ALSA: hda - Update descriptions about new position_fix values
[linux-2.6-block.git] / net / sunrpc / rpc_pipe.c
CommitLineData
457c8996 1// SPDX-License-Identifier: GPL-2.0-only
1da177e4
LT
2/*
3 * net/sunrpc/rpc_pipe.c
4 *
5 * Userland/kernel interface for rpcauth_gss.
6 * Code shamelessly plagiarized from fs/nfsd/nfsctl.c
d51fe1be 7 * and fs/sysfs/inode.c
1da177e4
LT
8 *
9 * Copyright (c) 2002, Trond Myklebust <trond.myklebust@fys.uio.no>
10 *
11 */
1da177e4
LT
12#include <linux/module.h>
13#include <linux/slab.h>
14#include <linux/string.h>
15#include <linux/pagemap.h>
16#include <linux/mount.h>
b9662f31 17#include <linux/fs_context.h>
1da177e4 18#include <linux/namei.h>
50e437d5 19#include <linux/fsnotify.h>
1da177e4 20#include <linux/kernel.h>
2446ab60 21#include <linux/rcupdate.h>
e2f0c83a 22#include <linux/utsname.h>
1da177e4
LT
23
24#include <asm/ioctls.h>
1da177e4
LT
25#include <linux/poll.h>
26#include <linux/wait.h>
27#include <linux/seq_file.h>
28
29#include <linux/sunrpc/clnt.h>
30#include <linux/workqueue.h>
31#include <linux/sunrpc/rpc_pipe_fs.h>
8854e82d 32#include <linux/sunrpc/cache.h>
021c68de 33#include <linux/nsproxy.h>
2d00131a 34#include <linux/notifier.h>
1da177e4 35
021c68de 36#include "netns.h"
2d00131a 37#include "sunrpc.h"
1da177e4 38
efc46bf2
SK
39#define RPCDBG_FACILITY RPCDBG_DEBUG
40
41#define NET_NAME(net) ((net == &init_net) ? " (init_net)" : "")
1da177e4
LT
42
43static struct file_system_type rpc_pipe_fs_type;
4b9a445e 44static const struct rpc_pipe_ops gssd_dummy_pipe_ops;
1da177e4 45
e18b890b 46static struct kmem_cache *rpc_inode_cachep __read_mostly;
1da177e4
LT
47
48#define RPC_UPCALL_TIMEOUT (30*HZ)
49
2d00131a
SK
50static BLOCKING_NOTIFIER_HEAD(rpc_pipefs_notifier_list);
51
52int rpc_pipefs_notifier_register(struct notifier_block *nb)
53{
54 return blocking_notifier_chain_cond_register(&rpc_pipefs_notifier_list, nb);
55}
56EXPORT_SYMBOL_GPL(rpc_pipefs_notifier_register);
57
58void rpc_pipefs_notifier_unregister(struct notifier_block *nb)
59{
60 blocking_notifier_chain_unregister(&rpc_pipefs_notifier_list, nb);
61}
62EXPORT_SYMBOL_GPL(rpc_pipefs_notifier_unregister);
63
591ad7fe 64static void rpc_purge_list(wait_queue_head_t *waitq, struct list_head *head,
9842ef35 65 void (*destroy_msg)(struct rpc_pipe_msg *), int err)
1da177e4 66{
1da177e4
LT
67 struct rpc_pipe_msg *msg;
68
9842ef35
TM
69 if (list_empty(head))
70 return;
71 do {
b3eb67a2 72 msg = list_entry(head->next, struct rpc_pipe_msg, list);
5a67657a 73 list_del_init(&msg->list);
1da177e4 74 msg->errno = err;
b3eb67a2 75 destroy_msg(msg);
9842ef35 76 } while (!list_empty(head));
92123e06
JL
77
78 if (waitq)
79 wake_up(waitq);
1da177e4
LT
80}
81
82static void
65f27f38 83rpc_timeout_upcall_queue(struct work_struct *work)
1da177e4 84{
9842ef35 85 LIST_HEAD(free_list);
ba9e0975
SK
86 struct rpc_pipe *pipe =
87 container_of(work, struct rpc_pipe, queue_timeout.work);
9842ef35 88 void (*destroy_msg)(struct rpc_pipe_msg *);
591ad7fe 89 struct dentry *dentry;
1da177e4 90
ba9e0975 91 spin_lock(&pipe->lock);
ba9e0975
SK
92 destroy_msg = pipe->ops->destroy_msg;
93 if (pipe->nreaders == 0) {
94 list_splice_init(&pipe->pipe, &free_list);
95 pipe->pipelen = 0;
9842ef35 96 }
591ad7fe 97 dentry = dget(pipe->dentry);
ba9e0975 98 spin_unlock(&pipe->lock);
c5ef6035 99 rpc_purge_list(dentry ? &RPC_I(d_inode(dentry))->waitq : NULL,
92123e06
JL
100 &free_list, destroy_msg, -ETIMEDOUT);
101 dput(dentry);
1da177e4
LT
102}
103
c1225158
PT
104ssize_t rpc_pipe_generic_upcall(struct file *filp, struct rpc_pipe_msg *msg,
105 char __user *dst, size_t buflen)
106{
107 char *data = (char *)msg->data + msg->copied;
108 size_t mlen = min(msg->len - msg->copied, buflen);
109 unsigned long left;
110
111 left = copy_to_user(dst, data, mlen);
112 if (left == mlen) {
113 msg->errno = -EFAULT;
114 return -EFAULT;
115 }
116
117 mlen -= left;
118 msg->copied += mlen;
119 msg->errno = 0;
120 return mlen;
121}
122EXPORT_SYMBOL_GPL(rpc_pipe_generic_upcall);
123
93a44a75 124/**
1a5778aa 125 * rpc_queue_upcall - queue an upcall message to userspace
bda14606 126 * @pipe: upcall pipe on which to queue given message
93a44a75
BF
127 * @msg: message to queue
128 *
129 * Call with an @inode created by rpc_mkpipe() to queue an upcall.
130 * A userspace process may then later read the upcall by performing a
131 * read on an open file for this inode. It is up to the caller to
132 * initialize the fields of @msg (other than @msg->list) appropriately.
