Merge tag 'devicetree-for-6.8' of git://git.kernel.org/pub/scm/linux/kernel/git/robh...
[linux-block.git] / fs / nfs / nfs4client.c
CommitLineData
457c8996 1// SPDX-License-Identifier: GPL-2.0-only
428360d7
BS
2/*
3 * Copyright (C) 2006 Red Hat, Inc. All Rights Reserved.
4 * Written by David Howells (dhowells@redhat.com)
5 */
fcf10398 6#include <linux/module.h>
428360d7 7#include <linux/nfs_fs.h>
fcf10398 8#include <linux/nfs_mount.h>
5976687a 9#include <linux/sunrpc/addr.h>
428360d7
BS
10#include <linux/sunrpc/auth.h>
11#include <linux/sunrpc/xprt.h>
12#include <linux/sunrpc/bc_xprt.h>
6aa23d76 13#include <linux/sunrpc/rpc_pipe_fs.h>
428360d7
BS
14#include "internal.h"
15#include "callback.h"
fcf10398 16#include "delegation.h"
73e39aaa 17#include "nfs4session.h"
40c64c26 18#include "nfs4idmap.h"
fcf10398
BS
19#include "pnfs.h"
20#include "netns.h"
1c725118 21#include "sysfs.h"
428360d7
BS
22
23#define NFSDBG_FACILITY NFSDBG_CLIENT
24
ec409897
BS
25/*
26 * Get a unique NFSv4.0 callback identifier which will be used
27 * by the V4.0 callback service to lookup the nfs_client struct
28 */
29static int nfs_get_cb_ident_idr(struct nfs_client *clp, int minorversion)
30{
31 int ret = 0;
32 struct nfs_net *nn = net_generic(clp->cl_net, nfs_net_id);
33
34 if (clp->rpc_ops->version != 4 || minorversion != 0)
35 return ret;
d6870312 36 idr_preload(GFP_KERNEL);
ec409897 37 spin_lock(&nn->nfs_client_lock);
c68a027c 38 ret = idr_alloc(&nn->cb_ident_idr, clp, 1, 0, GFP_NOWAIT);
d6870312
TH
39 if (ret >= 0)
40 clp->cl_cb_ident = ret;
ec409897 41 spin_unlock(&nn->nfs_client_lock);
d6870312
TH
42 idr_preload_end();
43 return ret < 0 ? ret : 0;
ec409897
BS
44}
45
46#ifdef CONFIG_NFS_V4_1
302fad7b 47/*
0e20162e
AA
48 * Per auth flavor data server rpc clients
49 */
50struct nfs4_ds_server {
51 struct list_head list; /* ds_clp->cl_ds_clients */
52 struct rpc_clnt *rpc_clnt;
53};
54
55/**
302fad7b
TM
56 * nfs4_find_ds_client - Common lookup case for DS I/O
57 * @ds_clp: pointer to the DS's nfs_client
58 * @flavor: rpc auth flavour to match
0e20162e
AA
59 */
60static struct nfs4_ds_server *
61nfs4_find_ds_client(struct nfs_client *ds_clp, rpc_authflavor_t flavor)
62{
63 struct nfs4_ds_server *dss;
64
65 rcu_read_lock();
66 list_for_each_entry_rcu(dss, &ds_clp->cl_ds_clients, list) {
67 if (dss->rpc_clnt->cl_auth->au_flavor != flavor)
68 continue;
69 goto out;
70 }
71 dss = NULL;
72out:
73 rcu_read_unlock();
74 return dss;
75}
76
77static struct nfs4_ds_server *
78nfs4_add_ds_client(struct nfs_client *ds_clp, rpc_authflavor_t flavor,
79 struct nfs4_ds_server *new)
80{
81 struct nfs4_ds_server *dss;
82
83 spin_lock(&ds_clp->cl_lock);
84 list_for_each_entry(dss, &ds_clp->cl_ds_clients, list) {
85 if (dss->rpc_clnt->cl_auth->au_flavor != flavor)
86 continue;
87 goto out;
88 }
89 if (new)
90 list_add_rcu(&new->list, &ds_clp->cl_ds_clients);
91 dss = new;
92out:
93 spin_unlock(&ds_clp->cl_lock); /* need some lock to protect list */
94 return dss;
95}
96
97static struct nfs4_ds_server *
98nfs4_alloc_ds_server(struct nfs_client *ds_clp, rpc_authflavor_t flavor)
99{
100 struct nfs4_ds_server *dss;
101
102 dss = kmalloc(sizeof(*dss), GFP_NOFS);
103 if (dss == NULL)
104 return ERR_PTR(-ENOMEM);
105
106 dss->rpc_clnt = rpc_clone_client_set_auth(ds_clp->cl_rpcclient, flavor);
107 if (IS_ERR(dss->rpc_clnt)) {
108 int err = PTR_ERR(dss->rpc_clnt);
109 kfree (dss);
110 return ERR_PTR(err);
111 }
112 INIT_LIST_HEAD(&dss->list);
113
114 return dss;
115}
116
117static void
118nfs4_free_ds_server(struct nfs4_ds_server *dss)
119{
120 rpc_release_client(dss->rpc_clnt);
121 kfree(dss);
122}
123
124/**
302fad7b
TM
125 * nfs4_find_or_create_ds_client - Find or create a DS rpc client
126 * @ds_clp: pointer to the DS's nfs_client
127 * @inode: pointer to the inode
128 *
129 * Find or create a DS rpc client with th MDS server rpc client auth flavor
130 * in the nfs_client cl_ds_clients list.
