NLM: Decode "priv" argument of NLMPROC_SM_NOTIFY as an opaque
[safe/jmp/linux-2.6] / fs / lockd / host.c
1 /*
2  * linux/fs/lockd/host.c
3  *
4  * Management for NLM peer hosts. The nlm_host struct is shared
5  * between client and server implementation. The only reason to
6  * do so is to reduce code bloat.
7  *
8  * Copyright (C) 1996, Olaf Kirch <okir@monad.swb.de>
9  */
10
11 #include <linux/types.h>
12 #include <linux/slab.h>
13 #include <linux/in.h>
14 #include <linux/in6.h>
15 #include <linux/sunrpc/clnt.h>
16 #include <linux/sunrpc/svc.h>
17 #include <linux/lockd/lockd.h>
18 #include <linux/lockd/sm_inter.h>
19 #include <linux/mutex.h>
20
21 #include <net/ipv6.h>
22
23 #define NLMDBG_FACILITY         NLMDBG_HOSTCACHE
24 #define NLM_HOST_NRHASH         32
25 #define NLM_HOST_REBIND         (60 * HZ)
26 #define NLM_HOST_EXPIRE         (300 * HZ)
27 #define NLM_HOST_COLLECT        (120 * HZ)
28
29 static struct hlist_head        nlm_hosts[NLM_HOST_NRHASH];
30 static unsigned long            next_gc;
31 static int                      nrhosts;
32 static DEFINE_MUTEX(nlm_host_mutex);
33
34 static void                     nlm_gc_hosts(void);
35
36 struct nlm_lookup_host_info {
37         const int               server;         /* search for server|client */
38         const struct sockaddr   *sap;           /* address to search for */
39         const size_t            salen;          /* it's length */
40         const unsigned short    protocol;       /* transport to search for*/
41         const u32               version;        /* NLM version to search for */
42         const char              *hostname;      /* remote's hostname */
43         const size_t            hostname_len;   /* it's length */
44         const struct sockaddr   *src_sap;       /* our address (optional) */
45         const size_t            src_len;        /* it's length */
46         const int               noresvport;     /* use non-priv port */
47 };
48
49 /*
50  * Hash function must work well on big- and little-endian platforms
51  */
52 static unsigned int __nlm_hash32(const __be32 n)
53 {
54         unsigned int hash = (__force u32)n ^ ((__force u32)n >> 16);
55         return hash ^ (hash >> 8);
56 }
57
58 static unsigned int __nlm_hash_addr4(const struct sockaddr *sap)
59 {
60         const struct sockaddr_in *sin = (struct sockaddr_in *)sap;
61         return __nlm_hash32(sin->sin_addr.s_addr);
62 }
63
64 static unsigned int __nlm_hash_addr6(const struct sockaddr *sap)
65 {
66         const struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap;
67         const struct in6_addr addr = sin6->sin6_addr;
68         return __nlm_hash32(addr.s6_addr32[0]) ^
69                __nlm_hash32(addr.s6_addr32[1]) ^
70                __nlm_hash32(addr.s6_addr32[2]) ^
71                __nlm_hash32(addr.s6_addr32[3]);
72 }
73
74 static unsigned int nlm_hash_address(const struct sockaddr *sap)
75 {
76         unsigned int hash;
77
78         switch (sap->sa_family) {
79         case AF_INET:
80                 hash = __nlm_hash_addr4(sap);
81                 break;
82         case AF_INET6:
83                 hash = __nlm_hash_addr6(sap);
84                 break;
85         default:
86                 hash = 0;
87         }
88         return hash & (NLM_HOST_NRHASH - 1);
89 }
90
91 static void nlm_clear_port(struct sockaddr *sap)
92 {
93         switch (sap->sa_family) {
94         case AF_INET:
95                 ((struct sockaddr_in *)sap)->sin_port = 0;
96                 break;
97         case AF_INET6:
98                 ((struct sockaddr_in6 *)sap)->sin6_port = 0;
99                 break;
100         }
101 }
102
103 /*
104  * Common host lookup routine for server & client
105  */
106 static struct nlm_host *nlm_lookup_host(struct nlm_lookup_host_info *ni)
107 {
108         struct hlist_head *chain;
109         struct hlist_node *pos;
110         struct nlm_host *host;
111         struct nsm_handle *nsm = NULL;
112
113         mutex_lock(&nlm_host_mutex);
114
115         if (time_after_eq(jiffies, next_gc))
116                 nlm_gc_hosts();
117
118         /* We may keep several nlm_host objects for a peer, because each
119          * nlm_host is identified by
120          * (address, protocol, version, server/client)
121          * We could probably simplify this a little by putting all those
122          * different NLM rpc_clients into one single nlm_host object.
