Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * net/sunrpc/rpc_pipe.c | |
3 | * | |
4 | * Userland/kernel interface for rpcauth_gss. | |
5 | * Code shamelessly plagiarized from fs/nfsd/nfsctl.c | |
d51fe1be | 6 | * and fs/sysfs/inode.c |
1da177e4 LT |
7 | * |
8 | * Copyright (c) 2002, Trond Myklebust <trond.myklebust@fys.uio.no> | |
9 | * | |
10 | */ | |
1da177e4 LT |
11 | #include <linux/module.h> |
12 | #include <linux/slab.h> | |
13 | #include <linux/string.h> | |
14 | #include <linux/pagemap.h> | |
15 | #include <linux/mount.h> | |
16 | #include <linux/namei.h> | |
50e437d5 | 17 | #include <linux/fsnotify.h> |
1da177e4 LT |
18 | #include <linux/kernel.h> |
19 | ||
20 | #include <asm/ioctls.h> | |
21 | #include <linux/fs.h> | |
22 | #include <linux/poll.h> | |
23 | #include <linux/wait.h> | |
24 | #include <linux/seq_file.h> | |
25 | ||
26 | #include <linux/sunrpc/clnt.h> | |
27 | #include <linux/workqueue.h> | |
28 | #include <linux/sunrpc/rpc_pipe_fs.h> | |
8854e82d | 29 | #include <linux/sunrpc/cache.h> |
1da177e4 | 30 | |
fc14f2fe | 31 | static struct vfsmount *rpc_mnt __read_mostly; |
1da177e4 LT |
32 | static int rpc_mount_count; |
33 | ||
34 | static struct file_system_type rpc_pipe_fs_type; | |
35 | ||
36 | ||
e18b890b | 37 | static struct kmem_cache *rpc_inode_cachep __read_mostly; |
1da177e4 LT |
38 | |
39 | #define RPC_UPCALL_TIMEOUT (30*HZ) | |
40 | ||
9842ef35 TM |
41 | static void rpc_purge_list(struct rpc_inode *rpci, struct list_head *head, |
42 | void (*destroy_msg)(struct rpc_pipe_msg *), int err) | |
1da177e4 | 43 | { |
1da177e4 LT |
44 | struct rpc_pipe_msg *msg; |
45 | ||
9842ef35 TM |
46 | if (list_empty(head)) |
47 | return; | |
48 | do { | |
b3eb67a2 | 49 | msg = list_entry(head->next, struct rpc_pipe_msg, list); |
5a67657a | 50 | list_del_init(&msg->list); |
1da177e4 | 51 | msg->errno = err; |
b3eb67a2 | 52 | destroy_msg(msg); |
9842ef35 | 53 | } while (!list_empty(head)); |
1da177e4 LT |
54 | wake_up(&rpci->waitq); |
55 | } | |
56 | ||
57 | static void | |
65f27f38 | 58 | rpc_timeout_upcall_queue(struct work_struct *work) |
1da177e4 | 59 | { |
9842ef35 | 60 | LIST_HEAD(free_list); |
65f27f38 DH |
61 | struct rpc_inode *rpci = |
62 | container_of(work, struct rpc_inode, queue_timeout.work); | |
1da177e4 | 63 | struct inode *inode = &rpci->vfs_inode; |
9842ef35 | 64 | void (*destroy_msg)(struct rpc_pipe_msg *); |
1da177e4 | 65 | |
9842ef35 TM |
66 | spin_lock(&inode->i_lock); |
67 | if (rpci->ops == NULL) { | |
68 | spin_unlock(&inode->i_lock); | |
69 | return; | |
70 | } | |
71 | destroy_msg = rpci->ops->destroy_msg; | |
72 | if (rpci->nreaders == 0) { | |
73 | list_splice_init(&rpci->pipe, &free_list); | |
74 | rpci->pipelen = 0; | |
75 | } | |
76 | spin_unlock(&inode->i_lock); | |
77 | rpc_purge_list(rpci, &free_list, destroy_msg, -ETIMEDOUT); | |
1da177e4 LT |
78 | } |
79 | ||
c1225158 PT |
80 | ssize_t rpc_pipe_generic_upcall(struct file *filp, struct rpc_pipe_msg *msg, |
81 | char __user *dst, size_t buflen) | |
82 | { | |
83 | char *data = (char *)msg->data + msg->copied; | |
84 | size_t mlen = min(msg->len - msg->copied, buflen); | |
85 | unsigned long left; | |
86 | ||
87 | left = copy_to_user(dst, data, mlen); | |
88 | if (left == mlen) { | |
89 | msg->errno = -EFAULT; | |
90 | return -EFAULT; | |
91 | } | |
92 | ||
93 | mlen -= left; | |
94 | msg->copied += mlen; | |
95 | msg->errno = 0; | |
96 | return mlen; | |
97 | } | |
98 | EXPORT_SYMBOL_GPL(rpc_pipe_generic_upcall); | |
99 | ||
93a44a75 | 100 | /** |
1a5778aa | 101 | * rpc_queue_upcall - queue an upcall message to userspace |
93a44a75 BF |
102 | * @inode: inode of upcall pipe on which to queue given message |
103 | * @msg: message to queue | |
104 | * | |
105 | * Call with an @inode created by rpc_mkpipe() to queue an upcall. | |
106 | * A userspace process may then later read the upcall by performing a | |
107 | * read on an open file for this inode. It is up to the caller to | |
108 | * initialize the fields of @msg (other than @msg->list) appropriately. | |
109 | */ | |
1da177e4 LT |
110 | int |
111 | rpc_queue_upcall(struct inode *inode, struct rpc_pipe_msg *msg) | |
112 | { | |
113 | struct rpc_inode *rpci = RPC_I(inode); | |
6070fe6f | 114 | int res = -EPIPE; |
1da177e4 | 115 | |
9842ef35 | 116 | spin_lock(&inode->i_lock); |
6070fe6f TM |
117 | if (rpci->ops == NULL) |
118 | goto out; | |
1da177e4 LT |
119 | if (rpci->nreaders) { |
120 | list_add_tail(&msg->list, &rpci->pipe); | |
121 | rpci->pipelen += msg->len; | |
6070fe6f | 122 | res = 0; |
1da177e4 LT |
123 | } else if (rpci->flags & RPC_PIPE_WAIT_FOR_OPEN) { |
124 | if (list_empty(&rpci->pipe)) | |
24c5d9d7 TM |
125 | queue_delayed_work(rpciod_workqueue, |
126 | &rpci->queue_timeout, | |
1da177e4 LT |
127 | RPC_UPCALL_TIMEOUT); |
128 | list_add_tail(&msg->list, &rpci->pipe); | |
