Merge tag 'fbdev-v4.21' of git://github.com/bzolnier/linux
[linux-2.6-block.git] / fs / nfsd / nfs4recover.c
CommitLineData
a55370a3 1/*
a55370a3 2* Copyright (c) 2004 The Regents of the University of Michigan.
f3f80148 3* Copyright (c) 2012 Jeff Layton <jlayton@redhat.com>
a55370a3
N
4* All rights reserved.
5*
6* Andy Adamson <andros@citi.umich.edu>
7*
8* Redistribution and use in source and binary forms, with or without
9* modification, are permitted provided that the following conditions
10* are met:
11*
12* 1. Redistributions of source code must retain the above copyright
13* notice, this list of conditions and the following disclaimer.
14* 2. Redistributions in binary form must reproduce the above copyright
15* notice, this list of conditions and the following disclaimer in the
16* documentation and/or other materials provided with the distribution.
17* 3. Neither the name of the University nor the names of its
18* contributors may be used to endorse or promote products derived
19* from this software without specific prior written permission.
20*
21* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
22* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
23* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
24* DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
26* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
27* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
28* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
29* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
30* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
31* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32*
33*/
34
1edb82d2 35#include <crypto/hash.h>
190e4fbf 36#include <linux/file.h>
5a0e3ad6 37#include <linux/slab.h>
190e4fbf 38#include <linux/namei.h>
e8edc6e0 39#include <linux/sched.h>
f3f80148 40#include <linux/fs.h>
813fd320 41#include <linux/module.h>
f3f80148
JL
42#include <net/net_namespace.h>
43#include <linux/sunrpc/rpc_pipe_fs.h>
44#include <linux/sunrpc/clnt.h>
45#include <linux/nfsd/cld.h>
9a74af21
BH
46
47#include "nfsd.h"
48#include "state.h"
0a3adade 49#include "vfs.h"
f3f80148 50#include "netns.h"
a55370a3
N
51
52#define NFSDDBG_FACILITY NFSDDBG_PROC
53
2a4317c5
JL
54/* Declarations */
55struct nfsd4_client_tracking_ops {
56 int (*init)(struct net *);
57 void (*exit)(struct net *);
58 void (*create)(struct nfs4_client *);
59 void (*remove)(struct nfs4_client *);
60 int (*check)(struct nfs4_client *);
919b8049 61 void (*grace_done)(struct nfsd_net *);
2a4317c5
JL
62};
63
190e4fbf 64/* Globals */
48483bf2 65static char user_recovery_dirname[PATH_MAX] = "/var/lib/nfs/v4recovery";
190e4fbf 66
d84f4f99
DH
67static int
68nfs4_save_creds(const struct cred **original_creds)
190e4fbf 69{
d84f4f99
DH
70 struct cred *new;
71
72 new = prepare_creds();
73 if (!new)
74 return -ENOMEM;
75
6fab8779
EB
76 new->fsuid = GLOBAL_ROOT_UID;
77 new->fsgid = GLOBAL_ROOT_GID;
d84f4f99
DH
78 *original_creds = override_creds(new);
79 put_cred(new);
80 return 0;
190e4fbf
N
81}
82
83static void
d84f4f99 84nfs4_reset_creds(const struct cred *original)
190e4fbf 85{
d84f4f99 86 revert_creds(original);
190e4fbf
N
87}
88
a55370a3
N
89static void
90md5_to_hex(char *out, char *md5)
91{
92 int i;
93
94 for (i=0; i<16; i++) {
95 unsigned char c = md5[i];
96
97 *out++ = '0' + ((c&0xf0)>>4) + (c>=0xa0)*('a'-'9'-1);
98 *out++ = '0' + (c&0x0f) + ((c&0x0f)>=0x0a)*('a'-'9'-1);
99 }
100 *out = '\0';
101}
102
2216d449
JL
103static int
104nfs4_make_rec_clidname(char *dname, const struct xdr_netobj *clname)
a55370a3
N
105{
106 struct xdr_netobj cksum;
1edb82d2 107 struct crypto_shash *tfm;
2216d449 108 int status;
a55370a3
N
109
110 dprintk("NFSD: nfs4_make_rec_clidname for %.*s\n",
111 clname->len, clname->data);
1edb82d2
HX
112 tfm = crypto_alloc_shash("md5", 0, 0);
113 if (IS_ERR(tfm)) {
114 status = PTR_ERR(tfm);
35058687 115 goto out_no_tfm;
2216d449
JL
116 }
117
1edb82d2 118 cksum.len = crypto_shash_digestsize(tfm);
a55370a3 119 cksum.data = kmalloc(cksum.len, GFP_KERNEL);
2216d449
JL
120 if (cksum.data == NULL) {
121 status = -ENOMEM;
a55370a3 122 goto out;
2216d449 123 }
a55370a3 124
1edb82d2
HX
125 {
126 SHASH_DESC_ON_STACK(desc, tfm);
127
128 desc->tfm = tfm;
129 desc->flags = CRYPTO_TFM_REQ_MAY_SLEEP;
130
131 status = crypto_shash_digest(desc, clname->data, clname->len,
132 cksum.data);
133 shash_desc_zero(desc);
134 }
a55370a3 135
2216d449 136 if (status)
35058687 137 goto out;
a55370a3
N
138
139 md5_to_hex(dname, cksum.data);
140
2216d449 141 status = 0;
a55370a3 142out:
2bd9e7b6 143 kfree(cksum.data);
1edb82d2 144 crypto_free_shash(tfm);
35058687 145out_no_tfm:
a55370a3
N
146 return status;
147}
190e4fbf 148
2216d449
JL
149/*
150 * If we had an error generating the recdir name for the legacy tracker
151 * then warn the admin. If the error doesn't appear to be transient,
152 * then disable recovery tracking.
153 */
154static void
7255e716 155legacy_recdir_name_error(struct nfs4_client *clp, int error)
2216d449
JL
156{
157 printk(KERN_ERR "NFSD: unable to generate recoverydir "
158 "name (%d).\n", error);
159
160 /*
161 * if the algorithm just doesn't exist, then disable the recovery
162 * tracker altogether. The crypto libs will generally return this if
163 * FIPS is enabled as well.
164 */
165 if (error == -ENOENT) {
166 printk(KERN_ERR "NFSD: disabling legacy clientid tracking. "
167 "Reboot recovery will not function correctly!\n");
7255e716 168 nfsd4_client_tracking_exit(clp->net);
2216d449
JL
169 }
170}
171
2a4317c5
JL
172static void
173nfsd4_create_clid_dir(struct nfs4_client *clp)
c7b9a459 174{
d84f4f99 175 const struct cred *original_cred;
2216d449 176 char dname[HEXDIR_LEN];
e970a573 177 struct dentry *dir, *dentry;
0ce0c2b5 178 struct nfs4_client_reclaim *crp;
c7b9a459 179 int status;
52e19c09 180 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
c7b9a459 181
a52d726b 182 if (test_and_set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
7a6ef8c7 183 return;
3a073369 184 if (!nn->rec_file)
7a6ef8c7 185 return;
2216d449
JL
186
187 status = nfs4_make_rec_clidname(dname, &clp->cl_name);
188 if (status)
7255e716 189 return legacy_recdir_name_error(clp, status);
2216d449 190
d84f4f99
DH
191 status = nfs4_save_creds(&original_cred);
192 if (status < 0)
7a6ef8c7 193 return;
c7b9a459 194
3a073369 195 status = mnt_want_write_file(nn->rec_file);
4a55c101 196 if (status)
c2236f14 197 goto out_creds;
4a55c101 198
3a073369 199 dir = nn->rec_file->f_path.dentry;
c7b9a459 200 /* lock the parent */
5955102c 201 inode_lock(d_inode(dir));
c7b9a459 202
e970a573 203 dentry = lookup_one_len(dname, dir, HEXDIR_LEN-1);
c7b9a459
N
204 if (IS_ERR(dentry)) {
205 status = PTR_ERR(dentry);
206 goto out_unlock;
207 }
2b0143b5 208 if (d_really_is_positive(dentry))
aec39680
BF
209 /*
210 * In the 4.1 case, where we're called from
211 * reclaim_complete(), records from the previous reboot
212 * may still be left, so this is OK.