131 */
0e20162e
AA
132struct rpc_clnt *
133nfs4_find_or_create_ds_client(struct nfs_client *ds_clp, struct inode *inode)
134{
135 struct nfs4_ds_server *dss, *new;
136 rpc_authflavor_t flavor = NFS_SERVER(inode)->client->cl_auth->au_flavor;
137
138 dss = nfs4_find_ds_client(ds_clp, flavor);
139 if (dss != NULL)
140 goto out;
141 new = nfs4_alloc_ds_server(ds_clp, flavor);
142 if (IS_ERR(new))
143 return ERR_CAST(new);
144 dss = nfs4_add_ds_client(ds_clp, flavor, new);
145 if (dss != new)
146 nfs4_free_ds_server(new);
147out:
148 return dss->rpc_clnt;
149}
150EXPORT_SYMBOL_GPL(nfs4_find_or_create_ds_client);
151
152static void
153nfs4_shutdown_ds_clients(struct nfs_client *clp)
154{
155 struct nfs4_ds_server *dss;
0e20162e
AA
156
157 while (!list_empty(&clp->cl_ds_clients)) {
158 dss = list_entry(clp->cl_ds_clients.next,
159 struct nfs4_ds_server, list);
160 list_del(&dss->list);
161 rpc_shutdown_client(dss->rpc_clnt);
162 kfree (dss);
163 }
164}
165
bc0c9079
OK
166static void
167nfs4_cleanup_callback(struct nfs_client *clp)
168{
169 struct nfs4_copy_state *cp_state;
170
171 while (!list_empty(&clp->pending_cb_stateids)) {
172 cp_state = list_entry(clp->pending_cb_stateids.next,
173 struct nfs4_copy_state, copies);
174 list_del(&cp_state->copies);
175 kfree(cp_state);
176 }
177}
178
abf79bb3 179void nfs41_shutdown_client(struct nfs_client *clp)
ec409897
BS
180{
181 if (nfs4_has_session(clp)) {
bc0c9079 182 nfs4_cleanup_callback(clp);
0e20162e 183 nfs4_shutdown_ds_clients(clp);
ec409897
BS
184 nfs4_destroy_session(clp->cl_session);
185 nfs4_destroy_clientid(clp);
186 }
187
188}
abf79bb3
CL
189#endif /* CONFIG_NFS_V4_1 */
190
191void nfs40_shutdown_client(struct nfs_client *clp)
ec409897 192{
abf79bb3 193 if (clp->cl_slot_tbl) {
20b9a902 194 nfs4_shutdown_slot_table(clp->cl_slot_tbl);
abf79bb3
CL
195 kfree(clp->cl_slot_tbl);
196 }
ec409897 197}
ec409897
BS
198
199struct nfs_client *nfs4_alloc_client(const struct nfs_client_initdata *cl_init)
200{
dd99e9f9
TM
201 char buf[INET6_ADDRSTRLEN + 1];
202 const char *ip_addr = cl_init->ip_addr;
ec409897 203 struct nfs_client *clp = nfs_alloc_client(cl_init);
dd99e9f9
TM
204 int err;
205
ec409897
BS
206 if (IS_ERR(clp))
207 return clp;
208
209 err = nfs_get_cb_ident_idr(clp, cl_init->minorversion);
210 if (err)
211 goto error;
212
42c2c424
SD
213 if (cl_init->minorversion > NFS4_MAX_MINOR_VERSION) {
214 err = -EINVAL;
215 goto error;
216 }
217
ec409897
BS
218 spin_lock_init(&clp->cl_lock);
219 INIT_DELAYED_WORK(&clp->cl_renewd, nfs4_renew_state);
0e20162e 220 INIT_LIST_HEAD(&clp->cl_ds_clients);
ec409897
BS
221 rpc_init_wait_queue(&clp->cl_rpcwaitq, "NFS client");
222 clp->cl_state = 1 << NFS4CLNT_LEASE_EXPIRED;
ec409897 223 clp->cl_mvops = nfs_v4_minor_ops[cl_init->minorversion];
c9fdeb28 224 clp->cl_mig_gen = 1;
a1d617d8
JL
225#if IS_ENABLED(CONFIG_NFS_V4_1)
226 init_waitqueue_head(&clp->cl_lock_waitq);
227#endif
bc0c9079 228 INIT_LIST_HEAD(&clp->pending_cb_stateids);
dd99e9f9
TM
229
230 if (cl_init->minorversion != 0)
231 __set_bit(NFS_CS_INFINITE_SLOTS, &clp->cl_flags);
232 __set_bit(NFS_CS_DISCRTRY, &clp->cl_flags);
233 __set_bit(NFS_CS_NO_RETRANS_TIMEOUT, &clp->cl_flags);
234
51d674a5
OK
235 if (test_bit(NFS_CS_DS, &cl_init->init_flags))
236 __set_bit(NFS_CS_DS, &clp->cl_flags);
dd99e9f9
TM
237 /*
238 * Set up the connection to the server before we add add to the
239 * global list.
240 */
241 err = nfs_create_rpc_client(clp, cl_init, RPC_AUTH_GSS_KRB5I);
242 if (err == -EINVAL)
243 err = nfs_create_rpc_client(clp, cl_init, RPC_AUTH_UNIX);
244 if (err < 0)
245 goto error;
246
247 /* If no clientaddr= option was specified, find a usable cb address */
248 if (ip_addr == NULL) {
249 struct sockaddr_storage cb_addr;
250 struct sockaddr *sap = (struct sockaddr *)&cb_addr;
251
252 err = rpc_localaddr(clp->cl_rpcclient, sap, sizeof(cb_addr));
253 if (err < 0)
254 goto error;
255 err = rpc_ntop(sap, buf, sizeof(buf));
256 if (err < 0)
257 goto error;
258 ip_addr = (const char *)buf;
259 }
0dd7439f 260 strscpy(clp->cl_ipaddr, ip_addr, sizeof(clp->cl_ipaddr));
dd99e9f9
TM
261
262 err = nfs_idmap_new(clp);
263 if (err < 0) {
264 dprintk("%s: failed to create idmapper. Error = %d\n",
265 __func__, err);
266 goto error;
267 }
268 __set_bit(NFS_CS_IDMAP, &clp->cl_res_state);
ec409897
BS
269 return clp;
270
271error:
7653f6ff 272 nfs_free_client(clp);
ec409897
BS
273 return ERR_PTR(err);
274}
275
276/*
277 * Destroy the NFS4 callback service
278 */
279static void nfs4_destroy_callback(struct nfs_client *clp)
280{
281 if (__test_and_clear_bit(NFS_CS_CALLBACK, &clp->cl_res_state))
c946556b 282 nfs_callback_down(clp->cl_mvops->minor_version, clp->cl_net);
ec409897
BS
283}
284
285static void nfs4_shutdown_client(struct nfs_client *clp)
286{
287 if (__test_and_clear_bit(NFS_CS_RENEWD, &clp->cl_res_state))
288 nfs4_kill_renewd(clp);
abf79bb3 289 clp->cl_mvops->shutdown_client(clp);
ec409897
BS
290 nfs4_destroy_callback(clp);
291 if (__test_and_clear_bit(NFS_CS_IDMAP, &clp->cl_res_state))
292 nfs_idmap_delete(clp);
293
294 rpc_destroy_wait_queue(&clp->cl_rpcwaitq);
295 kfree(clp->cl_serverowner);
296 kfree(clp->cl_serverscope);
297 kfree(clp->cl_implid);
ceb3a16c 298 kfree(clp->cl_owner_id);
ec409897
BS
299}
300
301void nfs4_free_client(struct nfs_client *clp)
302{
303 nfs4_shutdown_client(clp);
304 nfs_free_client(clp);
305}
306
428360d7
BS
307/*
308 * Initialize the NFS4 callback service
309 */
310static int nfs4_init_callback(struct nfs_client *clp)
311{
c2ef47b7 312 struct rpc_xprt *xprt;
428360d7
BS
313 int error;
314
c2ef47b7 315 xprt = rcu_dereference_raw(clp->cl_rpcclient->cl_xprt);
428360d7 316
c2ef47b7
CL
317 if (nfs4_has_session(clp)) {
318 error = xprt_setup_backchannel(xprt, NFS41_BC_MIN_CALLBACKS);
319 if (error < 0)
428360d7 320 return error;
428360d7 321 }
c2ef47b7
CL
322
323 error = nfs_callback_up(clp->cl_mvops->minor_version, xprt);
324 if (error < 0) {
325 dprintk("%s: failed to start callback. Error = %d\n",
326 __func__, error);
327 return error;
328 }
329 __set_bit(NFS_CS_CALLBACK, &clp->cl_res_state);
330
428360d7
BS
331 return 0;
332}
333
abf79bb3
CL
334/**
335 * nfs40_init_client - nfs_client initialization tasks for NFSv4.0
302fad7b 336 * @clp: nfs_client to initialize
abf79bb3
CL
337 *
338 * Returns zero on success, or a negative errno if some error occurred.
339 */
340int nfs40_init_client(struct nfs_client *clp)
341{
342 struct nfs4_slot_table *tbl;
343 int ret;
344
345 tbl = kzalloc(sizeof(*tbl), GFP_NOFS);
346 if (tbl == NULL)
347 return -ENOMEM;
348
349 ret = nfs4_setup_slot_table(tbl, NFS4_MAX_SLOT_TABLE,
350 "NFSv4.0 transport Slot table");
351 if (ret) {
7e843672 352 nfs4_shutdown_slot_table(tbl);
abf79bb3
CL
353 kfree(tbl);
354 return ret;
355 }
356
357 clp->cl_slot_tbl = tbl;
358 return 0;
359}
360
361#if defined(CONFIG_NFS_V4_1)
362
363/**
364 * nfs41_init_client - nfs_client initialization tasks for NFSv4.1+
302fad7b 365 * @clp: nfs_client to initialize
abf79bb3
CL
366 *
367 * Returns zero on success, or a negative errno if some error occurred.