129 | rpci->pipelen += msg->len; | |
6070fe6f TM |
130 | res = 0; |
131 | } | |
132 | out: | |
9842ef35 | 133 | spin_unlock(&inode->i_lock); |
1da177e4 LT |
134 | wake_up(&rpci->waitq); |
135 | return res; | |
136 | } | |
468039ee | 137 | EXPORT_SYMBOL_GPL(rpc_queue_upcall); |
1da177e4 | 138 | |
6070fe6f TM |
139 | static inline void |
140 | rpc_inode_setowner(struct inode *inode, void *private) | |
141 | { | |
142 | RPC_I(inode)->private = private; | |
143 | } | |
144 | ||
1da177e4 LT |
145 | static void |
146 | rpc_close_pipes(struct inode *inode) | |
147 | { | |
148 | struct rpc_inode *rpci = RPC_I(inode); | |
b693ba4a | 149 | const struct rpc_pipe_ops *ops; |
e712804a | 150 | int need_release; |
1da177e4 | 151 | |
1b1dcc1b | 152 | mutex_lock(&inode->i_mutex); |
9842ef35 TM |
153 | ops = rpci->ops; |
154 | if (ops != NULL) { | |
155 | LIST_HEAD(free_list); | |
9842ef35 | 156 | spin_lock(&inode->i_lock); |
e712804a | 157 | need_release = rpci->nreaders != 0 || rpci->nwriters != 0; |
1da177e4 | 158 | rpci->nreaders = 0; |
9842ef35 TM |
159 | list_splice_init(&rpci->in_upcall, &free_list); |
160 | list_splice_init(&rpci->pipe, &free_list); | |
161 | rpci->pipelen = 0; | |
1da177e4 | 162 | rpci->ops = NULL; |
9842ef35 TM |
163 | spin_unlock(&inode->i_lock); |
164 | rpc_purge_list(rpci, &free_list, ops->destroy_msg, -EPIPE); | |
165 | rpci->nwriters = 0; | |
e712804a | 166 | if (need_release && ops->release_pipe) |
9842ef35 | 167 | ops->release_pipe(inode); |
4011cd97 | 168 | cancel_delayed_work_sync(&rpci->queue_timeout); |
1da177e4 | 169 | } |
6070fe6f | 170 | rpc_inode_setowner(inode, NULL); |
1b1dcc1b | 171 | mutex_unlock(&inode->i_mutex); |
1da177e4 LT |
172 | } |
173 | ||
1da177e4 LT |
174 | static struct inode * |
175 | rpc_alloc_inode(struct super_block *sb) | |
176 | { | |
177 | struct rpc_inode *rpci; | |
e94b1766 | 178 | rpci = (struct rpc_inode *)kmem_cache_alloc(rpc_inode_cachep, GFP_KERNEL); |
1da177e4 LT |
179 | if (!rpci) |
180 | return NULL; | |
181 | return &rpci->vfs_inode; | |
182 | } | |
183 | ||
184 | static void | |
fa0d7e3d | 185 | rpc_i_callback(struct rcu_head *head) |
1da177e4 | 186 | { |
fa0d7e3d | 187 | struct inode *inode = container_of(head, struct inode, i_rcu); |
1da177e4 LT |
188 | kmem_cache_free(rpc_inode_cachep, RPC_I(inode)); |
189 | } | |
190 | ||
fa0d7e3d NP |
191 | static void |
192 | rpc_destroy_inode(struct inode *inode) | |
193 | { | |
194 | call_rcu(&inode->i_rcu, rpc_i_callback); | |
195 | } | |
196 | ||
1da177e4 LT |
197 | static int |
198 | rpc_pipe_open(struct inode *inode, struct file *filp) | |
199 | { | |
200 | struct rpc_inode *rpci = RPC_I(inode); | |
c3810608 | 201 | int first_open; |
1da177e4 LT |
202 | int res = -ENXIO; |
203 | ||
1b1dcc1b | 204 | mutex_lock(&inode->i_mutex); |
c3810608 BF |
205 | if (rpci->ops == NULL) |
206 | goto out; | |
207 | first_open = rpci->nreaders == 0 && rpci->nwriters == 0; | |
208 | if (first_open && rpci->ops->open_pipe) { | |
209 | res = rpci->ops->open_pipe(inode); | |
210 | if (res) | |
211 | goto out; | |
1da177e4 | 212 | } |
c3810608 BF |
213 | if (filp->f_mode & FMODE_READ) |
214 | rpci->nreaders++; | |
215 | if (filp->f_mode & FMODE_WRITE) | |
216 | rpci->nwriters++; | |
217 | res = 0; | |
218 | out: | |
1b1dcc1b | 219 | mutex_unlock(&inode->i_mutex); |
1da177e4 LT |
220 | return res; |
221 | } | |
222 | ||
223 | static int | |
224 | rpc_pipe_release(struct inode *inode, struct file *filp) | |
225 | { | |
969b7f25 | 226 | struct rpc_inode *rpci = RPC_I(inode); |
1da177e4 | 227 | struct rpc_pipe_msg *msg; |
e712804a | 228 | int last_close; |
1da177e4 | 229 | |
1b1dcc1b | 230 | mutex_lock(&inode->i_mutex); |
1da177e4 LT |
231 | if (rpci->ops == NULL) |
232 | goto out; | |
655b5bb4 | 233 | msg = filp->private_data; |
1da177e4 | 234 | if (msg != NULL) { |
9842ef35 | 235 | spin_lock(&inode->i_lock); |
48e49187 | 236 | msg->errno = -EAGAIN; |
5a67657a | 237 | list_del_init(&msg->list); |
9842ef35 | 238 | spin_unlock(&inode->i_lock); |
1da177e4 LT |
239 | rpci->ops->destroy_msg(msg); |
240 | } | |
241 | if (filp->f_mode & FMODE_WRITE) | |
242 | rpci->nwriters --; | |
9842ef35 | 243 | if (filp->f_mode & FMODE_READ) { |
1da177e4 | 244 | rpci->nreaders --; |
9842ef35 TM |
245 | if (rpci->nreaders == 0) { |
246 | LIST_HEAD(free_list); | |
247 | spin_lock(&inode->i_lock); | |
248 | list_splice_init(&rpci->pipe, &free_list); | |
249 | rpci->pipelen = 0; | |
250 | spin_unlock(&inode->i_lock); | |
251 | rpc_purge_list(rpci, &free_list, | |
252 | rpci->ops->destroy_msg, -EAGAIN); | |
253 | } | |
254 | } | |
e712804a BF |
255 | last_close = rpci->nwriters == 0 && rpci->nreaders == 0; |
256 | if (last_close && rpci->ops->release_pipe) | |
1da177e4 LT |
257 | rpci->ops->release_pipe(inode); |
258 | out: | |
1b1dcc1b | 259 | mutex_unlock(&inode->i_mutex); |