213 *
214 * In the 4.0 case, we should never get here; but we may
215 * as well be forgiving and just succeed silently.
216 */
c7b9a459 217 goto out_put;
2b0143b5 218 status = vfs_mkdir(d_inode(dir), dentry, S_IRWXU);
c7b9a459
N
219out_put:
220 dput(dentry);
221out_unlock:
5955102c 222 inode_unlock(d_inode(dir));
0ce0c2b5 223 if (status == 0) {
f141f79d 224 if (nn->in_grace) {
52e19c09 225 crp = nfs4_client_to_reclaim(dname, nn);
0ce0c2b5
JL
226 if (crp)
227 crp->cr_clp = clp;
228 }
3a073369 229 vfs_fsync(nn->rec_file, 0);
0ce0c2b5 230 } else {
6577aac0
BH
231 printk(KERN_ERR "NFSD: failed to write recovery record"
232 " (err %d); please check that %s exists"
233 " and is writeable", status,
234 user_recovery_dirname);
0ce0c2b5 235 }
3a073369 236 mnt_drop_write_file(nn->rec_file);
c2236f14 237out_creds:
d84f4f99 238 nfs4_reset_creds(original_cred);
c7b9a459
N
239}
240
52e19c09 241typedef int (recdir_func)(struct dentry *, struct dentry *, struct nfsd_net *);
190e4fbf 242
05f4f678
BF
243struct name_list {
244 char name[HEXDIR_LEN];
190e4fbf
N
245 struct list_head list;
246};
247
bb6f619b
AV
248struct nfs4_dir_ctx {
249 struct dir_context ctx;
250 struct list_head names;
251};
252
190e4fbf 253static int
ac7576f4 254nfsd4_build_namelist(struct dir_context *__ctx, const char *name, int namlen,
afefdbb2 255 loff_t offset, u64 ino, unsigned int d_type)
190e4fbf 256{
ac7576f4
MS
257 struct nfs4_dir_ctx *ctx =
258 container_of(__ctx, struct nfs4_dir_ctx, ctx);
05f4f678 259 struct name_list *entry;
190e4fbf 260
05f4f678 261 if (namlen != HEXDIR_LEN - 1)
b37ad28b 262 return 0;
05f4f678
BF
263 entry = kmalloc(sizeof(struct name_list), GFP_KERNEL);
264 if (entry == NULL)
190e4fbf 265 return -ENOMEM;
05f4f678
BF
266 memcpy(entry->name, name, HEXDIR_LEN - 1);
267 entry->name[HEXDIR_LEN - 1] = '\0';
bb6f619b 268 list_add(&entry->list, &ctx->names);
190e4fbf
N
269 return 0;
270}
271
272static int
52e19c09 273nfsd4_list_rec_dir(recdir_func *f, struct nfsd_net *nn)
190e4fbf 274{
d84f4f99 275 const struct cred *original_cred;
3a073369 276 struct dentry *dir = nn->rec_file->f_path.dentry;
ac6614b7
AV
277 struct nfs4_dir_ctx ctx = {
278 .ctx.actor = nfsd4_build_namelist,
279 .names = LIST_HEAD_INIT(ctx.names)
280 };
4691b271 281 struct name_list *entry, *tmp;
190e4fbf
N
282 int status;
283
d84f4f99
DH
284 status = nfs4_save_creds(&original_cred);
285 if (status < 0)
286 return status;
190e4fbf 287
3a073369 288 status = vfs_llseek(nn->rec_file, 0, SEEK_SET);
5b4b299c
AV
289 if (status < 0) {
290 nfs4_reset_creds(original_cred);
291 return status;
292 }
293
5c0ba4e0 294 status = iterate_dir(nn->rec_file, &ctx.ctx);
5955102c 295 inode_lock_nested(d_inode(dir), I_MUTEX_PARENT);
4691b271
KM
296
297 list_for_each_entry_safe(entry, tmp, &ctx.names, list) {
5b4b299c
AV
298 if (!status) {
299 struct dentry *dentry;
300 dentry = lookup_one_len(entry->name, dir, HEXDIR_LEN-1);
301 if (IS_ERR(dentry)) {
302 status = PTR_ERR(dentry);
303 break;
304 }
52e19c09 305 status = f(dir, dentry, nn);
5b4b299c 306 dput(dentry);
05f4f678 307 }
05f4f678
BF
308 list_del(&entry->list);
309 kfree(entry);
190e4fbf 310 }
5955102c 311 inode_unlock(d_inode(dir));
d84f4f99 312 nfs4_reset_creds(original_cred);
4691b271
KM
313
314 list_for_each_entry_safe(entry, tmp, &ctx.names, list) {
315 dprintk("NFSD: %s. Left entry %s\n", __func__, entry->name);
316 list_del(&entry->list);
317 kfree(entry);
318 }
190e4fbf
N
319 return status;
320}
321
c7b9a459 322static int
3a073369 323nfsd4_unlink_clid_dir(char *name, int namlen, struct nfsd_net *nn)
c7b9a459 324{
e970a573 325 struct dentry *dir, *dentry;
c7b9a459
N
326 int status;
327
328 dprintk("NFSD: nfsd4_unlink_clid_dir. name %.*s\n", namlen, name);
329
3a073369 330 dir = nn->rec_file->f_path.dentry;
5955102c 331 inode_lock_nested(d_inode(dir), I_MUTEX_PARENT);
e970a573 332 dentry = lookup_one_len(name, dir, namlen);
c7b9a459
N
333 if (IS_ERR(dentry)) {
334 status = PTR_ERR(dentry);
2f9092e1 335 goto out_unlock;
c7b9a459
N
336 }
337 status = -ENOENT;
2b0143b5 338 if (d_really_is_negative(dentry))
c7b9a459 339 goto out;
2b0143b5 340 status = vfs_rmdir(d_inode(dir), dentry);
c7b9a459
N
341out:
342 dput(dentry);
2f9092e1 343out_unlock:
5955102c 344 inode_unlock(d_inode(dir));
c7b9a459
N
345 return status;
346}
347
2a4317c5 348static void
c7b9a459
N
349nfsd4_remove_clid_dir(struct nfs4_client *clp)
350{
d84f4f99 351 const struct cred *original_cred;
0ce0c2b5 352 struct nfs4_client_reclaim *crp;
2216d449 353 char dname[HEXDIR_LEN];
c7b9a459 354 int status;
52e19c09 355 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
c7b9a459 356
3a073369 357 if (!nn->rec_file || !test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
c7b9a459
N
358 return;
359
2216d449
JL
360 status = nfs4_make_rec_clidname(dname, &clp->cl_name);
361 if (status)
7255e716 362 return legacy_recdir_name_error(clp, status);
2216d449 363
3a073369 364 status = mnt_want_write_file(nn->rec_file);
0622753b
DH
365 if (status)
366 goto out;
a52d726b 367 clear_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
d84f4f99
DH
368
369 status = nfs4_save_creds(&original_cred);
370 if (status < 0)
698d8d87 371 goto out_drop_write;
d84f4f99 372
3a073369 373 status = nfsd4_unlink_clid_dir(dname, HEXDIR_LEN-1, nn);
d84f4f99 374 nfs4_reset_creds(original_cred);
0ce0c2b5 375 if (status == 0) {
3a073369 376 vfs_fsync(nn->rec_file, 0);
f141f79d 377 if (nn->in_grace) {
0ce0c2b5 378 /* remove reclaim record */
52e19c09 379 crp = nfsd4_find_reclaim_client(dname, nn);
0ce0c2b5 380 if (crp)
52e19c09 381 nfs4_remove_reclaim_record(crp, nn);
0ce0c2b5
JL
382 }
383 }
698d8d87 384out_drop_write:
3a073369 385 mnt_drop_write_file(nn->rec_file);
0622753b 386out:
c7b9a459
N
387 if (status)
388 printk("NFSD: Failed to remove expired client state directory"
2216d449 389 " %.*s\n", HEXDIR_LEN, dname);
c7b9a459
N
390}
391
392static int
52e19c09 393purge_old(struct dentry *parent, struct dentry *child, struct nfsd_net *nn)
c7b9a459
N
394{
395 int status;
396
52e19c09 397 if (nfs4_has_reclaimed_state(child->d_name.name, nn))
b37ad28b 398 return 0;
c7b9a459 399
2b0143b5 400 status = vfs_rmdir(d_inode(parent), child);
c7b9a459 401 if (status)
a6a9f18f
AV
402 printk("failed to remove client recovery directory %pd\n",
403 child);
c7b9a459 404 /* Keep trying, success or failure: */
b37ad28b 405 return 0;
c7b9a459
N
406}
407
2a4317c5 408static void
919b8049 409nfsd4_recdir_purge_old(struct nfsd_net *nn)
2a4317c5 410{
c7b9a459
N
411 int status;
412
f141f79d 413 nn->in_grace = false;
3a073369 414 if (!nn->rec_file)
c7b9a459 415 return;
3a073369 416 status = mnt_want_write_file(nn->rec_file);
0622753b
DH
417 if (status)
418 goto out;
52e19c09 419 status = nfsd4_list_rec_dir(purge_old, nn);
c7b9a459 420 if (status == 0)
3a073369
SK
421 vfs_fsync(nn->rec_file, 0);
422 mnt_drop_write_file(nn->rec_file);
0622753b 423out:
52e19c09 424 nfs4_release_reclaim(nn);
c7b9a459
N
425 if (status)
426 printk("nfsd4: failed to purge old clients from recovery"
a6a9f18f 427 " directory %pD\n", nn->rec_file);
c7b9a459
N
428}
429
190e4fbf 430static int
52e19c09 431load_recdir(struct dentry *parent, struct dentry *child, struct nfsd_net *nn)
190e4fbf
N
432{
433 if (child->d_name.len != HEXDIR_LEN - 1) {
a6a9f18f
AV
434 printk("nfsd4: illegal name %pd in recovery directory\n",
435 child);
190e4fbf 436 /* Keep trying; maybe the others are OK: */
b37ad28b 437 return 0;
190e4fbf 438 }
52e19c09 439 nfs4_client_to_reclaim(child->d_name.name, nn);
b37ad28b 440 return 0;
190e4fbf
N
441}
442
2a4317c5 443static int
52e19c09 444nfsd4_recdir_load(struct net *net) {
190e4fbf 445 int status;
52e19c09 446 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
190e4fbf 447
3a073369 448 if (!nn->rec_file)
e970a573
CH
449 return 0;
450
52e19c09 451 status = nfsd4_list_rec_dir(load_recdir, nn);
190e4fbf
N
452 if (status)
453 printk("nfsd4: failed loading clients from recovery"
a6a9f18f 454 " directory %pD\n", nn->rec_file);
190e4fbf
N
455 return status;
456}
457
458/*
459 * Hold reference to the recovery directory.
460 */
461
2a4317c5 462static int
3a073369 463nfsd4_init_recdir(struct net *net)
190e4fbf 464{
3a073369 465 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
d84f4f99
DH
466 const struct cred *original_cred;
467 int status;
190e4fbf
N
468
469 printk("NFSD: Using %s as the NFSv4 state recovery directory\n",
48483bf2 470 user_recovery_dirname);
190e4fbf 471
3a073369 472 BUG_ON(nn->rec_file);
190e4fbf 473
d84f4f99
DH
474 status = nfs4_save_creds(&original_cred);
475 if (status < 0) {
476 printk("NFSD: Unable to change credentials to find recovery"
477 " directory: error %d\n",
478 status);
2a4317c5 479 return status;
d84f4f99 480 }
190e4fbf 481
3a073369
SK
482 nn->rec_file = filp_open(user_recovery_dirname, O_RDONLY | O_DIRECTORY, 0);
483 if (IS_ERR(nn->rec_file)) {
c2642ab0 484 printk("NFSD: unable to find recovery directory %s\n",
48483bf2 485 user_recovery_dirname);
3a073369
SK
486 status = PTR_ERR(nn->rec_file);
487 nn->rec_file = NULL;
e970a573 488 }
190e4fbf 489
d84f4f99 490 nfs4_reset_creds(original_cred);
0ce0c2b5 491 if (!status)
f141f79d 492 nn->in_grace = true;
2a4317c5 493 return status;
190e4fbf
N
494}
495
15d176c1
KM
496static void
497nfsd4_shutdown_recdir(struct net *net)
498{
499 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
500
501 if (!nn->rec_file)
502 return;
503 fput(nn->rec_file);
504 nn->rec_file = NULL;
505}
52e19c09
SK
506
507static int
508nfs4_legacy_state_init(struct net *net)
509{
510 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
511 int i;
512
6da2ec56
KC
513 nn->reclaim_str_hashtbl = kmalloc_array(CLIENT_HASH_SIZE,
514 sizeof(struct list_head),
515 GFP_KERNEL);
52e19c09
SK
516 if (!nn->reclaim_str_hashtbl)
517 return -ENOMEM;
518
519 for (i = 0; i < CLIENT_HASH_SIZE; i++)
520 INIT_LIST_HEAD(&nn->reclaim_str_hashtbl[i]);
521 nn->reclaim_str_hashtbl_size = 0;
522
523 return 0;
524}
525
526static void
527nfs4_legacy_state_shutdown(struct net *net)
528{
529 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
530
531 kfree(nn->reclaim_str_hashtbl);
532}
533
2a4317c5
JL
534static int
535nfsd4_load_reboot_recovery_data(struct net *net)
536{
537 int status;
538
3a073369 539 status = nfsd4_init_recdir(net);
52e19c09 540 if (status)
15d176c1
KM
541 return status;
542
543 status = nfsd4_recdir_load(net);
544 if (status)
545 nfsd4_shutdown_recdir(net);
546
52e19c09
SK
547 return status;
548}
549
550static int
551nfsd4_legacy_tracking_init(struct net *net)
552{
553 int status;
554
cc27e0d4
JL
555 /* XXX: The legacy code won't work in a container */
556 if (net != &init_net) {
46cc8ba3 557 pr_warn("NFSD: attempt to initialize legacy client tracking in a container ignored.\n");
cc27e0d4
JL
558 return -EINVAL;
559 }
560
52e19c09 561 status = nfs4_legacy_state_init(net);
2a4317c5 562 if (status)
52e19c09
SK
563 return status;
564
565 status = nfsd4_load_reboot_recovery_data(net);
566 if (status)
567 goto err;
568 return 0;
569
570err:
571 nfs4_legacy_state_shutdown(net);
2a4317c5
JL
572 return status;
573}
574
2a4317c5
JL
575static void
576nfsd4_legacy_tracking_exit(struct net *net)
577{
52e19c09
SK
578 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
579
580 nfs4_release_reclaim(nn);
15d176c1 581 nfsd4_shutdown_recdir(net);
52e19c09 582 nfs4_legacy_state_shutdown(net);
2a4317c5
JL
583}
584
48483bf2
BF
585/*
586 * Change the NFSv4 recovery directory to recdir.
