vfs: make it possible to access the dentry hash/len as one 64-bit entry
[linux-2.6-block.git] / net / sunrpc / rpc_pipe.c
CommitLineData
1da177e4
LT
1/*
2 * net/sunrpc/rpc_pipe.c
3 *
4 * Userland/kernel interface for rpcauth_gss.
5 * Code shamelessly plagiarized from fs/nfsd/nfsctl.c
d51fe1be 6 * and fs/sysfs/inode.c
1da177e4
LT
7 *
8 * Copyright (c) 2002, Trond Myklebust <trond.myklebust@fys.uio.no>
9 *
10 */
1da177e4
LT
11#include <linux/module.h>
12#include <linux/slab.h>
13#include <linux/string.h>
14#include <linux/pagemap.h>
15#include <linux/mount.h>
16#include <linux/namei.h>
50e437d5 17#include <linux/fsnotify.h>
1da177e4 18#include <linux/kernel.h>
2446ab60 19#include <linux/rcupdate.h>
1da177e4
LT
20
21#include <asm/ioctls.h>
1da177e4
LT
22#include <linux/poll.h>
23#include <linux/wait.h>
24#include <linux/seq_file.h>
25
26#include <linux/sunrpc/clnt.h>
27#include <linux/workqueue.h>
28#include <linux/sunrpc/rpc_pipe_fs.h>
8854e82d 29#include <linux/sunrpc/cache.h>
021c68de 30#include <linux/nsproxy.h>
2d00131a 31#include <linux/notifier.h>
1da177e4 32
021c68de 33#include "netns.h"
2d00131a 34#include "sunrpc.h"
1da177e4 35
efc46bf2
SK
36#define RPCDBG_FACILITY RPCDBG_DEBUG
37
38#define NET_NAME(net) ((net == &init_net) ? " (init_net)" : "")
1da177e4
LT
39
40static struct file_system_type rpc_pipe_fs_type;
41
42
e18b890b 43static struct kmem_cache *rpc_inode_cachep __read_mostly;
1da177e4
LT
44
45#define RPC_UPCALL_TIMEOUT (30*HZ)
46
2d00131a
SK
47static BLOCKING_NOTIFIER_HEAD(rpc_pipefs_notifier_list);
48
49int rpc_pipefs_notifier_register(struct notifier_block *nb)
50{
51 return blocking_notifier_chain_cond_register(&rpc_pipefs_notifier_list, nb);
52}
53EXPORT_SYMBOL_GPL(rpc_pipefs_notifier_register);
54
55void rpc_pipefs_notifier_unregister(struct notifier_block *nb)
56{
57 blocking_notifier_chain_unregister(&rpc_pipefs_notifier_list, nb);
58}
59EXPORT_SYMBOL_GPL(rpc_pipefs_notifier_unregister);
60
591ad7fe 61static void rpc_purge_list(wait_queue_head_t *waitq, struct list_head *head,
9842ef35 62 void (*destroy_msg)(struct rpc_pipe_msg *), int err)
1da177e4 63{
1da177e4
LT
64 struct rpc_pipe_msg *msg;
65
9842ef35
TM
66 if (list_empty(head))
67 return;
68 do {
b3eb67a2 69 msg = list_entry(head->next, struct rpc_pipe_msg, list);
5a67657a 70 list_del_init(&msg->list);
1da177e4 71 msg->errno = err;
b3eb67a2 72 destroy_msg(msg);
9842ef35 73 } while (!list_empty(head));
591ad7fe 74 wake_up(waitq);
1da177e4
LT
75}
76
77static void
65f27f38 78rpc_timeout_upcall_queue(struct work_struct *work)
1da177e4 79{
9842ef35 80 LIST_HEAD(free_list);
ba9e0975
SK
81 struct rpc_pipe *pipe =
82 container_of(work, struct rpc_pipe, queue_timeout.work);
9842ef35 83 void (*destroy_msg)(struct rpc_pipe_msg *);
591ad7fe 84 struct dentry *dentry;
1da177e4 85
ba9e0975 86 spin_lock(&pipe->lock);
ba9e0975
SK
87 destroy_msg = pipe->ops->destroy_msg;
88 if (pipe->nreaders == 0) {
89 list_splice_init(&pipe->pipe, &free_list);
90 pipe->pipelen = 0;
9842ef35 91 }
591ad7fe 92 dentry = dget(pipe->dentry);
ba9e0975 93 spin_unlock(&pipe->lock);
591ad7fe
SK
94 if (dentry) {
95 rpc_purge_list(&RPC_I(dentry->d_inode)->waitq,
96 &free_list, destroy_msg, -ETIMEDOUT);
97 dput(dentry);
9842ef35 98 }
1da177e4
LT
99}
100
c1225158
PT
101ssize_t rpc_pipe_generic_upcall(struct file *filp, struct rpc_pipe_msg *msg,
102 char __user *dst, size_t buflen)
103{
104 char *data = (char *)msg->data + msg->copied;
105 size_t mlen = min(msg->len - msg->copied, buflen);
106 unsigned long left;
107
108 left = copy_to_user(dst, data, mlen);
109 if (left == mlen) {
110 msg->errno = -EFAULT;
111 return -EFAULT;
112 }
113
114 mlen -= left;
115 msg->copied += mlen;
116 msg->errno = 0;
117 return mlen;
118}
119EXPORT_SYMBOL_GPL(rpc_pipe_generic_upcall);
120
93a44a75 121/**
1a5778aa 122 * rpc_queue_upcall - queue an upcall message to userspace
93a44a75
BF
123 * @inode: inode of upcall pipe on which to queue given message
124 * @msg: message to queue
125 *
126 * Call with an @inode created by rpc_mkpipe() to queue an upcall.
127 * A userspace process may then later read the upcall by performing a
128 * read on an open file for this inode. It is up to the caller to
129 * initialize the fields of @msg (other than @msg->list) appropriately.
