Thomas Gleixner | 457c899 | 2019-05-19 13:08:55 +0100 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0-only |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 2 | /* |
| 3 | * In-kernel rpcbind client supporting versions 2, 3, and 4 of the rpcbind |
| 4 | * protocol |
| 5 | * |
| 6 | * Based on RFC 1833: "Binding Protocols for ONC RPC Version 2" and |
| 7 | * RFC 3530: "Network File System (NFS) version 4 Protocol" |
| 8 | * |
| 9 | * Original: Gilles Quillard, Bull Open Source, 2005 <gilles.quillard@bull.net> |
| 10 | * Updated: Chuck Lever, Oracle Corporation, 2007 <chuck.lever@oracle.com> |
| 11 | * |
| 12 | * Descended from net/sunrpc/pmap_clnt.c, |
| 13 | * Copyright (C) 1996, Olaf Kirch <okir@monad.swb.de> |
| 14 | */ |
| 15 | |
Chuck Lever | cce63cd | 2007-07-01 12:13:12 -0400 | [diff] [blame] | 16 | #include <linux/module.h> |
| 17 | |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 18 | #include <linux/types.h> |
| 19 | #include <linux/socket.h> |
Chuck Lever | 7402ab19 | 2011-05-09 15:22:55 -0400 | [diff] [blame] | 20 | #include <linux/un.h> |
Chuck Lever | d5b6443 | 2007-08-06 11:57:18 -0400 | [diff] [blame] | 21 | #include <linux/in.h> |
| 22 | #include <linux/in6.h> |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 23 | #include <linux/kernel.h> |
| 24 | #include <linux/errno.h> |
Chuck Lever | c526611 | 2009-12-03 15:58:56 -0500 | [diff] [blame] | 25 | #include <linux/mutex.h> |
Tejun Heo | 5a0e3ad | 2010-03-24 17:04:11 +0900 | [diff] [blame] | 26 | #include <linux/slab.h> |
Chuck Lever | 9d548b9 | 2008-09-15 16:27:30 -0500 | [diff] [blame] | 27 | #include <net/ipv6.h> |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 28 | |
| 29 | #include <linux/sunrpc/clnt.h> |
Jeff Layton | 5976687 | 2013-02-04 12:50:00 -0500 | [diff] [blame] | 30 | #include <linux/sunrpc/addr.h> |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 31 | #include <linux/sunrpc/sched.h> |
\"Talpey, Thomas\ | 0896a72 | 2007-09-10 13:48:23 -0400 | [diff] [blame] | 32 | #include <linux/sunrpc/xprtsock.h> |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 33 | |
Chuck Lever | e465cc3 | 2020-07-08 16:10:19 -0400 | [diff] [blame] | 34 | #include <trace/events/sunrpc.h> |
| 35 | |
Stanislav Kinsbursky | dff02d4 | 2012-01-13 12:52:10 +0400 | [diff] [blame] | 36 | #include "netns.h" |
| 37 | |
Chuck Lever | 7402ab19 | 2011-05-09 15:22:55 -0400 | [diff] [blame] | 38 | #define RPCBIND_SOCK_PATHNAME "/var/run/rpcbind.sock" |
| 39 | |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 40 | #define RPCBIND_PROGRAM (100000u) |
| 41 | #define RPCBIND_PORT (111u) |
| 42 | |
Chuck Lever | fc200e7 | 2008-06-25 17:24:31 -0400 | [diff] [blame] | 43 | #define RPCBVERS_2 (2u) |
| 44 | #define RPCBVERS_3 (3u) |
| 45 | #define RPCBVERS_4 (4u) |
| 46 | |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 47 | enum { |
| 48 | RPCBPROC_NULL, |
| 49 | RPCBPROC_SET, |
| 50 | RPCBPROC_UNSET, |
| 51 | RPCBPROC_GETPORT, |
| 52 | RPCBPROC_GETADDR = 3, /* alias for GETPORT */ |
| 53 | RPCBPROC_DUMP, |
| 54 | RPCBPROC_CALLIT, |
| 55 | RPCBPROC_BCAST = 5, /* alias for CALLIT */ |
| 56 | RPCBPROC_GETTIME, |
| 57 | RPCBPROC_UADDR2TADDR, |
| 58 | RPCBPROC_TADDR2UADDR, |
| 59 | RPCBPROC_GETVERSADDR, |
| 60 | RPCBPROC_INDIRECT, |
| 61 | RPCBPROC_GETADDRLIST, |
| 62 | RPCBPROC_GETSTAT, |
| 63 | }; |
| 64 | |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 65 | /* |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 66 | * r_owner |
| 67 | * |
| 68 | * The "owner" is allowed to unset a service in the rpcbind database. |
Chuck Lever | 126e4bc | 2009-03-18 20:47:14 -0400 | [diff] [blame] | 69 | * |
| 70 | * For AF_LOCAL SET/UNSET requests, rpcbind treats this string as a |
| 71 | * UID which it maps to a local user name via a password lookup. |
| 72 | * In all other cases it is ignored. |
| 73 | * |
| 74 | * For SET/UNSET requests, user space provides a value, even for |
| 75 | * network requests, and GETADDR uses an empty string. We follow |
| 76 | * those precedents here. |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 77 | */ |
Chuck Lever | 126e4bc | 2009-03-18 20:47:14 -0400 | [diff] [blame] | 78 | #define RPCB_OWNER_STRING "0" |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 79 | #define RPCB_MAXOWNERLEN sizeof(RPCB_OWNER_STRING) |
| 80 | |
Chuck Lever | 0b10bf5 | 2009-08-09 15:09:33 -0400 | [diff] [blame] | 81 | /* |
| 82 | * XDR data type sizes |
| 83 | */ |
| 84 | #define RPCB_program_sz (1) |
| 85 | #define RPCB_version_sz (1) |
| 86 | #define RPCB_protocol_sz (1) |
| 87 | #define RPCB_port_sz (1) |
| 88 | #define RPCB_boolean_sz (1) |
| 89 | |
| 90 | #define RPCB_netid_sz (1 + XDR_QUADLEN(RPCBIND_MAXNETIDLEN)) |
| 91 | #define RPCB_addr_sz (1 + XDR_QUADLEN(RPCBIND_MAXUADDRLEN)) |
| 92 | #define RPCB_ownerstring_sz (1 + XDR_QUADLEN(RPCB_MAXOWNERLEN)) |
| 93 | |
| 94 | /* |
| 95 | * XDR argument and result sizes |
| 96 | */ |
| 97 | #define RPCB_mappingargs_sz (RPCB_program_sz + RPCB_version_sz + \ |
| 98 | RPCB_protocol_sz + RPCB_port_sz) |
| 99 | #define RPCB_getaddrargs_sz (RPCB_program_sz + RPCB_version_sz + \ |
| 100 | RPCB_netid_sz + RPCB_addr_sz + \ |
| 101 | RPCB_ownerstring_sz) |
| 102 | |
| 103 | #define RPCB_getportres_sz RPCB_port_sz |
| 104 | #define RPCB_setres_sz RPCB_boolean_sz |
| 105 | |
| 106 | /* |
| 107 | * Note that RFC 1833 does not put any size restrictions on the |
| 108 | * address string returned by the remote rpcbind database. |
| 109 | */ |
| 110 | #define RPCB_getaddrres_sz RPCB_addr_sz |
| 111 | |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 112 | static void rpcb_getport_done(struct rpc_task *, void *); |
Trond Myklebust | 381ba74 | 2008-07-07 12:18:53 -0400 | [diff] [blame] | 113 | static void rpcb_map_release(void *data); |
Trond Myklebust | a613fa1 | 2012-01-20 13:53:56 -0500 | [diff] [blame] | 114 | static const struct rpc_program rpcb_program; |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 115 | |
| 116 | struct rpcbind_args { |
| 117 | struct rpc_xprt * r_xprt; |
| 118 | |
| 119 | u32 r_prog; |
| 120 | u32 r_vers; |
| 121 | u32 r_prot; |
| 122 | unsigned short r_port; |
Trond Myklebust | 86d61d8 | 2008-01-07 21:16:56 -0500 | [diff] [blame] | 123 | const char * r_netid; |
| 124 | const char * r_addr; |
| 125 | const char * r_owner; |
Trond Myklebust | 381ba74 | 2008-07-07 12:18:53 -0400 | [diff] [blame] | 126 | |
| 127 | int r_status; |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 128 | }; |
| 129 | |
Christoph Hellwig | 499b498 | 2017-05-12 15:36:49 +0200 | [diff] [blame] | 130 | static const struct rpc_procinfo rpcb_procedures2[]; |
| 131 | static const struct rpc_procinfo rpcb_procedures3[]; |
| 132 | static const struct rpc_procinfo rpcb_procedures4[]; |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 133 | |
Chuck Lever | d5b6443 | 2007-08-06 11:57:18 -0400 | [diff] [blame] | 134 | struct rpcb_info { |
Chuck Lever | fc200e7 | 2008-06-25 17:24:31 -0400 | [diff] [blame] | 135 | u32 rpc_vers; |
Christoph Hellwig | 499b498 | 2017-05-12 15:36:49 +0200 | [diff] [blame] | 136 | const struct rpc_procinfo *rpc_proc; |
Chuck Lever | d5b6443 | 2007-08-06 11:57:18 -0400 | [diff] [blame] | 137 | }; |
| 138 | |
Trond Myklebust | a613fa1 | 2012-01-20 13:53:56 -0500 | [diff] [blame] | 139 | static const struct rpcb_info rpcb_next_version[]; |
| 140 | static const struct rpcb_info rpcb_next_version6[]; |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 141 | |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 142 | static const struct rpc_call_ops rpcb_getport_ops = { |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 143 | .rpc_call_done = rpcb_getport_done, |
| 144 | .rpc_release = rpcb_map_release, |
| 145 | }; |
| 146 | |
| 147 | static void rpcb_wake_rpcbind_waiters(struct rpc_xprt *xprt, int status) |
| 148 | { |
| 149 | xprt_clear_binding(xprt); |
| 150 | rpc_wake_up_status(&xprt->binding, status); |
| 151 | } |
| 152 | |
Trond Myklebust | 381ba74 | 2008-07-07 12:18:53 -0400 | [diff] [blame] | 153 | static void rpcb_map_release(void *data) |
| 154 | { |
| 155 | struct rpcbind_args *map = data; |
| 156 | |
| 157 | rpcb_wake_rpcbind_waiters(map->r_xprt, map->r_status); |
| 158 | xprt_put(map->r_xprt); |
Chuck Lever | ba80913 | 2009-08-09 15:09:35 -0400 | [diff] [blame] | 159 | kfree(map->r_addr); |
Trond Myklebust | 381ba74 | 2008-07-07 12:18:53 -0400 | [diff] [blame] | 160 | kfree(map); |
| 161 | } |
| 162 | |
Stanislav Kinsbursky | 2ea75a1 | 2012-01-13 12:52:18 +0400 | [diff] [blame] | 163 | static int rpcb_get_local(struct net *net) |
Stanislav Kinsbursky | 914edb1 | 2011-10-25 14:16:36 +0300 | [diff] [blame] | 164 | { |
| 165 | int cnt; |
Stanislav Kinsbursky | 2ea75a1 | 2012-01-13 12:52:18 +0400 | [diff] [blame] | 166 | struct sunrpc_net *sn = net_generic(net, sunrpc_net_id); |