368 */
369int nfs41_init_client(struct nfs_client *clp)
370{
371 struct nfs4_session *session = NULL;
372
373 /*
374 * Create the session and mark it expired.
375 * When a SEQUENCE operation encounters the expired session
376 * it will do session recovery to initialize it.
377 */
378 session = nfs4_alloc_session(clp);
379 if (!session)
380 return -ENOMEM;
381
382 clp->cl_session = session;
383
384 /*
385 * The create session reply races with the server back
386 * channel probe. Mark the client NFS_CS_SESSION_INITING
387 * so that the client back channel can find the
388 * nfs_client struct
389 */
390 nfs_mark_client_ready(clp, NFS_CS_SESSION_INITING);
391 return 0;
392}
393
394#endif /* CONFIG_NFS_V4_1 */
395
428360d7
BS
396/*
397 * Initialize the minor version specific parts of an NFS4 client record
398 */
399static int nfs4_init_client_minor_version(struct nfs_client *clp)
400{
abf79bb3 401 int ret;
428360d7 402
abf79bb3
CL
403 ret = clp->cl_mvops->init_client(clp);
404 if (ret)
405 return ret;
428360d7
BS
406 return nfs4_init_callback(clp);
407}
408
2a7a451a
OK
409static void nfs4_add_trunk(struct nfs_client *clp, struct nfs_client *old)
410{
411 struct sockaddr_storage clp_addr, old_addr;
412 struct sockaddr *clp_sap = (struct sockaddr *)&clp_addr;
413 struct sockaddr *old_sap = (struct sockaddr *)&old_addr;
414 size_t clp_salen;
415 struct xprt_create xprt_args = {
416 .ident = old->cl_proto,
417 .net = old->cl_net,
418 .servername = old->cl_hostname,
419 };
806a3bc4
OK
420 int max_connect = test_bit(NFS_CS_PNFS, &clp->cl_flags) ?
421 clp->cl_max_connect : old->cl_max_connect;
2a7a451a
OK
422
423 if (clp->cl_proto != old->cl_proto)
424 return;
425 clp_salen = rpc_peeraddr(clp->cl_rpcclient, clp_sap, sizeof(clp_addr));
426 rpc_peeraddr(old->cl_rpcclient, old_sap, sizeof(old_addr));
427
428 if (clp_addr.ss_family != old_addr.ss_family)
429 return;
430
431 xprt_args.dstaddr = clp_sap;
432 xprt_args.addrlen = clp_salen;
433
434 rpc_clnt_add_xprt(old->cl_rpcclient, &xprt_args,
806a3bc4 435 rpc_clnt_test_and_add_xprt, &max_connect);
2a7a451a
OK
436}
437
428360d7
BS
438/**
439 * nfs4_init_client - Initialise an NFS4 client record
440 *
441 * @clp: nfs_client to initialise
302fad7b 442 * @cl_init: pointer to nfs_client_initdata
428360d7
BS
443 *
444 * Returns pointer to an NFS client, or an ERR_PTR value.
445 */
446struct nfs_client *nfs4_init_client(struct nfs_client *clp,
5c6e5b60 447 const struct nfs_client_initdata *cl_init)
428360d7 448{
05f4c350 449 struct nfs_client *old;
428360d7
BS
450 int error;
451
4fe6b366 452 if (clp->cl_cons_state == NFS_CS_READY)
428360d7 453 /* the client is initialised already */
428360d7 454 return clp;
428360d7 455
428360d7
BS
456 error = nfs4_init_client_minor_version(clp);
457 if (error < 0)
458 goto error;
459
05f4c350
CL
460 error = nfs4_discover_server_trunking(clp, &old);
461 if (error < 0)
462 goto error;
05f4c350 463
c156618e 464 if (clp != old) {
abad2fa5 465 clp->cl_preserve_clid = true;
c156618e
SM
466 /*
467 * Mark the client as having failed initialization so other
468 * processes walking the nfs_client_list in nfs_match_client()
469 * won't try to use it.
470 */
471 nfs_mark_client_ready(clp, -EPERM);
2a7a451a
OK
472 if (old->cl_mvops->session_trunk)
473 nfs4_add_trunk(clp, old);
c156618e 474 }
8dcbec6d 475 clear_bit(NFS_CS_TSM_POSSIBLE, &clp->cl_flags);
476bdb04 476 nfs_put_client(clp);
abad2fa5 477 return old;
428360d7
BS
478
479error:
480 nfs_mark_client_ready(clp, error);
481 nfs_put_client(clp);
428360d7
BS
482 return ERR_PTR(error);
483}
fcf10398 484
05f4c350
CL
485/*
486 * SETCLIENTID just did a callback update with the callback ident in
487 * "drop," but server trunking discovery claims "drop" and "keep" are
488 * actually the same server. Swap the callback IDs so that "keep"
489 * will continue to use the callback ident the server now knows about,
490 * and so that "keep"'s original callback ident is destroyed when
491 * "drop" is freed.
492 */
493static void nfs4_swap_callback_idents(struct nfs_client *keep,
494 struct nfs_client *drop)
495{
496 struct nfs_net *nn = net_generic(keep->cl_net, nfs_net_id);
497 unsigned int save = keep->cl_cb_ident;
498
499 if (keep->cl_cb_ident == drop->cl_cb_ident)
500 return;
501
502 dprintk("%s: keeping callback ident %u and dropping ident %u\n",
503 __func__, keep->cl_cb_ident, drop->cl_cb_ident);
504
505 spin_lock(&nn->nfs_client_lock);
506
507 idr_replace(&nn->cb_ident_idr, keep, drop->cl_cb_ident);
508 keep->cl_cb_ident = drop->cl_cb_ident;
509
510 idr_replace(&nn->cb_ident_idr, drop, save);
511 drop->cl_cb_ident = save;
512
513 spin_unlock(&nn->nfs_client_lock);
514}
515
55b9df93
TM
516static bool nfs4_match_client_owner_id(const struct nfs_client *clp1,
517 const struct nfs_client *clp2)
518{
519 if (clp1->cl_owner_id == NULL || clp2->cl_owner_id == NULL)
520 return true;
521 return strcmp(clp1->cl_owner_id, clp2->cl_owner_id) == 0;
522}
523
ced85a75
BF
524static bool nfs4_same_verifier(nfs4_verifier *v1, nfs4_verifier *v2)
525{
526 return memcmp(v1->data, v2->data, sizeof(v1->data)) == 0;
527}
528
14d1bbb0
AS
529static int nfs4_match_client(struct nfs_client *pos, struct nfs_client *new,
530 struct nfs_client **prev, struct nfs_net *nn)
531{
532 int status;
533
534 if (pos->rpc_ops != new->rpc_ops)
535 return 1;
536
537 if (pos->cl_minorversion != new->cl_minorversion)
538 return 1;
539
540 /* If "pos" isn't marked ready, we can't trust the
541 * remaining fields in "pos", especially the client
542 * ID and serverowner fields. Wait for CREATE_SESSION
543 * to finish. */
544 if (pos->cl_cons_state > NFS_CS_READY) {
212bf41d 545 refcount_inc(&pos->cl_count);
14d1bbb0
AS
546 spin_unlock(&nn->nfs_client_lock);
547
548 nfs_put_client(*prev);
549 *prev = pos;
550
551 status = nfs_wait_client_init_complete(pos);
552 spin_lock(&nn->nfs_client_lock);
553
554 if (status < 0)
555 return status;
556 }
557
558 if (pos->cl_cons_state != NFS_CS_READY)
559 return 1;
560
561 if (pos->cl_clientid != new->cl_clientid)
562 return 1;
563
564 /* NFSv4.1 always uses the uniform string, however someone
565 * might switch the uniquifier string on us.
