ceph_common.c 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773
  1. #include <linux/ceph/ceph_debug.h>
  2. #include <linux/backing-dev.h>
  3. #include <linux/ctype.h>
  4. #include <linux/fs.h>
  5. #include <linux/inet.h>
  6. #include <linux/in6.h>
  7. #include <linux/key.h>
  8. #include <keys/ceph-type.h>
  9. #include <linux/module.h>
  10. #include <linux/mount.h>
  11. #include <linux/nsproxy.h>
  12. #include <linux/parser.h>
  13. #include <linux/sched.h>
  14. #include <linux/seq_file.h>
  15. #include <linux/slab.h>
  16. #include <linux/statfs.h>
  17. #include <linux/string.h>
  18. #include <linux/vmalloc.h>
  19. #include <linux/ceph/ceph_features.h>
  20. #include <linux/ceph/libceph.h>
  21. #include <linux/ceph/debugfs.h>
  22. #include <linux/ceph/decode.h>
  23. #include <linux/ceph/mon_client.h>
  24. #include <linux/ceph/auth.h>
  25. #include "crypto.h"
  26. /*
  27. * Module compatibility interface. For now it doesn't do anything,
  28. * but its existence signals a certain level of functionality.
  29. *
  30. * The data buffer is used to pass information both to and from
  31. * libceph. The return value indicates whether libceph determines
  32. * it is compatible with the caller (from another kernel module),
  33. * given the provided data.
  34. *
  35. * The data pointer can be null.
  36. */
  37. bool libceph_compatible(void *data)
  38. {
  39. return true;
  40. }
  41. EXPORT_SYMBOL(libceph_compatible);
  42. /*
  43. * find filename portion of a path (/foo/bar/baz -> baz)
  44. */
  45. const char *ceph_file_part(const char *s, int len)
  46. {
  47. const char *e = s + len;
  48. while (e != s && *(e-1) != '/')
  49. e--;
  50. return e;
  51. }
  52. EXPORT_SYMBOL(ceph_file_part);
  53. const char *ceph_msg_type_name(int type)
  54. {
  55. switch (type) {
  56. case CEPH_MSG_SHUTDOWN: return "shutdown";
  57. case CEPH_MSG_PING: return "ping";
  58. case CEPH_MSG_AUTH: return "auth";
  59. case CEPH_MSG_AUTH_REPLY: return "auth_reply";
  60. case CEPH_MSG_MON_MAP: return "mon_map";
  61. case CEPH_MSG_MON_GET_MAP: return "mon_get_map";
  62. case CEPH_MSG_MON_SUBSCRIBE: return "mon_subscribe";
  63. case CEPH_MSG_MON_SUBSCRIBE_ACK: return "mon_subscribe_ack";
  64. case CEPH_MSG_STATFS: return "statfs";
  65. case CEPH_MSG_STATFS_REPLY: return "statfs_reply";
  66. case CEPH_MSG_MON_GET_VERSION: return "mon_get_version";
  67. case CEPH_MSG_MON_GET_VERSION_REPLY: return "mon_get_version_reply";
  68. case CEPH_MSG_MDS_MAP: return "mds_map";
  69. case CEPH_MSG_CLIENT_SESSION: return "client_session";
  70. case CEPH_MSG_CLIENT_RECONNECT: return "client_reconnect";
  71. case CEPH_MSG_CLIENT_REQUEST: return "client_request";
  72. case CEPH_MSG_CLIENT_REQUEST_FORWARD: return "client_request_forward";
  73. case CEPH_MSG_CLIENT_REPLY: return "client_reply";
  74. case CEPH_MSG_CLIENT_CAPS: return "client_caps";
  75. case CEPH_MSG_CLIENT_CAPRELEASE: return "client_cap_release";
  76. case CEPH_MSG_CLIENT_SNAP: return "client_snap";
  77. case CEPH_MSG_CLIENT_LEASE: return "client_lease";
  78. case CEPH_MSG_OSD_MAP: return "osd_map";
  79. case CEPH_MSG_OSD_OP: return "osd_op";
  80. case CEPH_MSG_OSD_OPREPLY: return "osd_opreply";
  81. case CEPH_MSG_WATCH_NOTIFY: return "watch_notify";
  82. default: return "unknown";
  83. }
  84. }
  85. EXPORT_SYMBOL(ceph_msg_type_name);
  86. /*
  87. * Initially learn our fsid, or verify an fsid matches.
