ceph_common.c 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761
  1. #include <linux/ceph/ceph_debug.h>
  2. #include <linux/backing-dev.h>
  3. #include <linux/ctype.h>
  4. #include <linux/fs.h>
  5. #include <linux/inet.h>
  6. #include <linux/in6.h>
  7. #include <linux/key.h>
  8. #include <keys/ceph-type.h>
  9. #include <linux/module.h>
  10. #include <linux/mount.h>
  11. #include <linux/nsproxy.h>
  12. #include <linux/parser.h>
  13. #include <linux/sched.h>
  14. #include <linux/seq_file.h>
  15. #include <linux/slab.h>
  16. #include <linux/statfs.h>
  17. #include <linux/string.h>
  18. #include <linux/vmalloc.h>
  19. #include <linux/ceph/ceph_features.h>
  20. #include <linux/ceph/libceph.h>
  21. #include <linux/ceph/debugfs.h>
  22. #include <linux/ceph/decode.h>
  23. #include <linux/ceph/mon_client.h>
  24. #include <linux/ceph/auth.h>
  25. #include "crypto.h"
  26. /*
  27. * Module compatibility interface. For now it doesn't do anything,
  28. * but its existence signals a certain level of functionality.
  29. *
  30. * The data buffer is used to pass information both to and from
  31. * libceph. The return value indicates whether libceph determines
  32. * it is compatible with the caller (from another kernel module),
  33. * given the provided data.
  34. *
  35. * The data pointer can be null.
  36. */
  37. bool libceph_compatible(void *data)
  38. {
  39. return true;
  40. }
  41. EXPORT_SYMBOL(libceph_compatible);
  42. /*
  43. * find filename portion of a path (/foo/bar/baz -> baz)
  44. */
  45. const char *ceph_file_part(const char *s, int len)
  46. {
  47. const char *e = s + len;
  48. while (e != s && *(e-1) != '/')
  49. e--;
  50. return e;
  51. }
  52. EXPORT_SYMBOL(ceph_file_part);
  53. const char *ceph_msg_type_name(int type)
  54. {
  55. switch (type) {
  56. case CEPH_MSG_SHUTDOWN: return "shutdown";
  57. case CEPH_MSG_PING: return "ping";
  58. case CEPH_MSG_AUTH: return "auth";
  59. case CEPH_MSG_AUTH_REPLY: return "auth_reply";
  60. case CEPH_MSG_MON_MAP: return "mon_map";
  61. case CEPH_MSG_MON_GET_MAP: return "mon_get_map";
  62. case CEPH_MSG_MON_SUBSCRIBE: return "mon_subscribe";
  63. case CEPH_MSG_MON_SUBSCRIBE_ACK: return "mon_subscribe_ack";
  64. case CEPH_MSG_STATFS: return "statfs";
  65. case CEPH_MSG_STATFS_REPLY: return "statfs_reply";
  66. case CEPH_MSG_MON_GET_VERSION: return "mon_get_version";
  67. case CEPH_MSG_MON_GET_VERSION_REPLY: return "mon_get_version_reply";
  68. case CEPH_MSG_MDS_MAP: return "mds_map";
  69. case CEPH_MSG_CLIENT_SESSION: return "client_session";
  70. case CEPH_MSG_CLIENT_RECONNECT: return "client_reconnect";
  71. case CEPH_MSG_CLIENT_REQUEST: return "client_request";
  72. case CEPH_MSG_CLIENT_REQUEST_FORWARD: return "client_request_forward";
  73. case CEPH_MSG_CLIENT_REPLY: return "client_reply";
  74. case CEPH_MSG_CLIENT_CAPS: return "client_caps";
  75. case CEPH_MSG_CLIENT_CAPRELEASE: return "client_cap_release";
  76. case CEPH_MSG_CLIENT_SNAP: return "client_snap";
  77. case CEPH_MSG_CLIENT_LEASE: return "client_lease";
  78. case CEPH_MSG_OSD_MAP: return "osd_map";
  79. case CEPH_MSG_OSD_OP: return "osd_op";
  80. case CEPH_MSG_OSD_OPREPLY: return "osd_opreply";
  81. case CEPH_MSG_WATCH_NOTIFY: return "watch_notify";
  82. default: return "unknown";
  83. }
  84. }
  85. EXPORT_SYMBOL(ceph_msg_type_name);
  86. /*
  87. * Initially learn our fsid, or verify an fsid matches.