566 */
567 if (!nfs4_match_client_owner_id(pos, new))
568 return 1;
569
570 return 0;
571}
572
05f4c350
CL
573/**
574 * nfs40_walk_client_list - Find server that recognizes a client ID
575 *
576 * @new: nfs_client with client ID to test
577 * @result: OUT: found nfs_client, or new
578 * @cred: credential to use for trunking test
579 *
580 * Returns zero, a negative errno, or a negative NFS4ERR status.
581 * If zero is returned, an nfs_client pointer is planted in "result."
582 *
583 * NB: nfs40_walk_client_list() relies on the new nfs_client being
584 * the last nfs_client on the list.
585 */
586int nfs40_walk_client_list(struct nfs_client *new,
587 struct nfs_client **result,
a52458b4 588 const struct cred *cred)
05f4c350
CL
589{
590 struct nfs_net *nn = net_generic(new->cl_net, nfs_net_id);
7b1f1fd1 591 struct nfs_client *pos, *prev = NULL;
05f4c350
CL
592 struct nfs4_setclientid_res clid = {
593 .clientid = new->cl_clientid,
594 .confirm = new->cl_confirm,
595 };
4ae19c2d 596 int status = -NFS4ERR_STALE_CLIENTID;
05f4c350
CL
597
598 spin_lock(&nn->nfs_client_lock);
7b1f1fd1 599 list_for_each_entry(pos, &nn->nfs_client_list, cl_share_link) {
080af20c 600
c156618e
SM
601 if (pos == new)
602 goto found;
603
14d1bbb0
AS
604 status = nfs4_match_client(pos, new, &prev, nn);
605 if (status < 0)
606 goto out_unlock;
607 if (status != 0)
55b9df93 608 continue;
ced85a75
BF
609 /*
610 * We just sent a new SETCLIENTID, which should have
611 * caused the server to return a new cl_confirm. So if
612 * cl_confirm is the same, then this is a different
613 * server that just returned the same cl_confirm by
614 * coincidence:
615 */
616 if ((new != pos) && nfs4_same_verifier(&pos->cl_confirm,
617 &new->cl_confirm))
618 continue;
619 /*
620 * But if the cl_confirm's are different, then the only
621 * way that a SETCLIENTID_CONFIRM to pos can succeed is
622 * if new and pos point to the same server:
623 */
c156618e 624found:
212bf41d 625 refcount_inc(&pos->cl_count);
05f4c350
CL
626 spin_unlock(&nn->nfs_client_lock);
627
fe0bf118 628 nfs_put_client(prev);
4ae19c2d 629 prev = pos;
05f4c350
CL
630
631 status = nfs4_proc_setclientid_confirm(pos, &clid, cred);
4ae19c2d
TM
632 switch (status) {
633 case -NFS4ERR_STALE_CLIENTID:
634 break;
635 case 0:
05f4c350 636 nfs4_swap_callback_idents(pos, new);
ced85a75 637 pos->cl_confirm = new->cl_confirm;
c156618e 638 nfs_mark_client_ready(pos, NFS_CS_READY);
05f4c350 639
4ae19c2d 640 prev = NULL;
05f4c350 641 *result = pos;
f9b7ebdf
TM
642 goto out;
643 case -ERESTARTSYS:
644 case -ETIMEDOUT:
645 /* The callback path may have been inadvertently
646 * changed. Schedule recovery!
647 */
648 nfs4_schedule_path_down_recovery(pos);
ffb81717 649 goto out;
4ae19c2d
TM
650 default:
651 goto out;
05f4c350
CL
652 }
653
654 spin_lock(&nn->nfs_client_lock);
05f4c350 655 }
14d1bbb0 656out_unlock:
4ae19c2d 657 spin_unlock(&nn->nfs_client_lock);
05f4c350 658
202c312d 659 /* No match found. The server lost our clientid */
4ae19c2d 660out:
fe0bf118 661 nfs_put_client(prev);
4ae19c2d 662 return status;
05f4c350
CL
663}
664
665#ifdef CONFIG_NFS_V4_1
666/*
1fc0703a 667 * Returns true if the server major ids match
05f4c350 668 */
0491567b 669bool
e7b7cbf6
AA
670nfs4_check_serverowner_major_id(struct nfs41_server_owner *o1,
671 struct nfs41_server_owner *o2)
05f4c350 672{
05f4c350 673 if (o1->major_id_sz != o2->major_id_sz)
ddfa0d48
AS
674 return false;
675 return memcmp(o1->major_id, o2->major_id, o1->major_id_sz) == 0;
05f4c350
CL
676}
677
ba84db96
AA
678/*
679 * Returns true if the server scopes match
680 */
681static bool
682nfs4_check_server_scope(struct nfs41_server_scope *s1,
683 struct nfs41_server_scope *s2)
684{
685 if (s1->server_scope_sz != s2->server_scope_sz)
8da0f934
AS
686 return false;
687 return memcmp(s1->server_scope, s2->server_scope,
688 s1->server_scope_sz) == 0;
ba84db96
AA
689}
690
691/**
ad0849a7 692 * nfs4_detect_session_trunking - Checks for session trunking.
ba84db96
AA
693 * @clp: original mount nfs_client
694 * @res: result structure from an exchange_id using the original mount
695 * nfs_client with a new multi_addr transport
302fad7b
TM
696 * @xprt: pointer to the transport to add.
697 *
698 * Called after a successful EXCHANGE_ID on a multi-addr connection.
699 * Upon success, add the transport.
ba84db96
AA
700 *
701 * Returns zero on success, otherwise -EINVAL
702 *
703 * Note: since the exchange_id for the new multi_addr transport uses the
704 * same nfs_client from the original mount, the cl_owner_id is reused,
705 * so eir_clientowner is the same.
706 */
707int nfs4_detect_session_trunking(struct nfs_client *clp,
708 struct nfs41_exchange_id_res *res,
709 struct rpc_xprt *xprt)
710{
711 /* Check eir_clientid */
f251fd9e 712 if (clp->cl_clientid != res->clientid)
ba84db96
AA
713 goto out_err;
714
715 /* Check eir_server_owner so_major_id */
716 if (!nfs4_check_serverowner_major_id(clp->cl_serverowner,
717 res->server_owner))
718 goto out_err;
719
720 /* Check eir_server_owner so_minor_id */
5b6d3ff6 721 if (clp->cl_serverowner->minor_id != res->server_owner->minor_id)
ba84db96
AA
722 goto out_err;
723
724 /* Check eir_server_scope */
725 if (!nfs4_check_server_scope(clp->cl_serverscope, res->server_scope))
726 goto out_err;
727
728 pr_info("NFS: %s: Session trunking succeeded for %s\n",
729 clp->cl_hostname,
730 xprt->address_strings[RPC_DISPLAY_ADDR]);
731
732 return 0;
733out_err:
734 pr_info("NFS: %s: Session trunking failed for %s\n", clp->cl_hostname,
735 xprt->address_strings[RPC_DISPLAY_ADDR]);
736
737 return -EINVAL;
738}
739
05f4c350
CL
740/**
741 * nfs41_walk_client_list - Find nfs_client that matches a client/server owner
742 *
743 * @new: nfs_client with client ID to test
744 * @result: OUT: found nfs_client, or new
745 * @cred: credential to use for trunking test
746 *
747 * Returns zero, a negative errno, or a negative NFS4ERR status.