  88. */
  89. int ceph_check_fsid(struct ceph_client *client, struct ceph_fsid *fsid)
  90. {
  91. if (client->have_fsid) {
  92. if (ceph_fsid_compare(&client->fsid, fsid)) {
  93. pr_err("bad fsid, had %pU got %pU",
  94. &client->fsid, fsid);
  95. return -1;
  96. }
  97. } else {
  98. memcpy(&client->fsid, fsid, sizeof(*fsid));
  99. }
  100. return 0;
  101. }
  102. EXPORT_SYMBOL(ceph_check_fsid);
  103. static int strcmp_null(const char *s1, const char *s2)
  104. {
  105. if (!s1 && !s2)
  106. return 0;
  107. if (s1 && !s2)
  108. return -1;
  109. if (!s1 && s2)
  110. return 1;
  111. return strcmp(s1, s2);
  112. }
  113. int ceph_compare_options(struct ceph_options *new_opt,
  114. struct ceph_client *client)
  115. {
  116. struct ceph_options *opt1 = new_opt;
  117. struct ceph_options *opt2 = client->options;
  118. int ofs = offsetof(struct ceph_options, mon_addr);
  119. int i;
  120. int ret;
  121. /*
  122. * Don't bother comparing options if network namespaces don't
  123. * match.
  124. */
  125. if (!net_eq(current->nsproxy->net_ns, read_pnet(&client->msgr.net)))
  126. return -1;
  127. ret = memcmp(opt1, opt2, ofs);
  128. if (ret)
  129. return ret;
  130. ret = strcmp_null(opt1->name, opt2->name);
  131. if (ret)
  132. return ret;
  133. if (opt1->key && !opt2->key)
  134. return -1;
  135. if (!opt1->key && opt2->key)
  136. return 1;
  137. if (opt1->key && opt2->key) {
  138. if (opt1->key->type != opt2->key->type)
  139. return -1;
  140. if (opt1->key->created.tv_sec != opt2->key->created.tv_sec)
  141. return -1;
  142. if (opt1->key->created.tv_nsec != opt2->key->created.tv_nsec)
  143. return -1;
  144. if (opt1->key->len != opt2->key->len)
  145. return -1;
  146. if (opt1->key->key && !opt2->key->key)
  147. return -1;
  148. if (!opt1->key->key && opt2->key->key)
  149. return 1;
  150. if (opt1->key->key && opt2->key->key) {
  151. ret = memcmp(opt1->key->key, opt2->key->key, opt1->key->len);
  152. if (ret)
  153. return ret;
  154. }
  155. }
  156. /* any matching mon ip implies a match */
  157. for (i = 0; i < opt1->num_mon; i++) {
  158. if (ceph_monmap_contains(client->monc.monmap,
  159. &opt1->mon_addr[i]))
  160. return 0;
  161. }
  162. return -1;
  163. }
  164. EXPORT_SYMBOL(ceph_compare_options);
  165. void *ceph_kvmalloc(size_t size, gfp_t flags)
  166. {
  167. if (size <= (PAGE_SIZE << PAGE_ALLOC_COSTLY_ORDER)) {
  168. void *ptr = kmalloc(size, flags | __GFP_NOWARN);
  169. if (ptr)
  170. return ptr;
  171. }
  172. return __vmalloc(size, flags | __GFP_HIGHMEM, PAGE_KERNEL);
  173. }
  174. static int parse_fsid(const char *str, struct ceph_fsid *fsid)
  175. {
  176. int i = 0;
  177. char tmp[3];
  178. int err = -EINVAL;
  179. int d;
  180. dout("parse_fsid '%s'\n", str);
  181. tmp[2] = 0;
  182. while (*str && i < 16) {
  183. if (ispunct(*str)) {
  184. str++;
  185. continue;
  186. }
  187. if (!isxdigit(str[0]) || !isxdigit(str[1]))
  188. break;
  189. tmp[0] = str[0];
  190. tmp[1] = str[1];
  191. if (sscanf(tmp, "%x", &d) < 1)
  192. break;
  193. fsid->fsid[i] = d & 0xff;
  194. i++;
  195. str += 2;
  196. }
  197. if (i == 16)
