NFS: handle NFS idmap pipe PipeFS dentries by network namespace aware routines
[deliverable/linux.git] / net / sunrpc / rpc_pipe.c
CommitLineData
1da177e4
LT
1/*
2 * net/sunrpc/rpc_pipe.c
3 *
4 * Userland/kernel interface for rpcauth_gss.
5 * Code shamelessly plagiarized from fs/nfsd/nfsctl.c
d51fe1be 6 * and fs/sysfs/inode.c
1da177e4
LT
7 *
8 * Copyright (c) 2002, Trond Myklebust <trond.myklebust@fys.uio.no>
9 *
10 */
1da177e4
LT
11#include <linux/module.h>
12#include <linux/slab.h>
13#include <linux/string.h>
14#include <linux/pagemap.h>
15#include <linux/mount.h>
16#include <linux/namei.h>
50e437d5 17#include <linux/fsnotify.h>
1da177e4
LT
18#include <linux/kernel.h>
19
20#include <asm/ioctls.h>
21#include <linux/fs.h>
22#include <linux/poll.h>
23#include <linux/wait.h>
24#include <linux/seq_file.h>
25
26#include <linux/sunrpc/clnt.h>
27#include <linux/workqueue.h>
28#include <linux/sunrpc/rpc_pipe_fs.h>
8854e82d 29#include <linux/sunrpc/cache.h>
021c68de 30#include <linux/nsproxy.h>
2d00131a 31#include <linux/notifier.h>
021c68de
SK
32
33#include "netns.h"
2d00131a 34#include "sunrpc.h"
1da177e4 35
efc46bf2
SK
36#define RPCDBG_FACILITY RPCDBG_DEBUG
37
38#define NET_NAME(net) ((net == &init_net) ? " (init_net)" : "")
39
fc14f2fe 40static struct vfsmount *rpc_mnt __read_mostly;
1da177e4
LT
41static int rpc_mount_count;
42
43static struct file_system_type rpc_pipe_fs_type;
44
45
e18b890b 46static struct kmem_cache *rpc_inode_cachep __read_mostly;
1da177e4
LT
47
48#define RPC_UPCALL_TIMEOUT (30*HZ)
49
2d00131a
SK
50static BLOCKING_NOTIFIER_HEAD(rpc_pipefs_notifier_list);
51
52int rpc_pipefs_notifier_register(struct notifier_block *nb)
53{
54 return blocking_notifier_chain_cond_register(&rpc_pipefs_notifier_list, nb);
55}
56EXPORT_SYMBOL_GPL(rpc_pipefs_notifier_register);
57
58void rpc_pipefs_notifier_unregister(struct notifier_block *nb)
59{
60 blocking_notifier_chain_unregister(&rpc_pipefs_notifier_list, nb);
61}
62EXPORT_SYMBOL_GPL(rpc_pipefs_notifier_unregister);
63
ba9e0975 64static void rpc_purge_list(struct rpc_pipe *pipe, struct list_head *head,
9842ef35 65 void (*destroy_msg)(struct rpc_pipe_msg *), int err)
1da177e4 66{
1da177e4
LT
67 struct rpc_pipe_msg *msg;
68
9842ef35
TM
69 if (list_empty(head))
70 return;
71 do {
b3eb67a2 72 msg = list_entry(head->next, struct rpc_pipe_msg, list);
5a67657a 73 list_del_init(&msg->list);
1da177e4 74 msg->errno = err;
b3eb67a2 75 destroy_msg(msg);
9842ef35 76 } while (!list_empty(head));
ba9e0975 77 wake_up(&pipe->waitq);
1da177e4
LT
78}
79
80static void
65f27f38 81rpc_timeout_upcall_queue(struct work_struct *work)
1da177e4 82{
9842ef35 83 LIST_HEAD(free_list);
ba9e0975
SK
84 struct rpc_pipe *pipe =
85 container_of(work, struct rpc_pipe, queue_timeout.work);
9842ef35 86 void (*destroy_msg)(struct rpc_pipe_msg *);
1da177e4 87
ba9e0975 88 spin_lock(&pipe->lock);
ba9e0975
SK
89 destroy_msg = pipe->ops->destroy_msg;
90 if (pipe->nreaders == 0) {
91 list_splice_init(&pipe->pipe, &free_list);
92 pipe->pipelen = 0;
9842ef35 93 }
ba9e0975
SK
94 spin_unlock(&pipe->lock);
95 rpc_purge_list(pipe, &free_list, destroy_msg, -ETIMEDOUT);
1da177e4
LT
96}
97
c1225158
PT
98ssize_t rpc_pipe_generic_upcall(struct file *filp, struct rpc_pipe_msg *msg,
99 char __user *dst, size_t buflen)
100{
101 char *data = (char *)msg->data + msg->copied;
102 size_t mlen = min(msg->len - msg->copied, buflen);
103 unsigned long left;
104
105 left = copy_to_user(dst, data, mlen);
106 if (left == mlen) {
107 msg->errno = -EFAULT;
108 return -EFAULT;
109 }
110
111 mlen -= left;
112 msg->copied += mlen;
113 msg->errno = 0;
114 return mlen;
115}
116EXPORT_SYMBOL_GPL(rpc_pipe_generic_upcall);
117
93a44a75 118/**
1a5778aa 119 * rpc_queue_upcall - queue an upcall message to userspace
93a44a75
BF
120 * @inode: inode of upcall pipe on which to queue given message
121 * @msg: message to queue
122 *
123 * Call with an @inode created by rpc_mkpipe() to queue an upcall.
124 * A userspace process may then later read the upcall by performing a
125 * read on an open file for this inode. It is up to the caller to
126 * initialize the fields of @msg (other than @msg->list) appropriately.