587 */
588int
589nfs4_reset_recoverydir(char *recdir)
590{
591 int status;
592 struct path path;
593
594 status = kern_path(recdir, LOOKUP_FOLLOW, &path);
595 if (status)
596 return status;
597 status = -ENOTDIR;
e36cb0b8 598 if (d_is_dir(path.dentry)) {
48483bf2
BF
599 strcpy(user_recovery_dirname, recdir);
600 status = 0;
601 }
602 path_put(&path);
603 return status;
604}
605
606char *
607nfs4_recoverydir(void)
608{
609 return user_recovery_dirname;
610}
2a4317c5
JL
611
612static int
613nfsd4_check_legacy_client(struct nfs4_client *clp)
614{
2216d449
JL
615 int status;
616 char dname[HEXDIR_LEN];
0ce0c2b5 617 struct nfs4_client_reclaim *crp;
52e19c09 618 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
0ce0c2b5 619
2a4317c5
JL
620 /* did we already find that this client is stable? */
621 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
622 return 0;
623
2216d449
JL
624 status = nfs4_make_rec_clidname(dname, &clp->cl_name);
625 if (status) {
7255e716 626 legacy_recdir_name_error(clp, status);
2216d449
JL
627 return status;
628 }
629
2a4317c5 630 /* look for it in the reclaim hashtable otherwise */
52e19c09 631 crp = nfsd4_find_reclaim_client(dname, nn);
0ce0c2b5 632 if (crp) {
2a4317c5 633 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
0ce0c2b5 634 crp->cr_clp = clp;
2a4317c5
JL
635 return 0;
636 }
637
638 return -ENOENT;
639}
640
7c582e4f 641static const struct nfsd4_client_tracking_ops nfsd4_legacy_tracking_ops = {
52e19c09 642 .init = nfsd4_legacy_tracking_init,
2a4317c5
JL
643 .exit = nfsd4_legacy_tracking_exit,
644 .create = nfsd4_create_clid_dir,
645 .remove = nfsd4_remove_clid_dir,
646 .check = nfsd4_check_legacy_client,
647 .grace_done = nfsd4_recdir_purge_old,
648};
649
f3f80148
JL
650/* Globals */
651#define NFSD_PIPE_DIR "nfsd"
652#define NFSD_CLD_PIPE "cld"
653
654/* per-net-ns structure for holding cld upcall info */
655struct cld_net {
656 struct rpc_pipe *cn_pipe;
657 spinlock_t cn_lock;
658 struct list_head cn_list;
659 unsigned int cn_xid;
660};
661
662struct cld_upcall {
663 struct list_head cu_list;
664 struct cld_net *cu_net;
b493fd31 665 struct completion cu_done;
f3f80148
JL
666 struct cld_msg cu_msg;
667};
668
669static int
670__cld_pipe_upcall(struct rpc_pipe *pipe, struct cld_msg *cmsg)
671{
672 int ret;
673 struct rpc_pipe_msg msg;
b493fd31 674 struct cld_upcall *cup = container_of(cmsg, struct cld_upcall, cu_msg);
f3f80148
JL
675
676 memset(&msg, 0, sizeof(msg));
677 msg.data = cmsg;
678 msg.len = sizeof(*cmsg);
679
f3f80148
JL
680 ret = rpc_queue_upcall(pipe, &msg);
681 if (ret < 0) {
f3f80148
JL
682 goto out;
683 }
684
b493fd31 685 wait_for_completion(&cup->cu_done);
f3f80148
JL
686
687 if (msg.errno < 0)
688 ret = msg.errno;
689out:
690 return ret;
691}
692
693static int
694cld_pipe_upcall(struct rpc_pipe *pipe, struct cld_msg *cmsg)
695{
696 int ret;
697
698 /*
699 * -EAGAIN occurs when pipe is closed and reopened while there are
700 * upcalls queued.
701 */
702 do {
703 ret = __cld_pipe_upcall(pipe, cmsg);
704 } while (ret == -EAGAIN);
705
706 return ret;
707}
708
709static ssize_t
710cld_pipe_downcall(struct file *filp, const char __user *src, size_t mlen)
711{
712 struct cld_upcall *tmp, *cup;
bc1b542b 713 struct cld_msg __user *cmsg = (struct cld_msg __user *)src;
f3f80148 714 uint32_t xid;
ef8a1a10 715 struct nfsd_net *nn = net_generic(file_inode(filp)->i_sb->s_fs_info,
f3f80148
JL
716 nfsd_net_id);
717 struct cld_net *cn = nn->cld_net;
718
719 if (mlen != sizeof(*cmsg)) {
8a7dc4b0 720 dprintk("%s: got %zu bytes, expected %zu\n", __func__, mlen,
f3f80148
JL
721 sizeof(*cmsg));
722 return -EINVAL;
723 }
724
725 /* copy just the xid so we can try to find that */
726 if (copy_from_user(&xid, &cmsg->cm_xid, sizeof(xid)) != 0) {
727 dprintk("%s: error when copying xid from userspace", __func__);
728 return -EFAULT;
729 }
730
731 /* walk the list and find corresponding xid */
732 cup = NULL;
733 spin_lock(&cn->cn_lock);
734 list_for_each_entry(tmp, &cn->cn_list, cu_list) {
735 if (get_unaligned(&tmp->cu_msg.cm_xid) == xid) {
736 cup = tmp;
737 list_del_init(&cup->cu_list);
738 break;
739 }
740 }
741 spin_unlock(&cn->cn_lock);
742
743 /* couldn't find upcall? */
744 if (!cup) {
21f72c9f 745 dprintk("%s: couldn't find upcall -- xid=%u\n", __func__, xid);
f3f80148
JL
746 return -EINVAL;
747 }
748
749 if (copy_from_user(&cup->cu_msg, src, mlen) != 0)
750 return -EFAULT;
751
b493fd31 752 complete(&cup->cu_done);
f3f80148
JL
753 return mlen;
754}
755
756static void
757cld_pipe_destroy_msg(struct rpc_pipe_msg *msg)
758{
759 struct cld_msg *cmsg = msg->data;
760 struct cld_upcall *cup = container_of(cmsg, struct cld_upcall,
761 cu_msg);
762
763 /* errno >= 0 means we got a downcall */
764 if (msg->errno >= 0)
765 return;
766
b493fd31 767 complete(&cup->cu_done);
f3f80148
JL
768}
769
770static const struct rpc_pipe_ops cld_upcall_ops = {
771 .upcall = rpc_pipe_generic_upcall,
772 .downcall = cld_pipe_downcall,
773 .destroy_msg = cld_pipe_destroy_msg,
774};
775
776static struct dentry *
777nfsd4_cld_register_sb(struct super_block *sb, struct rpc_pipe *pipe)
778{
779 struct dentry *dir, *dentry;
780
781 dir = rpc_d_lookup_sb(sb, NFSD_PIPE_DIR);
782 if (dir == NULL)
783 return ERR_PTR(-ENOENT);
784 dentry = rpc_mkpipe_dentry(dir, NFSD_CLD_PIPE, NULL, pipe);
785 dput(dir);
786 return dentry;
787}
788
789static void
790nfsd4_cld_unregister_sb(struct rpc_pipe *pipe)
791{
792 if (pipe->dentry)
793 rpc_unlink(pipe->dentry);
794}
795
796static struct dentry *
797nfsd4_cld_register_net(struct net *net, struct rpc_pipe *pipe)
798{
799 struct super_block *sb;
800 struct dentry *dentry;
801
802 sb = rpc_get_sb_net(net);
803 if (!sb)
804 return NULL;
