diff options
Diffstat (limited to 'fs/lockd/mon.c')
| -rw-r--r-- | fs/lockd/mon.c | 569 |
1 files changed, 424 insertions, 145 deletions
diff --git a/fs/lockd/mon.c b/fs/lockd/mon.c index ffd3461f75ef..5e2c4d5ac827 100644 --- a/fs/lockd/mon.c +++ b/fs/lockd/mon.c | |||
| @@ -9,35 +9,123 @@ | |||
| 9 | #include <linux/types.h> | 9 | #include <linux/types.h> |
| 10 | #include <linux/utsname.h> | 10 | #include <linux/utsname.h> |
| 11 | #include <linux/kernel.h> | 11 | #include <linux/kernel.h> |
| 12 | #include <linux/ktime.h> | ||
| 13 | |||
| 12 | #include <linux/sunrpc/clnt.h> | 14 | #include <linux/sunrpc/clnt.h> |
| 13 | #include <linux/sunrpc/xprtsock.h> | 15 | #include <linux/sunrpc/xprtsock.h> |
| 14 | #include <linux/sunrpc/svc.h> | 16 | #include <linux/sunrpc/svc.h> |
| 15 | #include <linux/lockd/lockd.h> | 17 | #include <linux/lockd/lockd.h> |
| 16 | #include <linux/lockd/sm_inter.h> | ||
| 17 | |||
| 18 | 18 | ||
| 19 | #define NLMDBG_FACILITY NLMDBG_MONITOR | 19 | #define NLMDBG_FACILITY NLMDBG_MONITOR |
| 20 | #define NSM_PROGRAM 100024 | ||
| 21 | #define NSM_VERSION 1 | ||
| 22 | |||
| 23 | enum { | ||
| 24 | NSMPROC_NULL, | ||
| 25 | NSMPROC_STAT, | ||
| 26 | NSMPROC_MON, | ||
| 27 | NSMPROC_UNMON, | ||
| 28 | NSMPROC_UNMON_ALL, | ||
| 29 | NSMPROC_SIMU_CRASH, | ||
| 30 | NSMPROC_NOTIFY, | ||
| 31 | }; | ||
| 32 | |||
| 33 | struct nsm_args { | ||
| 34 | struct nsm_private *priv; | ||
| 35 | u32 prog; /* RPC callback info */ | ||
| 36 | u32 vers; | ||
| 37 | u32 proc; | ||
| 20 | 38 | ||
| 21 | #define XDR_ADDRBUF_LEN (20) | 39 | char *mon_name; |
| 40 | }; | ||
| 22 | 41 | ||
| 23 | static struct rpc_clnt * nsm_create(void); | 42 | struct nsm_res { |
| 43 | u32 status; | ||
| 44 | u32 state; | ||
| 45 | }; | ||
| 24 | 46 | ||
| 25 | static struct rpc_program nsm_program; | 47 | static struct rpc_program nsm_program; |
| 48 | static LIST_HEAD(nsm_handles); | ||
| 49 | static DEFINE_SPINLOCK(nsm_lock); | ||
| 26 | 50 | ||
| 27 | /* | 51 | /* |
| 28 | * Local NSM state | 52 | * Local NSM state |
| 29 | */ | 53 | */ |
| 30 | int nsm_local_state; | 54 | int __read_mostly nsm_local_state; |
| 55 | int __read_mostly nsm_use_hostnames; | ||
| 31 | 56 | ||
| 32 | /* | 57 | static inline struct sockaddr *nsm_addr(const struct nsm_handle *nsm) |
| 33 | * Common procedure for SM_MON/SM_UNMON calls | 58 | { |
| 34 | */ | 59 | return (struct sockaddr *)&nsm->sm_addr; |
| 35 | static int | 60 | } |
| 36 | nsm_mon_unmon(struct nsm_handle *nsm, u32 proc, struct nsm_res *res) | 61 | |
| 62 | static void nsm_display_ipv4_address(const struct sockaddr *sap, char *buf, | ||
| 63 | const size_t len) | ||
| 64 | { | ||
| 65 | const struct sockaddr_in *sin = (struct sockaddr_in *)sap; | ||
| 66 | snprintf(buf, len, "%pI4", &sin->sin_addr.s_addr); | ||
| 67 | } | ||
| 68 | |||
| 69 | static void nsm_display_ipv6_address(const struct sockaddr *sap, char *buf, | ||
| 70 | const size_t len) | ||
| 71 | { | ||
| 72 | const struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap; | ||
| 73 | |||
| 74 | if (ipv6_addr_v4mapped(&sin6->sin6_addr)) | ||
| 75 | snprintf(buf, len, "%pI4", &sin6->sin6_addr.s6_addr32[3]); | ||
| 76 | else if (sin6->sin6_scope_id != 0) | ||
| 77 | snprintf(buf, len, "%pI6%%%u", &sin6->sin6_addr, | ||
| 78 | sin6->sin6_scope_id); | ||
| 79 | else | ||
| 80 | snprintf(buf, len, "%pI6", &sin6->sin6_addr); | ||
| 81 | } | ||
| 82 | |||
| 83 | static void nsm_display_address(const struct sockaddr *sap, | ||
| 84 | char *buf, const size_t len) | ||
| 85 | { | ||
| 86 | switch (sap->sa_family) { | ||
| 87 | case AF_INET: | ||
| 88 | nsm_display_ipv4_address(sap, buf, len); | ||
| 89 | break; | ||
| 90 | case AF_INET6: | ||