1da177e4 LT |
260 | return 0; |
261 | } | |
262 | ||
263 | static ssize_t | |
264 | rpc_pipe_read(struct file *filp, char __user *buf, size_t len, loff_t *offset) | |
265 | { | |
303b46bb | 266 | struct inode *inode = filp->f_path.dentry->d_inode; |
1da177e4 LT |
267 | struct rpc_inode *rpci = RPC_I(inode); |
268 | struct rpc_pipe_msg *msg; | |
269 | int res = 0; | |
270 | ||
1b1dcc1b | 271 | mutex_lock(&inode->i_mutex); |
1da177e4 LT |
272 | if (rpci->ops == NULL) { |
273 | res = -EPIPE; | |
274 | goto out_unlock; | |
275 | } | |
276 | msg = filp->private_data; | |
277 | if (msg == NULL) { | |
9842ef35 | 278 | spin_lock(&inode->i_lock); |
1da177e4 LT |
279 | if (!list_empty(&rpci->pipe)) { |
280 | msg = list_entry(rpci->pipe.next, | |
281 | struct rpc_pipe_msg, | |
282 | list); | |
283 | list_move(&msg->list, &rpci->in_upcall); | |
284 | rpci->pipelen -= msg->len; | |
285 | filp->private_data = msg; | |
286 | msg->copied = 0; | |
287 | } | |
9842ef35 | 288 | spin_unlock(&inode->i_lock); |
1da177e4 LT |
289 | if (msg == NULL) |
290 | goto out_unlock; | |
291 | } | |
292 | /* NOTE: it is up to the callback to update msg->copied */ | |
293 | res = rpci->ops->upcall(filp, msg, buf, len); | |
294 | if (res < 0 || msg->len == msg->copied) { | |
295 | filp->private_data = NULL; | |
9842ef35 | 296 | spin_lock(&inode->i_lock); |
5a67657a | 297 | list_del_init(&msg->list); |
9842ef35 | 298 | spin_unlock(&inode->i_lock); |
1da177e4 LT |
299 | rpci->ops->destroy_msg(msg); |
300 | } | |
301 | out_unlock: | |
1b1dcc1b | 302 | mutex_unlock(&inode->i_mutex); |
1da177e4 LT |
303 | return res; |
304 | } | |
305 | ||
306 | static ssize_t | |
307 | rpc_pipe_write(struct file *filp, const char __user *buf, size_t len, loff_t *offset) | |
308 | { | |
303b46bb | 309 | struct inode *inode = filp->f_path.dentry->d_inode; |
1da177e4 LT |
310 | struct rpc_inode *rpci = RPC_I(inode); |
311 | int res; | |
312 | ||
1b1dcc1b | 313 | mutex_lock(&inode->i_mutex); |
1da177e4 LT |
314 | res = -EPIPE; |
315 | if (rpci->ops != NULL) | |
316 | res = rpci->ops->downcall(filp, buf, len); | |
1b1dcc1b | 317 | mutex_unlock(&inode->i_mutex); |
1da177e4 LT |
318 | return res; |
319 | } | |
320 | ||
321 | static unsigned int | |
322 | rpc_pipe_poll(struct file *filp, struct poll_table_struct *wait) | |
323 | { | |
324 | struct rpc_inode *rpci; | |
325 | unsigned int mask = 0; | |
326 | ||
303b46bb | 327 | rpci = RPC_I(filp->f_path.dentry->d_inode); |
1da177e4 LT |
328 | poll_wait(filp, &rpci->waitq, wait); |
329 | ||
330 | mask = POLLOUT | POLLWRNORM; | |
331 | if (rpci->ops == NULL) | |
332 | mask |= POLLERR | POLLHUP; | |
eda4f9b7 | 333 | if (filp->private_data || !list_empty(&rpci->pipe)) |
1da177e4 LT |
334 | mask |= POLLIN | POLLRDNORM; |
335 | return mask; | |
336 | } | |
337 | ||
a6f8dbc6 AB |
338 | static long |
339 | rpc_pipe_ioctl(struct file *filp, unsigned int cmd, unsigned long arg) | |
1da177e4 | 340 | { |
a6f8dbc6 AB |
341 | struct inode *inode = filp->f_path.dentry->d_inode; |
342 | struct rpc_inode *rpci = RPC_I(inode); | |
1da177e4 LT |
343 | int len; |
344 | ||
345 | switch (cmd) { | |
346 | case FIONREAD: | |
a6f8dbc6 AB |
347 | spin_lock(&inode->i_lock); |
348 | if (rpci->ops == NULL) { | |
349 | spin_unlock(&inode->i_lock); | |
1da177e4 | 350 | return -EPIPE; |
a6f8dbc6 | 351 | } |
1da177e4 LT |
352 | len = rpci->pipelen; |
353 | if (filp->private_data) { | |
354 | struct rpc_pipe_msg *msg; | |
655b5bb4 | 355 | msg = filp->private_data; |
1da177e4 LT |
356 | len += msg->len - msg->copied; |
357 | } | |
a6f8dbc6 | 358 | spin_unlock(&inode->i_lock); |
1da177e4 LT |
359 | return put_user(len, (int __user *)arg); |
360 | default: | |
361 | return -EINVAL; | |
362 | } | |
363 | } | |
364 | ||
da7071d7 | 365 | static const struct file_operations rpc_pipe_fops = { |
1da177e4 LT |
366 | .owner = THIS_MODULE, |
367 | .llseek = no_llseek, | |
368 | .read = rpc_pipe_read, | |
369 | .write = rpc_pipe_write, | |
370 | .poll = rpc_pipe_poll, | |
674b604c | 371 | .unlocked_ioctl = rpc_pipe_ioctl, |
1da177e4 LT |
372 | .open = rpc_pipe_open, |
373 | .release = rpc_pipe_release, | |
374 | }; | |
375 | ||
376 | static int | |
377 | rpc_show_info(struct seq_file *m, void *v) | |
378 | { | |
379 | struct rpc_clnt *clnt = m->private; | |
380 | ||
381 | seq_printf(m, "RPC server: %s\n", clnt->cl_server); | |
382 | seq_printf(m, "service: %s (%d) version %d\n", clnt->cl_protname, | |
383 | clnt->cl_prog, clnt->cl_vers); | |
e7f78657 CL |
384 | seq_printf(m, "address: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_ADDR)); |
385 | seq_printf(m, "protocol: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_PROTO)); | |
bf19aace | 386 | seq_printf(m, "port: %s\n", rpc_peeraddr2str(clnt, RPC_DISPLAY_PORT)); |
1da177e4 LT |
387 | return 0; |
388 | } | |
389 | ||
390 | static int | |