127 */
1da177e4 128int
d706ed1f 129rpc_queue_upcall(struct rpc_pipe *pipe, struct rpc_pipe_msg *msg)
1da177e4 130{
6070fe6f 131 int res = -EPIPE;
1da177e4 132
d0fe13ba 133 spin_lock(&pipe->lock);
d0fe13ba
SK
134 if (pipe->nreaders) {
135 list_add_tail(&msg->list, &pipe->pipe);
136 pipe->pipelen += msg->len;
6070fe6f 137 res = 0;
d0fe13ba
SK
138 } else if (pipe->flags & RPC_PIPE_WAIT_FOR_OPEN) {
139 if (list_empty(&pipe->pipe))
24c5d9d7 140 queue_delayed_work(rpciod_workqueue,
d0fe13ba 141 &pipe->queue_timeout,
1da177e4 142 RPC_UPCALL_TIMEOUT);
d0fe13ba
SK
143 list_add_tail(&msg->list, &pipe->pipe);
144 pipe->pipelen += msg->len;
6070fe6f
TM
145 res = 0;
146 }
d0fe13ba
SK
147 spin_unlock(&pipe->lock);
148 wake_up(&pipe->waitq);
1da177e4
LT
149 return res;
150}
468039ee 151EXPORT_SYMBOL_GPL(rpc_queue_upcall);
1da177e4 152
6070fe6f
TM
153static inline void
154rpc_inode_setowner(struct inode *inode, void *private)
155{
156 RPC_I(inode)->private = private;
157}
158
1da177e4
LT
159static void
160rpc_close_pipes(struct inode *inode)
161{
ba9e0975 162 struct rpc_pipe *pipe = RPC_I(inode)->pipe;
e712804a 163 int need_release;
ad6b1340 164 LIST_HEAD(free_list);
1da177e4 165
1b1dcc1b 166 mutex_lock(&inode->i_mutex);
ad6b1340
SK
167 spin_lock(&pipe->lock);
168 need_release = pipe->nreaders != 0 || pipe->nwriters != 0;
169 pipe->nreaders = 0;
170 list_splice_init(&pipe->in_upcall, &free_list);
171 list_splice_init(&pipe->pipe, &free_list);
172 pipe->pipelen = 0;
173 pipe->dentry = NULL;
174 spin_unlock(&pipe->lock);
175 rpc_purge_list(pipe, &free_list, pipe->ops->destroy_msg, -EPIPE);
176 pipe->nwriters = 0;
177 if (need_release && pipe->ops->release_pipe)
178 pipe->ops->release_pipe(inode);
179 cancel_delayed_work_sync(&pipe->queue_timeout);
6070fe6f 180 rpc_inode_setowner(inode, NULL);
1b1dcc1b 181 mutex_unlock(&inode->i_mutex);
1da177e4
LT
182}
183
1da177e4
LT
184static struct inode *
185rpc_alloc_inode(struct super_block *sb)
186{
187 struct rpc_inode *rpci;
e94b1766 188 rpci = (struct rpc_inode *)kmem_cache_alloc(rpc_inode_cachep, GFP_KERNEL);
1da177e4
LT
189 if (!rpci)
190 return NULL;
191 return &rpci->vfs_inode;
192}
193
194static void
fa0d7e3d 195rpc_i_callback(struct rcu_head *head)
1da177e4 196{
fa0d7e3d 197 struct inode *inode = container_of(head, struct inode, i_rcu);
1da177e4
LT
198 kmem_cache_free(rpc_inode_cachep, RPC_I(inode));
199}
200
fa0d7e3d
NP
201static void
202rpc_destroy_inode(struct inode *inode)
203{
204 call_rcu(&inode->i_rcu, rpc_i_callback);
205}
206
1da177e4
LT
207static int
208rpc_pipe_open(struct inode *inode, struct file *filp)
209{
d0fe13ba 210 struct rpc_pipe *pipe = RPC_I(inode)->pipe;
c3810608 211 int first_open;
1da177e4
LT
212 int res = -ENXIO;
213
1b1dcc1b 214 mutex_lock(&inode->i_mutex);
ad6b1340 215 if (pipe->dentry == NULL)
c3810608 216 goto out;
d0fe13ba
SK
217 first_open = pipe->nreaders == 0 && pipe->nwriters == 0;
218 if (first_open && pipe->ops->open_pipe) {
219 res = pipe->ops->open_pipe(inode);
c3810608
BF
220 if (res)
221 goto out;
1da177e4 222 }
c3810608 223 if (filp->f_mode & FMODE_READ)
d0fe13ba 224 pipe->nreaders++;
c3810608 225 if (filp->f_mode & FMODE_WRITE)
d0fe13ba 226 pipe->nwriters++;
c3810608
BF
227 res = 0;
228out:
1b1dcc1b 229 mutex_unlock(&inode->i_mutex);
1da177e4
LT
230 return res;
231}
232
233static int
234rpc_pipe_release(struct inode *inode, struct file *filp)
235{
ba9e0975 236 struct rpc_pipe *pipe = RPC_I(inode)->pipe;
1da177e4 237 struct rpc_pipe_msg *msg;
e712804a 238 int last_close;
1da177e4 239
1b1dcc1b 240 mutex_lock(&inode->i_mutex);
ad6b1340 241 if (pipe->dentry == NULL)
1da177e4 242 goto out;
655b5bb4 243 msg = filp->private_data;
1da177e4 244 if (msg != NULL) {
ba9e0975 245 spin_lock(&pipe->lock);
48e49187 246 msg->errno = -EAGAIN;
5a67657a 247 list_del_init(&msg->list);
ba9e0975
SK
248 spin_unlock(&pipe->lock);
249 pipe->ops->destroy_msg(msg);
1da177e4
LT
250 }
251 if (filp->f_mode & FMODE_WRITE)
ba9e0975 252 pipe->nwriters --;
9842ef35 253 if (filp->f_mode & FMODE_READ) {
ba9e0975
SK
254 pipe->nreaders --;
255 if (pipe->nreaders == 0) {
9842ef35 256 LIST_HEAD(free_list);
ba9e0975
SK
257 spin_lock(&pipe->lock);
258 list_splice_init(&pipe->pipe, &free_list);
259 pipe->pipelen = 0;
260 spin_unlock(&pipe->lock);
261 rpc_purge_list(pipe, &free_list,
262 pipe->ops->destroy_msg, -EAGAIN);
9842ef35
TM
263 }
264 }
ba9e0975
SK
265 last_close = pipe->nwriters == 0 && pipe->nreaders == 0;
266 if (last_close && pipe->ops->release_pipe)
267 pipe->ops->release_pipe(inode);
1da177e4 268out:
1b1dcc1b 269 mutex_unlock(&inode->i_mutex);
1da177e4
LT
270 return 0;
271}
272
273static ssize_t
274rpc_pipe_read(struct file *filp, char __user *buf, size_t len, loff_t *offset)
275{
303b46bb 276 struct inode *inode = filp->f_path.dentry->d_inode;
d0fe13ba 277 struct rpc_pipe *pipe = RPC_I(inode)->pipe;
1da177e4
LT
278 struct rpc_pipe_msg *msg;
279 int res = 0;
280
1b1dcc1b 281 mutex_lock(&inode->i_mutex);
ad6b1340 282 if (pipe->dentry == NULL) {
1da177e4
LT
283 res = -EPIPE;
