| Joel Becker | 8adf053 | 2007-11-28 14:38:40 -0800 | [diff] [blame] | 1 | /* -*- mode: c; c-basic-offset: 8; -*- | 
|  | 2 | * vim: noexpandtab sw=8 ts=8 sts=0: | 
|  | 3 | * | 
|  | 4 | * stack_user.c | 
|  | 5 | * | 
|  | 6 | * Code which interfaces ocfs2 with fs/dlm and a userspace stack. | 
|  | 7 | * | 
|  | 8 | * Copyright (C) 2007 Oracle.  All rights reserved. | 
|  | 9 | * | 
|  | 10 | * This program is free software; you can redistribute it and/or | 
|  | 11 | * modify it under the terms of the GNU General Public | 
|  | 12 | * License as published by the Free Software Foundation, version 2. | 
|  | 13 | * | 
|  | 14 | * This program is distributed in the hope that it will be useful, | 
|  | 15 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | 
|  | 16 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU | 
|  | 17 | * General Public License for more details. | 
|  | 18 | */ | 
|  | 19 |  | 
|  | 20 | #include <linux/module.h> | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 21 | #include <linux/fs.h> | 
|  | 22 | #include <linux/miscdevice.h> | 
|  | 23 | #include <linux/mutex.h> | 
| Tejun Heo | 5a0e3ad | 2010-03-24 17:04:11 +0900 | [diff] [blame] | 24 | #include <linux/slab.h> | 
| Arnd Bergmann | b7fdf9f | 2008-05-20 19:16:28 +0200 | [diff] [blame] | 25 | #include <linux/smp_lock.h> | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 26 | #include <linux/reboot.h> | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 27 | #include <asm/uaccess.h> | 
| Joel Becker | 8adf053 | 2007-11-28 14:38:40 -0800 | [diff] [blame] | 28 |  | 
|  | 29 | #include "stackglue.h" | 
|  | 30 |  | 
| Mark Fasheh | 53da493 | 2008-07-21 14:29:16 -0700 | [diff] [blame] | 31 | #include <linux/dlm_plock.h> | 
| Joel Becker | 8adf053 | 2007-11-28 14:38:40 -0800 | [diff] [blame] | 32 |  | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 33 | /* | 
|  | 34 | * The control protocol starts with a handshake.  Until the handshake | 
|  | 35 | * is complete, the control device will fail all write(2)s. | 
|  | 36 | * | 
|  | 37 | * The handshake is simple.  First, the client reads until EOF.  Each line | 
|  | 38 | * of output is a supported protocol tag.  All protocol tags are a single | 
|  | 39 | * character followed by a two hex digit version number.  Currently the | 
|  | 40 | * only things supported is T01, for "Text-base version 0x01".  Next, the | 
| Joel Becker | de870ef | 2008-02-18 17:07:09 -0800 | [diff] [blame] | 41 | * client writes the version they would like to use, including the newline. | 
|  | 42 | * Thus, the protocol tag is 'T01\n'.  If the version tag written is | 
|  | 43 | * unknown, -EINVAL is returned.  Once the negotiation is complete, the | 
|  | 44 | * client can start sending messages. | 
|  | 45 | * | 
| Joel Becker | d4b95ee | 2008-02-20 15:39:44 -0800 | [diff] [blame] | 46 | * The T01 protocol has three messages.  First is the "SETN" message. | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 47 | * It has the following syntax: | 
|  | 48 | * | 
|  | 49 | *  SETN<space><8-char-hex-nodenum><newline> | 
|  | 50 | * | 
|  | 51 | * This is 14 characters. | 
|  | 52 | * | 
|  | 53 | * The "SETN" message must be the first message following the protocol. | 
|  | 54 | * It tells ocfs2_control the local node number. | 
|  | 55 | * | 
| Joel Becker | d4b95ee | 2008-02-20 15:39:44 -0800 | [diff] [blame] | 56 | * Next comes the "SETV" message.  It has the following syntax: | 
|  | 57 | * | 
|  | 58 | *  SETV<space><2-char-hex-major><space><2-char-hex-minor><newline> | 
|  | 59 | * | 
|  | 60 | * This is 11 characters. | 
|  | 61 | * | 
|  | 62 | * The "SETV" message sets the filesystem locking protocol version as | 
|  | 63 | * negotiated by the client.  The client negotiates based on the maximum | 
|  | 64 | * version advertised in /sys/fs/ocfs2/max_locking_protocol.  The major | 
|  | 65 | * number from the "SETV" message must match | 
| Joel Becker | e603cfb | 2010-01-29 16:06:29 -0800 | [diff] [blame] | 66 | * ocfs2_user_plugin.sp_max_proto.pv_major, and the minor number | 
|  | 67 | * must be less than or equal to ...sp_max_version.pv_minor. | 
| Joel Becker | d4b95ee | 2008-02-20 15:39:44 -0800 | [diff] [blame] | 68 | * | 
|  | 69 | * Once this information has been set, mounts will be allowed.  From this | 
|  | 70 | * point on, the "DOWN" message can be sent for node down notification. | 
|  | 71 | * It has the following syntax: | 
| Joel Becker | de870ef | 2008-02-18 17:07:09 -0800 | [diff] [blame] | 72 | * | 
|  | 73 | *  DOWN<space><32-char-cap-hex-uuid><space><8-char-hex-nodenum><newline> | 
|  | 74 | * | 
|  | 75 | * eg: | 
|  | 76 | * | 
|  | 77 | *  DOWN 632A924FDD844190BDA93C0DF6B94899 00000001\n | 
|  | 78 | * | 
|  | 79 | * This is 47 characters. | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 80 | */ | 
|  | 81 |  | 
|  | 82 | /* | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 83 | * Whether or not the client has done the handshake. | 
|  | 84 | * For now, we have just one protocol version. | 
|  | 85 | */ | 
|  | 86 | #define OCFS2_CONTROL_PROTO			"T01\n" | 
|  | 87 | #define OCFS2_CONTROL_PROTO_LEN			4 | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 88 |  | 
|  | 89 | /* Handshake states */ | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 90 | #define OCFS2_CONTROL_HANDSHAKE_INVALID		(0) | 
|  | 91 | #define OCFS2_CONTROL_HANDSHAKE_READ		(1) | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 92 | #define OCFS2_CONTROL_HANDSHAKE_PROTOCOL	(2) | 
|  | 93 | #define OCFS2_CONTROL_HANDSHAKE_VALID		(3) | 
|  | 94 |  | 
|  | 95 | /* Messages */ | 
|  | 96 | #define OCFS2_CONTROL_MESSAGE_OP_LEN		4 | 
|  | 97 | #define OCFS2_CONTROL_MESSAGE_SETNODE_OP	"SETN" | 