  88. */
  89. int ceph_check_fsid(struct ceph_client *client, struct ceph_fsid *fsid)
  90. {
  91. if (client->have_fsid) {
  92. if (ceph_fsid_compare(&client->fsid, fsid)) {
  93. pr_err("bad fsid, had %pU got %pU",
  94. &client->fsid, fsid);
  95. return -1;
  96. }
  97. } else {
  98. memcpy(&client->fsid, fsid, sizeof(*fsid));
  99. }
  100. return 0;
  101. }
  102. EXPORT_SYMBOL(ceph_check_fsid);
  103. static int strcmp_null(const char *s1, const char *s2)
  104. {
  105. if (!s1 && !s2)
  106. return 0;
  107. if (s1 && !s2)
  108. return -1;
  109. if (!s1 && s2)
  110. return 1;
  111. return strcmp(s1, s2);
  112. }
  113. int ceph_compare_options(struct ceph_options *new_opt,
  114. struct ceph_client *client)
  115. {
  116. struct ceph_options *opt1 = new_opt;
  117. struct ceph_options *opt2 = client->options;
  118. int ofs = offsetof(struct ceph_options, mon_addr);
  119. int i;
  120. int ret;
  121. /*
  122. * Don't bother comparing options if network namespaces don't
  123. * match.
  124. */
  125. if (!net_eq(current->nsproxy->net_ns, read_pnet(&client->msgr.net)))
  126. return -1;
  127. ret = memcmp(opt1, opt2, ofs);
  128. if (ret)
  129. return ret;
  130. ret = strcmp_null(opt1->name, opt2->name);
  131. if (ret)
  132. return ret;
  133. if (opt1->key && !opt2->key)
  134. return -1;
  135. if (!opt1->key && opt2->key)
  136. return 1;
  137. if (opt1->key && opt2->key) {
  138. if (opt1->key->type != opt2->key->type)
  139. return -1;
  140. if (opt1->key->created.tv_sec != opt2->key->created.tv_sec)
  141. return -1;
  142. if (opt1->key->created.tv_nsec != opt2->key->created.tv_nsec)
  143. return -1;
  144. if (opt1->key->len != opt2->key->len)
  145. return -1;
  146. if (opt1->key->key && !opt2->key->key)
  147. return -1;
  148. if (!opt1->key->key && opt2->key->key)
  149. return 1;
  150. if (opt1->key->key && opt2->key->key) {
  151. ret = memcmp(opt1->key->key, opt2->key->key, opt1->key->len);
  152. if (ret)
  153. return ret;
  154. }
  155. }
  156. /* any matching mon ip implies a match */
  157. for (i = 0; i < opt1->num_mon; i++) {
  158. if (ceph_monmap_contains(client->monc.monmap,
  159. &opt1->mon_addr[i]))
  160. return 0;
  161. }
  162. return -1;
  163. }
  164. EXPORT_SYMBOL(ceph_compare_options);
  165. void *ceph_kvmalloc(size_t size, gfp_t flags)
  166. {
  167. if (size <= (PAGE_SIZE << PAGE_ALLOC_COSTLY_ORDER)) {
  168. void *ptr = kmalloc(size, flags | __GFP_NOWARN);
  169. if (ptr)
  170. return ptr;
  171. }
  172. return __vmalloc(size, flags | __GFP_HIGHMEM, PAGE_KERNEL);
  173. }
  174. static int parse_fsid(const char *str, struct ceph_fsid *fsid)
  175. {
  176. int i = 0;
  177. char tmp[3];
  178. int err = -EINVAL;
  179. int d;
  180. dout("parse_fsid '%s'\n", str);
  181. tmp[2] = 0;
  182. while (*str && i < 16) {
  183. if (ispunct(*str)) {
  184. str++;
  185. continue;
  186. }
  187. if (!isxdigit(str[0]) || !isxdigit(str[1]))
  188. break;
  189. tmp[0] = str[0];
  190. tmp[1] = str[1];
  191. if (sscanf(tmp, "%x", &d) < 1)
  192. break;
  193. fsid->fsid[i] = d & 0xff;
  194. i++;
  195. str += 2;
  196. }