133 */
1da177e4 134int
d706ed1f 135rpc_queue_upcall(struct rpc_pipe *pipe, struct rpc_pipe_msg *msg)
1da177e4 136{
6070fe6f 137 int res = -EPIPE;
591ad7fe 138 struct dentry *dentry;
1da177e4 139
d0fe13ba 140 spin_lock(&pipe->lock);
d0fe13ba
SK
141 if (pipe->nreaders) {
142 list_add_tail(&msg->list, &pipe->pipe);
143 pipe->pipelen += msg->len;
6070fe6f 144 res = 0;
d0fe13ba
SK
145 } else if (pipe->flags & RPC_PIPE_WAIT_FOR_OPEN) {
146 if (list_empty(&pipe->pipe))
24c5d9d7 147 queue_delayed_work(rpciod_workqueue,
d0fe13ba 148 &pipe->queue_timeout,
1da177e4 149 RPC_UPCALL_TIMEOUT);
d0fe13ba
SK
150 list_add_tail(&msg->list, &pipe->pipe);
151 pipe->pipelen += msg->len;
6070fe6f
TM
152 res = 0;
153 }
591ad7fe 154 dentry = dget(pipe->dentry);
d0fe13ba 155 spin_unlock(&pipe->lock);
591ad7fe 156 if (dentry) {
c5ef6035 157 wake_up(&RPC_I(d_inode(dentry))->waitq);
591ad7fe
SK
158 dput(dentry);
159 }
1da177e4
LT
160 return res;
161}
468039ee 162EXPORT_SYMBOL_GPL(rpc_queue_upcall);
1da177e4 163
6070fe6f
TM
164static inline void
165rpc_inode_setowner(struct inode *inode, void *private)
166{
167 RPC_I(inode)->private = private;
168}
169
1da177e4
LT
170static void
171rpc_close_pipes(struct inode *inode)
172{
ba9e0975 173 struct rpc_pipe *pipe = RPC_I(inode)->pipe;
e712804a 174 int need_release;
ad6b1340 175 LIST_HEAD(free_list);
1da177e4 176
5955102c 177 inode_lock(inode);
ad6b1340
SK
178 spin_lock(&pipe->lock);
179 need_release = pipe->nreaders != 0 || pipe->nwriters != 0;
180 pipe->nreaders = 0;
181 list_splice_init(&pipe->in_upcall, &free_list);
182 list_splice_init(&pipe->pipe, &free_list);
183 pipe->pipelen = 0;
184 pipe->dentry = NULL;
185 spin_unlock(&pipe->lock);
591ad7fe 186 rpc_purge_list(&RPC_I(inode)->waitq, &free_list, pipe->ops->destroy_msg, -EPIPE);
ad6b1340
SK
187 pipe->nwriters = 0;
188 if (need_release && pipe->ops->release_pipe)
189 pipe->ops->release_pipe(inode);
190 cancel_delayed_work_sync(&pipe->queue_timeout);
6070fe6f 191 rpc_inode_setowner(inode, NULL);
2c9030ee 192 RPC_I(inode)->pipe = NULL;
5955102c 193 inode_unlock(inode);
1da177e4
LT
194}
195
1da177e4
LT
196static struct inode *
197rpc_alloc_inode(struct super_block *sb)
198{
199 struct rpc_inode *rpci;
adcda652 200 rpci = kmem_cache_alloc(rpc_inode_cachep, GFP_KERNEL);
1da177e4
LT
201 if (!rpci)
202 return NULL;
203 return &rpci->vfs_inode;
204}
205
206static void
bef252fa 207rpc_free_inode(struct inode *inode)
1da177e4
LT
208{
209 kmem_cache_free(rpc_inode_cachep, RPC_I(inode));
210}
211
212static int
213rpc_pipe_open(struct inode *inode, struct file *filp)
214{
2c9030ee 215 struct rpc_pipe *pipe;
c3810608 216 int first_open;
1da177e4
LT
217 int res = -ENXIO;
218
5955102c 219 inode_lock(inode);
2c9030ee
SK
220 pipe = RPC_I(inode)->pipe;
221 if (pipe == NULL)
c3810608 222 goto out;
d0fe13ba
SK
223 first_open = pipe->nreaders == 0 && pipe->nwriters == 0;
224 if (first_open && pipe->ops->open_pipe) {
225 res = pipe->ops->open_pipe(inode);
c3810608
BF
226 if (res)
227 goto out;
1da177e4 228 }
c3810608 229 if (filp->f_mode & FMODE_READ)
d0fe13ba 230 pipe->nreaders++;
c3810608 231 if (filp->f_mode & FMODE_WRITE)
d0fe13ba 232 pipe->nwriters++;
c3810608
BF
233 res = 0;
234out:
5955102c 235 inode_unlock(inode);
1da177e4
LT
236 return res;
237}
238
239static int
240rpc_pipe_release(struct inode *inode, struct file *filp)
241{
2c9030ee 242 struct rpc_pipe *pipe;
1da177e4 243 struct rpc_pipe_msg *msg;
e712804a 244 int last_close;
1da177e4 245
5955102c 246 inode_lock(inode);
2c9030ee
SK
247 pipe = RPC_I(inode)->pipe;
248 if (pipe == NULL)
1da177e4 249 goto out;
655b5bb4 250 msg = filp->private_data;
1da177e4 251 if (msg != NULL) {
ba9e0975 252 spin_lock(&pipe->lock);
48e49187 253 msg->errno = -EAGAIN;
5a67657a 254 list_del_init(&msg->list);
ba9e0975
SK
255 spin_unlock(&pipe->lock);
256 pipe->ops->destroy_msg(msg);
1da177e4
LT
257 }
258 if (filp->f_mode & FMODE_WRITE)
ba9e0975 259 pipe->nwriters --;
9842ef35 260 if (filp->f_mode & FMODE_READ) {
ba9e0975
SK
261 pipe->nreaders --;
262 if (pipe->nreaders == 0) {
9842ef35 263 LIST_HEAD(free_list);
ba9e0975
SK
264 spin_lock(&pipe->lock);
265 list_splice_init(&pipe->pipe, &free_list);
266 pipe->pipelen = 0;
267 spin_unlock(&pipe->lock);
591ad7fe 268 rpc_purge_list(&RPC_I(inode)->waitq, &free_list,
ba9e0975 269 pipe->ops->destroy_msg, -EAGAIN);
9842ef35
TM
270 }
271 }
ba9e0975
SK
272 last_close = pipe->nwriters == 0 && pipe->nreaders == 0;
273 if (last_close && pipe->ops->release_pipe)
274 pipe->ops->release_pipe(inode);
1da177e4 275out:
5955102c 276 inode_unlock(inode);
1da177e4
LT
277 return 0;
278}
279
280static ssize_t
281rpc_pipe_read(struct file *filp, char __user *buf, size_t len, loff_t *offset)
282{
496ad9aa 283 struct inode *inode = file_inode(filp);
2c9030ee 284 struct rpc_pipe *pipe;
1da177e4
LT
285 struct rpc_pipe_msg *msg;
286 int res = 0;
287
5955102c 288 inode_lock(inode);
2c9030ee
SK
289 pipe = RPC_I(inode)->pipe;
290 if (pipe == NULL) {
1da177e4
LT
291 res = -EPIPE;
292 goto out_unlock;
293 }
294 msg = filp->private_data;
295 if (msg == NULL) {
d0fe13ba
SK
296 spin_lock(&pipe->lock);
297 if (!list_empty(&pipe->pipe)) {
298 msg = list_entry(pipe->pipe.next,
1da177e4
LT
299 struct rpc_pipe_msg,
300 list);
d0fe13ba
SK
301 list_move(&msg->list, &pipe->in_upcall);
302 pipe->pipelen -= msg->len;
1da177e4
LT
303 filp->private_data = msg;
304 msg->copied = 0;
305 }
d0fe13ba 306 spin_unlock(&pipe->lock);
1da177e4
LT
307 if (msg == NULL)
308 goto out_unlock;
309 }
310 /* NOTE: it is up to the callback to update msg->copied */
d0fe13ba 311 res = pipe->ops->upcall(filp, msg, buf, len);
1da177e4
LT
312 if (res < 0 || msg->len == msg->copied) {
313 filp->private_data = NULL;
d0fe13ba 314 spin_lock(&pipe->lock);
5a67657a 315 list_del_init(&msg->list);
d0fe13ba
SK
316 spin_unlock(&pipe->lock);
317 pipe->ops->destroy_msg(msg);
1da177e4
LT
318 }
319out_unlock:
5955102c 320 inode_unlock(inode);
1da177e4
LT
321 return res;
322}
323
324static ssize_t
325rpc_pipe_write(struct file *filp, const char __user *buf, size_t len, loff_t *offset)
326{
496ad9aa 327 struct inode *inode = file_inode(filp);
1da177e4
LT
328 int res;
329
5955102c 330 inode_lock(inode);
1da177e4 331 res = -EPIPE;
2c9030ee
SK
332 if (RPC_I(inode)->pipe != NULL)
333 res = RPC_I(inode)->pipe->ops->downcall(filp, buf, len);
5955102c 334 inode_unlock(inode);
1da177e4
LT
335 return res;
336}
337
ade994f4 338static __poll_t
1da177e4
LT
339rpc_pipe_poll(struct file *filp, struct poll_table_struct *wait)
340{
496ad9aa 341 struct inode *inode = file_inode(filp);
591ad7fe 342 struct rpc_inode *rpci = RPC_I(inode);
a9a08845 343 __poll_t mask = EPOLLOUT | EPOLLWRNORM;
1da177e4 344