|  | 98 | #define OCFS2_CONTROL_MESSAGE_SETNODE_TOTAL_LEN	14 | 
| Joel Becker | d4b95ee | 2008-02-20 15:39:44 -0800 | [diff] [blame] | 99 | #define OCFS2_CONTROL_MESSAGE_SETVERSION_OP	"SETV" | 
|  | 100 | #define OCFS2_CONTROL_MESSAGE_SETVERSION_TOTAL_LEN	11 | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 101 | #define OCFS2_CONTROL_MESSAGE_DOWN_OP		"DOWN" | 
| Joel Becker | de870ef | 2008-02-18 17:07:09 -0800 | [diff] [blame] | 102 | #define OCFS2_CONTROL_MESSAGE_DOWN_TOTAL_LEN	47 | 
|  | 103 | #define OCFS2_TEXT_UUID_LEN			32 | 
| Joel Becker | d4b95ee | 2008-02-20 15:39:44 -0800 | [diff] [blame] | 104 | #define OCFS2_CONTROL_MESSAGE_VERNUM_LEN	2 | 
| Joel Becker | de870ef | 2008-02-18 17:07:09 -0800 | [diff] [blame] | 105 | #define OCFS2_CONTROL_MESSAGE_NODENUM_LEN	8 | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 106 |  | 
|  | 107 | /* | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 108 | * ocfs2_live_connection is refcounted because the filesystem and | 
|  | 109 | * miscdevice sides can detach in different order.  Let's just be safe. | 
|  | 110 | */ | 
|  | 111 | struct ocfs2_live_connection { | 
|  | 112 | struct list_head		oc_list; | 
|  | 113 | struct ocfs2_cluster_connection	*oc_conn; | 
|  | 114 | }; | 
|  | 115 |  | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 116 | struct ocfs2_control_private { | 
|  | 117 | struct list_head op_list; | 
|  | 118 | int op_state; | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 119 | int op_this_node; | 
| Joel Becker | d4b95ee | 2008-02-20 15:39:44 -0800 | [diff] [blame] | 120 | struct ocfs2_protocol_version op_proto; | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 121 | }; | 
|  | 122 |  | 
|  | 123 | /* SETN<space><8-char-hex-nodenum><newline> */ | 
|  | 124 | struct ocfs2_control_message_setn { | 
|  | 125 | char	tag[OCFS2_CONTROL_MESSAGE_OP_LEN]; | 
|  | 126 | char	space; | 
|  | 127 | char	nodestr[OCFS2_CONTROL_MESSAGE_NODENUM_LEN]; | 
|  | 128 | char	newline; | 
|  | 129 | }; | 
|  | 130 |  | 
| Joel Becker | d4b95ee | 2008-02-20 15:39:44 -0800 | [diff] [blame] | 131 | /* SETV<space><2-char-hex-major><space><2-char-hex-minor><newline> */ | 
|  | 132 | struct ocfs2_control_message_setv { | 
|  | 133 | char	tag[OCFS2_CONTROL_MESSAGE_OP_LEN]; | 
|  | 134 | char	space1; | 
|  | 135 | char	major[OCFS2_CONTROL_MESSAGE_VERNUM_LEN]; | 
|  | 136 | char	space2; | 
|  | 137 | char	minor[OCFS2_CONTROL_MESSAGE_VERNUM_LEN]; | 
|  | 138 | char	newline; | 
|  | 139 | }; | 
|  | 140 |  | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 141 | /* DOWN<space><32-char-cap-hex-uuid><space><8-char-hex-nodenum><newline> */ | 
|  | 142 | struct ocfs2_control_message_down { | 
|  | 143 | char	tag[OCFS2_CONTROL_MESSAGE_OP_LEN]; | 
|  | 144 | char	space1; | 
|  | 145 | char	uuid[OCFS2_TEXT_UUID_LEN]; | 
|  | 146 | char	space2; | 
|  | 147 | char	nodestr[OCFS2_CONTROL_MESSAGE_NODENUM_LEN]; | 
|  | 148 | char	newline; | 
|  | 149 | }; | 
|  | 150 |  | 
|  | 151 | union ocfs2_control_message { | 
|  | 152 | char					tag[OCFS2_CONTROL_MESSAGE_OP_LEN]; | 
|  | 153 | struct ocfs2_control_message_setn	u_setn; | 
| Joel Becker | d4b95ee | 2008-02-20 15:39:44 -0800 | [diff] [blame] | 154 | struct ocfs2_control_message_setv	u_setv; | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 155 | struct ocfs2_control_message_down	u_down; | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 156 | }; | 
|  | 157 |  | 
| Joel Becker | a12630b | 2008-05-09 18:49:29 -0700 | [diff] [blame] | 158 | static struct ocfs2_stack_plugin ocfs2_user_plugin; | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 159 |  | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 160 | static atomic_t ocfs2_control_opened; | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 161 | static int ocfs2_control_this_node = -1; | 
| Joel Becker | d4b95ee | 2008-02-20 15:39:44 -0800 | [diff] [blame] | 162 | static struct ocfs2_protocol_version running_proto; | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 163 |  | 
|  | 164 | static LIST_HEAD(ocfs2_live_connection_list); | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 165 | static LIST_HEAD(ocfs2_control_private_list); | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 166 | static DEFINE_MUTEX(ocfs2_control_lock); | 
|  | 167 |  | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 168 | static inline void ocfs2_control_set_handshake_state(struct file *file, | 
|  | 169 | int state) | 
|  | 170 | { | 
|  | 171 | struct ocfs2_control_private *p = file->private_data; | 
|  | 172 | p->op_state = state; | 
|  | 173 | } | 
|  | 174 |  | 
|  | 175 | static inline int ocfs2_control_get_handshake_state(struct file *file) | 
|  | 176 | { | 
|  | 177 | struct ocfs2_control_private *p = file->private_data; | 
|  | 178 | return p->op_state; | 
|  | 179 | } | 
|  | 180 |  | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 181 | static struct ocfs2_live_connection *ocfs2_connection_find(const char *name) | 
|  | 182 | { | 
|  | 183 | size_t len = strlen(name); | 
|  | 184 | struct ocfs2_live_connection *c; | 
|  | 185 |  | 
|  | 186 | BUG_ON(!mutex_is_locked(&ocfs2_control_lock)); | 
|  | 187 |  | 
|  | 188 | list_for_each_entry(c, &ocfs2_live_connection_list, oc_list) { | 
|  | 189 | if ((c->oc_conn->cc_namelen == len) && | 
|  | 190 | !strncmp(c->oc_conn->cc_name, name, len)) | 
|  | 191 | return c; | 
|  | 192 | } | 
|  | 193 |  | 
|  | 194 | return c; | 
|  | 195 | } | 
|  | 196 |  | 
|  | 197 | /* | 
|  | 198 | * ocfs2_live_connection structures are created underneath the ocfs2 | 
|  | 199 | * mount path.  Since the VFS prevents multiple calls to | 
|  | 200 | * fill_super(), we can't get dupes here. | 
|  | 201 | */ | 