  197. if (i == 16)
  198. err = 0;
  199. dout("parse_fsid ret %d got fsid %pU", err, fsid);
  200. return err;
  201. }
  202. /*
  203. * ceph options
  204. */
  205. enum {
  206. Opt_osdtimeout,
  207. Opt_osdkeepalivetimeout,
  208. Opt_mount_timeout,
  209. Opt_osd_idle_ttl,
  210. Opt_last_int,
  211. /* int args above */
  212. Opt_fsid,
  213. Opt_name,
  214. Opt_secret,
  215. Opt_key,
  216. Opt_ip,
  217. Opt_last_string,
  218. /* string args above */
  219. Opt_share,
  220. Opt_noshare,
  221. Opt_crc,
  222. Opt_nocrc,
  223. Opt_cephx_require_signatures,
  224. Opt_nocephx_require_signatures,
  225. Opt_cephx_sign_messages,
  226. Opt_nocephx_sign_messages,
  227. Opt_tcp_nodelay,
  228. Opt_notcp_nodelay,
  229. };
  230. static match_table_t opt_tokens = {
  231. {Opt_osdtimeout, "osdtimeout=%d"},
  232. {Opt_osdkeepalivetimeout, "osdkeepalive=%d"},
  233. {Opt_mount_timeout, "mount_timeout=%d"},
  234. {Opt_osd_idle_ttl, "osd_idle_ttl=%d"},
  235. /* int args above */
  236. {Opt_fsid, "fsid=%s"},
  237. {Opt_name, "name=%s"},
  238. {Opt_secret, "secret=%s"},
  239. {Opt_key, "key=%s"},
  240. {Opt_ip, "ip=%s"},
  241. /* string args above */
  242. {Opt_share, "share"},
  243. {Opt_noshare, "noshare"},
  244. {Opt_crc, "crc"},
  245. {Opt_nocrc, "nocrc"},
  246. {Opt_cephx_require_signatures, "cephx_require_signatures"},
  247. {Opt_nocephx_require_signatures, "nocephx_require_signatures"},
  248. {Opt_cephx_sign_messages, "cephx_sign_messages"},
  249. {Opt_nocephx_sign_messages, "nocephx_sign_messages"},
  250. {Opt_tcp_nodelay, "tcp_nodelay"},
  251. {Opt_notcp_nodelay, "notcp_nodelay"},
  252. {-1, NULL}
  253. };
  254. void ceph_destroy_options(struct ceph_options *opt)
  255. {
  256. dout("destroy_options %p\n", opt);
  257. kfree(opt->name);
  258. if (opt->key) {
  259. ceph_crypto_key_destroy(opt->key);
  260. kfree(opt->key);
  261. }
  262. kfree(opt->mon_addr);
  263. kfree(opt);
  264. }
  265. EXPORT_SYMBOL(ceph_destroy_options);
  266. /* get secret from key store */
  267. static int get_secret(struct ceph_crypto_key *dst, const char *name) {
  268. struct key *ukey;
  269. int key_err;
  270. int err = 0;
  271. struct ceph_crypto_key *ckey;
  272. ukey = request_key(&key_type_ceph, name, NULL);
  273. if (!ukey || IS_ERR(ukey)) {
  274. /* request_key errors don't map nicely to mount(2)
  275. errors; don't even try, but still printk */
  276. key_err = PTR_ERR(ukey);
  277. switch (key_err) {
  278. case -ENOKEY:
  279. pr_warn("ceph: Mount failed due to key not found: %s\n",
  280. name);
  281. break;
  282. case -EKEYEXPIRED:
  283. pr_warn("ceph: Mount failed due to expired key: %s\n",
  284. name);
  285. break;
  286. case -EKEYREVOKED:
  287. pr_warn("ceph: Mount failed due to revoked key: %s\n",
  288. name);
  289. break;
  290. default:
  291. pr_warn("ceph: Mount failed due to unknown key error %d: %s\n",
  292. key_err, name);
  293. }
  294. err = -EPERM;
  295. goto out;
  296. }
  297. ckey = ukey->payload.data[0];
  298. err = ceph_crypto_key_clone(dst, ckey);
  299. if (err)
  300. goto out_key;
  301. /* pass through, err is 0 */
  302. out_key:
  303. key_put(ukey);
  304. out:
  305. return err;
  306. }
  307. struct ceph_options *
  308. ceph_parse_options(char *options, const char *dev_name,
  309. const char *dev_name_end,
  310. int (*parse_extra_token)(char *c, void *private),
  311. void *private)
  312. {
  313. struct ceph_options *opt;
  314. const char *c;
  315. int err = -ENOMEM;
  316. substring_t argstr[MAX_OPT_ARGS];
  317. opt = kzalloc(sizeof(*opt), GFP_KERNEL);
  318. if (!opt)
  319. return ERR_PTR(-ENOMEM);
  320. opt->mon_addr = kcalloc(CEPH_MAX_MON, sizeof(*opt->mon_addr),
  321. GFP_KERNEL);
  322. if (!opt->mon_addr)
  323. goto out;
  324. dout("parse_options %p options '%s' dev_name '%s'\n", opt, options,
  325. dev_name);
  326. /* start with defaults */
  327. opt->flags = CEPH_OPT_DEFAULT;
  328. opt->osd_keepalive_timeout = CEPH_OSD_KEEPALIVE_DEFAULT;
  329. opt->mount_timeout = CEPH_MOUNT_TIMEOUT_DEFAULT;
  330. opt->osd_idle_ttl = CEPH_OSD_IDLE_TTL_DEFAULT;
  331. opt->monc_ping_timeout = CEPH_MONC_PING_TIMEOUT_DEFAULT;
  332. /* get mon ip(s) */
  333. /* ip1[:port1][,ip2[:port2]...] */
  334. err = ceph_parse_ips(dev_name, dev_name_end, opt->mon_addr,
  335. CEPH_MAX_MON, &opt->num_mon);
  336. if (err < 0)
  337. goto out;
  338. /* parse mount options */
  339. while ((c = strsep(&options, ",")) != NULL) {
  340. int token, intval, ret;
  341. if (!*c)
  342. continue;
  343. err = -EINVAL;
  344. token = match_token((char *)c, opt_tokens, argstr);
  345. if (token < 0 && parse_extra_token) {
  346. /* extra? */
  347. err = parse_extra_token((char *)c, private);
  348. if (err < 0) {
  349. pr_err("bad option at '%s'\n", c);
  350. goto out;
  351. }
  352. continue;
  353. }
  354. if (token < Opt_last_int) {
  355. ret = match_int(&argstr[0], &intval);
  356. if (ret < 0) {
  357. pr_err("bad mount option arg (not int) "
  358. "at '%s'\n", c);
  359. continue;
  360. }
  361. dout("got int token %d val %d\n", token, intval);
  362. } else if (token > Opt_last_int && token < Opt_last_string) {
  363. dout("got string token %d val %s\n", token,
  364. argstr[0].from);
  365. } else {
  366. dout("got token %d\n", token);
  367. }
  368. switch (token) {
  369. case Opt_ip:
  370. err = ceph_parse_ips(argstr[0].from,
  371. argstr[0].to,
  372. &opt->my_addr,
  373. 1, NULL);
  374. if (err < 0)
  375. goto out;
  376. opt->flags |= CEPH_OPT_MYIP;
  377. break;
  378. case Opt_fsid:
  379. err = parse_fsid(argstr[0].from, &opt->fsid);
  380. if (err == 0)
  381. opt->flags |= CEPH_OPT_FSID;
  382. break;
  383. case Opt_name:
  384. opt->name = kstrndup(argstr[0].from,
  385. argstr[0].to-argstr[0].from,
  386. GFP_KERNEL);
  387. break;
  388. case Opt_secret:
  389. opt->key = kzalloc(sizeof(*opt->key), GFP_KERNEL);
  390. if (!opt->key) {
  391. err = -ENOMEM;
  392. goto out;
  393. }
  394. err = ceph_crypto_key_unarmor(opt->key, argstr[0].from);
  395. if (err < 0)
  396. goto out;
  397. break;
  398. case Opt_key:
  399. opt->key = kzalloc(sizeof(*opt->key), GFP_KERNEL);
  400. if (!opt->key) {
  401. err = -ENOMEM;
  402. goto out;
  403. }
  404. err = get_secret(opt->key, argstr[0].from);
