Whamcloud - gitweb
16870332b24fd6c187799ad837fc66edc0de7636
[fs/lustre-release.git] / lustre / ptlrpc / sec_null.c
1 /*
2  * GPL HEADER START
3  *
4  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
5  *
6  * This program is free software; you can redistribute it and/or modify
7  * it under the terms of the GNU General Public License version 2 only,
8  * as published by the Free Software Foundation.
9  *
10  * This program is distributed in the hope that it will be useful, but
11  * WITHOUT ANY WARRANTY; without even the implied warranty of
12  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
13  * General Public License version 2 for more details (a copy is included
14  * in the LICENSE file that accompanied this code).
15  *
16  * You should have received a copy of the GNU General Public License
17  * version 2 along with this program; If not, see
18  * http://www.gnu.org/licenses/gpl-2.0.html
19  *
20  * GPL HEADER END
21  */
22 /*
23  * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
24  * Use is subject to license terms.
25  *
26  * Copyright (c) 2011, 2014, Intel Corporation.
27  */
28 /*
29  * This file is part of Lustre, http://www.lustre.org/
30  * Lustre is a trademark of Sun Microsystems, Inc.
31  *
32  * lustre/ptlrpc/sec_null.c
33  *
34  * Author: Eric Mei <ericm@clusterfs.com>
35  */
36
37 #define DEBUG_SUBSYSTEM S_SEC
38
39
40 #include <obd_support.h>
41 #include <obd_cksum.h>
42 #include <obd_class.h>
43 #include <lustre_net.h>
44 #include <lustre_sec.h>
45
46 #include "ptlrpc_internal.h"
47
48 static struct ptlrpc_sec_policy null_policy;
49 static struct ptlrpc_sec        null_sec;
50 static struct ptlrpc_cli_ctx    null_cli_ctx;
51 static struct ptlrpc_svc_ctx    null_svc_ctx;
52
53 /*
54  * we can temporarily use the topmost 8-bits of lm_secflvr to identify
55  * the source sec part.
56  */
57 static inline
58 void null_encode_sec_part(struct lustre_msg *msg, enum lustre_sec_part sp)
59 {
60         msg->lm_secflvr |= (((__u32) sp) & 0xFF) << 24;
61 }
62
63 static inline
64 enum lustre_sec_part null_decode_sec_part(struct lustre_msg *msg)
65 {
66         return (msg->lm_secflvr >> 24) & 0xFF;
67 }
68
69 static int null_ctx_refresh(struct ptlrpc_cli_ctx *ctx)
70 {
71         /* should never reach here */
72         LBUG();
73         return 0;
74 }
75
76 static
77 int null_ctx_sign(struct ptlrpc_cli_ctx *ctx, struct ptlrpc_request *req)
78 {
79         req->rq_reqbuf->lm_secflvr = SPTLRPC_FLVR_NULL;
80
81         if (!req->rq_import->imp_dlm_fake) {
82                 struct obd_device *obd = req->rq_import->imp_obd;
83
84                 null_encode_sec_part(req->rq_reqbuf,
85                                      obd->u.cli.cl_sp_me);
86         }
87         req->rq_reqdata_len = req->rq_reqlen;
88         return 0;
89 }
90
91 static
92 int null_ctx_verify(struct ptlrpc_cli_ctx *ctx, struct ptlrpc_request *req)
93 {
94         __u32   cksums, cksumc;
95
96         LASSERT(req->rq_repdata);
97
98         req->rq_repmsg = req->rq_repdata;
99         req->rq_replen = req->rq_repdata_len;
100
101         if (req->rq_early) {
102                 cksums = lustre_msg_get_cksum(req->rq_repdata);
103                 cksumc = lustre_msg_calc_cksum(req->rq_repmsg,
104                                                MSG_PTLRPC_BODY_OFF);
105
106                 if (cksumc != cksums) {
107                         CDEBUG(D_SEC,
108                                "early reply checksum mismatch: %08x != %08x\n",
109                                cksumc, cksums);
110                         return -EINVAL;
111                 }
112         }
113
114         return 0;
115 }
116
117 static
118 struct ptlrpc_sec *null_create_sec(struct obd_import *imp,
119                                    struct ptlrpc_svc_ctx *svc_ctx,
120                                    struct sptlrpc_flavor *sf)
121 {
122         LASSERT(SPTLRPC_FLVR_POLICY(sf->sf_rpc) == SPTLRPC_POLICY_NULL);
123
124         /*
125          * general layer has take a module reference for us, because we never
126          * really destroy the sec, simply release the reference here.