Stanislav Kinsbursky | 914edb1 | 2011-10-25 14:16:36 +0300 | [diff] [blame] | 167 | |
Stanislav Kinsbursky | dff02d4 | 2012-01-13 12:52:10 +0400 | [diff] [blame] | 168 | spin_lock(&sn->rpcb_clnt_lock); |
| 169 | if (sn->rpcb_users) |
| 170 | sn->rpcb_users++; |
| 171 | cnt = sn->rpcb_users; |
| 172 | spin_unlock(&sn->rpcb_clnt_lock); |
Stanislav Kinsbursky | 914edb1 | 2011-10-25 14:16:36 +0300 | [diff] [blame] | 173 | |
| 174 | return cnt; |
| 175 | } |
| 176 | |
Stanislav Kinsbursky | f7a30c1 | 2012-01-13 12:52:51 +0400 | [diff] [blame] | 177 | void rpcb_put_local(struct net *net) |
Stanislav Kinsbursky | 914edb1 | 2011-10-25 14:16:36 +0300 | [diff] [blame] | 178 | { |
Stanislav Kinsbursky | f7a30c1 | 2012-01-13 12:52:51 +0400 | [diff] [blame] | 179 | struct sunrpc_net *sn = net_generic(net, sunrpc_net_id); |
Stanislav Kinsbursky | dff02d4 | 2012-01-13 12:52:10 +0400 | [diff] [blame] | 180 | struct rpc_clnt *clnt = sn->rpcb_local_clnt; |
| 181 | struct rpc_clnt *clnt4 = sn->rpcb_local_clnt4; |
Stanislav Kinsbursky | 9793f7c | 2012-05-02 16:08:38 +0400 | [diff] [blame] | 182 | int shutdown = 0; |
Stanislav Kinsbursky | 914edb1 | 2011-10-25 14:16:36 +0300 | [diff] [blame] | 183 | |
Stanislav Kinsbursky | dff02d4 | 2012-01-13 12:52:10 +0400 | [diff] [blame] | 184 | spin_lock(&sn->rpcb_clnt_lock); |
Stanislav Kinsbursky | 9793f7c | 2012-05-02 16:08:38 +0400 | [diff] [blame] | 185 | if (sn->rpcb_users) { |
| 186 | if (--sn->rpcb_users == 0) { |
| 187 | sn->rpcb_local_clnt = NULL; |
| 188 | sn->rpcb_local_clnt4 = NULL; |
| 189 | } |
| 190 | shutdown = !sn->rpcb_users; |
Stanislav Kinsbursky | 914edb1 | 2011-10-25 14:16:36 +0300 | [diff] [blame] | 191 | } |
Stanislav Kinsbursky | dff02d4 | 2012-01-13 12:52:10 +0400 | [diff] [blame] | 192 | spin_unlock(&sn->rpcb_clnt_lock); |
Stanislav Kinsbursky | 914edb1 | 2011-10-25 14:16:36 +0300 | [diff] [blame] | 193 | |
| 194 | if (shutdown) { |
| 195 | /* |
| 196 | * cleanup_rpcb_clnt - remove xprtsock's sysctls, unregister |
| 197 | */ |
| 198 | if (clnt4) |
| 199 | rpc_shutdown_client(clnt4); |
| 200 | if (clnt) |
| 201 | rpc_shutdown_client(clnt); |
| 202 | } |
| 203 | } |
| 204 | |
Stanislav Kinsbursky | 2ea75a1 | 2012-01-13 12:52:18 +0400 | [diff] [blame] | 205 | static void rpcb_set_local(struct net *net, struct rpc_clnt *clnt, |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 206 | struct rpc_clnt *clnt4, |
| 207 | bool is_af_local) |
Stanislav Kinsbursky | 914edb1 | 2011-10-25 14:16:36 +0300 | [diff] [blame] | 208 | { |
Stanislav Kinsbursky | 2ea75a1 | 2012-01-13 12:52:18 +0400 | [diff] [blame] | 209 | struct sunrpc_net *sn = net_generic(net, sunrpc_net_id); |
Stanislav Kinsbursky | dff02d4 | 2012-01-13 12:52:10 +0400 | [diff] [blame] | 210 | |
Stanislav Kinsbursky | 914edb1 | 2011-10-25 14:16:36 +0300 | [diff] [blame] | 211 | /* Protected by rpcb_create_local_mutex */ |
Stanislav Kinsbursky | dff02d4 | 2012-01-13 12:52:10 +0400 | [diff] [blame] | 212 | sn->rpcb_local_clnt = clnt; |
| 213 | sn->rpcb_local_clnt4 = clnt4; |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 214 | sn->rpcb_is_af_local = is_af_local ? 1 : 0; |
Stephen Hemminger | 8fdee4c | 2018-07-24 12:29:15 -0700 | [diff] [blame] | 215 | smp_wmb(); |
Stanislav Kinsbursky | dff02d4 | 2012-01-13 12:52:10 +0400 | [diff] [blame] | 216 | sn->rpcb_users = 1; |
Stanislav Kinsbursky | 914edb1 | 2011-10-25 14:16:36 +0300 | [diff] [blame] | 217 | } |
| 218 | |
Chuck Lever | 7402ab19 | 2011-05-09 15:22:55 -0400 | [diff] [blame] | 219 | /* |
| 220 | * Returns zero on success, otherwise a negative errno value |
| 221 | * is returned. |
| 222 | */ |
Stanislav Kinsbursky | 2ea75a1 | 2012-01-13 12:52:18 +0400 | [diff] [blame] | 223 | static int rpcb_create_local_unix(struct net *net) |
Chuck Lever | 7402ab19 | 2011-05-09 15:22:55 -0400 | [diff] [blame] | 224 | { |
| 225 | static const struct sockaddr_un rpcb_localaddr_rpcbind = { |
| 226 | .sun_family = AF_LOCAL, |
| 227 | .sun_path = RPCBIND_SOCK_PATHNAME, |
| 228 | }; |
| 229 | struct rpc_create_args args = { |
Stanislav Kinsbursky | 2ea75a1 | 2012-01-13 12:52:18 +0400 | [diff] [blame] | 230 | .net = net, |
Chuck Lever | 7402ab19 | 2011-05-09 15:22:55 -0400 | [diff] [blame] | 231 | .protocol = XPRT_TRANSPORT_LOCAL, |
| 232 | .address = (struct sockaddr *)&rpcb_localaddr_rpcbind, |
| 233 | .addrsize = sizeof(rpcb_localaddr_rpcbind), |
| 234 | .servername = "localhost", |
| 235 | .program = &rpcb_program, |
| 236 | .version = RPCBVERS_2, |
| 237 | .authflavor = RPC_AUTH_NULL, |
Trond Myklebust | 79caa5f | 2019-04-24 17:46:42 -0400 | [diff] [blame] | 238 | .cred = current_cred(), |
Trond Myklebust | 00326ed | 2013-08-05 14:10:43 -0400 | [diff] [blame] | 239 | /* |
| 240 | * We turn off the idle timeout to prevent the kernel |
| 241 | * from automatically disconnecting the socket. |
| 242 | * Otherwise, we'd have to cache the mount namespace |
| 243 | * of the caller and somehow pass that to the socket |
| 244 | * reconnect code. |
| 245 | */ |
| 246 | .flags = RPC_CLNT_CREATE_NO_IDLE_TIMEOUT, |
Chuck Lever | 7402ab19 | 2011-05-09 15:22:55 -0400 | [diff] [blame] | 247 | }; |
| 248 | struct rpc_clnt *clnt, *clnt4; |
| 249 | int result = 0; |
Chuck Lever | cc5598b | 2008-07-14 16:03:27 -0400 | [diff] [blame] | 250 | |
Chuck Lever | 7402ab19 | 2011-05-09 15:22:55 -0400 | [diff] [blame] | 251 | /* |
| 252 | * Because we requested an RPC PING at transport creation time, |
| 253 | * this works only if the user space portmapper is rpcbind, and |
| 254 | * it's listening on AF_LOCAL on the named socket. |
| 255 | */ |
| 256 | clnt = rpc_create(&args); |
| 257 | if (IS_ERR(clnt)) { |
Stanislav Kinsbursky | caea33d | 2012-07-20 15:57:48 +0400 | [diff] [blame] | 258 | result = PTR_ERR(clnt); |
Chuck Lever | 7402ab19 | 2011-05-09 15:22:55 -0400 | [diff] [blame] | 259 | goto out; |
| 260 | } |
| 261 | |
| 262 | clnt4 = rpc_bind_new_program(clnt, &rpcb_program, RPCBVERS_4); |
Chuck Lever | 1e66498 | 2020-07-08 16:10:35 -0400 | [diff] [blame] | 263 | if (IS_ERR(clnt4)) |
Chuck Lever | 7402ab19 | 2011-05-09 15:22:55 -0400 | [diff] [blame] | 264 | clnt4 = NULL; |
Chuck Lever | 7402ab19 | 2011-05-09 15:22:55 -0400 | [diff] [blame] | 265 | |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 266 | rpcb_set_local(net, clnt, clnt4, true); |
Chuck Lever | 7402ab19 | 2011-05-09 15:22:55 -0400 | [diff] [blame] | 267 | |
| 268 | out: |
| 269 | return result; |
| 270 | } |
Chuck Lever | c526611 | 2009-12-03 15:58:56 -0500 | [diff] [blame] | 271 | |
| 272 | /* |
| 273 | * Returns zero on success, otherwise a negative errno value |
| 274 | * is returned. |
| 275 | */ |
Stanislav Kinsbursky | 2ea75a1 | 2012-01-13 12:52:18 +0400 | [diff] [blame] | 276 | static int rpcb_create_local_net(struct net *net) |
Chuck Lever | cc5598b | 2008-07-14 16:03:27 -0400 | [diff] [blame] | 277 | { |
Chuck Lever | 7402ab19 | 2011-05-09 15:22:55 -0400 | [diff] [blame] | 278 | static const struct sockaddr_in rpcb_inaddr_loopback = { |
| 279 | .sin_family = AF_INET, |
| 280 | .sin_addr.s_addr = htonl(INADDR_LOOPBACK), |
| 281 | .sin_port = htons(RPCBIND_PORT), |
| 282 | }; |
Chuck Lever | cc5598b | 2008-07-14 16:03:27 -0400 | [diff] [blame] | 283 | struct rpc_create_args args = { |
Stanislav Kinsbursky | 2ea75a1 | 2012-01-13 12:52:18 +0400 | [diff] [blame] | 284 | .net = net, |
Chuck Lever | 2a76b3b | 2009-12-03 15:58:56 -0500 | [diff] [blame] | 285 | .protocol = XPRT_TRANSPORT_TCP, |
Chuck Lever | 5a46211 | 2009-12-03 15:58:56 -0500 | [diff] [blame] | 286 | .address = (struct sockaddr *)&rpcb_inaddr_loopback, |
| 287 | .addrsize = sizeof(rpcb_inaddr_loopback), |
Chuck Lever | cc5598b | 2008-07-14 16:03:27 -0400 | [diff] [blame] | 288 | .servername = "localhost", |
| 289 | .program = &rpcb_program, |
Chuck Lever | c526611 | 2009-12-03 15:58:56 -0500 | [diff] [blame] | 290 | .version = RPCBVERS_2, |
Chuck Lever | cc5598b | 2008-07-14 16:03:27 -0400 | [diff] [blame] | 291 | .authflavor = RPC_AUTH_UNIX, |
Trond Myklebust | 79caa5f | 2019-04-24 17:46:42 -0400 | [diff] [blame] | 292 | .cred = current_cred(), |
Chuck Lever | cc5598b | 2008-07-14 16:03:27 -0400 | [diff] [blame] | 293 | .flags = RPC_CLNT_CREATE_NOPING, |
| 294 | }; |
Chuck Lever | c526611 | 2009-12-03 15:58:56 -0500 | [diff] [blame] | 295 | struct rpc_clnt *clnt, *clnt4; |
| 296 | int result = 0; |
Chuck Lever | cc5598b | 2008-07-14 16:03:27 -0400 | [diff] [blame] | 297 | |
Chuck Lever | c526611 | 2009-12-03 15:58:56 -0500 | [diff] [blame] | 298 | clnt = rpc_create(&args); |
| 299 | if (IS_ERR(clnt)) { |
Stanislav Kinsbursky | caea33d | 2012-07-20 15:57:48 +0400 | [diff] [blame] | 300 | result = PTR_ERR(clnt); |
Chuck Lever | c526611 | 2009-12-03 15:58:56 -0500 | [diff] [blame] | 301 | goto out; |
| 302 | } |
| 303 | |
| 304 | /* |
| 305 | * This results in an RPC ping. On systems running portmapper, |