  198. err = 0;
  199. dout("parse_fsid ret %d got fsid %pU", err, fsid);
  200. return err;
  201. }
  202. /*
  203. * ceph options
  204. */
  205. enum {
  206. Opt_osdtimeout,
  207. Opt_osdkeepalivetimeout,
  208. Opt_mount_timeout,
  209. Opt_osd_idle_ttl,
  210. Opt_last_int,
  211. /* int args above */
  212. Opt_fsid,
  213. Opt_name,
  214. Opt_secret,
  215. Opt_key,
  216. Opt_ip,
  217. Opt_last_string,
  218. /* string args above */
  219. Opt_share,
  220. Opt_noshare,
  221. Opt_crc,
  222. Opt_nocrc,
  223. Opt_cephx_require_signatures,
  224. Opt_nocephx_require_signatures,
  225. Opt_cephx_sign_messages,
  226. Opt_nocephx_sign_messages,
  227. Opt_tcp_nodelay,
  228. Opt_notcp_nodelay,
  229. };
  230. static match_table_t opt_tokens = {
  231. {Opt_osdtimeout, "osdtimeout=%d"},
  232. {Opt_osdkeepalivetimeout, "osdkeepalive=%d"},
  233. {Opt_mount_timeout, "mount_timeout=%d"},
  234. {Opt_osd_idle_ttl, "osd_idle_ttl=%d"},
  235. /* int args above */
  236. {Opt_fsid, "fsid=%s"},
  237. {Opt_name, "name=%s"},
  238. {Opt_secret, "secret=%s"},
  239. {Opt_key, "key=%s"},
  240. {Opt_ip, "ip=%s"},
  241. /* string args above */
  242. {Opt_share, "share"},
  243. {Opt_noshare, "noshare"},
  244. {Opt_crc, "crc"},
  245. {Opt_nocrc, "nocrc"},
  246. {Opt_cephx_require_signatures, "cephx_require_signatures"},
  247. {Opt_nocephx_require_signatures, "nocephx_require_signatures"},
  248. {Opt_cephx_sign_messages, "cephx_sign_messages"},
  249. {Opt_nocephx_sign_messages, "nocephx_sign_messages"},
  250. {Opt_tcp_nodelay, "tcp_nodelay"},
  251. {Opt_notcp_nodelay, "notcp_nodelay"},
  252. {-1, NULL}
  253. };
  254. void ceph_destroy_options(struct ceph_options *opt)
  255. {
  256. dout("destroy_options %p\n", opt);
  257. kfree(opt->name);
  258. if (opt->key) {
  259. ceph_crypto_key_destroy(opt->key);
  260. kfree(opt->key);
  261. }
  262. kfree(opt->mon_addr);
  263. kfree(opt);
  264. }
  265. EXPORT_SYMBOL(ceph_destroy_options);
  266. /* get secret from key store */
  267. static int get_secret(struct ceph_crypto_key *dst, const char *name) {
  268. struct key *ukey;
  269. int key_err;
  270. int err = 0;
  271. struct ceph_crypto_key *ckey;
  272. ukey = request_key(&key_type_ceph, name, NULL);
  273. if (!ukey || IS_ERR(ukey)) {
  274. /* request_key errors don't map nicely to mount(2)
  275. errors; don't even try, but still printk */
  276. key_err = PTR_ERR(ukey);
  277. switch (key_err) {
  278. case -ENOKEY:
  279. pr_warn("ceph: Mount failed due to key not found: %s\n",
  280. name);
  281. break;
  282. case -EKEYEXPIRED:
  283. pr_warn("ceph: Mount failed due to expired key: %s\n",
  284. name);
  285. break;
  286. case -EKEYREVOKED:
  287. pr_warn("ceph: Mount failed due to revoked key: %s\n",
  288. name);
  289. break;
  290. default:
  291. pr_warn("ceph: Mount failed due to unknown key error %d: %s\n",
  292. key_err, name);
  293. }
  294. err = -EPERM;
  295. goto out;
  296. }
  297. ckey = ukey->payload.data[0];
  298. err = ceph_crypto_key_clone(dst, ckey);
  299. if (err)
  300. goto out_key;
  301. /* pass through, err is 0 */
  302. out_key:
  303. key_put(ukey);
  304. out:
  305. return err;
  306. }
  307. struct ceph_options *
  308. ceph_parse_options(char *options, const char *dev_name,
  309. const char *dev_name_end,
  310. int (*parse_extra_token)(char *c, void *private),
  311. void *private)
  312. {
  313. struct ceph_options *opt;
  314. const char *c;
  315. int err = -ENOMEM;
  316. substring_t argstr[MAX_OPT_ARGS];
  317. opt = kzalloc(sizeof(*opt), GFP_KERNEL);
  318. if (!opt)
  319. return ERR_PTR(-ENOMEM);
  320. opt->mon_addr = kcalloc(CEPH_MAX_MON, sizeof(*opt->mon_addr),
  321. GFP_KERNEL);
  322. if (!opt->mon_addr)
  323. goto out;
  324. dout("parse_options %p options '%s' dev_name '%s'\n", opt, options,
  325. dev_name);
  326. /* start with defaults */
  327. opt->flags = CEPH_OPT_DEFAULT;
  328. opt->osd_keepalive_timeout = CEPH_OSD_KEEPALIVE_DEFAULT;
  329. opt->mount_timeout = CEPH_MOUNT_TIMEOUT_DEFAULT;
  330. opt->osd_idle_ttl = CEPH_OSD_IDLE_TTL_DEFAULT;
  331. /* get mon ip(s) */
  332. /* ip1[:port1][,ip2[:port2]...] */
  333. err = ceph_parse_ips(dev_name, dev_name_end, opt->mon_addr,
  334. CEPH_MAX_MON, &opt->num_mon);
  335. if (err < 0)
  336. goto out;
  337. /* parse mount options */
  338. while ((c = strsep(&options, ",")) != NULL) {
  339. int token, intval, ret;
  340. if (!*c)
  341. continue;
  342. err = -EINVAL;
  343. token = match_token((char *)c, opt_tokens, argstr);
  344. if (token < 0 && parse_extra_token) {
  345. /* extra? */
  346. err = parse_extra_token((char *)c, private);
  347. if (err < 0) {
  348. pr_err("bad option at '%s'\n", c);
  349. goto out;
  350. }
  351. continue;
  352. }
  353. if (token < Opt_last_int) {
  354. ret = match_int(&argstr[0], &intval);
  355. if (ret < 0) {
  356. pr_err("bad mount option arg (not int) "
  357. "at '%s'\n", c);
  358. continue;
  359. }
  360. dout("got int token %d val %d\n", token, intval);
  361. } else if (token > Opt_last_int && token < Opt_last_string) {
  362. dout("got string token %d val %s\n", token,
  363. argstr[0].from);
  364. } else {
  365. dout("got token %d\n", token);
  366. }
  367. switch (token) {
  368. case Opt_ip:
  369. err = ceph_parse_ips(argstr[0].from,
  370. argstr[0].to,
  371. &opt->my_addr,
  372. 1, NULL);
  373. if (err < 0)
  374. goto out;
  375. opt->flags |= CEPH_OPT_MYIP;
  376. break;
  377. case Opt_fsid:
  378. err = parse_fsid(argstr[0].from, &opt->fsid);
  379. if (err == 0)
  380. opt->flags |= CEPH_OPT_FSID;
  381. break;
  382. case Opt_name:
  383. opt->name = kstrndup(argstr[0].from,
  384. argstr[0].to-argstr[0].from,
  385. GFP_KERNEL);
  386. break;
  387. case Opt_secret:
  388. opt->key = kzalloc(sizeof(*opt->key), GFP_KERNEL);
  389. if (!opt->key) {
  390. err = -ENOMEM;
  391. goto out;
  392. }
  393. err = ceph_crypto_key_unarmor(opt->key, argstr[0].from);
  394. if (err < 0)
  395. goto out;
  396. break;
  397. case Opt_key:
  398. opt->key = kzalloc(sizeof(*opt->key), GFP_KERNEL);
  399. if (!opt->key) {
  400. err = -ENOMEM;
  401. goto out;
  402. }
  403. err = get_secret(opt->key, argstr[0].from);
  404. if (err < 0)
  405. goto out;
  406. break;
  407. /* misc */
  408. case Opt_osdtimeout:
  409. pr_warn("ignoring deprecated osdtimeout option\n");
  410. break;
  411. case Opt_osdkeepalivetimeout:
  412. /* 0 isn't well defined right now, reject it */
  413. if (intval < 1 || intval > INT_MAX / 1000) {
  414. pr_err("osdkeepalive out of range\n");
  415. err = -EINVAL;
  416. goto out;
  417. }
  418. opt->osd_keepalive_timeout =
  419. msecs_to_jiffies(intval * 1000);
  420. break;
  421. case Opt_osd_idle_ttl:
  422. /* 0 isn't well defined right now, reject it */
  423. if (intval < 1 || intval > INT_MAX / 1000) {
  424. pr_err("osd_idle_ttl out of range\n");
  425. err = -EINVAL;
  426. goto out;
  427. }
  428. opt->osd_idle_ttl = msecs_to_jiffies(intval * 1000);
  429. break;
  430. case Opt_mount_timeout:
  431. /* 0 is "wait forever" (i.e. infinite timeout) */
  432. if (intval < 0 || intval > INT_MAX / 1000) {
  433. pr_err("mount_timeout out of range\n");
  434. err = -EINVAL;
  435. goto out;
  436. }
  437. opt->mount_timeout = msecs_to_jiffies(intval * 1000);
  438. break;
  439. case Opt_share:
  440. opt->flags &= ~CEPH_OPT_NOSHARE;
  441. break;
  442. case Opt_noshare:
  443. opt->flags |= CEPH_OPT_NOSHARE;
  444. break;
  445. case Opt_crc:
  446. opt->flags &= ~CEPH_OPT_NOCRC;
  447. break;
  448. case Opt_nocrc:
  449. opt->flags |= CEPH_OPT_NOCRC;
  450. break;
  451. case Opt_cephx_require_signatures:
  452. opt->flags &= ~CEPH_OPT_NOMSGAUTH;
  453. break;
  454. case Opt_nocephx_require_signatures:
  455. opt->flags |= CEPH_OPT_NOMSGAUTH;
  456. break;
  457. case Opt_cephx_sign_messages:
  458. opt->flags &= ~CEPH_OPT_NOMSGSIGN;
  459. break;
  460. case Opt_nocephx_sign_messages:
  461. opt->flags |= CEPH_OPT_NOMSGSIGN;
  462. break;
  463. case Opt_tcp_nodelay:
  464. opt->flags |= CEPH_OPT_TCP_NODELAY;
  465. break;
  466. case Opt_notcp_nodelay:
  467. opt->flags &= ~CEPH_OPT_TCP_NODELAY;
  468. break;
  469. default:
  470. BUG_ON(token);
  471. }
  472. }
  473. /* success */
  474. return opt;
  475. out:
  476. ceph_destroy_options(opt);
  477. return ERR_PTR(err);
  478. }
  479. EXPORT_SYMBOL(ceph_parse_options);
  480. int ceph_print_client_options(struct seq_file *m, struct ceph_client *client)
  481. {
  482. struct ceph_options *opt = client->options;
  483. size_t pos = m->count;
  484. if (opt->name) {
  485. seq_puts(m, "name=");
  486. seq_escape(m, opt->name, ", \t\n\\");
  487. seq_putc(m, ',');
  488. }
  489. if (opt->key)
  490. seq_puts(m, "secret=<hidden>,");
  491. if (opt->flags & CEPH_OPT_FSID)
  492. seq_printf(m, "fsid=%pU,", &opt->fsid);
  493. if (opt->flags & CEPH_OPT_NOSHARE)
  494. seq_puts(m, "noshare,");
  495. if (opt->flags & CEPH_OPT_NOCRC)
  496. seq_puts(m, "nocrc,");
  497. if (opt->flags & CEPH_OPT_NOMSGAUTH)
  498. seq_puts(m, "nocephx_require_signatures,");
  499. if (opt->flags & CEPH_OPT_NOMSGSIGN)
  500. seq_puts(m, "nocephx_sign_messages,");
  501. if ((opt->flags & CEPH_OPT_TCP_NODELAY) == 0)
  502. seq_puts(m, "notcp_nodelay,");
  503. if (opt->mount_timeout != CEPH_MOUNT_TIMEOUT_DEFAULT)
  504. seq_printf(m, "mount_timeout=%d,",
  505. jiffies_to_msecs(opt->mount_timeout) / 1000);
  506. if (opt->osd_idle_ttl != CEPH_OSD_IDLE_TTL_DEFAULT)