1da177e4
LT
345 poll_wait(filp, &rpci->waitq, wait);
346
5955102c 347 inode_lock(inode);
591ad7fe 348 if (rpci->pipe == NULL)
a9a08845 349 mask |= EPOLLERR | EPOLLHUP;
591ad7fe 350 else if (filp->private_data || !list_empty(&rpci->pipe->pipe))
a9a08845 351 mask |= EPOLLIN | EPOLLRDNORM;
5955102c 352 inode_unlock(inode);
1da177e4
LT
353 return mask;
354}
355
a6f8dbc6
AB
356static long
357rpc_pipe_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
1da177e4 358{
496ad9aa 359 struct inode *inode = file_inode(filp);
2c9030ee 360 struct rpc_pipe *pipe;
1da177e4
LT
361 int len;
362
363 switch (cmd) {
364 case FIONREAD:
5955102c 365 inode_lock(inode);
2c9030ee
SK
366 pipe = RPC_I(inode)->pipe;
367 if (pipe == NULL) {
5955102c 368 inode_unlock(inode);
1da177e4 369 return -EPIPE;
a6f8dbc6 370 }
2c9030ee 371 spin_lock(&pipe->lock);
d0fe13ba 372 len = pipe->pipelen;
1da177e4
LT
373 if (filp->private_data) {
374 struct rpc_pipe_msg *msg;
655b5bb4 375 msg = filp->private_data;
1da177e4
LT
376 len += msg->len - msg->copied;
377 }
d0fe13ba 378 spin_unlock(&pipe->lock);
5955102c 379 inode_unlock(inode);
1da177e4
LT
380 return put_user(len, (int __user *)arg);
381 default:
382 return -EINVAL;
383 }
384}
385
da7071d7 386static const struct file_operations rpc_pipe_fops = {
1da177e4
LT
387 .owner = THIS_MODULE,
388 .llseek = no_llseek,
389 .read = rpc_pipe_read,
390 .write = rpc_pipe_write,
391 .poll = rpc_pipe_poll,
674b604c 392 .unlocked_ioctl = rpc_pipe_ioctl,
1da177e4
LT
393 .open = rpc_pipe_open,
394 .release = rpc_pipe_release,
395};
396
397static int
398rpc_show_info(struct seq_file *m, void *v)
399{
400 struct rpc_clnt *clnt = m->private;
401
2446ab60 402 rcu_read_lock();
4e0038b6
TM
403 seq_printf(m, "RPC server: %s\n",
404 rcu_dereference(clnt->cl_xprt)->servername);
55909f21 405 seq_printf(m, "service: %s (%d) version %d\n", clnt->cl_program->name,
1da177e4 406 clnt->cl_prog, clnt->cl_vers);
e7f78657
CL
407 seq_printf(m, "address: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_ADDR));
408 seq_printf(m, "protocol: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_PROTO));
bf19aace 409 seq_printf(m, "port: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_PORT));
2446ab60 410 rcu_read_unlock();
1da177e4
LT
411 return 0;
412}
413
414static int
415rpc_info_open(struct inode *inode, struct file *file)
416{
006abe88 417 struct rpc_clnt *clnt = NULL;
1da177e4
LT
418 int ret = single_open(file, rpc_show_info, NULL);
419
420 if (!ret) {
421 struct seq_file *m = file->private_data;
006abe88
TM
422
423 spin_lock(&file->f_path.dentry->d_lock);
424 if (!d_unhashed(file->f_path.dentry))
425 clnt = RPC_I(inode)->private;
426 if (clnt != NULL && atomic_inc_not_zero(&clnt->cl_count)) {
427 spin_unlock(&file->f_path.dentry->d_lock);
1da177e4
LT
428 m->private = clnt;
429 } else {
006abe88 430 spin_unlock(&file->f_path.dentry->d_lock);
1da177e4
LT
431 single_release(inode, file);
432 ret = -EINVAL;
433 }
1da177e4
LT
434 }
435 return ret;
436}
437
438static int
439rpc_info_release(struct inode *inode, struct file *file)
440{
441 struct seq_file *m = file->private_data;
442 struct rpc_clnt *clnt = (struct rpc_clnt *)m->private;
443
444 if (clnt)
445 rpc_release_client(clnt);
446 return single_release(inode, file);
447}
448
da7071d7 449static const struct file_operations rpc_info_operations = {
1da177e4
LT
450 .owner = THIS_MODULE,
451 .open = rpc_info_open,
452 .read = seq_read,
453 .llseek = seq_lseek,
454 .release = rpc_info_release,
455};
456
457
1da177e4
LT
458/*
459 * Description of fs contents.
460 */
461struct rpc_filelist {
ac6fecee 462 const char *name;
99ac48f5 463 const struct file_operations *i_fop;
7364af6a 464 umode_t mode;
1da177e4
LT
465};
466
1da177e4 467static struct inode *
7364af6a 468rpc_get_inode(struct super_block *sb, umode_t mode)
1da177e4
LT
469{
470 struct inode *inode = new_inode(sb);
471 if (!inode)
472 return NULL;
85fe4025 473 inode->i_ino = get_next_ino();
1da177e4 474 inode->i_mode = mode;
078cd827 475 inode->i_atime = inode->i_mtime = inode->i_ctime = current_time(inode);
89f0e4fe
JP
476 switch (mode & S_IFMT) {
477 case S_IFDIR:
478 inode->i_fop = &simple_dir_operations;
275448eb 479 inode->i_op = &simple_dir_inode_operations;
89f0e4fe
JP
480 inc_nlink(inode);
481 default:
482 break;
1da177e4
LT
483 }
484 return inode;
485}
486
7589806e
TM
487static int __rpc_create_common(struct inode *dir, struct dentry *dentry,
488 umode_t mode,
489 const struct file_operations *i_fop,
490 void *private)
491{
492 struct inode *inode;
493
beb0f0a9 494 d_drop(dentry);
7589806e
TM
495 inode = rpc_get_inode(dir->i_sb, mode);
496 if (!inode)
497 goto out_err;
498 inode->i_ino = iunique(dir->i_sb, 100);
499 if (i_fop)
500 inode->i_fop = i_fop;
501 if (private)
502 rpc_inode_setowner(inode, private);
503 d_add(dentry, inode);
504 return 0;
505out_err:
1e903eda
AV
506 printk(KERN_WARNING "%s: %s failed to allocate inode for dentry %pd\n",
507 __FILE__, __func__, dentry);
7589806e
TM
508 dput(dentry);
509 return -ENOMEM;
510}
511
ac6fecee
TM
512static int __rpc_create(struct inode *dir, struct dentry *dentry,
513 umode_t mode,
514 const struct file_operations *i_fop,
515 void *private)
516{
517 int err;
518
519 err = __rpc_create_common(dir, dentry, S_IFREG | mode, i_fop, private);
520 if (err)
521 return err;
522 fsnotify_create(dir, dentry);
523 return 0;
524}
525
7589806e
TM
526static int __rpc_mkdir(struct inode *dir, struct dentry *dentry,
527 umode_t mode,
528 const struct file_operations *i_fop,
529 void *private)
530{
531 int err;
532
533 err = __rpc_create_common(dir, dentry, S_IFDIR | mode, i_fop, private);
534 if (err)
535 return err;
536 inc_nlink(dir);
537 fsnotify_mkdir(dir, dentry);
538 return 0;
539}
540
ba9e0975
SK
541static void
542init_pipe(struct rpc_pipe *pipe)
543{
544 pipe->nreaders = 0;
545 pipe->nwriters = 0;
546 INIT_LIST_HEAD(&pipe->in_upcall);
547 INIT_LIST_HEAD(&pipe->in_downcall);
548 INIT_LIST_HEAD(&pipe->pipe);
549 pipe->pipelen = 0;
ba9e0975
SK
550 INIT_DELAYED_WORK(&pipe->queue_timeout,
551 rpc_timeout_upcall_queue);
552 pipe->ops = NULL;
553 spin_lock_init(&pipe->lock);
c239d83b
SK
554 pipe->dentry = NULL;
555}
ba9e0975 556
c239d83b
SK
557void rpc_destroy_pipe_data(struct rpc_pipe *pipe)
558{
559 kfree(pipe);
ba9e0975 560}
c239d83b 561EXPORT_SYMBOL_GPL(rpc_destroy_pipe_data);
ba9e0975 562
c239d83b 563struct rpc_pipe *rpc_mkpipe_data(const struct rpc_pipe_ops *ops, int flags)
7589806e 564{
ba9e0975 565 struct rpc_pipe *pipe;
7589806e 566
ba9e0975
SK
567 pipe = kzalloc(sizeof(struct rpc_pipe), GFP_KERNEL);
568 if (!pipe)
c239d83b 569 return ERR_PTR(-ENOMEM);
ba9e0975 570 init_pipe(pipe);