391 | rpc_info_open(struct inode *inode, struct file *file) | |
392 | { | |
006abe88 | 393 | struct rpc_clnt *clnt = NULL; |
1da177e4 LT |
394 | int ret = single_open(file, rpc_show_info, NULL); |
395 | ||
396 | if (!ret) { | |
397 | struct seq_file *m = file->private_data; | |
006abe88 TM |
398 | |
399 | spin_lock(&file->f_path.dentry->d_lock); | |
400 | if (!d_unhashed(file->f_path.dentry)) | |
401 | clnt = RPC_I(inode)->private; | |
402 | if (clnt != NULL && atomic_inc_not_zero(&clnt->cl_count)) { | |
403 | spin_unlock(&file->f_path.dentry->d_lock); | |
1da177e4 LT |
404 | m->private = clnt; |
405 | } else { | |
006abe88 | 406 | spin_unlock(&file->f_path.dentry->d_lock); |
1da177e4 LT |
407 | single_release(inode, file); |
408 | ret = -EINVAL; | |
409 | } | |
1da177e4 LT |
410 | } |
411 | return ret; | |
412 | } | |
413 | ||
414 | static int | |
415 | rpc_info_release(struct inode *inode, struct file *file) | |
416 | { | |
417 | struct seq_file *m = file->private_data; | |
418 | struct rpc_clnt *clnt = (struct rpc_clnt *)m->private; | |
419 | ||
420 | if (clnt) | |
421 | rpc_release_client(clnt); | |
422 | return single_release(inode, file); | |
423 | } | |
424 | ||
da7071d7 | 425 | static const struct file_operations rpc_info_operations = { |
1da177e4 LT |
426 | .owner = THIS_MODULE, |
427 | .open = rpc_info_open, | |
428 | .read = seq_read, | |
429 | .llseek = seq_lseek, | |
430 | .release = rpc_info_release, | |
431 | }; | |
432 | ||
433 | ||
1da177e4 LT |
434 | /* |
435 | * Description of fs contents. | |
436 | */ | |
437 | struct rpc_filelist { | |
ac6fecee | 438 | const char *name; |
99ac48f5 | 439 | const struct file_operations *i_fop; |
7364af6a | 440 | umode_t mode; |
1da177e4 LT |
441 | }; |
442 | ||
54281548 | 443 | struct vfsmount *rpc_get_mount(void) |
1da177e4 | 444 | { |
54281548 TM |
445 | int err; |
446 | ||
fc14f2fe | 447 | err = simple_pin_fs(&rpc_pipe_fs_type, &rpc_mnt, &rpc_mount_count); |
54281548 TM |
448 | if (err != 0) |
449 | return ERR_PTR(err); | |
fc14f2fe | 450 | return rpc_mnt; |
1da177e4 | 451 | } |
e571cbf1 | 452 | EXPORT_SYMBOL_GPL(rpc_get_mount); |
1da177e4 | 453 | |
54281548 | 454 | void rpc_put_mount(void) |
1da177e4 | 455 | { |
fc14f2fe | 456 | simple_release_fs(&rpc_mnt, &rpc_mount_count); |
1da177e4 | 457 | } |
e571cbf1 | 458 | EXPORT_SYMBOL_GPL(rpc_put_mount); |
1da177e4 | 459 | |
fe15ce44 | 460 | static int rpc_delete_dentry(const struct dentry *dentry) |
62e1761c TM |
461 | { |
462 | return 1; | |
463 | } | |
464 | ||
3ba13d17 | 465 | static const struct dentry_operations rpc_dentry_operations = { |
62e1761c TM |
466 | .d_delete = rpc_delete_dentry, |
467 | }; | |
468 | ||
1da177e4 | 469 | static struct inode * |
7364af6a | 470 | rpc_get_inode(struct super_block *sb, umode_t mode) |
1da177e4 LT |
471 | { |
472 | struct inode *inode = new_inode(sb); | |
473 | if (!inode) | |
474 | return NULL; | |
85fe4025 | 475 | inode->i_ino = get_next_ino(); |
1da177e4 | 476 | inode->i_mode = mode; |
1da177e4 | 477 | inode->i_atime = inode->i_mtime = inode->i_ctime = CURRENT_TIME; |
89f0e4fe JP |
478 | switch (mode & S_IFMT) { |
479 | case S_IFDIR: | |
480 | inode->i_fop = &simple_dir_operations; | |
481 | inode->i_op = &simple_dir_inode_operations; | |
482 | inc_nlink(inode); | |
483 | default: | |
484 | break; | |
1da177e4 LT |
485 | } |
486 | return inode; | |
487 | } | |
488 | ||
7589806e TM |
489 | static int __rpc_create_common(struct inode *dir, struct dentry *dentry, |
490 | umode_t mode, | |
491 | const struct file_operations *i_fop, | |
492 | void *private) | |
493 | { | |
494 | struct inode *inode; | |
495 | ||
beb0f0a9 | 496 | d_drop(dentry); |
7589806e TM |
497 | inode = rpc_get_inode(dir->i_sb, mode); |
498 | if (!inode) | |
499 | goto out_err; | |
500 | inode->i_ino = iunique(dir->i_sb, 100); | |
501 | if (i_fop) | |
502 | inode->i_fop = i_fop; | |
503 | if (private) | |
504 | rpc_inode_setowner(inode, private); | |
505 | d_add(dentry, inode); | |
506 | return 0; | |
507 | out_err: | |
508 | printk(KERN_WARNING "%s: %s failed to allocate inode for dentry %s\n", | |
509 | __FILE__, __func__, dentry->d_name.name); | |
510 | dput(dentry); | |
511 | return -ENOMEM; | |
512 | } | |
513 | ||
ac6fecee TM |
514 | static int __rpc_create(struct inode *dir, struct dentry *dentry, |
515 | umode_t mode, | |
516 | const struct file_operations *i_fop, | |
517 | void *private) | |
518 | { | |
519 | int err; | |
520 | ||
521 | err = __rpc_create_common(dir, dentry, S_IFREG | mode, i_fop, private); | |
522 | if (err) | |
523 | return err; | |
524 | fsnotify_create(dir, dentry); | |
525 | return 0; | |
526 | } | |
527 | ||
7589806e TM |
528 | static int __rpc_mkdir(struct inode *dir, struct dentry *dentry, |
529 | umode_t mode, | |
530 | const struct file_operations *i_fop, | |
531 | void *private) | |
