diff options
author | James Morris <jmorris@namei.org> | 2009-02-05 19:01:45 -0500 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2009-02-05 19:01:45 -0500 |
commit | cb5629b10d64a8006622ce3a52bc887d91057d69 (patch) | |
tree | 7c06d8f30783115e3384721046258ce615b129c5 /fs/lockd/mon.c | |
parent | 8920d5ad6ba74ae8ab020e90cc4d976980e68701 (diff) | |
parent | f01d1d546abb2f4028b5299092f529eefb01253a (diff) |
Merge branch 'master' into next
Conflicts:
fs/namei.c
Manually merged per:
diff --cc fs/namei.c
index 734f2b5,bbc15c2..0000000
--- a/fs/namei.c
+++ b/fs/namei.c
@@@ -860,9 -848,8 +849,10 @@@ static int __link_path_walk(const char
nd->flags |= LOOKUP_CONTINUE;
err = exec_permission_lite(inode);
if (err == -EAGAIN)
- err = vfs_permission(nd, MAY_EXEC);
+ err = inode_permission(nd->path.dentry->d_inode,
+ MAY_EXEC);
+ if (!err)
+ err = ima_path_check(&nd->path, MAY_EXEC);
if (err)
break;
@@@ -1525,14 -1506,9 +1509,14 @@@ int may_open(struct path *path, int acc
flag &= ~O_TRUNC;
}
- error = vfs_permission(nd, acc_mode);
+ error = inode_permission(inode, acc_mode);
if (error)
return error;
+
- error = ima_path_check(&nd->path,
++ error = ima_path_check(path,
+ acc_mode & (MAY_READ | MAY_WRITE | MAY_EXEC));
+ if (error)
+ return error;
/*
* An append-only file must be opened in append mode for writing.
*/
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'fs/lockd/mon.c')
-rw-r--r-- | fs/lockd/mon.c | 569 |
1 files changed, 424 insertions, 145 deletions
diff --git a/fs/lockd/mon.c b/fs/lockd/mon.c index ffd3461f75ef..5e2c4d5ac827 100644 --- a/fs/lockd/mon.c +++ b/fs/lockd/mon.c | |||
@@ -9,35 +9,123 @@ | |||
9 | #include <linux/types.h> | 9 | #include <linux/types.h> |
10 | #include <linux/utsname.h> | 10 | #include <linux/utsname.h> |
11 | #include <linux/kernel.h> | 11 | #include <linux/kernel.h> |
12 | #include <linux/ktime.h> | ||
13 | |||
12 | #include <linux/sunrpc/clnt.h> | 14 | #include <linux/sunrpc/clnt.h> |
13 | #include <linux/sunrpc/xprtsock.h> | 15 | #include <linux/sunrpc/xprtsock.h> |
14 | #include <linux/sunrpc/svc.h> | 16 | #include <linux/sunrpc/svc.h> |
15 | #include <linux/lockd/lockd.h> | 17 | #include <linux/lockd/lockd.h> |
16 | #include <linux/lockd/sm_inter.h> | ||
17 | |||
18 | 18 | ||
19 | #define NLMDBG_FACILITY NLMDBG_MONITOR | 19 | #define NLMDBG_FACILITY NLMDBG_MONITOR |
20 | #define NSM_PROGRAM 100024 | ||
21 | #define NSM_VERSION 1 | ||
22 | |||
23 | enum { | ||
24 | NSMPROC_NULL, | ||
25 | NSMPROC_STAT, | ||
26 | NSMPROC_MON, | ||
27 | NSMPROC_UNMON, | ||
28 | NSMPROC_UNMON_ALL, | ||
29 | NSMPROC_SIMU_CRASH, | ||
30 | NSMPROC_NOTIFY, | ||
31 | }; | ||
32 | |||
33 | struct nsm_args { | ||
34 | struct nsm_private *priv; | ||
35 | u32 prog; /* RPC callback info */ | ||
36 | u32 vers; | ||
37 | u32 proc; | ||
20 | 38 | ||
21 | #define XDR_ADDRBUF_LEN (20) | 39 | char *mon_name; |
40 | }; | ||
22 | 41 | ||
23 | static struct rpc_clnt * nsm_create(void); | 42 | struct nsm_res { |
43 | u32 status; | ||
44 | u32 state; | ||
45 | }; | ||
24 | 46 | ||
25 | static struct rpc_program nsm_program; | 47 | static struct rpc_program nsm_program; |
48 | static LIST_HEAD(nsm_handles); | ||
49 | static DEFINE_SPINLOCK(nsm_lock); | ||
26 | 50 | ||
27 | /* | 51 | /* |
28 | * Local NSM state | 52 | * Local NSM state |
29 | */ | 53 | */ |
30 | int nsm_local_state; | 54 | int __read_mostly nsm_local_state; |
55 | int __read_mostly nsm_use_hostnames; | ||
31 | 56 | ||
32 | /* | 57 | static inline struct sockaddr *nsm_addr(const struct nsm_handle *nsm) |
33 | * Common procedure for SM_MON/SM_UNMON calls | 58 | { |
34 | */ | 59 | return (struct sockaddr *)&nsm->sm_addr; |
35 | static int | 60 | } |