284 goto out_unlock;
285 }
286 msg = filp->private_data;
287 if (msg == NULL) {
d0fe13ba
SK
288 spin_lock(&pipe->lock);
289 if (!list_empty(&pipe->pipe)) {
290 msg = list_entry(pipe->pipe.next,
1da177e4
LT
291 struct rpc_pipe_msg,
292 list);
d0fe13ba
SK
293 list_move(&msg->list, &pipe->in_upcall);
294 pipe->pipelen -= msg->len;
1da177e4
LT
295 filp->private_data = msg;
296 msg->copied = 0;
297 }
d0fe13ba 298 spin_unlock(&pipe->lock);
1da177e4
LT
299 if (msg == NULL)
300 goto out_unlock;
301 }
302 /* NOTE: it is up to the callback to update msg->copied */
d0fe13ba 303 res = pipe->ops->upcall(filp, msg, buf, len);
1da177e4
LT
304 if (res < 0 || msg->len == msg->copied) {
305 filp->private_data = NULL;
d0fe13ba 306 spin_lock(&pipe->lock);
5a67657a 307 list_del_init(&msg->list);
d0fe13ba
SK
308 spin_unlock(&pipe->lock);
309 pipe->ops->destroy_msg(msg);
1da177e4
LT
310 }
311out_unlock:
1b1dcc1b 312 mutex_unlock(&inode->i_mutex);
1da177e4
LT
313 return res;
314}
315
316static ssize_t
317rpc_pipe_write(struct file *filp, const char __user *buf, size_t len, loff_t *offset)
318{
303b46bb 319 struct inode *inode = filp->f_path.dentry->d_inode;
d0fe13ba 320 struct rpc_pipe *pipe = RPC_I(inode)->pipe;
1da177e4
LT
321 int res;
322
1b1dcc1b 323 mutex_lock(&inode->i_mutex);
1da177e4 324 res = -EPIPE;
ad6b1340 325 if (pipe->dentry != NULL)
d0fe13ba 326 res = pipe->ops->downcall(filp, buf, len);
1b1dcc1b 327 mutex_unlock(&inode->i_mutex);
1da177e4
LT
328 return res;
329}
330
331static unsigned int
332rpc_pipe_poll(struct file *filp, struct poll_table_struct *wait)
333{
d0fe13ba 334 struct rpc_pipe *pipe = RPC_I(filp->f_path.dentry->d_inode)->pipe;
1da177e4
LT
335 unsigned int mask = 0;
336
d0fe13ba 337 poll_wait(filp, &pipe->waitq, wait);
1da177e4
LT
338
339 mask = POLLOUT | POLLWRNORM;
ad6b1340 340 if (pipe->dentry == NULL)
1da177e4 341 mask |= POLLERR | POLLHUP;
d0fe13ba 342 if (filp->private_data || !list_empty(&pipe->pipe))
1da177e4
LT
343 mask |= POLLIN | POLLRDNORM;
344 return mask;
345}
346
a6f8dbc6
AB
347static long
348rpc_pipe_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
1da177e4 349{
a6f8dbc6 350 struct inode *inode = filp->f_path.dentry->d_inode;
d0fe13ba 351 struct rpc_pipe *pipe = RPC_I(inode)->pipe;
1da177e4
LT
352 int len;
353
354 switch (cmd) {
355 case FIONREAD:
d0fe13ba 356 spin_lock(&pipe->lock);
ad6b1340 357 if (pipe->dentry == NULL) {
d0fe13ba 358 spin_unlock(&pipe->lock);
1da177e4 359 return -EPIPE;
a6f8dbc6 360 }
d0fe13ba 361 len = pipe->pipelen;
1da177e4
LT
362 if (filp->private_data) {
363 struct rpc_pipe_msg *msg;
655b5bb4 364 msg = filp->private_data;
1da177e4
LT
365 len += msg->len - msg->copied;
366 }
d0fe13ba 367 spin_unlock(&pipe->lock);
1da177e4
LT
368 return put_user(len, (int __user *)arg);
369 default:
370 return -EINVAL;
371 }
372}
373
da7071d7 374static const struct file_operations rpc_pipe_fops = {
1da177e4
LT
375 .owner = THIS_MODULE,
376 .llseek = no_llseek,
377 .read = rpc_pipe_read,
378 .write = rpc_pipe_write,
379 .poll = rpc_pipe_poll,
674b604c 380 .unlocked_ioctl = rpc_pipe_ioctl,
1da177e4
LT
381 .open = rpc_pipe_open,
382 .release = rpc_pipe_release,
383};
384
385static int
386rpc_show_info(struct seq_file *m, void *v)
387{
388 struct rpc_clnt *clnt = m->private;
389
390 seq_printf(m, "RPC server: %s\n", clnt->cl_server);
391 seq_printf(m, "service: %s (%d) version %d\n", clnt->cl_protname,
392 clnt->cl_prog, clnt->cl_vers);
e7f78657
CL
393 seq_printf(m, "address: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_ADDR));
394 seq_printf(m, "protocol: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_PROTO));
bf19aace 395 seq_printf(m, "port: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_PORT));
1da177e4
LT
396 return 0;
397}
398
399static int
400rpc_info_open(struct inode *inode, struct file *file)
401{
006abe88 402 struct rpc_clnt *clnt = NULL;
1da177e4
LT
403 int ret = single_open(file, rpc_show_info, NULL);
404
405 if (!ret) {
406 struct seq_file *m = file->private_data;
006abe88
TM
407
408 spin_lock(&file->f_path.dentry->d_lock);
409 if (!d_unhashed(file->f_path.dentry))
410 clnt = RPC_I(inode)->private;
411 if (clnt != NULL && atomic_inc_not_zero(&clnt->cl_count)) {
412 spin_unlock(&file->f_path.dentry->d_lock);
1da177e4
LT
413 m->private = clnt;
414 } else {
006abe88 415 spin_unlock(&file->f_path.dentry->d_lock);
1da177e4
LT
416 single_release(inode, file);
417 ret = -EINVAL;
418 }
1da177e4
LT
419 }
420 return ret;
421}
422
423static int
424rpc_info_release(struct inode *inode, struct file *file)
425{
426 struct seq_file *m = file->private_data;
427 struct rpc_clnt *clnt = (struct rpc_clnt *)m->private;
428
429 if (clnt)
430 rpc_release_client(clnt);
431 return single_release(inode, file);
432}
433
da7071d7 434static const struct file_operations rpc_info_operations = {
1da177e4
LT
435 .owner = THIS_MODULE,
436 .open = rpc_info_open,
437 .read = seq_read,
438 .llseek = seq_lseek,
439 .release = rpc_info_release,
440};
441
442
1da177e4
LT
443/*
444 * Description of fs contents.