805 dentry = nfsd4_cld_register_sb(sb, pipe);
806 rpc_put_sb_net(net);
807 return dentry;
808}
809
810static void
811nfsd4_cld_unregister_net(struct net *net, struct rpc_pipe *pipe)
812{
813 struct super_block *sb;
814
815 sb = rpc_get_sb_net(net);
816 if (sb) {
817 nfsd4_cld_unregister_sb(pipe);
818 rpc_put_sb_net(net);
819 }
820}
821
822/* Initialize rpc_pipefs pipe for communication with client tracking daemon */
823static int
824nfsd4_init_cld_pipe(struct net *net)
825{
826 int ret;
827 struct dentry *dentry;
828 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
829 struct cld_net *cn;
830
831 if (nn->cld_net)
832 return 0;
833
834 cn = kzalloc(sizeof(*cn), GFP_KERNEL);
835 if (!cn) {
836 ret = -ENOMEM;
837 goto err;
838 }
839
840 cn->cn_pipe = rpc_mkpipe_data(&cld_upcall_ops, RPC_PIPE_WAIT_FOR_OPEN);
841 if (IS_ERR(cn->cn_pipe)) {
842 ret = PTR_ERR(cn->cn_pipe);
843 goto err;
844 }
845 spin_lock_init(&cn->cn_lock);
846 INIT_LIST_HEAD(&cn->cn_list);
847
848 dentry = nfsd4_cld_register_net(net, cn->cn_pipe);
849 if (IS_ERR(dentry)) {
850 ret = PTR_ERR(dentry);
851 goto err_destroy_data;
852 }
853
854 cn->cn_pipe->dentry = dentry;
855 nn->cld_net = cn;
856 return 0;
857
858err_destroy_data:
859 rpc_destroy_pipe_data(cn->cn_pipe);
860err:
861 kfree(cn);
862 printk(KERN_ERR "NFSD: unable to create nfsdcld upcall pipe (%d)\n",
863 ret);
864 return ret;
865}
866
867static void
868nfsd4_remove_cld_pipe(struct net *net)
869{
870 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
871 struct cld_net *cn = nn->cld_net;
872
873 nfsd4_cld_unregister_net(net, cn->cn_pipe);
874 rpc_destroy_pipe_data(cn->cn_pipe);
875 kfree(nn->cld_net);
876 nn->cld_net = NULL;
877}
878
879static struct cld_upcall *
880alloc_cld_upcall(struct cld_net *cn)
881{
882 struct cld_upcall *new, *tmp;
883
884 new = kzalloc(sizeof(*new), GFP_KERNEL);
885 if (!new)
886 return new;
887
888 /* FIXME: hard cap on number in flight? */
889restart_search:
890 spin_lock(&cn->cn_lock);
891 list_for_each_entry(tmp, &cn->cn_list, cu_list) {
892 if (tmp->cu_msg.cm_xid == cn->cn_xid) {
893 cn->cn_xid++;
894 spin_unlock(&cn->cn_lock);
895 goto restart_search;
896 }
897 }
b493fd31 898 init_completion(&new->cu_done);
f3f80148
JL
899 new->cu_msg.cm_vers = CLD_UPCALL_VERSION;
900 put_unaligned(cn->cn_xid++, &new->cu_msg.cm_xid);
901 new->cu_net = cn;
902 list_add(&new->cu_list, &cn->cn_list);
903 spin_unlock(&cn->cn_lock);
904
905 dprintk("%s: allocated xid %u\n", __func__, new->cu_msg.cm_xid);
906
907 return new;
908}
909
910static void
911free_cld_upcall(struct cld_upcall *victim)
912{
913 struct cld_net *cn = victim->cu_net;
914
915 spin_lock(&cn->cn_lock);
916 list_del(&victim->cu_list);
917 spin_unlock(&cn->cn_lock);
918 kfree(victim);
919}
920
921/* Ask daemon to create a new record */
922static void
923nfsd4_cld_create(struct nfs4_client *clp)
924{
925 int ret;
926 struct cld_upcall *cup;
c212cecf 927 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
f3f80148
JL
928 struct cld_net *cn = nn->cld_net;
929
930 /* Don't upcall if it's already stored */
931 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
932 return;
933
934 cup = alloc_cld_upcall(cn);
935 if (!cup) {
936 ret = -ENOMEM;
937 goto out_err;
938 }
939
940 cup->cu_msg.cm_cmd = Cld_Create;
941 cup->cu_msg.cm_u.cm_name.cn_len = clp->cl_name.len;
942 memcpy(cup->cu_msg.cm_u.cm_name.cn_id, clp->cl_name.data,
943 clp->cl_name.len);
944
945 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
946 if (!ret) {
947 ret = cup->cu_msg.cm_status;
948 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
949 }
950
951 free_cld_upcall(cup);
952out_err:
953 if (ret)
954 printk(KERN_ERR "NFSD: Unable to create client "
955 "record on stable storage: %d\n", ret);
956}
957
958/* Ask daemon to create a new record */
959static void
960nfsd4_cld_remove(struct nfs4_client *clp)
961{
962 int ret;
963 struct cld_upcall *cup;
c212cecf 964 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
f3f80148
JL
965 struct cld_net *cn = nn->cld_net;
966
967 /* Don't upcall if it's already removed */
968 if (!test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
969 return;
970
971 cup = alloc_cld_upcall(cn);
972 if (!cup) {
973 ret = -ENOMEM;
974 goto out_err;
975 }
976
977 cup->cu_msg.cm_cmd = Cld_Remove;
978 cup->cu_msg.cm_u.cm_name.cn_len = clp->cl_name.len;
979 memcpy(cup->cu_msg.cm_u.cm_name.cn_id, clp->cl_name.data,
980 clp->cl_name.len);
981
982 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
983 if (!ret) {
984 ret = cup->cu_msg.cm_status;
985 clear_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
986 }
987
988 free_cld_upcall(cup);
989out_err:
990 if (ret)
991 printk(KERN_ERR "NFSD: Unable to remove client "
992 "record from stable storage: %d\n", ret);
993}
994
995/* Check for presence of a record, and update its timestamp */
996static int
997nfsd4_cld_check(struct nfs4_client *clp)
998{
999 int ret;
1000 struct cld_upcall *cup;
c212cecf 1001 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
f3f80148
JL
1002 struct cld_net *cn = nn->cld_net;
1003
1004 /* Don't upcall if one was already stored during this grace pd */
1005 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
1006 return 0;
1007
1008 cup = alloc_cld_upcall(cn);
1009 if (!cup) {
1010 printk(KERN_ERR "NFSD: Unable to check client record on "
1011 "stable storage: %d\n", -ENOMEM);
1012 return -ENOMEM;
1013 }
1014
1015 cup->cu_msg.cm_cmd = Cld_Check;
1016 cup->cu_msg.cm_u.cm_name.cn_len = clp->cl_name.len;
1017 memcpy(cup->cu_msg.cm_u.cm_name.cn_id, clp->cl_name.data,
1018 clp->cl_name.len);
1019
1020 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
1021 if (!ret) {