c239d83b
SK
571 pipe->ops = ops;
572 pipe->flags = flags;
573 return pipe;
574}
575EXPORT_SYMBOL_GPL(rpc_mkpipe_data);
576
577static int __rpc_mkpipe_dentry(struct inode *dir, struct dentry *dentry,
578 umode_t mode,
579 const struct file_operations *i_fop,
580 void *private,
581 struct rpc_pipe *pipe)
7589806e
TM
582{
583 struct rpc_inode *rpci;
584 int err;
585
586 err = __rpc_create_common(dir, dentry, S_IFIFO | mode, i_fop, private);
587 if (err)
588 return err;
c5ef6035 589 rpci = RPC_I(d_inode(dentry));
7589806e 590 rpci->private = private;
ba9e0975 591 rpci->pipe = pipe;
7589806e
TM
592 fsnotify_create(dir, dentry);
593 return 0;
594}
595
ac6fecee
TM
596static int __rpc_rmdir(struct inode *dir, struct dentry *dentry)
597{
598 int ret;
599
600 dget(dentry);
601 ret = simple_rmdir(dir, dentry);
a35d632c
AG
602 if (!ret)
603 fsnotify_rmdir(dir, dentry);
ac6fecee
TM
604 d_delete(dentry);
605 dput(dentry);
606 return ret;
607}
608
810d90bc
TM
609static int __rpc_unlink(struct inode *dir, struct dentry *dentry)
610{
611 int ret;
612
613 dget(dentry);
614 ret = simple_unlink(dir, dentry);
a35d632c
AG
615 if (!ret)
616 fsnotify_unlink(dir, dentry);
810d90bc
TM
617 d_delete(dentry);
618 dput(dentry);
619 return ret;
620}
621
622static int __rpc_rmpipe(struct inode *dir, struct dentry *dentry)
623{
c5ef6035 624 struct inode *inode = d_inode(dentry);
810d90bc 625
810d90bc
TM
626 rpc_close_pipes(inode);
627 return __rpc_unlink(dir, dentry);
628}
629
5bff0386 630static struct dentry *__rpc_lookup_create_exclusive(struct dentry *parent,
d3db90b0 631 const char *name)
cfeaa4a3 632{
d3db90b0
AV
633 struct qstr q = QSTR_INIT(name, strlen(name));
634 struct dentry *dentry = d_hash_and_lookup(parent, &q);
cfeaa4a3 635 if (!dentry) {
d3db90b0 636 dentry = d_alloc(parent, &q);
5bff0386
SK
637 if (!dentry)
638 return ERR_PTR(-ENOMEM);
cfeaa4a3 639 }
c5ef6035 640 if (d_really_is_negative(dentry))
cfeaa4a3
TM
641 return dentry;
642 dput(dentry);
643 return ERR_PTR(-EEXIST);
644}
645
1da177e4
LT
646/*
647 * FIXME: This probably has races.
648 */
ac6fecee
TM
649static void __rpc_depopulate(struct dentry *parent,
650 const struct rpc_filelist *files,
651 int start, int eof)
1da177e4 652{
c5ef6035 653 struct inode *dir = d_inode(parent);
ac6fecee
TM
654 struct dentry *dentry;
655 struct qstr name;
656 int i;
1da177e4 657
ac6fecee
TM
658 for (i = start; i < eof; i++) {
659 name.name = files[i].name;
660 name.len = strlen(files[i].name);
d3db90b0 661 dentry = d_hash_and_lookup(parent, &name);
ac6fecee
TM
662
663 if (dentry == NULL)
62e1761c 664 continue;
c5ef6035 665 if (d_really_is_negative(dentry))
ac6fecee 666 goto next;
c5ef6035 667 switch (d_inode(dentry)->i_mode & S_IFMT) {
ac6fecee
TM
668 default:
669 BUG();
670 case S_IFREG:
671 __rpc_unlink(dir, dentry);
1da177e4 672 break;
ac6fecee
TM
673 case S_IFDIR:
674 __rpc_rmdir(dir, dentry);
675 }
676next:
677 dput(dentry);
1da177e4 678 }
ac6fecee
TM
679}
680
681static void rpc_depopulate(struct dentry *parent,
682 const struct rpc_filelist *files,
683 int start, int eof)
684{
c5ef6035 685 struct inode *dir = d_inode(parent);
ac6fecee 686
5955102c 687 inode_lock_nested(dir, I_MUTEX_CHILD);
ac6fecee 688 __rpc_depopulate(parent, files, start, eof);
5955102c 689 inode_unlock(dir);
1da177e4
LT
690}
691
ac6fecee
TM
692static int rpc_populate(struct dentry *parent,
693 const struct rpc_filelist *files,
694 int start, int eof,
695 void *private)
1da177e4 696{
c5ef6035 697 struct inode *dir = d_inode(parent);
1da177e4 698 struct dentry *dentry;
ac6fecee 699 int i, err;
1da177e4 700
5955102c 701 inode_lock(dir);
1da177e4 702 for (i = start; i < eof; i++) {
d3db90b0 703 dentry = __rpc_lookup_create_exclusive(parent, files[i].name);
ac6fecee
TM
704 err = PTR_ERR(dentry);
705 if (IS_ERR(dentry))
1da177e4 706 goto out_bad;
ac6fecee
TM
707 switch (files[i].mode & S_IFMT) {
708 default:
709 BUG();
710 case S_IFREG:
711 err = __rpc_create(dir, dentry,
712 files[i].mode,
713 files[i].i_fop,
714 private);
715 break;
716 case S_IFDIR:
717 err = __rpc_mkdir(dir, dentry,
718 files[i].mode,
719 NULL,
720 private);
1da177e4 721 }
ac6fecee
TM
722 if (err != 0)
723 goto out_bad;
1da177e4 724 }
5955102c 725 inode_unlock(dir);
1da177e4
LT
726 return 0;
727out_bad:
ac6fecee 728 __rpc_depopulate(parent, files, start, eof);
5955102c 729 inode_unlock(dir);
1e903eda
AV
730 printk(KERN_WARNING "%s: %s failed to populate directory %pd\n",
731 __FILE__, __func__, parent);
ac6fecee 732 return err;
f134585a 733}
1da177e4 734
e57aed77 735static struct dentry *rpc_mkdir_populate(struct dentry *parent,
a95e691f 736 const char *name, umode_t mode, void *private,
e57aed77 737 int (*populate)(struct dentry *, void *), void *args_populate)
f134585a 738{
f134585a 739 struct dentry *dentry;
c5ef6035 740 struct inode *dir = d_inode(parent);
f134585a
TM
741 int error;
742
5955102c 743 inode_lock_nested(dir, I_MUTEX_PARENT);
7d59d1e8 744 dentry = __rpc_lookup_create_exclusive(parent, name);
f134585a 745 if (IS_ERR(dentry))
7d59d1e8
TM
746 goto out;
747 error = __rpc_mkdir(dir, dentry, mode, NULL, private);
7589806e
TM
748 if (error != 0)
749 goto out_err;
e57aed77
TM
750 if (populate != NULL) {
751 error = populate(dentry, args_populate);
752 if (error)
753 goto err_rmdir;
754 }
f134585a 755out:
5955102c 756 inode_unlock(dir);
5c3e985a 757 return dentry;
ac6fecee 758err_rmdir:
f134585a 759 __rpc_rmdir(dir, dentry);
7589806e 760out_err:
f134585a
TM
761 dentry = ERR_PTR(error);
762 goto out;
1da177e4
LT
763}
764
e57aed77
TM
765static int rpc_rmdir_depopulate(struct dentry *dentry,
766 void (*depopulate)(struct dentry *))
1da177e4 767{
dff02cc1 768 struct dentry *parent;
f134585a
TM
769 struct inode *dir;
770 int error;
278c995c 771
dff02cc1 772 parent = dget_parent(dentry);
c5ef6035 773 dir = d_inode(parent);
5955102c 774 inode_lock_nested(dir, I_MUTEX_PARENT);
e57aed77
TM
775 if (depopulate != NULL)
776 depopulate(dentry);
f134585a 777 error = __rpc_rmdir(dir, dentry);
5955102c 778 inode_unlock(dir);
dff02cc1 779 dput(parent);
f134585a 780 return error;
1da177e4
LT
781}
782
93a44a75
BF
783/**
784 * rpc_mkpipe - make an rpc_pipefs file for kernel<->userspace communication
785 * @parent: dentry of directory to create new "pipe" in
786 * @name: name of pipe
787 * @private: private data to associate with the pipe, for the caller's use
bda14606 788 * @pipe: &rpc_pipe containing input parameters
93a44a75
BF
789 *
790 * Data is made available for userspace to read by calls to
791 * rpc_queue_upcall(). The actual reads will result in calls to
792 * @ops->upcall, which will be called with the file pointer,
793 * message, and userspace buffer to copy to.