532 | { | |
533 | int err; | |
534 | ||
535 | err = __rpc_create_common(dir, dentry, S_IFDIR | mode, i_fop, private); | |
536 | if (err) | |
537 | return err; | |
538 | inc_nlink(dir); | |
539 | fsnotify_mkdir(dir, dentry); | |
540 | return 0; | |
541 | } | |
542 | ||
543 | static int __rpc_mkpipe(struct inode *dir, struct dentry *dentry, | |
544 | umode_t mode, | |
545 | const struct file_operations *i_fop, | |
546 | void *private, | |
547 | const struct rpc_pipe_ops *ops, | |
548 | int flags) | |
549 | { | |
550 | struct rpc_inode *rpci; | |
551 | int err; | |
552 | ||
553 | err = __rpc_create_common(dir, dentry, S_IFIFO | mode, i_fop, private); | |
554 | if (err) | |
555 | return err; | |
556 | rpci = RPC_I(dentry->d_inode); | |
7589806e TM |
557 | rpci->private = private; |
558 | rpci->flags = flags; | |
559 | rpci->ops = ops; | |
560 | fsnotify_create(dir, dentry); | |
561 | return 0; | |
562 | } | |
563 | ||
ac6fecee TM |
564 | static int __rpc_rmdir(struct inode *dir, struct dentry *dentry) |
565 | { | |
566 | int ret; | |
567 | ||
568 | dget(dentry); | |
569 | ret = simple_rmdir(dir, dentry); | |
570 | d_delete(dentry); | |
571 | dput(dentry); | |
572 | return ret; | |
573 | } | |
574 | ||
810d90bc TM |
575 | static int __rpc_unlink(struct inode *dir, struct dentry *dentry) |
576 | { | |
577 | int ret; | |
578 | ||
579 | dget(dentry); | |
580 | ret = simple_unlink(dir, dentry); | |
581 | d_delete(dentry); | |
582 | dput(dentry); | |
583 | return ret; | |
584 | } | |
585 | ||
586 | static int __rpc_rmpipe(struct inode *dir, struct dentry *dentry) | |
587 | { | |
588 | struct inode *inode = dentry->d_inode; | |
810d90bc | 589 | |
810d90bc TM |
590 | rpc_close_pipes(inode); |
591 | return __rpc_unlink(dir, dentry); | |
592 | } | |
593 | ||
5bff0386 | 594 | static struct dentry *__rpc_lookup_create_exclusive(struct dentry *parent, |
cfeaa4a3 TM |
595 | struct qstr *name) |
596 | { | |
597 | struct dentry *dentry; | |
598 | ||
599 | dentry = d_lookup(parent, name); | |
600 | if (!dentry) { | |
601 | dentry = d_alloc(parent, name); | |
5bff0386 SK |
602 | if (!dentry) |
603 | return ERR_PTR(-ENOMEM); | |
cfeaa4a3 | 604 | } |
5bff0386 | 605 | if (dentry->d_inode == NULL) { |
fb045adb | 606 | d_set_d_op(dentry, &rpc_dentry_operations); |
cfeaa4a3 | 607 | return dentry; |
5bff0386 | 608 | } |
cfeaa4a3 TM |
609 | dput(dentry); |
610 | return ERR_PTR(-EEXIST); | |
611 | } | |
612 | ||
1da177e4 LT |
613 | /* |
614 | * FIXME: This probably has races. | |
615 | */ | |
ac6fecee TM |
616 | static void __rpc_depopulate(struct dentry *parent, |
617 | const struct rpc_filelist *files, | |
618 | int start, int eof) | |
1da177e4 LT |
619 | { |
620 | struct inode *dir = parent->d_inode; | |
ac6fecee TM |
621 | struct dentry *dentry; |
622 | struct qstr name; | |
623 | int i; | |
1da177e4 | 624 | |
ac6fecee TM |
625 | for (i = start; i < eof; i++) { |
626 | name.name = files[i].name; | |
627 | name.len = strlen(files[i].name); | |
628 | name.hash = full_name_hash(name.name, name.len); | |
629 | dentry = d_lookup(parent, &name); | |
630 | ||
631 | if (dentry == NULL) | |
62e1761c | 632 | continue; |
ac6fecee TM |
633 | if (dentry->d_inode == NULL) |
634 | goto next; | |
635 | switch (dentry->d_inode->i_mode & S_IFMT) { | |
636 | default: | |
637 | BUG(); | |
638 | case S_IFREG: | |
639 | __rpc_unlink(dir, dentry); | |
1da177e4 | 640 | break; |
ac6fecee TM |
641 | case S_IFDIR: |
642 | __rpc_rmdir(dir, dentry); | |
643 | } | |
644 | next: | |
645 | dput(dentry); | |
1da177e4 | 646 | } |
ac6fecee TM |
647 | } |
648 | ||
649 | static void rpc_depopulate(struct dentry *parent, | |
650 | const struct rpc_filelist *files, | |
651 | int start, int eof) | |
652 | { | |
653 | struct inode *dir = parent->d_inode; | |
654 | ||
655 | mutex_lock_nested(&dir->i_mutex, I_MUTEX_CHILD); | |
656 | __rpc_depopulate(parent, files, start, eof); | |
1b1dcc1b | 657 | mutex_unlock(&dir->i_mutex); |
1da177e4 LT |
658 | } |
659 | ||
ac6fecee TM |
660 | static int rpc_populate(struct dentry *parent, |
661 | const struct rpc_filelist *files, | |
662 | int start, int eof, | |
663 | void *private) | |
1da177e4 | 664 | { |
ac6fecee | 665 | struct inode *dir = parent->d_inode; |
1da177e4 | 666 | struct dentry *dentry; |
ac6fecee | 667 | int i, err; |
1da177e4 | 668 | |
1b1dcc1b | 669 | mutex_lock(&dir->i_mutex); |
1da177e4 | 670 | for (i = start; i < eof; i++) { |
ac6fecee TM |
671 | struct qstr q; |
672 | ||
673 | q.name = files[i].name; | |
674 | q.len = strlen(files[i].name); | |
675 | q.hash = full_name_hash(q.name, q.len); | |
676 | dentry = __rpc_lookup_create_exclusive(parent, &q); | |
677 | err = PTR_ERR(dentry); | |
678 | if (IS_ERR(dentry)) | |
1da177e4 | 679 | goto out_bad; |
ac6fecee TM |
680 | switch (files[i].mode & S_IFMT) { |
681 | default: | |
682 | BUG(); | |