  405. if (err < 0)
  406. goto out;
  407. break;
  408. /* misc */
  409. case Opt_osdtimeout:
  410. pr_warn("ignoring deprecated osdtimeout option\n");
  411. break;
  412. case Opt_osdkeepalivetimeout:
  413. /* 0 isn't well defined right now, reject it */
  414. if (intval < 1 || intval > INT_MAX / 1000) {
  415. pr_err("osdkeepalive out of range\n");
  416. err = -EINVAL;
  417. goto out;
  418. }
  419. opt->osd_keepalive_timeout =
  420. msecs_to_jiffies(intval * 1000);
  421. break;
  422. case Opt_osd_idle_ttl:
  423. /* 0 isn't well defined right now, reject it */
  424. if (intval < 1 || intval > INT_MAX / 1000) {
  425. pr_err("osd_idle_ttl out of range\n");
  426. err = -EINVAL;
  427. goto out;
  428. }
  429. opt->osd_idle_ttl = msecs_to_jiffies(intval * 1000);
  430. break;
  431. case Opt_mount_timeout:
  432. /* 0 is "wait forever" (i.e. infinite timeout) */
  433. if (intval < 0 || intval > INT_MAX / 1000) {
  434. pr_err("mount_timeout out of range\n");
  435. err = -EINVAL;
  436. goto out;
  437. }
  438. opt->mount_timeout = msecs_to_jiffies(intval * 1000);
  439. break;
  440. case Opt_share:
  441. opt->flags &= ~CEPH_OPT_NOSHARE;
  442. break;
  443. case Opt_noshare:
  444. opt->flags |= CEPH_OPT_NOSHARE;
  445. break;
  446. case Opt_crc:
  447. opt->flags &= ~CEPH_OPT_NOCRC;
  448. break;
  449. case Opt_nocrc:
  450. opt->flags |= CEPH_OPT_NOCRC;
  451. break;
  452. case Opt_cephx_require_signatures:
  453. opt->flags &= ~CEPH_OPT_NOMSGAUTH;
  454. break;
  455. case Opt_nocephx_require_signatures:
  456. opt->flags |= CEPH_OPT_NOMSGAUTH;
  457. break;
  458. case Opt_cephx_sign_messages:
  459. opt->flags &= ~CEPH_OPT_NOMSGSIGN;
  460. break;
  461. case Opt_nocephx_sign_messages:
  462. opt->flags |= CEPH_OPT_NOMSGSIGN;
  463. break;
  464. case Opt_tcp_nodelay:
  465. opt->flags |= CEPH_OPT_TCP_NODELAY;
  466. break;
  467. case Opt_notcp_nodelay:
  468. opt->flags &= ~CEPH_OPT_TCP_NODELAY;
  469. break;
  470. default:
  471. BUG_ON(token);
  472. }
  473. }
  474. /* success */
  475. return opt;
  476. out:
  477. ceph_destroy_options(opt);
  478. return ERR_PTR(err);
  479. }
  480. EXPORT_SYMBOL(ceph_parse_options);
  481. int ceph_print_client_options(struct seq_file *m, struct ceph_client *client)
  482. {
  483. struct ceph_options *opt = client->options;
  484. size_t pos = m->count;
  485. if (opt->name) {
  486. seq_puts(m, "name=");
  487. seq_escape(m, opt->name, ", \t\n\\");
  488. seq_putc(m, ',');
  489. }
  490. if (opt->key)
  491. seq_puts(m, "secret=<hidden>,");
  492. if (opt->flags & CEPH_OPT_FSID)
  493. seq_printf(m, "fsid=%pU,", &opt->fsid);
  494. if (opt->flags & CEPH_OPT_NOSHARE)
  495. seq_puts(m, "noshare,");
  496. if (opt->flags & CEPH_OPT_NOCRC)
  497. seq_puts(m, "nocrc,");
  498. if (opt->flags & CEPH_OPT_NOMSGAUTH)
  499. seq_puts(m, "nocephx_require_signatures,");
  500. if (opt->flags & CEPH_OPT_NOMSGSIGN)
  501. seq_puts(m, "nocephx_sign_messages,");
  502. if ((opt->flags & CEPH_OPT_TCP_NODELAY) == 0)
  503. seq_puts(m, "notcp_nodelay,");
  504. if (opt->mount_timeout != CEPH_MOUNT_TIMEOUT_DEFAULT)
