callback.c 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188
  1. /*
  2. * linux/fs/nfs/callback.c
  3. *
  4. * Copyright (C) 2004 Trond Myklebust
  5. *
  6. * NFSv4 callback handling
  7. */
  8. #include <linux/config.h>
  9. #include <linux/completion.h>
  10. #include <linux/ip.h>
  11. #include <linux/module.h>
  12. #include <linux/smp_lock.h>
  13. #include <linux/sunrpc/svc.h>
  14. #include <linux/sunrpc/svcsock.h>
  15. #include <linux/nfs_fs.h>
  16. #include "nfs4_fs.h"
  17. #include "callback.h"
  18. #define NFSDBG_FACILITY NFSDBG_CALLBACK
  19. struct nfs_callback_data {
  20. unsigned int users;
  21. struct svc_serv *serv;
  22. pid_t pid;
  23. struct completion started;
  24. struct completion stopped;
  25. };
  26. static struct nfs_callback_data nfs_callback_info;
  27. static DECLARE_MUTEX(nfs_callback_sema);
  28. static struct svc_program nfs4_callback_program;
  29. unsigned short nfs_callback_tcpport;
  30. /*
  31. * This is the callback kernel thread.
  32. */
  33. static void nfs_callback_svc(struct svc_rqst *rqstp)
  34. {
  35. struct svc_serv *serv = rqstp->rq_server;
  36. int err;
  37. __module_get(THIS_MODULE);
  38. lock_kernel();
  39. nfs_callback_info.pid = current->pid;
  40. daemonize("nfsv4-svc");
  41. /* Process request with signals blocked, but allow SIGKILL. */
  42. allow_signal(SIGKILL);
  43. complete(&nfs_callback_info.started);
  44. while (nfs_callback_info.users != 0 || !signalled()) {
  45. /*
  46. * Listen for a request on the socket
  47. */
  48. err = svc_recv(serv, rqstp, MAX_SCHEDULE_TIMEOUT);
  49. if (err == -EAGAIN || err == -EINTR)
  50. continue;
  51. if (err < 0) {
  52. printk(KERN_WARNING
  53. "%s: terminating on error %d\n",
  54. __FUNCTION__, -err);
  55. break;
  56. }
  57. dprintk("%s: request from %u.%u.%u.%u\n", __FUNCTION__,
  58. NIPQUAD(rqstp->rq_addr.sin_addr.s_addr));
  59. svc_process(serv, rqstp);
  60. }
  61. nfs_callback_info.pid = 0;
  62. complete(&nfs_callback_info.stopped);
  63. unlock_kernel();
  64. module_put_and_exit(0);
  65. }
  66. /*
  67. * Bring up the server process if it is not already up.
  68. */
  69. int nfs_callback_up(void)
  70. {
  71. struct svc_serv *serv;
  72. struct svc_sock *svsk;
  73. int ret = 0;
  74. lock_kernel();
  75. down(&nfs_callback_sema);
  76. if (nfs_callback_info.users++ || nfs_callback_info.pid != 0)
  77. goto out;
  78. init_completion(&nfs_callback_info.started);
  79. init_completion(&nfs_callback_info.stopped);
  80. serv = svc_create(&nfs4_callback_program, NFS4_CALLBACK_BUFSIZE);
  81. ret = -ENOMEM;
  82. if (!serv)
  83. goto out_err;
  84. /* FIXME: We don't want to register this socket with the portmapper */
  85. ret = svc_makesock(serv, IPPROTO_TCP, 0);
  86. if (ret < 0)
  87. goto out_destroy;
  88. if (!list_empty(&serv->sv_permsocks)) {
  89. svsk = list_entry(serv->sv_permsocks.next,
  90. struct svc_sock, sk_list);
  91. nfs_callback_tcpport = ntohs(inet_sk(svsk->sk_sk)->sport);
  92. dprintk ("Callback port = 0x%x\n", nfs_callback_tcpport);
  93. } else
  94. BUG();
  95. ret = svc_create_thread(nfs_callback_svc, serv);
  96. if (ret < 0)
  97. goto out_destroy;
  98. nfs_callback_info.serv = serv;
  99. wait_for_completion(&nfs_callback_info.started);
  100. out:
  101. up(&nfs_callback_sema);
  102. unlock_kernel();
  103. return ret;
  104. out_destroy:
  105. svc_destroy(serv);
  106. out_err:
  107. nfs_callback_info.users--;
  108. goto out;
  109. }
  110. /*
  111. * Kill the server process if it is not already up.
  112. */
  113. int nfs_callback_down(void)
  114. {
  115. int ret = 0;
  116. lock_kernel();
  117. down(&nfs_callback_sema);
  118. if (--nfs_callback_info.users || nfs_callback_info.pid == 0)
  119. goto out;
  120. kill_proc(nfs_callback_info.pid, SIGKILL, 1);
  121. wait_for_completion(&nfs_callback_info.stopped);
  122. out:
  123. up(&nfs_callback_sema);
  124. unlock_kernel();
  125. return ret;
  126. }
  127. static int nfs_callback_authenticate(struct svc_rqst *rqstp)
  128. {
  129. struct in_addr *addr = &rqstp->rq_addr.sin_addr;
  130. struct nfs4_client *clp;
  131. /* Don't talk to strangers */
  132. clp = nfs4_find_client(addr);
  133. if (clp == NULL)
  134. return SVC_DROP;
  135. dprintk("%s: %u.%u.%u.%u NFSv4 callback!\n", __FUNCTION__, NIPQUAD(addr));
  136. nfs4_put_client(clp);
  137. switch (rqstp->rq_authop->flavour) {
  138. case RPC_AUTH_NULL:
  139. if (rqstp->rq_proc != CB_NULL)
  140. return SVC_DENIED;
  141. break;
  142. case RPC_AUTH_UNIX:
  143. break;
  144. case RPC_AUTH_GSS:
  145. /* FIXME: RPCSEC_GSS handling? */
  146. default:
  147. return SVC_DENIED;
  148. }
  149. return SVC_OK;
  150. }
  151. /*
  152. * Define NFS4 callback program
  153. */
  154. extern struct svc_version nfs4_callback_version1;
  155. static struct svc_version *nfs4_callback_version[] = {
  156. [1] = &nfs4_callback_version1,
  157. };
  158. static struct svc_stat nfs4_callback_stats;
  159. static struct svc_program nfs4_callback_program = {
  160. .pg_prog = NFS4_CALLBACK, /* RPC service number */
  161. .pg_nvers = ARRAY_SIZE(nfs4_callback_version), /* Number of entries */
  162. .pg_vers = nfs4_callback_version, /* version table */
  163. .pg_name = "NFSv4 callback", /* service name */
  164. .pg_class = "nfs", /* authentication class */
  165. .pg_stats = &nfs4_callback_stats,
  166. .pg_authenticate = nfs_callback_authenticate,
  167. };