43:32 +03001482 rpci->pipe = NULL;
Christoph Lametera35afb82007-05-16 22:10:57 -07001483 init_waitqueue_head(&rpci->waitq);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001484}
1485
1486int register_rpc_pipefs(void)
1487{
Akinobu Mita5bd5f582007-05-09 02:34:51 -07001488 int err;
1489
Linus Torvalds1da177e2005-04-16 15:20:36 -07001490 rpc_inode_cachep = kmem_cache_create("rpc_inode_cache",
Paul Jacksonfffb60f2006-03-24 03:16:06 -08001491 sizeof(struct rpc_inode),
1492 0, (SLAB_HWCACHE_ALIGN|SLAB_RECLAIM_ACCOUNT|
Vladimir Davydov5d097052016-01-14 15:18:21 -08001493 SLAB_MEM_SPREAD|SLAB_ACCOUNT),
Paul Mundt20c2df82007-07-20 10:11:58 +09001494 init_once);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001495 if (!rpc_inode_cachep)
1496 return -ENOMEM;
Stanislav Kinsbursky80df9d22012-01-11 19:18:17 +04001497 err = rpc_clients_notifier_register();
1498 if (err)
1499 goto err_notifier;
Akinobu Mita5bd5f582007-05-09 02:34:51 -07001500 err = register_filesystem(&rpc_pipe_fs_type);
Stanislav Kinsbursky80df9d22012-01-11 19:18:17 +04001501 if (err)
1502 goto err_register;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001503 return 0;
Stanislav Kinsbursky80df9d22012-01-11 19:18:17 +04001504
1505err_register:
1506 rpc_clients_notifier_unregister();
1507err_notifier:
1508 kmem_cache_destroy(rpc_inode_cachep);
1509 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001510}
1511
1512void unregister_rpc_pipefs(void)
1513{
Stanislav Kinsbursky80df9d22012-01-11 19:18:17 +04001514 rpc_clients_notifier_unregister();
Linus Torvalds1da177e2005-04-16 15:20:36 -07001515 unregister_filesystem(&rpc_pipe_fs_type);
Dan Aloni4a400f02020-06-26 10:23:16 +03001516 kmem_cache_destroy(rpc_inode_cachep);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001517}