130 */
1da177e4 131int
d706ed1f 132rpc_queue_upcall(struct rpc_pipe *pipe, struct rpc_pipe_msg *msg)
1da177e4 133{
6070fe6f 134 int res = -EPIPE;
591ad7fe 135 struct dentry *dentry;
1da177e4 136
d0fe13ba 137 spin_lock(&pipe->lock);
d0fe13ba
SK
138 if (pipe->nreaders) {
139 list_add_tail(&msg->list, &pipe->pipe);
140 pipe->pipelen += msg->len;
6070fe6f 141 res = 0;
d0fe13ba
SK
142 } else if (pipe->flags & RPC_PIPE_WAIT_FOR_OPEN) {
143 if (list_empty(&pipe->pipe))
24c5d9d7 144 queue_delayed_work(rpciod_workqueue,
d0fe13ba 145 &pipe->queue_timeout,
1da177e4 146 RPC_UPCALL_TIMEOUT);
d0fe13ba
SK
147 list_add_tail(&msg->list, &pipe->pipe);
148 pipe->pipelen += msg->len;
6070fe6f
TM
149 res = 0;
150 }
591ad7fe 151 dentry = dget(pipe->dentry);
d0fe13ba 152 spin_unlock(&pipe->lock);
591ad7fe
SK
153 if (dentry) {
154 wake_up(&RPC_I(dentry->d_inode)->waitq);
155 dput(dentry);
156 }
1da177e4
LT
157 return res;
158}
468039ee 159EXPORT_SYMBOL_GPL(rpc_queue_upcall);
1da177e4 160
6070fe6f
TM
161static inline void
162rpc_inode_setowner(struct inode *inode, void *private)
163{
164 RPC_I(inode)->private = private;
165}
166
1da177e4
LT
167static void
168rpc_close_pipes(struct inode *inode)
169{
ba9e0975 170 struct rpc_pipe *pipe = RPC_I(inode)->pipe;
e712804a 171 int need_release;
ad6b1340 172 LIST_HEAD(free_list);
1da177e4 173
1b1dcc1b 174 mutex_lock(&inode->i_mutex);
ad6b1340
SK
175 spin_lock(&pipe->lock);
176 need_release = pipe->nreaders != 0 || pipe->nwriters != 0;
177 pipe->nreaders = 0;
178 list_splice_init(&pipe->in_upcall, &free_list);
179 list_splice_init(&pipe->pipe, &free_list);
180 pipe->pipelen = 0;
181 pipe->dentry = NULL;
182 spin_unlock(&pipe->lock);
591ad7fe 183 rpc_purge_list(&RPC_I(inode)->waitq, &free_list, pipe->ops->destroy_msg, -EPIPE);
ad6b1340
SK
184 pipe->nwriters = 0;
185 if (need_release && pipe->ops->release_pipe)
186 pipe->ops->release_pipe(inode);
187 cancel_delayed_work_sync(&pipe->queue_timeout);
6070fe6f 188 rpc_inode_setowner(inode, NULL);
2c9030ee 189 RPC_I(inode)->pipe = NULL;
1b1dcc1b 190 mutex_unlock(&inode->i_mutex);
1da177e4
LT
191}
192
1da177e4
LT
193static struct inode *
194rpc_alloc_inode(struct super_block *sb)
195{
196 struct rpc_inode *rpci;
e94b1766 197 rpci = (struct rpc_inode *)kmem_cache_alloc(rpc_inode_cachep, GFP_KERNEL);
1da177e4
LT
198 if (!rpci)
199 return NULL;
200 return &rpci->vfs_inode;
201}
202
203static void
fa0d7e3d 204rpc_i_callback(struct rcu_head *head)
1da177e4 205{
fa0d7e3d 206 struct inode *inode = container_of(head, struct inode, i_rcu);
1da177e4
LT
207 kmem_cache_free(rpc_inode_cachep, RPC_I(inode));
208}
209
fa0d7e3d
NP
210static void
211rpc_destroy_inode(struct inode *inode)
212{
213 call_rcu(&inode->i_rcu, rpc_i_callback);
214}
215
1da177e4
LT
216static int
217rpc_pipe_open(struct inode *inode, struct file *filp)
218{
2c9030ee 219 struct rpc_pipe *pipe;
c3810608 220 int first_open;
1da177e4
LT
221 int res = -ENXIO;
222
1b1dcc1b 223 mutex_lock(&inode->i_mutex);
2c9030ee
SK
224 pipe = RPC_I(inode)->pipe;
225 if (pipe == NULL)
c3810608 226 goto out;
d0fe13ba
SK
227 first_open = pipe->nreaders == 0 && pipe->nwriters == 0;
228 if (first_open && pipe->ops->open_pipe) {
229 res = pipe->ops->open_pipe(inode);
c3810608
BF
230 if (res)
231 goto out;
1da177e4 232 }
c3810608 233 if (filp->f_mode & FMODE_READ)
d0fe13ba 234 pipe->nreaders++;
c3810608 235 if (filp->f_mode & FMODE_WRITE)
d0fe13ba 236 pipe->nwriters++;
c3810608
BF
237 res = 0;
238out:
1b1dcc1b 239 mutex_unlock(&inode->i_mutex);
1da177e4
LT
240 return res;
241}
242
243static int
244rpc_pipe_release(struct inode *inode, struct file *filp)
245{
2c9030ee 246 struct rpc_pipe *pipe;
1da177e4 247 struct rpc_pipe_msg *msg;
e712804a 248 int last_close;
1da177e4 249
1b1dcc1b 250 mutex_lock(&inode->i_mutex);
2c9030ee
SK
251 pipe = RPC_I(inode)->pipe;
252 if (pipe == NULL)
1da177e4 253 goto out;
655b5bb4 254 msg = filp->private_data;
1da177e4 255 if (msg != NULL) {
ba9e0975 256 spin_lock(&pipe->lock);
48e49187 257 msg->errno = -EAGAIN;
5a67657a 258 list_del_init(&msg->list);
ba9e0975
SK
259 spin_unlock(&pipe->lock);
260 pipe->ops->destroy_msg(msg);
1da177e4
LT
261 }
262 if (filp->f_mode & FMODE_WRITE)
ba9e0975 263 pipe->nwriters --;
9842ef35 264 if (filp->f_mode & FMODE_READ) {
ba9e0975
SK
265 pipe->nreaders --;
266 if (pipe->nreaders == 0) {
9842ef35 267 LIST_HEAD(free_list);
ba9e0975
SK
268 spin_lock(&pipe->lock);
269 list_splice_init(&pipe->pipe, &free_list);
270 pipe->pipelen = 0;
271 spin_unlock(&pipe->lock);
591ad7fe 272 rpc_purge_list(&RPC_I(inode)->waitq, &free_list,
ba9e0975 273 pipe->ops->destroy_msg, -EAGAIN);
9842ef35
TM
274 }
275 }
ba9e0975
SK
276 last_close = pipe->nwriters == 0 && pipe->nreaders == 0;
277 if (last_close && pipe->ops->release_pipe)
278 pipe->ops->release_pipe(inode);
1da177e4 279out:
1b1dcc1b 280 mutex_unlock(&inode->i_mutex);
1da177e4
LT
281 return 0;
282}
283
284static ssize_t
285rpc_pipe_read(struct file *filp, char __user *buf, size_t len, loff_t *offset)
286{
303b46bb 287 struct inode *inode = filp->f_path.dentry->d_inode;
2c9030ee 288 struct rpc_pipe *pipe;
1da177e4
LT
289 struct rpc_pipe_msg *msg;
290 int res = 0;
291
1b1dcc1b 292 mutex_lock(&inode->i_mutex);
2c9030ee
SK
293 pipe = RPC_I(inode)->pipe;
294 if (pipe == NULL) {
1da177e4
LT
295 res = -EPIPE;
