2 * linux/fs/nfs/callback.c
4 * Copyright (C) 2004 Trond Myklebust
6 * NFSv4 callback handling
9 #include <linux/config.h>
10 #include <linux/completion.h>
12 #include <linux/module.h>
13 #include <linux/smp_lock.h>
14 #include <linux/sunrpc/svc.h>
15 #include <linux/sunrpc/svcsock.h>
16 #include <linux/nfs_fs.h>
19 #define NFSDBG_FACILITY NFSDBG_CALLBACK
21 struct nfs_callback_data
{
23 struct svc_serv
*serv
;
25 struct completion started
;
26 struct completion stopped
;
29 static struct nfs_callback_data nfs_callback_info
;
30 static DECLARE_MUTEX(nfs_callback_sema
);
31 static struct svc_program nfs4_callback_program
;
33 unsigned short nfs_callback_tcpport
;
36 * This is the callback kernel thread.
38 static void nfs_callback_svc(struct svc_rqst
*rqstp
)
40 struct svc_serv
*serv
= rqstp
->rq_server
;
43 __module_get(THIS_MODULE
);
46 nfs_callback_info
.pid
= current
->pid
;
47 daemonize("nfsv4-svc");
48 /* Process request with signals blocked, but allow SIGKILL. */
49 allow_signal(SIGKILL
);
51 complete(&nfs_callback_info
.started
);
53 while (nfs_callback_info
.users
!= 0 || !signalled()) {
55 * Listen for a request on the socket
57 err
= svc_recv(serv
, rqstp
, MAX_SCHEDULE_TIMEOUT
);
58 if (err
== -EAGAIN
|| err
== -EINTR
)
62 "%s: terminating on error %d\n",
66 dprintk("%s: request from %u.%u.%u.%u\n", __FUNCTION__
,
67 NIPQUAD(rqstp
->rq_addr
.sin_addr
.s_addr
));
68 svc_process(serv
, rqstp
);
71 nfs_callback_info
.pid
= 0;
72 complete(&nfs_callback_info
.stopped
);
74 module_put_and_exit(0);
78 * Bring up the server process if it is not already up.
80 int nfs_callback_up(void)
82 struct svc_serv
*serv
;
83 struct svc_sock
*svsk
;
87 down(&nfs_callback_sema
);
88 if (nfs_callback_info
.users
++ || nfs_callback_info
.pid
!= 0)
90 init_completion(&nfs_callback_info
.started
);
91 init_completion(&nfs_callback_info
.stopped
);
92 serv
= svc_create(&nfs4_callback_program
, NFS4_CALLBACK_BUFSIZE
);
96 /* FIXME: We don't want to register this socket with the portmapper */
97 ret
= svc_makesock(serv
, IPPROTO_TCP
, 0);
100 if (!list_empty(&serv
->sv_permsocks
)) {
101 svsk
= list_entry(serv
->sv_permsocks
.next
,
102 struct svc_sock
, sk_list
);
103 nfs_callback_tcpport
= ntohs(inet_sk(svsk
->sk_sk
)->sport
);
104 dprintk ("Callback port = 0x%x\n", nfs_callback_tcpport
);
107 ret
= svc_create_thread(nfs_callback_svc
, serv
);
110 nfs_callback_info
.serv
= serv
;
111 wait_for_completion(&nfs_callback_info
.started
);
113 up(&nfs_callback_sema
);
119 nfs_callback_info
.users
--;
124 * Kill the server process if it is not already up.
126 int nfs_callback_down(void)
131 down(&nfs_callback_sema
);
132 if (--nfs_callback_info
.users
|| nfs_callback_info
.pid
== 0)
134 kill_proc(nfs_callback_info
.pid
, SIGKILL
, 1);
135 wait_for_completion(&nfs_callback_info
.stopped
);
137 up(&nfs_callback_sema
);
143 * AUTH_NULL authentication
145 static int nfs_callback_null_accept(struct svc_rqst
*rqstp
, u32
*authp
)
147 struct kvec
*argv
= &rqstp
->rq_arg
.head
[0];
148 struct kvec
*resv
= &rqstp
->rq_res
.head
[0];
150 if (argv
->iov_len
< 3*4)
153 if (svc_getu32(argv
) != 0) {
154 dprintk("svc: bad null cred\n");
155 *authp
= rpc_autherr_badcred
;
158 if (svc_getu32(argv
) != RPC_AUTH_NULL
|| svc_getu32(argv
) != 0) {
159 dprintk("svc: bad null verf\n");
160 *authp
= rpc_autherr_badverf
;
164 /* Signal that mapping to nobody uid/gid is required */
165 rqstp
->rq_cred
.cr_uid
= (uid_t
) -1;
166 rqstp
->rq_cred
.cr_gid
= (gid_t
) -1;
167 rqstp
->rq_cred
.cr_group_info
= groups_alloc(0);
168 if (rqstp
->rq_cred
.cr_group_info
== NULL
)
169 return SVC_DROP
; /* kmalloc failure - client must retry */
171 /* Put NULL verifier */
172 svc_putu32(resv
, RPC_AUTH_NULL
);
174 dprintk("%s: success, returning %d!\n", __FUNCTION__