445 */
446struct rpc_filelist {
ac6fecee 447 const char *name;
99ac48f5 448 const struct file_operations *i_fop;
7364af6a 449 umode_t mode;
1da177e4
LT
450};
451
54281548 452struct vfsmount *rpc_get_mount(void)
1da177e4 453{
54281548
TM
454 int err;
455
fc14f2fe 456 err = simple_pin_fs(&rpc_pipe_fs_type, &rpc_mnt, &rpc_mount_count);
54281548
TM
457 if (err != 0)
458 return ERR_PTR(err);
fc14f2fe 459 return rpc_mnt;
1da177e4 460}
e571cbf1 461EXPORT_SYMBOL_GPL(rpc_get_mount);
1da177e4 462
54281548 463void rpc_put_mount(void)
1da177e4 464{
fc14f2fe 465 simple_release_fs(&rpc_mnt, &rpc_mount_count);
1da177e4 466}
e571cbf1 467EXPORT_SYMBOL_GPL(rpc_put_mount);
1da177e4 468
fe15ce44 469static int rpc_delete_dentry(const struct dentry *dentry)
62e1761c
TM
470{
471 return 1;
472}
473
3ba13d17 474static const struct dentry_operations rpc_dentry_operations = {
62e1761c
TM
475 .d_delete = rpc_delete_dentry,
476};
477
1da177e4 478static struct inode *
7364af6a 479rpc_get_inode(struct super_block *sb, umode_t mode)
1da177e4
LT
480{
481 struct inode *inode = new_inode(sb);
482 if (!inode)
483 return NULL;
85fe4025 484 inode->i_ino = get_next_ino();
1da177e4 485 inode->i_mode = mode;
1da177e4 486 inode->i_atime = inode->i_mtime = inode->i_ctime = CURRENT_TIME;
89f0e4fe
JP
487 switch (mode & S_IFMT) {
488 case S_IFDIR:
489 inode->i_fop = &simple_dir_operations;
490 inode->i_op = &simple_dir_inode_operations;
491 inc_nlink(inode);
492 default:
493 break;
1da177e4
LT
494 }
495 return inode;
496}
497
7589806e
TM
498static int __rpc_create_common(struct inode *dir, struct dentry *dentry,
499 umode_t mode,
500 const struct file_operations *i_fop,
501 void *private)
502{
503 struct inode *inode;
504
beb0f0a9 505 d_drop(dentry);
7589806e
TM
506 inode = rpc_get_inode(dir->i_sb, mode);
507 if (!inode)
508 goto out_err;
509 inode->i_ino = iunique(dir->i_sb, 100);
510 if (i_fop)
511 inode->i_fop = i_fop;
512 if (private)
513 rpc_inode_setowner(inode, private);
514 d_add(dentry, inode);
515 return 0;
516out_err:
517 printk(KERN_WARNING "%s: %s failed to allocate inode for dentry %s\n",
518 __FILE__, __func__, dentry->d_name.name);
519 dput(dentry);
520 return -ENOMEM;
521}
522
ac6fecee
TM
523static int __rpc_create(struct inode *dir, struct dentry *dentry,
524 umode_t mode,
525 const struct file_operations *i_fop,
526 void *private)
527{
528 int err;
529
530 err = __rpc_create_common(dir, dentry, S_IFREG | mode, i_fop, private);
531 if (err)
532 return err;
533 fsnotify_create(dir, dentry);
534 return 0;
535}
536
7589806e
TM
537static int __rpc_mkdir(struct inode *dir, struct dentry *dentry,
538 umode_t mode,
539 const struct file_operations *i_fop,
540 void *private)
541{
542 int err;
543
544 err = __rpc_create_common(dir, dentry, S_IFDIR | mode, i_fop, private);
545 if (err)
546 return err;
547 inc_nlink(dir);
548 fsnotify_mkdir(dir, dentry);
549 return 0;
550}
551
ba9e0975
SK
552static void
553init_pipe(struct rpc_pipe *pipe)
554{
555 pipe->nreaders = 0;
556 pipe->nwriters = 0;
557 INIT_LIST_HEAD(&pipe->in_upcall);
558 INIT_LIST_HEAD(&pipe->in_downcall);
559 INIT_LIST_HEAD(&pipe->pipe);
560 pipe->pipelen = 0;
561 init_waitqueue_head(&pipe->waitq);
562 INIT_DELAYED_WORK(&pipe->queue_timeout,
563 rpc_timeout_upcall_queue);
564 pipe->ops = NULL;
565 spin_lock_init(&pipe->lock);
c239d83b
SK
566 pipe->dentry = NULL;
567}
ba9e0975 568
c239d83b
SK
569void rpc_destroy_pipe_data(struct rpc_pipe *pipe)
570{
571 kfree(pipe);
ba9e0975 572}
c239d83b 573EXPORT_SYMBOL_GPL(rpc_destroy_pipe_data);
ba9e0975 574
c239d83b 575struct rpc_pipe *rpc_mkpipe_data(const struct rpc_pipe_ops *ops, int flags)
7589806e 576{
ba9e0975 577 struct rpc_pipe *pipe;
7589806e 578
ba9e0975
SK
579 pipe = kzalloc(sizeof(struct rpc_pipe), GFP_KERNEL);
580 if (!pipe)
c239d83b 581 return ERR_PTR(-ENOMEM);
ba9e0975 582 init_pipe(pipe);
c239d83b
SK
583 pipe->ops = ops;
584 pipe->flags = flags;
585 return pipe;
586}
587EXPORT_SYMBOL_GPL(rpc_mkpipe_data);
588
589static int __rpc_mkpipe_dentry(struct inode *dir, struct dentry *dentry,
590 umode_t mode,
591 const struct file_operations *i_fop,
592 void *private,
593 struct rpc_pipe *pipe)
594{
595 struct rpc_inode *rpci;
596 int err;
597