296 goto out_unlock;
297 }
298 msg = filp->private_data;
299 if (msg == NULL) {
d0fe13ba
SK
300 spin_lock(&pipe->lock);
301 if (!list_empty(&pipe->pipe)) {
302 msg = list_entry(pipe->pipe.next,
1da177e4
LT
303 struct rpc_pipe_msg,
304 list);
d0fe13ba
SK
305 list_move(&msg->list, &pipe->in_upcall);
306 pipe->pipelen -= msg->len;
1da177e4
LT
307 filp->private_data = msg;
308 msg->copied = 0;
309 }
d0fe13ba 310 spin_unlock(&pipe->lock);
1da177e4
LT
311 if (msg == NULL)
312 goto out_unlock;
313 }
314 /* NOTE: it is up to the callback to update msg->copied */
d0fe13ba 315 res = pipe->ops->upcall(filp, msg, buf, len);
1da177e4
LT
316 if (res < 0 || msg->len == msg->copied) {
317 filp->private_data = NULL;
d0fe13ba 318 spin_lock(&pipe->lock);
5a67657a 319 list_del_init(&msg->list);
d0fe13ba
SK
320 spin_unlock(&pipe->lock);
321 pipe->ops->destroy_msg(msg);
1da177e4
LT
322 }
323out_unlock:
1b1dcc1b 324 mutex_unlock(&inode->i_mutex);
1da177e4
LT
325 return res;
326}
327
328static ssize_t
329rpc_pipe_write(struct file *filp, const char __user *buf, size_t len, loff_t *offset)
330{
303b46bb 331 struct inode *inode = filp->f_path.dentry->d_inode;
1da177e4
LT
332 int res;
333
1b1dcc1b 334 mutex_lock(&inode->i_mutex);
1da177e4 335 res = -EPIPE;
2c9030ee
SK
336 if (RPC_I(inode)->pipe != NULL)
337 res = RPC_I(inode)->pipe->ops->downcall(filp, buf, len);
1b1dcc1b 338 mutex_unlock(&inode->i_mutex);
1da177e4
LT
339 return res;
340}
341
342static unsigned int
343rpc_pipe_poll(struct file *filp, struct poll_table_struct *wait)
344{
591ad7fe
SK
345 struct inode *inode = filp->f_path.dentry->d_inode;
346 struct rpc_inode *rpci = RPC_I(inode);
347 unsigned int mask = POLLOUT | POLLWRNORM;
1da177e4 348
1da177e4
LT
349 poll_wait(filp, &rpci->waitq, wait);
350
591ad7fe
SK
351 mutex_lock(&inode->i_mutex);
352 if (rpci->pipe == NULL)
1da177e4 353 mask |= POLLERR | POLLHUP;
591ad7fe 354 else if (filp->private_data || !list_empty(&rpci->pipe->pipe))
1da177e4 355 mask |= POLLIN | POLLRDNORM;
591ad7fe 356 mutex_unlock(&inode->i_mutex);
1da177e4
LT
357 return mask;
358}
359
a6f8dbc6
AB
360static long
361rpc_pipe_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
1da177e4 362{
a6f8dbc6 363 struct inode *inode = filp->f_path.dentry->d_inode;
2c9030ee 364 struct rpc_pipe *pipe;
1da177e4
LT
365 int len;
366
367 switch (cmd) {
368 case FIONREAD:
2c9030ee
SK
369 mutex_lock(&inode->i_mutex);
370 pipe = RPC_I(inode)->pipe;
371 if (pipe == NULL) {
372 mutex_unlock(&inode->i_mutex);
1da177e4 373 return -EPIPE;
a6f8dbc6 374 }
2c9030ee 375 spin_lock(&pipe->lock);
d0fe13ba 376 len = pipe->pipelen;
1da177e4
LT
377 if (filp->private_data) {
378 struct rpc_pipe_msg *msg;
655b5bb4 379 msg = filp->private_data;
1da177e4
LT
380 len += msg->len - msg->copied;
381 }
d0fe13ba 382 spin_unlock(&pipe->lock);
2c9030ee 383 mutex_unlock(&inode->i_mutex);
1da177e4
LT
384 return put_user(len, (int __user *)arg);
385 default:
386 return -EINVAL;
387 }
388}
389
da7071d7 390static const struct file_operations rpc_pipe_fops = {
1da177e4
LT
391 .owner = THIS_MODULE,
392 .llseek = no_llseek,
393 .read = rpc_pipe_read,
394 .write = rpc_pipe_write,
395 .poll = rpc_pipe_poll,
674b604c 396 .unlocked_ioctl = rpc_pipe_ioctl,
1da177e4
LT
397 .open = rpc_pipe_open,
398 .release = rpc_pipe_release,
399};
400
401static int
402rpc_show_info(struct seq_file *m, void *v)
403{
404 struct rpc_clnt *clnt = m->private;
405
2446ab60 406 rcu_read_lock();
4e0038b6
TM
407 seq_printf(m, "RPC server: %s\n",
408 rcu_dereference(clnt->cl_xprt)->servername);
1da177e4
LT
409 seq_printf(m, "service: %s (%d) version %d\n", clnt->cl_protname,
410 clnt->cl_prog, clnt->cl_vers);
e7f78657
CL
411 seq_printf(m, "address: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_ADDR));
412 seq_printf(m, "protocol: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_PROTO));
bf19aace 413 seq_printf(m, "port: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_PORT));
2446ab60 414 rcu_read_unlock();
1da177e4
LT
415 return 0;
416}
417
418static int
419rpc_info_open(struct inode *inode, struct file *file)
420{
006abe88 421 struct rpc_clnt *clnt = NULL;
1da177e4
LT
422 int ret = single_open(file, rpc_show_info, NULL);
423
424 if (!ret) {
425 struct seq_file *m = file->private_data;
006abe88
TM
426
427 spin_lock(&file->f_path.dentry->d_lock);
428 if (!d_unhashed(file->f_path.dentry))
429 clnt = RPC_I(inode)->private;
430 if (clnt != NULL && atomic_inc_not_zero(&clnt->cl_count)) {
431 spin_unlock(&file->f_path.dentry->d_lock);
1da177e4
LT
432 m->private = clnt;
433 } else {
006abe88 434 spin_unlock(&file->f_path.dentry->d_lock);
1da177e4
LT
435 single_release(inode, file);
436 ret = -EINVAL;
437 }
1da177e4
LT
438 }
439 return ret;
440}
441
442static int
443rpc_info_release(struct inode *inode, struct file *file)
444{
445 struct seq_file *m = file->private_data;
446 struct rpc_clnt *clnt = (struct rpc_clnt *)m->private;
447
448 if (clnt)
449 rpc_release_client(clnt);
450 return single_release(inode, file);
451}
452
da7071d7 453static const struct file_operations rpc_info_operations = {
1da177e4
LT
454 .owner = THIS_MODULE,
455 .open = rpc_info_open,
456 .read = seq_read,
457 .llseek = seq_lseek,
458 .release = rpc_info_release,
459};
460
461
1da177e4
LT
462/*
463 * Description of fs contents.