| 91 | nsm_display_ipv6_address(sap, buf, len); | ||
| 92 | break; | ||
| 93 | default: | ||
| 94 | snprintf(buf, len, "unsupported address family"); | ||
| 95 | break; | ||
| 96 | } | ||
| 97 | } | ||
| 98 | |||
| 99 | static struct rpc_clnt *nsm_create(void) | ||
| 100 | { | ||
| 101 | struct sockaddr_in sin = { | ||
| 102 | .sin_family = AF_INET, | ||
| 103 | .sin_addr.s_addr = htonl(INADDR_LOOPBACK), | ||
| 104 | }; | ||
| 105 | struct rpc_create_args args = { | ||
| 106 | .protocol = XPRT_TRANSPORT_UDP, | ||
| 107 | .address = (struct sockaddr *)&sin, | ||
| 108 | .addrsize = sizeof(sin), | ||
| 109 | .servername = "rpc.statd", | ||
| 110 | .program = &nsm_program, | ||
| 111 | .version = NSM_VERSION, | ||
| 112 | .authflavor = RPC_AUTH_NULL, | ||
| 113 | }; | ||
| 114 | |||
| 115 | return rpc_create(&args); | ||
| 116 | } | ||
| 117 | |||
| 118 | static int nsm_mon_unmon(struct nsm_handle *nsm, u32 proc, struct nsm_res *res) | ||
| 37 | { | 119 | { |
| 38 | struct rpc_clnt *clnt; | 120 | struct rpc_clnt *clnt; |
| 39 | int status; | 121 | int status; |
| 40 | struct nsm_args args; | 122 | struct nsm_args args = { |
| 123 | .priv = &nsm->sm_priv, | ||
| 124 | .prog = NLM_PROGRAM, | ||
| 125 | .vers = 3, | ||
| 126 | .proc = NLMPROC_NSM_NOTIFY, | ||
| 127 | .mon_name = nsm->sm_mon_name, | ||
| 128 | }; | ||
| 41 | struct rpc_message msg = { | 129 | struct rpc_message msg = { |
| 42 | .rpc_argp = &args, | 130 | .rpc_argp = &args, |
| 43 | .rpc_resp = res, | 131 | .rpc_resp = res, |
| @@ -46,22 +134,18 @@ nsm_mon_unmon(struct nsm_handle *nsm, u32 proc, struct nsm_res *res) | |||
| 46 | clnt = nsm_create(); | 134 | clnt = nsm_create(); |
| 47 | if (IS_ERR(clnt)) { | 135 | if (IS_ERR(clnt)) { |
| 48 | status = PTR_ERR(clnt); | 136 | status = PTR_ERR(clnt); |
| 137 | dprintk("lockd: failed to create NSM upcall transport, " | ||
| 138 | "status=%d\n", status); | ||
| 49 | goto out; | 139 | goto out; |
| 50 | } | 140 | } |
| 51 | 141 | ||
| 52 | memset(&args, 0, sizeof(args)); | ||
| 53 | args.mon_name = nsm->sm_name; | ||
| 54 | args.addr = nsm_addr_in(nsm)->sin_addr.s_addr; | ||
| 55 | args.prog = NLM_PROGRAM; | ||
| 56 | args.vers = 3; | ||
| 57 | args.proc = NLMPROC_NSM_NOTIFY; | ||
| 58 | memset(res, 0, sizeof(*res)); | 142 | memset(res, 0, sizeof(*res)); |
| 59 | 143 | ||
| 60 | msg.rpc_proc = &clnt->cl_procinfo[proc]; | 144 | msg.rpc_proc = &clnt->cl_procinfo[proc]; |
| 61 | status = rpc_call_sync(clnt, &msg, 0); | 145 | status = rpc_call_sync(clnt, &msg, 0); |
| 62 | if (status < 0) | 146 | if (status < 0) |
| 63 | printk(KERN_DEBUG "nsm_mon_unmon: rpc failed, status=%d\n", | 147 | dprintk("lockd: NSM upcall RPC failed, status=%d\n", |
| 64 | status); | 148 | status); |
| 65 | else | 149 | else |
| 66 | status = 0; | 150 | status = 0; |
| 67 | rpc_shutdown_client(clnt); | 151 | rpc_shutdown_client(clnt); |
| @@ -69,82 +153,272 @@ nsm_mon_unmon(struct nsm_handle *nsm, u32 proc, struct nsm_res *res) | |||
| 69 | return status; | 153 | return status; |
| 70 | } | 154 | } |
| 71 | 155 | ||
| 72 | /* | 156 | /** |
| 73 | * Set up monitoring of a remote host | 157 | * nsm_monitor - Notify a peer in case we reboot |
| 158 | * @host: pointer to nlm_host of peer to notify | ||
| 159 | * | ||
| 160 | * If this peer is not already monitored, this function sends an | ||
| 161 | * upcall to the local rpc.statd to record the name/address of | ||
| 162 | * the peer to notify in case we reboot. | ||
| 163 | * | ||
| 164 | * Returns zero if the peer is monitored by the local rpc.statd; | ||
| 165 | * otherwise a negative errno value is returned. | ||
| 74 | */ | 166 | */ |
| 75 | int | 167 | int nsm_monitor(const struct nlm_host *host) |
