]>
Commit | Line | Data |
---|---|---|
1 | /* | |
2 | * Copyright (C) 2006 Red Hat, Inc. All Rights Reserved. | |
3 | * Written by David Howells (dhowells@redhat.com) | |
4 | */ | |
5 | #include <linux/module.h> | |
6 | #include <linux/nfs_fs.h> | |
7 | #include <linux/nfs_mount.h> | |
8 | #include <linux/sunrpc/addr.h> | |
9 | #include <linux/sunrpc/auth.h> | |
10 | #include <linux/sunrpc/xprt.h> | |
11 | #include <linux/sunrpc/bc_xprt.h> | |
12 | #include <linux/sunrpc/rpc_pipe_fs.h> | |
13 | #include "internal.h" | |
14 | #include "callback.h" | |
15 | #include "delegation.h" | |
16 | #include "nfs4session.h" | |
17 | #include "nfs4idmap.h" | |
18 | #include "pnfs.h" | |
19 | #include "netns.h" | |
20 | ||
21 | #define NFSDBG_FACILITY NFSDBG_CLIENT | |
22 | ||
23 | /* | |
24 | * Get a unique NFSv4.0 callback identifier which will be used | |
25 | * by the V4.0 callback service to lookup the nfs_client struct | |
26 | */ | |
27 | static int nfs_get_cb_ident_idr(struct nfs_client *clp, int minorversion) | |
28 | { | |
29 | int ret = 0; | |
30 | struct nfs_net *nn = net_generic(clp->cl_net, nfs_net_id); | |
31 | ||
32 | if (clp->rpc_ops->version != 4 || minorversion != 0) | |
33 | return ret; | |
34 | idr_preload(GFP_KERNEL); | |
35 | spin_lock(&nn->nfs_client_lock); | |
36 | ret = idr_alloc(&nn->cb_ident_idr, clp, 1, 0, GFP_NOWAIT); | |
37 | if (ret >= 0) | |
38 | clp->cl_cb_ident = ret; | |
39 | spin_unlock(&nn->nfs_client_lock); | |
40 | idr_preload_end(); | |
41 | return ret < 0 ? ret : 0; | |
42 | } | |
43 | ||
44 | #ifdef CONFIG_NFS_V4_1 | |
45 | /** | |
46 | * Per auth flavor data server rpc clients | |
47 | */ | |
48 | struct nfs4_ds_server { | |
49 | struct list_head list; /* ds_clp->cl_ds_clients */ | |
50 | struct rpc_clnt *rpc_clnt; | |
51 | }; | |
52 | ||
53 | /** | |
54 | * Common lookup case for DS I/O | |
55 | */ | |
56 | static struct nfs4_ds_server * | |
57 | nfs4_find_ds_client(struct nfs_client *ds_clp, rpc_authflavor_t flavor) | |
58 | { | |
59 | struct nfs4_ds_server *dss; | |
60 | ||
61 | rcu_read_lock(); | |
62 | list_for_each_entry_rcu(dss, &ds_clp->cl_ds_clients, list) { | |
63 | if (dss->rpc_clnt->cl_auth->au_flavor != flavor) | |
64 | continue; | |
65 | goto out; | |
66 | } | |
67 | dss = NULL; | |
68 | out: | |
69 | rcu_read_unlock(); | |
70 | return dss; | |
71 | } | |
72 | ||
73 | static struct nfs4_ds_server * | |
74 | nfs4_add_ds_client(struct nfs_client *ds_clp, rpc_authflavor_t flavor, | |
75 | struct nfs4_ds_server *new) | |
76 | { | |
77 | struct nfs4_ds_server *dss; | |
78 | ||
79 | spin_lock(&ds_clp->cl_lock); | |
80 | list_for_each_entry(dss, &ds_clp->cl_ds_clients, list) { | |
81 | if (dss->rpc_clnt->cl_auth->au_flavor != flavor) | |
82 | continue; | |
83 | goto out; | |
84 | } | |
85 | if (new) | |
86 | list_add_rcu(&new->list, &ds_clp->cl_ds_clients); | |
87 | dss = new; | |
88 | out: | |
89 | spin_unlock(&ds_clp->cl_lock); /* need some lock to protect list */ | |
90 | return dss; | |
91 | } | |
92 | ||
93 | static struct nfs4_ds_server * | |
94 | nfs4_alloc_ds_server(struct nfs_client *ds_clp, rpc_authflavor_t flavor) | |
95 | { | |
96 | struct nfs4_ds_server *dss; | |
97 | ||
98 | dss = kmalloc(sizeof(*dss), GFP_NOFS); | |
99 | if (dss == NULL) | |
100 | return ERR_PTR(-ENOMEM); | |
101 | ||
102 | dss->rpc_clnt = rpc_clone_client_set_auth(ds_clp->cl_rpcclient, flavor); | |
103 | if (IS_ERR(dss->rpc_clnt)) { | |
104 | int err = PTR_ERR(dss->rpc_clnt); | |
105 | kfree (dss); | |
106 | return ERR_PTR(err); | |
107 | } | |
108 | INIT_LIST_HEAD(&dss->list); | |
109 | ||
110 | return dss; | |
111 | } | |
112 | ||
113 | static void | |
114 | nfs4_free_ds_server(struct nfs4_ds_server *dss) | |
115 | { | |
116 | rpc_release_client(dss->rpc_clnt); | |
117 | kfree(dss); | |
118 | } | |
119 | ||
120 | /** | |
121 | * Find or create a DS rpc client with th MDS server rpc client auth flavor | |
122 | * in the nfs_client cl_ds_clients list. | |
123 | */ | |
124 | struct rpc_clnt * | |
125 | nfs4_find_or_create_ds_client(struct nfs_client *ds_clp, struct inode *inode) | |
126 | { | |
127 | struct nfs4_ds_server *dss, *new; | |
128 | rpc_authflavor_t flavor = NFS_SERVER(inode)->client->cl_auth->au_flavor; | |
129 | ||
130 | dss = nfs4_find_ds_client(ds_clp, flavor); | |
131 | if (dss != NULL) | |
132 | goto out; | |
133 | new = nfs4_alloc_ds_server(ds_clp, flavor); | |
134 | if (IS_ERR(new)) | |
135 | return ERR_CAST(new); | |
136 | dss = nfs4_add_ds_client(ds_clp, flavor, new); | |
137 | if (dss != new) | |
138 | nfs4_free_ds_server(new); | |
139 | out: | |
140 | return dss->rpc_clnt; | |
141 | } | |
142 | EXPORT_SYMBOL_GPL(nfs4_find_or_create_ds_client); | |
143 | ||
144 | static void | |
145 | nfs4_shutdown_ds_clients(struct nfs_client *clp) | |
146 | { | |
147 | struct nfs4_ds_server *dss; | |
148 | LIST_HEAD(shutdown_list); | |
149 | ||
150 | while (!list_empty(&clp->cl_ds_clients)) { | |
151 | dss = list_entry(clp->cl_ds_clients.next, | |
152 | struct nfs4_ds_server, list); | |
153 | list_del(&dss->list); | |
154 | rpc_shutdown_client(dss->rpc_clnt); | |
155 | kfree (dss); | |
156 | } | |
157 | } | |
158 | ||
159 | void nfs41_shutdown_client(struct nfs_client *clp) | |
160 | { | |
161 | if (nfs4_has_session(clp)) { | |
162 | nfs4_shutdown_ds_clients(clp); | |
163 | nfs4_destroy_session(clp->cl_session); | |
164 | nfs4_destroy_clientid(clp); | |
165 | } | |
166 | ||
167 | } | |
168 | #endif /* CONFIG_NFS_V4_1 */ | |
169 | ||
170 | void nfs40_shutdown_client(struct nfs_client *clp) | |
171 | { | |
172 | if (clp->cl_slot_tbl) { | |
173 | nfs4_shutdown_slot_table(clp->cl_slot_tbl); | |
174 | kfree(clp->cl_slot_tbl); | |
175 | } | |