127          */
128         sptlrpc_policy_put(&null_policy);
129         return &null_sec;
130 }
131
132 static
133 void null_destroy_sec(struct ptlrpc_sec *sec)
134 {
135         LASSERT(sec == &null_sec);
136 }
137
138 static
139 struct ptlrpc_cli_ctx *null_lookup_ctx(struct ptlrpc_sec *sec,
140                                        struct vfs_cred *vcred,
141                                        int create, int remove_dead)
142 {
143         atomic_inc(&null_cli_ctx.cc_refcount);
144         return &null_cli_ctx;
145 }
146
147 static
148 int null_flush_ctx_cache(struct ptlrpc_sec *sec, uid_t uid, int grace,
149                          int force)
150 {
151         return 0;
152 }
153
154 static
155 int null_alloc_reqbuf(struct ptlrpc_sec *sec,
156                       struct ptlrpc_request *req,
157                       int msgsize)
158 {
159         if (!req->rq_reqbuf) {
160                 int alloc_size = size_roundup_power2(msgsize);
161
162                 LASSERT(!req->rq_pool);
163                 OBD_ALLOC_LARGE(req->rq_reqbuf, alloc_size);
164                 if (!req->rq_reqbuf)
165                         return -ENOMEM;
166
167                 req->rq_reqbuf_len = alloc_size;
168         } else {
169                 LASSERT(req->rq_pool);
170                 LASSERT(req->rq_reqbuf_len >= msgsize);
171                 memset(req->rq_reqbuf, 0, msgsize);
172         }
173
174         req->rq_reqmsg = req->rq_reqbuf;
175         return 0;
176 }
177
178 static
179 void null_free_reqbuf(struct ptlrpc_sec *sec,
180                       struct ptlrpc_request *req)
181 {
182         if (!req->rq_pool) {
183                 LASSERTF(req->rq_reqmsg == req->rq_reqbuf,
184                          "req %p: reqmsg %p is not reqbuf %p in null sec\n",
185                          req, req->rq_reqmsg, req->rq_reqbuf);
186                 LASSERTF(req->rq_reqbuf_len >= req->rq_reqlen,
187                          "req %p: reqlen %d should smaller than buflen %d\n",
188                          req, req->rq_reqlen, req->rq_reqbuf_len);
189
190                 OBD_FREE_LARGE(req->rq_reqbuf, req->rq_reqbuf_len);
191                 req->rq_reqbuf = NULL;
192                 req->rq_reqbuf_len = 0;
193         }
194 }
195
196 static
197 int null_alloc_repbuf(struct ptlrpc_sec *sec,
198                       struct ptlrpc_request *req,
199                       int msgsize)
200 {
201         /* add space for early replied */
202         msgsize += lustre_msg_early_size();
203
204         msgsize = size_roundup_power2(msgsize);
205
206         OBD_ALLOC_LARGE(req->rq_repbuf, msgsize);
207         if (!req->rq_repbuf)
208                 return -ENOMEM;
209
210         req->rq_repbuf_len = msgsize;
211         return 0;
212 }
213
214 static
215 void null_free_repbuf(struct ptlrpc_sec *sec,
216                       struct ptlrpc_request *req)
217 {
218         LASSERT(req->rq_repbuf);
219
220         OBD_FREE_LARGE(req->rq_repbuf, req->rq_repbuf_len);
221         req->rq_repbuf = NULL;
222         req->rq_repbuf_len = 0;
223 }
224
225 static
226 int null_enlarge_reqbuf(struct ptlrpc_sec *sec,
227                         struct ptlrpc_request *req,
228                         int segment, int newsize)
229 {
230         struct lustre_msg      *newbuf;
231         struct lustre_msg      *oldbuf = req->rq_reqmsg;
232         int                     oldsize, newmsg_size, alloc_size;
233
234         LASSERT(req->rq_reqbuf);
235         LASSERT(req->rq_reqbuf == req->rq_reqmsg);
236         LASSERT(req->rq_reqbuf_len >= req->rq_reqlen);
237         LASSERT(req->rq_reqlen == lustre_packed_msg_size(oldbuf));
238
239         /* compute new message size */
240         oldsize = req->rq_reqbuf->lm_buflens[segment];
241         req->rq_reqbuf->lm_buflens[segment] = newsize;
242         newmsg_size = lustre_packed_msg_size(oldbuf);