1022 ret = cup->cu_msg.cm_status;
1023 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
1024 }
1025
1026 free_cld_upcall(cup);
1027 return ret;
1028}
1029
1030static void
919b8049 1031nfsd4_cld_grace_done(struct nfsd_net *nn)
f3f80148
JL
1032{
1033 int ret;
1034 struct cld_upcall *cup;
f3f80148
JL
1035 struct cld_net *cn = nn->cld_net;
1036
1037 cup = alloc_cld_upcall(cn);
1038 if (!cup) {
1039 ret = -ENOMEM;
1040 goto out_err;
1041 }
1042
1043 cup->cu_msg.cm_cmd = Cld_GraceDone;
919b8049 1044 cup->cu_msg.cm_u.cm_gracetime = (int64_t)nn->boot_time;
f3f80148
JL
1045 ret = cld_pipe_upcall(cn->cn_pipe, &cup->cu_msg);
1046 if (!ret)
1047 ret = cup->cu_msg.cm_status;
1048
1049 free_cld_upcall(cup);
1050out_err:
1051 if (ret)
1052 printk(KERN_ERR "NFSD: Unable to end grace period: %d\n", ret);
1053}
1054
7c582e4f 1055static const struct nfsd4_client_tracking_ops nfsd4_cld_tracking_ops = {
f3f80148
JL
1056 .init = nfsd4_init_cld_pipe,
1057 .exit = nfsd4_remove_cld_pipe,
1058 .create = nfsd4_cld_create,
1059 .remove = nfsd4_cld_remove,
1060 .check = nfsd4_cld_check,
1061 .grace_done = nfsd4_cld_grace_done,
1062};
1063
2873d214
JL
1064/* upcall via usermodehelper */
1065static char cltrack_prog[PATH_MAX] = "/sbin/nfsdcltrack";
1066module_param_string(cltrack_prog, cltrack_prog, sizeof(cltrack_prog),
1067 S_IRUGO|S_IWUSR);
1068MODULE_PARM_DESC(cltrack_prog, "Path to the nfsdcltrack upcall program");
1069
f3aa7e24
JL
1070static bool cltrack_legacy_disable;
1071module_param(cltrack_legacy_disable, bool, S_IRUGO|S_IWUSR);
1072MODULE_PARM_DESC(cltrack_legacy_disable,
1073 "Disable legacy recoverydir conversion. Default: false");
1074
1075#define LEGACY_TOPDIR_ENV_PREFIX "NFSDCLTRACK_LEGACY_TOPDIR="
1076#define LEGACY_RECDIR_ENV_PREFIX "NFSDCLTRACK_LEGACY_RECDIR="
d4318acd
JL
1077#define HAS_SESSION_ENV_PREFIX "NFSDCLTRACK_CLIENT_HAS_SESSION="
1078#define GRACE_START_ENV_PREFIX "NFSDCLTRACK_GRACE_START="
f3aa7e24
JL
1079
1080static char *
1081nfsd4_cltrack_legacy_topdir(void)
1082{
1083 int copied;
1084 size_t len;
1085 char *result;
1086
1087 if (cltrack_legacy_disable)
1088 return NULL;
1089
1090 len = strlen(LEGACY_TOPDIR_ENV_PREFIX) +
1091 strlen(nfs4_recoverydir()) + 1;
1092
1093 result = kmalloc(len, GFP_KERNEL);
1094 if (!result)
1095 return result;
1096
1097 copied = snprintf(result, len, LEGACY_TOPDIR_ENV_PREFIX "%s",
1098 nfs4_recoverydir());
1099 if (copied >= len) {
1100 /* just return nothing if output was truncated */
1101 kfree(result);
1102 return NULL;
1103 }
1104
1105 return result;
1106}
1107
1108static char *
2216d449 1109nfsd4_cltrack_legacy_recdir(const struct xdr_netobj *name)
f3aa7e24
JL
1110{
1111 int copied;
1112 size_t len;
1113 char *result;
1114
1115 if (cltrack_legacy_disable)
1116 return NULL;
1117
1118 /* +1 is for '/' between "topdir" and "recdir" */
1119 len = strlen(LEGACY_RECDIR_ENV_PREFIX) +
1120 strlen(nfs4_recoverydir()) + 1 + HEXDIR_LEN;
1121
1122 result = kmalloc(len, GFP_KERNEL);
1123 if (!result)
1124 return result;
1125
2216d449
JL
1126 copied = snprintf(result, len, LEGACY_RECDIR_ENV_PREFIX "%s/",
1127 nfs4_recoverydir());
1128 if (copied > (len - HEXDIR_LEN)) {
1129 /* just return nothing if output will be truncated */
1130 kfree(result);
1131 return NULL;
1132 }
1133
1134 copied = nfs4_make_rec_clidname(result + copied, name);
1135 if (copied) {
f3aa7e24
JL
1136 kfree(result);
1137 return NULL;
1138 }
1139
1140 return result;
1141}
1142
d4318acd
JL
1143static char *
1144nfsd4_cltrack_client_has_session(struct nfs4_client *clp)
1145{
1146 int copied;
1147 size_t len;
1148 char *result;
1149
1150 /* prefix + Y/N character + terminating NULL */
1151 len = strlen(HAS_SESSION_ENV_PREFIX) + 1 + 1;
1152
1153 result = kmalloc(len, GFP_KERNEL);
1154 if (!result)
1155 return result;
1156
1157 copied = snprintf(result, len, HAS_SESSION_ENV_PREFIX "%c",
1158 clp->cl_minorversion ? 'Y' : 'N');
1159 if (copied >= len) {
1160 /* just return nothing if output was truncated */
1161 kfree(result);
1162 return NULL;
1163 }
1164
1165 return result;
1166}
1167
1168static char *
1169nfsd4_cltrack_grace_start(time_t grace_start)
1170{
1171 int copied;
1172 size_t len;
1173 char *result;
1174
1175 /* prefix + max width of int64_t string + terminating NULL */
1176 len = strlen(GRACE_START_ENV_PREFIX) + 22 + 1;
1177
1178 result = kmalloc(len, GFP_KERNEL);
1179 if (!result)
1180 return result;
1181
1182 copied = snprintf(result, len, GRACE_START_ENV_PREFIX "%ld",
1183 grace_start);
1184 if (copied >= len) {
1185 /* just return nothing if output was truncated */
1186 kfree(result);
1187 return NULL;
1188 }
1189
1190 return result;
1191}
1192
2873d214 1193static int
d4318acd 1194nfsd4_umh_cltrack_upcall(char *cmd, char *arg, char *env0, char *env1)
2873d214 1195{
d4318acd 1196 char *envp[3];
2873d214
JL
1197 char *argv[4];
1198 int ret;
1199
1200 if (unlikely(!cltrack_prog[0])) {
1201 dprintk("%s: cltrack_prog is disabled\n", __func__);
1202 return -EACCES;
1203 }
1204
1205 dprintk("%s: cmd: %s\n", __func__, cmd);
1206 dprintk("%s: arg: %s\n", __func__, arg ? arg : "(null)");
d4318acd
JL
1207 dprintk("%s: env0: %s\n", __func__, env0 ? env0 : "(null)");
1208 dprintk("%s: env1: %s\n", __func__, env1 ? env1 : "(null)");
f3aa7e24 1209
d4318acd
JL
1210 envp[0] = env0;
1211 envp[1] = env1;
1212 envp[2] = NULL;
2873d214
JL
1213
1214 argv[0] = (char *)cltrack_prog;
1215 argv[1] = cmd;
1216 argv[2] = arg;
1217 argv[3] = NULL;
1218
1219 ret = call_usermodehelper(argv[0], argv, envp, UMH_WAIT_PROC);
1220 /*
1221 * Disable the upcall mechanism if we're getting an ENOENT or EACCES
1222 * error. The admin can re-enable it on the fly by using sysfs
1223 * once the problem has been fixed.