176 | } | |
177 | ||
178 | struct nfs_client *nfs4_alloc_client(const struct nfs_client_initdata *cl_init) | |
179 | { | |
180 | int err; | |
181 | struct nfs_client *clp = nfs_alloc_client(cl_init); | |
182 | if (IS_ERR(clp)) | |
183 | return clp; | |
184 | ||
185 | err = nfs_get_cb_ident_idr(clp, cl_init->minorversion); | |
186 | if (err) | |
187 | goto error; | |
188 | ||
189 | if (cl_init->minorversion > NFS4_MAX_MINOR_VERSION) { | |
190 | err = -EINVAL; | |
191 | goto error; | |
192 | } | |
193 | ||
194 | spin_lock_init(&clp->cl_lock); | |
195 | INIT_DELAYED_WORK(&clp->cl_renewd, nfs4_renew_state); | |
196 | INIT_LIST_HEAD(&clp->cl_ds_clients); | |
197 | rpc_init_wait_queue(&clp->cl_rpcwaitq, "NFS client"); | |
198 | clp->cl_state = 1 << NFS4CLNT_LEASE_EXPIRED; | |
199 | clp->cl_minorversion = cl_init->minorversion; | |
200 | clp->cl_mvops = nfs_v4_minor_ops[cl_init->minorversion]; | |
201 | clp->cl_mig_gen = 1; | |
202 | #if IS_ENABLED(CONFIG_NFS_V4_1) | |
203 | init_waitqueue_head(&clp->cl_lock_waitq); | |
204 | #endif | |
205 | return clp; | |
206 | ||
207 | error: | |
208 | nfs_free_client(clp); | |
209 | return ERR_PTR(err); | |
210 | } | |
211 | ||
212 | /* | |
213 | * Destroy the NFS4 callback service | |
214 | */ | |
215 | static void nfs4_destroy_callback(struct nfs_client *clp) | |
216 | { | |
217 | if (__test_and_clear_bit(NFS_CS_CALLBACK, &clp->cl_res_state)) | |
218 | nfs_callback_down(clp->cl_mvops->minor_version, clp->cl_net); | |
219 | } | |
220 | ||
221 | static void nfs4_shutdown_client(struct nfs_client *clp) | |
222 | { | |
223 | if (__test_and_clear_bit(NFS_CS_RENEWD, &clp->cl_res_state)) | |
224 | nfs4_kill_renewd(clp); | |
225 | clp->cl_mvops->shutdown_client(clp); | |
226 | nfs4_destroy_callback(clp); | |
227 | if (__test_and_clear_bit(NFS_CS_IDMAP, &clp->cl_res_state)) | |
228 | nfs_idmap_delete(clp); | |
229 | ||
230 | rpc_destroy_wait_queue(&clp->cl_rpcwaitq); | |
231 | kfree(clp->cl_serverowner); | |
232 | kfree(clp->cl_serverscope); | |
233 | kfree(clp->cl_implid); | |
234 | kfree(clp->cl_owner_id); | |
235 | } | |
236 | ||
237 | void nfs4_free_client(struct nfs_client *clp) | |
238 | { | |
239 | nfs4_shutdown_client(clp); | |
240 | nfs_free_client(clp); | |
241 | } | |
242 | ||
243 | /* | |
244 | * Initialize the NFS4 callback service | |
245 | */ | |
246 | static int nfs4_init_callback(struct nfs_client *clp) | |
247 | { | |
248 | struct rpc_xprt *xprt; | |
249 | int error; | |
250 | ||
251 | xprt = rcu_dereference_raw(clp->cl_rpcclient->cl_xprt); | |
252 | ||
253 | if (nfs4_has_session(clp)) { | |
254 | error = xprt_setup_backchannel(xprt, NFS41_BC_MIN_CALLBACKS); | |
255 | if (error < 0) | |
256 | return error; | |
257 | } | |
258 | ||
259 | error = nfs_callback_up(clp->cl_mvops->minor_version, xprt); | |
260 | if (error < 0) { | |
261 | dprintk("%s: failed to start callback. Error = %d\n", | |
262 | __func__, error); | |
263 | return error; | |
264 | } | |
265 | __set_bit(NFS_CS_CALLBACK, &clp->cl_res_state); | |
266 | ||
267 | return 0; | |
268 | } | |
269 | ||
270 | /** | |
271 | * nfs40_init_client - nfs_client initialization tasks for NFSv4.0 | |
272 | * @clp - nfs_client to initialize | |
273 | * | |
274 | * Returns zero on success, or a negative errno if some error occurred. | |
275 | */ | |
276 | int nfs40_init_client(struct nfs_client *clp) | |
277 | { | |
278 | struct nfs4_slot_table *tbl; | |
279 | int ret; | |
280 | ||
281 | tbl = kzalloc(sizeof(*tbl), GFP_NOFS); | |
282 | if (tbl == NULL) | |
283 | return -ENOMEM; | |
284 | ||
285 | ret = nfs4_setup_slot_table(tbl, NFS4_MAX_SLOT_TABLE, | |
286 | "NFSv4.0 transport Slot table"); | |
287 | if (ret) { | |
288 | kfree(tbl); | |
289 | return ret; | |
290 | } | |
291 | ||
292 | clp->cl_slot_tbl = tbl; | |
293 | return 0; | |
294 | } | |
295 | ||
296 | #if defined(CONFIG_NFS_V4_1) | |
297 | ||
298 | /** | |
299 | * nfs41_init_client - nfs_client initialization tasks for NFSv4.1+ | |
300 | * @clp - nfs_client to initialize | |
301 | * | |
302 | * Returns zero on success, or a negative errno if some error occurred. | |
303 | */ | |
304 | int nfs41_init_client(struct nfs_client *clp) | |
305 | { | |
306 | struct nfs4_session *session = NULL; | |
307 | ||
308 | /* | |
309 | * Create the session and mark it expired. | |
310 | * When a SEQUENCE operation encounters the expired session | |
311 | * it will do session recovery to initialize it. | |
312 | */ | |
313 | session = nfs4_alloc_session(clp); | |
314 | if (!session) | |
315 | return -ENOMEM; | |
316 | ||
317 | clp->cl_session = session; | |
318 | ||
319 | /* | |
320 | * The create session reply races with the server back | |
321 | * channel probe. Mark the client NFS_CS_SESSION_INITING | |
322 | * so that the client back channel can find the | |
323 | * nfs_client struct | |
324 | */ | |
325 | nfs_mark_client_ready(clp, NFS_CS_SESSION_INITING); | |
326 | return 0; | |
327 | } | |
328 | ||
329 | #endif /* CONFIG_NFS_V4_1 */ | |
330 | ||
331 | /* | |
332 | * Initialize the minor version specific parts of an NFS4 client record | |
333 | */ | |
334 | static int nfs4_init_client_minor_version(struct nfs_client *clp) | |
335 | { | |
336 | int ret; | |
337 | ||
338 | ret = clp->cl_mvops->init_client(clp); | |
339 | if (ret) | |
340 | return ret; | |
341 | return nfs4_init_callback(clp); | |
342 | } | |
343 | ||
344 | /** | |
345 | * nfs4_init_client - Initialise an NFS4 client record | |
346 | * | |
347 | * @clp: nfs_client to initialise | |
348 | * @timeparms: timeout parameters for underlying RPC transport | |
349 | * @ip_addr: callback IP address in presentation format | |
350 | * @authflavor: authentication flavor for underlying RPC transport | |