748 * If zero is returned, an nfs_client pointer is planted in "result."
749 *
750 * NB: nfs41_walk_client_list() relies on the new nfs_client being
751 * the last nfs_client on the list.
752 */
753int nfs41_walk_client_list(struct nfs_client *new,
754 struct nfs_client **result,
a52458b4 755 const struct cred *cred)
05f4c350
CL
756{
757 struct nfs_net *nn = net_generic(new->cl_net, nfs_net_id);
7b1f1fd1 758 struct nfs_client *pos, *prev = NULL;
202c312d 759 int status = -NFS4ERR_STALE_CLIENTID;
05f4c350
CL
760
761 spin_lock(&nn->nfs_client_lock);
7b1f1fd1 762 list_for_each_entry(pos, &nn->nfs_client_list, cl_share_link) {
080af20c 763
48d66b97
TM
764 if (pos == new)
765 goto found;
766
14d1bbb0
AS
767 status = nfs4_match_client(pos, new, &prev, nn);
768 if (status < 0)
769 goto out;
770 if (status != 0)
05f4c350
CL
771 continue;
772
1fc0703a
TM
773 /*
774 * Note that session trunking is just a special subcase of
775 * client id trunking. In either case, we want to fall back
776 * to using the existing nfs_client.
777 */
e7b7cbf6
AA
778 if (!nfs4_check_serverowner_major_id(pos->cl_serverowner,
779 new->cl_serverowner))
05f4c350
CL
780 continue;
781
48d66b97 782found:
212bf41d 783 refcount_inc(&pos->cl_count);
7b1f1fd1 784 *result = pos;
eb04e0ac 785 status = 0;
7b1f1fd1 786 break;
05f4c350
CL
787 }
788
14d1bbb0 789out:
05f4c350 790 spin_unlock(&nn->nfs_client_lock);
fe0bf118 791 nfs_put_client(prev);
202c312d 792 return status;
05f4c350
CL
793}
794#endif /* CONFIG_NFS_V4_1 */
795
fcf10398
BS
796static void nfs4_destroy_server(struct nfs_server *server)
797{
c77e2283
TM
798 LIST_HEAD(freeme);
799
fcf10398
BS
800 nfs_server_return_all_delegations(server);
801 unset_pnfs_layoutdriver(server);
c77e2283
TM
802 nfs4_purge_state_owners(server, &freeme);
803 nfs4_free_state_owners(&freeme);
fcf10398
BS
804}
805
806/*
807 * NFSv4.0 callback thread helper
808 *
809 * Find a client by callback identifier
810 */
811struct nfs_client *
812nfs4_find_client_ident(struct net *net, int cb_ident)
813{
814 struct nfs_client *clp;
815 struct nfs_net *nn = net_generic(net, nfs_net_id);
816
817 spin_lock(&nn->nfs_client_lock);
818 clp = idr_find(&nn->cb_ident_idr, cb_ident);
819 if (clp)
212bf41d 820 refcount_inc(&clp->cl_count);
fcf10398
BS
821 spin_unlock(&nn->nfs_client_lock);
822 return clp;
823}
824
825#if defined(CONFIG_NFS_V4_1)
826/* Common match routine for v4.0 and v4.1 callback services */
827static bool nfs4_cb_match_client(const struct sockaddr *addr,
828 struct nfs_client *clp, u32 minorversion)
829{
830 struct sockaddr *clap = (struct sockaddr *)&clp->cl_addr;
831
832 /* Don't match clients that failed to initialise */
833 if (!(clp->cl_cons_state == NFS_CS_READY ||
834 clp->cl_cons_state == NFS_CS_SESSION_INITING))
835 return false;
836
837 smp_rmb();
838
839 /* Match the version and minorversion */
840 if (clp->rpc_ops->version != 4 ||
841 clp->cl_minorversion != minorversion)
842 return false;
843
844 /* Match only the IP address, not the port number */
d8efa4e6 845 return rpc_cmp_addr(addr, clap);
fcf10398
BS
846}
847
848/*
849 * NFSv4.1 callback thread helper
850 * For CB_COMPOUND calls, find a client by IP address, protocol version,
851 * minorversion, and sessionID
852 *
853 * Returns NULL if no such client
854 */
855struct nfs_client *
856nfs4_find_client_sessionid(struct net *net, const struct sockaddr *addr,
459de2ed 857 struct nfs4_sessionid *sid, u32 minorversion)
fcf10398
BS
858{
859 struct nfs_client *clp;
860 struct nfs_net *nn = net_generic(net, nfs_net_id);
861
862 spin_lock(&nn->nfs_client_lock);
863 list_for_each_entry(clp, &nn->nfs_client_list, cl_share_link) {
6089dd0d 864 if (!nfs4_cb_match_client(addr, clp, minorversion))
fcf10398
BS
865 continue;
866
867 if (!nfs4_has_session(clp))
868 continue;
869
870 /* Match sessionid*/
871 if (memcmp(clp->cl_session->sess_id.data,
872 sid->data, NFS4_MAX_SESSIONID_LEN) != 0)
873 continue;
874
212bf41d 875 refcount_inc(&clp->cl_count);
fcf10398
BS
876 spin_unlock(&nn->nfs_client_lock);
877 return clp;
878 }
879 spin_unlock(&nn->nfs_client_lock);
880 return NULL;
881}
882
883#else /* CONFIG_NFS_V4_1 */
884
885struct nfs_client *
886nfs4_find_client_sessionid(struct net *net, const struct sockaddr *addr,
459de2ed 887 struct nfs4_sessionid *sid, u32 minorversion)
fcf10398
BS
888{
889 return NULL;
890}
891#endif /* CONFIG_NFS_V4_1 */
892
893/*
894 * Set up an NFS4 client
895 */
896static int nfs4_set_client(struct nfs_server *server,
897 const char *hostname,
cf0d7e7f 898 const struct sockaddr_storage *addr,
fcf10398
BS
899 const size_t addrlen,
900 const char *ip_addr,
fcf10398 901 int proto, const struct rpc_timeout *timeparms,
6619079d 902 u32 minorversion, unsigned int nconnect,
7e134205 903 unsigned int max_connect,
6c0a8c5f
CL
904 struct net *net,
905 struct xprtsec_parms *xprtsec)
fcf10398
BS
906{
907 struct nfs_client_initdata cl_init = {
908 .hostname = hostname,
909 .addr = addr,
910 .addrlen = addrlen,
5c6e5b60 911 .ip_addr = ip_addr,
ab7017a3 912 .nfs_mod = &nfs_v4,
fcf10398
BS
913 .proto = proto,
914 .minorversion = minorversion,
915 .net = net,
5c6e5b60 916 .timeparms = timeparms,
1a58e8a0 917 .cred = server->cred,
6c0a8c5f 918 .xprtsec = *xprtsec,
fcf10398
BS
919 };
920 struct nfs_client *clp;
fcf10398 921
e6237b6f
TM
922 if (minorversion == 0)
923 __set_bit(NFS_CS_REUSEPORT, &cl_init.init_flags);
7e134205
OK
924 else
925 cl_init.max_connect = max_connect;
c8407f2e
CL
926 switch (proto) {
927 case XPRT_TRANSPORT_TCP:
928 case XPRT_TRANSPORT_TCP_TLS:
6619079d 929 cl_init.nconnect = nconnect;
c8407f2e 930 }
e6237b6f 931
fcf10398 932 if (server->flags & NFS_MOUNT_NORESVPORT)
d0372b67 933 __set_bit(NFS_CS_NORESVPORT, &cl_init.init_flags);
f112bb48 934 if (server->options & NFS_OPTION_MIGRATION)
d0372b67 935 __set_bit(NFS_CS_MIGRATION, &cl_init.init_flags);
8dcbec6d 936 if (test_bit(NFS_MIG_TSM_POSSIBLE, &server->mig_status))
d0372b67 937 __set_bit(NFS_CS_TSM_POSSIBLE, &cl_init.init_flags);
cf0d7e7f 938 server->port = rpc_get_port((struct sockaddr *)addr);
fcf10398
BS
939
940 /* Allocate or find a client reference we can use */
7d38de3f 941 clp = nfs_get_client(&cl_init);
2dc42c0d
AS
942 if (IS_ERR(clp))
943 return PTR_ERR(clp);
fcf10398 944
ad86f605
BB
945 if (server->nfs_client == clp) {
946 nfs_put_client(clp);
2dc42c0d 947 return -ELOOP;
ad86f605 948 }
52442f9b 949
fcf10398
BS
950 /*
951 * Query for the lease time on clientid setup or renewal
952 *
953 * Note that this will be set on nfs_clients that were created
954 * only for the DS role and did not set this bit, but now will
955 * serve a dual role.