| 76 | nsm_monitor(struct nlm_host *host) | ||
| 77 | { | 168 | { |
| 78 | struct nsm_handle *nsm = host->h_nsmhandle; | 169 | struct nsm_handle *nsm = host->h_nsmhandle; |
| 79 | struct nsm_res res; | 170 | struct nsm_res res; |
| 80 | int status; | 171 | int status; |
| 81 | 172 | ||
| 82 | dprintk("lockd: nsm_monitor(%s)\n", host->h_name); | 173 | dprintk("lockd: nsm_monitor(%s)\n", nsm->sm_name); |
| 83 | BUG_ON(nsm == NULL); | ||
| 84 | 174 | ||
| 85 | if (nsm->sm_monitored) | 175 | if (nsm->sm_monitored) |
| 86 | return 0; | 176 | return 0; |
| 87 | 177 | ||
| 88 | status = nsm_mon_unmon(nsm, SM_MON, &res); | 178 | /* |
| 179 | * Choose whether to record the caller_name or IP address of | ||
| 180 | * this peer in the local rpc.statd's database. | ||
| 181 | */ | ||
| 182 | nsm->sm_mon_name = nsm_use_hostnames ? nsm->sm_name : nsm->sm_addrbuf; | ||
| 89 | 183 | ||
| 90 | if (status < 0 || res.status != 0) | 184 | status = nsm_mon_unmon(nsm, NSMPROC_MON, &res); |
| 91 | printk(KERN_NOTICE "lockd: cannot monitor %s\n", host->h_name); | 185 | if (res.status != 0) |
| 186 | status = -EIO; | ||
| 187 | if (status < 0) | ||
| 188 | printk(KERN_NOTICE "lockd: cannot monitor %s\n", nsm->sm_name); | ||
| 92 | else | 189 | else |
| 93 | nsm->sm_monitored = 1; | 190 | nsm->sm_monitored = 1; |
| 94 | return status; | 191 | return status; |
| 95 | } | 192 | } |
| 96 | 193 | ||
| 97 | /* | 194 | /** |
| 98 | * Cease to monitor remote host | 195 | * nsm_unmonitor - Unregister peer notification |
| 196 | * @host: pointer to nlm_host of peer to stop monitoring | ||
| 197 | * | ||
| 198 | * If this peer is monitored, this function sends an upcall to | ||
| 199 | * tell the local rpc.statd not to send this peer a notification | ||
| 200 | * when we reboot. | ||
| 99 | */ | 201 | */ |
| 100 | int | 202 | void nsm_unmonitor(const struct nlm_host *host) |
| 101 | nsm_unmonitor(struct nlm_host *host) | ||
| 102 | { | 203 | { |
| 103 | struct nsm_handle *nsm = host->h_nsmhandle; | 204 | struct nsm_handle *nsm = host->h_nsmhandle; |
| 104 | struct nsm_res res; | 205 | struct nsm_res res; |
| 105 | int status = 0; | 206 | int status; |
| 106 | |||
| 107 | if (nsm == NULL) | ||
| 108 | return 0; | ||
| 109 | host->h_nsmhandle = NULL; | ||
| 110 | 207 | ||
| 111 | if (atomic_read(&nsm->sm_count) == 1 | 208 | if (atomic_read(&nsm->sm_count) == 1 |
| 112 | && nsm->sm_monitored && !nsm->sm_sticky) { | 209 | && nsm->sm_monitored && !nsm->sm_sticky) { |
| 113 | dprintk("lockd: nsm_unmonitor(%s)\n", host->h_name); | 210 | dprintk("lockd: nsm_unmonitor(%s)\n", nsm->sm_name); |
| 114 | 211 | ||
| 115 | status = nsm_mon_unmon(nsm, SM_UNMON, &res); | 212 | status = nsm_mon_unmon(nsm, NSMPROC_UNMON, &res); |
| 213 | if (res.status != 0) | ||
| 214 | status = -EIO; | ||
| 116 | if (status < 0) | 215 | if (status < 0) |
| 117 | printk(KERN_NOTICE "lockd: cannot unmonitor %s\n", | 216 | printk(KERN_NOTICE "lockd: cannot unmonitor %s\n", |
| 118 | host->h_name); | 217 | nsm->sm_name); |
| 119 | else | 218 | else |
| 120 | nsm->sm_monitored = 0; | 219 | nsm->sm_monitored = 0; |
| 121 | } | 220 | } |
| 122 | nsm_release(nsm); | 221 | } |
| 123 | return status; | 222 | |
| 223 | static struct nsm_handle *nsm_lookup_hostname(const char *hostname, | ||
| 224 | const size_t len) | ||
| 225 | { | ||
| 226 | struct nsm_handle *nsm; | ||
| 227 | |||
| 228 | list_for_each_entry(nsm, &nsm_handles, sm_link) | ||
| 229 | if (strlen(nsm->sm_name) == len && | ||
| 230 | memcmp(nsm->sm_name, hostname, len) == 0) | ||
| 231 | return nsm; | ||
| 232 | return NULL; | ||
| 233 | } | ||
| 234 | |||
| 235 | static struct nsm_handle *nsm_lookup_addr(const struct sockaddr *sap) | ||