36 | nsm_mon_unmon(struct nsm_handle *nsm, u32 proc, struct nsm_res *res) | 61 | |
62 | static void nsm_display_ipv4_address(const struct sockaddr *sap, char *buf, | ||
63 | const size_t len) | ||
64 | { | ||
65 | const struct sockaddr_in *sin = (struct sockaddr_in *)sap; | ||
66 | snprintf(buf, len, "%pI4", &sin->sin_addr.s_addr); | ||
67 | } | ||
68 | |||
69 | static void nsm_display_ipv6_address(const struct sockaddr *sap, char *buf, | ||
70 | const size_t len) | ||
71 | { | ||
72 | const struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap; | ||
73 | |||
74 | if (ipv6_addr_v4mapped(&sin6->sin6_addr)) | ||
75 | snprintf(buf, len, "%pI4", &sin6->sin6_addr.s6_addr32[3]); | ||
76 | else if (sin6->sin6_scope_id != 0) | ||
77 | snprintf(buf, len, "%pI6%%%u", &sin6->sin6_addr, | ||
78 | sin6->sin6_scope_id); | ||
79 | else | ||
80 | snprintf(buf, len, "%pI6", &sin6->sin6_addr); | ||
81 | } | ||
82 | |||
83 | static void nsm_display_address(const struct sockaddr *sap, | ||
84 | char *buf, const size_t len) | ||
85 | { | ||
86 | switch (sap->sa_family) { | ||
87 | case AF_INET: | ||
88 | nsm_display_ipv4_address(sap, buf, len); | ||
89 | break; | ||
90 | case AF_INET6: | ||
91 | nsm_display_ipv6_address(sap, buf, len); | ||
92 | break; | ||
93 | default: | ||
94 | snprintf(buf, len, "unsupported address family"); | ||
95 | break; | ||
96 | } | ||
97 | } | ||
98 | |||
99 | static struct rpc_clnt *nsm_create(void) | ||
100 | { | ||
101 | struct sockaddr_in sin = { | ||
102 | .sin_family = AF_INET, | ||
103 | .sin_addr.s_addr = htonl(INADDR_LOOPBACK), | ||
104 | }; | ||
105 | struct rpc_create_args args = { | ||
106 | .protocol = XPRT_TRANSPORT_UDP, | ||
107 | .address = (struct sockaddr *)&sin, | ||
108 | .addrsize = sizeof(sin), | ||
109 | .servername = "rpc.statd", | ||
110 | .program = &nsm_program, | ||
111 | .version = NSM_VERSION, | ||
112 | .authflavor = RPC_AUTH_NULL, | ||
113 | }; | ||
114 | |||
115 | return rpc_create(&args); | ||
116 | } | ||
117 | |||
118 | static int nsm_mon_unmon(struct nsm_handle *nsm, u32 proc, struct nsm_res *res) | ||
37 | { | 119 | { |
38 | struct rpc_clnt *clnt; | 120 | struct rpc_clnt *clnt; |
39 | int status; | 121 | int status; |
40 | struct nsm_args args; | 122 | struct nsm_args args = { |
123 | .priv = &nsm->sm_priv, | ||
124 | .prog = NLM_PROGRAM, | ||
125 | .vers = 3, | ||
126 | .proc = NLMPROC_NSM_NOTIFY, | ||
127 | .mon_name = nsm->sm_mon_name, | ||
128 | }; | ||
41 | struct rpc_message msg = { | 129 | struct rpc_message msg = { |
42 | .rpc_argp = &args, | 130 | .rpc_argp = &args, |
43 | .rpc_resp = res, | 131 | .rpc_resp = res, |
@@ -46,22 +134,18 @@ nsm_mon_unmon(struct nsm_handle *nsm, u32 proc, struct nsm_res *res) | |||
46 | clnt = nsm_create(); | 134 | clnt = nsm_create(); |
47 | if (IS_ERR(clnt)) { | 135 | if (IS_ERR(clnt)) { |
48 | status = PTR_ERR(clnt); | 136 | status = PTR_ERR(clnt); |
137 | dprintk("lockd: failed to create NSM upcall transport, " | ||
138 | "status=%d\n", status); | ||
49 | goto out; | 139 | goto out; |
50 | } | 140 | } |
51 | 141 | ||
52 | memset(&args, 0, sizeof(args)); | ||
53 | args.mon_name = nsm->sm_name; | ||
54 | args.addr = nsm_addr_in(nsm)->sin_addr.s_addr; | ||
55 | args.prog = NLM_PROGRAM; | ||
56 | args.vers = 3; | ||
57 | args.proc = NLMPROC_NSM_NOTIFY; | ||
58 | memset(res, 0, sizeof(*res)); | 142 | memset(res, 0, sizeof(*res)); |
59 | 143 | ||
60 | msg.rpc_proc = &clnt->cl_procinfo[proc]; | 144 | msg.rpc_proc = &clnt->cl_procinfo[proc]; |
61 | status = rpc_call_sync(clnt, &msg, 0); | 145 | status = rpc_call_sync(clnt, &msg, 0); |
62 | if (status < 0) | 146 | if (status < 0) |
63 | printk(KERN_DEBUG "nsm_mon_unmon: rpc failed, status=%d\n", | 147 | dprintk("lockd: NSM upcall RPC failed, status=%d\n", |