, SVC_OK
);
178 static int nfs_callback_null_release(struct svc_rqst
*rqstp
)
180 if (rqstp
->rq_cred
.cr_group_info
)
181 put_group_info(rqstp
->rq_cred
.cr_group_info
);
182 rqstp
->rq_cred
.cr_group_info
= NULL
;
183 return 0; /* don't drop */
186 static struct auth_ops nfs_callback_auth_null
= {
188 .flavour
= RPC_AUTH_NULL
,
189 .accept
= nfs_callback_null_accept
,
190 .release
= nfs_callback_null_release
,
194 * AUTH_SYS authentication
196 static int nfs_callback_unix_accept(struct svc_rqst
*rqstp
, u32
*authp
)
198 struct kvec
*argv
= &rqstp
->rq_arg
.head
[0];
199 struct kvec
*resv
= &rqstp
->rq_res
.head
[0];
200 struct svc_cred
*cred
= &rqstp
->rq_cred
;
202 int len
= argv
->iov_len
;
204 dprintk("%s: start\n", __FUNCTION__
);
205 cred
->cr_group_info
= NULL
;
206 rqstp
->rq_client
= NULL
;
207 if ((len
-= 3*4) < 0)
210 /* Get length, time stamp and machine name */
213 slen
= XDR_QUADLEN(ntohl(svc_getu32(argv
)));
214 if (slen
> 64 || (len
-= (slen
+ 3)*4) < 0)
216 argv
->iov_base
= (void*)((u32
*)argv
->iov_base
+ slen
);
217 argv
->iov_len
-= slen
*4;
219 cred
->cr_uid
= ntohl(svc_getu32(argv
));
220 cred
->cr_gid
= ntohl(svc_getu32(argv
));
221 slen
= ntohl(svc_getu32(argv
));
222 if (slen
> 16 || (len
-= (slen
+ 2)*4) < 0)
224 cred
->cr_group_info
= groups_alloc(slen
);
225 if (cred
->cr_group_info
== NULL
)
227 for (i
= 0; i
< slen
; i
++)
228 GROUP_AT(cred
->cr_group_info
, i
) = ntohl(svc_getu32(argv
));
230 if (svc_getu32(argv
) != RPC_AUTH_NULL
|| svc_getu32(argv
) != 0) {
231 *authp
= rpc_autherr_badverf
;
234 /* Put NULL verifier */
235 svc_putu32(resv
, RPC_AUTH_NULL
);
237 dprintk("%s: success, returning %d!\n", __FUNCTION__
, SVC_OK
);
240 *authp
= rpc_autherr_badcred
;
244 static int nfs_callback_unix_release(struct svc_rqst
*rqstp
)
246 if (rqstp
->rq_cred
.cr_group_info
)
247 put_group_info(rqstp
->rq_cred
.cr_group_info
);
248 rqstp
->rq_cred
.cr_group_info
= NULL
;
252 static struct auth_ops nfs_callback_auth_unix
= {
254 .flavour
= RPC_AUTH_UNIX
,
255 .accept
= nfs_callback_unix_accept
,
256 .release
= nfs_callback_unix_release
,
260 * Hook the authentication protocol
262 static int nfs_callback_auth(struct svc_rqst
*rqstp
, u32
*authp
)
264 struct in_addr
*addr
= &rqstp
->rq_addr
.sin_addr
;
265 struct nfs4_client
*clp
;
266 struct kvec
*argv
= &rqstp
->rq_arg
.head
[0];
270 /* Don't talk to strangers */
271 clp
= nfs4_find_client(addr
);
274 dprintk("%s: %u.%u.%u.%u NFSv4 callback!\n", __FUNCTION__
, NIPQUAD(addr
));
275 nfs4_put_client(clp
);
276 flavour
= ntohl(svc_getu32(argv
));
279 if (rqstp
->rq_proc
!= CB_NULL
) {
280 *authp
= rpc_autherr_tooweak
;
284 rqstp
->rq_authop
= &nfs_callback_auth_null
;
285 retval
= nfs_callback_null_accept(rqstp
, authp
);
288 /* Eat the authentication flavour */
289 rqstp
->rq_authop
= &nfs_callback_auth_unix
;
290 retval
= nfs_callback_unix_accept(rqstp
, authp
);
293 /* FIXME: need to add RPCSEC_GSS upcalls */
296 retval
= svc_authenticate(rqstp
, authp
);
298 *authp
= rpc_autherr_rejectedcred
;
302 dprintk("%s: flavour %d returning error %d\n", __FUNCTION__
, flavour
, retval
);
307 * Define NFS4 callback program
309 extern struct svc_version nfs4_callback_version1
;
311 static struct svc_version
*nfs4_callback_version
[] = {
312 [1] = &nfs4_callback_version1
,
315 static struct svc_stat nfs4_callback_stats
;
317 static struct svc_program nfs4_callback_program
= {
318 .pg_prog
= NFS4_CALLBACK
, /* RPC service number */
319 .pg_nvers
= ARRAY_SIZE(nfs4_callback_version
), /* Number of entries */
320 .pg_vers
= nfs4_callback_version
, /* version table */
321 .pg_name
= "NFSv4 callback", /* service name */
322 .pg_class
= "nfs", /* authentication class */
323 .pg_stats
= &nfs4_callback_stats
,
324 .pg_authenticate
= nfs_callback_auth
,