| 236 | { | ||
| 237 | struct nsm_handle *nsm; | ||
| 238 | |||
| 239 | list_for_each_entry(nsm, &nsm_handles, sm_link) | ||
| 240 | if (nlm_cmp_addr(nsm_addr(nsm), sap)) | ||
| 241 | return nsm; | ||
| 242 | return NULL; | ||
| 243 | } | ||
| 244 | |||
| 245 | static struct nsm_handle *nsm_lookup_priv(const struct nsm_private *priv) | ||
| 246 | { | ||
| 247 | struct nsm_handle *nsm; | ||
| 248 | |||
| 249 | list_for_each_entry(nsm, &nsm_handles, sm_link) | ||
| 250 | if (memcmp(nsm->sm_priv.data, priv->data, | ||
| 251 | sizeof(priv->data)) == 0) | ||
| 252 | return nsm; | ||
| 253 | return NULL; | ||
| 124 | } | 254 | } |
| 125 | 255 | ||
| 126 | /* | 256 | /* |
| 127 | * Create NSM client for the local host | 257 | * Construct a unique cookie to match this nsm_handle to this monitored |
| 258 | * host. It is passed to the local rpc.statd via NSMPROC_MON, and | ||
| 259 | * returned via NLMPROC_SM_NOTIFY, in the "priv" field of these | ||
| 260 | * requests. | ||
| 261 | * | ||
| 262 | * The NSM protocol requires that these cookies be unique while the | ||
| 263 | * system is running. We prefer a stronger requirement of making them | ||
| 264 | * unique across reboots. If user space bugs cause a stale cookie to | ||
| 265 | * be sent to the kernel, it could cause the wrong host to lose its | ||
| 266 | * lock state if cookies were not unique across reboots. | ||
| 267 | * | ||
| 268 | * The cookies are exposed only to local user space via loopback. They | ||
| 269 | * do not appear on the physical network. If we want greater security | ||
| 270 | * for some reason, nsm_init_private() could perform a one-way hash to | ||
| 271 | * obscure the contents of the cookie. | ||
| 128 | */ | 272 | */ |
| 129 | static struct rpc_clnt * | 273 | static void nsm_init_private(struct nsm_handle *nsm) |
| 130 | nsm_create(void) | ||
| 131 | { | 274 | { |
| 132 | struct sockaddr_in sin = { | 275 | u64 *p = (u64 *)&nsm->sm_priv.data; |
| 133 | .sin_family = AF_INET, | 276 | struct timespec ts; |
| 134 | .sin_addr.s_addr = htonl(INADDR_LOOPBACK), | ||
| 135 | .sin_port = 0, | ||
| 136 | }; | ||
| 137 | struct rpc_create_args args = { | ||
| 138 | .protocol = XPRT_TRANSPORT_UDP, | ||
| 139 | .address = (struct sockaddr *)&sin, | ||
| 140 | .addrsize = sizeof(sin), | ||
| 141 | .servername = "localhost", | ||
| 142 | .program = &nsm_program, | ||
| 143 | .version = SM_VERSION, | ||
| 144 | .authflavor = RPC_AUTH_NULL, | ||
| 145 | }; | ||
| 146 | 277 | ||
| 147 | return rpc_create(&args); | 278 | ktime_get_ts(&ts); |
| 279 | *p++ = timespec_to_ns(&ts); | ||
| 280 | *p = (unsigned long)nsm; | ||
| 281 | } | ||
| 282 | |||
| 283 | static struct nsm_handle *nsm_create_handle(const struct sockaddr *sap, | ||
| 284 | const size_t salen, | ||
| 285 | const char *hostname, | ||
| 286 | const size_t hostname_len) | ||
| 287 | { | ||
| 288 | struct nsm_handle *new; | ||
| 289 | |||
| 290 | new = kzalloc(sizeof(*new) + hostname_len + 1, GFP_KERNEL); | ||
| 291 | if (unlikely(new == NULL)) | ||
| 292 | return NULL; | ||
| 293 | |||
| 294 | atomic_set(&new->sm_count, 1); | ||
| 295 | new->sm_name = (char *)(new + 1); | ||
| 296 | memcpy(nsm_addr(new), sap, salen); | ||
| 297 | new->sm_addrlen = salen; | ||
| 298 | nsm_init_private(new); | ||
| 299 | nsm_display_address((const struct sockaddr *)&new->sm_addr, | ||
| 300 | new->sm_addrbuf, sizeof(new->sm_addrbuf)); | ||
| 301 | memcpy(new->sm_name, hostname, hostname_len); | ||
| 302 | new->sm_name[hostname_len] = '\0'; | ||
| 303 | |||
| 304 | return new; | ||
| 305 | } | ||
| 306 | |||
| 307 | /** | ||
| 308 | * nsm_get_handle - Find or create a cached nsm_handle | ||