|  | 202 | static int ocfs2_live_connection_new(struct ocfs2_cluster_connection *conn, | 
|  | 203 | struct ocfs2_live_connection **c_ret) | 
|  | 204 | { | 
|  | 205 | int rc = 0; | 
|  | 206 | struct ocfs2_live_connection *c; | 
|  | 207 |  | 
|  | 208 | c = kzalloc(sizeof(struct ocfs2_live_connection), GFP_KERNEL); | 
|  | 209 | if (!c) | 
|  | 210 | return -ENOMEM; | 
|  | 211 |  | 
|  | 212 | mutex_lock(&ocfs2_control_lock); | 
|  | 213 | c->oc_conn = conn; | 
|  | 214 |  | 
|  | 215 | if (atomic_read(&ocfs2_control_opened)) | 
|  | 216 | list_add(&c->oc_list, &ocfs2_live_connection_list); | 
|  | 217 | else { | 
|  | 218 | printk(KERN_ERR | 
|  | 219 | "ocfs2: Userspace control daemon is not present\n"); | 
|  | 220 | rc = -ESRCH; | 
|  | 221 | } | 
|  | 222 |  | 
|  | 223 | mutex_unlock(&ocfs2_control_lock); | 
|  | 224 |  | 
|  | 225 | if (!rc) | 
|  | 226 | *c_ret = c; | 
|  | 227 | else | 
|  | 228 | kfree(c); | 
|  | 229 |  | 
|  | 230 | return rc; | 
|  | 231 | } | 
|  | 232 |  | 
|  | 233 | /* | 
|  | 234 | * This function disconnects the cluster connection from ocfs2_control. | 
|  | 235 | * Afterwards, userspace can't affect the cluster connection. | 
|  | 236 | */ | 
|  | 237 | static void ocfs2_live_connection_drop(struct ocfs2_live_connection *c) | 
|  | 238 | { | 
|  | 239 | mutex_lock(&ocfs2_control_lock); | 
|  | 240 | list_del_init(&c->oc_list); | 
|  | 241 | c->oc_conn = NULL; | 
|  | 242 | mutex_unlock(&ocfs2_control_lock); | 
|  | 243 |  | 
|  | 244 | kfree(c); | 
|  | 245 | } | 
|  | 246 |  | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 247 | static int ocfs2_control_cfu(void *target, size_t target_len, | 
|  | 248 | const char __user *buf, size_t count) | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 249 | { | 
|  | 250 | /* The T01 expects write(2) calls to have exactly one command */ | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 251 | if ((count != target_len) || | 
|  | 252 | (count > sizeof(union ocfs2_control_message))) | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 253 | return -EINVAL; | 
|  | 254 |  | 
|  | 255 | if (copy_from_user(target, buf, target_len)) | 
|  | 256 | return -EFAULT; | 
|  | 257 |  | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 258 | return 0; | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 259 | } | 
|  | 260 |  | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 261 | static ssize_t ocfs2_control_validate_protocol(struct file *file, | 
|  | 262 | const char __user *buf, | 
|  | 263 | size_t count) | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 264 | { | 
|  | 265 | ssize_t ret; | 
|  | 266 | char kbuf[OCFS2_CONTROL_PROTO_LEN]; | 
|  | 267 |  | 
|  | 268 | ret = ocfs2_control_cfu(kbuf, OCFS2_CONTROL_PROTO_LEN, | 
|  | 269 | buf, count); | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 270 | if (ret) | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 271 | return ret; | 
|  | 272 |  | 
|  | 273 | if (strncmp(kbuf, OCFS2_CONTROL_PROTO, OCFS2_CONTROL_PROTO_LEN)) | 
|  | 274 | return -EINVAL; | 
|  | 275 |  | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 276 | ocfs2_control_set_handshake_state(file, | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 277 | OCFS2_CONTROL_HANDSHAKE_PROTOCOL); | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 278 |  | 
|  | 279 | return count; | 
|  | 280 | } | 
|  | 281 |  | 
| Joel Becker | de870ef | 2008-02-18 17:07:09 -0800 | [diff] [blame] | 282 | static void ocfs2_control_send_down(const char *uuid, | 
|  | 283 | int nodenum) | 
|  | 284 | { | 
|  | 285 | struct ocfs2_live_connection *c; | 
|  | 286 |  | 
|  | 287 | mutex_lock(&ocfs2_control_lock); | 
|  | 288 |  | 
|  | 289 | c = ocfs2_connection_find(uuid); | 
|  | 290 | if (c) { | 
|  | 291 | BUG_ON(c->oc_conn == NULL); | 
|  | 292 | c->oc_conn->cc_recovery_handler(nodenum, | 
|  | 293 | c->oc_conn->cc_recovery_data); | 
|  | 294 | } | 
|  | 295 |  | 
|  | 296 | mutex_unlock(&ocfs2_control_lock); | 
|  | 297 | } | 
|  | 298 |  | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 299 | /* | 
|  | 300 | * Called whenever configuration elements are sent to /dev/ocfs2_control. | 
|  | 301 | * If all configuration elements are present, try to set the global | 
| Joel Becker | d4b95ee | 2008-02-20 15:39:44 -0800 | [diff] [blame] | 302 | * values.  If there is a problem, return an error.  Skip any missing | 
|  | 303 | * elements, and only bump ocfs2_control_opened when we have all elements | 
|  | 304 | * and are successful. | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 305 | */ | 
|  | 306 | static int ocfs2_control_install_private(struct file *file) | 
| Joel Becker | de870ef | 2008-02-18 17:07:09 -0800 | [diff] [blame] | 307 | { | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 308 | int rc = 0; | 
|  | 309 | int set_p = 1; | 
|  | 310 | struct ocfs2_control_private *p = file->private_data; | 
|  | 311 |  | 
|  | 312 | BUG_ON(p->op_state != OCFS2_CONTROL_HANDSHAKE_PROTOCOL); | 
|  | 313 |  | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 314 | mutex_lock(&ocfs2_control_lock); | 
| Joel Becker | d4b95ee | 2008-02-20 15:39:44 -0800 | [diff] [blame] | 315 |  | 
|  | 316 | if (p->op_this_node < 0) { | 
|  | 317 | set_p = 0; | 
|  | 318 | } else if ((ocfs2_control_this_node >= 0) && | 
|  | 319 | (ocfs2_control_this_node != p->op_this_node)) { | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 320 | rc = -EINVAL; | 
| Joel Becker | d4b95ee | 2008-02-20 15:39:44 -0800 | [diff] [blame] | 321 | goto out_unlock; | 
|  | 322 | } | 
|  | 323 |  | 
|  | 324 | if (!p->op_proto.pv_major) { | 
|  | 325 | set_p = 0; | 
|  | 326 | } else if (!list_empty(&ocfs2_live_connection_list) && | 
|  | 327 | ((running_proto.pv_major != p->op_proto.pv_major) || | 
