]> bbs.cooldavid.org Git - net-next-2.6.git/blame - fs/lockd/mon.c
NSM: Move NSM program and procedure numbers to fs/lockd/mon.c
[net-next-2.6.git] / fs / lockd / mon.c
CommitLineData
1da177e4
LT
1/*
2 * linux/fs/lockd/mon.c
3 *
4 * The kernel statd client.
5 *
6 * Copyright (C) 1996, Olaf Kirch <okir@monad.swb.de>
7 */
8
9#include <linux/types.h>
10#include <linux/utsname.h>
11#include <linux/kernel.h>
12#include <linux/sunrpc/clnt.h>
0896a725 13#include <linux/sunrpc/xprtsock.h>
1da177e4
LT
14#include <linux/sunrpc/svc.h>
15#include <linux/lockd/lockd.h>
16#include <linux/lockd/sm_inter.h>
17
18
19#define NLMDBG_FACILITY NLMDBG_MONITOR
36e8e668
CL
20#define NSM_PROGRAM 100024
21#define NSM_VERSION 1
22
23enum {
24 NSMPROC_NULL,
25 NSMPROC_STAT,
26 NSMPROC_MON,
27 NSMPROC_UNMON,
28 NSMPROC_UNMON_ALL,
29 NSMPROC_SIMU_CRASH,
30 NSMPROC_NOTIFY,
31};
1da177e4 32
9c1bfd03
CL
33struct nsm_args {
34 __be32 addr; /* remote address */
35 u32 prog; /* RPC callback info */
36 u32 vers;
37 u32 proc;
38
39 char *mon_name;
40};
41
42struct nsm_res {
43 u32 status;
44 u32 state;
45};
46
1da177e4
LT
47static struct rpc_clnt * nsm_create(void);
48
49static struct rpc_program nsm_program;
50
51/*
52 * Local NSM state
53 */
460f5cac 54int nsm_local_state;
1da177e4
LT
55
56/*
36e8e668 57 * Common procedure for NSMPROC_MON/NSMPROC_UNMON calls
1da177e4
LT
58 */
59static int
9502c522 60nsm_mon_unmon(struct nsm_handle *nsm, u32 proc, struct nsm_res *res)
1da177e4
LT
61{
62 struct rpc_clnt *clnt;
63 int status;
a4846750
CL
64 struct nsm_args args = {
65 .addr = nsm_addr_in(nsm)->sin_addr.s_addr,
66 .prog = NLM_PROGRAM,
67 .vers = 3,
68 .proc = NLMPROC_NSM_NOTIFY,
29ed1407 69 .mon_name = nsm->sm_mon_name,
a4846750 70 };
dead28da
CL
71 struct rpc_message msg = {
72 .rpc_argp = &args,
73 .rpc_resp = res,
74 };
1da177e4
LT
75
76 clnt = nsm_create();
77 if (IS_ERR(clnt)) {
78 status = PTR_ERR(clnt);
5acf4315
CL
79 dprintk("lockd: failed to create NSM upcall transport, "
80 "status=%d\n", status);
1da177e4
LT
81 goto out;
82 }
83
1da177e4
LT
84 memset(res, 0, sizeof(*res));
85
dead28da
CL
86 msg.rpc_proc = &clnt->cl_procinfo[proc];
87 status = rpc_call_sync(clnt, &msg, 0);
1da177e4 88 if (status < 0)
5acf4315
CL
89 dprintk("lockd: NSM upcall RPC failed, status=%d\n",
90 status);
1da177e4
LT
91 else
92 status = 0;
90c5755f 93 rpc_shutdown_client(clnt);
1da177e4
LT
94 out:
95 return status;
96}
97
1e49323c
CL
98/**
99 * nsm_monitor - Notify a peer in case we reboot
100 * @host: pointer to nlm_host of peer to notify
101 *
102 * If this peer is not already monitored, this function sends an
103 * upcall to the local rpc.statd to record the name/address of
104 * the peer to notify in case we reboot.
105 *
106 * Returns zero if the peer is monitored by the local rpc.statd;
107 * otherwise a negative errno value is returned.
1da177e4 108 */
1e49323c 109int nsm_monitor(const struct nlm_host *host)
1da177e4 110{
8dead0db 111 struct nsm_handle *nsm = host->h_nsmhandle;
1da177e4
LT
112 struct nsm_res res;
113 int status;
114
9fee4902 115 dprintk("lockd: nsm_monitor(%s)\n", nsm->sm_name);
8dead0db
OK
116
117 if (nsm->sm_monitored)
977faf39 118 return 0;
1da177e4 119
29ed1407
CL
120 /*
121 * Choose whether to record the caller_name or IP address of
122 * this peer in the local rpc.statd's database.