| 309 | * @sap: pointer to socket address of handle to find | ||
| 310 | * @salen: length of socket address | ||
| 311 | * @hostname: pointer to C string containing hostname to find | ||
| 312 | * @hostname_len: length of C string | ||
| 313 | * | ||
| 314 | * Behavior is modulated by the global nsm_use_hostnames variable. | ||
| 315 | * | ||
| 316 | * Returns a cached nsm_handle after bumping its ref count, or | ||
| 317 | * returns a fresh nsm_handle if a handle that matches @sap and/or | ||
| 318 | * @hostname cannot be found in the handle cache. Returns NULL if | ||
| 319 | * an error occurs. | ||
| 320 | */ | ||
| 321 | struct nsm_handle *nsm_get_handle(const struct sockaddr *sap, | ||
| 322 | const size_t salen, const char *hostname, | ||
| 323 | const size_t hostname_len) | ||
| 324 | { | ||
| 325 | struct nsm_handle *cached, *new = NULL; | ||
| 326 | |||
| 327 | if (hostname && memchr(hostname, '/', hostname_len) != NULL) { | ||
| 328 | if (printk_ratelimit()) { | ||
| 329 | printk(KERN_WARNING "Invalid hostname \"%.*s\" " | ||
| 330 | "in NFS lock request\n", | ||
| 331 | (int)hostname_len, hostname); | ||
| 332 | } | ||
| 333 | return NULL; | ||
| 334 | } | ||
| 335 | |||
| 336 | retry: | ||
| 337 | spin_lock(&nsm_lock); | ||
| 338 | |||
| 339 | if (nsm_use_hostnames && hostname != NULL) | ||
| 340 | cached = nsm_lookup_hostname(hostname, hostname_len); | ||
| 341 | else | ||
| 342 | cached = nsm_lookup_addr(sap); | ||
| 343 | |||
| 344 | if (cached != NULL) { | ||
| 345 | atomic_inc(&cached->sm_count); | ||
| 346 | spin_unlock(&nsm_lock); | ||
| 347 | kfree(new); | ||
| 348 | dprintk("lockd: found nsm_handle for %s (%s), " | ||
| 349 | "cnt %d\n", cached->sm_name, | ||
| 350 | cached->sm_addrbuf, | ||
| 351 | atomic_read(&cached->sm_count)); | ||
| 352 | return cached; | ||
| 353 | } | ||
| 354 | |||
| 355 | if (new != NULL) { | ||
| 356 | list_add(&new->sm_link, &nsm_handles); | ||
| 357 | spin_unlock(&nsm_lock); | ||
| 358 | dprintk("lockd: created nsm_handle for %s (%s)\n", | ||
| 359 | new->sm_name, new->sm_addrbuf); | ||
| 360 | return new; | ||
| 361 | } | ||
| 362 | |||
| 363 | spin_unlock(&nsm_lock); | ||
| 364 | |||
| 365 | new = nsm_create_handle(sap, salen, hostname, hostname_len); | ||
| 366 | if (unlikely(new == NULL)) | ||
| 367 | return NULL; | ||
| 368 | goto retry; | ||
| 369 | } | ||
| 370 | |||
| 371 | /** | ||
| 372 | * nsm_reboot_lookup - match NLMPROC_SM_NOTIFY arguments to an nsm_handle | ||
| 373 | * @info: pointer to NLMPROC_SM_NOTIFY arguments | ||
| 374 | * | ||
| 375 | * Returns a matching nsm_handle if found in the nsm cache; the returned | ||
| 376 | * nsm_handle's reference count is bumped and sm_monitored is cleared. | ||
| 377 | * Otherwise returns NULL if some error occurred. | ||
| 378 | */ | ||
| 379 | struct nsm_handle *nsm_reboot_lookup(const struct nlm_reboot *info) | ||
| 380 | { | ||
| 381 | struct nsm_handle *cached; | ||
| 382 | |||
| 383 | spin_lock(&nsm_lock); | ||
| 384 | |||
| 385 | cached = nsm_lookup_priv(&info->priv); | ||
| 386 | if (unlikely(cached == NULL)) { | ||
| 387 | spin_unlock(&nsm_lock); | ||
| 388 | dprintk("lockd: never saw rebooted peer '%.*s' before\n", | ||
| 389 | info->len, info->mon); | ||
| 390 | return cached; | ||
| 391 | } | ||
| 392 | |||
| 393 | atomic_inc(&cached->sm_count); | ||
| 394 | spin_unlock(&nsm_lock); | ||
| 395 | |||
| 396 | /* | ||
| 397 | * During subsequent lock activity, force a fresh | ||
| 398 | * notification to be set up for this host. | ||
| 399 | */ | ||
| 400 | cached->sm_monitored = 0; | ||
| 401 | |||
| 402 | dprintk("lockd: host %s (%s) rebooted, cnt %d\n", | ||
| 403 | cached->sm_name, cached->sm_addrbuf, | ||