|  | 328 | (running_proto.pv_minor != p->op_proto.pv_minor))) { | 
|  | 329 | rc = -EINVAL; | 
|  | 330 | goto out_unlock; | 
|  | 331 | } | 
|  | 332 |  | 
|  | 333 | if (set_p) { | 
|  | 334 | ocfs2_control_this_node = p->op_this_node; | 
|  | 335 | running_proto.pv_major = p->op_proto.pv_major; | 
|  | 336 | running_proto.pv_minor = p->op_proto.pv_minor; | 
|  | 337 | } | 
|  | 338 |  | 
|  | 339 | out_unlock: | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 340 | mutex_unlock(&ocfs2_control_lock); | 
|  | 341 |  | 
|  | 342 | if (!rc && set_p) { | 
|  | 343 | /* We set the global values successfully */ | 
|  | 344 | atomic_inc(&ocfs2_control_opened); | 
|  | 345 | ocfs2_control_set_handshake_state(file, | 
|  | 346 | OCFS2_CONTROL_HANDSHAKE_VALID); | 
|  | 347 | } | 
|  | 348 |  | 
|  | 349 | return rc; | 
|  | 350 | } | 
|  | 351 |  | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 352 | static int ocfs2_control_get_this_node(void) | 
|  | 353 | { | 
|  | 354 | int rc; | 
|  | 355 |  | 
|  | 356 | mutex_lock(&ocfs2_control_lock); | 
|  | 357 | if (ocfs2_control_this_node < 0) | 
|  | 358 | rc = -EINVAL; | 
|  | 359 | else | 
|  | 360 | rc = ocfs2_control_this_node; | 
|  | 361 | mutex_unlock(&ocfs2_control_lock); | 
|  | 362 |  | 
|  | 363 | return rc; | 
|  | 364 | } | 
|  | 365 |  | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 366 | static int ocfs2_control_do_setnode_msg(struct file *file, | 
|  | 367 | struct ocfs2_control_message_setn *msg) | 
|  | 368 | { | 
| Joel Becker | de870ef | 2008-02-18 17:07:09 -0800 | [diff] [blame] | 369 | long nodenum; | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 370 | char *ptr = NULL; | 
|  | 371 | struct ocfs2_control_private *p = file->private_data; | 
| Joel Becker | de870ef | 2008-02-18 17:07:09 -0800 | [diff] [blame] | 372 |  | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 373 | if (ocfs2_control_get_handshake_state(file) != | 
|  | 374 | OCFS2_CONTROL_HANDSHAKE_PROTOCOL) | 
| Joel Becker | de870ef | 2008-02-18 17:07:09 -0800 | [diff] [blame] | 375 | return -EINVAL; | 
|  | 376 |  | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 377 | if (strncmp(msg->tag, OCFS2_CONTROL_MESSAGE_SETNODE_OP, | 
|  | 378 | OCFS2_CONTROL_MESSAGE_OP_LEN)) | 
| Joel Becker | de870ef | 2008-02-18 17:07:09 -0800 | [diff] [blame] | 379 | return -EINVAL; | 
| Joel Becker | de870ef | 2008-02-18 17:07:09 -0800 | [diff] [blame] | 380 |  | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 381 | if ((msg->space != ' ') || (msg->newline != '\n')) | 
|  | 382 | return -EINVAL; | 
|  | 383 | msg->space = msg->newline = '\0'; | 
|  | 384 |  | 
|  | 385 | nodenum = simple_strtol(msg->nodestr, &ptr, 16); | 
|  | 386 | if (!ptr || *ptr) | 
|  | 387 | return -EINVAL; | 
|  | 388 |  | 
|  | 389 | if ((nodenum == LONG_MIN) || (nodenum == LONG_MAX) || | 
|  | 390 | (nodenum > INT_MAX) || (nodenum < 0)) | 
|  | 391 | return -ERANGE; | 
|  | 392 | p->op_this_node = nodenum; | 
|  | 393 |  | 
|  | 394 | return ocfs2_control_install_private(file); | 
|  | 395 | } | 
|  | 396 |  | 
| Joel Becker | d4b95ee | 2008-02-20 15:39:44 -0800 | [diff] [blame] | 397 | static int ocfs2_control_do_setversion_msg(struct file *file, | 
|  | 398 | struct ocfs2_control_message_setv *msg) | 
|  | 399 | { | 
|  | 400 | long major, minor; | 
|  | 401 | char *ptr = NULL; | 
|  | 402 | struct ocfs2_control_private *p = file->private_data; | 
|  | 403 | struct ocfs2_protocol_version *max = | 
| Joel Becker | e603cfb | 2010-01-29 16:06:29 -0800 | [diff] [blame] | 404 | &ocfs2_user_plugin.sp_max_proto; | 
| Joel Becker | d4b95ee | 2008-02-20 15:39:44 -0800 | [diff] [blame] | 405 |  | 
|  | 406 | if (ocfs2_control_get_handshake_state(file) != | 
|  | 407 | OCFS2_CONTROL_HANDSHAKE_PROTOCOL) | 
|  | 408 | return -EINVAL; | 
|  | 409 |  | 
|  | 410 | if (strncmp(msg->tag, OCFS2_CONTROL_MESSAGE_SETVERSION_OP, | 
|  | 411 | OCFS2_CONTROL_MESSAGE_OP_LEN)) | 
|  | 412 | return -EINVAL; | 
|  | 413 |  | 
|  | 414 | if ((msg->space1 != ' ') || (msg->space2 != ' ') || | 
|  | 415 | (msg->newline != '\n')) | 
|  | 416 | return -EINVAL; | 
|  | 417 | msg->space1 = msg->space2 = msg->newline = '\0'; | 
|  | 418 |  | 
|  | 419 | major = simple_strtol(msg->major, &ptr, 16); | 
|  | 420 | if (!ptr || *ptr) | 
|  | 421 | return -EINVAL; | 
|  | 422 | minor = simple_strtol(msg->minor, &ptr, 16); | 
|  | 423 | if (!ptr || *ptr) | 
|  | 424 | return -EINVAL; | 
|  | 425 |  | 
|  | 426 | /* | 
|  | 427 | * The major must be between 1 and 255, inclusive.  The minor | 
|  | 428 | * must be between 0 and 255, inclusive.  The version passed in | 
|  | 429 | * must be within the maximum version supported by the filesystem. | 
|  | 430 | */ | 
|  | 431 | if ((major == LONG_MIN) || (major == LONG_MAX) || | 
|  | 432 | (major > (u8)-1) || (major < 1)) | 
|  | 433 | return -ERANGE; | 
|  | 434 | if ((minor == LONG_MIN) || (minor == LONG_MAX) || | 
|  | 435 | (minor > (u8)-1) || (minor < 0)) | 
|  | 436 | return -ERANGE; | 
|  | 437 | if ((major != max->pv_major) || | 
|  | 438 | (minor > max->pv_minor)) | 
|  | 439 | return -EINVAL; | 
|  | 440 |  | 
|  | 441 | p->op_proto.pv_major = major; | 
|  | 442 | p->op_proto.pv_minor = minor; | 
|  | 443 |  | 
|  | 444 | return ocfs2_control_install_private(file); | 
|  | 445 | } | 
|  | 446 |  | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 447 | static int ocfs2_control_do_down_msg(struct file *file, | 
|  | 448 | struct ocfs2_control_message_down *msg) | 
|  | 449 | { | 
|  | 450 | long nodenum; | 
|  | 451 | char *p = NULL; | 
|  | 452 |  | 
|  | 453 | if (ocfs2_control_get_handshake_state(file) != | 
|  | 454 | OCFS2_CONTROL_HANDSHAKE_VALID) | 
|  | 455 | return -EINVAL; | 