243         req->rq_reqbuf->lm_buflens[segment] = oldsize;
244
245         /* request from pool should always have enough buffer */
246         LASSERT(!req->rq_pool || req->rq_reqbuf_len >= newmsg_size);
247
248         if (req->rq_reqbuf_len < newmsg_size) {
249                 alloc_size = size_roundup_power2(newmsg_size);
250
251                 OBD_ALLOC_LARGE(newbuf, alloc_size);
252                 if (newbuf == NULL)
253                         return -ENOMEM;
254
255                 /*
256                  * Must lock this, so that otherwise unprotected change of
257                  * rq_reqmsg is not racing with parallel processing of
258                  * imp_replay_list traversing threads. See LU-3333
259                  * This is a bandaid at best, we really need to deal with this
260                  * in request enlarging code before unpacking that's already
261                  * there
262                  */
263                 if (req->rq_import)
264                         spin_lock(&req->rq_import->imp_lock);
265                 memcpy(newbuf, req->rq_reqbuf, req->rq_reqlen);
266
267                 OBD_FREE_LARGE(req->rq_reqbuf, req->rq_reqbuf_len);
268                 req->rq_reqbuf = req->rq_reqmsg = newbuf;
269                 req->rq_reqbuf_len = alloc_size;
270
271                 if (req->rq_import)
272                         spin_unlock(&req->rq_import->imp_lock);
273         }
274
275         _sptlrpc_enlarge_msg_inplace(req->rq_reqmsg, segment, newsize);
276         req->rq_reqlen = newmsg_size;
277
278         return 0;
279 }
280
281 static struct ptlrpc_svc_ctx null_svc_ctx = {
282         .sc_refcount    = ATOMIC_INIT(1),
283         .sc_policy      = &null_policy,
284 };
285
286 static
287 int null_accept(struct ptlrpc_request *req)
288 {
289         LASSERT(SPTLRPC_FLVR_POLICY(req->rq_flvr.sf_rpc) ==
290                 SPTLRPC_POLICY_NULL);
291
292         if (req->rq_flvr.sf_rpc != SPTLRPC_FLVR_NULL) {
293                 CERROR("Invalid rpc flavor 0x%x\n", req->rq_flvr.sf_rpc);
294                 return SECSVC_DROP;
295         }
296
297         req->rq_sp_from = null_decode_sec_part(req->rq_reqbuf);
298
299         req->rq_reqmsg = req->rq_reqbuf;
300         req->rq_reqlen = req->rq_reqdata_len;
301
302         req->rq_svc_ctx = &null_svc_ctx;
303         atomic_inc(&req->rq_svc_ctx->sc_refcount);
304
305         return SECSVC_OK;
306 }
307
308 static
309 int null_alloc_rs(struct ptlrpc_request *req, int msgsize)
310 {
311         struct ptlrpc_reply_state *rs;
312         int rs_size = sizeof(*rs) + msgsize;
313
314         LASSERT(msgsize % 8 == 0);
315
316         rs = req->rq_reply_state;
317
318         if (rs) {
319                 /* pre-allocated */
320                 LASSERT(rs->rs_size >= rs_size);
321         } else {
322                 OBD_ALLOC_LARGE(rs, rs_size);
323                 if (rs == NULL)
324                         return -ENOMEM;
325
326                 rs->rs_size = rs_size;
327         }
328
329         rs->rs_svc_ctx = req->rq_svc_ctx;
330         atomic_inc(&req->rq_svc_ctx->sc_refcount);
331
332         rs->rs_repbuf = (struct lustre_msg *) (rs + 1);
333         rs->rs_repbuf_len = rs_size - sizeof(*rs);
334         rs->rs_msg = rs->rs_repbuf;
335
336         req->rq_reply_state = rs;
337         return 0;
338 }
339
340 static
341 void null_free_rs(struct ptlrpc_reply_state *rs)
342 {
343         LASSERT_ATOMIC_GT(&rs->rs_svc_ctx->sc_refcount, 1);
344         atomic_dec(&rs->rs_svc_ctx->sc_refcount);
345
346         if (!rs->rs_prealloc)
347                 OBD_FREE_LARGE(rs, rs->rs_size);
348 }
349
350 static
351 int null_authorize(struct ptlrpc_request *req)
352 {
353         struct ptlrpc_reply_state *rs = req->rq_reply_state;
354
355         LASSERT(rs);
356
357         rs->rs_repbuf->lm_secflvr = SPTLRPC_FLVR_NULL;