| 306 | * the v4 ping will fail. Proceed anyway, but disallow rpcb |
| 307 | * v4 upcalls. |
| 308 | */ |
| 309 | clnt4 = rpc_bind_new_program(clnt, &rpcb_program, RPCBVERS_4); |
Chuck Lever | 1e66498 | 2020-07-08 16:10:35 -0400 | [diff] [blame] | 310 | if (IS_ERR(clnt4)) |
Chuck Lever | c526611 | 2009-12-03 15:58:56 -0500 | [diff] [blame] | 311 | clnt4 = NULL; |
Chuck Lever | c526611 | 2009-12-03 15:58:56 -0500 | [diff] [blame] | 312 | |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 313 | rpcb_set_local(net, clnt, clnt4, false); |
Chuck Lever | c526611 | 2009-12-03 15:58:56 -0500 | [diff] [blame] | 314 | |
| 315 | out: |
Chuck Lever | 7402ab19 | 2011-05-09 15:22:55 -0400 | [diff] [blame] | 316 | return result; |
| 317 | } |
| 318 | |
| 319 | /* |
| 320 | * Returns zero on success, otherwise a negative errno value |
| 321 | * is returned. |
| 322 | */ |
Stanislav Kinsbursky | f7a30c1 | 2012-01-13 12:52:51 +0400 | [diff] [blame] | 323 | int rpcb_create_local(struct net *net) |
Chuck Lever | 7402ab19 | 2011-05-09 15:22:55 -0400 | [diff] [blame] | 324 | { |
| 325 | static DEFINE_MUTEX(rpcb_create_local_mutex); |
| 326 | int result = 0; |
| 327 | |
Stanislav Kinsbursky | 2ea75a1 | 2012-01-13 12:52:18 +0400 | [diff] [blame] | 328 | if (rpcb_get_local(net)) |
Chuck Lever | 7402ab19 | 2011-05-09 15:22:55 -0400 | [diff] [blame] | 329 | return result; |
| 330 | |
| 331 | mutex_lock(&rpcb_create_local_mutex); |
Stanislav Kinsbursky | 2ea75a1 | 2012-01-13 12:52:18 +0400 | [diff] [blame] | 332 | if (rpcb_get_local(net)) |
Chuck Lever | 7402ab19 | 2011-05-09 15:22:55 -0400 | [diff] [blame] | 333 | goto out; |
| 334 | |
Stanislav Kinsbursky | 2ea75a1 | 2012-01-13 12:52:18 +0400 | [diff] [blame] | 335 | if (rpcb_create_local_unix(net) != 0) |
| 336 | result = rpcb_create_local_net(net); |
Chuck Lever | 7402ab19 | 2011-05-09 15:22:55 -0400 | [diff] [blame] | 337 | |
| 338 | out: |
Chuck Lever | c526611 | 2009-12-03 15:58:56 -0500 | [diff] [blame] | 339 | mutex_unlock(&rpcb_create_local_mutex); |
| 340 | return result; |
Chuck Lever | cc5598b | 2008-07-14 16:03:27 -0400 | [diff] [blame] | 341 | } |
| 342 | |
Trond Myklebust | 03a9a42 | 2015-01-30 18:12:28 -0500 | [diff] [blame] | 343 | static struct rpc_clnt *rpcb_create(struct net *net, const char *nodename, |
| 344 | const char *hostname, |
Stanislav Kinsbursky | c2550e0 | 2012-01-13 12:52:35 +0400 | [diff] [blame] | 345 | struct sockaddr *srvaddr, size_t salen, |
Trond Myklebust | 79caa5f | 2019-04-24 17:46:42 -0400 | [diff] [blame] | 346 | int proto, u32 version, |
| 347 | const struct cred *cred) |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 348 | { |
| 349 | struct rpc_create_args args = { |
Stanislav Kinsbursky | c2550e0 | 2012-01-13 12:52:35 +0400 | [diff] [blame] | 350 | .net = net, |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 351 | .protocol = proto, |
| 352 | .address = srvaddr, |
Chuck Lever | 9f6ad26 | 2007-12-10 14:56:31 -0500 | [diff] [blame] | 353 | .addrsize = salen, |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 354 | .servername = hostname, |
Trond Myklebust | 03a9a42 | 2015-01-30 18:12:28 -0500 | [diff] [blame] | 355 | .nodename = nodename, |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 356 | .program = &rpcb_program, |
| 357 | .version = version, |
| 358 | .authflavor = RPC_AUTH_UNIX, |
Trond Myklebust | 79caa5f | 2019-04-24 17:46:42 -0400 | [diff] [blame] | 359 | .cred = cred, |
Chuck Lever | 423d8b0 | 2008-07-14 16:03:28 -0400 | [diff] [blame] | 360 | .flags = (RPC_CLNT_CREATE_NOPING | |
| 361 | RPC_CLNT_CREATE_NONPRIVPORT), |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 362 | }; |
| 363 | |
Chuck Lever | d5b6443 | 2007-08-06 11:57:18 -0400 | [diff] [blame] | 364 | switch (srvaddr->sa_family) { |
| 365 | case AF_INET: |
| 366 | ((struct sockaddr_in *)srvaddr)->sin_port = htons(RPCBIND_PORT); |
| 367 | break; |
| 368 | case AF_INET6: |
| 369 | ((struct sockaddr_in6 *)srvaddr)->sin6_port = htons(RPCBIND_PORT); |
| 370 | break; |
| 371 | default: |
Pavel Emelyanov | c636b57 | 2010-10-06 13:45:56 +0400 | [diff] [blame] | 372 | return ERR_PTR(-EAFNOSUPPORT); |
Chuck Lever | d5b6443 | 2007-08-06 11:57:18 -0400 | [diff] [blame] | 373 | } |
| 374 | |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 375 | return rpc_create(&args); |
| 376 | } |
| 377 | |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 378 | static int rpcb_register_call(struct sunrpc_net *sn, struct rpc_clnt *clnt, struct rpc_message *msg, bool is_set) |
Chuck Lever | babe80e | 2008-07-14 16:03:29 -0400 | [diff] [blame] | 379 | { |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 380 | int flags = RPC_TASK_NOCONNECT; |
| 381 | int error, result = 0; |
Chuck Lever | babe80e | 2008-07-14 16:03:29 -0400 | [diff] [blame] | 382 | |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 383 | if (is_set || !sn->rpcb_is_af_local) |
| 384 | flags = RPC_TASK_SOFTCONN; |
Chuck Lever | 14aeb21 | 2008-08-18 19:34:00 -0400 | [diff] [blame] | 385 | msg->rpc_resp = &result; |
Chuck Lever | babe80e | 2008-07-14 16:03:29 -0400 | [diff] [blame] | 386 | |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 387 | error = rpc_call_sync(clnt, msg, flags); |
Chuck Lever | 1e66498 | 2020-07-08 16:10:35 -0400 | [diff] [blame] | 388 | if (error < 0) |
Chuck Lever | 14aeb21 | 2008-08-18 19:34:00 -0400 | [diff] [blame] | 389 | return error; |
Chuck Lever | babe80e | 2008-07-14 16:03:29 -0400 | [diff] [blame] | 390 | |
Chuck Lever | db820d6 | 2008-09-25 11:57:05 -0400 | [diff] [blame] | 391 | if (!result) |
Chuck Lever | 14aeb21 | 2008-08-18 19:34:00 -0400 | [diff] [blame] | 392 | return -EACCES; |
Chuck Lever | 14aeb21 | 2008-08-18 19:34:00 -0400 | [diff] [blame] | 393 | return 0; |
Chuck Lever | babe80e | 2008-07-14 16:03:29 -0400 | [diff] [blame] | 394 | } |
| 395 | |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 396 | /** |
| 397 | * rpcb_register - set or unset a port registration with the local rpcbind svc |
Randy Dunlap | bda1460 | 2012-05-13 10:35:40 -0700 | [diff] [blame] | 398 | * @net: target network namespace |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 399 | * @prog: RPC program number to bind |
| 400 | * @vers: RPC version number to bind |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 401 | * @prot: transport protocol to register |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 402 | * @port: port value to register |
Chuck Lever | 14aeb21 | 2008-08-18 19:34:00 -0400 | [diff] [blame] | 403 | * |
| 404 | * Returns zero if the registration request was dispatched successfully |
| 405 | * and the rpcbind daemon returned success. Otherwise, returns an errno |
| 406 | * value that reflects the nature of the error (request could not be |
| 407 | * dispatched, timed out, or rpcbind returned an error). |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 408 | * |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 409 | * RPC services invoke this function to advertise their contact |
| 410 | * information via the system's rpcbind daemon. RPC services |
| 411 | * invoke this function once for each [program, version, transport] |
| 412 | * tuple they wish to advertise. |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 413 | * |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 414 | * Callers may also unregister RPC services that are no longer |
| 415 | * available by setting the passed-in port to zero. This removes |
| 416 | * all registered transports for [program, version] from the local |
| 417 | * rpcbind database. |
| 418 | * |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 419 | * This function uses rpcbind protocol version 2 to contact the |
| 420 | * local rpcbind daemon. |
| 421 | * |
| 422 | * Registration works over both AF_INET and AF_INET6, and services |
| 423 | * registered via this function are advertised as available for any |
| 424 | * address. If the local rpcbind daemon is listening on AF_INET6, |
| 425 | * services registered via this function will be advertised on |
| 426 | * IN6ADDR_ANY (ie available for all AF_INET and AF_INET6 |
| 427 | * addresses). |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 428 | */ |
Stanislav Kinsbursky | 977ac31 | 2012-01-13 12:52:43 +0400 | [diff] [blame] | 429 | int rpcb_register(struct net *net, u32 prog, u32 vers, int prot, unsigned short port) |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 430 | { |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 431 | struct rpcbind_args map = { |
| 432 | .r_prog = prog, |
| 433 | .r_vers = vers, |
| 434 | .r_prot = prot, |
| 435 | .r_port = port, |
| 436 | }; |
| 437 | struct rpc_message msg = { |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 438 | .rpc_argp = &map, |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 439 | }; |