64 | status); | 148 | status); |
65 | else | 149 | else |
66 | status = 0; | 150 | status = 0; |
67 | rpc_shutdown_client(clnt); | 151 | rpc_shutdown_client(clnt); |
@@ -69,82 +153,272 @@ nsm_mon_unmon(struct nsm_handle *nsm, u32 proc, struct nsm_res *res) | |||
69 | return status; | 153 | return status; |
70 | } | 154 | } |
71 | 155 | ||
72 | /* | 156 | /** |
73 | * Set up monitoring of a remote host | 157 | * nsm_monitor - Notify a peer in case we reboot |
158 | * @host: pointer to nlm_host of peer to notify | ||
159 | * | ||
160 | * If this peer is not already monitored, this function sends an | ||
161 | * upcall to the local rpc.statd to record the name/address of | ||
162 | * the peer to notify in case we reboot. | ||
163 | * | ||
164 | * Returns zero if the peer is monitored by the local rpc.statd; | ||
165 | * otherwise a negative errno value is returned. | ||
74 | */ | 166 | */ |
75 | int | 167 | int nsm_monitor(const struct nlm_host *host) |
76 | nsm_monitor(struct nlm_host *host) | ||
77 | { | 168 | { |
78 | struct nsm_handle *nsm = host->h_nsmhandle; | 169 | struct nsm_handle *nsm = host->h_nsmhandle; |
79 | struct nsm_res res; | 170 | struct nsm_res res; |
80 | int status; | 171 | int status; |
81 | 172 | ||
82 | dprintk("lockd: nsm_monitor(%s)\n", host->h_name); | 173 | dprintk("lockd: nsm_monitor(%s)\n", nsm->sm_name); |
83 | BUG_ON(nsm == NULL); | ||
84 | 174 | ||
85 | if (nsm->sm_monitored) | 175 | if (nsm->sm_monitored) |
86 | return 0; | 176 | return 0; |
87 | 177 | ||
88 | status = nsm_mon_unmon(nsm, SM_MON, &res); | 178 | /* |
179 | * Choose whether to record the caller_name or IP address of | ||
180 | * this peer in the local rpc.statd's database. | ||
181 | */ | ||
182 | nsm->sm_mon_name = nsm_use_hostnames ? nsm->sm_name : nsm->sm_addrbuf; | ||
89 | 183 | ||
90 | if (status < 0 || res.status != 0) | 184 | status = nsm_mon_unmon(nsm, NSMPROC_MON, &res); |
91 | printk(KERN_NOTICE "lockd: cannot monitor %s\n", host->h_name); | 185 | if (res.status != 0) |
186 | status = -EIO; | ||
187 | if (status < 0) | ||
188 | printk(KERN_NOTICE "lockd: cannot monitor %s\n", nsm->sm_name); | ||
92 | else | 189 | else |
93 | nsm->sm_monitored = 1; | 190 | nsm->sm_monitored = 1; |
94 | return status; | 191 | return status; |
95 | } | 192 | } |
96 | 193 | ||
97 | /* | 194 | /** |
98 | * Cease to monitor remote host | 195 | * nsm_unmonitor - Unregister peer notification |
196 | * @host: pointer to nlm_host of peer to stop monitoring | ||
197 | * | ||
198 | * If this peer is monitored, this function sends an upcall to | ||
199 | * tell the local rpc.statd not to send this peer a notification | ||
200 | * when we reboot. | ||
99 | */ | 201 | */ |
100 | int | 202 | void nsm_unmonitor(const struct nlm_host *host) |
101 | nsm_unmonitor(struct nlm_host *host) | ||
102 | { | 203 | { |
103 | struct nsm_handle *nsm = host->h_nsmhandle; | 204 | struct nsm_handle *nsm = host->h_nsmhandle; |
104 | struct nsm_res res; | 205 | struct nsm_res res; |
105 | int status = 0; | 206 | int status; |
106 | |||
107 | if (nsm == NULL) | ||
108 | return 0; | ||
109 | host->h_nsmhandle = NULL; | ||
110 | 207 | ||
111 | if (atomic_read(&nsm->sm_count) == 1 | 208 | if (atomic_read(&nsm->sm_count) == 1 |
112 | && nsm->sm_monitored && !nsm->sm_sticky) { | 209 | && nsm->sm_monitored && !nsm->sm_sticky) { |
113 | dprintk("lockd: nsm_unmonitor(%s)\n", host->h_name); | 210 | dprintk("lockd: nsm_unmonitor(%s)\n", nsm->sm_name); |
114 | 211 | ||
115 | status = nsm_mon_unmon(nsm, SM_UNMON, &res); | 212 | status = nsm_mon_unmon(nsm, NSMPROC_UNMON, &res); |
213 | if (res.status != 0) | ||
214 | status = -EIO; | ||