1224 */
1225 if (ret == -ENOENT || ret == -EACCES) {
1226 dprintk("NFSD: %s was not found or isn't executable (%d). "
1227 "Setting cltrack_prog to blank string!",
1228 cltrack_prog, ret);
1229 cltrack_prog[0] = '\0';
1230 }
1231 dprintk("%s: %s return value: %d\n", __func__, cltrack_prog, ret);
1232
1233 return ret;
1234}
1235
1236static char *
1237bin_to_hex_dup(const unsigned char *src, int srclen)
1238{
1239 int i;
1240 char *buf, *hex;
1241
1242 /* +1 for terminating NULL */
1243 buf = kmalloc((srclen * 2) + 1, GFP_KERNEL);
1244 if (!buf)
1245 return buf;
1246
1247 hex = buf;
1248 for (i = 0; i < srclen; i++) {
1249 sprintf(hex, "%2.2x", *src++);
1250 hex += 2;
1251 }
1252 return buf;
1253}
1254
1255static int
d4318acd 1256nfsd4_umh_cltrack_init(struct net *net)
2873d214 1257{
d4318acd
JL
1258 int ret;
1259 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
1260 char *grace_start = nfsd4_cltrack_grace_start(nn->boot_time);
1261
71a50306
SK
1262 /* XXX: The usermode helper s not working in container yet. */
1263 if (net != &init_net) {
46cc8ba3 1264 pr_warn("NFSD: attempt to initialize umh client tracking in a container ignored.\n");
956ccef3 1265 kfree(grace_start);
71a50306
SK
1266 return -EINVAL;
1267 }
d4318acd
JL
1268
1269 ret = nfsd4_umh_cltrack_upcall("init", NULL, grace_start, NULL);
1270 kfree(grace_start);
1271 return ret;
2873d214
JL
1272}
1273
d682e750
JL
1274static void
1275nfsd4_cltrack_upcall_lock(struct nfs4_client *clp)
1276{
1277 wait_on_bit_lock(&clp->cl_flags, NFSD4_CLIENT_UPCALL_LOCK,
1278 TASK_UNINTERRUPTIBLE);
1279}
1280
1281static void
1282nfsd4_cltrack_upcall_unlock(struct nfs4_client *clp)
1283{
1284 smp_mb__before_atomic();
1285 clear_bit(NFSD4_CLIENT_UPCALL_LOCK, &clp->cl_flags);
1286 smp_mb__after_atomic();
1287 wake_up_bit(&clp->cl_flags, NFSD4_CLIENT_UPCALL_LOCK);
1288}
1289
2873d214
JL
1290static void
1291nfsd4_umh_cltrack_create(struct nfs4_client *clp)
1292{
d4318acd
JL
1293 char *hexid, *has_session, *grace_start;
1294 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
2873d214 1295
65decb65
JL
1296 /*
1297 * With v4.0 clients, there's little difference in outcome between a
1298 * create and check operation, and we can end up calling into this
1299 * function multiple times per client (once for each openowner). So,
1300 * for v4.0 clients skip upcalling once the client has been recorded
1301 * on stable storage.
1302 *
1303 * For v4.1+ clients, the outcome of the two operations is different,
1304 * so we must ensure that we upcall for the create operation. v4.1+
1305 * clients call this on RECLAIM_COMPLETE though, so we should only end
1306 * up doing a single create upcall per client.
1307 */
1308 if (clp->cl_minorversion == 0 &&
1309 test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
1310 return;
1311
2873d214
JL
1312 hexid = bin_to_hex_dup(clp->cl_name.data, clp->cl_name.len);
1313 if (!hexid) {
1314 dprintk("%s: can't allocate memory for upcall!\n", __func__);
1315 return;
1316 }
d682e750 1317
d4318acd
JL
1318 has_session = nfsd4_cltrack_client_has_session(clp);
1319 grace_start = nfsd4_cltrack_grace_start(nn->boot_time);
d682e750
JL
1320
1321 nfsd4_cltrack_upcall_lock(clp);
788a7914
JL
1322 if (!nfsd4_umh_cltrack_upcall("create", hexid, has_session, grace_start))
1323 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
d682e750
JL
1324 nfsd4_cltrack_upcall_unlock(clp);
1325
d4318acd
JL
1326 kfree(has_session);
1327 kfree(grace_start);
2873d214
JL
1328 kfree(hexid);
1329}
1330
1331static void
1332nfsd4_umh_cltrack_remove(struct nfs4_client *clp)
1333{
1334 char *hexid;
1335
788a7914
JL
1336 if (!test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
1337 return;
1338
2873d214
JL
1339 hexid = bin_to_hex_dup(clp->cl_name.data, clp->cl_name.len);
1340 if (!hexid) {
1341 dprintk("%s: can't allocate memory for upcall!\n", __func__);
1342 return;
1343 }
d682e750
JL
1344
1345 nfsd4_cltrack_upcall_lock(clp);
788a7914
JL
1346 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags) &&
1347 nfsd4_umh_cltrack_upcall("remove", hexid, NULL, NULL) == 0)
1348 clear_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
d682e750
JL
1349 nfsd4_cltrack_upcall_unlock(clp);
1350
2873d214
JL
1351 kfree(hexid);
1352}
1353
1354static int
1355nfsd4_umh_cltrack_check(struct nfs4_client *clp)
1356{
1357 int ret;
d4318acd 1358 char *hexid, *has_session, *legacy;
2873d214 1359
788a7914
JL
1360 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags))
1361 return 0;
1362
2873d214
JL
1363 hexid = bin_to_hex_dup(clp->cl_name.data, clp->cl_name.len);
1364 if (!hexid) {
1365 dprintk("%s: can't allocate memory for upcall!\n", __func__);
1366 return -ENOMEM;
1367 }
d4318acd
JL
1368
1369 has_session = nfsd4_cltrack_client_has_session(clp);
2216d449 1370 legacy = nfsd4_cltrack_legacy_recdir(&clp->cl_name);
d682e750
JL
1371
1372 nfsd4_cltrack_upcall_lock(clp);
788a7914
JL
1373 if (test_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags)) {
1374 ret = 0;
1375 } else {
1376 ret = nfsd4_umh_cltrack_upcall("check", hexid, has_session, legacy);
1377 if (ret == 0)
1378 set_bit(NFSD4_CLIENT_STABLE, &clp->cl_flags);
1379 }
d682e750 1380 nfsd4_cltrack_upcall_unlock(clp);