123          * This would allow us to have one nlm_host per address.
124          */
125         chain = &nlm_hosts[nlm_hash_address(ni->sap)];
126         hlist_for_each_entry(host, pos, chain, h_hash) {
127                 if (!nlm_cmp_addr(nlm_addr(host), ni->sap))
128                         continue;
129
130                 /* See if we have an NSM handle for this client */
131                 if (!nsm)
132                         nsm = host->h_nsmhandle;
133
134                 if (host->h_proto != ni->protocol)
135                         continue;
136                 if (host->h_version != ni->version)
137                         continue;
138                 if (host->h_server != ni->server)
139                         continue;
140                 if (ni->server &&
141                     !nlm_cmp_addr(nlm_srcaddr(host), ni->src_sap))
142                         continue;
143
144                 /* Move to head of hash chain. */
145                 hlist_del(&host->h_hash);
146                 hlist_add_head(&host->h_hash, chain);
147
148                 nlm_get_host(host);
149                 dprintk("lockd: nlm_lookup_host found host %s (%s)\n",
150                                 host->h_name, host->h_addrbuf);
151                 goto out;
152         }
153
154         /*
155          * The host wasn't in our hash table.  If we don't
156          * have an NSM handle for it yet, create one.
157          */
158         if (nsm)
159                 atomic_inc(&nsm->sm_count);
160         else {
161                 host = NULL;
162                 nsm = nsm_find(ni->sap, ni->salen,
163                                 ni->hostname, ni->hostname_len, 1);
164                 if (!nsm) {
165                         dprintk("lockd: nlm_lookup_host failed; "
166                                 "no nsm handle\n");
167                         goto out;
168                 }
169         }
170
171         host = kzalloc(sizeof(*host), GFP_KERNEL);
172         if (!host) {
173                 nsm_release(nsm);
174                 dprintk("lockd: nlm_lookup_host failed; no memory\n");
175                 goto out;
176         }
177         host->h_name       = nsm->sm_name;
178         host->h_addrbuf    = nsm->sm_addrbuf;
179         memcpy(nlm_addr(host), ni->sap, ni->salen);
180         host->h_addrlen = ni->salen;
181         nlm_clear_port(nlm_addr(host));
182         memcpy(nlm_srcaddr(host), ni->src_sap, ni->src_len);
183         host->h_version    = ni->version;
184         host->h_proto      = ni->protocol;
185         host->h_rpcclnt    = NULL;
186         mutex_init(&host->h_mutex);
187         host->h_nextrebind = jiffies + NLM_HOST_REBIND;
188         host->h_expires    = jiffies + NLM_HOST_EXPIRE;
189         atomic_set(&host->h_count, 1);
190         init_waitqueue_head(&host->h_gracewait);
191         init_rwsem(&host->h_rwsem);
192         host->h_state      = 0;                 /* pseudo NSM state */
193         host->h_nsmstate   = 0;                 /* real NSM state */
194         host->h_nsmhandle  = nsm;
195         host->h_server     = ni->server;
196         host->h_noresvport = ni->noresvport;
197         hlist_add_head(&host->h_hash, chain);
198         INIT_LIST_HEAD(&host->h_lockowners);
199         spin_lock_init(&host->h_lock);
200         INIT_LIST_HEAD(&host->h_granted);
201         INIT_LIST_HEAD(&host->h_reclaim);
202
203         nrhosts++;
204
205         dprintk("lockd: nlm_lookup_host created host %s\n",
206                         host->h_name);
207
208 out:
209         mutex_unlock(&nlm_host_mutex);
210         return host;
211 }
212
213 /*
214  * Destroy a host
215  */
216 static void
217 nlm_destroy_host(struct nlm_host *host)
218 {
219         struct rpc_clnt *clnt;
220
221         BUG_ON(!list_empty(&host->h_lockowners));
222         BUG_ON(atomic_read(&host->h_count));
223
224         nsm_unmonitor(host);
225         nsm_release(host->h_nsmhandle);
226
227         clnt = host->h_rpcclnt;
228         if (clnt != NULL)
229                 rpc_shutdown_client(clnt);
230         kfree(host);
231 }
232
233 /**
234  * nlmclnt_lookup_host - Find an NLM host handle matching a remote server
235  * @sap: network address of server
236  * @salen: length of server address
237  * @protocol: transport protocol to use
238  * @version: NLM protocol version
239  * @hostname: '\0'-terminated hostname of server
240  * @noresvport: 1 if non-privileged port should be used
241  *
242  * Returns an nlm_host structure that matches the passed-in
243  * [server address, transport protocol, NLM version, server hostname].