  507. seq_printf(m, "osd_idle_ttl=%d,",
  508. jiffies_to_msecs(opt->osd_idle_ttl) / 1000);
  509. if (opt->osd_keepalive_timeout != CEPH_OSD_KEEPALIVE_DEFAULT)
  510. seq_printf(m, "osdkeepalivetimeout=%d,",
  511. jiffies_to_msecs(opt->osd_keepalive_timeout) / 1000);
  512. /* drop redundant comma */
  513. if (m->count != pos)
  514. m->count--;
  515. return 0;
  516. }
  517. EXPORT_SYMBOL(ceph_print_client_options);
  518. struct ceph_entity_addr *ceph_client_addr(struct ceph_client *client)
  519. {
  520. return &client->msgr.inst.addr;
  521. }
  522. EXPORT_SYMBOL(ceph_client_addr);
  523. u64 ceph_client_gid(struct ceph_client *client)
  524. {
  525. return client->monc.auth->global_id;
  526. }
  527. EXPORT_SYMBOL(ceph_client_gid);
  528. /*
  529. * create a fresh client instance
  530. */
  531. struct ceph_client *ceph_create_client(struct ceph_options *opt, void *private,
  532. u64 supported_features,
  533. u64 required_features)
  534. {
  535. struct ceph_client *client;
  536. struct ceph_entity_addr *myaddr = NULL;
  537. int err = -ENOMEM;
  538. client = kzalloc(sizeof(*client), GFP_KERNEL);
  539. if (client == NULL)
  540. return ERR_PTR(-ENOMEM);
  541. client->private = private;
  542. client->options = opt;
  543. mutex_init(&client->mount_mutex);
  544. init_waitqueue_head(&client->auth_wq);
  545. client->auth_err = 0;
  546. if (!ceph_test_opt(client, NOMSGAUTH))
  547. required_features |= CEPH_FEATURE_MSG_AUTH;
  548. client->extra_mon_dispatch = NULL;
  549. client->supported_features = CEPH_FEATURES_SUPPORTED_DEFAULT |
  550. supported_features;
  551. client->required_features = CEPH_FEATURES_REQUIRED_DEFAULT |
  552. required_features;
  553. /* msgr */
  554. if (ceph_test_opt(client, MYIP))
  555. myaddr = &client->options->my_addr;
  556. ceph_messenger_init(&client->msgr, myaddr);
  557. /* subsystems */
  558. err = ceph_monc_init(&client->monc, client);
  559. if (err < 0)
  560. goto fail;
  561. err = ceph_osdc_init(&client->osdc, client);
  562. if (err < 0)
  563. goto fail_monc;
  564. return client;
  565. fail_monc:
  566. ceph_monc_stop(&client->monc);
  567. fail:
  568. ceph_messenger_fini(&client->msgr);
  569. kfree(client);
  570. return ERR_PTR(err);
  571. }
  572. EXPORT_SYMBOL(ceph_create_client);
  573. void ceph_destroy_client(struct ceph_client *client)
  574. {
  575. dout("destroy_client %p\n", client);
  576. atomic_set(&client->msgr.stopping, 1);
  577. /* unmount */
  578. ceph_osdc_stop(&client->osdc);
  579. ceph_monc_stop(&client->monc);
  580. ceph_messenger_fini(&client->msgr);
  581. ceph_debugfs_client_cleanup(client);
  582. ceph_destroy_options(client->options);
  583. kfree(client);
  584. dout("destroy_client %p done\n", client);
  585. }
  586. EXPORT_SYMBOL(ceph_destroy_client);
  587. /*
  588. * true if we have the mon map (and have thus joined the cluster)
  589. */
  590. static bool have_mon_and_osd_map(struct ceph_client *client)
  591. {
  592. return client->monc.monmap && client->monc.monmap->epoch &&
  593. client->osdc.osdmap && client->osdc.osdmap->epoch;
  594. }
  595. /*
  596. * mount: join the ceph cluster, and open root directory.