7589806e 598 err = __rpc_create_common(dir, dentry, S_IFIFO | mode, i_fop, private);
c239d83b 599 if (err)
7589806e
TM
600 return err;
601 rpci = RPC_I(dentry->d_inode);
7589806e 602 rpci->private = private;
ba9e0975 603 rpci->pipe = pipe;
7589806e
TM
604 fsnotify_create(dir, dentry);
605 return 0;
606}
607
ac6fecee
TM
608static int __rpc_rmdir(struct inode *dir, struct dentry *dentry)
609{
610 int ret;
611
612 dget(dentry);
613 ret = simple_rmdir(dir, dentry);
614 d_delete(dentry);
615 dput(dentry);
616 return ret;
617}
618
810d90bc
TM
619static int __rpc_unlink(struct inode *dir, struct dentry *dentry)
620{
621 int ret;
622
623 dget(dentry);
624 ret = simple_unlink(dir, dentry);
625 d_delete(dentry);
626 dput(dentry);
627 return ret;
628}
629
630static int __rpc_rmpipe(struct inode *dir, struct dentry *dentry)
631{
632 struct inode *inode = dentry->d_inode;
810d90bc 633
810d90bc
TM
634 rpc_close_pipes(inode);
635 return __rpc_unlink(dir, dentry);
636}
637
5bff0386 638static struct dentry *__rpc_lookup_create_exclusive(struct dentry *parent,
cfeaa4a3
TM
639 struct qstr *name)
640{
641 struct dentry *dentry;
642
643 dentry = d_lookup(parent, name);
644 if (!dentry) {
645 dentry = d_alloc(parent, name);
5bff0386
SK
646 if (!dentry)
647 return ERR_PTR(-ENOMEM);
cfeaa4a3 648 }
5bff0386 649 if (dentry->d_inode == NULL) {
fb045adb 650 d_set_d_op(dentry, &rpc_dentry_operations);
cfeaa4a3 651 return dentry;
5bff0386 652 }
cfeaa4a3
TM
653 dput(dentry);
654 return ERR_PTR(-EEXIST);
655}
656
1da177e4
LT
657/*
658 * FIXME: This probably has races.
659 */
ac6fecee
TM
660static void __rpc_depopulate(struct dentry *parent,
661 const struct rpc_filelist *files,
662 int start, int eof)
1da177e4
LT
663{
664 struct inode *dir = parent->d_inode;
ac6fecee
TM
665 struct dentry *dentry;
666 struct qstr name;
667 int i;
1da177e4 668
ac6fecee
TM
669 for (i = start; i < eof; i++) {
670 name.name = files[i].name;
671 name.len = strlen(files[i].name);
672 name.hash = full_name_hash(name.name, name.len);
673 dentry = d_lookup(parent, &name);
674
675 if (dentry == NULL)
62e1761c 676 continue;
ac6fecee
TM
677 if (dentry->d_inode == NULL)
678 goto next;
679 switch (dentry->d_inode->i_mode & S_IFMT) {
680 default:
681 BUG();
682 case S_IFREG:
683 __rpc_unlink(dir, dentry);
1da177e4 684 break;
ac6fecee
TM
685 case S_IFDIR:
686 __rpc_rmdir(dir, dentry);
687 }
688next:
689 dput(dentry);
1da177e4 690 }
ac6fecee
TM
691}
692
693static void rpc_depopulate(struct dentry *parent,
694 const struct rpc_filelist *files,
695 int start, int eof)
696{
697 struct inode *dir = parent->d_inode;
698
699 mutex_lock_nested(&dir->i_mutex, I_MUTEX_CHILD);
700 __rpc_depopulate(parent, files, start, eof);
1b1dcc1b 701 mutex_unlock(&dir->i_mutex);
1da177e4
LT
702}
703
ac6fecee
TM
704static int rpc_populate(struct dentry *parent,
705 const struct rpc_filelist *files,
706 int start, int eof,
707 void *private)
1da177e4 708{
ac6fecee 709 struct inode *dir = parent->d_inode;
1da177e4 710 struct dentry *dentry;
ac6fecee 711 int i, err;
1da177e4 712
1b1dcc1b 713 mutex_lock(&dir->i_mutex);
1da177e4 714 for (i = start; i < eof; i++) {
ac6fecee
TM
715 struct qstr q;
716
717 q.name = files[i].name;
718 q.len = strlen(files[i].name);
719 q.hash = full_name_hash(q.name, q.len);
720 dentry = __rpc_lookup_create_exclusive(parent, &q);
721 err = PTR_ERR(dentry);
722 if (IS_ERR(dentry))
1da177e4 723 goto out_bad;
ac6fecee
TM
724 switch (files[i].mode & S_IFMT) {
725 default:
726 BUG();
727 case S_IFREG:
728 err = __rpc_create(dir, dentry,
729 files[i].mode,
730 files[i].i_fop,
731 private);
732 break;
733 case S_IFDIR:
734 err = __rpc_mkdir(dir, dentry,
735 files[i].mode,
736 NULL,
737 private);
1da177e4 738 }
ac6fecee
TM
739 if (err != 0)
740 goto out_bad;
1da177e4 741 }
1b1dcc1b 742 mutex_unlock(&dir->i_mutex);
1da177e4
LT
743 return 0;
744out_bad:
ac6fecee 745 __rpc_depopulate(parent, files, start, eof);
1b1dcc1b 746 mutex_unlock(&dir->i_mutex);
1da177e4 747 printk(KERN_WARNING "%s: %s failed to populate directory %s\n",
0dc47877 748 __FILE__, __func__, parent->d_name.name);
ac6fecee 749 return err;
f134585a 750}
1da177e4 751
e57aed77
TM
752static struct dentry *rpc_mkdir_populate(struct dentry *parent,
