callback.c 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187
  1. /*
  2. * linux/fs/nfs/callback.c
  3. *
  4. * Copyright (C) 2004 Trond Myklebust
  5. *
  6. * NFSv4 callback handling
  7. */
  8. #include <linux/config.h>
  9. #include <linux/completion.h>
  10. #include <linux/ip.h>
  11. #include <linux/module.h>
  12. #include <linux/smp_lock.h>
  13. #include <linux/sunrpc/svc.h>
  14. #include <linux/sunrpc/svcsock.h>
  15. #include <linux/nfs_fs.h>
  16. #include "callback.h"
  17. #define NFSDBG_FACILITY NFSDBG_CALLBACK
  18. struct nfs_callback_data {
  19. unsigned int users;
  20. struct svc_serv *serv;
  21. pid_t pid;
  22. struct completion started;
  23. struct completion stopped;
  24. };
  25. static struct nfs_callback_data nfs_callback_info;
  26. static DECLARE_MUTEX(nfs_callback_sema);
  27. static struct svc_program nfs4_callback_program;
  28. unsigned short nfs_callback_tcpport;
  29. /*
  30. * This is the callback kernel thread.
  31. */
  32. static void nfs_callback_svc(struct svc_rqst *rqstp)
  33. {
  34. struct svc_serv *serv = rqstp->rq_server;
  35. int err;
  36. __module_get(THIS_MODULE);
  37. lock_kernel();
  38. nfs_callback_info.pid = current->pid;
  39. daemonize("nfsv4-svc");
  40. /* Process request with signals blocked, but allow SIGKILL. */
  41. allow_signal(SIGKILL);
  42. complete(&nfs_callback_info.started);
  43. while (nfs_callback_info.users != 0 || !signalled()) {
  44. /*
  45. * Listen for a request on the socket
  46. */
  47. err = svc_recv(serv, rqstp, MAX_SCHEDULE_TIMEOUT);
  48. if (err == -EAGAIN || err == -EINTR)
  49. continue;
  50. if (err < 0) {
  51. printk(KERN_WARNING
  52. "%s: terminating on error %d\n",
  53. __FUNCTION__, -err);
  54. break;
  55. }
  56. dprintk("%s: request from %u.%u.%u.%u\n", __FUNCTION__,
  57. NIPQUAD(rqstp->rq_addr.sin_addr.s_addr));
  58. svc_process(serv, rqstp);
  59. }
  60. nfs_callback_info.pid = 0;
  61. complete(&nfs_callback_info.stopped);
  62. unlock_kernel();
  63. module_put_and_exit(0);
  64. }
  65. /*
  66. * Bring up the server process if it is not already up.
  67. */
  68. int nfs_callback_up(void)
  69. {
  70. struct svc_serv *serv;
  71. struct svc_sock *svsk;
  72. int ret = 0;
  73. lock_kernel();
  74. down(&nfs_callback_sema);
  75. if (nfs_callback_info.users++ || nfs_callback_info.pid != 0)
  76. goto out;
  77. init_completion(&nfs_callback_info.started);
  78. init_completion(&nfs_callback_info.stopped);
  79. serv = svc_create(&nfs4_callback_program, NFS4_CALLBACK_BUFSIZE);
  80. ret = -ENOMEM;
  81. if (!serv)
  82. goto out_err;
  83. /* FIXME: We don't want to register this socket with the portmapper */
  84. ret = svc_makesock(serv, IPPROTO_TCP, 0);
  85. if (ret < 0)
  86. goto out_destroy;
  87. if (!list_empty(&serv->sv_permsocks)) {
  88. svsk = list_entry(serv->sv_permsocks.next,
  89. struct svc_sock, sk_list);
  90. nfs_callback_tcpport = ntohs(inet_sk(svsk->sk_sk)->sport);
  91. dprintk ("Callback port = 0x%x\n", nfs_callback_tcpport);
  92. } else
  93. BUG();
  94. ret = svc_create_thread(nfs_callback_svc, serv);
  95. if (ret < 0)
  96. goto out_destroy;
  97. nfs_callback_info.serv = serv;
  98. wait_for_completion(&nfs_callback_info.started);
  99. out:
  100. up(&nfs_callback_sema);
  101. unlock_kernel();
  102. return ret;
  103. out_destroy:
  104. svc_destroy(serv);
  105. out_err:
  106. nfs_callback_info.users--;
  107. goto out;
  108. }
  109. /*
  110. * Kill the server process if it is not already up.
  111. */
  112. int nfs_callback_down(void)
  113. {
  114. int ret = 0;
  115. lock_kernel();
  116. down(&nfs_callback_sema);
  117. if (--nfs_callback_info.users || nfs_callback_info.pid == 0)
  118. goto out;
  119. kill_proc(nfs_callback_info.pid, SIGKILL, 1);
  120. wait_for_completion(&nfs_callback_info.stopped);
  121. out:
  122. up(&nfs_callback_sema);
  123. unlock_kernel();
  124. return ret;
  125. }
  126. static int nfs_callback_authenticate(struct svc_rqst *rqstp)
  127. {
  128. struct in_addr *addr = &rqstp->rq_addr.sin_addr;
  129. struct nfs4_client *clp;
  130. /* Don't talk to strangers */
  131. clp = nfs4_find_client(addr);
  132. if (clp == NULL)
  133. return SVC_DROP;
  134. dprintk("%s: %u.%u.%u.%u NFSv4 callback!\n", __FUNCTION__, NIPQUAD(addr));
  135. nfs4_put_client(clp);
  136. switch (rqstp->rq_authop->flavour) {
  137. case RPC_AUTH_NULL:
  138. if (rqstp->rq_proc != CB_NULL)
  139. return SVC_DENIED;
  140. break;
  141. case RPC_AUTH_UNIX:
  142. break;
  143. case RPC_AUTH_GSS:
  144. /* FIXME: RPCSEC_GSS handling? */
  145. default:
  146. return SVC_DENIED;
  147. }
  148. return SVC_OK;
  149. }
  150. /*
  151. * Define NFS4 callback program
  152. */
  153. extern struct svc_version nfs4_callback_version1;
  154. static struct svc_version *nfs4_callback_version[] = {
  155. [1] = &nfs4_callback_version1,
  156. };
  157. static struct svc_stat nfs4_callback_stats;
  158. static struct svc_program nfs4_callback_program = {
  159. .pg_prog = NFS4_CALLBACK, /* RPC service number */
  160. .pg_nvers = ARRAY_SIZE(nfs4_callback_version), /* Number of entries */
  161. .pg_vers = nfs4_callback_version, /* version table */
  162. .pg_name = "NFSv4 callback", /* service name */
  163. .pg_class = "nfs", /* authentication class */
  164. .pg_stats = &nfs4_callback_stats,
  165. .pg_authenticate = nfs_callback_authenticate,
  166. };