|  | 456 |  | 
|  | 457 | if (strncmp(msg->tag, OCFS2_CONTROL_MESSAGE_DOWN_OP, | 
|  | 458 | OCFS2_CONTROL_MESSAGE_OP_LEN)) | 
|  | 459 | return -EINVAL; | 
|  | 460 |  | 
|  | 461 | if ((msg->space1 != ' ') || (msg->space2 != ' ') || | 
|  | 462 | (msg->newline != '\n')) | 
|  | 463 | return -EINVAL; | 
|  | 464 | msg->space1 = msg->space2 = msg->newline = '\0'; | 
|  | 465 |  | 
|  | 466 | nodenum = simple_strtol(msg->nodestr, &p, 16); | 
| Joel Becker | de870ef | 2008-02-18 17:07:09 -0800 | [diff] [blame] | 467 | if (!p || *p) | 
|  | 468 | return -EINVAL; | 
|  | 469 |  | 
|  | 470 | if ((nodenum == LONG_MIN) || (nodenum == LONG_MAX) || | 
|  | 471 | (nodenum > INT_MAX) || (nodenum < 0)) | 
|  | 472 | return -ERANGE; | 
|  | 473 |  | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 474 | ocfs2_control_send_down(msg->uuid, nodenum); | 
| Joel Becker | de870ef | 2008-02-18 17:07:09 -0800 | [diff] [blame] | 475 |  | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 476 | return 0; | 
|  | 477 | } | 
|  | 478 |  | 
|  | 479 | static ssize_t ocfs2_control_message(struct file *file, | 
|  | 480 | const char __user *buf, | 
|  | 481 | size_t count) | 
|  | 482 | { | 
|  | 483 | ssize_t ret; | 
|  | 484 | union ocfs2_control_message msg; | 
|  | 485 |  | 
|  | 486 | /* Try to catch padding issues */ | 
|  | 487 | WARN_ON(offsetof(struct ocfs2_control_message_down, uuid) != | 
|  | 488 | (sizeof(msg.u_down.tag) + sizeof(msg.u_down.space1))); | 
|  | 489 |  | 
|  | 490 | memset(&msg, 0, sizeof(union ocfs2_control_message)); | 
|  | 491 | ret = ocfs2_control_cfu(&msg, count, buf, count); | 
|  | 492 | if (ret) | 
|  | 493 | goto out; | 
|  | 494 |  | 
|  | 495 | if ((count == OCFS2_CONTROL_MESSAGE_SETNODE_TOTAL_LEN) && | 
|  | 496 | !strncmp(msg.tag, OCFS2_CONTROL_MESSAGE_SETNODE_OP, | 
|  | 497 | OCFS2_CONTROL_MESSAGE_OP_LEN)) | 
|  | 498 | ret = ocfs2_control_do_setnode_msg(file, &msg.u_setn); | 
| Joel Becker | d4b95ee | 2008-02-20 15:39:44 -0800 | [diff] [blame] | 499 | else if ((count == OCFS2_CONTROL_MESSAGE_SETVERSION_TOTAL_LEN) && | 
|  | 500 | !strncmp(msg.tag, OCFS2_CONTROL_MESSAGE_SETVERSION_OP, | 
|  | 501 | OCFS2_CONTROL_MESSAGE_OP_LEN)) | 
|  | 502 | ret = ocfs2_control_do_setversion_msg(file, &msg.u_setv); | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 503 | else if ((count == OCFS2_CONTROL_MESSAGE_DOWN_TOTAL_LEN) && | 
|  | 504 | !strncmp(msg.tag, OCFS2_CONTROL_MESSAGE_DOWN_OP, | 
|  | 505 | OCFS2_CONTROL_MESSAGE_OP_LEN)) | 
|  | 506 | ret = ocfs2_control_do_down_msg(file, &msg.u_down); | 
|  | 507 | else | 
|  | 508 | ret = -EINVAL; | 
|  | 509 |  | 
|  | 510 | out: | 
|  | 511 | return ret ? ret : count; | 
| Joel Becker | de870ef | 2008-02-18 17:07:09 -0800 | [diff] [blame] | 512 | } | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 513 |  | 
|  | 514 | static ssize_t ocfs2_control_write(struct file *file, | 
|  | 515 | const char __user *buf, | 
|  | 516 | size_t count, | 
|  | 517 | loff_t *ppos) | 
| Joel Becker | 8adf053 | 2007-11-28 14:38:40 -0800 | [diff] [blame] | 518 | { | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 519 | ssize_t ret; | 
|  | 520 |  | 
|  | 521 | switch (ocfs2_control_get_handshake_state(file)) { | 
|  | 522 | case OCFS2_CONTROL_HANDSHAKE_INVALID: | 
|  | 523 | ret = -EINVAL; | 
|  | 524 | break; | 
|  | 525 |  | 
|  | 526 | case OCFS2_CONTROL_HANDSHAKE_READ: | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 527 | ret = ocfs2_control_validate_protocol(file, buf, | 
|  | 528 | count); | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 529 | break; | 
|  | 530 |  | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 531 | case OCFS2_CONTROL_HANDSHAKE_PROTOCOL: | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 532 | case OCFS2_CONTROL_HANDSHAKE_VALID: | 
| Joel Becker | de870ef | 2008-02-18 17:07:09 -0800 | [diff] [blame] | 533 | ret = ocfs2_control_message(file, buf, count); | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 534 | break; | 
|  | 535 |  | 
|  | 536 | default: | 
|  | 537 | BUG(); | 
|  | 538 | ret = -EIO; | 
|  | 539 | break; | 
|  | 540 | } | 
|  | 541 |  | 
|  | 542 | return ret; | 
| Joel Becker | 8adf053 | 2007-11-28 14:38:40 -0800 | [diff] [blame] | 543 | } | 
|  | 544 |  | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 545 | /* | 
|  | 546 | * This is a naive version.  If we ever have a new protocol, we'll expand | 
|  | 547 | * it.  Probably using seq_file. | 
|  | 548 | */ | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 549 | static ssize_t ocfs2_control_read(struct file *file, | 
|  | 550 | char __user *buf, | 
|  | 551 | size_t count, | 
|  | 552 | loff_t *ppos) | 
|  | 553 | { | 
| Akinobu Mita | 7600c72 | 2008-06-09 16:34:23 -0700 | [diff] [blame] | 554 | ssize_t ret; | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 555 |  | 
| Akinobu Mita | 7600c72 | 2008-06-09 16:34:23 -0700 | [diff] [blame] | 556 | ret = simple_read_from_buffer(buf, count, ppos, | 
|  | 557 | OCFS2_CONTROL_PROTO, OCFS2_CONTROL_PROTO_LEN); | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 558 |  | 
|  | 559 | /* Have we read the whole protocol list? */ | 
| Akinobu Mita | 7600c72 | 2008-06-09 16:34:23 -0700 | [diff] [blame] | 560 | if (ret > 0 && *ppos >= OCFS2_CONTROL_PROTO_LEN) | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 561 | ocfs2_control_set_handshake_state(file, | 
|  | 562 | OCFS2_CONTROL_HANDSHAKE_READ); | 
|  | 563 |  | 
| Akinobu Mita | 7600c72 | 2008-06-09 16:34:23 -0700 | [diff] [blame] | 564 | return ret; | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 565 | } | 
|  | 566 |  | 
|  | 567 | static int ocfs2_control_release(struct inode *inode, struct file *file) | 