351 | * | |
352 | * Returns pointer to an NFS client, or an ERR_PTR value. | |
353 | */ | |
354 | struct nfs_client *nfs4_init_client(struct nfs_client *clp, | |
355 | const struct nfs_client_initdata *cl_init) | |
356 | { | |
357 | char buf[INET6_ADDRSTRLEN + 1]; | |
358 | const char *ip_addr = cl_init->ip_addr; | |
359 | struct nfs_client *old; | |
360 | int error; | |
361 | ||
362 | if (clp->cl_cons_state == NFS_CS_READY) { | |
363 | /* the client is initialised already */ | |
364 | dprintk("<-- nfs4_init_client() = 0 [already %p]\n", clp); | |
365 | return clp; | |
366 | } | |
367 | ||
368 | /* Check NFS protocol revision and initialize RPC op vector */ | |
369 | clp->rpc_ops = &nfs_v4_clientops; | |
370 | ||
371 | if (clp->cl_minorversion != 0) | |
372 | __set_bit(NFS_CS_INFINITE_SLOTS, &clp->cl_flags); | |
373 | __set_bit(NFS_CS_DISCRTRY, &clp->cl_flags); | |
374 | __set_bit(NFS_CS_NO_RETRANS_TIMEOUT, &clp->cl_flags); | |
375 | ||
376 | error = nfs_create_rpc_client(clp, cl_init, RPC_AUTH_GSS_KRB5I); | |
377 | if (error == -EINVAL) | |
378 | error = nfs_create_rpc_client(clp, cl_init, RPC_AUTH_UNIX); | |
379 | if (error < 0) | |
380 | goto error; | |
381 | ||
382 | /* If no clientaddr= option was specified, find a usable cb address */ | |
383 | if (ip_addr == NULL) { | |
384 | struct sockaddr_storage cb_addr; | |
385 | struct sockaddr *sap = (struct sockaddr *)&cb_addr; | |
386 | ||
387 | error = rpc_localaddr(clp->cl_rpcclient, sap, sizeof(cb_addr)); | |
388 | if (error < 0) | |
389 | goto error; | |
390 | error = rpc_ntop(sap, buf, sizeof(buf)); | |
391 | if (error < 0) | |
392 | goto error; | |
393 | ip_addr = (const char *)buf; | |
394 | } | |
395 | strlcpy(clp->cl_ipaddr, ip_addr, sizeof(clp->cl_ipaddr)); | |
396 | ||
397 | error = nfs_idmap_new(clp); | |
398 | if (error < 0) { | |
399 | dprintk("%s: failed to create idmapper. Error = %d\n", | |
400 | __func__, error); | |
401 | goto error; | |
402 | } | |
403 | __set_bit(NFS_CS_IDMAP, &clp->cl_res_state); | |
404 | ||
405 | error = nfs4_init_client_minor_version(clp); | |
406 | if (error < 0) | |
407 | goto error; | |
408 | ||
409 | if (!nfs4_has_session(clp)) | |
410 | nfs_mark_client_ready(clp, NFS_CS_READY); | |
411 | ||
412 | error = nfs4_discover_server_trunking(clp, &old); | |
413 | if (error < 0) | |
414 | goto error; | |
415 | ||
416 | if (clp != old) | |
417 | clp->cl_preserve_clid = true; | |
418 | nfs_put_client(clp); | |
419 | return old; | |
420 | ||
421 | error: | |
422 | nfs_mark_client_ready(clp, error); | |
423 | nfs_put_client(clp); | |
424 | dprintk("<-- nfs4_init_client() = xerror %d\n", error); | |
425 | return ERR_PTR(error); | |
426 | } | |
427 | ||
428 | /* | |
429 | * SETCLIENTID just did a callback update with the callback ident in | |
430 | * "drop," but server trunking discovery claims "drop" and "keep" are | |
431 | * actually the same server. Swap the callback IDs so that "keep" | |
432 | * will continue to use the callback ident the server now knows about, | |
433 | * and so that "keep"'s original callback ident is destroyed when | |
434 | * "drop" is freed. | |
435 | */ | |
436 | static void nfs4_swap_callback_idents(struct nfs_client *keep, | |
437 | struct nfs_client *drop) | |
438 | { | |
439 | struct nfs_net *nn = net_generic(keep->cl_net, nfs_net_id); | |
440 | unsigned int save = keep->cl_cb_ident; | |
441 | ||
442 | if (keep->cl_cb_ident == drop->cl_cb_ident) | |
443 | return; | |
444 | ||
445 | dprintk("%s: keeping callback ident %u and dropping ident %u\n", | |
446 | __func__, keep->cl_cb_ident, drop->cl_cb_ident); | |
447 | ||
448 | spin_lock(&nn->nfs_client_lock); | |
449 | ||
450 | idr_replace(&nn->cb_ident_idr, keep, drop->cl_cb_ident); | |
451 | keep->cl_cb_ident = drop->cl_cb_ident; | |
452 | ||
453 | idr_replace(&nn->cb_ident_idr, drop, save); | |
454 | drop->cl_cb_ident = save; | |
455 | ||
456 | spin_unlock(&nn->nfs_client_lock); | |
457 | } | |
458 | ||
459 | static bool nfs4_match_client_owner_id(const struct nfs_client *clp1, | |
460 | const struct nfs_client *clp2) | |
461 | { | |
462 | if (clp1->cl_owner_id == NULL || clp2->cl_owner_id == NULL) | |
463 | return true; | |
464 | return strcmp(clp1->cl_owner_id, clp2->cl_owner_id) == 0; | |
465 | } | |
466 | ||
467 | static bool nfs4_same_verifier(nfs4_verifier *v1, nfs4_verifier *v2) | |
468 | { | |
469 | return memcmp(v1->data, v2->data, sizeof(v1->data)) == 0; | |
470 | } | |
471 | ||
472 | static int nfs4_match_client(struct nfs_client *pos, struct nfs_client *new, | |
473 | struct nfs_client **prev, struct nfs_net *nn) | |
474 | { | |
475 | int status; | |
476 | ||
477 | if (pos->rpc_ops != new->rpc_ops) | |
478 | return 1; | |
479 | ||
480 | if (pos->cl_minorversion != new->cl_minorversion) | |
481 | return 1; | |
482 | ||
483 | /* If "pos" isn't marked ready, we can't trust the | |
484 | * remaining fields in "pos", especially the client | |
485 | * ID and serverowner fields. Wait for CREATE_SESSION | |
486 | * to finish. */ | |
487 | if (pos->cl_cons_state > NFS_CS_READY) { | |
488 | atomic_inc(&pos->cl_count); | |
489 | spin_unlock(&nn->nfs_client_lock); | |
490 | ||
491 | nfs_put_client(*prev); | |
492 | *prev = pos; | |
493 | ||
494 | status = nfs_wait_client_init_complete(pos); | |
495 | spin_lock(&nn->nfs_client_lock); | |
496 | ||
497 | if (status < 0) | |
498 | return status; | |
499 | } | |
500 | ||
501 | if (pos->cl_cons_state != NFS_CS_READY) | |
502 | return 1; | |
503 | ||
504 | if (pos->cl_clientid != new->cl_clientid) | |
505 | return 1; | |
506 | ||
507 | /* NFSv4.1 always uses the uniform string, however someone | |