Stanislav Kinsbursky | 977ac31 | 2012-01-13 12:52:43 +0400 | [diff] [blame] | 440 | struct sunrpc_net *sn = net_generic(net, sunrpc_net_id); |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 441 | bool is_set = false; |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 442 | |
Chuck Lever | c3adcc7 | 2020-07-08 16:10:40 -0400 | [diff] [blame] | 443 | trace_pmap_register(prog, vers, prot, port); |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 444 | |
Chuck Lever | babe80e | 2008-07-14 16:03:29 -0400 | [diff] [blame] | 445 | msg.rpc_proc = &rpcb_procedures2[RPCBPROC_UNSET]; |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 446 | if (port != 0) { |
Chuck Lever | babe80e | 2008-07-14 16:03:29 -0400 | [diff] [blame] | 447 | msg.rpc_proc = &rpcb_procedures2[RPCBPROC_SET]; |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 448 | is_set = true; |
| 449 | } |
Chuck Lever | babe80e | 2008-07-14 16:03:29 -0400 | [diff] [blame] | 450 | |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 451 | return rpcb_register_call(sn, sn->rpcb_local_clnt, &msg, is_set); |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 452 | } |
| 453 | |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 454 | /* |
| 455 | * Fill in AF_INET family-specific arguments to register |
| 456 | */ |
Stanislav Kinsbursky | 1a114a6 | 2012-01-13 12:52:26 +0400 | [diff] [blame] | 457 | static int rpcb_register_inet4(struct sunrpc_net *sn, |
| 458 | const struct sockaddr *sap, |
Chuck Lever | 1673d0d | 2009-03-18 20:47:21 -0400 | [diff] [blame] | 459 | struct rpc_message *msg) |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 460 | { |
Chuck Lever | 3aba455 | 2009-03-18 20:47:06 -0400 | [diff] [blame] | 461 | const struct sockaddr_in *sin = (const struct sockaddr_in *)sap; |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 462 | struct rpcbind_args *map = msg->rpc_argp; |
Chuck Lever | 3aba455 | 2009-03-18 20:47:06 -0400 | [diff] [blame] | 463 | unsigned short port = ntohs(sin->sin_port); |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 464 | bool is_set = false; |
Chuck Lever | ba80913 | 2009-08-09 15:09:35 -0400 | [diff] [blame] | 465 | int result; |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 466 | |
Trond Myklebust | d77385f | 2011-10-17 16:08:10 -0700 | [diff] [blame] | 467 | map->r_addr = rpc_sockaddr2uaddr(sap, GFP_KERNEL); |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 468 | |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 469 | msg->rpc_proc = &rpcb_procedures4[RPCBPROC_UNSET]; |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 470 | if (port != 0) { |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 471 | msg->rpc_proc = &rpcb_procedures4[RPCBPROC_SET]; |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 472 | is_set = true; |
| 473 | } |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 474 | |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 475 | result = rpcb_register_call(sn, sn->rpcb_local_clnt4, msg, is_set); |
Chuck Lever | ba80913 | 2009-08-09 15:09:35 -0400 | [diff] [blame] | 476 | kfree(map->r_addr); |
| 477 | return result; |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 478 | } |
| 479 | |
| 480 | /* |
| 481 | * Fill in AF_INET6 family-specific arguments to register |
| 482 | */ |
Stanislav Kinsbursky | 1a114a6 | 2012-01-13 12:52:26 +0400 | [diff] [blame] | 483 | static int rpcb_register_inet6(struct sunrpc_net *sn, |
| 484 | const struct sockaddr *sap, |
Chuck Lever | 1673d0d | 2009-03-18 20:47:21 -0400 | [diff] [blame] | 485 | struct rpc_message *msg) |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 486 | { |
Chuck Lever | 3aba455 | 2009-03-18 20:47:06 -0400 | [diff] [blame] | 487 | const struct sockaddr_in6 *sin6 = (const struct sockaddr_in6 *)sap; |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 488 | struct rpcbind_args *map = msg->rpc_argp; |
Chuck Lever | 3aba455 | 2009-03-18 20:47:06 -0400 | [diff] [blame] | 489 | unsigned short port = ntohs(sin6->sin6_port); |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 490 | bool is_set = false; |
Chuck Lever | ba80913 | 2009-08-09 15:09:35 -0400 | [diff] [blame] | 491 | int result; |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 492 | |
Trond Myklebust | d77385f | 2011-10-17 16:08:10 -0700 | [diff] [blame] | 493 | map->r_addr = rpc_sockaddr2uaddr(sap, GFP_KERNEL); |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 494 | |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 495 | msg->rpc_proc = &rpcb_procedures4[RPCBPROC_UNSET]; |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 496 | if (port != 0) { |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 497 | msg->rpc_proc = &rpcb_procedures4[RPCBPROC_SET]; |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 498 | is_set = true; |
| 499 | } |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 500 | |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 501 | result = rpcb_register_call(sn, sn->rpcb_local_clnt4, msg, is_set); |
Chuck Lever | ba80913 | 2009-08-09 15:09:35 -0400 | [diff] [blame] | 502 | kfree(map->r_addr); |
| 503 | return result; |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 504 | } |
| 505 | |
Stanislav Kinsbursky | 1a114a6 | 2012-01-13 12:52:26 +0400 | [diff] [blame] | 506 | static int rpcb_unregister_all_protofamilies(struct sunrpc_net *sn, |
| 507 | struct rpc_message *msg) |
Chuck Lever | 1673d0d | 2009-03-18 20:47:21 -0400 | [diff] [blame] | 508 | { |
| 509 | struct rpcbind_args *map = msg->rpc_argp; |
| 510 | |
Chuck Lever | c3adcc7 | 2020-07-08 16:10:40 -0400 | [diff] [blame] | 511 | trace_rpcb_unregister(map->r_prog, map->r_vers, map->r_netid); |
Chuck Lever | 1673d0d | 2009-03-18 20:47:21 -0400 | [diff] [blame] | 512 | |
| 513 | map->r_addr = ""; |
| 514 | msg->rpc_proc = &rpcb_procedures4[RPCBPROC_UNSET]; |
| 515 | |
Trond Myklebust | 786615b | 2013-08-05 16:04:47 -0400 | [diff] [blame] | 516 | return rpcb_register_call(sn, sn->rpcb_local_clnt4, msg, false); |
Chuck Lever | 1673d0d | 2009-03-18 20:47:21 -0400 | [diff] [blame] | 517 | } |
| 518 | |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 519 | /** |
| 520 | * rpcb_v4_register - set or unset a port registration with the local rpcbind |
Randy Dunlap | bda1460 | 2012-05-13 10:35:40 -0700 | [diff] [blame] | 521 | * @net: target network namespace |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 522 | * @program: RPC program number of service to (un)register |
| 523 | * @version: RPC version number of service to (un)register |
| 524 | * @address: address family, IP address, and port to (un)register |
| 525 | * @netid: netid of transport protocol to (un)register |
Chuck Lever | 14aeb21 | 2008-08-18 19:34:00 -0400 | [diff] [blame] | 526 | * |
| 527 | * Returns zero if the registration request was dispatched successfully |
| 528 | * and the rpcbind daemon returned success. Otherwise, returns an errno |
| 529 | * value that reflects the nature of the error (request could not be |
| 530 | * dispatched, timed out, or rpcbind returned an error). |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 531 | * |
| 532 | * RPC services invoke this function to advertise their contact |
| 533 | * information via the system's rpcbind daemon. RPC services |
| 534 | * invoke this function once for each [program, version, address, |
| 535 | * netid] tuple they wish to advertise. |
| 536 | * |
Chuck Lever | 1673d0d | 2009-03-18 20:47:21 -0400 | [diff] [blame] | 537 | * Callers may also unregister RPC services that are registered at a |
| 538 | * specific address by setting the port number in @address to zero. |
| 539 | * They may unregister all registered protocol families at once for |
| 540 | * a service by passing a NULL @address argument. If @netid is "" |
| 541 | * then all netids for [program, version, address] are unregistered. |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 542 | * |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 543 | * This function uses rpcbind protocol version 4 to contact the |
| 544 | * local rpcbind daemon. The local rpcbind daemon must support |
| 545 | * version 4 of the rpcbind protocol in order for these functions |
| 546 | * to register a service successfully. |
| 547 | * |
| 548 | * Supported netids include "udp" and "tcp" for UDP and TCP over |
| 549 | * IPv4, and "udp6" and "tcp6" for UDP and TCP over IPv6, |
| 550 | * respectively. |
| 551 | * |
| 552 | * The contents of @address determine the address family and the |
| 553 | * port to be registered. The usual practice is to pass INADDR_ANY |
| 554 | * as the raw address, but specifying a non-zero address is also |
| 555 | * supported by this API if the caller wishes to advertise an RPC |
| 556 | * service on a specific network interface. |
| 557 | * |