464 */
465struct rpc_filelist {
ac6fecee 466 const char *name;
99ac48f5 467 const struct file_operations *i_fop;
7364af6a 468 umode_t mode;
1da177e4
LT
469};
470
fe15ce44 471static int rpc_delete_dentry(const struct dentry *dentry)
62e1761c
TM
472{
473 return 1;
474}
475
3ba13d17 476static const struct dentry_operations rpc_dentry_operations = {
62e1761c
TM
477 .d_delete = rpc_delete_dentry,
478};
479
1da177e4 480static struct inode *
7364af6a 481rpc_get_inode(struct super_block *sb, umode_t mode)
1da177e4
LT
482{
483 struct inode *inode = new_inode(sb);
484 if (!inode)
485 return NULL;
85fe4025 486 inode->i_ino = get_next_ino();
1da177e4 487 inode->i_mode = mode;
1da177e4 488 inode->i_atime = inode->i_mtime = inode->i_ctime = CURRENT_TIME;
89f0e4fe
JP
489 switch (mode & S_IFMT) {
490 case S_IFDIR:
491 inode->i_fop = &simple_dir_operations;
492 inode->i_op = &simple_dir_inode_operations;
493 inc_nlink(inode);
494 default:
495 break;
1da177e4
LT
496 }
497 return inode;
498}
499
7589806e
TM
500static int __rpc_create_common(struct inode *dir, struct dentry *dentry,
501 umode_t mode,
502 const struct file_operations *i_fop,
503 void *private)
504{
505 struct inode *inode;
506
beb0f0a9 507 d_drop(dentry);
7589806e
TM
508 inode = rpc_get_inode(dir->i_sb, mode);
509 if (!inode)
510 goto out_err;
511 inode->i_ino = iunique(dir->i_sb, 100);
512 if (i_fop)
513 inode->i_fop = i_fop;
514 if (private)
515 rpc_inode_setowner(inode, private);
516 d_add(dentry, inode);
517 return 0;
518out_err:
519 printk(KERN_WARNING "%s: %s failed to allocate inode for dentry %s\n",
520 __FILE__, __func__, dentry->d_name.name);
521 dput(dentry);
522 return -ENOMEM;
523}
524
ac6fecee
TM
525static int __rpc_create(struct inode *dir, struct dentry *dentry,
526 umode_t mode,
527 const struct file_operations *i_fop,
528 void *private)
529{
530 int err;
531
532 err = __rpc_create_common(dir, dentry, S_IFREG | mode, i_fop, private);
533 if (err)
534 return err;
535 fsnotify_create(dir, dentry);
536 return 0;
537}
538
7589806e
TM
539static int __rpc_mkdir(struct inode *dir, struct dentry *dentry,
540 umode_t mode,
541 const struct file_operations *i_fop,
542 void *private)
543{
544 int err;
545
546 err = __rpc_create_common(dir, dentry, S_IFDIR | mode, i_fop, private);
547 if (err)
548 return err;
549 inc_nlink(dir);
550 fsnotify_mkdir(dir, dentry);
551 return 0;
552}
553
ba9e0975
SK
554static void
555init_pipe(struct rpc_pipe *pipe)
556{
557 pipe->nreaders = 0;
558 pipe->nwriters = 0;
559 INIT_LIST_HEAD(&pipe->in_upcall);
560 INIT_LIST_HEAD(&pipe->in_downcall);
561 INIT_LIST_HEAD(&pipe->pipe);
562 pipe->pipelen = 0;
ba9e0975
SK
563 INIT_DELAYED_WORK(&pipe->queue_timeout,
564 rpc_timeout_upcall_queue);
565 pipe->ops = NULL;
566 spin_lock_init(&pipe->lock);
c239d83b
SK
567 pipe->dentry = NULL;
568}
ba9e0975 569
c239d83b
SK
570void rpc_destroy_pipe_data(struct rpc_pipe *pipe)
571{
572 kfree(pipe);
ba9e0975 573}
c239d83b 574EXPORT_SYMBOL_GPL(rpc_destroy_pipe_data);
ba9e0975 575
c239d83b 576struct rpc_pipe *rpc_mkpipe_data(const struct rpc_pipe_ops *ops, int flags)
7589806e 577{
ba9e0975 578 struct rpc_pipe *pipe;
7589806e 579
ba9e0975
SK
580 pipe = kzalloc(sizeof(struct rpc_pipe), GFP_KERNEL);
581 if (!pipe)
c239d83b 582 return ERR_PTR(-ENOMEM);
ba9e0975 583 init_pipe(pipe);
c239d83b
SK
584 pipe->ops = ops;
585 pipe->flags = flags;
586 return pipe;
587}
588EXPORT_SYMBOL_GPL(rpc_mkpipe_data);
589
590static int __rpc_mkpipe_dentry(struct inode *dir, struct dentry *dentry,
591 umode_t mode,
592 const struct file_operations *i_fop,
593 void *private,
594 struct rpc_pipe *pipe)
7589806e
TM
595{
596 struct rpc_inode *rpci;
597 int err;
598
599 err = __rpc_create_common(dir, dentry, S_IFIFO | mode, i_fop, private);
600 if (err)
601 return err;
602 rpci = RPC_I(dentry->d_inode);
7589806e 603 rpci->private = private;
ba9e0975 604 rpci->pipe = pipe;
7589806e
TM
605 fsnotify_create(dir, dentry);
606 return 0;
607}
608
ac6fecee
TM
609static int __rpc_rmdir(struct inode *dir, struct dentry *dentry)
610{
611 int ret;
612
613 dget(dentry);
614 ret = simple_rmdir(dir, dentry);
615 d_delete(dentry);
616 dput(dentry);