683 | case S_IFREG: | |
684 | err = __rpc_create(dir, dentry, | |
685 | files[i].mode, | |
686 | files[i].i_fop, | |
687 | private); | |
688 | break; | |
689 | case S_IFDIR: | |
690 | err = __rpc_mkdir(dir, dentry, | |
691 | files[i].mode, | |
692 | NULL, | |
693 | private); | |
1da177e4 | 694 | } |
ac6fecee TM |
695 | if (err != 0) |
696 | goto out_bad; | |
1da177e4 | 697 | } |
1b1dcc1b | 698 | mutex_unlock(&dir->i_mutex); |
1da177e4 LT |
699 | return 0; |
700 | out_bad: | |
ac6fecee | 701 | __rpc_depopulate(parent, files, start, eof); |
1b1dcc1b | 702 | mutex_unlock(&dir->i_mutex); |
1da177e4 | 703 | printk(KERN_WARNING "%s: %s failed to populate directory %s\n", |
0dc47877 | 704 | __FILE__, __func__, parent->d_name.name); |
ac6fecee | 705 | return err; |
f134585a | 706 | } |
1da177e4 | 707 | |
e57aed77 TM |
708 | static struct dentry *rpc_mkdir_populate(struct dentry *parent, |
709 | struct qstr *name, umode_t mode, void *private, | |
710 | int (*populate)(struct dentry *, void *), void *args_populate) | |
f134585a | 711 | { |
f134585a | 712 | struct dentry *dentry; |
7d59d1e8 | 713 | struct inode *dir = parent->d_inode; |
f134585a TM |
714 | int error; |
715 | ||
7d59d1e8 TM |
716 | mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT); |
717 | dentry = __rpc_lookup_create_exclusive(parent, name); | |
f134585a | 718 | if (IS_ERR(dentry)) |
7d59d1e8 TM |
719 | goto out; |
720 | error = __rpc_mkdir(dir, dentry, mode, NULL, private); | |
7589806e TM |
721 | if (error != 0) |
722 | goto out_err; | |
e57aed77 TM |
723 | if (populate != NULL) { |
724 | error = populate(dentry, args_populate); | |
725 | if (error) | |
726 | goto err_rmdir; | |
727 | } | |
f134585a | 728 | out: |
1b1dcc1b | 729 | mutex_unlock(&dir->i_mutex); |
5c3e985a | 730 | return dentry; |
ac6fecee | 731 | err_rmdir: |
f134585a | 732 | __rpc_rmdir(dir, dentry); |
7589806e | 733 | out_err: |
f134585a TM |
734 | dentry = ERR_PTR(error); |
735 | goto out; | |
1da177e4 LT |
736 | } |
737 | ||
e57aed77 TM |
738 | static int rpc_rmdir_depopulate(struct dentry *dentry, |
739 | void (*depopulate)(struct dentry *)) | |
1da177e4 | 740 | { |
dff02cc1 | 741 | struct dentry *parent; |
f134585a TM |
742 | struct inode *dir; |
743 | int error; | |
278c995c | 744 | |
dff02cc1 TM |
745 | parent = dget_parent(dentry); |
746 | dir = parent->d_inode; | |
c6573c29 | 747 | mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT); |
e57aed77 TM |
748 | if (depopulate != NULL) |
749 | depopulate(dentry); | |
f134585a | 750 | error = __rpc_rmdir(dir, dentry); |
1b1dcc1b | 751 | mutex_unlock(&dir->i_mutex); |
dff02cc1 | 752 | dput(parent); |
f134585a | 753 | return error; |
1da177e4 LT |
754 | } |
755 | ||
93a44a75 BF |
756 | /** |
757 | * rpc_mkpipe - make an rpc_pipefs file for kernel<->userspace communication | |
758 | * @parent: dentry of directory to create new "pipe" in | |
759 | * @name: name of pipe | |
760 | * @private: private data to associate with the pipe, for the caller's use | |
761 | * @ops: operations defining the behavior of the pipe: upcall, downcall, | |
c3810608 | 762 | * release_pipe, open_pipe, and destroy_msg. |
65b6e42c | 763 | * @flags: rpc_inode flags |
93a44a75 BF |
764 | * |
765 | * Data is made available for userspace to read by calls to | |
766 | * rpc_queue_upcall(). The actual reads will result in calls to | |
767 | * @ops->upcall, which will be called with the file pointer, | |
768 | * message, and userspace buffer to copy to. | |
769 | * | |
770 | * Writes can come at any time, and do not necessarily have to be | |
771 | * responses to upcalls. They will result in calls to @msg->downcall. | |
772 | * | |
773 | * The @private argument passed here will be available to all these methods | |
774 | * from the file pointer, via RPC_I(file->f_dentry->d_inode)->private. | |
775 | */ | |
b693ba4a TM |
776 | struct dentry *rpc_mkpipe(struct dentry *parent, const char *name, |
777 | void *private, const struct rpc_pipe_ops *ops, | |
778 | int flags) | |
1da177e4 | 779 | { |
1da177e4 | 780 | struct dentry *dentry; |
7589806e | 781 | struct inode *dir = parent->d_inode; |
7364af6a | 782 | umode_t umode = S_IFIFO | S_IRUSR | S_IWUSR; |
cfeaa4a3 | 783 | struct qstr q; |
7589806e | 784 | int err; |
7364af6a TM |
785 | |
786 | if (ops->upcall == NULL) | |
787 | umode &= ~S_IRUGO; | |
788 | if (ops->downcall == NULL) | |
789 | umode &= ~S_IWUGO; | |
1da177e4 | 790 | |
cfeaa4a3 TM |
791 | q.name = name; |
792 | q.len = strlen(name); | |
793 | q.hash = full_name_hash(q.name, q.len), | |
794 | ||
795 | mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT); | |
5bff0386 | 796 | dentry = __rpc_lookup_create_exclusive(parent, &q); |
1da177e4 | 797 | if (IS_ERR(dentry)) |
cfeaa4a3 | 798 | goto out; |
7589806e | 799 | err = __rpc_mkpipe(dir, dentry, umode, &rpc_pipe_fops, |