| 558 | * Note that passing in INADDR_ANY does not create the same service |
| 559 | * registration as IN6ADDR_ANY. The former advertises an RPC |
| 560 | * service on any IPv4 address, but not on IPv6. The latter |
| 561 | * advertises the service on all IPv4 and IPv6 addresses. |
| 562 | */ |
Stanislav Kinsbursky | 977ac31 | 2012-01-13 12:52:43 +0400 | [diff] [blame] | 563 | int rpcb_v4_register(struct net *net, const u32 program, const u32 version, |
Chuck Lever | 14aeb21 | 2008-08-18 19:34:00 -0400 | [diff] [blame] | 564 | const struct sockaddr *address, const char *netid) |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 565 | { |
| 566 | struct rpcbind_args map = { |
| 567 | .r_prog = program, |
| 568 | .r_vers = version, |
| 569 | .r_netid = netid, |
| 570 | .r_owner = RPCB_OWNER_STRING, |
| 571 | }; |
| 572 | struct rpc_message msg = { |
| 573 | .rpc_argp = &map, |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 574 | }; |
Stanislav Kinsbursky | 977ac31 | 2012-01-13 12:52:43 +0400 | [diff] [blame] | 575 | struct sunrpc_net *sn = net_generic(net, sunrpc_net_id); |
Chuck Lever | c526611 | 2009-12-03 15:58:56 -0500 | [diff] [blame] | 576 | |
Stanislav Kinsbursky | dff02d4 | 2012-01-13 12:52:10 +0400 | [diff] [blame] | 577 | if (sn->rpcb_local_clnt4 == NULL) |
Chuck Lever | c526611 | 2009-12-03 15:58:56 -0500 | [diff] [blame] | 578 | return -EPROTONOSUPPORT; |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 579 | |
Chuck Lever | 1673d0d | 2009-03-18 20:47:21 -0400 | [diff] [blame] | 580 | if (address == NULL) |
Stanislav Kinsbursky | 1a114a6 | 2012-01-13 12:52:26 +0400 | [diff] [blame] | 581 | return rpcb_unregister_all_protofamilies(sn, &msg); |
Chuck Lever | 1673d0d | 2009-03-18 20:47:21 -0400 | [diff] [blame] | 582 | |
Chuck Lever | c3adcc7 | 2020-07-08 16:10:40 -0400 | [diff] [blame] | 583 | trace_rpcb_register(map.r_prog, map.r_vers, map.r_addr, map.r_netid); |
| 584 | |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 585 | switch (address->sa_family) { |
| 586 | case AF_INET: |
Stanislav Kinsbursky | 1a114a6 | 2012-01-13 12:52:26 +0400 | [diff] [blame] | 587 | return rpcb_register_inet4(sn, address, &msg); |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 588 | case AF_INET6: |
Stanislav Kinsbursky | 1a114a6 | 2012-01-13 12:52:26 +0400 | [diff] [blame] | 589 | return rpcb_register_inet6(sn, address, &msg); |
Chuck Lever | c2e1b09 | 2008-07-14 16:03:30 -0400 | [diff] [blame] | 590 | } |
| 591 | |
| 592 | return -EAFNOSUPPORT; |
| 593 | } |
| 594 | |
Christoph Hellwig | 499b498 | 2017-05-12 15:36:49 +0200 | [diff] [blame] | 595 | static struct rpc_task *rpcb_call_async(struct rpc_clnt *rpcb_clnt, |
| 596 | struct rpcbind_args *map, const struct rpc_procinfo *proc) |
Trond Myklebust | 5138fde | 2007-07-14 15:40:01 -0400 | [diff] [blame] | 597 | { |
| 598 | struct rpc_message msg = { |
Trond Myklebust | 803a906 | 2008-07-01 15:20:55 -0400 | [diff] [blame] | 599 | .rpc_proc = proc, |
Trond Myklebust | 5138fde | 2007-07-14 15:40:01 -0400 | [diff] [blame] | 600 | .rpc_argp = map, |
Chuck Lever | c0c077d | 2009-08-09 15:09:43 -0400 | [diff] [blame] | 601 | .rpc_resp = map, |
Trond Myklebust | 5138fde | 2007-07-14 15:40:01 -0400 | [diff] [blame] | 602 | }; |
| 603 | struct rpc_task_setup task_setup_data = { |
| 604 | .rpc_client = rpcb_clnt, |
| 605 | .rpc_message = &msg, |
| 606 | .callback_ops = &rpcb_getport_ops, |
| 607 | .callback_data = map, |
Chuck Lever | 012da15 | 2009-12-03 15:58:56 -0500 | [diff] [blame] | 608 | .flags = RPC_TASK_ASYNC | RPC_TASK_SOFTCONN, |
Trond Myklebust | 5138fde | 2007-07-14 15:40:01 -0400 | [diff] [blame] | 609 | }; |
| 610 | |
| 611 | return rpc_run_task(&task_setup_data); |
| 612 | } |
| 613 | |
Trond Myklebust | 9a4bd29 | 2008-10-03 16:48:34 -0400 | [diff] [blame] | 614 | /* |
| 615 | * In the case where rpc clients have been cloned, we want to make |
| 616 | * sure that we use the program number/version etc of the actual |
| 617 | * owner of the xprt. To do so, we walk back up the tree of parents |
| 618 | * to find whoever created the transport and/or whoever has the |
| 619 | * autobind flag set. |
| 620 | */ |
| 621 | static struct rpc_clnt *rpcb_find_transport_owner(struct rpc_clnt *clnt) |
| 622 | { |
| 623 | struct rpc_clnt *parent = clnt->cl_parent; |
Trond Myklebust | ad01b2c | 2016-01-30 14:17:26 -0500 | [diff] [blame] | 624 | struct rpc_xprt_switch *xps = rcu_access_pointer(clnt->cl_xpi.xpi_xpswitch); |
Trond Myklebust | 9a4bd29 | 2008-10-03 16:48:34 -0400 | [diff] [blame] | 625 | |
| 626 | while (parent != clnt) { |
Trond Myklebust | ad01b2c | 2016-01-30 14:17:26 -0500 | [diff] [blame] | 627 | if (rcu_access_pointer(parent->cl_xpi.xpi_xpswitch) != xps) |
Trond Myklebust | 9a4bd29 | 2008-10-03 16:48:34 -0400 | [diff] [blame] | 628 | break; |
| 629 | if (clnt->cl_autobind) |
| 630 | break; |
| 631 | clnt = parent; |
| 632 | parent = parent->cl_parent; |
| 633 | } |
| 634 | return clnt; |
| 635 | } |
| 636 | |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 637 | /** |
Chuck Lever | 45160d6 | 2007-07-01 12:13:17 -0400 | [diff] [blame] | 638 | * rpcb_getport_async - obtain the port for a given RPC service on a given host |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 639 | * @task: task that is waiting for portmapper request |
| 640 | * |
| 641 | * This one can be called for an ongoing RPC request, and can be used in |
| 642 | * an async (rpciod) context. |
| 643 | */ |
Chuck Lever | 45160d6 | 2007-07-01 12:13:17 -0400 | [diff] [blame] | 644 | void rpcb_getport_async(struct rpc_task *task) |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 645 | { |
Trond Myklebust | 9a4bd29 | 2008-10-03 16:48:34 -0400 | [diff] [blame] | 646 | struct rpc_clnt *clnt; |
Christoph Hellwig | 499b498 | 2017-05-12 15:36:49 +0200 | [diff] [blame] | 647 | const struct rpc_procinfo *proc; |
Chuck Lever | 0a48f5d | 2007-12-10 14:56:38 -0500 | [diff] [blame] | 648 | u32 bind_version; |
Trond Myklebust | 9a4bd29 | 2008-10-03 16:48:34 -0400 | [diff] [blame] | 649 | struct rpc_xprt *xprt; |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 650 | struct rpc_clnt *rpcb_clnt; |
Ben Greear | ec0dd26 | 2011-07-12 10:27:55 -0700 | [diff] [blame] | 651 | struct rpcbind_args *map; |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 652 | struct rpc_task *child; |
Chuck Lever | 9f6ad26 | 2007-12-10 14:56:31 -0500 | [diff] [blame] | 653 | struct sockaddr_storage addr; |
| 654 | struct sockaddr *sap = (struct sockaddr *)&addr; |
| 655 | size_t salen; |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 656 | int status; |
| 657 | |
Trond Myklebust | 2446ab6 | 2012-03-01 17:00:56 -0500 | [diff] [blame] | 658 | rcu_read_lock(); |
Trond Myklebust | fb43d17 | 2016-01-30 16:39:26 -0500 | [diff] [blame] | 659 | clnt = rpcb_find_transport_owner(task->tk_client); |
Trond Myklebust | 2446ab6 | 2012-03-01 17:00:56 -0500 | [diff] [blame] | 660 | rcu_read_unlock(); |
Trond Myklebust | fb43d17 | 2016-01-30 16:39:26 -0500 | [diff] [blame] | 661 | xprt = xprt_get(task->tk_xprt); |
Trond Myklebust | 9a4bd29 | 2008-10-03 16:48:34 -0400 | [diff] [blame] | 662 | |
Trond Myklebust | 381ba74 | 2008-07-07 12:18:53 -0400 | [diff] [blame] | 663 | /* Put self on the wait queue to ensure we get notified if |
| 664 | * some other task is already attempting to bind the port */ |
Trond Myklebust | 6b2e685 | 2019-04-07 13:58:49 -0400 | [diff] [blame] | 665 | rpc_sleep_on_timeout(&xprt->binding, task, |
| 666 | NULL, jiffies + xprt->bind_timeout); |
Trond Myklebust | 381ba74 | 2008-07-07 12:18:53 -0400 | [diff] [blame] | 667 | |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 668 | if (xprt_test_and_set_binding(xprt)) { |
Trond Myklebust | 2446ab6 | 2012-03-01 17:00:56 -0500 | [diff] [blame] | 669 | xprt_put(xprt); |
Trond Myklebust | 381ba74 | 2008-07-07 12:18:53 -0400 | [diff] [blame] | 670 | return; |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 671 | } |
| 672 | |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 673 | /* Someone else may have bound if we slept */ |
| 674 | if (xprt_bound(xprt)) { |
| 675 | status = 0; |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 676 | goto bailout_nofree; |
| 677 | } |
| 678 | |
Chuck Lever | ba80913 | 2009-08-09 15:09:35 -0400 | [diff] [blame] | 679 | /* Parent transport's destination address */ |
Chuck Lever | 9f6ad26 | 2007-12-10 14:56:31 -0500 | [diff] [blame] | 680 | salen = rpc_peeraddr(clnt, sap, sizeof(addr)); |
Chuck Lever | d5b6443 | 2007-08-06 11:57:18 -0400 | [diff] [blame] | 681 | |
| 682 | /* Don't ever use rpcbind v2 for AF_INET6 requests */ |
Chuck Lever | 9f6ad26 | 2007-12-10 14:56:31 -0500 | [diff] [blame] | 683 | switch (sap->sa_family) { |
Chuck Lever | d5b6443 | 2007-08-06 11:57:18 -0400 | [diff] [blame] | 684 | case AF_INET: |