508 | * might switch the uniquifier string on us. | |
509 | */ | |
510 | if (!nfs4_match_client_owner_id(pos, new)) | |
511 | return 1; | |
512 | ||
513 | return 0; | |
514 | } | |
515 | ||
516 | /** | |
517 | * nfs40_walk_client_list - Find server that recognizes a client ID | |
518 | * | |
519 | * @new: nfs_client with client ID to test | |
520 | * @result: OUT: found nfs_client, or new | |
521 | * @cred: credential to use for trunking test | |
522 | * | |
523 | * Returns zero, a negative errno, or a negative NFS4ERR status. | |
524 | * If zero is returned, an nfs_client pointer is planted in "result." | |
525 | * | |
526 | * NB: nfs40_walk_client_list() relies on the new nfs_client being | |
527 | * the last nfs_client on the list. | |
528 | */ | |
529 | int nfs40_walk_client_list(struct nfs_client *new, | |
530 | struct nfs_client **result, | |
531 | struct rpc_cred *cred) | |
532 | { | |
533 | struct nfs_net *nn = net_generic(new->cl_net, nfs_net_id); | |
534 | struct nfs_client *pos, *prev = NULL; | |
535 | struct nfs4_setclientid_res clid = { | |
536 | .clientid = new->cl_clientid, | |
537 | .confirm = new->cl_confirm, | |
538 | }; | |
539 | int status = -NFS4ERR_STALE_CLIENTID; | |
540 | ||
541 | spin_lock(&nn->nfs_client_lock); | |
542 | list_for_each_entry(pos, &nn->nfs_client_list, cl_share_link) { | |
543 | ||
544 | status = nfs4_match_client(pos, new, &prev, nn); | |
545 | if (status < 0) | |
546 | goto out_unlock; | |
547 | if (status != 0) | |
548 | continue; | |
549 | /* | |
550 | * We just sent a new SETCLIENTID, which should have | |
551 | * caused the server to return a new cl_confirm. So if | |
552 | * cl_confirm is the same, then this is a different | |
553 | * server that just returned the same cl_confirm by | |
554 | * coincidence: | |
555 | */ | |
556 | if ((new != pos) && nfs4_same_verifier(&pos->cl_confirm, | |
557 | &new->cl_confirm)) | |
558 | continue; | |
559 | /* | |
560 | * But if the cl_confirm's are different, then the only | |
561 | * way that a SETCLIENTID_CONFIRM to pos can succeed is | |
562 | * if new and pos point to the same server: | |
563 | */ | |
564 | atomic_inc(&pos->cl_count); | |
565 | spin_unlock(&nn->nfs_client_lock); | |
566 | ||
567 | nfs_put_client(prev); | |
568 | prev = pos; | |
569 | ||
570 | status = nfs4_proc_setclientid_confirm(pos, &clid, cred); | |
571 | switch (status) { | |
572 | case -NFS4ERR_STALE_CLIENTID: | |
573 | break; | |
574 | case 0: | |
575 | nfs4_swap_callback_idents(pos, new); | |
576 | pos->cl_confirm = new->cl_confirm; | |
577 | ||
578 | prev = NULL; | |
579 | *result = pos; | |
580 | dprintk("NFS: <-- %s using nfs_client = %p ({%d})\n", | |
581 | __func__, pos, atomic_read(&pos->cl_count)); | |
582 | goto out; | |
583 | case -ERESTARTSYS: | |
584 | case -ETIMEDOUT: | |
585 | /* The callback path may have been inadvertently | |
586 | * changed. Schedule recovery! | |
587 | */ | |
588 | nfs4_schedule_path_down_recovery(pos); | |
589 | default: | |
590 | spin_lock(&nn->nfs_client_lock); | |
591 | goto out; | |
592 | } | |
593 | ||
594 | spin_lock(&nn->nfs_client_lock); | |
595 | } | |
596 | out_unlock: | |
597 | spin_unlock(&nn->nfs_client_lock); | |
598 | ||
599 | /* No match found. The server lost our clientid */ | |
600 | out: | |
601 | nfs_put_client(prev); | |
602 | dprintk("NFS: <-- %s status = %d\n", __func__, status); | |
603 | return status; | |
604 | } | |
605 | ||
606 | #ifdef CONFIG_NFS_V4_1 | |
607 | /* | |
608 | * Returns true if the server major ids match | |
609 | */ | |
610 | static bool | |
611 | nfs4_check_serverowner_major_id(struct nfs41_server_owner *o1, | |
612 | struct nfs41_server_owner *o2) | |
613 | { | |
614 | if (o1->major_id_sz != o2->major_id_sz) | |
615 | goto out_major_mismatch; | |
616 | if (memcmp(o1->major_id, o2->major_id, o1->major_id_sz) != 0) | |
617 | goto out_major_mismatch; | |
618 | ||
619 | dprintk("NFS: --> %s server owner major IDs match\n", __func__); | |
620 | return true; | |
621 | ||
622 | out_major_mismatch: | |
623 | dprintk("NFS: --> %s server owner major IDs do not match\n", | |
624 | __func__); | |
625 | return false; | |
626 | } | |
627 | ||
628 | /* | |
629 | * Returns true if the server scopes match | |
630 | */ | |
631 | static bool | |
632 | nfs4_check_server_scope(struct nfs41_server_scope *s1, | |
633 | struct nfs41_server_scope *s2) | |
634 | { | |
635 | if (s1->server_scope_sz != s2->server_scope_sz) | |
636 | goto out_scope_mismatch; | |
637 | if (memcmp(s1->server_scope, s2->server_scope, | |
638 | s1->server_scope_sz) != 0) | |
639 | goto out_scope_mismatch; | |
640 | ||
641 | dprintk("NFS: --> %s server scopes match\n", __func__); | |
642 | return true; | |
643 | ||
644 | out_scope_mismatch: | |
645 | dprintk("NFS: --> %s server scopes do not match\n", | |
646 | __func__); | |
647 | return false; | |
648 | } | |
649 | ||
650 | /** | |
651 | * nfs4_detect_session_trunking - Checks for session trunking. | |
652 | * | |
653 | * Called after a successful EXCHANGE_ID on a multi-addr connection. | |
654 | * Upon success, add the transport. | |
655 | * | |
656 | * @clp: original mount nfs_client | |
657 | * @res: result structure from an exchange_id using the original mount | |
658 | * nfs_client with a new multi_addr transport | |
659 | * | |
660 | * Returns zero on success, otherwise -EINVAL | |
661 | * | |
662 | * Note: since the exchange_id for the new multi_addr transport uses the | |
663 | * same nfs_client from the original mount, the cl_owner_id is reused, | |
664 | * so eir_clientowner is the same. | |
665 | */ | |
666 | int nfs4_detect_session_trunking(struct nfs_client *clp, | |
667 | struct nfs41_exchange_id_res *res, | |