|  | 568 | { | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 569 | struct ocfs2_control_private *p = file->private_data; | 
|  | 570 |  | 
|  | 571 | mutex_lock(&ocfs2_control_lock); | 
|  | 572 |  | 
|  | 573 | if (ocfs2_control_get_handshake_state(file) != | 
|  | 574 | OCFS2_CONTROL_HANDSHAKE_VALID) | 
|  | 575 | goto out; | 
|  | 576 |  | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 577 | if (atomic_dec_and_test(&ocfs2_control_opened)) { | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 578 | if (!list_empty(&ocfs2_live_connection_list)) { | 
|  | 579 | /* XXX: Do bad things! */ | 
|  | 580 | printk(KERN_ERR | 
|  | 581 | "ocfs2: Unexpected release of ocfs2_control!\n" | 
|  | 582 | "       Loss of cluster connection requires " | 
|  | 583 | "an emergency restart!\n"); | 
|  | 584 | emergency_restart(); | 
|  | 585 | } | 
| Joel Becker | d4b95ee | 2008-02-20 15:39:44 -0800 | [diff] [blame] | 586 | /* | 
|  | 587 | * Last valid close clears the node number and resets | 
|  | 588 | * the locking protocol version | 
|  | 589 | */ | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 590 | ocfs2_control_this_node = -1; | 
| Joel Becker | d4b95ee | 2008-02-20 15:39:44 -0800 | [diff] [blame] | 591 | running_proto.pv_major = 0; | 
|  | 592 | running_proto.pv_major = 0; | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 593 | } | 
|  | 594 |  | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 595 | out: | 
|  | 596 | list_del_init(&p->op_list); | 
|  | 597 | file->private_data = NULL; | 
|  | 598 |  | 
|  | 599 | mutex_unlock(&ocfs2_control_lock); | 
|  | 600 |  | 
|  | 601 | kfree(p); | 
|  | 602 |  | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 603 | return 0; | 
|  | 604 | } | 
|  | 605 |  | 
|  | 606 | static int ocfs2_control_open(struct inode *inode, struct file *file) | 
|  | 607 | { | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 608 | struct ocfs2_control_private *p; | 
|  | 609 |  | 
|  | 610 | p = kzalloc(sizeof(struct ocfs2_control_private), GFP_KERNEL); | 
|  | 611 | if (!p) | 
|  | 612 | return -ENOMEM; | 
| Joel Becker | 3cfd4ab | 2008-02-20 14:44:34 -0800 | [diff] [blame] | 613 | p->op_this_node = -1; | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 614 |  | 
| Arnd Bergmann | b7fdf9f | 2008-05-20 19:16:28 +0200 | [diff] [blame] | 615 | lock_kernel(); | 
| Joel Becker | 462c7e6 | 2008-02-18 19:40:12 -0800 | [diff] [blame] | 616 | mutex_lock(&ocfs2_control_lock); | 
|  | 617 | file->private_data = p; | 
|  | 618 | list_add(&p->op_list, &ocfs2_control_private_list); | 
|  | 619 | mutex_unlock(&ocfs2_control_lock); | 
| Arnd Bergmann | b7fdf9f | 2008-05-20 19:16:28 +0200 | [diff] [blame] | 620 | unlock_kernel(); | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 621 |  | 
|  | 622 | return 0; | 
|  | 623 | } | 
|  | 624 |  | 
|  | 625 | static const struct file_operations ocfs2_control_fops = { | 
|  | 626 | .open    = ocfs2_control_open, | 
|  | 627 | .release = ocfs2_control_release, | 
|  | 628 | .read    = ocfs2_control_read, | 
|  | 629 | .write   = ocfs2_control_write, | 
|  | 630 | .owner   = THIS_MODULE, | 
|  | 631 | }; | 
|  | 632 |  | 
| Adrian Bunk | 4d8755b | 2008-04-21 11:49:26 +0300 | [diff] [blame] | 633 | static struct miscdevice ocfs2_control_device = { | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 634 | .minor		= MISC_DYNAMIC_MINOR, | 
|  | 635 | .name		= "ocfs2_control", | 
|  | 636 | .fops		= &ocfs2_control_fops, | 
|  | 637 | }; | 
|  | 638 |  | 
|  | 639 | static int ocfs2_control_init(void) | 
|  | 640 | { | 
|  | 641 | int rc; | 
|  | 642 |  | 
|  | 643 | atomic_set(&ocfs2_control_opened, 0); | 
|  | 644 |  | 
|  | 645 | rc = misc_register(&ocfs2_control_device); | 
|  | 646 | if (rc) | 
|  | 647 | printk(KERN_ERR | 
|  | 648 | "ocfs2: Unable to register ocfs2_control device " | 
|  | 649 | "(errno %d)\n", | 
|  | 650 | -rc); | 
|  | 651 |  | 
|  | 652 | return rc; | 
|  | 653 | } | 
|  | 654 |  | 
|  | 655 | static void ocfs2_control_exit(void) | 
|  | 656 | { | 
|  | 657 | int rc; | 
|  | 658 |  | 
|  | 659 | rc = misc_deregister(&ocfs2_control_device); | 
|  | 660 | if (rc) | 
|  | 661 | printk(KERN_ERR | 
|  | 662 | "ocfs2: Unable to deregister ocfs2_control device " | 
|  | 663 | "(errno %d)\n", | 
|  | 664 | -rc); | 
|  | 665 | } | 
|  | 666 |  | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 667 | static void fsdlm_lock_ast_wrapper(void *astarg) | 
|  | 668 | { | 
| Joel Becker | c0e4133 | 2010-01-29 14:46:44 -0800 | [diff] [blame] | 669 | struct ocfs2_dlm_lksb *lksb = astarg; | 
| Joel Becker | a796d28 | 2010-01-28 19:22:39 -0800 | [diff] [blame] | 670 | int status = lksb->lksb_fsdlm.sb_status; | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 671 |  | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 672 | /* | 
|  | 673 | * For now we're punting on the issue of other non-standard errors | 
|  | 674 | * where we can't tell if the unlock_ast or lock_ast should be called. | 
|  | 675 | * The main "other error" that's possible is EINVAL which means the | 
|  | 676 | * function was called with invalid args, which shouldn't be possible | 
|  | 677 | * since the caller here is under our control.  Other non-standard | 
|  | 678 | * errors probably fall into the same category, or otherwise are fatal | 
|  | 679 | * which means we can't carry on anyway. | 
|  | 680 | */ | 
|  | 681 |  | 
|  | 682 | if (status == -DLM_EUNLOCK || status == -DLM_ECANCEL) | 
| Joel Becker | 110946c | 2010-01-29 15:46:23 -0800 | [diff] [blame] | 683 | lksb->lksb_conn->cc_proto->lp_unlock_ast(lksb, 0); | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 684 | else | 
| Joel Becker | 110946c | 2010-01-29 15:46:23 -0800 | [diff] [blame] | 685 | lksb->lksb_conn->cc_proto->lp_lock_ast(lksb); | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 686 | } | 