244  * If one doesn't already exist in the host cache, a new handle is
245  * created and returned.
246  */
247 struct nlm_host *nlmclnt_lookup_host(const struct sockaddr *sap,
248                                      const size_t salen,
249                                      const unsigned short protocol,
250                                      const u32 version,
251                                      const char *hostname,
252                                      int noresvport)
253 {
254         const struct sockaddr source = {
255                 .sa_family      = AF_UNSPEC,
256         };
257         struct nlm_lookup_host_info ni = {
258                 .server         = 0,
259                 .sap            = sap,
260                 .salen          = salen,
261                 .protocol       = protocol,
262                 .version        = version,
263                 .hostname       = hostname,
264                 .hostname_len   = strlen(hostname),
265                 .src_sap        = &source,
266                 .src_len        = sizeof(source),
267                 .noresvport     = noresvport,
268         };
269
270         dprintk("lockd: %s(host='%s', vers=%u, proto=%s)\n", __func__,
271                         (hostname ? hostname : "<none>"), version,
272                         (protocol == IPPROTO_UDP ? "udp" : "tcp"));
273
274         return nlm_lookup_host(&ni);
275 }
276
277 /**
278  * nlmsvc_lookup_host - Find an NLM host handle matching a remote client
279  * @rqstp: incoming NLM request
280  * @hostname: name of client host
281  * @hostname_len: length of client hostname
282  *
283  * Returns an nlm_host structure that matches the [client address,
284  * transport protocol, NLM version, client hostname] of the passed-in
285  * NLM request.  If one doesn't already exist in the host cache, a
286  * new handle is created and returned.
287  *
288  * Before possibly creating a new nlm_host, construct a sockaddr
289  * for a specific source address in case the local system has
290  * multiple network addresses.  The family of the address in
291  * rq_daddr is guaranteed to be the same as the family of the
292  * address in rq_addr, so it's safe to use the same family for
293  * the source address.
294  */
295 struct nlm_host *nlmsvc_lookup_host(const struct svc_rqst *rqstp,
296                                     const char *hostname,
297                                     const size_t hostname_len)
298 {
299         struct sockaddr_in sin = {
300                 .sin_family     = AF_INET,
301         };
302         struct sockaddr_in6 sin6 = {
303                 .sin6_family    = AF_INET6,
304         };
305         struct nlm_lookup_host_info ni = {
306                 .server         = 1,
307                 .sap            = svc_addr(rqstp),
308                 .salen          = rqstp->rq_addrlen,
309                 .protocol       = rqstp->rq_prot,
310                 .version        = rqstp->rq_vers,
311                 .hostname       = hostname,
312                 .hostname_len   = hostname_len,
313                 .src_len        = rqstp->rq_addrlen,
314         };
315
316         dprintk("lockd: %s(host='%*s', vers=%u, proto=%s)\n", __func__,
317                         (int)hostname_len, hostname, rqstp->rq_vers,
318                         (rqstp->rq_prot == IPPROTO_UDP ? "udp" : "tcp"));
319
320         switch (ni.sap->sa_family) {
321         case AF_INET:
322                 sin.sin_addr.s_addr = rqstp->rq_daddr.addr.s_addr;
323                 ni.src_sap = (struct sockaddr *)&sin;
324                 break;
325         case AF_INET6:
326                 ipv6_addr_copy(&sin6.sin6_addr, &rqstp->rq_daddr.addr6);
327                 ni.src_sap = (struct sockaddr *)&sin6;
328                 break;
329         default:
330                 return NULL;
331         }
332
333         return nlm_lookup_host(&ni);
334 }
335
336 /*
337  * Create the NLM RPC client for an NLM peer
338  */
339 struct rpc_clnt *
340 nlm_bind_host(struct nlm_host *host)
341 {
342         struct rpc_clnt *clnt;
343
344         dprintk("lockd: nlm_bind_host %s (%s)\n",
345                         host->h_name, host->h_addrbuf);
346
347         /* Lock host handle */
348         mutex_lock(&host->h_mutex);
349
350         /* If we've already created an RPC client, check whether
351          * RPC rebind is required
352          */
353         if ((clnt = host->h_rpcclnt) != NULL) {
354                 if (time_after_eq(jiffies, host->h_nextrebind)) {
355                         rpc_force_rebind(clnt);
356                         host->h_nextrebind = jiffies + NLM_HOST_REBIND;
357                         dprintk("lockd: next rebind in %lu jiffies\n",
358                                         host->h_nextrebind - jiffies);
359                 }
360         } else {
361                 unsigned long increment = nlmsvc_timeout;
362                 struct rpc_timeout timeparms = {
363                         .to_initval     = increment,
364                         .to_increment   = increment,
365                         .to_maxval      = increment * 6UL,
366                         .to_retries     = 5U,
367                 };
368                 struct rpc_create_args args = {
369                         .protocol       = host->h_proto,
370                         .address        = nlm_addr(host),
371                         .addrsize       = host->h_addrlen,
372                         .saddress       = nlm_srcaddr(host),
373                         .timeout        = &timeparms,
374                         .servername     = host->h_name,
375                         .program        = &nlm_program,
376                         .version        = host->h_version,
377                         .authflavor     = RPC_AUTH_UNIX,
378                         .flags          = (RPC_CLNT_CREATE_NOPING |
379                                            RPC_CLNT_CREATE_AUTOBIND),
380                 };
381
382                 /*
383                  * lockd retries server side blocks automatically so we want
384                  * those to be soft RPC calls. Client side calls need to be
385                  * hard RPC tasks.