810d90bc | 800 | private, ops, flags); |
7589806e TM |
801 | if (err) |
802 | goto out_err; | |
f134585a | 803 | out: |
1b1dcc1b | 804 | mutex_unlock(&dir->i_mutex); |
5c3e985a | 805 | return dentry; |
7589806e TM |
806 | out_err: |
807 | dentry = ERR_PTR(err); | |
158998b6 | 808 | printk(KERN_WARNING "%s: %s() failed to create pipe %s/%s (errno = %d)\n", |
0dc47877 | 809 | __FILE__, __func__, parent->d_name.name, name, |
7589806e | 810 | err); |
f134585a | 811 | goto out; |
1da177e4 | 812 | } |
468039ee | 813 | EXPORT_SYMBOL_GPL(rpc_mkpipe); |
1da177e4 | 814 | |
93a44a75 BF |
815 | /** |
816 | * rpc_unlink - remove a pipe | |
817 | * @dentry: dentry for the pipe, as returned from rpc_mkpipe | |
818 | * | |
819 | * After this call, lookups will no longer find the pipe, and any | |
820 | * attempts to read or write using preexisting opens of the pipe will | |
821 | * return -EPIPE. | |
822 | */ | |
f134585a | 823 | int |
5d67476f | 824 | rpc_unlink(struct dentry *dentry) |
1da177e4 | 825 | { |
5d67476f | 826 | struct dentry *parent; |
f134585a | 827 | struct inode *dir; |
5d67476f | 828 | int error = 0; |
1da177e4 | 829 | |
5d67476f TM |
830 | parent = dget_parent(dentry); |
831 | dir = parent->d_inode; | |
c6573c29 | 832 | mutex_lock_nested(&dir->i_mutex, I_MUTEX_PARENT); |
810d90bc | 833 | error = __rpc_rmpipe(dir, dentry); |
1b1dcc1b | 834 | mutex_unlock(&dir->i_mutex); |
5d67476f | 835 | dput(parent); |
f134585a | 836 | return error; |
1da177e4 | 837 | } |
468039ee | 838 | EXPORT_SYMBOL_GPL(rpc_unlink); |
1da177e4 | 839 | |
e57aed77 TM |
840 | enum { |
841 | RPCAUTH_info, | |
842 | RPCAUTH_EOF | |
843 | }; | |
844 | ||
845 | static const struct rpc_filelist authfiles[] = { | |
846 | [RPCAUTH_info] = { | |
847 | .name = "info", | |
848 | .i_fop = &rpc_info_operations, | |
849 | .mode = S_IFREG | S_IRUSR, | |
850 | }, | |
851 | }; | |
852 | ||
853 | static int rpc_clntdir_populate(struct dentry *dentry, void *private) | |
854 | { | |
855 | return rpc_populate(dentry, | |
856 | authfiles, RPCAUTH_info, RPCAUTH_EOF, | |
857 | private); | |
858 | } | |
859 | ||
860 | static void rpc_clntdir_depopulate(struct dentry *dentry) | |
861 | { | |
862 | rpc_depopulate(dentry, authfiles, RPCAUTH_info, RPCAUTH_EOF); | |
863 | } | |
864 | ||
7d59d1e8 TM |
865 | /** |
866 | * rpc_create_client_dir - Create a new rpc_client directory in rpc_pipefs | |
4111d4fd RD |
867 | * @dentry: dentry from the rpc_pipefs root to the new directory |
868 | * @name: &struct qstr for the name | |
7d59d1e8 TM |
869 | * @rpc_client: rpc client to associate with this directory |
870 | * | |
871 | * This creates a directory at the given @path associated with | |
872 | * @rpc_clnt, which will contain a file named "info" with some basic | |
873 | * information about the client, together with any "pipes" that may | |
874 | * later be created using rpc_mkpipe(). | |
875 | */ | |
23ac6581 | 876 | struct dentry *rpc_create_client_dir(struct dentry *dentry, |
e57aed77 TM |
877 | struct qstr *name, |
878 | struct rpc_clnt *rpc_client) | |
879 | { | |
880 | return rpc_mkdir_populate(dentry, name, S_IRUGO | S_IXUGO, NULL, | |
881 | rpc_clntdir_populate, rpc_client); | |
882 | } | |
883 | ||
884 | /** | |
885 | * rpc_remove_client_dir - Remove a directory created with rpc_create_client_dir() | |
886 | * @dentry: directory to remove | |
887 | */ | |
888 | int rpc_remove_client_dir(struct dentry *dentry) | |
7d59d1e8 | 889 | { |
e57aed77 | 890 | return rpc_rmdir_depopulate(dentry, rpc_clntdir_depopulate); |
7d59d1e8 TM |
891 | } |
892 | ||
8854e82d TM |
893 | static const struct rpc_filelist cache_pipefs_files[3] = { |
894 | [0] = { | |
895 | .name = "channel", | |
896 | .i_fop = &cache_file_operations_pipefs, | |
96c61cbd | 897 | .mode = S_IFREG|S_IRUSR|S_IWUSR, |
8854e82d TM |
898 | }, |
899 | [1] = { | |
900 | .name = "content", | |
901 | .i_fop = &content_file_operations_pipefs, | |
902 | .mode = S_IFREG|S_IRUSR, | |
903 | }, | |
904 | [2] = { | |
905 | .name = "flush", | |
906 | .i_fop = &cache_flush_operations_pipefs, | |
907 | .mode = S_IFREG|S_IRUSR|S_IWUSR, | |
908 | }, | |
909 | }; | |
910 | ||
911 | static int rpc_cachedir_populate(struct dentry *dentry, void *private) | |
912 | { | |
913 | return rpc_populate(dentry, | |
914 | cache_pipefs_files, 0, 3, | |
915 | private); | |
916 | } | |
917 | ||
918 | static void rpc_cachedir_depopulate(struct dentry *dentry) | |
919 | { | |
920 | rpc_depopulate(dentry, cache_pipefs_files, 0, 3); | |
921 | } | |
922 | ||
923 | struct dentry *rpc_create_cache_dir(struct dentry *parent, struct qstr *name, | |
64f1426f | 924 | umode_t umode, struct cache_detail *cd) |
8854e82d TM |
925 | { |
926 | return rpc_mkdir_populate(parent, name, umode, NULL, | |
927 | rpc_cachedir_populate, cd); | |
928 | } | |
929 | ||
930 | void rpc_remove_cache_dir(struct dentry *dentry) | |