|  | 687 |  | 
|  | 688 | static void fsdlm_blocking_ast_wrapper(void *astarg, int level) | 
|  | 689 | { | 
| Joel Becker | c0e4133 | 2010-01-29 14:46:44 -0800 | [diff] [blame] | 690 | struct ocfs2_dlm_lksb *lksb = astarg; | 
| Joel Becker | a796d28 | 2010-01-28 19:22:39 -0800 | [diff] [blame] | 691 |  | 
| Joel Becker | 110946c | 2010-01-29 15:46:23 -0800 | [diff] [blame] | 692 | lksb->lksb_conn->cc_proto->lp_blocking_ast(lksb, level); | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 693 | } | 
|  | 694 |  | 
|  | 695 | static int user_dlm_lock(struct ocfs2_cluster_connection *conn, | 
|  | 696 | int mode, | 
| Joel Becker | c0e4133 | 2010-01-29 14:46:44 -0800 | [diff] [blame] | 697 | struct ocfs2_dlm_lksb *lksb, | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 698 | u32 flags, | 
|  | 699 | void *name, | 
| Joel Becker | a796d28 | 2010-01-28 19:22:39 -0800 | [diff] [blame] | 700 | unsigned int namelen) | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 701 | { | 
|  | 702 | int ret; | 
|  | 703 |  | 
|  | 704 | if (!lksb->lksb_fsdlm.sb_lvbptr) | 
|  | 705 | lksb->lksb_fsdlm.sb_lvbptr = (char *)lksb + | 
|  | 706 | sizeof(struct dlm_lksb); | 
|  | 707 |  | 
|  | 708 | ret = dlm_lock(conn->cc_lockspace, mode, &lksb->lksb_fsdlm, | 
|  | 709 | flags|DLM_LKF_NODLCKWT, name, namelen, 0, | 
| Joel Becker | a796d28 | 2010-01-28 19:22:39 -0800 | [diff] [blame] | 710 | fsdlm_lock_ast_wrapper, lksb, | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 711 | fsdlm_blocking_ast_wrapper); | 
|  | 712 | return ret; | 
|  | 713 | } | 
|  | 714 |  | 
|  | 715 | static int user_dlm_unlock(struct ocfs2_cluster_connection *conn, | 
| Joel Becker | c0e4133 | 2010-01-29 14:46:44 -0800 | [diff] [blame] | 716 | struct ocfs2_dlm_lksb *lksb, | 
| Joel Becker | a796d28 | 2010-01-28 19:22:39 -0800 | [diff] [blame] | 717 | u32 flags) | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 718 | { | 
|  | 719 | int ret; | 
|  | 720 |  | 
|  | 721 | ret = dlm_unlock(conn->cc_lockspace, lksb->lksb_fsdlm.sb_lkid, | 
| Joel Becker | a796d28 | 2010-01-28 19:22:39 -0800 | [diff] [blame] | 722 | flags, &lksb->lksb_fsdlm, lksb); | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 723 | return ret; | 
|  | 724 | } | 
|  | 725 |  | 
| Joel Becker | c0e4133 | 2010-01-29 14:46:44 -0800 | [diff] [blame] | 726 | static int user_dlm_lock_status(struct ocfs2_dlm_lksb *lksb) | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 727 | { | 
|  | 728 | return lksb->lksb_fsdlm.sb_status; | 
|  | 729 | } | 
|  | 730 |  | 
| Joel Becker | c0e4133 | 2010-01-29 14:46:44 -0800 | [diff] [blame] | 731 | static int user_dlm_lvb_valid(struct ocfs2_dlm_lksb *lksb) | 
| Joel Becker | 1c520df | 2009-06-19 15:14:13 -0700 | [diff] [blame] | 732 | { | 
|  | 733 | int invalid = lksb->lksb_fsdlm.sb_flags & DLM_SBF_VALNOTVALID; | 
|  | 734 |  | 
|  | 735 | return !invalid; | 
|  | 736 | } | 
|  | 737 |  | 
| Joel Becker | c0e4133 | 2010-01-29 14:46:44 -0800 | [diff] [blame] | 738 | static void *user_dlm_lvb(struct ocfs2_dlm_lksb *lksb) | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 739 | { | 
| David Teigland | 66f502a | 2008-11-10 16:24:57 -0600 | [diff] [blame] | 740 | if (!lksb->lksb_fsdlm.sb_lvbptr) | 
|  | 741 | lksb->lksb_fsdlm.sb_lvbptr = (char *)lksb + | 
|  | 742 | sizeof(struct dlm_lksb); | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 743 | return (void *)(lksb->lksb_fsdlm.sb_lvbptr); | 
|  | 744 | } | 
|  | 745 |  | 
| Joel Becker | c0e4133 | 2010-01-29 14:46:44 -0800 | [diff] [blame] | 746 | static void user_dlm_dump_lksb(struct ocfs2_dlm_lksb *lksb) | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 747 | { | 
|  | 748 | } | 
|  | 749 |  | 
| Mark Fasheh | 53da493 | 2008-07-21 14:29:16 -0700 | [diff] [blame] | 750 | static int user_plock(struct ocfs2_cluster_connection *conn, | 
|  | 751 | u64 ino, | 
|  | 752 | struct file *file, | 
|  | 753 | int cmd, | 
|  | 754 | struct file_lock *fl) | 
|  | 755 | { | 
|  | 756 | /* | 
|  | 757 | * This more or less just demuxes the plock request into any | 
|  | 758 | * one of three dlm calls. | 
|  | 759 | * | 
|  | 760 | * Internally, fs/dlm will pass these to a misc device, which | 
|  | 761 | * a userspace daemon will read and write to. | 
|  | 762 | * | 
|  | 763 | * For now, cancel requests (which happen internally only), | 
|  | 764 | * are turned into unlocks. Most of this function taken from | 
|  | 765 | * gfs2_lock. | 
|  | 766 | */ | 
|  | 767 |  | 
|  | 768 | if (cmd == F_CANCELLK) { | 
|  | 769 | cmd = F_SETLK; | 
|  | 770 | fl->fl_type = F_UNLCK; | 
|  | 771 | } | 
|  | 772 |  | 
|  | 773 | if (IS_GETLK(cmd)) | 
|  | 774 | return dlm_posix_get(conn->cc_lockspace, ino, file, fl); | 
|  | 775 | else if (fl->fl_type == F_UNLCK) | 
|  | 776 | return dlm_posix_unlock(conn->cc_lockspace, ino, file, fl); | 
|  | 777 | else | 
|  | 778 | return dlm_posix_lock(conn->cc_lockspace, ino, file, cmd, fl); | 
|  | 779 | } | 
|  | 780 |  | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 781 | /* | 
|  | 782 | * Compare a requested locking protocol version against the current one. | 
|  | 783 | * | 
|  | 784 | * If the major numbers are different, they are incompatible. | 
|  | 785 | * If the current minor is greater than the request, they are incompatible. | 
|  | 786 | * If the current minor is less than or equal to the request, they are | 
|  | 787 | * compatible, and the requester should run at the current minor version. | 
|  | 788 | */ | 
|  | 789 | static int fs_protocol_compare(struct ocfs2_protocol_version *existing, | 
|  | 790 | struct ocfs2_protocol_version *request) | 
|  | 791 | { | 