956 */
957 set_bit(NFS_CS_CHECK_LEASE_TIME, &clp->cl_res_state);
958
959 server->nfs_client = clp;
1c725118 960 nfs_sysfs_add_server(server);
e13b5493 961 nfs_sysfs_link_rpc_client(server, clp->cl_rpcclient, "_state");
1c725118 962
fcf10398 963 return 0;
fcf10398
BS
964}
965
966/*
967 * Set up a pNFS Data Server client.
968 *
969 * Return any existing nfs_client that matches server address,port,version
970 * and minorversion.
971 *
972 * For a new nfs_client, use a soft mount (default), a low retrans and a
973 * low timeout interval so that if a connection is lost, we retry through
974 * the MDS.
975 */
3fc75f12 976struct nfs_client *nfs4_set_ds_client(struct nfs_server *mds_srv,
cf0d7e7f 977 const struct sockaddr_storage *ds_addr, int ds_addrlen,
064172f3 978 int ds_proto, unsigned int ds_timeo, unsigned int ds_retrans,
7d38de3f 979 u32 minor_version)
fcf10398 980{
5c6e5b60 981 struct rpc_timeout ds_timeout;
3fc75f12 982 struct nfs_client *mds_clp = mds_srv->nfs_client;
fcf10398
BS
983 struct nfs_client_initdata cl_init = {
984 .addr = ds_addr,
985 .addrlen = ds_addrlen,
5c6e5b60
TM
986 .nodename = mds_clp->cl_rpcclient->cl_nodename,
987 .ip_addr = mds_clp->cl_ipaddr,
ab7017a3 988 .nfs_mod = &nfs_v4,
fcf10398 989 .proto = ds_proto,
30626f9c 990 .minorversion = minor_version,
fcf10398 991 .net = mds_clp->cl_net,
5c6e5b60 992 .timeparms = &ds_timeout,
1a58e8a0 993 .cred = mds_srv->cred,
6c0a8c5f 994 .xprtsec = mds_srv->nfs_client->cl_xprtsec,
fcf10398 995 };
a363e32e
PT
996 char buf[INET6_ADDRSTRLEN + 1];
997
cf0d7e7f 998 if (rpc_ntop((struct sockaddr *)ds_addr, buf, sizeof(buf)) <= 0)
a363e32e
PT
999 return ERR_PTR(-EINVAL);
1000 cl_init.hostname = buf;
fcf10398 1001
c8407f2e
CL
1002 switch (ds_proto) {
1003 case XPRT_TRANSPORT_TCP:
1004 case XPRT_TRANSPORT_TCP_TLS:
1005 if (mds_clp->cl_nconnect > 1) {
1006 cl_init.nconnect = mds_clp->cl_nconnect;
1007 cl_init.max_connect = NFS_MAX_TRANSPORTS;
1008 }
7e134205 1009 }
bb71e4a5 1010
3fc75f12
TM
1011 if (mds_srv->flags & NFS_MOUNT_NORESVPORT)
1012 __set_bit(NFS_CS_NORESVPORT, &cl_init.init_flags);
1013
51d674a5 1014 __set_bit(NFS_CS_DS, &cl_init.init_flags);
806a3bc4
OK
1015 __set_bit(NFS_CS_PNFS, &cl_init.init_flags);
1016 cl_init.max_connect = NFS_MAX_TRANSPORTS;
fcf10398
BS
1017 /*
1018 * Set an authflavor equual to the MDS value. Use the MDS nfs_client
1019 * cl_ipaddr so as to use the same EXCHANGE_ID co_ownerid as the MDS
1020 * (section 13.1 RFC 5661).
1021 */
1022 nfs_init_timeout_values(&ds_timeout, ds_proto, ds_timeo, ds_retrans);
4fe6b366 1023 return nfs_get_client(&cl_init);
fcf10398
BS
1024}
1025EXPORT_SYMBOL_GPL(nfs4_set_ds_client);
1026
1027/*
1028 * Session has been established, and the client marked ready.
943cff67
TM
1029 * Limit the mount rsize, wsize and dtsize using negotiated fore
1030 * channel attributes.
fcf10398 1031 */
943cff67 1032static void nfs4_session_limit_rwsize(struct nfs_server *server)
fcf10398
BS
1033{
1034#ifdef CONFIG_NFS_V4_1
1035 struct nfs4_session *sess;
1036 u32 server_resp_sz;
1037 u32 server_rqst_sz;
1038
1039 if (!nfs4_has_session(server->nfs_client))
1040 return;
1041 sess = server->nfs_client->cl_session;
1042 server_resp_sz = sess->fc_attrs.max_resp_sz - nfs41_maxread_overhead;
1043 server_rqst_sz = sess->fc_attrs.max_rqst_sz - nfs41_maxwrite_overhead;
1044
943cff67
TM
1045 if (server->dtsize > server_resp_sz)
1046 server->dtsize = server_resp_sz;
1047 if (server->rsize > server_resp_sz)
fcf10398 1048 server->rsize = server_resp_sz;
943cff67 1049 if (server->wsize > server_rqst_sz)
fcf10398
BS
1050 server->wsize = server_rqst_sz;
1051#endif /* CONFIG_NFS_V4_1 */
1052}
1053
04a5da69
FL
1054/*
1055 * Limit xattr sizes using the channel attributes.