668 | struct rpc_xprt *xprt) | |
669 | { | |
670 | /* Check eir_clientid */ | |
671 | if (clp->cl_clientid != res->clientid) | |
672 | goto out_err; | |
673 | ||
674 | /* Check eir_server_owner so_major_id */ | |
675 | if (!nfs4_check_serverowner_major_id(clp->cl_serverowner, | |
676 | res->server_owner)) | |
677 | goto out_err; | |
678 | ||
679 | /* Check eir_server_owner so_minor_id */ | |
680 | if (clp->cl_serverowner->minor_id != res->server_owner->minor_id) | |
681 | goto out_err; | |
682 | ||
683 | /* Check eir_server_scope */ | |
684 | if (!nfs4_check_server_scope(clp->cl_serverscope, res->server_scope)) | |
685 | goto out_err; | |
686 | ||
687 | /* Session trunking passed, add the xprt */ | |
688 | rpc_clnt_xprt_switch_add_xprt(clp->cl_rpcclient, xprt); | |
689 | ||
690 | pr_info("NFS: %s: Session trunking succeeded for %s\n", | |
691 | clp->cl_hostname, | |
692 | xprt->address_strings[RPC_DISPLAY_ADDR]); | |
693 | ||
694 | return 0; | |
695 | out_err: | |
696 | pr_info("NFS: %s: Session trunking failed for %s\n", clp->cl_hostname, | |
697 | xprt->address_strings[RPC_DISPLAY_ADDR]); | |
698 | ||
699 | return -EINVAL; | |
700 | } | |
701 | ||
702 | /** | |
703 | * nfs41_walk_client_list - Find nfs_client that matches a client/server owner | |
704 | * | |
705 | * @new: nfs_client with client ID to test | |
706 | * @result: OUT: found nfs_client, or new | |
707 | * @cred: credential to use for trunking test | |
708 | * | |
709 | * Returns zero, a negative errno, or a negative NFS4ERR status. | |
710 | * If zero is returned, an nfs_client pointer is planted in "result." | |
711 | * | |
712 | * NB: nfs41_walk_client_list() relies on the new nfs_client being | |
713 | * the last nfs_client on the list. | |
714 | */ | |
715 | int nfs41_walk_client_list(struct nfs_client *new, | |
716 | struct nfs_client **result, | |
717 | struct rpc_cred *cred) | |
718 | { | |
719 | struct nfs_net *nn = net_generic(new->cl_net, nfs_net_id); | |
720 | struct nfs_client *pos, *prev = NULL; | |
721 | int status = -NFS4ERR_STALE_CLIENTID; | |
722 | ||
723 | spin_lock(&nn->nfs_client_lock); | |
724 | list_for_each_entry(pos, &nn->nfs_client_list, cl_share_link) { | |
725 | ||
726 | if (pos == new) | |
727 | goto found; | |
728 | ||
729 | status = nfs4_match_client(pos, new, &prev, nn); | |
730 | if (status < 0) | |
731 | goto out; | |
732 | if (status != 0) | |
733 | continue; | |
734 | ||
735 | /* | |
736 | * Note that session trunking is just a special subcase of | |
737 | * client id trunking. In either case, we want to fall back | |
738 | * to using the existing nfs_client. | |
739 | */ | |
740 | if (!nfs4_check_serverowner_major_id(pos->cl_serverowner, | |
741 | new->cl_serverowner)) | |
742 | continue; | |
743 | ||
744 | found: | |
745 | atomic_inc(&pos->cl_count); | |
746 | *result = pos; | |
747 | status = 0; | |
748 | break; | |
749 | } | |
750 | ||
751 | out: | |
752 | spin_unlock(&nn->nfs_client_lock); | |
753 | nfs_put_client(prev); | |
754 | return status; | |
755 | } | |
756 | #endif /* CONFIG_NFS_V4_1 */ | |
757 | ||
758 | static void nfs4_destroy_server(struct nfs_server *server) | |
759 | { | |
760 | nfs_server_return_all_delegations(server); | |
761 | unset_pnfs_layoutdriver(server); | |
762 | nfs4_purge_state_owners(server); | |
763 | } | |
764 | ||
765 | /* | |
766 | * NFSv4.0 callback thread helper | |
767 | * | |
768 | * Find a client by callback identifier | |
769 | */ | |
770 | struct nfs_client * | |
771 | nfs4_find_client_ident(struct net *net, int cb_ident) | |
772 | { | |
773 | struct nfs_client *clp; | |
774 | struct nfs_net *nn = net_generic(net, nfs_net_id); | |
775 | ||
776 | spin_lock(&nn->nfs_client_lock); | |
777 | clp = idr_find(&nn->cb_ident_idr, cb_ident); | |
778 | if (clp) | |
779 | atomic_inc(&clp->cl_count); | |
780 | spin_unlock(&nn->nfs_client_lock); | |
781 | return clp; | |
782 | } | |
783 | ||
784 | #if defined(CONFIG_NFS_V4_1) | |
785 | /* Common match routine for v4.0 and v4.1 callback services */ | |
786 | static bool nfs4_cb_match_client(const struct sockaddr *addr, | |
787 | struct nfs_client *clp, u32 minorversion) | |
788 | { | |
789 | struct sockaddr *clap = (struct sockaddr *)&clp->cl_addr; | |
790 | ||
791 | /* Don't match clients that failed to initialise */ | |
792 | if (!(clp->cl_cons_state == NFS_CS_READY || | |
793 | clp->cl_cons_state == NFS_CS_SESSION_INITING)) | |
794 | return false; | |
795 | ||
796 | smp_rmb(); | |
797 | ||
798 | /* Match the version and minorversion */ | |
799 | if (clp->rpc_ops->version != 4 || | |
800 | clp->cl_minorversion != minorversion) | |
801 | return false; | |
802 | ||
803 | /* Match only the IP address, not the port number */ | |
804 | return rpc_cmp_addr(addr, clap); | |
805 | } | |
806 | ||
807 | /* | |
808 | * NFSv4.1 callback thread helper | |
809 | * For CB_COMPOUND calls, find a client by IP address, protocol version, | |
810 | * minorversion, and sessionID | |
811 | * | |
812 | * Returns NULL if no such client | |
813 | */ | |
814 | struct nfs_client * | |
815 | nfs4_find_client_sessionid(struct net *net, const struct sockaddr *addr, | |
816 | struct nfs4_sessionid *sid, u32 minorversion) | |
817 | { | |
818 | struct nfs_client *clp; | |
819 | struct nfs_net *nn = net_generic(net, nfs_net_id); | |
820 | ||
821 | spin_lock(&nn->nfs_client_lock); | |
822 | list_for_each_entry(clp, &nn->nfs_client_list, cl_share_link) { | |
823 | if (nfs4_cb_match_client(addr, clp, minorversion) == false) | |
824 | continue; | |
825 | ||
826 | if (!nfs4_has_session(clp)) | |
827 | continue; | |
828 | ||
829 | /* Match sessionid*/ | |
830 | if (memcmp(clp->cl_session->sess_id.data, | |