d4318acd 1381 kfree(has_session);
f3aa7e24 1382 kfree(legacy);
2873d214 1383 kfree(hexid);
d4318acd 1384
2873d214
JL
1385 return ret;
1386}
1387
1388static void
919b8049 1389nfsd4_umh_cltrack_grace_done(struct nfsd_net *nn)
2873d214 1390{
f3aa7e24 1391 char *legacy;
2873d214
JL
1392 char timestr[22]; /* FIXME: better way to determine max size? */
1393
919b8049 1394 sprintf(timestr, "%ld", nn->boot_time);
f3aa7e24 1395 legacy = nfsd4_cltrack_legacy_topdir();
d4318acd 1396 nfsd4_umh_cltrack_upcall("gracedone", timestr, legacy, NULL);
f3aa7e24 1397 kfree(legacy);
2873d214
JL
1398}
1399
7c582e4f 1400static const struct nfsd4_client_tracking_ops nfsd4_umh_tracking_ops = {
2873d214
JL
1401 .init = nfsd4_umh_cltrack_init,
1402 .exit = NULL,
1403 .create = nfsd4_umh_cltrack_create,
1404 .remove = nfsd4_umh_cltrack_remove,
1405 .check = nfsd4_umh_cltrack_check,
1406 .grace_done = nfsd4_umh_cltrack_grace_done,
1407};
1408
2a4317c5
JL
1409int
1410nfsd4_client_tracking_init(struct net *net)
1411{
1412 int status;
f3f80148 1413 struct path path;
9a9c6478 1414 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
2a4317c5 1415
2d77bf0a 1416 /* just run the init if it the method is already decided */
9a9c6478 1417 if (nn->client_tracking_ops)
2d77bf0a
JL
1418 goto do_init;
1419
1420 /*
1421 * First, try a UMH upcall. It should succeed or fail quickly, so
1422 * there's little harm in trying that first.
1423 */
9a9c6478
SK
1424 nn->client_tracking_ops = &nfsd4_umh_tracking_ops;
1425 status = nn->client_tracking_ops->init(net);
2d77bf0a
JL
1426 if (!status)
1427 return status;
1428
1429 /*
1430 * See if the recoverydir exists and is a directory. If it is,
1431 * then use the legacy ops.
1432 */
9a9c6478 1433 nn->client_tracking_ops = &nfsd4_legacy_tracking_ops;
2d77bf0a
JL
1434 status = kern_path(nfs4_recoverydir(), LOOKUP_FOLLOW, &path);
1435 if (!status) {
e36cb0b8 1436 status = d_is_dir(path.dentry);
2d77bf0a
JL
1437 path_put(&path);
1438 if (status)
1439 goto do_init;
f3f80148 1440 }
2a4317c5 1441
2d77bf0a 1442 /* Finally, try to use nfsdcld */
9a9c6478 1443 nn->client_tracking_ops = &nfsd4_cld_tracking_ops;
8b0554e9
JL
1444 printk(KERN_WARNING "NFSD: the nfsdcld client tracking upcall will be "
1445 "removed in 3.10. Please transition to using "
1446 "nfsdcltrack.\n");
2d77bf0a 1447do_init:
9a9c6478 1448 status = nn->client_tracking_ops->init(net);
2a4317c5
JL
1449 if (status) {
1450 printk(KERN_WARNING "NFSD: Unable to initialize client "
1451 "recovery tracking! (%d)\n", status);
9a9c6478 1452 nn->client_tracking_ops = NULL;
2a4317c5
JL
1453 }
1454 return status;
1455}
1456
1457void
1458nfsd4_client_tracking_exit(struct net *net)
1459{
9a9c6478
SK
1460 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
1461
1462 if (nn->client_tracking_ops) {
1463 if (nn->client_tracking_ops->exit)
1464 nn->client_tracking_ops->exit(net);
1465 nn->client_tracking_ops = NULL;
2a4317c5
JL
1466 }
1467}
1468
1469void
1470nfsd4_client_record_create(struct nfs4_client *clp)
1471{
9a9c6478
SK
1472 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
1473
1474 if (nn->client_tracking_ops)
1475 nn->client_tracking_ops->create(clp);
2a4317c5
JL
1476}
1477
1478void
1479nfsd4_client_record_remove(struct nfs4_client *clp)
1480{
9a9c6478
SK
1481 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
1482
1483 if (nn->client_tracking_ops)
1484 nn->client_tracking_ops->remove(clp);
2a4317c5
JL
1485}
1486
1487int
1488nfsd4_client_record_check(struct nfs4_client *clp)
1489{
9a9c6478
SK
1490 struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id);
1491
1492 if (nn->client_tracking_ops)
1493 return nn->client_tracking_ops->check(clp);
2a4317c5
JL
1494
1495 return -EOPNOTSUPP;
1496}
1497
1498void
919b8049 1499nfsd4_record_grace_done(struct nfsd_net *nn)
2a4317c5 1500{
9a9c6478 1501 if (nn->client_tracking_ops)
919b8049 1502 nn->client_tracking_ops->grace_done(nn);
2a4317c5 1503}
813fd320
JL
1504
1505static int
1506rpc_pipefs_event(struct notifier_block *nb, unsigned long event, void *ptr)
1507{
1508 struct super_block *sb = ptr;
1509 struct net *net = sb->s_fs_info;
1510 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
1511 struct cld_net *cn = nn->cld_net;
1512 struct dentry *dentry;
1513 int ret = 0;
1514
1515 if (!try_module_get(THIS_MODULE))
1516 return 0;
1517
1518 if (!cn) {
1519 module_put(THIS_MODULE);
1520 return 0;
1521 }
1522
1523 switch (event) {
1524 case RPC_PIPEFS_MOUNT:
1525 dentry = nfsd4_cld_register_sb(sb, cn->cn_pipe);
1526 if (IS_ERR(dentry)) {
1527 ret = PTR_ERR(dentry);
1528 break;
1529 }
1530 cn->cn_pipe->dentry = dentry;
1531 break;
1532 case RPC_PIPEFS_UMOUNT:
1533 if (cn->cn_pipe->dentry)
1534 nfsd4_cld_unregister_sb(cn->cn_pipe);
1535 break;
1536 default:
1537 ret = -ENOTSUPP;
1538 break;
1539 }
1540 module_put(THIS_MODULE);
1541 return ret;
1542}
1543
2355c596 1544static struct notifier_block nfsd4_cld_block = {
813fd320
JL
1545 .notifier_call = rpc_pipefs_event,
1546};
797a9d79
JL
1547
1548int
1549register_cld_notifier(void)
1550{
1551 return rpc_pipefs_notifier_register(&nfsd4_cld_block);
1552}
1553
1554void
1555unregister_cld_notifier(void)
1556{
1557 rpc_pipefs_notifier_unregister(&nfsd4_cld_block);
1558}