Trond Myklebust | 803a906 | 2008-07-01 15:20:55 -0400 | [diff] [blame] | 685 | proc = rpcb_next_version[xprt->bind_index].rpc_proc; |
| 686 | bind_version = rpcb_next_version[xprt->bind_index].rpc_vers; |
Chuck Lever | d5b6443 | 2007-08-06 11:57:18 -0400 | [diff] [blame] | 687 | break; |
| 688 | case AF_INET6: |
Trond Myklebust | 803a906 | 2008-07-01 15:20:55 -0400 | [diff] [blame] | 689 | proc = rpcb_next_version6[xprt->bind_index].rpc_proc; |
| 690 | bind_version = rpcb_next_version6[xprt->bind_index].rpc_vers; |
Chuck Lever | d5b6443 | 2007-08-06 11:57:18 -0400 | [diff] [blame] | 691 | break; |
| 692 | default: |
| 693 | status = -EAFNOSUPPORT; |
Chuck Lever | d5b6443 | 2007-08-06 11:57:18 -0400 | [diff] [blame] | 694 | goto bailout_nofree; |
| 695 | } |
Trond Myklebust | 803a906 | 2008-07-01 15:20:55 -0400 | [diff] [blame] | 696 | if (proc == NULL) { |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 697 | xprt->bind_index = 0; |
Chuck Lever | 906462a | 2007-09-11 18:00:47 -0400 | [diff] [blame] | 698 | status = -EPFNOSUPPORT; |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 699 | goto bailout_nofree; |
| 700 | } |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 701 | |
Chuck Lever | e465cc3 | 2020-07-08 16:10:19 -0400 | [diff] [blame] | 702 | trace_rpcb_getport(clnt, task, bind_version); |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 703 | |
Trond Myklebust | 03a9a42 | 2015-01-30 18:12:28 -0500 | [diff] [blame] | 704 | rpcb_clnt = rpcb_create(xprt->xprt_net, |
| 705 | clnt->cl_nodename, |
| 706 | xprt->servername, sap, salen, |
Trond Myklebust | 79caa5f | 2019-04-24 17:46:42 -0400 | [diff] [blame] | 707 | xprt->prot, bind_version, |
| 708 | clnt->cl_cred); |
Chuck Lever | 143b6c4 | 2007-08-16 16:03:31 -0400 | [diff] [blame] | 709 | if (IS_ERR(rpcb_clnt)) { |
| 710 | status = PTR_ERR(rpcb_clnt); |
Chuck Lever | 143b6c4 | 2007-08-16 16:03:31 -0400 | [diff] [blame] | 711 | goto bailout_nofree; |
| 712 | } |
| 713 | |
J. Bruce Fields | cb24e35 | 2018-12-20 10:42:36 -0500 | [diff] [blame] | 714 | map = kzalloc(sizeof(struct rpcbind_args), GFP_NOFS); |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 715 | if (!map) { |
| 716 | status = -ENOMEM; |
Trond Myklebust | 96165e2 | 2008-10-03 16:48:40 -0400 | [diff] [blame] | 717 | goto bailout_release_client; |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 718 | } |
| 719 | map->r_prog = clnt->cl_prog; |
| 720 | map->r_vers = clnt->cl_vers; |
| 721 | map->r_prot = xprt->prot; |
| 722 | map->r_port = 0; |
Bryan Schumaker | 864cf9b | 2012-03-27 13:46:32 -0400 | [diff] [blame] | 723 | map->r_xprt = xprt; |
Trond Myklebust | 381ba74 | 2008-07-07 12:18:53 -0400 | [diff] [blame] | 724 | map->r_status = -EIO; |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 725 | |
Chuck Lever | ba80913 | 2009-08-09 15:09:35 -0400 | [diff] [blame] | 726 | switch (bind_version) { |
| 727 | case RPCBVERS_4: |
| 728 | case RPCBVERS_3: |
Trond Myklebust | 2446ab6 | 2012-03-01 17:00:56 -0500 | [diff] [blame] | 729 | map->r_netid = xprt->address_strings[RPC_DISPLAY_NETID]; |
J. Bruce Fields | cb24e35 | 2018-12-20 10:42:36 -0500 | [diff] [blame] | 730 | map->r_addr = rpc_sockaddr2uaddr(sap, GFP_NOFS); |
J. Bruce Fields | 81c88b1 | 2018-12-20 10:35:11 -0500 | [diff] [blame] | 731 | if (!map->r_addr) { |
| 732 | status = -ENOMEM; |
J. Bruce Fields | 81c88b1 | 2018-12-20 10:35:11 -0500 | [diff] [blame] | 733 | goto bailout_free_args; |
| 734 | } |
Chuck Lever | ba80913 | 2009-08-09 15:09:35 -0400 | [diff] [blame] | 735 | map->r_owner = ""; |
| 736 | break; |
| 737 | case RPCBVERS_2: |
| 738 | map->r_addr = NULL; |
| 739 | break; |
| 740 | default: |
| 741 | BUG(); |
| 742 | } |
| 743 | |
Trond Myklebust | 803a906 | 2008-07-01 15:20:55 -0400 | [diff] [blame] | 744 | child = rpcb_call_async(rpcb_clnt, map, proc); |
Trond Myklebust | 4c402b4 | 2007-06-14 16:40:32 -0400 | [diff] [blame] | 745 | rpc_release_client(rpcb_clnt); |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 746 | |
Trond Myklebust | 9a4bd29 | 2008-10-03 16:48:34 -0400 | [diff] [blame] | 747 | xprt->stat.bind_count++; |
| 748 | rpc_put_task(child); |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 749 | return; |
| 750 | |
J. Bruce Fields | 81c88b1 | 2018-12-20 10:35:11 -0500 | [diff] [blame] | 751 | bailout_free_args: |
| 752 | kfree(map); |
Trond Myklebust | 96165e2 | 2008-10-03 16:48:40 -0400 | [diff] [blame] | 753 | bailout_release_client: |
| 754 | rpc_release_client(rpcb_clnt); |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 755 | bailout_nofree: |
| 756 | rpcb_wake_rpcbind_waiters(xprt, status); |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 757 | task->tk_status = status; |
Trond Myklebust | 2446ab6 | 2012-03-01 17:00:56 -0500 | [diff] [blame] | 758 | xprt_put(xprt); |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 759 | } |
\"Talpey, Thomas\ | 1244480 | 2007-09-10 13:45:36 -0400 | [diff] [blame] | 760 | EXPORT_SYMBOL_GPL(rpcb_getport_async); |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 761 | |
| 762 | /* |
| 763 | * Rpcbind child task calls this callback via tk_exit. |
| 764 | */ |
| 765 | static void rpcb_getport_done(struct rpc_task *child, void *data) |
| 766 | { |
| 767 | struct rpcbind_args *map = data; |
| 768 | struct rpc_xprt *xprt = map->r_xprt; |
Chuck Lever | ac1ae53 | 2020-07-08 16:10:24 -0400 | [diff] [blame] | 769 | |
| 770 | map->r_status = child->tk_status; |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 771 | |
Chuck Lever | 4784cb5 | 2007-09-11 18:00:36 -0400 | [diff] [blame] | 772 | /* Garbage reply: retry with a lesser rpcbind version */ |
Chuck Lever | ac1ae53 | 2020-07-08 16:10:24 -0400 | [diff] [blame] | 773 | if (map->r_status == -EIO) |
| 774 | map->r_status = -EPROTONOSUPPORT; |
Chuck Lever | 4784cb5 | 2007-09-11 18:00:36 -0400 | [diff] [blame] | 775 | |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 776 | /* rpcbind server doesn't support this rpcbind protocol version */ |
Chuck Lever | ac1ae53 | 2020-07-08 16:10:24 -0400 | [diff] [blame] | 777 | if (map->r_status == -EPROTONOSUPPORT) |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 778 | xprt->bind_index++; |
| 779 | |
Chuck Lever | ac1ae53 | 2020-07-08 16:10:24 -0400 | [diff] [blame] | 780 | if (map->r_status < 0) { |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 781 | /* rpcbind server not available on remote host? */ |
Chuck Lever | ac1ae53 | 2020-07-08 16:10:24 -0400 | [diff] [blame] | 782 | map->r_port = 0; |
| 783 | |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 784 | } else if (map->r_port == 0) { |
| 785 | /* Requested RPC service wasn't registered on remote host */ |
Chuck Lever | ac1ae53 | 2020-07-08 16:10:24 -0400 | [diff] [blame] | 786 | map->r_status = -EACCES; |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 787 | } else { |
| 788 | /* Succeeded */ |
Chuck Lever | ac1ae53 | 2020-07-08 16:10:24 -0400 | [diff] [blame] | 789 | map->r_status = 0; |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 790 | } |
| 791 | |
Chuck Lever | ac1ae53 | 2020-07-08 16:10:24 -0400 | [diff] [blame] | 792 | trace_rpcb_setport(child, map->r_status, map->r_port); |
| 793 | xprt->ops->set_port(xprt, map->r_port); |
| 794 | if (map->r_port) |
| 795 | xprt_set_bound(xprt); |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 796 | } |
| 797 | |
Chuck Lever | 166b88d | 2008-07-14 16:03:26 -0400 | [diff] [blame] | 798 | /* |
| 799 | * XDR functions for rpcbind |
| 800 | */ |
| 801 | |
Chuck Lever | 9f06c71 | 2010-12-14 14:59:18 +0000 | [diff] [blame] | 802 | static void rpcb_enc_mapping(struct rpc_rqst *req, struct xdr_stream *xdr, |
Christoph Hellwig | 7d55f7f | 2017-05-08 09:59:45 +0200 | [diff] [blame] | 803 | const void *data) |
Chuck Lever | 6f2c2db | 2009-08-09 15:09:40 -0400 | [diff] [blame] | 804 | { |
Christoph Hellwig | 7d55f7f | 2017-05-08 09:59:45 +0200 | [diff] [blame] | 805 | const struct rpcbind_args *rpcb = data; |
Chuck Lever | 9f06c71 | 2010-12-14 14:59:18 +0000 | [diff] [blame] | 806 | __be32 *p; |
Chuck Lever | 6f2c2db | 2009-08-09 15:09:40 -0400 | [diff] [blame] | 807 | |
Chuck Lever | 9f06c71 | 2010-12-14 14:59:18 +0000 | [diff] [blame] | 808 | p = xdr_reserve_space(xdr, RPCB_mappingargs_sz << 2); |
Chuck Lever | 4129ccf | 2010-12-14 14:58:59 +0000 | [diff] [blame] | 809 | *p++ = cpu_to_be32(rpcb->r_prog); |
| 810 | *p++ = cpu_to_be32(rpcb->r_vers); |
| 811 | *p++ = cpu_to_be32(rpcb->r_prot); |
| 812 | *p = cpu_to_be32(rpcb->r_port); |
Chuck Lever | 6f2c2db | 2009-08-09 15:09:40 -0400 | [diff] [blame] | 813 | } |
| 814 | |
Chuck Lever | bf26955 | 2010-12-14 14:59:29 +0000 | [diff] [blame] | 815 | static int rpcb_dec_getport(struct rpc_rqst *req, struct xdr_stream *xdr, |
Christoph Hellwig | 605d712 | 2017-05-08 15:00:29 +0200 | [diff] [blame] | 816 | void *data) |