1056 */
1057static void nfs4_session_limit_xasize(struct nfs_server *server)
1058{
1059#ifdef CONFIG_NFS_V4_2
1060 struct nfs4_session *sess;
1061 u32 server_gxa_sz;
1062 u32 server_sxa_sz;
1063 u32 server_lxa_sz;
1064
1065 if (!nfs4_has_session(server->nfs_client))
1066 return;
1067
1068 sess = server->nfs_client->cl_session;
1069
1070 server_gxa_sz = sess->fc_attrs.max_resp_sz - nfs42_maxgetxattr_overhead;
1071 server_sxa_sz = sess->fc_attrs.max_rqst_sz - nfs42_maxsetxattr_overhead;
1072 server_lxa_sz = sess->fc_attrs.max_resp_sz -
1073 nfs42_maxlistxattrs_overhead;
1074
1075 if (server->gxasize > server_gxa_sz)
1076 server->gxasize = server_gxa_sz;
1077 if (server->sxasize > server_sxa_sz)
1078 server->sxasize = server_sxa_sz;
1079 if (server->lxasize > server_lxa_sz)
1080 server->lxasize = server_lxa_sz;
1081#endif
1082}
1083
01dde76e
AS
1084void nfs4_server_set_init_caps(struct nfs_server *server)
1085{
1086 /* Set the basic capabilities */
1087 server->caps |= server->nfs_client->cl_mvops->init_caps;
1088 if (server->flags & NFS_MOUNT_NORDIRPLUS)
1089 server->caps &= ~NFS_CAP_READDIRPLUS;
1090 if (server->nfs_client->cl_proto == XPRT_TRANSPORT_RDMA)
1091 server->caps &= ~NFS_CAP_READ_PLUS;
1092
1093 /*
1094 * Don't use NFS uid/gid mapping if we're using AUTH_SYS or lower
1095 * authentication.
1096 */
1097 if (nfs4_disable_idmapping &&
1098 server->client->cl_auth->au_flavor == RPC_AUTH_UNIX)
1099 server->caps |= NFS_CAP_UIDGID_NOMAP;
1100}
1101
fcf10398 1102static int nfs4_server_common_setup(struct nfs_server *server,
5e6b1990 1103 struct nfs_fh *mntfh, bool auth_probe)
fcf10398 1104{
fcf10398
BS
1105 int error;
1106
fcf10398
BS
1107 /* data servers support only a subset of NFSv4.1 */
1108 if (is_ds_only_client(server->nfs_client))
1109 return -EPROTONOSUPPORT;
1110
fcf10398 1111 /* We must ensure the session is initialised first */
18aad3d5 1112 error = nfs4_init_session(server->nfs_client);
fcf10398
BS
1113 if (error < 0)
1114 goto out;
1115
01dde76e 1116 nfs4_server_set_init_caps(server);
39c6daae 1117
fcf10398 1118 /* Probe the root fh to retrieve its FSID and filehandle */
5e6b1990 1119 error = nfs4_get_rootfh(server, mntfh, auth_probe);
fcf10398
BS
1120 if (error < 0)
1121 goto out;
1122
1123 dprintk("Server FSID: %llx:%llx\n",
1124 (unsigned long long) server->fsid.major,
1125 (unsigned long long) server->fsid.minor);
9e6ee76d 1126 nfs_display_fhandle(mntfh, "Pseudo-fs root FH");
fcf10398 1127
4d4cf8d2 1128 error = nfs_probe_server(server, mntfh);
fcf10398
BS
1129 if (error < 0)
1130 goto out;
1131
943cff67 1132 nfs4_session_limit_rwsize(server);
04a5da69 1133 nfs4_session_limit_xasize(server);
943cff67 1134
fcf10398
BS
1135 if (server->namelen == 0 || server->namelen > NFS4_MAXNAMLEN)
1136 server->namelen = NFS4_MAXNAMLEN;
1137
1138 nfs_server_insert_lists(server);
1139 server->mount_time = jiffies;
1140 server->destroy = nfs4_destroy_server;
1141out:
fcf10398
BS
1142 return error;
1143}
1144
1145/*
1146 * Create a version 4 volume record
1147 */
62a55d08 1148static int nfs4_init_server(struct nfs_server *server, struct fs_context *fc)
fcf10398 1149{
62a55d08 1150 struct nfs_fs_context *ctx = nfs_fc2context(fc);
fcf10398
BS
1151 struct rpc_timeout timeparms;
1152 int error;
1153
5eb005ca
DH
1154 nfs_init_timeout_values(&timeparms, ctx->nfs_server.protocol,
1155 ctx->timeo, ctx->retrans);
fcf10398
BS
1156
1157 /* Initialise the client representation from the mount data */
5eb005ca
DH
1158 server->flags = ctx->flags;
1159 server->options = ctx->options;
1160 server->auth_info = ctx->auth_info;
fcf10398 1161
4d4b69dd
WAA
1162 /* Use the first specified auth flavor. If this flavor isn't
1163 * allowed by the server, use the SECINFO path to try the
1164 * other specified flavors */
5eb005ca
DH
1165 if (ctx->auth_info.flavor_len >= 1)
1166 ctx->selected_flavor = ctx->auth_info.flavors[0];
a3f73c27 1167 else
5eb005ca 1168 ctx->selected_flavor = RPC_AUTH_UNIX;
5e6b1990 1169
fcf10398
BS
1170 /* Get a client record */
1171 error = nfs4_set_client(server,
62a55d08 1172 ctx->nfs_server.hostname,
cf0d7e7f 1173 &ctx->nfs_server._address,
62a55d08
SM
1174 ctx->nfs_server.addrlen,
1175 ctx->client_address,
1176 ctx->nfs_server.protocol,
1177 &timeparms,
1178 ctx->minorversion,
1179 ctx->nfs_server.nconnect,
7e134205 1180 ctx->nfs_server.max_connect,
6c0a8c5f 1181 fc->net_ns,
c8407f2e 1182 &ctx->xprtsec);
fcf10398 1183 if (error < 0)
1073d9b4 1184 return error;
fcf10398 1185
5eb005ca 1186 if (ctx->rsize)
940261a1 1187 server->rsize = nfs_io_size(ctx->rsize, server->nfs_client->cl_proto);
5eb005ca 1188 if (ctx->wsize)
940261a1 1189 server->wsize = nfs_io_size(ctx->wsize, server->nfs_client->cl_proto);
fcf10398 1190
5eb005ca
DH
1191 server->acregmin = ctx->acregmin * HZ;
1192 server->acregmax = ctx->acregmax * HZ;
1193 server->acdirmin = ctx->acdirmin * HZ;
1194 server->acdirmax = ctx->acdirmax * HZ;
1195 server->port = ctx->nfs_server.port;
fcf10398 1196
1073d9b4 1197 return nfs_init_server_rpcclient(server, &timeparms,
5eb005ca 1198 ctx->selected_flavor);
fcf10398
BS
1199}
1200
1201/*
1202 * Create a version 4 volume record
1203 * - keyed on server and FSID
1204 */
62a55d08 1205struct nfs_server *nfs4_create_server(struct fs_context *fc)
fcf10398 1206{
62a55d08 1207 struct nfs_fs_context *ctx = nfs_fc2context(fc);
fcf10398 1208 struct nfs_server *server;
5e6b1990 1209 bool auth_probe;
fcf10398
BS
1210 int error;
1211
fcf10398
BS
1212 server = nfs_alloc_server();
1213 if (!server)
1214 return ERR_PTR(-ENOMEM);
1215
d3ff46fe 1216 server->cred = get_cred(fc->cred);
1a58e8a0 1217
62a55d08 1218 auth_probe = ctx->auth_info.flavor_len < 1;
5e6b1990 1219
fcf10398 1220 /* set up the general RPC client */
62a55d08 1221 error = nfs4_init_server(server, fc);
fcf10398
BS
1222 if (error < 0)
1223 goto error;
1224