617 return ret;
618}
619
eee17325
SK
620int rpc_rmdir(struct dentry *dentry)
621{
622 struct dentry *parent;
623 struct inode *dir;
624 int error;
625
626 parent = dget_parent(dentry);
627 dir = parent->d_inode;
628 mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT);
629 error = __rpc_rmdir(dir, dentry);
630 mutex_unlock(&dir->i_mutex);
631 dput(parent);
632 return error;
633}
634EXPORT_SYMBOL_GPL(rpc_rmdir);
635
810d90bc
TM
636static int __rpc_unlink(struct inode *dir, struct dentry *dentry)
637{
638 int ret;
639
640 dget(dentry);
641 ret = simple_unlink(dir, dentry);
642 d_delete(dentry);
643 dput(dentry);
644 return ret;
645}
646
647static int __rpc_rmpipe(struct inode *dir, struct dentry *dentry)
648{
649 struct inode *inode = dentry->d_inode;
810d90bc 650
810d90bc
TM
651 rpc_close_pipes(inode);
652 return __rpc_unlink(dir, dentry);
653}
654
5bff0386 655static struct dentry *__rpc_lookup_create_exclusive(struct dentry *parent,
cfeaa4a3
TM
656 struct qstr *name)
657{
658 struct dentry *dentry;
659
660 dentry = d_lookup(parent, name);
661 if (!dentry) {
662 dentry = d_alloc(parent, name);
5bff0386
SK
663 if (!dentry)
664 return ERR_PTR(-ENOMEM);
cfeaa4a3 665 }
5bff0386 666 if (dentry->d_inode == NULL) {
fb045adb 667 d_set_d_op(dentry, &rpc_dentry_operations);
cfeaa4a3 668 return dentry;
5bff0386 669 }
cfeaa4a3
TM
670 dput(dentry);
671 return ERR_PTR(-EEXIST);
672}
673
1da177e4
LT
674/*
675 * FIXME: This probably has races.
676 */
ac6fecee
TM
677static void __rpc_depopulate(struct dentry *parent,
678 const struct rpc_filelist *files,
679 int start, int eof)
1da177e4
LT
680{
681 struct inode *dir = parent->d_inode;
ac6fecee
TM
682 struct dentry *dentry;
683 struct qstr name;
684 int i;
1da177e4 685
ac6fecee
TM
686 for (i = start; i < eof; i++) {
687 name.name = files[i].name;
688 name.len = strlen(files[i].name);
689 name.hash = full_name_hash(name.name, name.len);
690 dentry = d_lookup(parent, &name);
691
692 if (dentry == NULL)
62e1761c 693 continue;
ac6fecee
TM
694 if (dentry->d_inode == NULL)
695 goto next;
696 switch (dentry->d_inode->i_mode & S_IFMT) {
697 default:
698 BUG();
699 case S_IFREG:
700 __rpc_unlink(dir, dentry);
1da177e4 701 break;
ac6fecee
TM
702 case S_IFDIR:
703 __rpc_rmdir(dir, dentry);
704 }
705next:
706 dput(dentry);
1da177e4 707 }
ac6fecee
TM
708}
709
710static void rpc_depopulate(struct dentry *parent,
711 const struct rpc_filelist *files,
712 int start, int eof)
713{
714 struct inode *dir = parent->d_inode;
715
716 mutex_lock_nested(&dir->i_mutex, I_MUTEX_CHILD);
717 __rpc_depopulate(parent, files, start, eof);
1b1dcc1b 718 mutex_unlock(&dir->i_mutex);
1da177e4
LT
719}
720
ac6fecee
TM
721static int rpc_populate(struct dentry *parent,
722 const struct rpc_filelist *files,
723 int start, int eof,
724 void *private)
1da177e4 725{
ac6fecee 726 struct inode *dir = parent->d_inode;
1da177e4 727 struct dentry *dentry;
ac6fecee 728 int i, err;
1da177e4 729
1b1dcc1b 730 mutex_lock(&dir->i_mutex);
1da177e4 731 for (i = start; i < eof; i++) {
ac6fecee
TM
732 struct qstr q;
733
734 q.name = files[i].name;
735 q.len = strlen(files[i].name);
736 q.hash = full_name_hash(q.name, q.len);
737 dentry = __rpc_lookup_create_exclusive(parent, &q);
738 err = PTR_ERR(dentry);
739 if (IS_ERR(dentry))
1da177e4 740 goto out_bad;
ac6fecee
TM
741 switch (files[i].mode & S_IFMT) {
742 default:
743 BUG();
744 case S_IFREG:
745 err = __rpc_create(dir, dentry,
746 files[i].mode,
747 files[i].i_fop,
748 private);
749 break;
750 case S_IFDIR:
751 err = __rpc_mkdir(dir, dentry,
752 files[i].mode,
753 NULL,
754 private);
1da177e4 755 }
ac6fecee
TM
756 if (err != 0)
757 goto out_bad;
1da177e4 758 }
1b1dcc1b 759 mutex_unlock(&dir->i_mutex);
1da177e4
LT
760 return 0;
761out_bad:
ac6fecee 762 __rpc_depopulate(parent, files, start, eof);
1b1dcc1b 763 mutex_unlock(&dir->i_mutex);
1da177e4 764 printk(KERN_WARNING "%s: %s failed to populate directory %s\n",
0dc47877 765 __FILE__, __func__, parent->d_name.name);
ac6fecee 766 return err;
f134585a 767}
1da177e4 768
e57aed77
TM
769static struct dentry *rpc_mkdir_populate(struct dentry *parent,
770 struct qstr *name, umode_t mode, void *private,