831 | sid->data, NFS4_MAX_SESSIONID_LEN) != 0) | |
832 | continue; | |
833 | ||
834 | atomic_inc(&clp->cl_count); | |
835 | spin_unlock(&nn->nfs_client_lock); | |
836 | return clp; | |
837 | } | |
838 | spin_unlock(&nn->nfs_client_lock); | |
839 | return NULL; | |
840 | } | |
841 | ||
842 | #else /* CONFIG_NFS_V4_1 */ | |
843 | ||
844 | struct nfs_client * | |
845 | nfs4_find_client_sessionid(struct net *net, const struct sockaddr *addr, | |
846 | struct nfs4_sessionid *sid, u32 minorversion) | |
847 | { | |
848 | return NULL; | |
849 | } | |
850 | #endif /* CONFIG_NFS_V4_1 */ | |
851 | ||
852 | /* | |
853 | * Set up an NFS4 client | |
854 | */ | |
855 | static int nfs4_set_client(struct nfs_server *server, | |
856 | const char *hostname, | |
857 | const struct sockaddr *addr, | |
858 | const size_t addrlen, | |
859 | const char *ip_addr, | |
860 | int proto, const struct rpc_timeout *timeparms, | |
861 | u32 minorversion, struct net *net) | |
862 | { | |
863 | struct nfs_client_initdata cl_init = { | |
864 | .hostname = hostname, | |
865 | .addr = addr, | |
866 | .addrlen = addrlen, | |
867 | .ip_addr = ip_addr, | |
868 | .nfs_mod = &nfs_v4, | |
869 | .proto = proto, | |
870 | .minorversion = minorversion, | |
871 | .net = net, | |
872 | .timeparms = timeparms, | |
873 | }; | |
874 | struct nfs_client *clp; | |
875 | int error; | |
876 | ||
877 | dprintk("--> nfs4_set_client()\n"); | |
878 | ||
879 | if (server->flags & NFS_MOUNT_NORESVPORT) | |
880 | set_bit(NFS_CS_NORESVPORT, &cl_init.init_flags); | |
881 | if (server->options & NFS_OPTION_MIGRATION) | |
882 | set_bit(NFS_CS_MIGRATION, &cl_init.init_flags); | |
883 | ||
884 | /* Allocate or find a client reference we can use */ | |
885 | clp = nfs_get_client(&cl_init); | |
886 | if (IS_ERR(clp)) { | |
887 | error = PTR_ERR(clp); | |
888 | goto error; | |
889 | } | |
890 | ||
891 | if (server->nfs_client == clp) { | |
892 | error = -ELOOP; | |
893 | goto error; | |
894 | } | |
895 | ||
896 | /* | |
897 | * Query for the lease time on clientid setup or renewal | |
898 | * | |
899 | * Note that this will be set on nfs_clients that were created | |
900 | * only for the DS role and did not set this bit, but now will | |
901 | * serve a dual role. | |
902 | */ | |
903 | set_bit(NFS_CS_CHECK_LEASE_TIME, &clp->cl_res_state); | |
904 | ||
905 | server->nfs_client = clp; | |
906 | dprintk("<-- nfs4_set_client() = 0 [new %p]\n", clp); | |
907 | return 0; | |
908 | error: | |
909 | dprintk("<-- nfs4_set_client() = xerror %d\n", error); | |
910 | return error; | |
911 | } | |
912 | ||
913 | /* | |
914 | * Set up a pNFS Data Server client. | |
915 | * | |
916 | * Return any existing nfs_client that matches server address,port,version | |
917 | * and minorversion. | |
918 | * | |
919 | * For a new nfs_client, use a soft mount (default), a low retrans and a | |
920 | * low timeout interval so that if a connection is lost, we retry through | |
921 | * the MDS. | |
922 | */ | |
923 | struct nfs_client *nfs4_set_ds_client(struct nfs_server *mds_srv, | |
924 | const struct sockaddr *ds_addr, int ds_addrlen, | |
925 | int ds_proto, unsigned int ds_timeo, unsigned int ds_retrans, | |
926 | u32 minor_version) | |
927 | { | |
928 | struct rpc_timeout ds_timeout; | |
929 | struct nfs_client *mds_clp = mds_srv->nfs_client; | |
930 | struct nfs_client_initdata cl_init = { | |
931 | .addr = ds_addr, | |
932 | .addrlen = ds_addrlen, | |
933 | .nodename = mds_clp->cl_rpcclient->cl_nodename, | |
934 | .ip_addr = mds_clp->cl_ipaddr, | |
935 | .nfs_mod = &nfs_v4, | |
936 | .proto = ds_proto, | |
937 | .minorversion = minor_version, | |
938 | .net = mds_clp->cl_net, | |
939 | .timeparms = &ds_timeout, | |
940 | }; | |
941 | struct nfs_client *clp; | |
942 | char buf[INET6_ADDRSTRLEN + 1]; | |
943 | ||
944 | if (rpc_ntop(ds_addr, buf, sizeof(buf)) <= 0) | |
945 | return ERR_PTR(-EINVAL); | |
946 | cl_init.hostname = buf; | |
947 | ||
948 | if (mds_srv->flags & NFS_MOUNT_NORESVPORT) | |
949 | __set_bit(NFS_CS_NORESVPORT, &cl_init.init_flags); | |
950 | ||
951 | /* | |
952 | * Set an authflavor equual to the MDS value. Use the MDS nfs_client | |
953 | * cl_ipaddr so as to use the same EXCHANGE_ID co_ownerid as the MDS | |
954 | * (section 13.1 RFC 5661). | |
955 | */ | |
956 | nfs_init_timeout_values(&ds_timeout, ds_proto, ds_timeo, ds_retrans); | |
957 | clp = nfs_get_client(&cl_init); | |
958 | ||
959 | dprintk("<-- %s %p\n", __func__, clp); | |
960 | return clp; | |
961 | } | |
962 | EXPORT_SYMBOL_GPL(nfs4_set_ds_client); | |
963 | ||
964 | /* | |
965 | * Session has been established, and the client marked ready. | |
966 | * Set the mount rsize and wsize with negotiated fore channel | |
967 | * attributes which will be bound checked in nfs_server_set_fsinfo. | |
968 | */ | |
969 | static void nfs4_session_set_rwsize(struct nfs_server *server) | |
970 | { | |
971 | #ifdef CONFIG_NFS_V4_1 | |
972 | struct nfs4_session *sess; | |
973 | u32 server_resp_sz; | |
974 | u32 server_rqst_sz; | |
975 | ||
976 | if (!nfs4_has_session(server->nfs_client)) | |
977 | return; | |
978 | sess = server->nfs_client->cl_session; | |
979 | server_resp_sz = sess->fc_attrs.max_resp_sz - nfs41_maxread_overhead; | |
980 | server_rqst_sz = sess->fc_attrs.max_rqst_sz - nfs41_maxwrite_overhead; | |
981 | ||
982 | if (!server->rsize || server->rsize > server_resp_sz) | |
983 | server->rsize = server_resp_sz; | |
984 | if (!server->wsize || server->wsize > server_rqst_sz) | |
985 | server->wsize = server_rqst_sz; | |
986 | #endif /* CONFIG_NFS_V4_1 */ | |
987 | } | |
988 | ||
989 | static int nfs4_server_common_setup(struct nfs_server *server, | |
990 | struct nfs_fh *mntfh, bool auth_probe) | |
