]> bbs.cooldavid.org Git - net-next-2.6.git/blame - fs/lockd/mon.c
lockd: document use of mon_id argument in SM_MON requests
[net-next-2.6.git] / fs / lockd / mon.c
CommitLineData
1da177e4
LT
1/*
2 * linux/fs/lockd/mon.c
3 *
4 * The kernel statd client.
5 *
6 * Copyright (C) 1996, Olaf Kirch <okir@monad.swb.de>
7 */
8
9#include <linux/types.h>
10#include <linux/utsname.h>
11#include <linux/kernel.h>
12#include <linux/sunrpc/clnt.h>
0896a725 13#include <linux/sunrpc/xprtsock.h>
1da177e4
LT
14#include <linux/sunrpc/svc.h>
15#include <linux/lockd/lockd.h>
16#include <linux/lockd/sm_inter.h>
17
18
19#define NLMDBG_FACILITY NLMDBG_MONITOR
20
49695174
CL
21#define XDR_ADDRBUF_LEN (20)
22
1da177e4
LT
23static struct rpc_clnt * nsm_create(void);
24
25static struct rpc_program nsm_program;
26
27/*
28 * Local NSM state
29 */
460f5cac 30int nsm_local_state;
1da177e4
LT
31
32/*
33 * Common procedure for SM_MON/SM_UNMON calls
34 */
35static int
9502c522 36nsm_mon_unmon(struct nsm_handle *nsm, u32 proc, struct nsm_res *res)
1da177e4
LT
37{
38 struct rpc_clnt *clnt;
39 int status;
40 struct nsm_args args;
dead28da
CL
41 struct rpc_message msg = {
42 .rpc_argp = &args,
43 .rpc_resp = res,
44 };
1da177e4
LT
45
46 clnt = nsm_create();
47 if (IS_ERR(clnt)) {
48 status = PTR_ERR(clnt);
49 goto out;
50 }
51
9502c522 52 memset(&args, 0, sizeof(args));
abd1f500 53 args.mon_name = nsm->sm_name;
9502c522 54 args.addr = nsm->sm_addr.sin_addr.s_addr;
1da177e4 55 args.prog = NLM_PROGRAM;
9502c522 56 args.vers = 3;
1da177e4
LT
57 args.proc = NLMPROC_NSM_NOTIFY;
58 memset(res, 0, sizeof(*res));
59
dead28da
CL
60 msg.rpc_proc = &clnt->cl_procinfo[proc];
61 status = rpc_call_sync(clnt, &msg, 0);
1da177e4
LT
62 if (status < 0)
63 printk(KERN_DEBUG "nsm_mon_unmon: rpc failed, status=%d\n",
64 status);
65 else
66 status = 0;
90c5755f 67 rpc_shutdown_client(clnt);
1da177e4
LT
68 out:
69 return status;
70}
71
72/*
73 * Set up monitoring of a remote host
74 */
75int
76nsm_monitor(struct nlm_host *host)
77{
8dead0db 78 struct nsm_handle *nsm = host->h_nsmhandle;
1da177e4
LT
79 struct nsm_res res;
80 int status;
81
82 dprintk("lockd: nsm_monitor(%s)\n", host->h_name);
8dead0db
OK
83 BUG_ON(nsm == NULL);
84
85 if (nsm->sm_monitored)
977faf39 86 return 0;
1da177e4 87
9502c522 88 status = nsm_mon_unmon(nsm, SM_MON, &res);
1da177e4
LT
89
90 if (status < 0 || res.status != 0)
91 printk(KERN_NOTICE "lockd: cannot monitor %s\n", host->h_name);
92 else
8dead0db 93 nsm->sm_monitored = 1;
1da177e4
LT
94 return status;
95}
96
97/*
98 * Cease to monitor remote host
99 */
100int
101nsm_unmonitor(struct nlm_host *host)
102{
8dead0db 103 struct nsm_handle *nsm = host->h_nsmhandle;
1da177e4 104 struct nsm_res res;
977faf39 105 int status = 0;
1da177e4 106
8dead0db 107 if (nsm == NULL)
977faf39 108 return 0;
8dead0db 109 host->h_nsmhandle = NULL;
977faf39 110
9502c522
OK
111 if (atomic_read(&nsm->sm_count) == 1
112 && nsm->sm_monitored && !nsm->sm_sticky) {
113 dprintk("lockd: nsm_unmonitor(%s)\n", host->h_name);
114
115 status = nsm_mon_unmon(nsm, SM_UNMON, &res);