794 *
795 * Writes can come at any time, and do not necessarily have to be
796 * responses to upcalls. They will result in calls to @msg->downcall.
797 *
798 * The @private argument passed here will be available to all these methods
496ad9aa 799 * from the file pointer, via RPC_I(file_inode(file))->private.
93a44a75 800 */
c239d83b
SK
801struct dentry *rpc_mkpipe_dentry(struct dentry *parent, const char *name,
802 void *private, struct rpc_pipe *pipe)
1da177e4 803{
1da177e4 804 struct dentry *dentry;
c5ef6035 805 struct inode *dir = d_inode(parent);
d6444062 806 umode_t umode = S_IFIFO | 0600;
7589806e 807 int err;
7364af6a 808
c239d83b 809 if (pipe->ops->upcall == NULL)
d6444062 810 umode &= ~0444;
c239d83b 811 if (pipe->ops->downcall == NULL)
d6444062 812 umode &= ~0222;
1da177e4 813
5955102c 814 inode_lock_nested(dir, I_MUTEX_PARENT);
d3db90b0 815 dentry = __rpc_lookup_create_exclusive(parent, name);
1da177e4 816 if (IS_ERR(dentry))
cfeaa4a3 817 goto out;
c239d83b
SK
818 err = __rpc_mkpipe_dentry(dir, dentry, umode, &rpc_pipe_fops,
819 private, pipe);
7589806e
TM
820 if (err)
821 goto out_err;
f134585a 822out:
5955102c 823 inode_unlock(dir);
5c3e985a 824 return dentry;
7589806e
TM
825out_err:
826 dentry = ERR_PTR(err);
1e903eda
AV
827 printk(KERN_WARNING "%s: %s() failed to create pipe %pd/%s (errno = %d)\n",
828 __FILE__, __func__, parent, name,
7589806e 829 err);
f134585a 830 goto out;
1da177e4 831}
c239d83b 832EXPORT_SYMBOL_GPL(rpc_mkpipe_dentry);
1da177e4 833
93a44a75
BF
834/**
835 * rpc_unlink - remove a pipe
836 * @dentry: dentry for the pipe, as returned from rpc_mkpipe
837 *
838 * After this call, lookups will no longer find the pipe, and any
839 * attempts to read or write using preexisting opens of the pipe will
840 * return -EPIPE.
841 */
f134585a 842int
5d67476f 843rpc_unlink(struct dentry *dentry)
1da177e4 844{
5d67476f 845 struct dentry *parent;
f134585a 846 struct inode *dir;
5d67476f 847 int error = 0;
1da177e4 848
5d67476f 849 parent = dget_parent(dentry);
c5ef6035 850 dir = d_inode(parent);
5955102c 851 inode_lock_nested(dir, I_MUTEX_PARENT);
810d90bc 852 error = __rpc_rmpipe(dir, dentry);
5955102c 853 inode_unlock(dir);
5d67476f 854 dput(parent);
f134585a 855 return error;
1da177e4 856}
468039ee 857EXPORT_SYMBOL_GPL(rpc_unlink);
1da177e4 858
6739ffb7
TM
859/**
860 * rpc_init_pipe_dir_head - initialise a struct rpc_pipe_dir_head
861 * @pdh: pointer to struct rpc_pipe_dir_head
862 */
863void rpc_init_pipe_dir_head(struct rpc_pipe_dir_head *pdh)
864{
865 INIT_LIST_HEAD(&pdh->pdh_entries);
866 pdh->pdh_dentry = NULL;
867}
868EXPORT_SYMBOL_GPL(rpc_init_pipe_dir_head);
869
870/**
871 * rpc_init_pipe_dir_object - initialise a struct rpc_pipe_dir_object
872 * @pdo: pointer to struct rpc_pipe_dir_object
873 * @pdo_ops: pointer to const struct rpc_pipe_dir_object_ops
874 * @pdo_data: pointer to caller-defined data
875 */
876void rpc_init_pipe_dir_object(struct rpc_pipe_dir_object *pdo,
877 const struct rpc_pipe_dir_object_ops *pdo_ops,
878 void *pdo_data)
879{
880 INIT_LIST_HEAD(&pdo->pdo_head);
881 pdo->pdo_ops = pdo_ops;
882 pdo->pdo_data = pdo_data;
883}
884EXPORT_SYMBOL_GPL(rpc_init_pipe_dir_object);
885
886static int
887rpc_add_pipe_dir_object_locked(struct net *net,
888 struct rpc_pipe_dir_head *pdh,
889 struct rpc_pipe_dir_object *pdo)
890{
891 int ret = 0;
892
893 if (pdh->pdh_dentry)
894 ret = pdo->pdo_ops->create(pdh->pdh_dentry, pdo);
895 if (ret == 0)
896 list_add_tail(&pdo->pdo_head, &pdh->pdh_entries);
897 return ret;
898}
899
900static void
901rpc_remove_pipe_dir_object_locked(struct net *net,
902 struct rpc_pipe_dir_head *pdh,
903 struct rpc_pipe_dir_object *pdo)
904{
905 if (pdh->pdh_dentry)
906 pdo->pdo_ops->destroy(pdh->pdh_dentry, pdo);
907 list_del_init(&pdo->pdo_head);
908}
909
910/**
911 * rpc_add_pipe_dir_object - associate a rpc_pipe_dir_object to a directory
912 * @net: pointer to struct net
913 * @pdh: pointer to struct rpc_pipe_dir_head
914 * @pdo: pointer to struct rpc_pipe_dir_object
915 *
916 */
917int
918rpc_add_pipe_dir_object(struct net *net,
919 struct rpc_pipe_dir_head *pdh,
920 struct rpc_pipe_dir_object *pdo)
921{
922 int ret = 0;
923
924 if (list_empty(&pdo->pdo_head)) {
925 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
926
927 mutex_lock(&sn->pipefs_sb_lock);
928 ret = rpc_add_pipe_dir_object_locked(net, pdh, pdo);
929 mutex_unlock(&sn->pipefs_sb_lock);
930 }
931 return ret;
932}
933EXPORT_SYMBOL_GPL(rpc_add_pipe_dir_object);
934
935/**
936 * rpc_remove_pipe_dir_object - remove a rpc_pipe_dir_object from a directory
937 * @net: pointer to struct net
938 * @pdh: pointer to struct rpc_pipe_dir_head
939 * @pdo: pointer to struct rpc_pipe_dir_object
940 *
941 */
942void
943rpc_remove_pipe_dir_object(struct net *net,
944 struct rpc_pipe_dir_head *pdh,
945 struct rpc_pipe_dir_object *pdo)
946{
947 if (!list_empty(&pdo->pdo_head)) {
948 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
949
950 mutex_lock(&sn->pipefs_sb_lock);
951 rpc_remove_pipe_dir_object_locked(net, pdh, pdo);
952 mutex_unlock(&sn->pipefs_sb_lock);
953 }
954}
955EXPORT_SYMBOL_GPL(rpc_remove_pipe_dir_object);
956
298fc355
TM
957/**
958 * rpc_find_or_alloc_pipe_dir_object
959 * @net: pointer to struct net
960 * @pdh: pointer to struct rpc_pipe_dir_head
961 * @match: match struct rpc_pipe_dir_object to data
962 * @alloc: allocate a new struct rpc_pipe_dir_object
963 * @data: user defined data for match() and alloc()
964 *
965 */
966struct rpc_pipe_dir_object *
967rpc_find_or_alloc_pipe_dir_object(struct net *net,
968 struct rpc_pipe_dir_head *pdh,
969 int (*match)(struct rpc_pipe_dir_object *, void *),
970 struct rpc_pipe_dir_object *(*alloc)(void *),
971 void *data)
972{
973 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
974 struct rpc_pipe_dir_object *pdo;
975
976 mutex_lock(&sn->pipefs_sb_lock);
977 list_for_each_entry(pdo, &pdh->pdh_entries, pdo_head) {
978 if (!match(pdo, data))
979 continue;
980 goto out;
981 }
982 pdo = alloc(data);
983 if (!pdo)