Chuck Lever | c0c077d | 2009-08-09 15:09:43 -0400 | [diff] [blame] | 817 | { |
Christoph Hellwig | 605d712 | 2017-05-08 15:00:29 +0200 | [diff] [blame] | 818 | struct rpcbind_args *rpcb = data; |
Chuck Lever | c0c077d | 2009-08-09 15:09:43 -0400 | [diff] [blame] | 819 | unsigned long port; |
Chuck Lever | bf26955 | 2010-12-14 14:59:29 +0000 | [diff] [blame] | 820 | __be32 *p; |
Chuck Lever | c0c077d | 2009-08-09 15:09:43 -0400 | [diff] [blame] | 821 | |
| 822 | rpcb->r_port = 0; |
| 823 | |
Chuck Lever | bf26955 | 2010-12-14 14:59:29 +0000 | [diff] [blame] | 824 | p = xdr_inline_decode(xdr, 4); |
Chuck Lever | c0c077d | 2009-08-09 15:09:43 -0400 | [diff] [blame] | 825 | if (unlikely(p == NULL)) |
| 826 | return -EIO; |
| 827 | |
Chuck Lever | 4129ccf | 2010-12-14 14:58:59 +0000 | [diff] [blame] | 828 | port = be32_to_cpup(p); |
Alexey Dobriyan | 4be929b | 2010-05-24 14:33:03 -0700 | [diff] [blame] | 829 | if (unlikely(port > USHRT_MAX)) |
Chuck Lever | c0c077d | 2009-08-09 15:09:43 -0400 | [diff] [blame] | 830 | return -EIO; |
| 831 | |
| 832 | rpcb->r_port = port; |
| 833 | return 0; |
| 834 | } |
| 835 | |
Chuck Lever | bf26955 | 2010-12-14 14:59:29 +0000 | [diff] [blame] | 836 | static int rpcb_dec_set(struct rpc_rqst *req, struct xdr_stream *xdr, |
Christoph Hellwig | 605d712 | 2017-05-08 15:00:29 +0200 | [diff] [blame] | 837 | void *data) |
Chuck Lever | 7ed0ff9 | 2009-08-09 15:09:42 -0400 | [diff] [blame] | 838 | { |
Christoph Hellwig | 605d712 | 2017-05-08 15:00:29 +0200 | [diff] [blame] | 839 | unsigned int *boolp = data; |
Chuck Lever | bf26955 | 2010-12-14 14:59:29 +0000 | [diff] [blame] | 840 | __be32 *p; |
Chuck Lever | 7ed0ff9 | 2009-08-09 15:09:42 -0400 | [diff] [blame] | 841 | |
Chuck Lever | bf26955 | 2010-12-14 14:59:29 +0000 | [diff] [blame] | 842 | p = xdr_inline_decode(xdr, 4); |
Chuck Lever | 7ed0ff9 | 2009-08-09 15:09:42 -0400 | [diff] [blame] | 843 | if (unlikely(p == NULL)) |
| 844 | return -EIO; |
| 845 | |
| 846 | *boolp = 0; |
Chuck Lever | bf26955 | 2010-12-14 14:59:29 +0000 | [diff] [blame] | 847 | if (*p != xdr_zero) |
Chuck Lever | 7ed0ff9 | 2009-08-09 15:09:42 -0400 | [diff] [blame] | 848 | *boolp = 1; |
Chuck Lever | 7ed0ff9 | 2009-08-09 15:09:42 -0400 | [diff] [blame] | 849 | return 0; |
| 850 | } |
| 851 | |
Chuck Lever | 4129ccf | 2010-12-14 14:58:59 +0000 | [diff] [blame] | 852 | static void encode_rpcb_string(struct xdr_stream *xdr, const char *string, |
| 853 | const u32 maxstrlen) |
Chuck Lever | 6f2c2db | 2009-08-09 15:09:40 -0400 | [diff] [blame] | 854 | { |
Chuck Lever | 6f2c2db | 2009-08-09 15:09:40 -0400 | [diff] [blame] | 855 | __be32 *p; |
Chuck Lever | 4129ccf | 2010-12-14 14:58:59 +0000 | [diff] [blame] | 856 | u32 len; |
Chuck Lever | 6f2c2db | 2009-08-09 15:09:40 -0400 | [diff] [blame] | 857 | |
Chuck Lever | 6f2c2db | 2009-08-09 15:09:40 -0400 | [diff] [blame] | 858 | len = strlen(string); |
Weston Andros Adamson | 332e008 | 2012-10-23 10:43:44 -0400 | [diff] [blame] | 859 | WARN_ON_ONCE(len > maxstrlen); |
| 860 | if (len > maxstrlen) |
| 861 | /* truncate and hope for the best */ |
| 862 | len = maxstrlen; |
Chuck Lever | 4129ccf | 2010-12-14 14:58:59 +0000 | [diff] [blame] | 863 | p = xdr_reserve_space(xdr, 4 + len); |
Chuck Lever | 6f2c2db | 2009-08-09 15:09:40 -0400 | [diff] [blame] | 864 | xdr_encode_opaque(p, string, len); |
Chuck Lever | 6f2c2db | 2009-08-09 15:09:40 -0400 | [diff] [blame] | 865 | } |
| 866 | |
Chuck Lever | 9f06c71 | 2010-12-14 14:59:18 +0000 | [diff] [blame] | 867 | static void rpcb_enc_getaddr(struct rpc_rqst *req, struct xdr_stream *xdr, |
Christoph Hellwig | 7d55f7f | 2017-05-08 09:59:45 +0200 | [diff] [blame] | 868 | const void *data) |
Chuck Lever | 6f2c2db | 2009-08-09 15:09:40 -0400 | [diff] [blame] | 869 | { |
Christoph Hellwig | 7d55f7f | 2017-05-08 09:59:45 +0200 | [diff] [blame] | 870 | const struct rpcbind_args *rpcb = data; |
Chuck Lever | 9f06c71 | 2010-12-14 14:59:18 +0000 | [diff] [blame] | 871 | __be32 *p; |
Chuck Lever | 6f2c2db | 2009-08-09 15:09:40 -0400 | [diff] [blame] | 872 | |
Chuck Lever | 9f06c71 | 2010-12-14 14:59:18 +0000 | [diff] [blame] | 873 | p = xdr_reserve_space(xdr, (RPCB_program_sz + RPCB_version_sz) << 2); |
Chuck Lever | 4129ccf | 2010-12-14 14:58:59 +0000 | [diff] [blame] | 874 | *p++ = cpu_to_be32(rpcb->r_prog); |
| 875 | *p = cpu_to_be32(rpcb->r_vers); |
Chuck Lever | 6f2c2db | 2009-08-09 15:09:40 -0400 | [diff] [blame] | 876 | |
Chuck Lever | 9f06c71 | 2010-12-14 14:59:18 +0000 | [diff] [blame] | 877 | encode_rpcb_string(xdr, rpcb->r_netid, RPCBIND_MAXNETIDLEN); |
| 878 | encode_rpcb_string(xdr, rpcb->r_addr, RPCBIND_MAXUADDRLEN); |
| 879 | encode_rpcb_string(xdr, rpcb->r_owner, RPCB_MAXOWNERLEN); |
Chuck Lever | 6f2c2db | 2009-08-09 15:09:40 -0400 | [diff] [blame] | 880 | } |
| 881 | |
Chuck Lever | bf26955 | 2010-12-14 14:59:29 +0000 | [diff] [blame] | 882 | static int rpcb_dec_getaddr(struct rpc_rqst *req, struct xdr_stream *xdr, |
Christoph Hellwig | 605d712 | 2017-05-08 15:00:29 +0200 | [diff] [blame] | 883 | void *data) |
Chuck Lever | c0c077d | 2009-08-09 15:09:43 -0400 | [diff] [blame] | 884 | { |
Christoph Hellwig | 605d712 | 2017-05-08 15:00:29 +0200 | [diff] [blame] | 885 | struct rpcbind_args *rpcb = data; |
Chuck Lever | c0c077d | 2009-08-09 15:09:43 -0400 | [diff] [blame] | 886 | struct sockaddr_storage address; |
| 887 | struct sockaddr *sap = (struct sockaddr *)&address; |
Chuck Lever | bf26955 | 2010-12-14 14:59:29 +0000 | [diff] [blame] | 888 | __be32 *p; |
Chuck Lever | c0c077d | 2009-08-09 15:09:43 -0400 | [diff] [blame] | 889 | u32 len; |
| 890 | |
| 891 | rpcb->r_port = 0; |
| 892 | |
Chuck Lever | bf26955 | 2010-12-14 14:59:29 +0000 | [diff] [blame] | 893 | p = xdr_inline_decode(xdr, 4); |
Chuck Lever | c0c077d | 2009-08-09 15:09:43 -0400 | [diff] [blame] | 894 | if (unlikely(p == NULL)) |
| 895 | goto out_fail; |
Chuck Lever | 4129ccf | 2010-12-14 14:58:59 +0000 | [diff] [blame] | 896 | len = be32_to_cpup(p); |
Chuck Lever | c0c077d | 2009-08-09 15:09:43 -0400 | [diff] [blame] | 897 | |
| 898 | /* |
| 899 | * If the returned universal address is a null string, |
| 900 | * the requested RPC service was not registered. |
| 901 | */ |
Chuck Lever | 15a798d | 2020-07-08 16:10:29 -0400 | [diff] [blame] | 902 | if (len == 0) |
Chuck Lever | c0c077d | 2009-08-09 15:09:43 -0400 | [diff] [blame] | 903 | return 0; |
Chuck Lever | c0c077d | 2009-08-09 15:09:43 -0400 | [diff] [blame] | 904 | |
| 905 | if (unlikely(len > RPCBIND_MAXUADDRLEN)) |
| 906 | goto out_fail; |
| 907 | |
Chuck Lever | bf26955 | 2010-12-14 14:59:29 +0000 | [diff] [blame] | 908 | p = xdr_inline_decode(xdr, len); |
Chuck Lever | c0c077d | 2009-08-09 15:09:43 -0400 | [diff] [blame] | 909 | if (unlikely(p == NULL)) |
| 910 | goto out_fail; |
Chuck Lever | c0c077d | 2009-08-09 15:09:43 -0400 | [diff] [blame] | 911 | |
Stanislav Kinsbursky | b030fb0 | 2012-01-13 14:02:40 +0400 | [diff] [blame] | 912 | if (rpc_uaddr2sockaddr(req->rq_xprt->xprt_net, (char *)p, len, |
| 913 | sap, sizeof(address)) == 0) |
Chuck Lever | c0c077d | 2009-08-09 15:09:43 -0400 | [diff] [blame] | 914 | goto out_fail; |
| 915 | rpcb->r_port = rpc_get_port(sap); |
| 916 | |
| 917 | return 0; |
| 918 | |
| 919 | out_fail: |
Chuck Lever | c0c077d | 2009-08-09 15:09:43 -0400 | [diff] [blame] | 920 | return -EIO; |
| 921 | } |
| 922 | |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 923 | /* |
| 924 | * Not all rpcbind procedures described in RFC 1833 are implemented |
| 925 | * since the Linux kernel RPC code requires only these. |
| 926 | */ |
Chuck Lever | f8b761e | 2009-08-09 15:09:44 -0400 | [diff] [blame] | 927 | |
Christoph Hellwig | 499b498 | 2017-05-12 15:36:49 +0200 | [diff] [blame] | 928 | static const struct rpc_procinfo rpcb_procedures2[] = { |
Chuck Lever | f8b761e | 2009-08-09 15:09:44 -0400 | [diff] [blame] | 929 | [RPCBPROC_SET] = { |
| 930 | .p_proc = RPCBPROC_SET, |
Christoph Hellwig | 7d55f7f | 2017-05-08 09:59:45 +0200 | [diff] [blame] | 931 | .p_encode = rpcb_enc_mapping, |
Christoph Hellwig | 605d712 | 2017-05-08 15:00:29 +0200 | [diff] [blame] | 932 | .p_decode = rpcb_dec_set, |
Chuck Lever | f8b761e | 2009-08-09 15:09:44 -0400 | [diff] [blame] | 933 | .p_arglen = RPCB_mappingargs_sz, |
| 934 | .p_replen = RPCB_setres_sz, |
| 935 | .p_statidx = RPCBPROC_SET, |
| 936 | .p_timer = 0, |
| 937 | .p_name = "SET", |
| 938 | }, |
| 939 | [RPCBPROC_UNSET] = { |
| 940 | .p_proc = RPCBPROC_UNSET, |
Christoph Hellwig | 7d55f7f | 2017-05-08 09:59:45 +0200 | [diff] [blame] | 941 | .p_encode = rpcb_enc_mapping, |
Christoph Hellwig | 605d712 | 2017-05-08 15:00:29 +0200 | [diff] [blame] | 942 | .p_decode = rpcb_dec_set, |
Chuck Lever | f8b761e | 2009-08-09 15:09:44 -0400 | [diff] [blame] | 943 | .p_arglen = RPCB_mappingargs_sz, |
| 944 | .p_replen = RPCB_setres_sz, |