977faf39 116 if (status < 0)
9502c522
OK
117 printk(KERN_NOTICE "lockd: cannot unmonitor %s\n",
118 host->h_name);
119 else
120 nsm->sm_monitored = 0;
977faf39 121 }
8dead0db 122 nsm_release(nsm);
1da177e4
LT
123 return status;
124}
125
126/*
127 * Create NSM client for the local host
128 */
129static struct rpc_clnt *
130nsm_create(void)
131{
e1ec7892
CL
132 struct sockaddr_in sin = {
133 .sin_family = AF_INET,
134 .sin_addr.s_addr = htonl(INADDR_LOOPBACK),
135 .sin_port = 0,
136 };
137 struct rpc_create_args args = {
0896a725 138 .protocol = XPRT_TRANSPORT_UDP,
e1ec7892
CL
139 .address = (struct sockaddr *)&sin,
140 .addrsize = sizeof(sin),
141 .servername = "localhost",
142 .program = &nsm_program,
143 .version = SM_VERSION,
144 .authflavor = RPC_AUTH_NULL,
e1ec7892
CL
145 };
146
147 return rpc_create(&args);
1da177e4
LT
148}
149
150/*
151 * XDR functions for NSM.
152 */
153
099bd05f
CL
154static __be32 *xdr_encode_nsm_string(__be32 *p, char *string)
155{
156 size_t len = strlen(string);
157
158 if (len > SM_MAXSTRLEN)
159 len = SM_MAXSTRLEN;
160 return xdr_encode_opaque(p, string, len);
161}
162
49695174
CL
163/*
164 * "mon_name" specifies the host to be monitored.
165 *
166 * Linux uses a text version of the IP address of the remote
167 * host as the host identifier (the "mon_name" argument).
168 *
169 * Linux statd always looks up the canonical hostname first for
170 * whatever remote hostname it receives, so this works alright.
171 */
172static __be32 *xdr_encode_mon_name(__be32 *p, struct nsm_args *argp)
173{
174 char buffer[XDR_ADDRBUF_LEN + 1];
175 char *name = argp->mon_name;
176
177 if (!nsm_use_hostnames) {
178 snprintf(buffer, XDR_ADDRBUF_LEN,
179 NIPQUAD_FMT, NIPQUAD(argp->addr));
180 name = buffer;
181 }
182
183 return xdr_encode_nsm_string(p, name);
184}
185
850c95fd
CL
186/*
187 * The "my_id" argument specifies the hostname and RPC procedure
188 * to be called when the status manager receives notification
189 * (via the SM_NOTIFY call) that the state of host "mon_name"
190 * has changed.
191 */
192static __be32 *xdr_encode_my_id(__be32 *p, struct nsm_args *argp)
193{
194 p = xdr_encode_nsm_string(p, utsname()->nodename);
195 if (!p)
196 return ERR_PTR(-EIO);
197
198 *p++ = htonl(argp->prog);
199 *p++ = htonl(argp->vers);
200 *p++ = htonl(argp->proc);
201
202 return p;
203}
204
ea72a7f1
CL
205/*
206 * The "mon_id" argument specifies the non-private arguments
207 * of an SM_MON or SM_UNMON call.
208 */
209static __be32 *xdr_encode_mon_id(__be32 *p, struct nsm_args *argp)
210{
211 p = xdr_encode_mon_name(p, argp);
212 if (!p)
213 return ERR_PTR(-EIO);
214
215 return xdr_encode_my_id(p, argp);
216}
217
52921e02
AV
218static __be32 *
219xdr_encode_common(struct rpc_rqst *rqstp, __be32 *p, struct nsm_args *argp)
1da177e4 220{
abd1f500 221 char buffer[20], *name;
1da177e4
LT
222
223 /*
224 * Use the dotted-quad IP address of the remote host as
225 * identifier. Linux statd always looks up the canonical
226 * hostname first for whatever remote hostname it receives,
227 * so this works alright.