123 */
124 nsm->sm_mon_name = nsm_use_hostnames ? nsm->sm_name : nsm->sm_addrbuf;
125
36e8e668 126 status = nsm_mon_unmon(nsm, NSMPROC_MON, &res);
5d254b11
CL
127 if (res.status != 0)
128 status = -EIO;
129 if (status < 0)
9fee4902 130 printk(KERN_NOTICE "lockd: cannot monitor %s\n", nsm->sm_name);
1da177e4 131 else
8dead0db 132 nsm->sm_monitored = 1;
1da177e4
LT
133 return status;
134}
135
356c3eb4
CL
136/**
137 * nsm_unmonitor - Unregister peer notification
138 * @host: pointer to nlm_host of peer to stop monitoring
139 *
140 * If this peer is monitored, this function sends an upcall to
141 * tell the local rpc.statd not to send this peer a notification
142 * when we reboot.
1da177e4 143 */
356c3eb4 144void nsm_unmonitor(const struct nlm_host *host)
1da177e4 145{
8dead0db 146 struct nsm_handle *nsm = host->h_nsmhandle;
1da177e4 147 struct nsm_res res;
356c3eb4 148 int status;
1da177e4 149
9502c522
OK
150 if (atomic_read(&nsm->sm_count) == 1
151 && nsm->sm_monitored && !nsm->sm_sticky) {
9fee4902 152 dprintk("lockd: nsm_unmonitor(%s)\n", nsm->sm_name);
9502c522 153
36e8e668 154 status = nsm_mon_unmon(nsm, NSMPROC_UNMON, &res);
0c7aef45
CL
155 if (res.status != 0)
156 status = -EIO;
977faf39 157 if (status < 0)
9502c522 158 printk(KERN_NOTICE "lockd: cannot unmonitor %s\n",
9fee4902 159 nsm->sm_name);
9502c522
OK
160 else
161 nsm->sm_monitored = 0;
977faf39 162 }
1da177e4
LT
163}
164
165/*
166 * Create NSM client for the local host
167 */
168static struct rpc_clnt *
169nsm_create(void)
170{
e1ec7892
CL
171 struct sockaddr_in sin = {
172 .sin_family = AF_INET,
173 .sin_addr.s_addr = htonl(INADDR_LOOPBACK),
174 .sin_port = 0,
175 };
176 struct rpc_create_args args = {
0896a725 177 .protocol = XPRT_TRANSPORT_UDP,
e1ec7892
CL
178 .address = (struct sockaddr *)&sin,
179 .addrsize = sizeof(sin),
180 .servername = "localhost",
181 .program = &nsm_program,
36e8e668 182 .version = NSM_VERSION,
e1ec7892 183 .authflavor = RPC_AUTH_NULL,
e1ec7892
CL
184 };
185
186 return rpc_create(&args);
1da177e4
LT
187}
188
189/*
190 * XDR functions for NSM.
2ca7754d
CL
191 *
192 * See http://www.opengroup.org/ for details on the Network
193 * Status Monitor wire protocol.
1da177e4
LT
194 */
195
099bd05f
CL
196static __be32 *xdr_encode_nsm_string(__be32 *p, char *string)
197{
198 size_t len = strlen(string);
199
200 if (len > SM_MAXSTRLEN)
201 len = SM_MAXSTRLEN;
202 return xdr_encode_opaque(p, string, len);
203}
204
49695174
CL
205/*
206 * "mon_name" specifies the host to be monitored.
49695174
CL
207 */
208static __be32 *xdr_encode_mon_name(__be32 *p, struct nsm_args *argp)
209{
29ed1407 210 return xdr_encode_nsm_string(p, argp->mon_name);
49695174
CL
211}
212
850c95fd
CL
213/*
214 * The "my_id" argument specifies the hostname and RPC procedure
215 * to be called when the status manager receives notification
36e8e668 216 * (via the NLMPROC_SM_NOTIFY call) that the state of host "mon_name"
850c95fd
CL
217 * has changed.
218 */
219static __be32 *xdr_encode_my_id(__be32 *p, struct nsm_args *argp)
220{
221 p = xdr_encode_nsm_string(p, utsname()->nodename);
222 if (!p)
223 return ERR_PTR(-EIO);
224
225 *p++ = htonl(argp->prog);
226 *p++ = htonl(argp->vers);
227 *p++ = htonl(argp->proc);
228
229 return p;
230}
231
ea72a7f1
CL
232/*
233 * The "mon_id" argument specifies the non-private arguments
36e8e668 234 * of an NSMPROC_MON or NSMPROC_UNMON call.
ea72a7f1
CL
235 */
236static __be32 *xdr_encode_mon_id(__be32 *p, struct nsm_args *argp)
237{
238 p = xdr_encode_mon_name(p, argp);
239 if (!p)
240 return ERR_PTR(-EIO);
241
242 return xdr_encode_my_id(p, argp);
243}
244
0490a54a
CL
245/*
246 * The "priv" argument may contain private information required
36e8e668
CL
247 * by the NSMPROC_MON call. This information will be supplied in the
248 * NLMPROC_SM_NOTIFY call.