| 945 | .p_statidx = RPCBPROC_UNSET, |
| 946 | .p_timer = 0, |
| 947 | .p_name = "UNSET", |
| 948 | }, |
| 949 | [RPCBPROC_GETPORT] = { |
| 950 | .p_proc = RPCBPROC_GETPORT, |
Christoph Hellwig | 7d55f7f | 2017-05-08 09:59:45 +0200 | [diff] [blame] | 951 | .p_encode = rpcb_enc_mapping, |
Christoph Hellwig | 605d712 | 2017-05-08 15:00:29 +0200 | [diff] [blame] | 952 | .p_decode = rpcb_dec_getport, |
Chuck Lever | f8b761e | 2009-08-09 15:09:44 -0400 | [diff] [blame] | 953 | .p_arglen = RPCB_mappingargs_sz, |
| 954 | .p_replen = RPCB_getportres_sz, |
| 955 | .p_statidx = RPCBPROC_GETPORT, |
| 956 | .p_timer = 0, |
| 957 | .p_name = "GETPORT", |
| 958 | }, |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 959 | }; |
| 960 | |
Christoph Hellwig | 499b498 | 2017-05-12 15:36:49 +0200 | [diff] [blame] | 961 | static const struct rpc_procinfo rpcb_procedures3[] = { |
Chuck Lever | f8b761e | 2009-08-09 15:09:44 -0400 | [diff] [blame] | 962 | [RPCBPROC_SET] = { |
| 963 | .p_proc = RPCBPROC_SET, |
Christoph Hellwig | 7d55f7f | 2017-05-08 09:59:45 +0200 | [diff] [blame] | 964 | .p_encode = rpcb_enc_getaddr, |
Christoph Hellwig | 605d712 | 2017-05-08 15:00:29 +0200 | [diff] [blame] | 965 | .p_decode = rpcb_dec_set, |
Chuck Lever | f8b761e | 2009-08-09 15:09:44 -0400 | [diff] [blame] | 966 | .p_arglen = RPCB_getaddrargs_sz, |
| 967 | .p_replen = RPCB_setres_sz, |
| 968 | .p_statidx = RPCBPROC_SET, |
| 969 | .p_timer = 0, |
| 970 | .p_name = "SET", |
| 971 | }, |
| 972 | [RPCBPROC_UNSET] = { |
| 973 | .p_proc = RPCBPROC_UNSET, |
Christoph Hellwig | 7d55f7f | 2017-05-08 09:59:45 +0200 | [diff] [blame] | 974 | .p_encode = rpcb_enc_getaddr, |
Christoph Hellwig | 605d712 | 2017-05-08 15:00:29 +0200 | [diff] [blame] | 975 | .p_decode = rpcb_dec_set, |
Chuck Lever | f8b761e | 2009-08-09 15:09:44 -0400 | [diff] [blame] | 976 | .p_arglen = RPCB_getaddrargs_sz, |
| 977 | .p_replen = RPCB_setres_sz, |
| 978 | .p_statidx = RPCBPROC_UNSET, |
| 979 | .p_timer = 0, |
| 980 | .p_name = "UNSET", |
| 981 | }, |
| 982 | [RPCBPROC_GETADDR] = { |
| 983 | .p_proc = RPCBPROC_GETADDR, |
Christoph Hellwig | 7d55f7f | 2017-05-08 09:59:45 +0200 | [diff] [blame] | 984 | .p_encode = rpcb_enc_getaddr, |
Christoph Hellwig | 605d712 | 2017-05-08 15:00:29 +0200 | [diff] [blame] | 985 | .p_decode = rpcb_dec_getaddr, |
Chuck Lever | f8b761e | 2009-08-09 15:09:44 -0400 | [diff] [blame] | 986 | .p_arglen = RPCB_getaddrargs_sz, |
| 987 | .p_replen = RPCB_getaddrres_sz, |
| 988 | .p_statidx = RPCBPROC_GETADDR, |
| 989 | .p_timer = 0, |
| 990 | .p_name = "GETADDR", |
| 991 | }, |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 992 | }; |
| 993 | |
Christoph Hellwig | 499b498 | 2017-05-12 15:36:49 +0200 | [diff] [blame] | 994 | static const struct rpc_procinfo rpcb_procedures4[] = { |
Chuck Lever | f8b761e | 2009-08-09 15:09:44 -0400 | [diff] [blame] | 995 | [RPCBPROC_SET] = { |
| 996 | .p_proc = RPCBPROC_SET, |
Christoph Hellwig | 7d55f7f | 2017-05-08 09:59:45 +0200 | [diff] [blame] | 997 | .p_encode = rpcb_enc_getaddr, |
Christoph Hellwig | 605d712 | 2017-05-08 15:00:29 +0200 | [diff] [blame] | 998 | .p_decode = rpcb_dec_set, |
Chuck Lever | f8b761e | 2009-08-09 15:09:44 -0400 | [diff] [blame] | 999 | .p_arglen = RPCB_getaddrargs_sz, |
| 1000 | .p_replen = RPCB_setres_sz, |
| 1001 | .p_statidx = RPCBPROC_SET, |
| 1002 | .p_timer = 0, |
| 1003 | .p_name = "SET", |
| 1004 | }, |
| 1005 | [RPCBPROC_UNSET] = { |
| 1006 | .p_proc = RPCBPROC_UNSET, |
Christoph Hellwig | 7d55f7f | 2017-05-08 09:59:45 +0200 | [diff] [blame] | 1007 | .p_encode = rpcb_enc_getaddr, |
Christoph Hellwig | 605d712 | 2017-05-08 15:00:29 +0200 | [diff] [blame] | 1008 | .p_decode = rpcb_dec_set, |
Chuck Lever | f8b761e | 2009-08-09 15:09:44 -0400 | [diff] [blame] | 1009 | .p_arglen = RPCB_getaddrargs_sz, |
| 1010 | .p_replen = RPCB_setres_sz, |
| 1011 | .p_statidx = RPCBPROC_UNSET, |
| 1012 | .p_timer = 0, |
| 1013 | .p_name = "UNSET", |
| 1014 | }, |
| 1015 | [RPCBPROC_GETADDR] = { |
| 1016 | .p_proc = RPCBPROC_GETADDR, |
Christoph Hellwig | 7d55f7f | 2017-05-08 09:59:45 +0200 | [diff] [blame] | 1017 | .p_encode = rpcb_enc_getaddr, |
Christoph Hellwig | 605d712 | 2017-05-08 15:00:29 +0200 | [diff] [blame] | 1018 | .p_decode = rpcb_dec_getaddr, |
Chuck Lever | f8b761e | 2009-08-09 15:09:44 -0400 | [diff] [blame] | 1019 | .p_arglen = RPCB_getaddrargs_sz, |
| 1020 | .p_replen = RPCB_getaddrres_sz, |
| 1021 | .p_statidx = RPCBPROC_GETADDR, |
| 1022 | .p_timer = 0, |
| 1023 | .p_name = "GETADDR", |
| 1024 | }, |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 1025 | }; |
| 1026 | |
Trond Myklebust | a613fa1 | 2012-01-20 13:53:56 -0500 | [diff] [blame] | 1027 | static const struct rpcb_info rpcb_next_version[] = { |
Chuck Lever | fc200e7 | 2008-06-25 17:24:31 -0400 | [diff] [blame] | 1028 | { |
| 1029 | .rpc_vers = RPCBVERS_2, |
| 1030 | .rpc_proc = &rpcb_procedures2[RPCBPROC_GETPORT], |
| 1031 | }, |
| 1032 | { |
| 1033 | .rpc_proc = NULL, |
| 1034 | }, |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 1035 | }; |
| 1036 | |
Trond Myklebust | a613fa1 | 2012-01-20 13:53:56 -0500 | [diff] [blame] | 1037 | static const struct rpcb_info rpcb_next_version6[] = { |
Chuck Lever | fc200e7 | 2008-06-25 17:24:31 -0400 | [diff] [blame] | 1038 | { |
| 1039 | .rpc_vers = RPCBVERS_4, |
Chuck Lever | 8842413 | 2008-06-25 17:24:47 -0400 | [diff] [blame] | 1040 | .rpc_proc = &rpcb_procedures4[RPCBPROC_GETADDR], |
Chuck Lever | fc200e7 | 2008-06-25 17:24:31 -0400 | [diff] [blame] | 1041 | }, |
| 1042 | { |
| 1043 | .rpc_vers = RPCBVERS_3, |
| 1044 | .rpc_proc = &rpcb_procedures3[RPCBPROC_GETADDR], |
| 1045 | }, |
Chuck Lever | fc200e7 | 2008-06-25 17:24:31 -0400 | [diff] [blame] | 1046 | { |
| 1047 | .rpc_proc = NULL, |
| 1048 | }, |
Chuck Lever | d5b6443 | 2007-08-06 11:57:18 -0400 | [diff] [blame] | 1049 | }; |
| 1050 | |
Christoph Hellwig | 1c5876d | 2017-05-08 23:27:10 +0200 | [diff] [blame] | 1051 | static unsigned int rpcb_version2_counts[ARRAY_SIZE(rpcb_procedures2)]; |
Trond Myklebust | a613fa1 | 2012-01-20 13:53:56 -0500 | [diff] [blame] | 1052 | static const struct rpc_version rpcb_version2 = { |
Chuck Lever | fc200e7 | 2008-06-25 17:24:31 -0400 | [diff] [blame] | 1053 | .number = RPCBVERS_2, |
Chuck Lever | 1ac7c23 | 2010-12-14 14:59:09 +0000 | [diff] [blame] | 1054 | .nrprocs = ARRAY_SIZE(rpcb_procedures2), |
Christoph Hellwig | 1c5876d | 2017-05-08 23:27:10 +0200 | [diff] [blame] | 1055 | .procs = rpcb_procedures2, |
| 1056 | .counts = rpcb_version2_counts, |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 1057 | }; |
| 1058 | |
Christoph Hellwig | 1c5876d | 2017-05-08 23:27:10 +0200 | [diff] [blame] | 1059 | static unsigned int rpcb_version3_counts[ARRAY_SIZE(rpcb_procedures3)]; |
Trond Myklebust | a613fa1 | 2012-01-20 13:53:56 -0500 | [diff] [blame] | 1060 | static const struct rpc_version rpcb_version3 = { |
Chuck Lever | fc200e7 | 2008-06-25 17:24:31 -0400 | [diff] [blame] | 1061 | .number = RPCBVERS_3, |
Chuck Lever | 1ac7c23 | 2010-12-14 14:59:09 +0000 | [diff] [blame] | 1062 | .nrprocs = ARRAY_SIZE(rpcb_procedures3), |
Christoph Hellwig | 1c5876d | 2017-05-08 23:27:10 +0200 | [diff] [blame] | 1063 | .procs = rpcb_procedures3, |
| 1064 | .counts = rpcb_version3_counts, |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 1065 | }; |
| 1066 | |
Christoph Hellwig | 1c5876d | 2017-05-08 23:27:10 +0200 | [diff] [blame] | 1067 | static unsigned int rpcb_version4_counts[ARRAY_SIZE(rpcb_procedures4)]; |
Trond Myklebust | a613fa1 | 2012-01-20 13:53:56 -0500 | [diff] [blame] | 1068 | static const struct rpc_version rpcb_version4 = { |
Chuck Lever | fc200e7 | 2008-06-25 17:24:31 -0400 | [diff] [blame] | 1069 | .number = RPCBVERS_4, |
Chuck Lever | 1ac7c23 | 2010-12-14 14:59:09 +0000 | [diff] [blame] | 1070 | .nrprocs = ARRAY_SIZE(rpcb_procedures4), |
Christoph Hellwig | 1c5876d | 2017-05-08 23:27:10 +0200 | [diff] [blame] | 1071 | .procs = rpcb_procedures4, |
| 1072 | .counts = rpcb_version4_counts, |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 1073 | }; |
| 1074 | |
Trond Myklebust | a613fa1 | 2012-01-20 13:53:56 -0500 | [diff] [blame] | 1075 | static const struct rpc_version *rpcb_version[] = { |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 1076 | NULL, |
| 1077 | NULL, |
| 1078 | &rpcb_version2, |
| 1079 | &rpcb_version3, |
| 1080 | &rpcb_version4 |
| 1081 | }; |
| 1082 | |
| 1083 | static struct rpc_stat rpcb_stats; |
| 1084 | |
Trond Myklebust | a613fa1 | 2012-01-20 13:53:56 -0500 | [diff] [blame] | 1085 | static const struct rpc_program rpcb_program = { |
Chuck Lever | a509050 | 2007-03-29 16:48:04 -0400 | [diff] [blame] | 1086 | .name = "rpcbind", |
| 1087 | .number = RPCBIND_PROGRAM, |
| 1088 | .nrvers = ARRAY_SIZE(rpcb_version), |
| 1089 | .version = rpcb_version, |
| 1090 | .stats = &rpcb_stats, |
| 1091 | }; |