4 * The kernel statd client.
6 * Copyright (C) 1996, Olaf Kirch <okir@monad.swb.de>
9 #include <linux/types.h>
10 #include <linux/utsname.h>
11 #include <linux/kernel.h>
12 #include <linux/sunrpc/clnt.h>
13 #include <linux/sunrpc/xprtsock.h>
14 #include <linux/sunrpc/svc.h>
15 #include <linux/lockd/lockd.h>
16 #include <linux/lockd/sm_inter.h>
19 #define NLMDBG_FACILITY NLMDBG_MONITOR
21 #define XDR_ADDRBUF_LEN (20)
23 static struct rpc_clnt * nsm_create(void);
25 static struct rpc_program nsm_program;
33 * Common procedure for SM_MON/SM_UNMON calls
36 nsm_mon_unmon(struct nsm_handle *nsm, u32 proc, struct nsm_res *res)
38 struct rpc_clnt *clnt;
40 struct nsm_args args = {
41 .addr = nsm_addr_in(nsm)->sin_addr.s_addr,
44 .proc = NLMPROC_NSM_NOTIFY,
45 .mon_name = nsm->sm_name,
47 struct rpc_message msg = {
54 status = PTR_ERR(clnt);
58 memset(res, 0, sizeof(*res));
60 msg.rpc_proc = &clnt->cl_procinfo[proc];
61 status = rpc_call_sync(clnt, &msg, 0);
63 printk(KERN_DEBUG "nsm_mon_unmon: rpc failed, status=%d\n",
67 rpc_shutdown_client(clnt);
73 * Set up monitoring of a remote host
76 nsm_monitor(struct nlm_host *host)
78 struct nsm_handle *nsm = host->h_nsmhandle;
82 dprintk("lockd: nsm_monitor(%s)\n", host->h_name);
85 if (nsm->sm_monitored)
88 status = nsm_mon_unmon(nsm, SM_MON, &res);
90 if (status < 0 || res.status != 0)
91 printk(KERN_NOTICE "lockd: cannot monitor %s\n", host->h_name);
93 nsm->sm_monitored = 1;
98 * Cease to monitor remote host
101 nsm_unmonitor(struct nlm_host *host)
103 struct nsm_handle *nsm = host->h_nsmhandle;
109 host->h_nsmhandle = NULL;
111 if (atomic_read(&nsm->sm_count) == 1
112 && nsm->sm_monitored && !nsm->sm_sticky) {
113 dprintk("lockd: nsm_unmonitor(%s)\n", host->h_name);
115 status = nsm_mon_unmon(nsm, SM_UNMON, &res);
117 printk(KERN_NOTICE "lockd: cannot unmonitor %s\n",
120 nsm->sm_monitored = 0;
127 * Create NSM client for the local host
129 static struct rpc_clnt *
132 struct sockaddr_in sin = {
133 .sin_family = AF_INET,
134 .sin_addr.s_addr = htonl(INADDR_LOOPBACK),
137 struct rpc_create_args args = {
138 .protocol = XPRT_TRANSPORT_UDP,
139 .address = (struct sockaddr *)&sin,
140 .addrsize = sizeof(sin),
141 .servername = "localhost",
142 .program = &nsm_program,
143 .version = SM_VERSION,
144 .authflavor = RPC_AUTH_NULL,
147 return rpc_create(&args);
151 * XDR functions for NSM.
153 * See http://www.opengroup.org/ for details on the Network
154 * Status Monitor wire protocol.
157 static __be32 *xdr_encode_nsm_string(__be32 *p, char *string)
159 size_t len = strlen(string);
161 if (len > SM_MAXSTRLEN)
163 return xdr_encode_opaque(p, string, len);
167 * "mon_name" specifies the host to be monitored.
169 * Linux uses a text version of the IP address of the remote
170 * host as the host identifier (the "mon_name" argument).
172 * Linux statd always looks up the canonical hostname first for
173 * whatever remote hostname it receives, so this works alright.