116 | if (status < 0) | 215 | if (status < 0) |
117 | printk(KERN_NOTICE "lockd: cannot unmonitor %s\n", | 216 | printk(KERN_NOTICE "lockd: cannot unmonitor %s\n", |
118 | host->h_name); | 217 | nsm->sm_name); |
119 | else | 218 | else |
120 | nsm->sm_monitored = 0; | 219 | nsm->sm_monitored = 0; |
121 | } | 220 | } |
122 | nsm_release(nsm); | 221 | } |
123 | return status; | 222 | |
223 | static struct nsm_handle *nsm_lookup_hostname(const char *hostname, | ||
224 | const size_t len) | ||
225 | { | ||
226 | struct nsm_handle *nsm; | ||
227 | |||
228 | list_for_each_entry(nsm, &nsm_handles, sm_link) | ||
229 | if (strlen(nsm->sm_name) == len && | ||
230 | memcmp(nsm->sm_name, hostname, len) == 0) | ||
231 | return nsm; | ||
232 | return NULL; | ||
233 | } | ||
234 | |||
235 | static struct nsm_handle *nsm_lookup_addr(const struct sockaddr *sap) | ||
236 | { | ||
237 | struct nsm_handle *nsm; | ||
238 | |||
239 | list_for_each_entry(nsm, &nsm_handles, sm_link) | ||
240 | if (nlm_cmp_addr(nsm_addr(nsm), sap)) | ||
241 | return nsm; | ||
242 | return NULL; | ||
243 | } | ||
244 | |||
245 | static struct nsm_handle *nsm_lookup_priv(const struct nsm_private *priv) | ||
246 | { | ||
247 | struct nsm_handle *nsm; | ||
248 | |||
249 | list_for_each_entry(nsm, &nsm_handles, sm_link) | ||
250 | if (memcmp(nsm->sm_priv.data, priv->data, | ||
251 | sizeof(priv->data)) == 0) | ||
252 | return nsm; | ||
253 | return NULL; | ||
124 | } | 254 | } |
125 | 255 | ||
126 | /* | 256 | /* |
127 | * Create NSM client for the local host | 257 | * Construct a unique cookie to match this nsm_handle to this monitored |
258 | * host. It is passed to the local rpc.statd via NSMPROC_MON, and | ||
259 | * returned via NLMPROC_SM_NOTIFY, in the "priv" field of these | ||
260 | * requests. | ||
261 | * | ||
262 | * The NSM protocol requires that these cookies be unique while the | ||
263 | * system is running. We prefer a stronger requirement of making them | ||
264 | * unique across reboots. If user space bugs cause a stale cookie to | ||
265 | * be sent to the kernel, it could cause the wrong host to lose its | ||
266 | * lock state if cookies were not unique across reboots. | ||
267 | * | ||
268 | * The cookies are exposed only to local user space via loopback. They | ||
269 | * do not appear on the physical network. If we want greater security | ||
270 | * for some reason, nsm_init_private() could perform a one-way hash to | ||
271 | * obscure the contents of the cookie. | ||
128 | */ | 272 | */ |
129 | static struct rpc_clnt * | 273 | static void nsm_init_private(struct nsm_handle *nsm) |
130 | nsm_create(void) | ||
131 | { | 274 | { |
132 | struct sockaddr_in sin = { | 275 | u64 *p = (u64 *)&nsm->sm_priv.data; |
133 | .sin_family = AF_INET, | 276 | struct timespec ts; |
134 | .sin_addr.s_addr = htonl(INADDR_LOOPBACK), | ||
135 | .sin_port = 0, | ||
136 | }; | ||
137 | struct rpc_create_args args = { | ||
138 | .protocol = XPRT_TRANSPORT_UDP, | ||
139 | .address = (struct sockaddr *)&sin, | ||
140 | .addrsize = sizeof(sin), | ||
141 | .servername = "localhost", | ||
142 | .program = &nsm_program, | ||
143 | .version = SM_VERSION, | ||
144 | .authflavor = RPC_AUTH_NULL, | ||
145 | }; | ||
146 | 277 | ||
147 | return rpc_create(&args); | 278 | ktime_get_ts(&ts); |
279 | *p++ = timespec_to_ns(&ts); | ||
280 | *p = (unsigned long)nsm; | ||
281 | } | ||
282 | |||
283 | static struct nsm_handle *nsm_create_handle(const struct sockaddr *sap, | ||
284 | const size_t salen, | ||
285 | const char *hostname, | ||
286 | const size_t hostname_len) | ||
287 | { | ||
288 | struct nsm_handle *new; | ||
289 | |||
290 | new = kzalloc(sizeof(*new) + hostname_len + 1, GFP_KERNEL); | ||