753 struct qstr *name, umode_t mode, void *private,
754 int (*populate)(struct dentry *, void *), void *args_populate)
f134585a 755{
f134585a 756 struct dentry *dentry;
7d59d1e8 757 struct inode *dir = parent->d_inode;
f134585a
TM
758 int error;
759
7d59d1e8
TM
760 mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT);
761 dentry = __rpc_lookup_create_exclusive(parent, name);
f134585a 762 if (IS_ERR(dentry))
7d59d1e8
TM
763 goto out;
764 error = __rpc_mkdir(dir, dentry, mode, NULL, private);
7589806e
TM
765 if (error != 0)
766 goto out_err;
e57aed77
TM
767 if (populate != NULL) {
768 error = populate(dentry, args_populate);
769 if (error)
770 goto err_rmdir;
771 }
f134585a 772out:
1b1dcc1b 773 mutex_unlock(&dir->i_mutex);
5c3e985a 774 return dentry;
ac6fecee 775err_rmdir:
f134585a 776 __rpc_rmdir(dir, dentry);
7589806e 777out_err:
f134585a
TM
778 dentry = ERR_PTR(error);
779 goto out;
1da177e4
LT
780}
781
e57aed77
TM
782static int rpc_rmdir_depopulate(struct dentry *dentry,
783 void (*depopulate)(struct dentry *))
1da177e4 784{
dff02cc1 785 struct dentry *parent;
f134585a
TM
786 struct inode *dir;
787 int error;
278c995c 788
dff02cc1
TM
789 parent = dget_parent(dentry);
790 dir = parent->d_inode;
c6573c29 791 mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT);
e57aed77
TM
792 if (depopulate != NULL)
793 depopulate(dentry);
f134585a 794 error = __rpc_rmdir(dir, dentry);
1b1dcc1b 795 mutex_unlock(&dir->i_mutex);
dff02cc1 796 dput(parent);
f134585a 797 return error;
1da177e4
LT
798}
799
93a44a75
BF
800/**
801 * rpc_mkpipe - make an rpc_pipefs file for kernel<->userspace communication
802 * @parent: dentry of directory to create new "pipe" in
803 * @name: name of pipe
804 * @private: private data to associate with the pipe, for the caller's use
805 * @ops: operations defining the behavior of the pipe: upcall, downcall,
c3810608 806 * release_pipe, open_pipe, and destroy_msg.
d0fe13ba 807 * @flags: rpc_pipe flags
93a44a75
BF
808 *
809 * Data is made available for userspace to read by calls to
810 * rpc_queue_upcall(). The actual reads will result in calls to
811 * @ops->upcall, which will be called with the file pointer,
812 * message, and userspace buffer to copy to.
813 *
814 * Writes can come at any time, and do not necessarily have to be
815 * responses to upcalls. They will result in calls to @msg->downcall.
816 *
817 * The @private argument passed here will be available to all these methods
818 * from the file pointer, via RPC_I(file->f_dentry->d_inode)->private.
819 */
c239d83b
SK
820struct dentry *rpc_mkpipe_dentry(struct dentry *parent, const char *name,
821 void *private, struct rpc_pipe *pipe)
1da177e4 822{
1da177e4 823 struct dentry *dentry;
7589806e 824 struct inode *dir = parent->d_inode;
7364af6a 825 umode_t umode = S_IFIFO | S_IRUSR | S_IWUSR;
cfeaa4a3 826 struct qstr q;
7589806e 827 int err;
7364af6a 828
c239d83b 829 if (pipe->ops->upcall == NULL)
7364af6a 830 umode &= ~S_IRUGO;
c239d83b 831 if (pipe->ops->downcall == NULL)
7364af6a 832 umode &= ~S_IWUGO;
1da177e4 833
cfeaa4a3
TM
834 q.name = name;
835 q.len = strlen(name);
836 q.hash = full_name_hash(q.name, q.len),
837
838 mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT);
5bff0386 839 dentry = __rpc_lookup_create_exclusive(parent, &q);
1da177e4 840 if (IS_ERR(dentry))
cfeaa4a3 841 goto out;
c239d83b
SK
842 err = __rpc_mkpipe_dentry(dir, dentry, umode, &rpc_pipe_fops,
843 private, pipe);
7589806e
TM
844 if (err)
845 goto out_err;
f134585a 846out:
1b1dcc1b 847 mutex_unlock(&dir->i_mutex);
5c3e985a 848 return dentry;
7589806e
TM
849out_err:
850 dentry = ERR_PTR(err);
158998b6 851 printk(KERN_WARNING "%s: %s() failed to create pipe %s/%s (errno = %d)\n",
0dc47877 852 __FILE__, __func__, parent->d_name.name, name,
7589806e 853 err);
f134585a 854 goto out;
1da177e4 855}
c239d83b 856EXPORT_SYMBOL_GPL(rpc_mkpipe_dentry);
1da177e4 857
93a44a75
BF
858/**
859 * rpc_unlink - remove a pipe
860 * @dentry: dentry for the pipe, as returned from rpc_mkpipe
861 *
862 * After this call, lookups will no longer find the pipe, and any
863 * attempts to read or write using preexisting opens of the pipe will
864 * return -EPIPE.