984 goto out;
985 rpc_add_pipe_dir_object_locked(net, pdh, pdo);
986out:
987 mutex_unlock(&sn->pipefs_sb_lock);
988 return pdo;
989}
990EXPORT_SYMBOL_GPL(rpc_find_or_alloc_pipe_dir_object);
991
6739ffb7
TM
992static void
993rpc_create_pipe_dir_objects(struct rpc_pipe_dir_head *pdh)
994{
995 struct rpc_pipe_dir_object *pdo;
996 struct dentry *dir = pdh->pdh_dentry;
997
998 list_for_each_entry(pdo, &pdh->pdh_entries, pdo_head)
999 pdo->pdo_ops->create(dir, pdo);
1000}
1001
1002static void
1003rpc_destroy_pipe_dir_objects(struct rpc_pipe_dir_head *pdh)
1004{
1005 struct rpc_pipe_dir_object *pdo;
1006 struct dentry *dir = pdh->pdh_dentry;
1007
1008 list_for_each_entry(pdo, &pdh->pdh_entries, pdo_head)
1009 pdo->pdo_ops->destroy(dir, pdo);
1010}
1011
e57aed77
TM
1012enum {
1013 RPCAUTH_info,
1014 RPCAUTH_EOF
1015};
1016
1017static const struct rpc_filelist authfiles[] = {
1018 [RPCAUTH_info] = {
1019 .name = "info",
1020 .i_fop = &rpc_info_operations,
d6444062 1021 .mode = S_IFREG | 0400,
e57aed77
TM
1022 },
1023};
1024
1025static int rpc_clntdir_populate(struct dentry *dentry, void *private)
1026{
1027 return rpc_populate(dentry,
1028 authfiles, RPCAUTH_info, RPCAUTH_EOF,
1029 private);
1030}
1031
1032static void rpc_clntdir_depopulate(struct dentry *dentry)
1033{
1034 rpc_depopulate(dentry, authfiles, RPCAUTH_info, RPCAUTH_EOF);
1035}
1036
7d59d1e8
TM
1037/**
1038 * rpc_create_client_dir - Create a new rpc_client directory in rpc_pipefs
a95e691f
AV
1039 * @dentry: the parent of new directory
1040 * @name: the name of new directory
7d59d1e8
TM
1041 * @rpc_client: rpc client to associate with this directory
1042 *
1043 * This creates a directory at the given @path associated with
1044 * @rpc_clnt, which will contain a file named "info" with some basic
1045 * information about the client, together with any "pipes" that may
1046 * later be created using rpc_mkpipe().
1047 */
23ac6581 1048struct dentry *rpc_create_client_dir(struct dentry *dentry,
a95e691f 1049 const char *name,
e57aed77
TM
1050 struct rpc_clnt *rpc_client)
1051{
6739ffb7
TM
1052 struct dentry *ret;
1053
d6444062
JP
1054 ret = rpc_mkdir_populate(dentry, name, 0555, NULL,
1055 rpc_clntdir_populate, rpc_client);
6739ffb7
TM
1056 if (!IS_ERR(ret)) {
1057 rpc_client->cl_pipedir_objects.pdh_dentry = ret;
1058 rpc_create_pipe_dir_objects(&rpc_client->cl_pipedir_objects);
1059 }
1060 return ret;
e57aed77
TM
1061}
1062
1063/**
1064 * rpc_remove_client_dir - Remove a directory created with rpc_create_client_dir()
6739ffb7 1065 * @rpc_client: rpc_client for the pipe
e57aed77 1066 */
c36dcfe1 1067int rpc_remove_client_dir(struct rpc_clnt *rpc_client)
7d59d1e8 1068{
c36dcfe1
TM
1069 struct dentry *dentry = rpc_client->cl_pipedir_objects.pdh_dentry;
1070
1071 if (dentry == NULL)
1072 return 0;
1073 rpc_destroy_pipe_dir_objects(&rpc_client->cl_pipedir_objects);
1074 rpc_client->cl_pipedir_objects.pdh_dentry = NULL;
e57aed77 1075 return rpc_rmdir_depopulate(dentry, rpc_clntdir_depopulate);
7d59d1e8
TM
1076}
1077
8854e82d
TM
1078static const struct rpc_filelist cache_pipefs_files[3] = {
1079 [0] = {
1080 .name = "channel",
1081 .i_fop = &cache_file_operations_pipefs,
d6444062 1082 .mode = S_IFREG | 0600,
8854e82d
TM
1083 },
1084 [1] = {
1085 .name = "content",
1086 .i_fop = &content_file_operations_pipefs,
d6444062 1087 .mode = S_IFREG | 0400,
8854e82d
TM
1088 },
1089 [2] = {
1090 .name = "flush",
1091 .i_fop = &cache_flush_operations_pipefs,
d6444062 1092 .mode = S_IFREG | 0600,
8854e82d
TM
1093 },
1094};
1095
1096static int rpc_cachedir_populate(struct dentry *dentry, void *private)
1097{
1098 return rpc_populate(dentry,
1099 cache_pipefs_files, 0, 3,
1100 private);
1101}
1102
1103static void rpc_cachedir_depopulate(struct dentry *dentry)
1104{
1105 rpc_depopulate(dentry, cache_pipefs_files, 0, 3);
1106}
1107
a95e691f 1108struct dentry *rpc_create_cache_dir(struct dentry *parent, const char *name,
64f1426f 1109 umode_t umode, struct cache_detail *cd)
8854e82d
TM
1110{
1111 return rpc_mkdir_populate(parent, name, umode, NULL,
1112 rpc_cachedir_populate, cd);
1113}
1114
1115void rpc_remove_cache_dir(struct dentry *dentry)
1116{
1117 rpc_rmdir_depopulate(dentry, rpc_cachedir_depopulate);
1118}
1119
1da177e4
LT
1120/*
1121 * populate the filesystem
1122 */
b87221de 1123static const struct super_operations s_ops = {
1da177e4 1124 .alloc_inode = rpc_alloc_inode,
bef252fa 1125 .free_inode = rpc_free_inode,
1da177e4
LT
1126 .statfs = simple_statfs,
1127};
1128
1129#define RPCAUTH_GSSMAGIC 0x67596969
1130
bb156749
TM
1131/*
1132 * We have a single directory with 1 node in it.
1133 */
1134enum {
1135 RPCAUTH_lockd,
1136 RPCAUTH_mount,
1137 RPCAUTH_nfs,
1138 RPCAUTH_portmap,
1139 RPCAUTH_statd,
1140 RPCAUTH_nfsd4_cb,
e571cbf1 1141 RPCAUTH_cache,
b3537c35 1142 RPCAUTH_nfsd,
4b9a445e 1143 RPCAUTH_gssd,
bb156749
TM
1144 RPCAUTH_RootEOF
1145};
1146
1147static const struct rpc_filelist files[] = {
1148 [RPCAUTH_lockd] = {
1149 .name = "lockd",
d6444062 1150 .mode = S_IFDIR | 0555,
bb156749
TM
1151 },
1152 [RPCAUTH_mount] = {
1153 .name = "mount",
d6444062 1154 .mode = S_IFDIR | 0555,
bb156749
TM
1155 },
1156 [RPCAUTH_nfs] = {
1157 .name = "nfs",
d6444062 1158 .mode = S_IFDIR | 0555,
bb156749
TM
1159 },
1160 [RPCAUTH_portmap] = {
1161 .name = "portmap",
d6444062 1162 .mode = S_IFDIR | 0555,
bb156749
TM
1163 },
1164 [RPCAUTH_statd] = {
1165 .name = "statd",
d6444062 1166 .mode = S_IFDIR | 0555,
bb156749
TM
1167 },
1168 [RPCAUTH_nfsd4_cb] = {
1169 .name = "nfsd4_cb",
d6444062 1170 .mode = S_IFDIR | 0555,
bb156749 1171 },
e571cbf1
TM
1172 [RPCAUTH_cache] = {
1173 .name = "cache",
d6444062 1174 .mode = S_IFDIR | 0555,
e571cbf1 1175 },
b3537c35
JL
1176 [RPCAUTH_nfsd] = {
1177 .name = "nfsd",
d6444062 1178 .mode = S_IFDIR | 0555,
b3537c35 1179 },
4b9a445e
JL
1180 [RPCAUTH_gssd] = {
1181 .name = "gssd",
d6444062 1182 .mode = S_IFDIR | 0555,
4b9a445e 1183 },
bb156749
TM
1184};
1185
432eb1a5
SK
1186/*
1187 * This call can be used only in RPC pipefs mount notification hooks.