| 404 | atomic_read(&cached->sm_count)); | ||
| 405 | return cached; | ||
| 406 | } | ||
| 407 | |||
| 408 | /** | ||
| 409 | * nsm_release - Release an NSM handle | ||
| 410 | * @nsm: pointer to handle to be released | ||
| 411 | * | ||
| 412 | */ | ||
| 413 | void nsm_release(struct nsm_handle *nsm) | ||
| 414 | { | ||
| 415 | if (atomic_dec_and_lock(&nsm->sm_count, &nsm_lock)) { | ||
| 416 | list_del(&nsm->sm_link); | ||
| 417 | spin_unlock(&nsm_lock); | ||
| 418 | dprintk("lockd: destroyed nsm_handle for %s (%s)\n", | ||
| 419 | nsm->sm_name, nsm->sm_addrbuf); | ||
| 420 | kfree(nsm); | ||
| 421 | } | ||
| 148 | } | 422 | } |
| 149 | 423 | ||
| 150 | /* | 424 | /* |
| @@ -154,127 +428,132 @@ nsm_create(void) | |||
| 154 | * Status Monitor wire protocol. | 428 | * Status Monitor wire protocol. |
| 155 | */ | 429 | */ |
| 156 | 430 | ||
| 157 | static __be32 *xdr_encode_nsm_string(__be32 *p, char *string) | 431 | static int encode_nsm_string(struct xdr_stream *xdr, const char *string) |
| 158 | { | 432 | { |
| 159 | size_t len = strlen(string); | 433 | const u32 len = strlen(string); |
| 160 | 434 | __be32 *p; | |
| 161 | if (len > SM_MAXSTRLEN) | 435 | |
| 162 | len = SM_MAXSTRLEN; | 436 | if (unlikely(len > SM_MAXSTRLEN)) |
| 163 | return xdr_encode_opaque(p, string, len); | 437 | return -EIO; |
| 438 | p = xdr_reserve_space(xdr, sizeof(u32) + len); | ||
| 439 | if (unlikely(p == NULL)) | ||
| 440 | return -EIO; | ||
| 441 | xdr_encode_opaque(p, string, len); | ||
| 442 | return 0; | ||
| 164 | } | 443 | } |
| 165 | 444 | ||
| 166 | /* | 445 | /* |
| 167 | * "mon_name" specifies the host to be monitored. | 446 | * "mon_name" specifies the host to be monitored. |
| 168 | * | ||
| 169 | * Linux uses a text version of the IP address of the remote | ||
| 170 | * host as the host identifier (the "mon_name" argument). | ||
| 171 | * | ||
| 172 | * Linux statd always looks up the canonical hostname first for | ||
| 173 | * whatever remote hostname it receives, so this works alright. | ||
| 174 | */ | 447 | */ |
| 175 | static __be32 *xdr_encode_mon_name(__be32 *p, struct nsm_args *argp) | 448 | static int encode_mon_name(struct xdr_stream *xdr, const struct nsm_args *argp) |
| 176 | { | 449 | { |
| 177 | char buffer[XDR_ADDRBUF_LEN + 1]; | 450 | return encode_nsm_string(xdr, argp->mon_name); |
| 178 | char *name = argp->mon_name; | ||
| 179 | |||
| 180 | if (!nsm_use_hostnames) { | ||
| 181 | snprintf(buffer, XDR_ADDRBUF_LEN, | ||
| 182 | "%pI4", &argp->addr); | ||
| 183 | name = buffer; | ||
| 184 | } | ||
| 185 | |||
| 186 | return xdr_encode_nsm_string(p, name); | ||
| 187 | } | 451 | } |
| 188 | 452 | ||
| 189 | /* | 453 | /* |
| 190 | * The "my_id" argument specifies the hostname and RPC procedure | 454 | * The "my_id" argument specifies the hostname and RPC procedure |
| 191 | * to be called when the status manager receives notification | 455 | * to be called when the status manager receives notification |
| 192 | * (via the SM_NOTIFY call) that the state of host "mon_name" | 456 | * (via the NLMPROC_SM_NOTIFY call) that the state of host "mon_name" |
| 193 | * has changed. | 457 | * has changed. |
| 194 | */ | 458 | */ |
| 195 | static __be32 *xdr_encode_my_id(__be32 *p, struct nsm_args *argp) | 459 | static int encode_my_id(struct xdr_stream *xdr, const struct nsm_args *argp) |
| 196 | { | 460 | { |
| 197 | p = xdr_encode_nsm_string(p, utsname()->nodename); | 461 | int status; |
| 198 | if (!p) | 462 | __be32 *p; |
| 199 | return ERR_PTR(-EIO); | 463 | |
| 200 | 464 | status = encode_nsm_string(xdr, utsname()->nodename); | |
| 465 | if (unlikely(status != 0)) | ||
| 466 | return status; | ||
