]> git.proxmox.com Git - mirror_ubuntu-hirsute-kernel.git/blame - fs/nfs/nfs4client.c
net: ethernet: aeroflex: fix UAF in greth_of_remove
[mirror_ubuntu-hirsute-kernel.git] / fs / nfs / nfs4client.c
CommitLineData
457c8996 1// SPDX-License-Identifier: GPL-2.0-only
428360d7
BS
2/*
3 * Copyright (C) 2006 Red Hat, Inc. All Rights Reserved.
4 * Written by David Howells (dhowells@redhat.com)
5 */
fcf10398 6#include <linux/module.h>
428360d7 7#include <linux/nfs_fs.h>
fcf10398 8#include <linux/nfs_mount.h>
5976687a 9#include <linux/sunrpc/addr.h>
428360d7
BS
10#include <linux/sunrpc/auth.h>
11#include <linux/sunrpc/xprt.h>
12#include <linux/sunrpc/bc_xprt.h>
6aa23d76 13#include <linux/sunrpc/rpc_pipe_fs.h>
428360d7
BS
14#include "internal.h"
15#include "callback.h"
fcf10398 16#include "delegation.h"
73e39aaa 17#include "nfs4session.h"
40c64c26 18#include "nfs4idmap.h"
fcf10398
BS
19#include "pnfs.h"
20#include "netns.h"
428360d7
BS
21
22#define NFSDBG_FACILITY NFSDBG_CLIENT
23
ec409897
BS
24/*
25 * Get a unique NFSv4.0 callback identifier which will be used
26 * by the V4.0 callback service to lookup the nfs_client struct
27 */
28static int nfs_get_cb_ident_idr(struct nfs_client *clp, int minorversion)
29{
30 int ret = 0;
31 struct nfs_net *nn = net_generic(clp->cl_net, nfs_net_id);
32
33 if (clp->rpc_ops->version != 4 || minorversion != 0)
34 return ret;
d6870312 35 idr_preload(GFP_KERNEL);
ec409897 36 spin_lock(&nn->nfs_client_lock);
c68a027c 37 ret = idr_alloc(&nn->cb_ident_idr, clp, 1, 0, GFP_NOWAIT);
d6870312
TH
38 if (ret >= 0)
39 clp->cl_cb_ident = ret;
ec409897 40 spin_unlock(&nn->nfs_client_lock);
d6870312
TH
41 idr_preload_end();
42 return ret < 0 ? ret : 0;
ec409897
BS
43}
44
45#ifdef CONFIG_NFS_V4_1
302fad7b 46/*
0e20162e
AA
47 * Per auth flavor data server rpc clients
48 */
49struct nfs4_ds_server {
50 struct list_head list; /* ds_clp->cl_ds_clients */
51 struct rpc_clnt *rpc_clnt;
52};
53
54/**
302fad7b
TM
55 * nfs4_find_ds_client - Common lookup case for DS I/O
56 * @ds_clp: pointer to the DS's nfs_client
57 * @flavor: rpc auth flavour to match
0e20162e
AA
58 */
59static struct nfs4_ds_server *
60nfs4_find_ds_client(struct nfs_client *ds_clp, rpc_authflavor_t flavor)
61{
62 struct nfs4_ds_server *dss;
63
64 rcu_read_lock();
65 list_for_each_entry_rcu(dss, &ds_clp->cl_ds_clients, list) {
66 if (dss->rpc_clnt->cl_auth->au_flavor != flavor)
67 continue;
68 goto out;
69 }
70 dss = NULL;
71out:
72 rcu_read_unlock();
73 return dss;
74}
75
76static struct nfs4_ds_server *
77nfs4_add_ds_client(struct nfs_client *ds_clp, rpc_authflavor_t flavor,
78 struct nfs4_ds_server *new)
79{
80 struct nfs4_ds_server *dss;
81
82 spin_lock(&ds_clp->cl_lock);
83 list_for_each_entry(dss, &ds_clp->cl_ds_clients, list) {
84 if (dss->rpc_clnt->cl_auth->au_flavor != flavor)
85 continue;
86 goto out;
87 }
88 if (new)
89 list_add_rcu(&new->list, &ds_clp->cl_ds_clients);
90 dss = new;
91out:
92 spin_unlock(&ds_clp->cl_lock); /* need some lock to protect list */
93 return dss;
94}
95
96static struct nfs4_ds_server *
97nfs4_alloc_ds_server(struct nfs_client *ds_clp, rpc_authflavor_t flavor)
98{
99 struct nfs4_ds_server *dss;
100
101 dss = kmalloc(sizeof(*dss), GFP_NOFS);
102 if (dss == NULL)
103 return ERR_PTR(-ENOMEM);
104
105 dss->rpc_clnt = rpc_clone_client_set_auth(ds_clp->cl_rpcclient, flavor);
106 if (IS_ERR(dss->rpc_clnt)) {
107 int err = PTR_ERR(dss->rpc_clnt);
108 kfree (dss);
109 return ERR_PTR(err);
110 }
111 INIT_LIST_HEAD(&dss->list);
112
113 return dss;
114}
115
116static void
117nfs4_free_ds_server(struct nfs4_ds_server *dss)
118{
119 rpc_release_client(dss->rpc_clnt);
120 kfree(dss);
121}
122
123/**
302fad7b
TM
124 * nfs4_find_or_create_ds_client - Find or create a DS rpc client
125 * @ds_clp: pointer to the DS's nfs_client
126 * @inode: pointer to the inode
127 *
128 * Find or create a DS rpc client with th MDS server rpc client auth flavor
129 * in the nfs_client cl_ds_clients list.