1188 */
1189struct dentry *rpc_d_lookup_sb(const struct super_block *sb,
1190 const unsigned char *dir_name)
1191{
26fe5750 1192 struct qstr dir = QSTR_INIT(dir_name, strlen(dir_name));
d3db90b0 1193 return d_hash_and_lookup(sb->s_root, &dir);
432eb1a5
SK
1194}
1195EXPORT_SYMBOL_GPL(rpc_d_lookup_sb);
1196
4b9a445e 1197int rpc_pipefs_init_net(struct net *net)
c21a588f
SK
1198{
1199 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1200
4b9a445e
JL
1201 sn->gssd_dummy = rpc_mkpipe_data(&gssd_dummy_pipe_ops, 0);
1202 if (IS_ERR(sn->gssd_dummy))
1203 return PTR_ERR(sn->gssd_dummy);
1204
c21a588f 1205 mutex_init(&sn->pipefs_sb_lock);
2aed8b47 1206 sn->pipe_version = -1;
4b9a445e
JL
1207 return 0;
1208}
1209
1210void rpc_pipefs_exit_net(struct net *net)
1211{
1212 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1213
1214 rpc_destroy_pipe_data(sn->gssd_dummy);
c21a588f
SK
1215}
1216
1217/*
1218 * This call will be used for per network namespace operations calls.
1219 * Note: Function will be returned with pipefs_sb_lock taken if superblock was
1220 * found. This lock have to be released by rpc_put_sb_net() when all operations
1221 * will be completed.
1222 */
1223struct super_block *rpc_get_sb_net(const struct net *net)
1224{
1225 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1226
1227 mutex_lock(&sn->pipefs_sb_lock);
1228 if (sn->pipefs_sb)
1229 return sn->pipefs_sb;
1230 mutex_unlock(&sn->pipefs_sb_lock);
1231 return NULL;
1232}
1233EXPORT_SYMBOL_GPL(rpc_get_sb_net);
1234
1235void rpc_put_sb_net(const struct net *net)
1236{
1237 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1238
749386e9 1239 WARN_ON(sn->pipefs_sb == NULL);
c21a588f
SK
1240 mutex_unlock(&sn->pipefs_sb_lock);
1241}
1242EXPORT_SYMBOL_GPL(rpc_put_sb_net);
1243
4b9a445e
JL
1244static const struct rpc_filelist gssd_dummy_clnt_dir[] = {
1245 [0] = {
1246 .name = "clntXX",
d6444062 1247 .mode = S_IFDIR | 0555,
4b9a445e
JL
1248 },
1249};
1250
1251static ssize_t
1252dummy_downcall(struct file *filp, const char __user *src, size_t len)
1253{
1254 return -EINVAL;
1255}
1256
1257static const struct rpc_pipe_ops gssd_dummy_pipe_ops = {
1258 .upcall = rpc_pipe_generic_upcall,
1259 .downcall = dummy_downcall,
1260};
1261
e2f0c83a
JL
1262/*
1263 * Here we present a bogus "info" file to keep rpc.gssd happy. We don't expect
1264 * that it will ever use this info to handle an upcall, but rpc.gssd expects
1265 * that this file will be there and have a certain format.
1266 */
1267static int
260f71ef 1268rpc_dummy_info_show(struct seq_file *m, void *v)
e2f0c83a
JL
1269{
1270 seq_printf(m, "RPC server: %s\n", utsname()->nodename);
1271 seq_printf(m, "service: foo (1) version 0\n");
1272 seq_printf(m, "address: 127.0.0.1\n");
1273 seq_printf(m, "protocol: tcp\n");
1274 seq_printf(m, "port: 0\n");
1275 return 0;
1276}
260f71ef 1277DEFINE_SHOW_ATTRIBUTE(rpc_dummy_info);
e2f0c83a
JL
1278
1279static const struct rpc_filelist gssd_dummy_info_file[] = {
1280 [0] = {
1281 .name = "info",
260f71ef 1282 .i_fop = &rpc_dummy_info_fops,
d6444062 1283 .mode = S_IFREG | 0400,
e2f0c83a
JL
1284 },
1285};
1286
4b9a445e
JL
1287/**
1288 * rpc_gssd_dummy_populate - create a dummy gssd pipe
1289 * @root: root of the rpc_pipefs filesystem
1290 * @pipe_data: pipe data created when netns is initialized
1291 *
1292 * Create a dummy set of directories and a pipe that gssd can hold open to
1293 * indicate that it is up and running.
1294 */
1295static struct dentry *
1296rpc_gssd_dummy_populate(struct dentry *root, struct rpc_pipe *pipe_data)
1297{
1298 int ret = 0;
1299 struct dentry *gssd_dentry;
1300 struct dentry *clnt_dentry = NULL;
1301 struct dentry *pipe_dentry = NULL;
1302 struct qstr q = QSTR_INIT(files[RPCAUTH_gssd].name,
1303 strlen(files[RPCAUTH_gssd].name));
1304
1305 /* We should never get this far if "gssd" doesn't exist */
1306 gssd_dentry = d_hash_and_lookup(root, &q);
1307 if (!gssd_dentry)
1308 return ERR_PTR(-ENOENT);
1309
1310 ret = rpc_populate(gssd_dentry, gssd_dummy_clnt_dir, 0, 1, NULL);
1311 if (ret) {
1312 pipe_dentry = ERR_PTR(ret);
1313 goto out;
1314 }
1315
1316 q.name = gssd_dummy_clnt_dir[0].name;
1317 q.len = strlen(gssd_dummy_clnt_dir[0].name);
1318 clnt_dentry = d_hash_and_lookup(gssd_dentry, &q);
1319 if (!clnt_dentry) {
1320 pipe_dentry = ERR_PTR(-ENOENT);
1321 goto out;
1322 }
1323
e2f0c83a
JL
1324 ret = rpc_populate(clnt_dentry, gssd_dummy_info_file, 0, 1, NULL);
1325 if (ret) {
1326 __rpc_depopulate(gssd_dentry, gssd_dummy_clnt_dir, 0, 1);
1327 pipe_dentry = ERR_PTR(ret);
1328 goto out;
1329 }
1330
4b9a445e 1331 pipe_dentry = rpc_mkpipe_dentry(clnt_dentry, "gssd", NULL, pipe_data);
e2f0c83a
JL
1332 if (IS_ERR(pipe_dentry)) {
1333 __rpc_depopulate(clnt_dentry, gssd_dummy_info_file, 0, 1);
3396f92f 1334 __rpc_depopulate(gssd_dentry, gssd_dummy_clnt_dir, 0, 1);
e2f0c83a 1335 }
4b9a445e
JL
1336out:
1337 dput(clnt_dentry);
1338 dput(gssd_dentry);
1339 return pipe_dentry;
1340}
1341
23e66ba9
JL
1342static void
1343rpc_gssd_dummy_depopulate(struct dentry *pipe_dentry)
1344{
1345 struct dentry *clnt_dir = pipe_dentry->d_parent;
1346 struct dentry *gssd_dir = clnt_dir->d_parent;
1347
4a3877c4 1348 dget(pipe_dentry);
c5ef6035 1349 __rpc_rmpipe(d_inode(clnt_dir), pipe_dentry);
23e66ba9
JL
1350 __rpc_depopulate(clnt_dir, gssd_dummy_info_file, 0, 1);
1351 __rpc_depopulate(gssd_dir, gssd_dummy_clnt_dir, 0, 1);