291 | if (unlikely(new == NULL)) | ||
292 | return NULL; | ||
293 | |||
294 | atomic_set(&new->sm_count, 1); | ||
295 | new->sm_name = (char *)(new + 1); | ||
296 | memcpy(nsm_addr(new), sap, salen); | ||
297 | new->sm_addrlen = salen; | ||
298 | nsm_init_private(new); | ||
299 | nsm_display_address((const struct sockaddr *)&new->sm_addr, | ||
300 | new->sm_addrbuf, sizeof(new->sm_addrbuf)); | ||
301 | memcpy(new->sm_name, hostname, hostname_len); | ||
302 | new->sm_name[hostname_len] = '\0'; | ||
303 | |||
304 | return new; | ||
305 | } | ||
306 | |||
307 | /** | ||
308 | * nsm_get_handle - Find or create a cached nsm_handle | ||
309 | * @sap: pointer to socket address of handle to find | ||
310 | * @salen: length of socket address | ||
311 | * @hostname: pointer to C string containing hostname to find | ||
312 | * @hostname_len: length of C string | ||
313 | * | ||
314 | * Behavior is modulated by the global nsm_use_hostnames variable. | ||
315 | * | ||
316 | * Returns a cached nsm_handle after bumping its ref count, or | ||
317 | * returns a fresh nsm_handle if a handle that matches @sap and/or | ||
318 | * @hostname cannot be found in the handle cache. Returns NULL if | ||
319 | * an error occurs. | ||
320 | */ | ||
321 | struct nsm_handle *nsm_get_handle(const struct sockaddr *sap, | ||
322 | const size_t salen, const char *hostname, | ||
323 | const size_t hostname_len) | ||
324 | { | ||
325 | struct nsm_handle *cached, *new = NULL; | ||
326 | |||
327 | if (hostname && memchr(hostname, '/', hostname_len) != NULL) { | ||
328 | if (printk_ratelimit()) { | ||
329 | printk(KERN_WARNING "Invalid hostname \"%.*s\" " | ||
330 | "in NFS lock request\n", | ||
331 | (int)hostname_len, hostname); | ||
332 | } | ||
333 | return NULL; | ||
334 | } | ||
335 | |||
336 | retry: | ||
337 | spin_lock(&nsm_lock); | ||
338 | |||
339 | if (nsm_use_hostnames && hostname != NULL) | ||
340 | cached = nsm_lookup_hostname(hostname, hostname_len); | ||
341 | else | ||
342 | cached = nsm_lookup_addr(sap); | ||
343 | |||
344 | if (cached != NULL) { | ||
345 | atomic_inc(&cached->sm_count); | ||
346 | spin_unlock(&nsm_lock); | ||
347 | kfree(new); | ||
348 | dprintk("lockd: found nsm_handle for %s (%s), " | ||
349 | "cnt %d\n", cached->sm_name, | ||
350 | cached->sm_addrbuf, | ||
351 | atomic_read(&cached->sm_count)); | ||
352 | return cached; | ||
353 | } | ||
354 | |||
355 | if (new != NULL) { | ||
356 | list_add(&new->sm_link, &nsm_handles); | ||
357 | spin_unlock(&nsm_lock); | ||
358 | dprintk("lockd: created nsm_handle for %s (%s)\n", | ||
359 | new->sm_name, new->sm_addrbuf); | ||
360 | return new; | ||
361 | } | ||
362 | |||
363 | spin_unlock(&nsm_lock); | ||
364 | |||
365 | new = nsm_create_handle(sap, salen, hostname, hostname_len); | ||
366 | if (unlikely(new == NULL)) | ||
367 | return NULL; | ||
368 | goto retry; | ||
369 | } | ||
370 | |||
371 | /** | ||
372 | * nsm_reboot_lookup - match NLMPROC_SM_NOTIFY arguments to an nsm_handle | ||
373 | * @info: pointer to NLMPROC_SM_NOTIFY arguments | ||
374 | * | ||
375 | * Returns a matching nsm_handle if found in the nsm cache; the returned | ||
376 | * nsm_handle's reference count is bumped and sm_monitored is cleared. | ||
377 | * Otherwise returns NULL if some error occurred. | ||
378 | */ | ||
379 | struct nsm_handle *nsm_reboot_lookup(const struct nlm_reboot *info) | ||
380 | { | ||
381 | struct nsm_handle *cached; | ||
382 | |||
383 | spin_lock(&nsm_lock); | ||
384 | |||
385 | cached = nsm_lookup_priv(&info->priv); | ||
386 | if (unlikely(cached == NULL)) { | ||
387 | spin_unlock(&nsm_lock); | ||
388 | dprintk("lockd: never saw rebooted peer '%.*s' before\n", | ||
389 | info->len, info->mon); | ||