62a55d08 1225 error = nfs4_server_common_setup(server, ctx->mntfh, auth_probe);
fcf10398
BS
1226 if (error < 0)
1227 goto error;
1228
fcf10398
BS
1229 return server;
1230
1231error:
1232 nfs_free_server(server);
fcf10398
BS
1233 return ERR_PTR(error);
1234}
1235
1236/*
1237 * Create an NFS4 referral server record
1238 */
62a55d08 1239struct nfs_server *nfs4_create_referral_server(struct fs_context *fc)
fcf10398 1240{
62a55d08 1241 struct nfs_fs_context *ctx = nfs_fc2context(fc);
fcf10398
BS
1242 struct nfs_client *parent_client;
1243 struct nfs_server *server, *parent_server;
c8407f2e 1244 int proto, error;
5837f6df 1245 bool auth_probe;
fcf10398 1246
fcf10398
BS
1247 server = nfs_alloc_server();
1248 if (!server)
1249 return ERR_PTR(-ENOMEM);
1250
62a55d08 1251 parent_server = NFS_SB(ctx->clone_data.sb);
fcf10398
BS
1252 parent_client = parent_server->nfs_client;
1253
1a58e8a0
TM
1254 server->cred = get_cred(parent_server->cred);
1255
fcf10398
BS
1256 /* Initialise the client representation from the parent server */
1257 nfs_server_copy_userdata(server, parent_server);
fcf10398 1258
530ea421 1259 /* Get a client representation */
23a88ade 1260#if IS_ENABLED(CONFIG_SUNRPC_XPRT_RDMA)
62a55d08
SM
1261 rpc_set_port(&ctx->nfs_server.address, NFS_RDMA_PORT);
1262 error = nfs4_set_client(server,
1263 ctx->nfs_server.hostname,
cf0d7e7f 1264 &ctx->nfs_server._address,
62a55d08 1265 ctx->nfs_server.addrlen,
fcf10398 1266 parent_client->cl_ipaddr,
530ea421
CL
1267 XPRT_TRANSPORT_RDMA,
1268 parent_server->client->cl_timeout,
1269 parent_client->cl_mvops->minor_version,
6619079d 1270 parent_client->cl_nconnect,
7e134205 1271 parent_client->cl_max_connect,
6c0a8c5f
CL
1272 parent_client->cl_net,
1273 &parent_client->cl_xprtsec);
530ea421
CL
1274 if (!error)
1275 goto init_server;
23a88ade 1276#endif /* IS_ENABLED(CONFIG_SUNRPC_XPRT_RDMA) */
530ea421 1277
c8407f2e
CL
1278 proto = XPRT_TRANSPORT_TCP;
1279 if (parent_client->cl_xprtsec.policy != RPC_XPRTSEC_NONE)
1280 proto = XPRT_TRANSPORT_TCP_TLS;
62a55d08
SM
1281 rpc_set_port(&ctx->nfs_server.address, NFS_PORT);
1282 error = nfs4_set_client(server,
1283 ctx->nfs_server.hostname,
cf0d7e7f 1284 &ctx->nfs_server._address,
62a55d08 1285 ctx->nfs_server.addrlen,
530ea421 1286 parent_client->cl_ipaddr,
c8407f2e 1287 proto,
fcf10398
BS
1288 parent_server->client->cl_timeout,
1289 parent_client->cl_mvops->minor_version,
6619079d 1290 parent_client->cl_nconnect,
7e134205 1291 parent_client->cl_max_connect,
6c0a8c5f
CL
1292 parent_client->cl_net,
1293 &parent_client->cl_xprtsec);
fcf10398
BS
1294 if (error < 0)
1295 goto error;
1296
23a88ade 1297#if IS_ENABLED(CONFIG_SUNRPC_XPRT_RDMA)
530ea421
CL
1298init_server:
1299#endif
62a55d08
SM
1300 error = nfs_init_server_rpcclient(server, parent_server->client->cl_timeout,
1301 ctx->selected_flavor);
fcf10398
BS
1302 if (error < 0)
1303 goto error;
1304
5837f6df
WAA
1305 auth_probe = parent_server->auth_info.flavor_len < 1;
1306
62a55d08 1307 error = nfs4_server_common_setup(server, ctx->mntfh, auth_probe);
fcf10398
BS
1308 if (error < 0)
1309 goto error;
1310
fcf10398
BS
1311 return server;
1312
1313error:
1314 nfs_free_server(server);
fcf10398
BS
1315 return ERR_PTR(error);
1316}
32e62b7c 1317
32e62b7c
CL
1318/**
1319 * nfs4_update_server - Move an nfs_server to a different nfs_client
1320 *
1321 * @server: represents FSID to be moved
1322 * @hostname: new end-point's hostname
1323 * @sap: new end-point's socket address
1324 * @salen: size of "sap"
292f503c 1325 * @net: net namespace
32e62b7c
CL
1326 *
1327 * The nfs_server must be quiescent before this function is invoked.
1328 * Either its session is drained (NFSv4.1+), or its transport is
1329 * plugged and drained (NFSv4.0).
1330 *
1331 * Returns zero on success, or a negative errno value.
1332 */
1333int nfs4_update_server(struct nfs_server *server, const char *hostname,
cf0d7e7f 1334 struct sockaddr_storage *sap, size_t salen, struct net *net)
32e62b7c
CL
1335{
1336 struct nfs_client *clp = server->nfs_client;
1337 struct rpc_clnt *clnt = server->client;
1338 struct xprt_create xargs = {
1339 .ident = clp->cl_proto,
292f503c 1340 .net = net,
cf0d7e7f 1341 .dstaddr = (struct sockaddr *)sap,
32e62b7c
CL
1342 .addrlen = salen,
1343 .servername = hostname,
c8407f2e 1344 /* cel: bleh. We might need to pass TLS parameters here */
32e62b7c
CL
1345 };
1346 char buf[INET6_ADDRSTRLEN + 1];
1347 struct sockaddr_storage address;
1348 struct sockaddr *localaddr = (struct sockaddr *)&address;
1349 int error;
1350
32e62b7c 1351 error = rpc_switch_client_transport(clnt, &xargs, clnt->cl_timeout);
4fe6b366
AS
1352 if (error != 0)
1353 return error;
32e62b7c
CL
1354
1355 error = rpc_localaddr(clnt, localaddr, sizeof(address));
4fe6b366
AS
1356 if (error != 0)
1357 return error;
32e62b7c 1358
4fe6b366
AS
1359 if (rpc_ntop(localaddr, buf, sizeof(buf)) == 0)
1360 return -EAFNOSUPPORT;
32e62b7c
CL
1361
1362 nfs_server_remove_lists(server);
8dcbec6d 1363 set_bit(NFS_MIG_TSM_POSSIBLE, &server->mig_status);
32e62b7c 1364 error = nfs4_set_client(server, hostname, sap, salen, buf,
32e62b7c 1365 clp->cl_proto, clnt->cl_timeout,
6619079d 1366 clp->cl_minorversion,
6c0a8c5f
CL
1367 clp->cl_nconnect, clp->cl_max_connect,
1368 net, &clp->cl_xprtsec);
8dcbec6d 1369 clear_bit(NFS_MIG_TSM_POSSIBLE, &server->mig_status);
32e62b7c
CL
1370 if (error != 0) {
1371 nfs_server_insert_lists(server);
4fe6b366 1372 return error;
32e62b7c 1373 }
ad86f605 1374 nfs_put_client(clp);
32e62b7c 1375
fbd2057e 1376 if (server->nfs_client->cl_hostname == NULL) {
32e62b7c 1377 server->nfs_client->cl_hostname = kstrdup(hostname, GFP_KERNEL);
fbd2057e
XW
1378 if (server->nfs_client->cl_hostname == NULL)
1379 return -ENOMEM;
1380 }
32e62b7c
CL
1381 nfs_server_insert_lists(server);
1382
e5731131 1383 return nfs_probe_server(server, NFS_FH(d_inode(server->super->s_root)));
32e62b7c 1384}