0490a54a
CL
249 *
250 * Linux provides the raw IP address of the monitored host,
251 * left in network byte order.
252 */
253static __be32 *xdr_encode_priv(__be32 *p, struct nsm_args *argp)
254{
255 *p++ = argp->addr;
256 *p++ = 0;
257 *p++ = 0;
258 *p++ = 0;
259
260 return p;
261}
262
1da177e4 263static int
52921e02 264xdr_encode_mon(struct rpc_rqst *rqstp, __be32 *p, struct nsm_args *argp)
1da177e4 265{
2ca7754d 266 p = xdr_encode_mon_id(p, argp);
1da177e4
LT
267 if (IS_ERR(p))
268 return PTR_ERR(p);
9502c522 269
0490a54a
CL
270 p = xdr_encode_priv(p, argp);
271 if (IS_ERR(p))
272 return PTR_ERR(p);
273
1da177e4
LT
274 rqstp->rq_slen = xdr_adjust_iovec(rqstp->rq_svec, p);
275 return 0;
276}
277
278static int
52921e02 279xdr_encode_unmon(struct rpc_rqst *rqstp, __be32 *p, struct nsm_args *argp)
1da177e4 280{
2ca7754d 281 p = xdr_encode_mon_id(p, argp);
1da177e4
LT
282 if (IS_ERR(p))
283 return PTR_ERR(p);
284 rqstp->rq_slen = xdr_adjust_iovec(rqstp->rq_svec, p);
285 return 0;
286}
287
288static int
52921e02 289xdr_decode_stat_res(struct rpc_rqst *rqstp, __be32 *p, struct nsm_res *resp)
1da177e4
LT
290{
291 resp->status = ntohl(*p++);
292 resp->state = ntohl(*p++);
293 dprintk("nsm: xdr_decode_stat_res status %d state %d\n",
294 resp->status, resp->state);
295 return 0;
296}
297
298static int
52921e02 299xdr_decode_stat(struct rpc_rqst *rqstp, __be32 *p, struct nsm_res *resp)
1da177e4
LT
300{
301 resp->state = ntohl(*p++);
302 return 0;
303}
304
305#define SM_my_name_sz (1+XDR_QUADLEN(SM_MAXSTRLEN))
2ca7754d
CL
306#define SM_my_id_sz (SM_my_name_sz+3)
307#define SM_mon_name_sz (1+XDR_QUADLEN(SM_MAXSTRLEN))
308#define SM_mon_id_sz (SM_mon_name_sz+SM_my_id_sz)
0490a54a
CL
309#define SM_priv_sz (XDR_QUADLEN(SM_PRIV_SIZE))
310#define SM_mon_sz (SM_mon_id_sz+SM_priv_sz)
1da177e4
LT
311#define SM_monres_sz 2
312#define SM_unmonres_sz 1
313
1da177e4 314static struct rpc_procinfo nsm_procedures[] = {
36e8e668
CL
315[NSMPROC_MON] = {
316 .p_proc = NSMPROC_MON,
1da177e4
LT
317 .p_encode = (kxdrproc_t) xdr_encode_mon,
318 .p_decode = (kxdrproc_t) xdr_decode_stat_res,
2bea90d4
CL
319 .p_arglen = SM_mon_sz,
320 .p_replen = SM_monres_sz,
36e8e668 321 .p_statidx = NSMPROC_MON,
cc0175c1 322 .p_name = "MONITOR",
1da177e4 323 },
36e8e668
CL
324[NSMPROC_UNMON] = {
325 .p_proc = NSMPROC_UNMON,
1da177e4
LT
326 .p_encode = (kxdrproc_t) xdr_encode_unmon,
327 .p_decode = (kxdrproc_t) xdr_decode_stat,
2bea90d4
CL
328 .p_arglen = SM_mon_id_sz,
329 .p_replen = SM_unmonres_sz,
36e8e668 330 .p_statidx = NSMPROC_UNMON,
cc0175c1 331 .p_name = "UNMONITOR",
1da177e4
LT
332 },
333};
334
335static struct rpc_version nsm_version1 = {
e8c96f8c
TK
336 .number = 1,
337 .nrprocs = ARRAY_SIZE(nsm_procedures),
1da177e4
LT
338 .procs = nsm_procedures
339};
340
341static struct rpc_version * nsm_version[] = {
342 [1] = &nsm_version1,
343};
344
345static struct rpc_stat nsm_stats;
346
347static struct rpc_program nsm_program = {
348 .name = "statd",
36e8e668 349 .number = NSM_PROGRAM,
e8c96f8c 350 .nrvers = ARRAY_SIZE(nsm_version),
1da177e4
LT
351 .version = nsm_version,
352 .stats = &nsm_stats
353};