771 int (*populate)(struct dentry *, void *), void *args_populate)
f134585a 772{
f134585a 773 struct dentry *dentry;
7d59d1e8 774 struct inode *dir = parent->d_inode;
f134585a
TM
775 int error;
776
7d59d1e8
TM
777 mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT);
778 dentry = __rpc_lookup_create_exclusive(parent, name);
f134585a 779 if (IS_ERR(dentry))
7d59d1e8
TM
780 goto out;
781 error = __rpc_mkdir(dir, dentry, mode, NULL, private);
7589806e
TM
782 if (error != 0)
783 goto out_err;
e57aed77
TM
784 if (populate != NULL) {
785 error = populate(dentry, args_populate);
786 if (error)
787 goto err_rmdir;
788 }
f134585a 789out:
1b1dcc1b 790 mutex_unlock(&dir->i_mutex);
5c3e985a 791 return dentry;
ac6fecee 792err_rmdir:
f134585a 793 __rpc_rmdir(dir, dentry);
7589806e 794out_err:
f134585a
TM
795 dentry = ERR_PTR(error);
796 goto out;
1da177e4
LT
797}
798
e57aed77
TM
799static int rpc_rmdir_depopulate(struct dentry *dentry,
800 void (*depopulate)(struct dentry *))
1da177e4 801{
dff02cc1 802 struct dentry *parent;
f134585a
TM
803 struct inode *dir;
804 int error;
278c995c 805
dff02cc1
TM
806 parent = dget_parent(dentry);
807 dir = parent->d_inode;
c6573c29 808 mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT);
e57aed77
TM
809 if (depopulate != NULL)
810 depopulate(dentry);
f134585a 811 error = __rpc_rmdir(dir, dentry);
1b1dcc1b 812 mutex_unlock(&dir->i_mutex);
dff02cc1 813 dput(parent);
f134585a 814 return error;
1da177e4
LT
815}
816
93a44a75
BF
817/**
818 * rpc_mkpipe - make an rpc_pipefs file for kernel<->userspace communication
819 * @parent: dentry of directory to create new "pipe" in
820 * @name: name of pipe
821 * @private: private data to associate with the pipe, for the caller's use
822 * @ops: operations defining the behavior of the pipe: upcall, downcall,
c3810608 823 * release_pipe, open_pipe, and destroy_msg.
d0fe13ba 824 * @flags: rpc_pipe flags
93a44a75
BF
825 *
826 * Data is made available for userspace to read by calls to
827 * rpc_queue_upcall(). The actual reads will result in calls to
828 * @ops->upcall, which will be called with the file pointer,
829 * message, and userspace buffer to copy to.
830 *
831 * Writes can come at any time, and do not necessarily have to be
832 * responses to upcalls. They will result in calls to @msg->downcall.
833 *
834 * The @private argument passed here will be available to all these methods
835 * from the file pointer, via RPC_I(file->f_dentry->d_inode)->private.
836 */
c239d83b
SK
837struct dentry *rpc_mkpipe_dentry(struct dentry *parent, const char *name,
838 void *private, struct rpc_pipe *pipe)
1da177e4 839{
1da177e4 840 struct dentry *dentry;
7589806e 841 struct inode *dir = parent->d_inode;
7364af6a 842 umode_t umode = S_IFIFO | S_IRUSR | S_IWUSR;
cfeaa4a3 843 struct qstr q;
7589806e 844 int err;
7364af6a 845
c239d83b 846 if (pipe->ops->upcall == NULL)
7364af6a 847 umode &= ~S_IRUGO;
c239d83b 848 if (pipe->ops->downcall == NULL)
7364af6a 849 umode &= ~S_IWUGO;
1da177e4 850
cfeaa4a3
TM
851 q.name = name;
852 q.len = strlen(name);
853 q.hash = full_name_hash(q.name, q.len),
854
855 mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT);
5bff0386 856 dentry = __rpc_lookup_create_exclusive(parent, &q);
1da177e4 857 if (IS_ERR(dentry))
cfeaa4a3 858 goto out;
c239d83b
SK
859 err = __rpc_mkpipe_dentry(dir, dentry, umode, &rpc_pipe_fops,
860 private, pipe);
7589806e
TM
861 if (err)
862 goto out_err;
f134585a 863out:
1b1dcc1b 864 mutex_unlock(&dir->i_mutex);
5c3e985a 865 return dentry;
7589806e
TM
866out_err:
867 dentry = ERR_PTR(err);
158998b6 868 printk(KERN_WARNING "%s: %s() failed to create pipe %s/%s (errno = %d)\n",
0dc47877 869 __FILE__, __func__, parent->d_name.name, name,
7589806e 870 err);
f134585a 871 goto out;
1da177e4 872}
c239d83b 873EXPORT_SYMBOL_GPL(rpc_mkpipe_dentry);
1da177e4 874
93a44a75
BF
875/**
876 * rpc_unlink - remove a pipe
877 * @dentry: dentry for the pipe, as returned from rpc_mkpipe
878 *
879 * After this call, lookups will no longer find the pipe, and any
880 * attempts to read or write using preexisting opens of the pipe will
881 * return -EPIPE.