865 */
f134585a 866int
5d67476f 867rpc_unlink(struct dentry *dentry)
1da177e4 868{
5d67476f 869 struct dentry *parent;
f134585a 870 struct inode *dir;
5d67476f 871 int error = 0;
1da177e4 872
5d67476f
TM
873 parent = dget_parent(dentry);
874 dir = parent->d_inode;
c6573c29 875 mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT);
810d90bc 876 error = __rpc_rmpipe(dir, dentry);
1b1dcc1b 877 mutex_unlock(&dir->i_mutex);
5d67476f 878 dput(parent);
f134585a 879 return error;
1da177e4 880}
468039ee 881EXPORT_SYMBOL_GPL(rpc_unlink);
1da177e4 882
e57aed77
TM
883enum {
884 RPCAUTH_info,
885 RPCAUTH_EOF
886};
887
888static const struct rpc_filelist authfiles[] = {
889 [RPCAUTH_info] = {
890 .name = "info",
891 .i_fop = &rpc_info_operations,
892 .mode = S_IFREG | S_IRUSR,
893 },
894};
895
896static int rpc_clntdir_populate(struct dentry *dentry, void *private)
897{
898 return rpc_populate(dentry,
899 authfiles, RPCAUTH_info, RPCAUTH_EOF,
900 private);
901}
902
903static void rpc_clntdir_depopulate(struct dentry *dentry)
904{
905 rpc_depopulate(dentry, authfiles, RPCAUTH_info, RPCAUTH_EOF);
906}
907
7d59d1e8
TM
908/**
909 * rpc_create_client_dir - Create a new rpc_client directory in rpc_pipefs
4111d4fd
RD
910 * @dentry: dentry from the rpc_pipefs root to the new directory
911 * @name: &struct qstr for the name
7d59d1e8
TM
912 * @rpc_client: rpc client to associate with this directory
913 *
914 * This creates a directory at the given @path associated with
915 * @rpc_clnt, which will contain a file named "info" with some basic
916 * information about the client, together with any "pipes" that may
917 * later be created using rpc_mkpipe().
918 */
23ac6581 919struct dentry *rpc_create_client_dir(struct dentry *dentry,
e57aed77
TM
920 struct qstr *name,
921 struct rpc_clnt *rpc_client)
922{
923 return rpc_mkdir_populate(dentry, name, S_IRUGO | S_IXUGO, NULL,
924 rpc_clntdir_populate, rpc_client);
925}
926
927/**
928 * rpc_remove_client_dir - Remove a directory created with rpc_create_client_dir()
80df9d20 929 * @clnt: rpc client
e57aed77
TM
930 */
931int rpc_remove_client_dir(struct dentry *dentry)
7d59d1e8 932{
e57aed77 933 return rpc_rmdir_depopulate(dentry, rpc_clntdir_depopulate);
7d59d1e8
TM
934}
935
8854e82d
TM
936static const struct rpc_filelist cache_pipefs_files[3] = {
937 [0] = {
938 .name = "channel",
939 .i_fop = &cache_file_operations_pipefs,
96c61cbd 940 .mode = S_IFREG|S_IRUSR|S_IWUSR,
8854e82d
TM
941 },
942 [1] = {
943 .name = "content",
944 .i_fop = &content_file_operations_pipefs,
945 .mode = S_IFREG|S_IRUSR,
946 },
947 [2] = {
948 .name = "flush",
949 .i_fop = &cache_flush_operations_pipefs,
950 .mode = S_IFREG|S_IRUSR|S_IWUSR,
951 },
952};
953
954static int rpc_cachedir_populate(struct dentry *dentry, void *private)
955{
956 return rpc_populate(dentry,
957 cache_pipefs_files, 0, 3,
958 private);
959}
960
961static void rpc_cachedir_depopulate(struct dentry *dentry)
962{
963 rpc_depopulate(dentry, cache_pipefs_files, 0, 3);
964}
965
966struct dentry *rpc_create_cache_dir(struct dentry *parent, struct qstr *name,
64f1426f 967 umode_t umode, struct cache_detail *cd)
8854e82d
TM
968{
969 return rpc_mkdir_populate(parent, name, umode, NULL,
970 rpc_cachedir_populate, cd);
971}
972
973void rpc_remove_cache_dir(struct dentry *dentry)
974{
975 rpc_rmdir_depopulate(dentry, rpc_cachedir_depopulate);
976}
977
1da177e4
LT
978/*
979 * populate the filesystem
980 */
b87221de 981static const struct super_operations s_ops = {
1da177e4
LT
982 .alloc_inode = rpc_alloc_inode,
983 .destroy_inode = rpc_destroy_inode,
984 .statfs = simple_statfs,
985};
986
987#define RPCAUTH_GSSMAGIC 0x67596969
988
bb156749
TM
989/*
990 * We have a single directory with 1 node in it.
991 */
992enum {
993 RPCAUTH_lockd,
994 RPCAUTH_mount,
995 RPCAUTH_nfs,
996 RPCAUTH_portmap,
997 RPCAUTH_statd,
998 RPCAUTH_nfsd4_cb,
e571cbf1 999 RPCAUTH_cache,
bb156749
TM
1000 RPCAUTH_RootEOF
1001};
1002
1003static const struct rpc_filelist files[] = {
1004 [RPCAUTH_lockd] = {
1005 .name = "lockd",
1006 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1007 },
1008 [RPCAUTH_mount] = {
1009 .name = "mount",
1010 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1011 },
1012 [RPCAUTH_nfs] = {
1013 .name = "nfs",
1014 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1015 },
1016 [RPCAUTH_portmap] = {
1017 .name = "portmap",
1018 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1019 },
1020 [RPCAUTH_statd] = {
1021 .name = "statd",
1022 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1023 },
1024 [RPCAUTH_nfsd4_cb] = {
1025 .name = "nfsd4_cb",
1026 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1027 },
e571cbf1
TM
1028 [RPCAUTH_cache] = {
1029 .name = "cache",
1030 .mode = S_IFDIR | S_IRUGO | S_IXUGO,
1031 },
bb156749
TM
1032};
1033
432eb1a5
SK
1034/*
1035 * This call can be used only in RPC pipefs mount notification hooks.
1036 */
1037struct dentry *rpc_d_lookup_sb(const struct super_block *sb,
1038 const unsigned char *dir_name)
1039{
1040 struct qstr dir = {
1041 .name = dir_name,
1042 .len = strlen(dir_name),
1043 .hash = full_name_hash(dir_name, strlen(dir_name)),
1044 };
1045
1046 return d_lookup(sb->s_root, &dir);
1047}
1048EXPORT_SYMBOL_GPL(rpc_d_lookup_sb);
1049
c21a588f
SK
1050void rpc_pipefs_init_net(struct net *net)
1051{
1052 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1053
1054 mutex_init(&sn->pipefs_sb_lock);
1055}
1056
1057/*
1058 * This call will be used for per network namespace operations calls.
1059 * Note: Function will be returned with pipefs_sb_lock taken if superblock was
1060 * found. This lock have to be released by rpc_put_sb_net() when all operations
1061 * will be completed.