931 | { | |
932 | rpc_rmdir_depopulate(dentry, rpc_cachedir_depopulate); | |
933 | } | |
934 | ||
1da177e4 LT |
935 | /* |
936 | * populate the filesystem | |
937 | */ | |
b87221de | 938 | static const struct super_operations s_ops = { |
1da177e4 LT |
939 | .alloc_inode = rpc_alloc_inode, |
940 | .destroy_inode = rpc_destroy_inode, | |
941 | .statfs = simple_statfs, | |
942 | }; | |
943 | ||
944 | #define RPCAUTH_GSSMAGIC 0x67596969 | |
945 | ||
bb156749 TM |
946 | /* |
947 | * We have a single directory with 1 node in it. | |
948 | */ | |
949 | enum { | |
950 | RPCAUTH_lockd, | |
951 | RPCAUTH_mount, | |
952 | RPCAUTH_nfs, | |
953 | RPCAUTH_portmap, | |
954 | RPCAUTH_statd, | |
955 | RPCAUTH_nfsd4_cb, | |
e571cbf1 | 956 | RPCAUTH_cache, |
bb156749 TM |
957 | RPCAUTH_RootEOF |
958 | }; | |
959 | ||
960 | static const struct rpc_filelist files[] = { | |
961 | [RPCAUTH_lockd] = { | |
962 | .name = "lockd", | |
963 | .mode = S_IFDIR | S_IRUGO | S_IXUGO, | |
964 | }, | |
965 | [RPCAUTH_mount] = { | |
966 | .name = "mount", | |
967 | .mode = S_IFDIR | S_IRUGO | S_IXUGO, | |
968 | }, | |
969 | [RPCAUTH_nfs] = { | |
970 | .name = "nfs", | |
971 | .mode = S_IFDIR | S_IRUGO | S_IXUGO, | |
972 | }, | |
973 | [RPCAUTH_portmap] = { | |
974 | .name = "portmap", | |
975 | .mode = S_IFDIR | S_IRUGO | S_IXUGO, | |
976 | }, | |
977 | [RPCAUTH_statd] = { | |
978 | .name = "statd", | |
979 | .mode = S_IFDIR | S_IRUGO | S_IXUGO, | |
980 | }, | |
981 | [RPCAUTH_nfsd4_cb] = { | |
982 | .name = "nfsd4_cb", | |
983 | .mode = S_IFDIR | S_IRUGO | S_IXUGO, | |
984 | }, | |
e571cbf1 TM |
985 | [RPCAUTH_cache] = { |
986 | .name = "cache", | |
987 | .mode = S_IFDIR | S_IRUGO | S_IXUGO, | |
988 | }, | |
bb156749 TM |
989 | }; |
990 | ||
1da177e4 LT |
991 | static int |
992 | rpc_fill_super(struct super_block *sb, void *data, int silent) | |
993 | { | |
994 | struct inode *inode; | |
995 | struct dentry *root; | |
996 | ||
997 | sb->s_blocksize = PAGE_CACHE_SIZE; | |
998 | sb->s_blocksize_bits = PAGE_CACHE_SHIFT; | |
999 | sb->s_magic = RPCAUTH_GSSMAGIC; | |
1000 | sb->s_op = &s_ops; | |
1001 | sb->s_time_gran = 1; | |
1002 | ||
1003 | inode = rpc_get_inode(sb, S_IFDIR | 0755); | |
1004 | if (!inode) | |
1005 | return -ENOMEM; | |
fc7bed8c | 1006 | sb->s_root = root = d_alloc_root(inode); |
1da177e4 LT |
1007 | if (!root) { |
1008 | iput(inode); | |
1009 | return -ENOMEM; | |
1010 | } | |
ac6fecee | 1011 | if (rpc_populate(root, files, RPCAUTH_lockd, RPCAUTH_RootEOF, NULL)) |
fc7bed8c | 1012 | return -ENOMEM; |
1da177e4 | 1013 | return 0; |
1da177e4 LT |
1014 | } |
1015 | ||
fc14f2fe AV |
1016 | static struct dentry * |
1017 | rpc_mount(struct file_system_type *fs_type, | |
1018 | int flags, const char *dev_name, void *data) | |
1da177e4 | 1019 | { |
fc14f2fe | 1020 | return mount_single(fs_type, flags, data, rpc_fill_super); |
1da177e4 LT |
1021 | } |
1022 | ||
1023 | static struct file_system_type rpc_pipe_fs_type = { | |
1024 | .owner = THIS_MODULE, | |
1025 | .name = "rpc_pipefs", | |
fc14f2fe | 1026 | .mount = rpc_mount, |
1da177e4 LT |
1027 | .kill_sb = kill_litter_super, |
1028 | }; | |
1029 | ||
1030 | static void | |
51cc5068 | 1031 | init_once(void *foo) |
1da177e4 LT |
1032 | { |
1033 | struct rpc_inode *rpci = (struct rpc_inode *) foo; | |
1034 | ||
a35afb83 CL |
1035 | inode_init_once(&rpci->vfs_inode); |
1036 | rpci->private = NULL; | |
1037 | rpci->nreaders = 0; | |
1038 | rpci->nwriters = 0; | |
1039 | INIT_LIST_HEAD(&rpci->in_upcall); | |
6e84c7b6 | 1040 | INIT_LIST_HEAD(&rpci->in_downcall); |
a35afb83 CL |
1041 | INIT_LIST_HEAD(&rpci->pipe); |
1042 | rpci->pipelen = 0; | |
1043 | init_waitqueue_head(&rpci->waitq); | |
1044 | INIT_DELAYED_WORK(&rpci->queue_timeout, | |
1045 | rpc_timeout_upcall_queue); | |
1046 | rpci->ops = NULL; | |
1da177e4 LT |
1047 | } |
1048 | ||
1049 | int register_rpc_pipefs(void) | |
1050 | { | |
5bd5f581 AM |
1051 | int err; |
1052 | ||
1da177e4 | 1053 | rpc_inode_cachep = kmem_cache_create("rpc_inode_cache", |
fffb60f9 PJ |
1054 | sizeof(struct rpc_inode), |
1055 | 0, (SLAB_HWCACHE_ALIGN|SLAB_RECLAIM_ACCOUNT| | |
1056 | SLAB_MEM_SPREAD), | |
20c2df83 | 1057 | init_once); |
1da177e4 LT |
1058 | if (!rpc_inode_cachep) |
1059 | return -ENOMEM; | |
5bd5f581 AM |
1060 | err = register_filesystem(&rpc_pipe_fs_type); |
1061 | if (err) { | |
1062 | kmem_cache_destroy(rpc_inode_cachep); | |
1063 | return err; | |
1064 | } | |
1065 | ||
1da177e4 LT |
1066 | return 0; |
1067 | } | |
1068 | ||
1069 | void unregister_rpc_pipefs(void) | |
1070 | { | |
1a1d92c1 | 1071 | kmem_cache_destroy(rpc_inode_cachep); |
1da177e4 LT |
1072 | unregister_filesystem(&rpc_pipe_fs_type); |
1073 | } | |
dcbf8c30 MS |
1074 | |
1075 | /* Make 'mount -t rpc_pipefs ...' autoload this module. */ | |
1076 | MODULE_ALIAS("rpc_pipefs"); |