|  | 792 | if (existing->pv_major != request->pv_major) | 
|  | 793 | return 1; | 
|  | 794 |  | 
|  | 795 | if (existing->pv_minor > request->pv_minor) | 
|  | 796 | return 1; | 
|  | 797 |  | 
|  | 798 | if (existing->pv_minor < request->pv_minor) | 
|  | 799 | request->pv_minor = existing->pv_minor; | 
|  | 800 |  | 
|  | 801 | return 0; | 
|  | 802 | } | 
|  | 803 |  | 
|  | 804 | static int user_cluster_connect(struct ocfs2_cluster_connection *conn) | 
|  | 805 | { | 
|  | 806 | dlm_lockspace_t *fsdlm; | 
| Coly Li | 3a05d79 | 2009-12-04 02:02:35 +0800 | [diff] [blame] | 807 | struct ocfs2_live_connection *uninitialized_var(control); | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 808 | int rc = 0; | 
|  | 809 |  | 
|  | 810 | BUG_ON(conn == NULL); | 
|  | 811 |  | 
|  | 812 | rc = ocfs2_live_connection_new(conn, &control); | 
|  | 813 | if (rc) | 
|  | 814 | goto out; | 
|  | 815 |  | 
|  | 816 | /* | 
|  | 817 | * running_proto must have been set before we allowed any mounts | 
|  | 818 | * to proceed. | 
|  | 819 | */ | 
|  | 820 | if (fs_protocol_compare(&running_proto, &conn->cc_version)) { | 
|  | 821 | printk(KERN_ERR | 
|  | 822 | "Unable to mount with fs locking protocol version " | 
|  | 823 | "%u.%u because the userspace control daemon has " | 
|  | 824 | "negotiated %u.%u\n", | 
|  | 825 | conn->cc_version.pv_major, conn->cc_version.pv_minor, | 
|  | 826 | running_proto.pv_major, running_proto.pv_minor); | 
|  | 827 | rc = -EPROTO; | 
|  | 828 | ocfs2_live_connection_drop(control); | 
|  | 829 | goto out; | 
|  | 830 | } | 
|  | 831 |  | 
|  | 832 | rc = dlm_new_lockspace(conn->cc_name, strlen(conn->cc_name), | 
|  | 833 | &fsdlm, DLM_LSFL_FS, DLM_LVB_LEN); | 
|  | 834 | if (rc) { | 
|  | 835 | ocfs2_live_connection_drop(control); | 
|  | 836 | goto out; | 
|  | 837 | } | 
|  | 838 |  | 
|  | 839 | conn->cc_private = control; | 
|  | 840 | conn->cc_lockspace = fsdlm; | 
|  | 841 | out: | 
|  | 842 | return rc; | 
|  | 843 | } | 
|  | 844 |  | 
| Joel Becker | 2c39450 | 2008-05-30 15:58:26 -0700 | [diff] [blame] | 845 | static int user_cluster_disconnect(struct ocfs2_cluster_connection *conn) | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 846 | { | 
|  | 847 | dlm_release_lockspace(conn->cc_lockspace, 2); | 
|  | 848 | conn->cc_lockspace = NULL; | 
|  | 849 | ocfs2_live_connection_drop(conn->cc_private); | 
|  | 850 | conn->cc_private = NULL; | 
|  | 851 | return 0; | 
|  | 852 | } | 
|  | 853 |  | 
|  | 854 | static int user_cluster_this_node(unsigned int *this_node) | 
|  | 855 | { | 
|  | 856 | int rc; | 
|  | 857 |  | 
|  | 858 | rc = ocfs2_control_get_this_node(); | 
|  | 859 | if (rc < 0) | 
|  | 860 | return rc; | 
|  | 861 |  | 
|  | 862 | *this_node = rc; | 
|  | 863 | return 0; | 
|  | 864 | } | 
|  | 865 |  | 
| Joel Becker | a12630b | 2008-05-09 18:49:29 -0700 | [diff] [blame] | 866 | static struct ocfs2_stack_operations ocfs2_user_plugin_ops = { | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 867 | .connect	= user_cluster_connect, | 
|  | 868 | .disconnect	= user_cluster_disconnect, | 
|  | 869 | .this_node	= user_cluster_this_node, | 
|  | 870 | .dlm_lock	= user_dlm_lock, | 
|  | 871 | .dlm_unlock	= user_dlm_unlock, | 
|  | 872 | .lock_status	= user_dlm_lock_status, | 
| Joel Becker | 1c520df | 2009-06-19 15:14:13 -0700 | [diff] [blame] | 873 | .lvb_valid	= user_dlm_lvb_valid, | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 874 | .lock_lvb	= user_dlm_lvb, | 
| Mark Fasheh | 53da493 | 2008-07-21 14:29:16 -0700 | [diff] [blame] | 875 | .plock		= user_plock, | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 876 | .dump_lksb	= user_dlm_dump_lksb, | 
|  | 877 | }; | 
|  | 878 |  | 
| Joel Becker | a12630b | 2008-05-09 18:49:29 -0700 | [diff] [blame] | 879 | static struct ocfs2_stack_plugin ocfs2_user_plugin = { | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 880 | .sp_name	= "user", | 
| Joel Becker | a12630b | 2008-05-09 18:49:29 -0700 | [diff] [blame] | 881 | .sp_ops		= &ocfs2_user_plugin_ops, | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 882 | .sp_owner	= THIS_MODULE, | 
|  | 883 | }; | 
|  | 884 |  | 
|  | 885 |  | 
| Joel Becker | a12630b | 2008-05-09 18:49:29 -0700 | [diff] [blame] | 886 | static int __init ocfs2_user_plugin_init(void) | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 887 | { | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 888 | int rc; | 
|  | 889 |  | 
|  | 890 | rc = ocfs2_control_init(); | 
|  | 891 | if (!rc) { | 
| Joel Becker | a12630b | 2008-05-09 18:49:29 -0700 | [diff] [blame] | 892 | rc = ocfs2_stack_glue_register(&ocfs2_user_plugin); | 
| David Teigland | cf4d8d7 | 2008-02-20 14:29:27 -0800 | [diff] [blame] | 893 | if (rc) | 
|  | 894 | ocfs2_control_exit(); | 
|  | 895 | } | 
|  | 896 |  | 
|  | 897 | return rc; | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 898 | } | 
|  | 899 |  | 
| Joel Becker | a12630b | 2008-05-09 18:49:29 -0700 | [diff] [blame] | 900 | static void __exit ocfs2_user_plugin_exit(void) | 
| Joel Becker | 8adf053 | 2007-11-28 14:38:40 -0800 | [diff] [blame] | 901 | { | 
| Joel Becker | a12630b | 2008-05-09 18:49:29 -0700 | [diff] [blame] | 902 | ocfs2_stack_glue_unregister(&ocfs2_user_plugin); | 
| Joel Becker | 6427a72 | 2008-02-18 19:23:28 -0800 | [diff] [blame] | 903 | ocfs2_control_exit(); | 
| Joel Becker | 8adf053 | 2007-11-28 14:38:40 -0800 | [diff] [blame] | 904 | } | 
|  | 905 |  | 
|  | 906 | MODULE_AUTHOR("Oracle"); | 
|  | 907 | MODULE_DESCRIPTION("ocfs2 driver for userspace cluster stacks"); | 
|  | 908 | MODULE_LICENSE("GPL"); | 
| Joel Becker | a12630b | 2008-05-09 18:49:29 -0700 | [diff] [blame] | 909 | module_init(ocfs2_user_plugin_init); | 
|  | 910 | module_exit(ocfs2_user_plugin_exit); |