175 static __be32 *xdr_encode_mon_name(__be32 *p, struct nsm_args *argp)
177 char buffer[XDR_ADDRBUF_LEN + 1];
178 char *name = argp->mon_name;
180 if (!nsm_use_hostnames) {
181 snprintf(buffer, XDR_ADDRBUF_LEN,
182 "%pI4", &argp->addr);
186 return xdr_encode_nsm_string(p, name);
190 * The "my_id" argument specifies the hostname and RPC procedure
191 * to be called when the status manager receives notification
192 * (via the SM_NOTIFY call) that the state of host "mon_name"
195 static __be32 *xdr_encode_my_id(__be32 *p, struct nsm_args *argp)
197 p = xdr_encode_nsm_string(p, utsname()->nodename);
199 return ERR_PTR(-EIO);
201 *p++ = htonl(argp->prog);
202 *p++ = htonl(argp->vers);
203 *p++ = htonl(argp->proc);
209 * The "mon_id" argument specifies the non-private arguments
210 * of an SM_MON or SM_UNMON call.
212 static __be32 *xdr_encode_mon_id(__be32 *p, struct nsm_args *argp)
214 p = xdr_encode_mon_name(p, argp);
216 return ERR_PTR(-EIO);
218 return xdr_encode_my_id(p, argp);
222 * The "priv" argument may contain private information required
223 * by the SM_MON call. This information will be supplied in the
226 * Linux provides the raw IP address of the monitored host,
227 * left in network byte order.
229 static __be32 *xdr_encode_priv(__be32 *p, struct nsm_args *argp)
240 xdr_encode_mon(struct rpc_rqst *rqstp, __be32 *p, struct nsm_args *argp)
242 p = xdr_encode_mon_id(p, argp);
246 p = xdr_encode_priv(p, argp);
250 rqstp->rq_slen = xdr_adjust_iovec(rqstp->rq_svec, p);
255 xdr_encode_unmon(struct rpc_rqst *rqstp, __be32 *p, struct nsm_args *argp)
257 p = xdr_encode_mon_id(p, argp);
260 rqstp->rq_slen = xdr_adjust_iovec(rqstp->rq_svec, p);
265 xdr_decode_stat_res(struct rpc_rqst *rqstp, __be32 *p, struct nsm_res *resp)
267 resp->status = ntohl(*p++);
268 resp->state = ntohl(*p++);
269 dprintk("nsm: xdr_decode_stat_res status %d state %d\n",
270 resp->status, resp->state);
275 xdr_decode_stat(struct rpc_rqst *rqstp, __be32 *p, struct nsm_res *resp)
277 resp->state = ntohl(*p++);
281 #define SM_my_name_sz (1+XDR_QUADLEN(SM_MAXSTRLEN))
282 #define SM_my_id_sz (SM_my_name_sz+3)
283 #define SM_mon_name_sz (1+XDR_QUADLEN(SM_MAXSTRLEN))
284 #define SM_mon_id_sz (SM_mon_name_sz+SM_my_id_sz)
285 #define SM_priv_sz (XDR_QUADLEN(SM_PRIV_SIZE))
286 #define SM_mon_sz (SM_mon_id_sz+SM_priv_sz)
287 #define SM_monres_sz 2
288 #define SM_unmonres_sz 1
290 static struct rpc_procinfo nsm_procedures[] = {
293 .p_encode = (kxdrproc_t) xdr_encode_mon,
294 .p_decode = (kxdrproc_t) xdr_decode_stat_res,
295 .p_arglen = SM_mon_sz,
296 .p_replen = SM_monres_sz,
302 .p_encode = (kxdrproc_t) xdr_encode_unmon,
303 .p_decode = (kxdrproc_t) xdr_decode_stat,
304 .p_arglen = SM_mon_id_sz,
305 .p_replen = SM_unmonres_sz,
306 .p_statidx = SM_UNMON,
307 .p_name = "UNMONITOR",
311 static struct rpc_version nsm_version1 = {
313 .nrprocs = ARRAY_SIZE(nsm_procedures),
314 .procs = nsm_procedures
317 static struct rpc_version * nsm_version[] = {
321 static struct rpc_stat nsm_stats;
323 static struct rpc_program nsm_program = {
325 .number = SM_PROGRAM,
326 .nrvers = ARRAY_SIZE(nsm_version),
327 .version = nsm_version,