  597. */
  598. int __ceph_open_session(struct ceph_client *client, unsigned long started)
  599. {
  600. unsigned long timeout = client->options->mount_timeout;
  601. long err;
  602. /* open session, and wait for mon and osd maps */
  603. err = ceph_monc_open_session(&client->monc);
  604. if (err < 0)
  605. return err;
  606. while (!have_mon_and_osd_map(client)) {
  607. if (timeout && time_after_eq(jiffies, started + timeout))
  608. return -ETIMEDOUT;
  609. /* wait */
  610. dout("mount waiting for mon_map\n");
  611. err = wait_event_interruptible_timeout(client->auth_wq,
  612. have_mon_and_osd_map(client) || (client->auth_err < 0),
  613. ceph_timeout_jiffies(timeout));
  614. if (err < 0)
  615. return err;
  616. if (client->auth_err < 0)
  617. return client->auth_err;
  618. }
  619. pr_info("client%llu fsid %pU\n", ceph_client_gid(client),
  620. &client->fsid);
  621. ceph_debugfs_client_init(client);
  622. return 0;
  623. }
  624. EXPORT_SYMBOL(__ceph_open_session);
  625. int ceph_open_session(struct ceph_client *client)
  626. {
  627. int ret;
  628. unsigned long started = jiffies; /* note the start time */
  629. dout("open_session start\n");
  630. mutex_lock(&client->mount_mutex);
  631. ret = __ceph_open_session(client, started);
  632. mutex_unlock(&client->mount_mutex);
  633. return ret;
  634. }
  635. EXPORT_SYMBOL(ceph_open_session);
  636. static int __init init_ceph_lib(void)
  637. {
  638. int ret = 0;
  639. ret = ceph_debugfs_init();
  640. if (ret < 0)
  641. goto out;
  642. ret = ceph_crypto_init();
  643. if (ret < 0)
  644. goto out_debugfs;
  645. ret = ceph_msgr_init();
  646. if (ret < 0)
  647. goto out_crypto;
  648. ret = ceph_osdc_setup();
  649. if (ret < 0)
  650. goto out_msgr;
  651. pr_info("loaded (mon/osd proto %d/%d)\n",
  652. CEPH_MONC_PROTOCOL, CEPH_OSDC_PROTOCOL);
  653. return 0;
  654. out_msgr:
  655. ceph_msgr_exit();
  656. out_crypto:
  657. ceph_crypto_shutdown();
  658. out_debugfs:
  659. ceph_debugfs_cleanup();
  660. out:
  661. return ret;
  662. }
  663. static void __exit exit_ceph_lib(void)
  664. {
  665. dout("exit_ceph_lib\n");
  666. WARN_ON(!ceph_strings_empty());
  667. ceph_osdc_cleanup();
  668. ceph_msgr_exit();
  669. ceph_crypto_shutdown();
  670. ceph_debugfs_cleanup();
  671. }
  672. module_init(init_ceph_lib);
  673. module_exit(exit_ceph_lib);
  674. MODULE_AUTHOR("Sage Weil <sage@newdream.net>");
  675. MODULE_AUTHOR("Yehuda Sadeh <yehuda@hq.newdream.net>");
  676. MODULE_AUTHOR("Patience Warnick <patience@newdream.net>");
  677. MODULE_DESCRIPTION("Ceph core library");
  678. MODULE_LICENSE("GPL");