390 | return cached; | ||
391 | } | ||
392 | |||
393 | atomic_inc(&cached->sm_count); | ||
394 | spin_unlock(&nsm_lock); | ||
395 | |||
396 | /* | ||
397 | * During subsequent lock activity, force a fresh | ||
398 | * notification to be set up for this host. | ||
399 | */ | ||
400 | cached->sm_monitored = 0; | ||
401 | |||
402 | dprintk("lockd: host %s (%s) rebooted, cnt %d\n", | ||
403 | cached->sm_name, cached->sm_addrbuf, | ||
404 | atomic_read(&cached->sm_count)); | ||
405 | return cached; | ||
406 | } | ||
407 | |||
408 | /** | ||
409 | * nsm_release - Release an NSM handle | ||
410 | * @nsm: pointer to handle to be released | ||
411 | * | ||
412 | */ | ||
413 | void nsm_release(struct nsm_handle *nsm) | ||
414 | { | ||
415 | if (atomic_dec_and_lock(&nsm->sm_count, &nsm_lock)) { | ||
416 | list_del(&nsm->sm_link); | ||
417 | spin_unlock(&nsm_lock); | ||
418 | dprintk("lockd: destroyed nsm_handle for %s (%s)\n", | ||
419 | nsm->sm_name, nsm->sm_addrbuf); | ||
420 | kfree(nsm); | ||
421 | } | ||
148 | } | 422 | } |
149 | 423 | ||
150 | /* | 424 | /* |
@@ -154,127 +428,132 @@ nsm_create(void) | |||
154 | * Status Monitor wire protocol. | 428 | * Status Monitor wire protocol. |
155 | */ | 429 | */ |
156 | 430 | ||
157 | static __be32 *xdr_encode_nsm_string(__be32 *p, char *string) | 431 | static int encode_nsm_string(struct xdr_stream *xdr, const char *string) |
158 | { | 432 | { |
159 | size_t len = strlen(string); | 433 | const u32 len = strlen(string); |
160 | 434 | __be32 *p; | |
161 | if (len > SM_MAXSTRLEN) | 435 | |
162 | len = SM_MAXSTRLEN; | 436 | if (unlikely(len > SM_MAXSTRLEN)) |
163 | return xdr_encode_opaque(p, string, len); | 437 | return -EIO; |
438 | p = xdr_reserve_space(xdr, sizeof(u32) + len); | ||
439 | if (unlikely(p == NULL)) | ||
440 | return -EIO; | ||
441 | xdr_encode_opaque(p, string, len); | ||
442 | return 0; | ||
164 | } | 443 | } |
165 | 444 | ||
166 | /* | 445 | /* |
167 | * "mon_name" specifies the host to be monitored. | 446 | * "mon_name" specifies the host to be monitored. |
168 | * | ||
169 | * Linux uses a text version of the IP address of the remote | ||
170 | * host as the host identifier (the "mon_name" argument). | ||
171 | * | ||
172 | * Linux statd always looks up the canonical hostname first for | ||
173 | * whatever remote hostname it receives, so this works alright. | ||
174 | */ | 447 | */ |
175 | static __be32 *xdr_encode_mon_name(__be32 *p, struct nsm_args *argp) | 448 | static int encode_mon_name(struct xdr_stream *xdr, const struct nsm_args *argp) |
176 | { | 449 | { |
177 | char buffer[XDR_ADDRBUF_LEN + 1]; | 450 | return encode_nsm_string(xdr, argp->mon_name); |
178 | char *name = argp->mon_name; | ||
179 | |||
180 | if (!nsm_use_hostnames) { | ||
181 | snprintf(buffer, XDR_ADDRBUF_LEN, | ||
182 | "%pI4", &argp->addr); | ||
183 | name = buffer; | ||
184 | } | ||
185 | |||
186 | return xdr_encode_nsm_string(p, name); | ||
187 | } | 451 | } |
188 | 452 | ||
189 | /* | 453 | /* |
190 | * The "my_id" argument specifies the hostname and RPC procedure | 454 | * The "my_id" argument specifies the hostname and RPC procedure |
191 | * to be called when the status manager receives notification | 455 | * to be called when the status manager receives notification |
192 | * (via the SM_NOTIFY call) that the state of host "mon_name" | 456 | * (via the NLMPROC_SM_NOTIFY call) that the state of host "mon_name" |
193 | * has changed. | 457 | * has changed. |
194 | */ | 458 | */ |
195 | static __be32 *xdr_encode_my_id(__be32 *p, struct nsm_args *argp) | 459 | static int encode_my_id(struct xdr_stream *xdr, const struct nsm_args *argp) |
196 | { | 460 | { |