228 */
abd1f500
OK
229 if (nsm_use_hostnames) {
230 name = argp->mon_name;
231 } else {
232 sprintf(buffer, "%u.%u.%u.%u", NIPQUAD(argp->addr));
233 name = buffer;
234 }
235 if (!(p = xdr_encode_string(p, name))
e9ff3990 236 || !(p = xdr_encode_string(p, utsname()->nodename)))
1da177e4
LT
237 return ERR_PTR(-EIO);
238 *p++ = htonl(argp->prog);
239 *p++ = htonl(argp->vers);
240 *p++ = htonl(argp->proc);
241
242 return p;
243}
244
245static int
52921e02 246xdr_encode_mon(struct rpc_rqst *rqstp, __be32 *p, struct nsm_args *argp)
1da177e4
LT
247{
248 p = xdr_encode_common(rqstp, p, argp);
249 if (IS_ERR(p))
250 return PTR_ERR(p);
9502c522
OK
251
252 /* Surprise - there may even be room for an IPv6 address now */
1da177e4 253 *p++ = argp->addr;
9502c522
OK
254 *p++ = 0;
255 *p++ = 0;
1da177e4
LT
256 *p++ = 0;
257 rqstp->rq_slen = xdr_adjust_iovec(rqstp->rq_svec, p);
258 return 0;
259}
260
261static int
52921e02 262xdr_encode_unmon(struct rpc_rqst *rqstp, __be32 *p, struct nsm_args *argp)
1da177e4
LT
263{
264 p = xdr_encode_common(rqstp, p, argp);
265 if (IS_ERR(p))
266 return PTR_ERR(p);
267 rqstp->rq_slen = xdr_adjust_iovec(rqstp->rq_svec, p);
268 return 0;
269}
270
271static int
52921e02 272xdr_decode_stat_res(struct rpc_rqst *rqstp, __be32 *p, struct nsm_res *resp)
1da177e4
LT
273{
274 resp->status = ntohl(*p++);
275 resp->state = ntohl(*p++);
276 dprintk("nsm: xdr_decode_stat_res status %d state %d\n",
277 resp->status, resp->state);
278 return 0;
279}
280
281static int
52921e02 282xdr_decode_stat(struct rpc_rqst *rqstp, __be32 *p, struct nsm_res *resp)
1da177e4
LT
283{
284 resp->state = ntohl(*p++);
285 return 0;
286}
287
288#define SM_my_name_sz (1+XDR_QUADLEN(SM_MAXSTRLEN))
289#define SM_my_id_sz (3+1+SM_my_name_sz)
290#define SM_mon_id_sz (1+XDR_QUADLEN(20)+SM_my_id_sz)
291#define SM_mon_sz (SM_mon_id_sz+4)
292#define SM_monres_sz 2
293#define SM_unmonres_sz 1
294
1da177e4
LT
295static struct rpc_procinfo nsm_procedures[] = {
296[SM_MON] = {
297 .p_proc = SM_MON,
298 .p_encode = (kxdrproc_t) xdr_encode_mon,
299 .p_decode = (kxdrproc_t) xdr_decode_stat_res,
2bea90d4
CL
300 .p_arglen = SM_mon_sz,
301 .p_replen = SM_monres_sz,
cc0175c1
CL
302 .p_statidx = SM_MON,
303 .p_name = "MONITOR",
1da177e4
LT
304 },
305[SM_UNMON] = {
306 .p_proc = SM_UNMON,
307 .p_encode = (kxdrproc_t) xdr_encode_unmon,
308 .p_decode = (kxdrproc_t) xdr_decode_stat,
2bea90d4
CL
309 .p_arglen = SM_mon_id_sz,
310 .p_replen = SM_unmonres_sz,
cc0175c1
CL
311 .p_statidx = SM_UNMON,
312 .p_name = "UNMONITOR",
1da177e4
LT
313 },
314};
315
316static struct rpc_version nsm_version1 = {
e8c96f8c
TK
317 .number = 1,
318 .nrprocs = ARRAY_SIZE(nsm_procedures),
1da177e4
LT
319 .procs = nsm_procedures
320};
321
322static struct rpc_version * nsm_version[] = {
323 [1] = &nsm_version1,
324};
325
326static struct rpc_stat nsm_stats;
327
328static struct rpc_program nsm_program = {
329 .name = "statd",
330 .number = SM_PROGRAM,
e8c96f8c 331 .nrvers = ARRAY_SIZE(nsm_version),
1da177e4
LT
332 .version = nsm_version,
333 .stats = &nsm_stats
334};