callback.c 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198
  1. /*
  2. * linux/fs/nfs/callback.c
  3. *
  4. * Copyright (C) 2004 Trond Myklebust
  5. *
  6. * NFSv4 callback handling
  7. */
  8. #include <linux/completion.h>
  9. #include <linux/ip.h>
  10. #include <linux/module.h>
  11. #include <linux/smp_lock.h>
  12. #include <linux/sunrpc/svc.h>
  13. #include <linux/sunrpc/svcsock.h>
  14. #include <linux/nfs_fs.h>
  15. #include <linux/mutex.h>
  16. #include <net/inet_sock.h>
  17. #include "nfs4_fs.h"
  18. #include "callback.h"
  19. #define NFSDBG_FACILITY NFSDBG_CALLBACK
  20. struct nfs_callback_data {
  21. unsigned int users;
  22. struct svc_serv *serv;
  23. pid_t pid;
  24. struct completion started;
  25. struct completion stopped;
  26. };
  27. static struct nfs_callback_data nfs_callback_info;
  28. static DEFINE_MUTEX(nfs_callback_mutex);
  29. static struct svc_program nfs4_callback_program;
  30. unsigned int nfs_callback_set_tcpport;
  31. unsigned short nfs_callback_tcpport;
  32. /*
  33. * This is the callback kernel thread.
  34. */
  35. static void nfs_callback_svc(struct svc_rqst *rqstp)
  36. {
  37. struct svc_serv *serv = rqstp->rq_server;
  38. int err;
  39. __module_get(THIS_MODULE);
  40. lock_kernel();
  41. nfs_callback_info.pid = current->pid;
  42. daemonize("nfsv4-svc");
  43. /* Process request with signals blocked, but allow SIGKILL. */
  44. allow_signal(SIGKILL);
  45. complete(&nfs_callback_info.started);
  46. for(;;) {
  47. if (signalled()) {
  48. if (nfs_callback_info.users == 0)
  49. break;
  50. flush_signals(current);
  51. }
  52. /*
  53. * Listen for a request on the socket
  54. */
  55. err = svc_recv(serv, rqstp, MAX_SCHEDULE_TIMEOUT);
  56. if (err == -EAGAIN || err == -EINTR)
  57. continue;
  58. if (err < 0) {
  59. printk(KERN_WARNING
  60. "%s: terminating on error %d\n",
  61. __FUNCTION__, -err);
  62. break;
  63. }
  64. dprintk("%s: request from %u.%u.%u.%u\n", __FUNCTION__,
  65. NIPQUAD(rqstp->rq_addr.sin_addr.s_addr));
  66. svc_process(serv, rqstp);
  67. }
  68. svc_exit_thread(rqstp);
  69. nfs_callback_info.pid = 0;
  70. complete(&nfs_callback_info.stopped);
  71. unlock_kernel();
  72. module_put_and_exit(0);
  73. }
  74. /*
  75. * Bring up the server process if it is not already up.
  76. */
  77. int nfs_callback_up(void)
  78. {
  79. struct svc_serv *serv;
  80. struct svc_sock *svsk;
  81. int ret = 0;
  82. lock_kernel();
  83. mutex_lock(&nfs_callback_mutex);
  84. if (nfs_callback_info.users++ || nfs_callback_info.pid != 0)
  85. goto out;
  86. init_completion(&nfs_callback_info.started);
  87. init_completion(&nfs_callback_info.stopped);
  88. serv = svc_create(&nfs4_callback_program, NFS4_CALLBACK_BUFSIZE);
  89. ret = -ENOMEM;
  90. if (!serv)
  91. goto out_err;
  92. /* FIXME: We don't want to register this socket with the portmapper */
  93. ret = svc_makesock(serv, IPPROTO_TCP, nfs_callback_set_tcpport);
  94. if (ret < 0)
  95. goto out_destroy;
  96. if (!list_empty(&serv->sv_permsocks)) {
  97. svsk = list_entry(serv->sv_permsocks.next,
  98. struct svc_sock, sk_list);
  99. nfs_callback_tcpport = ntohs(inet_sk(svsk->sk_sk)->sport);
  100. dprintk ("Callback port = 0x%x\n", nfs_callback_tcpport);
  101. } else
  102. BUG();
  103. ret = svc_create_thread(nfs_callback_svc, serv);
  104. if (ret < 0)
  105. goto out_destroy;
  106. nfs_callback_info.serv = serv;
  107. wait_for_completion(&nfs_callback_info.started);
  108. out:
  109. mutex_unlock(&nfs_callback_mutex);
  110. unlock_kernel();
  111. return ret;
  112. out_destroy:
  113. svc_destroy(serv);
  114. out_err:
  115. nfs_callback_info.users--;
  116. goto out;
  117. }
  118. /*
  119. * Kill the server process if it is not already up.
  120. */
  121. int nfs_callback_down(void)
  122. {
  123. int ret = 0;
  124. lock_kernel();
  125. mutex_lock(&nfs_callback_mutex);
  126. nfs_callback_info.users--;
  127. do {
  128. if (nfs_callback_info.users != 0 || nfs_callback_info.pid == 0)
  129. break;
  130. if (kill_proc(nfs_callback_info.pid, SIGKILL, 1) < 0)
  131. break;
  132. } while (wait_for_completion_timeout(&nfs_callback_info.stopped, 5*HZ) == 0);
  133. mutex_unlock(&nfs_callback_mutex);
  134. unlock_kernel();
  135. return ret;
  136. }
  137. static int nfs_callback_authenticate(struct svc_rqst *rqstp)
  138. {
  139. struct in_addr *addr = &rqstp->rq_addr.sin_addr;
  140. struct nfs4_client *clp;
  141. /* Don't talk to strangers */
  142. clp = nfs4_find_client(addr);
  143. if (clp == NULL)
  144. return SVC_DROP;
  145. dprintk("%s: %u.%u.%u.%u NFSv4 callback!\n", __FUNCTION__, NIPQUAD(addr));
  146. nfs4_put_client(clp);
  147. switch (rqstp->rq_authop->flavour) {
  148. case RPC_AUTH_NULL:
  149. if (rqstp->rq_proc != CB_NULL)
  150. return SVC_DENIED;
  151. break;
  152. case RPC_AUTH_UNIX:
  153. break;
  154. case RPC_AUTH_GSS:
  155. /* FIXME: RPCSEC_GSS handling? */
  156. default:
  157. return SVC_DENIED;
  158. }
  159. return SVC_OK;
  160. }
  161. /*
  162. * Define NFS4 callback program
  163. */
  164. static struct svc_version *nfs4_callback_version[] = {
  165. [1] = &nfs4_callback_version1,
  166. };
  167. static struct svc_stat nfs4_callback_stats;
  168. static struct svc_program nfs4_callback_program = {
  169. .pg_prog = NFS4_CALLBACK, /* RPC service number */
  170. .pg_nvers = ARRAY_SIZE(nfs4_callback_version), /* Number of entries */
  171. .pg_vers = nfs4_callback_version, /* version table */
  172. .pg_name = "NFSv4 callback", /* service name */
  173. .pg_class = "nfs", /* authentication class */
  174. .pg_stats = &nfs4_callback_stats,
  175. .pg_authenticate = nfs_callback_authenticate,
  176. };