386                  */
387                 if (!host->h_server)
388                         args.flags |= RPC_CLNT_CREATE_HARDRTRY;
389                 if (host->h_noresvport)
390                         args.flags |= RPC_CLNT_CREATE_NONPRIVPORT;
391
392                 clnt = rpc_create(&args);
393                 if (!IS_ERR(clnt))
394                         host->h_rpcclnt = clnt;
395                 else {
396                         printk("lockd: couldn't create RPC handle for %s\n", host->h_name);
397                         clnt = NULL;
398                 }
399         }
400
401         mutex_unlock(&host->h_mutex);
402         return clnt;
403 }
404
405 /*
406  * Force a portmap lookup of the remote lockd port
407  */
408 void
409 nlm_rebind_host(struct nlm_host *host)
410 {
411         dprintk("lockd: rebind host %s\n", host->h_name);
412         if (host->h_rpcclnt && time_after_eq(jiffies, host->h_nextrebind)) {
413                 rpc_force_rebind(host->h_rpcclnt);
414                 host->h_nextrebind = jiffies + NLM_HOST_REBIND;
415         }
416 }
417
418 /*
419  * Increment NLM host count
420  */
421 struct nlm_host * nlm_get_host(struct nlm_host *host)
422 {
423         if (host) {
424                 dprintk("lockd: get host %s\n", host->h_name);
425                 atomic_inc(&host->h_count);
426                 host->h_expires = jiffies + NLM_HOST_EXPIRE;
427         }
428         return host;
429 }
430
431 /*
432  * Release NLM host after use
433  */
434 void nlm_release_host(struct nlm_host *host)
435 {
436         if (host != NULL) {
437                 dprintk("lockd: release host %s\n", host->h_name);
438                 BUG_ON(atomic_read(&host->h_count) < 0);
439                 if (atomic_dec_and_test(&host->h_count)) {
440                         BUG_ON(!list_empty(&host->h_lockowners));
441                         BUG_ON(!list_empty(&host->h_granted));
442                         BUG_ON(!list_empty(&host->h_reclaim));
443                 }
444         }
445 }
446
447 /**
448  * nlm_host_rebooted - Release all resources held by rebooted host
449  * @info: pointer to decoded results of NLM_SM_NOTIFY call
450  *
451  * We were notified that the specified host has rebooted.  Release
452  * all resources held by that peer.
453  */
454 void nlm_host_rebooted(const struct nlm_reboot *info)
455 {
456         __be32 *p = (__be32 *)&info->priv.data;
457         const struct sockaddr_in sin = {
458                 .sin_family             = AF_INET,
459                 .sin_addr.s_addr        = *p,
460         };
461         struct hlist_head *chain;
462         struct hlist_node *pos;
463         struct nsm_handle *nsm;
464         struct nlm_host *host;
465
466         nsm = nsm_find((struct sockaddr *)&sin, sizeof(sin),
467                         info->mon, info->len, 0);
468         if (nsm == NULL) {
469                 dprintk("lockd: never saw rebooted peer '%.*s' before\n",
470                                 info->len, info->mon);
471                 return;
472         }
473
474         dprintk("lockd: nlm_host_rebooted(%.*s, %s)\n",
475                         info->len, info->mon, nsm->sm_addrbuf);
476
477         /* When reclaiming locks on this peer, make sure that
478          * we set up a new notification */
479         nsm->sm_monitored = 0;
480
481         /* Mark all hosts tied to this NSM state as having rebooted.