991 | { | |
992 | struct nfs_fattr *fattr; | |
993 | int error; | |
994 | ||
995 | /* data servers support only a subset of NFSv4.1 */ | |
996 | if (is_ds_only_client(server->nfs_client)) | |
997 | return -EPROTONOSUPPORT; | |
998 | ||
999 | fattr = nfs_alloc_fattr(); | |
1000 | if (fattr == NULL) | |
1001 | return -ENOMEM; | |
1002 | ||
1003 | /* We must ensure the session is initialised first */ | |
1004 | error = nfs4_init_session(server->nfs_client); | |
1005 | if (error < 0) | |
1006 | goto out; | |
1007 | ||
1008 | /* Set the basic capabilities */ | |
1009 | server->caps |= server->nfs_client->cl_mvops->init_caps; | |
1010 | if (server->flags & NFS_MOUNT_NORDIRPLUS) | |
1011 | server->caps &= ~NFS_CAP_READDIRPLUS; | |
1012 | /* | |
1013 | * Don't use NFS uid/gid mapping if we're using AUTH_SYS or lower | |
1014 | * authentication. | |
1015 | */ | |
1016 | if (nfs4_disable_idmapping && | |
1017 | server->client->cl_auth->au_flavor == RPC_AUTH_UNIX) | |
1018 | server->caps |= NFS_CAP_UIDGID_NOMAP; | |
1019 | ||
1020 | ||
1021 | /* Probe the root fh to retrieve its FSID and filehandle */ | |
1022 | error = nfs4_get_rootfh(server, mntfh, auth_probe); | |
1023 | if (error < 0) | |
1024 | goto out; | |
1025 | ||
1026 | dprintk("Server FSID: %llx:%llx\n", | |
1027 | (unsigned long long) server->fsid.major, | |
1028 | (unsigned long long) server->fsid.minor); | |
1029 | nfs_display_fhandle(mntfh, "Pseudo-fs root FH"); | |
1030 | ||
1031 | nfs4_session_set_rwsize(server); | |
1032 | ||
1033 | error = nfs_probe_fsinfo(server, mntfh, fattr); | |
1034 | if (error < 0) | |
1035 | goto out; | |
1036 | ||
1037 | if (server->namelen == 0 || server->namelen > NFS4_MAXNAMLEN) | |
1038 | server->namelen = NFS4_MAXNAMLEN; | |
1039 | ||
1040 | nfs_server_insert_lists(server); | |
1041 | server->mount_time = jiffies; | |
1042 | server->destroy = nfs4_destroy_server; | |
1043 | out: | |
1044 | nfs_free_fattr(fattr); | |
1045 | return error; | |
1046 | } | |
1047 | ||
1048 | /* | |
1049 | * Create a version 4 volume record | |
1050 | */ | |
1051 | static int nfs4_init_server(struct nfs_server *server, | |
1052 | struct nfs_parsed_mount_data *data) | |
1053 | { | |
1054 | struct rpc_timeout timeparms; | |
1055 | int error; | |
1056 | ||
1057 | dprintk("--> nfs4_init_server()\n"); | |
1058 | ||
1059 | nfs_init_timeout_values(&timeparms, data->nfs_server.protocol, | |
1060 | data->timeo, data->retrans); | |
1061 | ||
1062 | /* Initialise the client representation from the mount data */ | |
1063 | server->flags = data->flags; | |
1064 | server->options = data->options; | |
1065 | server->auth_info = data->auth_info; | |
1066 | ||
1067 | /* Use the first specified auth flavor. If this flavor isn't | |
1068 | * allowed by the server, use the SECINFO path to try the | |
1069 | * other specified flavors */ | |
1070 | if (data->auth_info.flavor_len >= 1) | |
1071 | data->selected_flavor = data->auth_info.flavors[0]; | |
1072 | else | |
1073 | data->selected_flavor = RPC_AUTH_UNIX; | |
1074 | ||
1075 | /* Get a client record */ | |
1076 | error = nfs4_set_client(server, | |
1077 | data->nfs_server.hostname, | |
1078 | (const struct sockaddr *)&data->nfs_server.address, | |
1079 | data->nfs_server.addrlen, | |
1080 | data->client_address, | |
1081 | data->nfs_server.protocol, | |
1082 | &timeparms, | |
1083 | data->minorversion, | |
1084 | data->net); | |
1085 | if (error < 0) | |
1086 | goto error; | |
1087 | ||
1088 | if (data->rsize) | |
1089 | server->rsize = nfs_block_size(data->rsize, NULL); | |
1090 | if (data->wsize) | |
1091 | server->wsize = nfs_block_size(data->wsize, NULL); | |
1092 | ||
1093 | server->acregmin = data->acregmin * HZ; | |
1094 | server->acregmax = data->acregmax * HZ; | |
1095 | server->acdirmin = data->acdirmin * HZ; | |
1096 | server->acdirmax = data->acdirmax * HZ; | |
1097 | ||
1098 | server->port = data->nfs_server.port; | |
1099 | ||
1100 | error = nfs_init_server_rpcclient(server, &timeparms, | |
1101 | data->selected_flavor); | |
1102 | ||
1103 | error: | |
1104 | /* Done */ | |
1105 | dprintk("<-- nfs4_init_server() = %d\n", error); | |
1106 | return error; | |
1107 | } | |
1108 | ||
1109 | /* | |
1110 | * Create a version 4 volume record | |
1111 | * - keyed on server and FSID | |
1112 | */ | |
1113 | /*struct nfs_server *nfs4_create_server(const struct nfs_parsed_mount_data *data, | |
1114 | struct nfs_fh *mntfh)*/ | |
1115 | struct nfs_server *nfs4_create_server(struct nfs_mount_info *mount_info, | |
1116 | struct nfs_subversion *nfs_mod) | |
1117 | { | |
1118 | struct nfs_server *server; | |
1119 | bool auth_probe; | |
1120 | int error; | |
1121 | ||
1122 | dprintk("--> nfs4_create_server()\n"); | |
1123 | ||
1124 | server = nfs_alloc_server(); | |
1125 | if (!server) | |
1126 | return ERR_PTR(-ENOMEM); | |
1127 | ||
1128 | auth_probe = mount_info->parsed->auth_info.flavor_len < 1; | |
1129 | ||
1130 | /* set up the general RPC client */ | |
1131 | error = nfs4_init_server(server, mount_info->parsed); | |
1132 | if (error < 0) | |
1133 | goto error; | |
1134 | ||
1135 | error = nfs4_server_common_setup(server, mount_info->mntfh, auth_probe); | |
1136 | if (error < 0) | |
1137 | goto error; | |
1138 | ||
1139 | dprintk("<-- nfs4_create_server() = %p\n", server); | |
1140 | return server; | |
1141 | ||
1142 | error: | |
1143 | nfs_free_server(server); | |
1144 | dprintk("<-- nfs4_create_server() = error %d\n", error); | |
1145 | return ERR_PTR(error); | |
1146 | } | |
1147 | ||
1148 | /* | |
1149 | * Create an NFS4 referral server record | |
1150 | */ | |
1151 | struct nfs_server *nfs4_create_referral_server(struct nfs_clone_mount *data, | |