197 | p = xdr_encode_nsm_string(p, utsname()->nodename); | 461 | int status; |
198 | if (!p) | 462 | __be32 *p; |
199 | return ERR_PTR(-EIO); | 463 | |
200 | 464 | status = encode_nsm_string(xdr, utsname()->nodename); | |
465 | if (unlikely(status != 0)) | ||
466 | return status; | ||
467 | p = xdr_reserve_space(xdr, 3 * sizeof(u32)); | ||
468 | if (unlikely(p == NULL)) | ||
469 | return -EIO; | ||
201 | *p++ = htonl(argp->prog); | 470 | *p++ = htonl(argp->prog); |
202 | *p++ = htonl(argp->vers); | 471 | *p++ = htonl(argp->vers); |
203 | *p++ = htonl(argp->proc); | 472 | *p++ = htonl(argp->proc); |
204 | 473 | return 0; | |
205 | return p; | ||
206 | } | 474 | } |
207 | 475 | ||
208 | /* | 476 | /* |
209 | * The "mon_id" argument specifies the non-private arguments | 477 | * The "mon_id" argument specifies the non-private arguments |
210 | * of an SM_MON or SM_UNMON call. | 478 | * of an NSMPROC_MON or NSMPROC_UNMON call. |
211 | */ | 479 | */ |
212 | static __be32 *xdr_encode_mon_id(__be32 *p, struct nsm_args *argp) | 480 | static int encode_mon_id(struct xdr_stream *xdr, const struct nsm_args *argp) |
213 | { | 481 | { |
214 | p = xdr_encode_mon_name(p, argp); | 482 | int status; |
215 | if (!p) | ||
216 | return ERR_PTR(-EIO); | ||
217 | 483 | ||
218 | return xdr_encode_my_id(p, argp); | 484 | status = encode_mon_name(xdr, argp); |
485 | if (unlikely(status != 0)) | ||
486 | return status; | ||
487 | return encode_my_id(xdr, argp); | ||
219 | } | 488 | } |
220 | 489 | ||
221 | /* | 490 | /* |
222 | * The "priv" argument may contain private information required | 491 | * The "priv" argument may contain private information required |
223 | * by the SM_MON call. This information will be supplied in the | 492 | * by the NSMPROC_MON call. This information will be supplied in the |
224 | * SM_NOTIFY call. | 493 | * NLMPROC_SM_NOTIFY call. |
225 | * | ||
226 | * Linux provides the raw IP address of the monitored host, | ||
227 | * left in network byte order. | ||
228 | */ | 494 | */ |
229 | static __be32 *xdr_encode_priv(__be32 *p, struct nsm_args *argp) | 495 | static int encode_priv(struct xdr_stream *xdr, const struct nsm_args *argp) |
230 | { | 496 | { |
231 | *p++ = argp->addr; | 497 | __be32 *p; |
232 | *p++ = 0; | ||
233 | *p++ = 0; | ||
234 | *p++ = 0; | ||
235 | 498 | ||
236 | return p; | 499 | p = xdr_reserve_space(xdr, SM_PRIV_SIZE); |
500 | if (unlikely(p == NULL)) | ||
501 | return -EIO; | ||
502 | xdr_encode_opaque_fixed(p, argp->priv->data, SM_PRIV_SIZE); | ||
503 | return 0; | ||
237 | } | 504 | } |
238 | 505 | ||
239 | static int | 506 | static int xdr_enc_mon(struct rpc_rqst *req, __be32 *p, |
240 | xdr_encode_mon(struct rpc_rqst *rqstp, __be32 *p, struct nsm_args *argp) | 507 | const struct nsm_args *argp) |
241 | { | 508 | { |
242 | p = xdr_encode_mon_id(p, argp); | 509 | struct xdr_stream xdr; |
243 | if (IS_ERR(p)) | 510 | int status; |
244 | return PTR_ERR(p); | 511 | |
245 | 512 | xdr_init_encode(&xdr, &req->rq_snd_buf, p); | |
246 | p = xdr_encode_priv(p, argp); | 513 | status = encode_mon_id(&xdr, argp); |
247 | if (IS_ERR(p)) | 514 | if (unlikely(status)) |
248 | return PTR_ERR(p); | 515 | return status; |
249 | 516 | return encode_priv(&xdr, argp); | |
250 | rqstp->rq_slen = xdr_adjust_iovec(rqstp->rq_svec, p); | ||
251 | return 0; | ||
252 | } | 517 | } |
253 | 518 | ||
254 | static int | 519 | static int xdr_enc_unmon(struct rpc_rqst *req, __be32 *p, |
255 | xdr_encode_unmon(struct rpc_rqst *rqstp, __be32 *p, struct nsm_args *argp) | 520 | const struct nsm_args *argp) |
256 | { | 521 | { |
257 | p = xdr_encode_mon_id(p, argp); | 522 | struct xdr_stream xdr; |
258 | if (IS_ERR(p)) | 523 | |