482          * We run the loop repeatedly, because we drop the host table
483          * lock for this.
484          * To avoid processing a host several times, we match the nsmstate.
485          */
486 again:  mutex_lock(&nlm_host_mutex);
487         for (chain = nlm_hosts; chain < nlm_hosts + NLM_HOST_NRHASH; ++chain) {
488                 hlist_for_each_entry(host, pos, chain, h_hash) {
489                         if (host->h_nsmhandle == nsm
490                          && host->h_nsmstate != info->state) {
491                                 host->h_nsmstate = info->state;
492                                 host->h_state++;
493
494                                 nlm_get_host(host);
495                                 mutex_unlock(&nlm_host_mutex);
496
497                                 if (host->h_server) {
498                                         /* We're server for this guy, just ditch
499                                          * all the locks he held. */
500                                         nlmsvc_free_host_resources(host);
501                                 } else {
502                                         /* He's the server, initiate lock recovery. */
503                                         nlmclnt_recovery(host);
504                                 }
505
506                                 nlm_release_host(host);
507                                 goto again;
508                         }
509                 }
510         }
511
512         mutex_unlock(&nlm_host_mutex);
513 }
514
515 /*
516  * Shut down the hosts module.
517  * Note that this routine is called only at server shutdown time.
518  */
519 void
520 nlm_shutdown_hosts(void)
521 {
522         struct hlist_head *chain;
523         struct hlist_node *pos;
524         struct nlm_host *host;
525
526         dprintk("lockd: shutting down host module\n");
527         mutex_lock(&nlm_host_mutex);
528
529         /* First, make all hosts eligible for gc */
530         dprintk("lockd: nuking all hosts...\n");
531         for (chain = nlm_hosts; chain < nlm_hosts + NLM_HOST_NRHASH; ++chain) {
532                 hlist_for_each_entry(host, pos, chain, h_hash) {
533                         host->h_expires = jiffies - 1;
534                         if (host->h_rpcclnt) {
535                                 rpc_shutdown_client(host->h_rpcclnt);
536                                 host->h_rpcclnt = NULL;
537                         }
538                 }
539         }
540
541         /* Then, perform a garbage collection pass */
542         nlm_gc_hosts();
543         mutex_unlock(&nlm_host_mutex);
544
545         /* complain if any hosts are left */
546         if (nrhosts) {
547                 printk(KERN_WARNING "lockd: couldn't shutdown host module!\n");
548                 dprintk("lockd: %d hosts left:\n", nrhosts);
549                 for (chain = nlm_hosts; chain < nlm_hosts + NLM_HOST_NRHASH; ++chain) {
550                         hlist_for_each_entry(host, pos, chain, h_hash) {
551                                 dprintk("       %s (cnt %d use %d exp %ld)\n",
552                                         host->h_name, atomic_read(&host->h_count),
553                                         host->h_inuse, host->h_expires);
554                         }
555                 }
556         }
557 }
558
559 /*
560  * Garbage collect any unused NLM hosts.
561  * This GC combines reference counting for async operations with
562  * mark & sweep for resources held by remote clients.
563  */
564 static void
565 nlm_gc_hosts(void)
566 {
567         struct hlist_head *chain;
568         struct hlist_node *pos, *next;
569         struct nlm_host *host;
570
571         dprintk("lockd: host garbage collection\n");
572         for (chain = nlm_hosts; chain < nlm_hosts + NLM_HOST_NRHASH; ++chain) {
573                 hlist_for_each_entry(host, pos, chain, h_hash)
574                         host->h_inuse = 0;
575         }
576
577         /* Mark all hosts that hold locks, blocks or shares */
578         nlmsvc_mark_resources();
579
580         for (chain = nlm_hosts; chain < nlm_hosts + NLM_HOST_NRHASH; ++chain) {
581                 hlist_for_each_entry_safe(host, pos, next, chain, h_hash) {
582                         if (atomic_read(&host->h_count) || host->h_inuse
583                          || time_before(jiffies, host->h_expires)) {
584                                 dprintk("nlm_gc_hosts skipping %s (cnt %d use %d exp %ld)\n",
585                                         host->h_name, atomic_read(&host->h_count),
586                                         host->h_inuse, host->h_expires);
587                                 continue;
588                         }
589                         dprintk("lockd: delete host %s\n", host->h_name);
590                         hlist_del_init(&host->h_hash);
591
592                         nlm_destroy_host(host);
593                         nrhosts--;
594                 }
595         }
596
597         next_gc = jiffies + NLM_HOST_COLLECT;
598 }