  505. seq_printf(m, "mount_timeout=%d,",
  506. jiffies_to_msecs(opt->mount_timeout) / 1000);
  507. if (opt->osd_idle_ttl != CEPH_OSD_IDLE_TTL_DEFAULT)
  508. seq_printf(m, "osd_idle_ttl=%d,",
  509. jiffies_to_msecs(opt->osd_idle_ttl) / 1000);
  510. if (opt->osd_keepalive_timeout != CEPH_OSD_KEEPALIVE_DEFAULT)
  511. seq_printf(m, "osdkeepalivetimeout=%d,",
  512. jiffies_to_msecs(opt->osd_keepalive_timeout) / 1000);
  513. /* drop redundant comma */
  514. if (m->count != pos)
  515. m->count--;
  516. return 0;
  517. }
  518. EXPORT_SYMBOL(ceph_print_client_options);
  519. u64 ceph_client_id(struct ceph_client *client)
  520. {
  521. return client->monc.auth->global_id;
  522. }
  523. EXPORT_SYMBOL(ceph_client_id);
  524. /*
  525. * create a fresh client instance
  526. */
  527. struct ceph_client *ceph_create_client(struct ceph_options *opt, void *private,
  528. u64 supported_features,
  529. u64 required_features)
  530. {
  531. struct ceph_client *client;
  532. struct ceph_entity_addr *myaddr = NULL;
  533. int err = -ENOMEM;
  534. client = kzalloc(sizeof(*client), GFP_KERNEL);
  535. if (client == NULL)
  536. return ERR_PTR(-ENOMEM);
  537. client->private = private;
  538. client->options = opt;
  539. mutex_init(&client->mount_mutex);
  540. init_waitqueue_head(&client->auth_wq);
  541. client->auth_err = 0;
  542. if (!ceph_test_opt(client, NOMSGAUTH))
  543. required_features |= CEPH_FEATURE_MSG_AUTH;
  544. client->extra_mon_dispatch = NULL;
  545. client->supported_features = CEPH_FEATURES_SUPPORTED_DEFAULT |
  546. supported_features;
  547. client->required_features = CEPH_FEATURES_REQUIRED_DEFAULT |
  548. required_features;
  549. /* msgr */
  550. if (ceph_test_opt(client, MYIP))
  551. myaddr = &client->options->my_addr;
  552. ceph_messenger_init(&client->msgr, myaddr);
  553. /* subsystems */
  554. err = ceph_monc_init(&client->monc, client);
  555. if (err < 0)
  556. goto fail;
  557. err = ceph_osdc_init(&client->osdc, client);
  558. if (err < 0)
  559. goto fail_monc;
  560. return client;
  561. fail_monc:
  562. ceph_monc_stop(&client->monc);
  563. fail:
  564. ceph_messenger_fini(&client->msgr);
  565. kfree(client);
  566. return ERR_PTR(err);
  567. }
  568. EXPORT_SYMBOL(ceph_create_client);
  569. void ceph_destroy_client(struct ceph_client *client)
  570. {
  571. dout("destroy_client %p\n", client);
  572. atomic_set(&client->msgr.stopping, 1);
  573. /* unmount */
  574. ceph_osdc_stop(&client->osdc);
  575. ceph_monc_stop(&client->monc);
  576. ceph_messenger_fini(&client->msgr);
  577. ceph_debugfs_client_cleanup(client);
  578. ceph_destroy_options(client->options);
  579. kfree(client);
  580. dout("destroy_client %p done\n", client);
  581. }
  582. EXPORT_SYMBOL(ceph_destroy_client);
  583. /*
  584. * true if we have the mon map (and have thus joined the cluster)
  585. */
  586. static int have_mon_and_osd_map(struct ceph_client *client)
  587. {
  588. return client->monc.monmap && client->monc.monmap->epoch &&
  589. client->osdc.osdmap && client->osdc.osdmap->epoch;
  590. }
  591. /*
  592. * mount: join the ceph cluster, and open root directory.
