callback.c 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191
  1. /*
  2. * linux/fs/nfs/callback.c
  3. *
  4. * Copyright (C) 2004 Trond Myklebust
  5. *
  6. * NFSv4 callback handling
  7. */
  8. #include <linux/config.h>
  9. #include <linux/completion.h>
  10. #include <linux/ip.h>
  11. #include <linux/module.h>
  12. #include <linux/smp_lock.h>
  13. #include <linux/sunrpc/svc.h>
  14. #include <linux/sunrpc/svcsock.h>
  15. #include <linux/nfs_fs.h>
  16. #include <net/inet_sock.h>
  17. #include "nfs4_fs.h"
  18. #include "callback.h"
  19. #define NFSDBG_FACILITY NFSDBG_CALLBACK
  20. struct nfs_callback_data {
  21. unsigned int users;
  22. struct svc_serv *serv;
  23. pid_t pid;
  24. struct completion started;
  25. struct completion stopped;
  26. };
  27. static struct nfs_callback_data nfs_callback_info;
  28. static DECLARE_MUTEX(nfs_callback_sema);
  29. static struct svc_program nfs4_callback_program;
  30. unsigned short nfs_callback_tcpport;
  31. /*
  32. * This is the callback kernel thread.
  33. */
  34. static void nfs_callback_svc(struct svc_rqst *rqstp)
  35. {
  36. struct svc_serv *serv = rqstp->rq_server;
  37. int err;
  38. __module_get(THIS_MODULE);
  39. lock_kernel();
  40. nfs_callback_info.pid = current->pid;
  41. daemonize("nfsv4-svc");
  42. /* Process request with signals blocked, but allow SIGKILL. */
  43. allow_signal(SIGKILL);
  44. complete(&nfs_callback_info.started);
  45. while (nfs_callback_info.users != 0 || !signalled()) {
  46. /*
  47. * Listen for a request on the socket
  48. */
  49. err = svc_recv(serv, rqstp, MAX_SCHEDULE_TIMEOUT);
  50. if (err == -EAGAIN || err == -EINTR)
  51. continue;
  52. if (err < 0) {
  53. printk(KERN_WARNING
  54. "%s: terminating on error %d\n",
  55. __FUNCTION__, -err);
  56. break;
  57. }
  58. dprintk("%s: request from %u.%u.%u.%u\n", __FUNCTION__,
  59. NIPQUAD(rqstp->rq_addr.sin_addr.s_addr));
  60. svc_process(serv, rqstp);
  61. }
  62. nfs_callback_info.pid = 0;
  63. complete(&nfs_callback_info.stopped);
  64. unlock_kernel();
  65. module_put_and_exit(0);
  66. }
  67. /*
  68. * Bring up the server process if it is not already up.
  69. */
  70. int nfs_callback_up(void)
  71. {
  72. struct svc_serv *serv;
  73. struct svc_sock *svsk;
  74. int ret = 0;
  75. lock_kernel();
  76. down(&nfs_callback_sema);
  77. if (nfs_callback_info.users++ || nfs_callback_info.pid != 0)
  78. goto out;
  79. init_completion(&nfs_callback_info.started);
  80. init_completion(&nfs_callback_info.stopped);
  81. serv = svc_create(&nfs4_callback_program, NFS4_CALLBACK_BUFSIZE);
  82. ret = -ENOMEM;
  83. if (!serv)
  84. goto out_err;
  85. /* FIXME: We don't want to register this socket with the portmapper */
  86. ret = svc_makesock(serv, IPPROTO_TCP, 0);
  87. if (ret < 0)
  88. goto out_destroy;
  89. if (!list_empty(&serv->sv_permsocks)) {
  90. svsk = list_entry(serv->sv_permsocks.next,
  91. struct svc_sock, sk_list);
  92. nfs_callback_tcpport = ntohs(inet_sk(svsk->sk_sk)->sport);
  93. dprintk ("Callback port = 0x%x\n", nfs_callback_tcpport);
  94. } else
  95. BUG();
  96. ret = svc_create_thread(nfs_callback_svc, serv);
  97. if (ret < 0)
  98. goto out_destroy;
  99. nfs_callback_info.serv = serv;
  100. wait_for_completion(&nfs_callback_info.started);
  101. out:
  102. up(&nfs_callback_sema);
  103. unlock_kernel();
  104. return ret;
  105. out_destroy:
  106. svc_destroy(serv);
  107. out_err:
  108. nfs_callback_info.users--;
  109. goto out;
  110. }
  111. /*
  112. * Kill the server process if it is not already up.
  113. */
  114. int nfs_callback_down(void)
  115. {
  116. int ret = 0;
  117. lock_kernel();
  118. down(&nfs_callback_sema);
  119. if (--nfs_callback_info.users || nfs_callback_info.pid == 0)
  120. goto out;
  121. kill_proc(nfs_callback_info.pid, SIGKILL, 1);
  122. wait_for_completion(&nfs_callback_info.stopped);
  123. out:
  124. up(&nfs_callback_sema);
  125. unlock_kernel();
  126. return ret;
  127. }
  128. static int nfs_callback_authenticate(struct svc_rqst *rqstp)
  129. {
  130. struct in_addr *addr = &rqstp->rq_addr.sin_addr;
  131. struct nfs4_client *clp;
  132. /* Don't talk to strangers */
  133. clp = nfs4_find_client(addr);
  134. if (clp == NULL)
  135. return SVC_DROP;
  136. dprintk("%s: %u.%u.%u.%u NFSv4 callback!\n", __FUNCTION__, NIPQUAD(addr));
  137. nfs4_put_client(clp);
  138. switch (rqstp->rq_authop->flavour) {
  139. case RPC_AUTH_NULL:
  140. if (rqstp->rq_proc != CB_NULL)
  141. return SVC_DENIED;
  142. break;
  143. case RPC_AUTH_UNIX:
  144. break;
  145. case RPC_AUTH_GSS:
  146. /* FIXME: RPCSEC_GSS handling? */
  147. default:
  148. return SVC_DENIED;
  149. }
  150. return SVC_OK;
  151. }
  152. /*
  153. * Define NFS4 callback program
  154. */
  155. extern struct svc_version nfs4_callback_version1;
  156. static struct svc_version *nfs4_callback_version[] = {
  157. [1] = &nfs4_callback_version1,
  158. };
  159. static struct svc_stat nfs4_callback_stats;
  160. static struct svc_program nfs4_callback_program = {
  161. .pg_prog = NFS4_CALLBACK, /* RPC service number */
  162. .pg_nvers = ARRAY_SIZE(nfs4_callback_version), /* Number of entries */
  163. .pg_vers = nfs4_callback_version, /* version table */
  164. .pg_name = "NFSv4 callback", /* service name */
  165. .pg_class = "nfs", /* authentication class */
  166. .pg_stats = &nfs4_callback_stats,
  167. .pg_authenticate = nfs_callback_authenticate,
  168. };