| 467 | p = xdr_reserve_space(xdr, 3 * sizeof(u32)); | ||
| 468 | if (unlikely(p == NULL)) | ||
| 469 | return -EIO; | ||
| 201 | *p++ = htonl(argp->prog); | 470 | *p++ = htonl(argp->prog); |
| 202 | *p++ = htonl(argp->vers); | 471 | *p++ = htonl(argp->vers); |
| 203 | *p++ = htonl(argp->proc); | 472 | *p++ = htonl(argp->proc); |
| 204 | 473 | return 0; | |
| 205 | return p; | ||
| 206 | } | 474 | } |
| 207 | 475 | ||
| 208 | /* | 476 | /* |
| 209 | * The "mon_id" argument specifies the non-private arguments | 477 | * The "mon_id" argument specifies the non-private arguments |
| 210 | * of an SM_MON or SM_UNMON call. | 478 | * of an NSMPROC_MON or NSMPROC_UNMON call. |
| 211 | */ | 479 | */ |
| 212 | static __be32 *xdr_encode_mon_id(__be32 *p, struct nsm_args *argp) | 480 | static int encode_mon_id(struct xdr_stream *xdr, const struct nsm_args *argp) |
| 213 | { | 481 | { |
| 214 | p = xdr_encode_mon_name(p, argp); | 482 | int status; |
| 215 | if (!p) | ||
| 216 | return ERR_PTR(-EIO); | ||
| 217 | 483 | ||
| 218 | return xdr_encode_my_id(p, argp); | 484 | status = encode_mon_name(xdr, argp); |
| 485 | if (unlikely(status != 0)) | ||
| 486 | return status; | ||
| 487 | return encode_my_id(xdr, argp); | ||
| 219 | } | 488 | } |
| 220 | 489 | ||
| 221 | /* | 490 | /* |
| 222 | * The "priv" argument may contain private information required | 491 | * The "priv" argument may contain private information required |
| 223 | * by the SM_MON call. This information will be supplied in the | 492 | * by the NSMPROC_MON call. This information will be supplied in the |
| 224 | * SM_NOTIFY call. | 493 | * NLMPROC_SM_NOTIFY call. |
| 225 | * | ||
| 226 | * Linux provides the raw IP address of the monitored host, | ||
| 227 | * left in network byte order. | ||
| 228 | */ | 494 | */ |
| 229 | static __be32 *xdr_encode_priv(__be32 *p, struct nsm_args *argp) | 495 | static int encode_priv(struct xdr_stream *xdr, const struct nsm_args *argp) |
| 230 | { | 496 | { |
| 231 | *p++ = argp->addr; | 497 | __be32 *p; |
| 232 | *p++ = 0; | ||
| 233 | *p++ = 0; | ||
| 234 | *p++ = 0; | ||
| 235 | 498 | ||
| 236 | return p; | 499 | p = xdr_reserve_space(xdr, SM_PRIV_SIZE); |
| 500 | if (unlikely(p == NULL)) | ||
| 501 | return -EIO; | ||
| 502 | xdr_encode_opaque_fixed(p, argp->priv->data, SM_PRIV_SIZE); | ||
| 503 | return 0; | ||
| 237 | } | 504 | } |
| 238 | 505 | ||
| 239 | static int | 506 | static int xdr_enc_mon(struct rpc_rqst *req, __be32 *p, |
| 240 | xdr_encode_mon(struct rpc_rqst *rqstp, __be32 *p, struct nsm_args *argp) | 507 | const struct nsm_args *argp) |
| 241 | { | 508 | { |
| 242 | p = xdr_encode_mon_id(p, argp); | 509 | struct xdr_stream xdr; |
| 243 | if (IS_ERR(p)) | 510 | int status; |
| 244 | return PTR_ERR(p); | 511 | |
| 245 | 512 | xdr_init_encode(&xdr, &req->rq_snd_buf, p); | |
| 246 | p = xdr_encode_priv(p, argp); | 513 | status = encode_mon_id(&xdr, argp); |
| 247 | if (IS_ERR(p)) | 514 | if (unlikely(status)) |
| 248 | return PTR_ERR(p); | 515 | return status; |
| 249 | 516 | return encode_priv(&xdr, argp); | |
| 250 | rqstp->rq_slen = xdr_adjust_iovec(rqstp->rq_svec, p); | ||
| 251 | return 0; | ||
| 252 | } | 517 | } |
| 253 | 518 | ||
| 254 | static int | 519 | static int xdr_enc_unmon(struct rpc_rqst *req, __be32 *p, |
| 255 | xdr_encode_unmon(struct rpc_rqst *rqstp, __be32 *p, struct nsm_args *argp) | 520 | const struct nsm_args *argp) |
| 256 | { | 521 | { |
| 257 | p = xdr_encode_mon_id(p, argp); | 522 | struct xdr_stream xdr; |
| 258 | if (IS_ERR(p)) | 523 | |
| 259 | return PTR_ERR(p); | 524 | xdr_init_encode(&xdr, &req->rq_snd_buf, p); |
| 260 | rqstp->rq_slen = xdr_adjust_iovec(rqstp->rq_svec, p); | 525 | return encode_mon_id(&xdr, argp); |