882 */
f134585a 883int
5d67476f 884rpc_unlink(struct dentry *dentry)
1da177e4 885{
5d67476f 886 struct dentry *parent;
f134585a 887 struct inode *dir;
5d67476f 888 int error = 0;
1da177e4 889
5d67476f
TM
890 parent = dget_parent(dentry);
891 dir = parent->d_inode;
c6573c29 892 mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT);
810d90bc 893 error = __rpc_rmpipe(dir, dentry);
1b1dcc1b 894 mutex_unlock(&dir->i_mutex);
5d67476f 895 dput(parent);
f134585a 896 return error;
1da177e4 897}
468039ee 898EXPORT_SYMBOL_GPL(rpc_unlink);
1da177e4 899
e57aed77
TM
900enum {
901 RPCAUTH_info,
902 RPCAUTH_EOF
903};
904
905static const struct rpc_filelist authfiles[] = {
906 [RPCAUTH_info] = {
907 .name = "info",
908 .i_fop = &rpc_info_operations,
909 .mode = S_IFREG | S_IRUSR,
910 },
911};
912
913static int rpc_clntdir_populate(struct dentry *dentry, void *private)
914{
915 return rpc_populate(dentry,
916 authfiles, RPCAUTH_info, RPCAUTH_EOF,
917 private);
918}
919
920static void rpc_clntdir_depopulate(struct dentry *dentry)
921{
922 rpc_depopulate(dentry, authfiles, RPCAUTH_info, RPCAUTH_EOF);
923}
924
7d59d1e8
TM
925/**
926 * rpc_create_client_dir - Create a new rpc_client directory in rpc_pipefs
4111d4fd
RD
927 * @dentry: dentry from the rpc_pipefs root to the new directory
928 * @name: &struct qstr for the name
7d59d1e8
TM
929 * @rpc_client: rpc client to associate with this directory
930 *
931 * This creates a directory at the given @path associated with
932 * @rpc_clnt, which will contain a file named "info" with some basic
933 * information about the client, together with any "pipes" that may
934 * later be created using rpc_mkpipe().
935 */
23ac6581 936struct dentry *rpc_create_client_dir(struct dentry *dentry,
e57aed77
TM
937 struct qstr *name,
938 struct rpc_clnt *rpc_client)
939{
940 return rpc_mkdir_populate(dentry, name, S_IRUGO | S_IXUGO, NULL,
941 rpc_clntdir_populate, rpc_client);
942}
943
944/**
945 * rpc_remove_client_dir - Remove a directory created with rpc_create_client_dir()
80df9d20 946 * @clnt: rpc client
e57aed77
TM
947 */
948int rpc_remove_client_dir(struct dentry *dentry)
7d59d1e8 949{
e57aed77 950 return rpc_rmdir_depopulate(dentry, rpc_clntdir_depopulate);
7d59d1e8
TM
951}
952
8854e82d
TM
953static const struct rpc_filelist cache_pipefs_files[3] = {
954 [0] = {
955 .name = "channel",
956 .i_fop = &cache_file_operations_pipefs,
96c61cbd 957 .mode = S_IFREG|S_IRUSR|S_IWUSR,
8854e82d
TM
958 },
959 [1] = {
960 .name = "content",
961 .i_fop = &content_file_operations_pipefs,
962 .mode = S_IFREG|S_IRUSR,
963 },
964 [2] = {
965 .name = "flush",
966 .i_fop = &cache_flush_operations_pipefs,
967 .mode = S_IFREG|S_IRUSR|S_IWUSR,
968 },
969};
970
971static int rpc_cachedir_populate(struct dentry *dentry, void *private)
972{
973 return rpc_populate(dentry,
974 cache_pipefs_files, 0, 3,
975 private);
976}
977
978static void rpc_cachedir_depopulate(struct dentry *dentry)
979{
980 rpc_depopulate(dentry, cache_pipefs_files, 0, 3);
981}
982
983struct dentry *rpc_create_cache_dir(struct dentry *parent, struct qstr *name,
64f1426f 984 umode_t umode, struct cache_detail *cd)
8854e82d
TM
985{
986 return rpc_mkdir_populate(parent, name, umode, NULL,
987 rpc_cachedir_populate, cd);
988}
989
990void rpc_remove_cache_dir(struct dentry *dentry)
991{
992 rpc_rmdir_depopulate(dentry, rpc_cachedir_depopulate);
993}
994
1da177e4
LT
995/*
996 * populate the filesystem
997 */
b87221de 998static const struct super_operations s_ops = {
1da177e4
LT
999 .alloc_inode = rpc_alloc_inode,
1000 .destroy_inode = rpc_destroy_inode,
1001 .statfs = simple_statfs,
1002};
1003
1004#define RPCAUTH_GSSMAGIC 0x67596969
1005
bb156749
TM
1006/*
1007 * We have a single directory with 1 node in it.
1008 */
1009enum {
1010 RPCAUTH_lockd,
1011 RPCAUTH_mount,
1012 RPCAUTH_nfs,
1013 RPCAUTH_portmap,
1014 RPCAUTH_statd,
1015 RPCAUTH_nfsd4_cb,
e571cbf1 1016 RPCAUTH_cache,
b3537c35 1017 RPCAUTH_nfsd,
bb156749
TM
1018 RPCAUTH_RootEOF
1019};
1020
1021static const struct rpc_filelist files[] = {
1022 [RPCAUTH_lockd] = {
1023 .name = "lockd",
1024 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1025 },
1026 [RPCAUTH_mount] = {
1027 .name = "mount",
1028 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1029 },
1030 [RPCAUTH_nfs] = {
1031 .name = "nfs",
1032 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1033 },
1034 [RPCAUTH_portmap] = {
1035 .name = "portmap",
1036 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1037 },
1038 [RPCAUTH_statd] = {
1039 .name = "statd",
1040 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1041 },
1042 [RPCAUTH_nfsd4_cb] = {
1043 .name = "nfsd4_cb",
1044 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1045 },
e571cbf1
TM
1046 [RPCAUTH_cache] = {
1047 .name = "cache",
1048 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1049 },
b3537c35
JL
1050 [RPCAUTH_nfsd] = {
1051 .name = "nfsd",
1052 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1053 },
bb156749
TM
1054};
1055
432eb1a5
SK
1056/*
1057 * This call can be used only in RPC pipefs mount notification hooks.
1058 */
1059struct dentry *rpc_d_lookup_sb(const struct super_block *sb,
1060 const unsigned char *dir_name)
1061{
26fe5750 1062 struct qstr dir = QSTR_INIT(dir_name, strlen(dir_name));
432eb1a5 1063
26fe5750 1064 dir.hash = full_name_hash(dir.name, dir.len);
432eb1a5
SK
1065 return d_lookup(sb->s_root, &dir);
1066}
1067EXPORT_SYMBOL_GPL(rpc_d_lookup_sb);
1068
c21a588f
SK
1069void rpc_pipefs_init_net(struct net *net)
1070{
1071 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1072
1073 mutex_init(&sn->pipefs_sb_lock);
1074}
1075
1076/*
1077 * This call will be used for per network namespace operations calls.
1078 * Note: Function will be returned with pipefs_sb_lock taken if superblock was
1079 * found. This lock have to be released by rpc_put_sb_net() when all operations
1080 * will be completed.