259 | return PTR_ERR(p); | 524 | xdr_init_encode(&xdr, &req->rq_snd_buf, p); |
260 | rqstp->rq_slen = xdr_adjust_iovec(rqstp->rq_svec, p); | 525 | return encode_mon_id(&xdr, argp); |
261 | return 0; | ||
262 | } | 526 | } |
263 | 527 | ||
264 | static int | 528 | static int xdr_dec_stat_res(struct rpc_rqst *rqstp, __be32 *p, |
265 | xdr_decode_stat_res(struct rpc_rqst *rqstp, __be32 *p, struct nsm_res *resp) | 529 | struct nsm_res *resp) |
266 | { | 530 | { |
531 | struct xdr_stream xdr; | ||
532 | |||
533 | xdr_init_decode(&xdr, &rqstp->rq_rcv_buf, p); | ||
534 | p = xdr_inline_decode(&xdr, 2 * sizeof(u32)); | ||
535 | if (unlikely(p == NULL)) | ||
536 | return -EIO; | ||
267 | resp->status = ntohl(*p++); | 537 | resp->status = ntohl(*p++); |
268 | resp->state = ntohl(*p++); | 538 | resp->state = ntohl(*p); |
269 | dprintk("nsm: xdr_decode_stat_res status %d state %d\n", | 539 | |
540 | dprintk("lockd: xdr_dec_stat_res status %d state %d\n", | ||
270 | resp->status, resp->state); | 541 | resp->status, resp->state); |
271 | return 0; | 542 | return 0; |
272 | } | 543 | } |
273 | 544 | ||
274 | static int | 545 | static int xdr_dec_stat(struct rpc_rqst *rqstp, __be32 *p, |
275 | xdr_decode_stat(struct rpc_rqst *rqstp, __be32 *p, struct nsm_res *resp) | 546 | struct nsm_res *resp) |
276 | { | 547 | { |
277 | resp->state = ntohl(*p++); | 548 | struct xdr_stream xdr; |
549 | |||
550 | xdr_init_decode(&xdr, &rqstp->rq_rcv_buf, p); | ||
551 | p = xdr_inline_decode(&xdr, sizeof(u32)); | ||
552 | if (unlikely(p == NULL)) | ||
553 | return -EIO; | ||
554 | resp->state = ntohl(*p); | ||
555 | |||
556 | dprintk("lockd: xdr_dec_stat state %d\n", resp->state); | ||
278 | return 0; | 557 | return 0; |
279 | } | 558 | } |
280 | 559 | ||
@@ -288,22 +567,22 @@ xdr_decode_stat(struct rpc_rqst *rqstp, __be32 *p, struct nsm_res *resp) | |||
288 | #define SM_unmonres_sz 1 | 567 | #define SM_unmonres_sz 1 |
289 | 568 | ||
290 | static struct rpc_procinfo nsm_procedures[] = { | 569 | static struct rpc_procinfo nsm_procedures[] = { |
291 | [SM_MON] = { | 570 | [NSMPROC_MON] = { |
292 | .p_proc = SM_MON, | 571 | .p_proc = NSMPROC_MON, |
293 | .p_encode = (kxdrproc_t) xdr_encode_mon, | 572 | .p_encode = (kxdrproc_t)xdr_enc_mon, |
294 | .p_decode = (kxdrproc_t) xdr_decode_stat_res, | 573 | .p_decode = (kxdrproc_t)xdr_dec_stat_res, |
295 | .p_arglen = SM_mon_sz, | 574 | .p_arglen = SM_mon_sz, |
296 | .p_replen = SM_monres_sz, | 575 | .p_replen = SM_monres_sz, |
297 | .p_statidx = SM_MON, | 576 | .p_statidx = NSMPROC_MON, |
298 | .p_name = "MONITOR", | 577 | .p_name = "MONITOR", |
299 | }, | 578 | }, |
300 | [SM_UNMON] = { | 579 | [NSMPROC_UNMON] = { |
301 | .p_proc = SM_UNMON, | 580 | .p_proc = NSMPROC_UNMON, |
302 | .p_encode = (kxdrproc_t) xdr_encode_unmon, | 581 | .p_encode = (kxdrproc_t)xdr_enc_unmon, |
303 | .p_decode = (kxdrproc_t) xdr_decode_stat, | 582 | .p_decode = (kxdrproc_t)xdr_dec_stat, |
304 | .p_arglen = SM_mon_id_sz, | 583 | .p_arglen = SM_mon_id_sz, |
305 | .p_replen = SM_unmonres_sz, | 584 | .p_replen = SM_unmonres_sz, |
306 | .p_statidx = SM_UNMON, | 585 | .p_statidx = NSMPROC_UNMON, |
307 | .p_name = "UNMONITOR", | 586 | .p_name = "UNMONITOR", |
308 | }, | 587 | }, |
309 | }; | 588 | }; |
@@ -322,7 +601,7 @@ static struct rpc_stat nsm_stats; | |||
322 | 601 | ||
323 | static struct rpc_program nsm_program = { | 602 | static struct rpc_program nsm_program = { |
324 | .name = "statd", | 603 | .name = "statd", |
325 | .number = SM_PROGRAM, | 604 | .number = NSM_PROGRAM, |
326 | .nrvers = ARRAY_SIZE(nsm_version), | 605 | .nrvers = ARRAY_SIZE(nsm_version), |
327 | .version = nsm_version, | 606 | .version = nsm_version, |
328 | .stats = &nsm_stats | 607 | .stats = &nsm_stats |