| 261 | return 0; | ||
| 262 | } | 526 | } |
| 263 | 527 | ||
| 264 | static int | 528 | static int xdr_dec_stat_res(struct rpc_rqst *rqstp, __be32 *p, |
| 265 | xdr_decode_stat_res(struct rpc_rqst *rqstp, __be32 *p, struct nsm_res *resp) | 529 | struct nsm_res *resp) |
| 266 | { | 530 | { |
| 531 | struct xdr_stream xdr; | ||
| 532 | |||
| 533 | xdr_init_decode(&xdr, &rqstp->rq_rcv_buf, p); | ||
| 534 | p = xdr_inline_decode(&xdr, 2 * sizeof(u32)); | ||
| 535 | if (unlikely(p == NULL)) | ||
| 536 | return -EIO; | ||
| 267 | resp->status = ntohl(*p++); | 537 | resp->status = ntohl(*p++); |
| 268 | resp->state = ntohl(*p++); | 538 | resp->state = ntohl(*p); |
| 269 | dprintk("nsm: xdr_decode_stat_res status %d state %d\n", | 539 | |
| 540 | dprintk("lockd: xdr_dec_stat_res status %d state %d\n", | ||
| 270 | resp->status, resp->state); | 541 | resp->status, resp->state); |
| 271 | return 0; | 542 | return 0; |
| 272 | } | 543 | } |
| 273 | 544 | ||
| 274 | static int | 545 | static int xdr_dec_stat(struct rpc_rqst *rqstp, __be32 *p, |
| 275 | xdr_decode_stat(struct rpc_rqst *rqstp, __be32 *p, struct nsm_res *resp) | 546 | struct nsm_res *resp) |
| 276 | { | 547 | { |
| 277 | resp->state = ntohl(*p++); | 548 | struct xdr_stream xdr; |
| 549 | |||
| 550 | xdr_init_decode(&xdr, &rqstp->rq_rcv_buf, p); | ||
| 551 | p = xdr_inline_decode(&xdr, sizeof(u32)); | ||
| 552 | if (unlikely(p == NULL)) | ||
| 553 | return -EIO; | ||
| 554 | resp->state = ntohl(*p); | ||
| 555 | |||
| 556 | dprintk("lockd: xdr_dec_stat state %d\n", resp->state); | ||
| 278 | return 0; | 557 | return 0; |
| 279 | } | 558 | } |
| 280 | 559 | ||
| @@ -288,22 +567,22 @@ xdr_decode_stat(struct rpc_rqst *rqstp, __be32 *p, struct nsm_res *resp) | |||
| 288 | #define SM_unmonres_sz 1 | 567 | #define SM_unmonres_sz 1 |
| 289 | 568 | ||
| 290 | static struct rpc_procinfo nsm_procedures[] = { | 569 | static struct rpc_procinfo nsm_procedures[] = { |
| 291 | [SM_MON] = { | 570 | [NSMPROC_MON] = { |
| 292 | .p_proc = SM_MON, | 571 | .p_proc = NSMPROC_MON, |
| 293 | .p_encode = (kxdrproc_t) xdr_encode_mon, | 572 | .p_encode = (kxdrproc_t)xdr_enc_mon, |
| 294 | .p_decode = (kxdrproc_t) xdr_decode_stat_res, | 573 | .p_decode = (kxdrproc_t)xdr_dec_stat_res, |
| 295 | .p_arglen = SM_mon_sz, | 574 | .p_arglen = SM_mon_sz, |
| 296 | .p_replen = SM_monres_sz, | 575 | .p_replen = SM_monres_sz, |
| 297 | .p_statidx = SM_MON, | 576 | .p_statidx = NSMPROC_MON, |
| 298 | .p_name = "MONITOR", | 577 | .p_name = "MONITOR", |
| 299 | }, | 578 | }, |
| 300 | [SM_UNMON] = { | 579 | [NSMPROC_UNMON] = { |
| 301 | .p_proc = SM_UNMON, | 580 | .p_proc = NSMPROC_UNMON, |
| 302 | .p_encode = (kxdrproc_t) xdr_encode_unmon, | 581 | .p_encode = (kxdrproc_t)xdr_enc_unmon, |
| 303 | .p_decode = (kxdrproc_t) xdr_decode_stat, | 582 | .p_decode = (kxdrproc_t)xdr_dec_stat, |
| 304 | .p_arglen = SM_mon_id_sz, | 583 | .p_arglen = SM_mon_id_sz, |
| 305 | .p_replen = SM_unmonres_sz, | 584 | .p_replen = SM_unmonres_sz, |
| 306 | .p_statidx = SM_UNMON, | 585 | .p_statidx = NSMPROC_UNMON, |
| 307 | .p_name = "UNMONITOR", | 586 | .p_name = "UNMONITOR", |
| 308 | }, | 587 | }, |
| 309 | }; | 588 | }; |
| @@ -322,7 +601,7 @@ static struct rpc_stat nsm_stats; | |||
| 322 | 601 | ||
| 323 | static struct rpc_program nsm_program = { | 602 | static struct rpc_program nsm_program = { |
| 324 | .name = "statd", | 603 | .name = "statd", |
| 325 | .number = SM_PROGRAM, | 604 | .number = NSM_PROGRAM, |
| 326 | .nrvers = ARRAY_SIZE(nsm_version), | 605 | .nrvers = ARRAY_SIZE(nsm_version), |
| 327 | .version = nsm_version, | 606 | .version = nsm_version, |
| 328 | .stats = &nsm_stats | 607 | .stats = &nsm_stats |