1081 */
1082struct super_block *rpc_get_sb_net(const struct net *net)
1083{
1084 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1085
1086 mutex_lock(&sn->pipefs_sb_lock);
1087 if (sn->pipefs_sb)
1088 return sn->pipefs_sb;
1089 mutex_unlock(&sn->pipefs_sb_lock);
1090 return NULL;
1091}
1092EXPORT_SYMBOL_GPL(rpc_get_sb_net);
1093
1094void rpc_put_sb_net(const struct net *net)
1095{
1096 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1097
1098 BUG_ON(sn->pipefs_sb == NULL);
1099 mutex_unlock(&sn->pipefs_sb_lock);
1100}
1101EXPORT_SYMBOL_GPL(rpc_put_sb_net);
1102
1da177e4
LT
1103static int
1104rpc_fill_super(struct super_block *sb, void *data, int silent)
1105{
1106 struct inode *inode;
1107 struct dentry *root;
38b0da75 1108 struct net *net = data;
90c4e829 1109 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
2d00131a 1110 int err;
1da177e4
LT
1111
1112 sb->s_blocksize = PAGE_CACHE_SIZE;
1113 sb->s_blocksize_bits = PAGE_CACHE_SHIFT;
1114 sb->s_magic = RPCAUTH_GSSMAGIC;
1115 sb->s_op = &s_ops;
1116 sb->s_time_gran = 1;
1117
1118 inode = rpc_get_inode(sb, S_IFDIR | 0755);
48fde701
AV
1119 sb->s_root = root = d_make_root(inode);
1120 if (!root)
1da177e4 1121 return -ENOMEM;
ac6fecee 1122 if (rpc_populate(root, files, RPCAUTH_lockd, RPCAUTH_RootEOF, NULL))
fc7bed8c 1123 return -ENOMEM;
efc46bf2
SK
1124 dprintk("RPC: sending pipefs MOUNT notification for net %p%s\n", net,
1125 NET_NAME(net));
37629b57 1126 sn->pipefs_sb = sb;
2d00131a
SK
1127 err = blocking_notifier_call_chain(&rpc_pipefs_notifier_list,
1128 RPC_PIPEFS_MOUNT,
1129 sb);
1130 if (err)
1131 goto err_depopulate;
021c68de 1132 sb->s_fs_info = get_net(net);
1da177e4 1133 return 0;
2d00131a
SK
1134
1135err_depopulate:
1136 blocking_notifier_call_chain(&rpc_pipefs_notifier_list,
1137 RPC_PIPEFS_UMOUNT,
1138 sb);
37629b57 1139 sn->pipefs_sb = NULL;
2d00131a
SK
1140 __rpc_depopulate(root, files, RPCAUTH_lockd, RPCAUTH_RootEOF);
1141 return err;
1da177e4
LT
1142}
1143
fc14f2fe
AV
1144static struct dentry *
1145rpc_mount(struct file_system_type *fs_type,
1146 int flags, const char *dev_name, void *data)
1da177e4 1147{
38b0da75 1148 return mount_ns(fs_type, flags, current->nsproxy->net_ns, rpc_fill_super);
1da177e4
LT
1149}
1150
09acfea5 1151static void rpc_kill_sb(struct super_block *sb)
021c68de
SK
1152{
1153 struct net *net = sb->s_fs_info;
90c4e829 1154 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
021c68de 1155
c21a588f 1156 mutex_lock(&sn->pipefs_sb_lock);
90c4e829 1157 sn->pipefs_sb = NULL;
c21a588f 1158 mutex_unlock(&sn->pipefs_sb_lock);
021c68de 1159 put_net(net);
efc46bf2
SK
1160 dprintk("RPC: sending pipefs UMOUNT notification for net %p%s\n", net,
1161 NET_NAME(net));
2d00131a
SK
1162 blocking_notifier_call_chain(&rpc_pipefs_notifier_list,
1163 RPC_PIPEFS_UMOUNT,
1164 sb);
021c68de 1165 kill_litter_super(sb);
1da177e4
LT
1166}
1167
1168static struct file_system_type rpc_pipe_fs_type = {
1169 .owner = THIS_MODULE,
1170 .name = "rpc_pipefs",
fc14f2fe 1171 .mount = rpc_mount,
021c68de 1172 .kill_sb = rpc_kill_sb,
1da177e4
LT
1173};
1174
1175static void
51cc5068 1176init_once(void *foo)
1da177e4
LT
1177{
1178 struct rpc_inode *rpci = (struct rpc_inode *) foo;
1179
a35afb83
CL
1180 inode_init_once(&rpci->vfs_inode);
1181 rpci->private = NULL;
ba9e0975 1182 rpci->pipe = NULL;
a35afb83 1183 init_waitqueue_head(&rpci->waitq);
1da177e4
LT
1184}
1185
1186int register_rpc_pipefs(void)
1187{
5bd5f581
AM
1188 int err;
1189
1da177e4 1190 rpc_inode_cachep = kmem_cache_create("rpc_inode_cache",
fffb60f9
PJ
1191 sizeof(struct rpc_inode),
1192 0, (SLAB_HWCACHE_ALIGN|SLAB_RECLAIM_ACCOUNT|
1193 SLAB_MEM_SPREAD),
20c2df83 1194 init_once);
1da177e4
LT
1195 if (!rpc_inode_cachep)
1196 return -ENOMEM;
80df9d20
SK
1197 err = rpc_clients_notifier_register();
1198 if (err)
1199 goto err_notifier;
5bd5f581 1200 err = register_filesystem(&rpc_pipe_fs_type);
80df9d20
SK
1201 if (err)
1202 goto err_register;
1da177e4 1203 return 0;
80df9d20
SK
1204
1205err_register:
1206 rpc_clients_notifier_unregister();
1207err_notifier:
1208 kmem_cache_destroy(rpc_inode_cachep);
1209 return err;
1da177e4
LT
1210}
1211
1212void unregister_rpc_pipefs(void)
1213{
80df9d20 1214 rpc_clients_notifier_unregister();
1a1d92c1 1215 kmem_cache_destroy(rpc_inode_cachep);
1da177e4
LT
1216 unregister_filesystem(&rpc_pipe_fs_type);
1217}
dcbf8c30
MS
1218
1219/* Make 'mount -t rpc_pipefs ...' autoload this module. */
1220MODULE_ALIAS("rpc_pipefs");