1352 dput(pipe_dentry);
1353}
1354
1da177e4 1355static int
b9662f31 1356rpc_fill_super(struct super_block *sb, struct fs_context *fc)
1da177e4
LT
1357{
1358 struct inode *inode;
4b9a445e 1359 struct dentry *root, *gssd_dentry;
b9662f31 1360 struct net *net = sb->s_fs_info;
90c4e829 1361 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
2d00131a 1362 int err;
1da177e4 1363
09cbfeaf
KS
1364 sb->s_blocksize = PAGE_SIZE;
1365 sb->s_blocksize_bits = PAGE_SHIFT;
1da177e4
LT
1366 sb->s_magic = RPCAUTH_GSSMAGIC;
1367 sb->s_op = &s_ops;
b26d4cd3 1368 sb->s_d_op = &simple_dentry_operations;
1da177e4
LT
1369 sb->s_time_gran = 1;
1370
d6444062 1371 inode = rpc_get_inode(sb, S_IFDIR | 0555);
48fde701
AV
1372 sb->s_root = root = d_make_root(inode);
1373 if (!root)
1da177e4 1374 return -ENOMEM;
ac6fecee 1375 if (rpc_populate(root, files, RPCAUTH_lockd, RPCAUTH_RootEOF, NULL))
fc7bed8c 1376 return -ENOMEM;
4b9a445e
JL
1377
1378 gssd_dentry = rpc_gssd_dummy_populate(root, sn->gssd_dummy);
1379 if (IS_ERR(gssd_dentry)) {
1380 __rpc_depopulate(root, files, RPCAUTH_lockd, RPCAUTH_RootEOF);
1381 return PTR_ERR(gssd_dentry);
1382 }
1383
6c67a3e4
VA
1384 dprintk("RPC: sending pipefs MOUNT notification for net %x%s\n",
1385 net->ns.inum, NET_NAME(net));
38481605 1386 mutex_lock(&sn->pipefs_sb_lock);
37629b57 1387 sn->pipefs_sb = sb;
2d00131a
SK
1388 err = blocking_notifier_call_chain(&rpc_pipefs_notifier_list,
1389 RPC_PIPEFS_MOUNT,
1390 sb);
1391 if (err)
1392 goto err_depopulate;
38481605 1393 mutex_unlock(&sn->pipefs_sb_lock);
1da177e4 1394 return 0;
2d00131a
SK
1395
1396err_depopulate:
23e66ba9 1397 rpc_gssd_dummy_depopulate(gssd_dentry);
2d00131a
SK
1398 blocking_notifier_call_chain(&rpc_pipefs_notifier_list,
1399 RPC_PIPEFS_UMOUNT,
1400 sb);
37629b57 1401 sn->pipefs_sb = NULL;
2d00131a 1402 __rpc_depopulate(root, files, RPCAUTH_lockd, RPCAUTH_RootEOF);
38481605 1403 mutex_unlock(&sn->pipefs_sb_lock);
2d00131a 1404 return err;
1da177e4
LT
1405}
1406
89f84243
JL
1407bool
1408gssd_running(struct net *net)
1409{
1410 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1411 struct rpc_pipe *pipe = sn->gssd_dummy;
1412
1413 return pipe->nreaders || pipe->nwriters;
1414}
1415EXPORT_SYMBOL_GPL(gssd_running);
1416
b9662f31
DH
1417static int rpc_fs_get_tree(struct fs_context *fc)
1418{
1419 fc->s_fs_info = get_net(fc->net_ns);
1420 return vfs_get_super(fc, vfs_get_keyed_super, rpc_fill_super);
1421}
1422
1423static void rpc_fs_free_fc(struct fs_context *fc)
1da177e4 1424{
b9662f31
DH
1425 if (fc->s_fs_info)
1426 put_net(fc->s_fs_info);
1427}
1428
1429static const struct fs_context_operations rpc_fs_context_ops = {
1430 .free = rpc_fs_free_fc,
1431 .get_tree = rpc_fs_get_tree,
1432};
1433
1434static int rpc_init_fs_context(struct fs_context *fc)
1435{
1436 put_user_ns(fc->user_ns);
1437 fc->user_ns = get_user_ns(fc->net_ns->user_ns);
1438 fc->ops = &rpc_fs_context_ops;
1439 return 0;
1da177e4
LT
1440}
1441
09acfea5 1442static void rpc_kill_sb(struct super_block *sb)
021c68de
SK
1443{
1444 struct net *net = sb->s_fs_info;
90c4e829 1445 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
021c68de 1446
c21a588f 1447 mutex_lock(&sn->pipefs_sb_lock);
642fe4d0
TM
1448 if (sn->pipefs_sb != sb) {
1449 mutex_unlock(&sn->pipefs_sb_lock);
1450 goto out;
1451 }
90c4e829 1452 sn->pipefs_sb = NULL;
6c67a3e4
VA
1453 dprintk("RPC: sending pipefs UMOUNT notification for net %x%s\n",
1454 net->ns.inum, NET_NAME(net));
2d00131a
SK
1455 blocking_notifier_call_chain(&rpc_pipefs_notifier_list,
1456 RPC_PIPEFS_UMOUNT,
1457 sb);
adb6fa7f 1458 mutex_unlock(&sn->pipefs_sb_lock);
642fe4d0 1459out:
021c68de 1460 kill_litter_super(sb);
d91ee87d 1461 put_net(net);
1da177e4
LT
1462}
1463
1464static struct file_system_type rpc_pipe_fs_type = {
1465 .owner = THIS_MODULE,
1466 .name = "rpc_pipefs",
b9662f31 1467 .init_fs_context = rpc_init_fs_context,
021c68de 1468 .kill_sb = rpc_kill_sb,
1da177e4 1469};
7f78e035 1470MODULE_ALIAS_FS("rpc_pipefs");
fa7614dd 1471MODULE_ALIAS("rpc_pipefs");
1da177e4
LT
1472
1473static void
51cc5068 1474init_once(void *foo)
1da177e4
LT
1475{
1476 struct rpc_inode *rpci = (struct rpc_inode *) foo;
1477
a35afb83
CL
1478 inode_init_once(&rpci->vfs_inode);
1479 rpci->private = NULL;
ba9e0975 1480 rpci->pipe = NULL;
a35afb83 1481 init_waitqueue_head(&rpci->waitq);
1da177e4
LT
1482}
1483
1484int register_rpc_pipefs(void)
1485{
5bd5f581
AM
1486 int err;
1487
1da177e4 1488 rpc_inode_cachep = kmem_cache_create("rpc_inode_cache",
fffb60f9
PJ
1489 sizeof(struct rpc_inode),
1490 0, (SLAB_HWCACHE_ALIGN|SLAB_RECLAIM_ACCOUNT|
5d097056 1491 SLAB_MEM_SPREAD|SLAB_ACCOUNT),
20c2df83 1492 init_once);
1da177e4
LT
1493 if (!rpc_inode_cachep)
1494 return -ENOMEM;
80df9d20
SK
1495 err = rpc_clients_notifier_register();
1496 if (err)
1497 goto err_notifier;
5bd5f581 1498 err = register_filesystem(&rpc_pipe_fs_type);
80df9d20
SK
1499 if (err)
1500 goto err_register;
1da177e4 1501 return 0;
80df9d20
SK
1502
1503err_register:
1504 rpc_clients_notifier_unregister();
1505err_notifier:
1506 kmem_cache_destroy(rpc_inode_cachep);
1507 return err;
1da177e4
LT
1508}
1509
1510void unregister_rpc_pipefs(void)
1511{
80df9d20 1512 rpc_clients_notifier_unregister();
1a1d92c1 1513 kmem_cache_destroy(rpc_inode_cachep);
1da177e4
LT
1514 unregister_filesystem(&rpc_pipe_fs_type);
1515}