1152 | struct nfs_fh *mntfh) | |
1153 | { | |
1154 | struct nfs_client *parent_client; | |
1155 | struct nfs_server *server, *parent_server; | |
1156 | bool auth_probe; | |
1157 | int error; | |
1158 | ||
1159 | dprintk("--> nfs4_create_referral_server()\n"); | |
1160 | ||
1161 | server = nfs_alloc_server(); | |
1162 | if (!server) | |
1163 | return ERR_PTR(-ENOMEM); | |
1164 | ||
1165 | parent_server = NFS_SB(data->sb); | |
1166 | parent_client = parent_server->nfs_client; | |
1167 | ||
1168 | /* Initialise the client representation from the parent server */ | |
1169 | nfs_server_copy_userdata(server, parent_server); | |
1170 | ||
1171 | /* Get a client representation. | |
1172 | * Note: NFSv4 always uses TCP, */ | |
1173 | error = nfs4_set_client(server, data->hostname, | |
1174 | data->addr, | |
1175 | data->addrlen, | |
1176 | parent_client->cl_ipaddr, | |
1177 | rpc_protocol(parent_server->client), | |
1178 | parent_server->client->cl_timeout, | |
1179 | parent_client->cl_mvops->minor_version, | |
1180 | parent_client->cl_net); | |
1181 | if (error < 0) | |
1182 | goto error; | |
1183 | ||
1184 | error = nfs_init_server_rpcclient(server, parent_server->client->cl_timeout, data->authflavor); | |
1185 | if (error < 0) | |
1186 | goto error; | |
1187 | ||
1188 | auth_probe = parent_server->auth_info.flavor_len < 1; | |
1189 | ||
1190 | error = nfs4_server_common_setup(server, mntfh, auth_probe); | |
1191 | if (error < 0) | |
1192 | goto error; | |
1193 | ||
1194 | dprintk("<-- nfs_create_referral_server() = %p\n", server); | |
1195 | return server; | |
1196 | ||
1197 | error: | |
1198 | nfs_free_server(server); | |
1199 | dprintk("<-- nfs4_create_referral_server() = error %d\n", error); | |
1200 | return ERR_PTR(error); | |
1201 | } | |
1202 | ||
1203 | /* | |
1204 | * Grab the destination's particulars, including lease expiry time. | |
1205 | * | |
1206 | * Returns zero if probe succeeded and retrieved FSID matches the FSID | |
1207 | * we have cached. | |
1208 | */ | |
1209 | static int nfs_probe_destination(struct nfs_server *server) | |
1210 | { | |
1211 | struct inode *inode = d_inode(server->super->s_root); | |
1212 | struct nfs_fattr *fattr; | |
1213 | int error; | |
1214 | ||
1215 | fattr = nfs_alloc_fattr(); | |
1216 | if (fattr == NULL) | |
1217 | return -ENOMEM; | |
1218 | ||
1219 | /* Sanity: the probe won't work if the destination server | |
1220 | * does not recognize the migrated FH. */ | |
1221 | error = nfs_probe_fsinfo(server, NFS_FH(inode), fattr); | |
1222 | ||
1223 | nfs_free_fattr(fattr); | |
1224 | return error; | |
1225 | } | |
1226 | ||
1227 | /** | |
1228 | * nfs4_update_server - Move an nfs_server to a different nfs_client | |
1229 | * | |
1230 | * @server: represents FSID to be moved | |
1231 | * @hostname: new end-point's hostname | |
1232 | * @sap: new end-point's socket address | |
1233 | * @salen: size of "sap" | |
1234 | * @net: net namespace | |
1235 | * | |
1236 | * The nfs_server must be quiescent before this function is invoked. | |
1237 | * Either its session is drained (NFSv4.1+), or its transport is | |
1238 | * plugged and drained (NFSv4.0). | |
1239 | * | |
1240 | * Returns zero on success, or a negative errno value. | |
1241 | */ | |
1242 | int nfs4_update_server(struct nfs_server *server, const char *hostname, | |
1243 | struct sockaddr *sap, size_t salen, struct net *net) | |
1244 | { | |
1245 | struct nfs_client *clp = server->nfs_client; | |
1246 | struct rpc_clnt *clnt = server->client; | |
1247 | struct xprt_create xargs = { | |
1248 | .ident = clp->cl_proto, | |
1249 | .net = net, | |
1250 | .dstaddr = sap, | |
1251 | .addrlen = salen, | |
1252 | .servername = hostname, | |
1253 | }; | |
1254 | char buf[INET6_ADDRSTRLEN + 1]; | |
1255 | struct sockaddr_storage address; | |
1256 | struct sockaddr *localaddr = (struct sockaddr *)&address; | |
1257 | int error; | |
1258 | ||
1259 | dprintk("--> %s: move FSID %llx:%llx to \"%s\")\n", __func__, | |
1260 | (unsigned long long)server->fsid.major, | |
1261 | (unsigned long long)server->fsid.minor, | |
1262 | hostname); | |
1263 | ||
1264 | error = rpc_switch_client_transport(clnt, &xargs, clnt->cl_timeout); | |
1265 | if (error != 0) { | |
1266 | dprintk("<-- %s(): rpc_switch_client_transport returned %d\n", | |
1267 | __func__, error); | |
1268 | goto out; | |
1269 | } | |
1270 | ||
1271 | error = rpc_localaddr(clnt, localaddr, sizeof(address)); | |
1272 | if (error != 0) { | |
1273 | dprintk("<-- %s(): rpc_localaddr returned %d\n", | |
1274 | __func__, error); | |
1275 | goto out; | |
1276 | } | |
1277 | ||
1278 | error = -EAFNOSUPPORT; | |
1279 | if (rpc_ntop(localaddr, buf, sizeof(buf)) == 0) { | |
1280 | dprintk("<-- %s(): rpc_ntop returned %d\n", | |
1281 | __func__, error); | |
1282 | goto out; | |
1283 | } | |
1284 | ||
1285 | nfs_server_remove_lists(server); | |
1286 | error = nfs4_set_client(server, hostname, sap, salen, buf, | |
1287 | clp->cl_proto, clnt->cl_timeout, | |
1288 | clp->cl_minorversion, net); | |
1289 | nfs_put_client(clp); | |
1290 | if (error != 0) { | |
1291 | nfs_server_insert_lists(server); | |
1292 | dprintk("<-- %s(): nfs4_set_client returned %d\n", | |
1293 | __func__, error); | |
1294 | goto out; | |
1295 | } | |
1296 | ||
1297 | if (server->nfs_client->cl_hostname == NULL) | |
1298 | server->nfs_client->cl_hostname = kstrdup(hostname, GFP_KERNEL); | |
1299 | nfs_server_insert_lists(server); | |
1300 | ||
1301 | error = nfs_probe_destination(server); | |
1302 | if (error < 0) | |
1303 | goto out; | |
1304 | ||
1305 | dprintk("<-- %s() succeeded\n", __func__); | |
1306 | ||
1307 | out: | |
1308 | return error; | |
1309 | } |