358         rs->rs_repdata_len = req->rq_replen;
359         req->rq_reply_off = 0;
360
361         if (likely(req->rq_packed_final)) {
362                 if (lustre_msghdr_get_flags(req->rq_reqmsg) & MSGHDR_AT_SUPPORT)
363                         req->rq_reply_off = lustre_msg_early_size();
364         } else {
365                 __u32 cksum;
366
367                 cksum = lustre_msg_calc_cksum(rs->rs_repbuf,
368                                               MSG_PTLRPC_BODY_OFF);
369                 lustre_msg_set_cksum(rs->rs_repbuf, cksum);
370         }
371
372         return 0;
373 }
374
375 static struct ptlrpc_ctx_ops null_ctx_ops = {
376         .refresh                = null_ctx_refresh,
377         .sign                   = null_ctx_sign,
378         .verify                 = null_ctx_verify,
379 };
380
381 static struct ptlrpc_sec_cops null_sec_cops = {
382         .create_sec             = null_create_sec,
383         .destroy_sec            = null_destroy_sec,
384         .lookup_ctx             = null_lookup_ctx,
385         .flush_ctx_cache        = null_flush_ctx_cache,
386         .alloc_reqbuf           = null_alloc_reqbuf,
387         .alloc_repbuf           = null_alloc_repbuf,
388         .free_reqbuf            = null_free_reqbuf,
389         .free_repbuf            = null_free_repbuf,
390         .enlarge_reqbuf         = null_enlarge_reqbuf,
391 };
392
393 static struct ptlrpc_sec_sops null_sec_sops = {
394         .accept                 = null_accept,
395         .alloc_rs               = null_alloc_rs,
396         .authorize              = null_authorize,
397         .free_rs                = null_free_rs,
398 };
399
400 static struct ptlrpc_sec_policy null_policy = {
401         .sp_owner               = THIS_MODULE,
402         .sp_name                = "sec.null",
403         .sp_policy              = SPTLRPC_POLICY_NULL,
404         .sp_cops                = &null_sec_cops,
405         .sp_sops                = &null_sec_sops,
406 };
407
408 static void null_init_internal(void)
409 {
410         static HLIST_HEAD(__list);
411
412         null_sec.ps_policy = &null_policy;
413         atomic_set(&null_sec.ps_refcount, 1);   /* always busy */
414         null_sec.ps_id = -1;
415         null_sec.ps_import = NULL;
416         null_sec.ps_flvr.sf_rpc = SPTLRPC_FLVR_NULL;
417         null_sec.ps_flvr.sf_flags = 0;
418         null_sec.ps_part = LUSTRE_SP_ANY;
419         null_sec.ps_dying = 0;
420         spin_lock_init(&null_sec.ps_lock);
421         atomic_set(&null_sec.ps_nctx, 1);       /* for "null_cli_ctx" */
422         INIT_LIST_HEAD(&null_sec.ps_gc_list);
423         null_sec.ps_gc_interval = 0;
424         null_sec.ps_gc_next = 0;
425
426         hlist_add_head(&null_cli_ctx.cc_cache, &__list);
427         atomic_set(&null_cli_ctx.cc_refcount, 1);       /* for hash */
428         null_cli_ctx.cc_sec = &null_sec;
429         null_cli_ctx.cc_ops = &null_ctx_ops;
430         null_cli_ctx.cc_expire = 0;
431         null_cli_ctx.cc_flags = PTLRPC_CTX_CACHED | PTLRPC_CTX_ETERNAL |
432                                 PTLRPC_CTX_UPTODATE;
433         null_cli_ctx.cc_vcred.vc_uid = 0;
434         spin_lock_init(&null_cli_ctx.cc_lock);
435         INIT_LIST_HEAD(&null_cli_ctx.cc_req_list);
436         INIT_LIST_HEAD(&null_cli_ctx.cc_gc_chain);
437 }
438
439 int sptlrpc_null_init(void)
440 {
441         int rc;
442
443         null_init_internal();
444
445         rc = sptlrpc_register_policy(&null_policy);
446         if (rc)
447                 CERROR("failed to register %s: %d\n", null_policy.sp_name, rc);
448
449         return rc;
450 }
451
452 void sptlrpc_null_fini(void)
453 {
454         int rc;
455
456         rc = sptlrpc_unregister_policy(&null_policy);
457         if (rc)
458                 CERROR("failed to unregister %s: %d\n", null_policy.sp_name,
459                        rc);
460 }