1062 */
1063struct super_block *rpc_get_sb_net(const struct net *net)
1064{
1065 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1066
1067 mutex_lock(&sn->pipefs_sb_lock);
1068 if (sn->pipefs_sb)
1069 return sn->pipefs_sb;
1070 mutex_unlock(&sn->pipefs_sb_lock);
1071 return NULL;
1072}
1073EXPORT_SYMBOL_GPL(rpc_get_sb_net);
1074
1075void rpc_put_sb_net(const struct net *net)
1076{
1077 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
1078
1079 BUG_ON(sn->pipefs_sb == NULL);
1080 mutex_unlock(&sn->pipefs_sb_lock);
1081}
1082EXPORT_SYMBOL_GPL(rpc_put_sb_net);
1083
1da177e4
LT
1084static int
1085rpc_fill_super(struct super_block *sb, void *data, int silent)
1086{
1087 struct inode *inode;
1088 struct dentry *root;
38b0da75 1089 struct net *net = data;
90c4e829 1090 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
2d00131a 1091 int err;
1da177e4
LT
1092
1093 sb->s_blocksize = PAGE_CACHE_SIZE;
1094 sb->s_blocksize_bits = PAGE_CACHE_SHIFT;
1095 sb->s_magic = RPCAUTH_GSSMAGIC;
1096 sb->s_op = &s_ops;
1097 sb->s_time_gran = 1;
1098
1099 inode = rpc_get_inode(sb, S_IFDIR | 0755);
1100 if (!inode)
1101 return -ENOMEM;
fc7bed8c 1102 sb->s_root = root = d_alloc_root(inode);
1da177e4
LT
1103 if (!root) {
1104 iput(inode);
1105 return -ENOMEM;
1106 }
ac6fecee 1107 if (rpc_populate(root, files, RPCAUTH_lockd, RPCAUTH_RootEOF, NULL))
fc7bed8c 1108 return -ENOMEM;
efc46bf2
SK
1109 dprintk("RPC: sending pipefs MOUNT notification for net %p%s\n", net,
1110 NET_NAME(net));
2d00131a
SK
1111 err = blocking_notifier_call_chain(&rpc_pipefs_notifier_list,
1112 RPC_PIPEFS_MOUNT,
1113 sb);
1114 if (err)
1115 goto err_depopulate;
021c68de 1116 sb->s_fs_info = get_net(net);
90c4e829 1117 sn->pipefs_sb = sb;
1da177e4 1118 return 0;
2d00131a
SK
1119
1120err_depopulate:
1121 blocking_notifier_call_chain(&rpc_pipefs_notifier_list,
1122 RPC_PIPEFS_UMOUNT,
1123 sb);
1124 __rpc_depopulate(root, files, RPCAUTH_lockd, RPCAUTH_RootEOF);
1125 return err;
1da177e4
LT
1126}
1127
fc14f2fe
AV
1128static struct dentry *
1129rpc_mount(struct file_system_type *fs_type,
1130 int flags, const char *dev_name, void *data)
1da177e4 1131{
38b0da75 1132 return mount_ns(fs_type, flags, current->nsproxy->net_ns, rpc_fill_super);
1da177e4
LT
1133}
1134
021c68de
SK
1135void rpc_kill_sb(struct super_block *sb)
1136{
1137 struct net *net = sb->s_fs_info;
90c4e829 1138 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
021c68de 1139
c21a588f 1140 mutex_lock(&sn->pipefs_sb_lock);
90c4e829 1141 sn->pipefs_sb = NULL;
c21a588f 1142 mutex_unlock(&sn->pipefs_sb_lock);
021c68de 1143 put_net(net);
efc46bf2
SK
1144 dprintk("RPC: sending pipefs UMOUNT notification for net %p%s\n", net,
1145 NET_NAME(net));
2d00131a
SK
1146 blocking_notifier_call_chain(&rpc_pipefs_notifier_list,
1147 RPC_PIPEFS_UMOUNT,
1148 sb);
021c68de
SK
1149 kill_litter_super(sb);
1150}
1151
1da177e4
LT
1152static struct file_system_type rpc_pipe_fs_type = {
1153 .owner = THIS_MODULE,
1154 .name = "rpc_pipefs",
fc14f2fe 1155 .mount = rpc_mount,
021c68de 1156 .kill_sb = rpc_kill_sb,
1da177e4
LT
1157};
1158
1159static void
51cc5068 1160init_once(void *foo)
1da177e4
LT
1161{
1162 struct rpc_inode *rpci = (struct rpc_inode *) foo;
1163
a35afb83
CL
1164 inode_init_once(&rpci->vfs_inode);
1165 rpci->private = NULL;
ba9e0975 1166 rpci->pipe = NULL;
1da177e4
LT
1167}
1168
1169int register_rpc_pipefs(void)
1170{
5bd5f581
AM
1171 int err;
1172
1da177e4 1173 rpc_inode_cachep = kmem_cache_create("rpc_inode_cache",
fffb60f9
PJ
1174 sizeof(struct rpc_inode),
1175 0, (SLAB_HWCACHE_ALIGN|SLAB_RECLAIM_ACCOUNT|
1176 SLAB_MEM_SPREAD),
20c2df83 1177 init_once);
1da177e4
LT
1178 if (!rpc_inode_cachep)
1179 return -ENOMEM;
80df9d20
SK
1180 err = rpc_clients_notifier_register();
1181 if (err)
1182 goto err_notifier;
5bd5f581 1183 err = register_filesystem(&rpc_pipe_fs_type);
80df9d20
SK
1184 if (err)
1185 goto err_register;
1da177e4 1186 return 0;
80df9d20
SK
1187
1188err_register:
1189 rpc_clients_notifier_unregister();
1190err_notifier:
1191 kmem_cache_destroy(rpc_inode_cachep);
1192 return err;
1da177e4
LT
1193}
1194
1195void unregister_rpc_pipefs(void)
1196{
80df9d20 1197 rpc_clients_notifier_unregister();
1a1d92c1 1198 kmem_cache_destroy(rpc_inode_cachep);
1da177e4
LT
1199 unregister_filesystem(&rpc_pipe_fs_type);
1200}
dcbf8c30
MS
1201
1202/* Make 'mount -t rpc_pipefs ...' autoload this module. */
1203MODULE_ALIAS("rpc_pipefs");
This page took 0.969978 seconds and 5 git commands to generate.