  593. */
  594. int __ceph_open_session(struct ceph_client *client, unsigned long started)
  595. {
  596. unsigned long timeout = client->options->mount_timeout;
  597. long err;
  598. /* open session, and wait for mon and osd maps */
  599. err = ceph_monc_open_session(&client->monc);
  600. if (err < 0)
  601. return err;
  602. while (!have_mon_and_osd_map(client)) {
  603. if (timeout && time_after_eq(jiffies, started + timeout))
  604. return -ETIMEDOUT;
  605. /* wait */
  606. dout("mount waiting for mon_map\n");
  607. err = wait_event_interruptible_timeout(client->auth_wq,
  608. have_mon_and_osd_map(client) || (client->auth_err < 0),
  609. ceph_timeout_jiffies(timeout));
  610. if (err < 0)
  611. return err;
  612. if (client->auth_err < 0)
  613. return client->auth_err;
  614. }
  615. return 0;
  616. }
  617. EXPORT_SYMBOL(__ceph_open_session);
  618. int ceph_open_session(struct ceph_client *client)
  619. {
  620. int ret;
  621. unsigned long started = jiffies; /* note the start time */
  622. dout("open_session start\n");
  623. mutex_lock(&client->mount_mutex);
  624. ret = __ceph_open_session(client, started);
  625. mutex_unlock(&client->mount_mutex);
  626. return ret;
  627. }
  628. EXPORT_SYMBOL(ceph_open_session);
  629. static int __init init_ceph_lib(void)
  630. {
  631. int ret = 0;
  632. ret = ceph_debugfs_init();
  633. if (ret < 0)
  634. goto out;
  635. ret = ceph_crypto_init();
  636. if (ret < 0)
  637. goto out_debugfs;
  638. ret = ceph_msgr_init();
  639. if (ret < 0)
  640. goto out_crypto;
  641. ret = ceph_osdc_setup();
  642. if (ret < 0)
  643. goto out_msgr;
  644. pr_info("loaded (mon/osd proto %d/%d)\n",
  645. CEPH_MONC_PROTOCOL, CEPH_OSDC_PROTOCOL);
  646. return 0;
  647. out_msgr:
  648. ceph_msgr_exit();
  649. out_crypto:
  650. ceph_crypto_shutdown();
  651. out_debugfs:
  652. ceph_debugfs_cleanup();
  653. out:
  654. return ret;
  655. }
  656. static void __exit exit_ceph_lib(void)
  657. {
  658. dout("exit_ceph_lib\n");
  659. ceph_osdc_cleanup();
  660. ceph_msgr_exit();
  661. ceph_crypto_shutdown();
  662. ceph_debugfs_cleanup();
  663. }
  664. module_init(init_ceph_lib);
  665. module_exit(exit_ceph_lib);
  666. MODULE_AUTHOR("Sage Weil <sage@newdream.net>");
  667. MODULE_AUTHOR("Yehuda Sadeh <yehuda@hq.newdream.net>");
  668. MODULE_AUTHOR("Patience Warnick <patience@newdream.net>");
  669. MODULE_DESCRIPTION("Ceph core library");
  670. MODULE_LICENSE("GPL");