130 */
0e20162e
AA
131struct rpc_clnt *
132nfs4_find_or_create_ds_client(struct nfs_client *ds_clp, struct inode *inode)
133{
134 struct nfs4_ds_server *dss, *new;
135 rpc_authflavor_t flavor = NFS_SERVER(inode)->client->cl_auth->au_flavor;
136
137 dss = nfs4_find_ds_client(ds_clp, flavor);
138 if (dss != NULL)
139 goto out;
140 new = nfs4_alloc_ds_server(ds_clp, flavor);
141 if (IS_ERR(new))
142 return ERR_CAST(new);
143 dss = nfs4_add_ds_client(ds_clp, flavor, new);
144 if (dss != new)
145 nfs4_free_ds_server(new);
146out:
147 return dss->rpc_clnt;
148}
149EXPORT_SYMBOL_GPL(nfs4_find_or_create_ds_client);
150
151static void
152nfs4_shutdown_ds_clients(struct nfs_client *clp)
153{
154 struct nfs4_ds_server *dss;
0e20162e
AA
155
156 while (!list_empty(&clp->cl_ds_clients)) {
157 dss = list_entry(clp->cl_ds_clients.next,
158 struct nfs4_ds_server, list);
159 list_del(&dss->list);
160 rpc_shutdown_client(dss->rpc_clnt);
161 kfree (dss);
162 }
163}
164
bc0c9079
OK
165static void
166nfs4_cleanup_callback(struct nfs_client *clp)
167{
168 struct nfs4_copy_state *cp_state;
169
170 while (!list_empty(&clp->pending_cb_stateids)) {
171 cp_state = list_entry(clp->pending_cb_stateids.next,
172 struct nfs4_copy_state, copies);
173 list_del(&cp_state->copies);
174 kfree(cp_state);
175 }
176}
177
abf79bb3 178void nfs41_shutdown_client(struct nfs_client *clp)
ec409897
BS
179{
180 if (nfs4_has_session(clp)) {
bc0c9079 181 nfs4_cleanup_callback(clp);
0e20162e 182 nfs4_shutdown_ds_clients(clp);
ec409897
BS
183 nfs4_destroy_session(clp->cl_session);
184 nfs4_destroy_clientid(clp);
185 }
186
187}
abf79bb3
CL
188#endif /* CONFIG_NFS_V4_1 */
189
190void nfs40_shutdown_client(struct nfs_client *clp)
ec409897 191{
abf79bb3 192 if (clp->cl_slot_tbl) {
20b9a902 193 nfs4_shutdown_slot_table(clp->cl_slot_tbl);
abf79bb3
CL
194 kfree(clp->cl_slot_tbl);
195 }
ec409897 196}
ec409897
BS
197
198struct nfs_client *nfs4_alloc_client(const struct nfs_client_initdata *cl_init)
199{
200 int err;
201 struct nfs_client *clp = nfs_alloc_client(cl_init);
202 if (IS_ERR(clp))
203 return clp;
204
205 err = nfs_get_cb_ident_idr(clp, cl_init->minorversion);
206 if (err)
207 goto error;
208
42c2c424
SD
209 if (cl_init->minorversion > NFS4_MAX_MINOR_VERSION) {
210 err = -EINVAL;
211 goto error;
212 }
213
ec409897
BS
214 spin_lock_init(&clp->cl_lock);
215 INIT_DELAYED_WORK(&clp->cl_renewd, nfs4_renew_state);
0e20162e 216 INIT_LIST_HEAD(&clp->cl_ds_clients);
ec409897
BS
217 rpc_init_wait_queue(&clp->cl_rpcwaitq, "NFS client");
218 clp->cl_state = 1 << NFS4CLNT_LEASE_EXPIRED;
ec409897 219 clp->cl_mvops = nfs_v4_minor_ops[cl_init->minorversion];
c9fdeb28 220 clp->cl_mig_gen = 1;
a1d617d8
JL
221#if IS_ENABLED(CONFIG_NFS_V4_1)
222 init_waitqueue_head(&clp->cl_lock_waitq);
223#endif
bc0c9079 224 INIT_LIST_HEAD(&clp->pending_cb_stateids);
ec409897
BS
225 return clp;
226
227error:
7653f6ff 228 nfs_free_client(clp);
ec409897
BS
229 return ERR_PTR(err);
230}
231
232/*
233 * Destroy the NFS4 callback service
234 */
235static void nfs4_destroy_callback(struct nfs_client *clp)
236{
237 if (__test_and_clear_bit(NFS_CS_CALLBACK, &clp->cl_res_state))
c946556b 238 nfs_callback_down(clp->cl_mvops->minor_version, clp->cl_net);
ec409897
BS
239}
240
241static void nfs4_shutdown_client(struct nfs_client *clp)
242{
243 if (__test_and_clear_bit(NFS_CS_RENEWD, &clp->cl_res_state))
244 nfs4_kill_renewd(clp);
abf79bb3 245 clp->cl_mvops->shutdown_client(clp);
ec409897
BS
246 nfs4_destroy_callback(clp);
247 if (__test_and_clear_bit(NFS_CS_IDMAP, &clp->cl_res_state))
248 nfs_idmap_delete(clp);
249
250 rpc_destroy_wait_queue(&clp->cl_rpcwaitq);
251 kfree(clp->cl_serverowner);
252 kfree(clp->cl_serverscope);
253 kfree(clp->cl_implid);
ceb3a16c 254 kfree(clp->cl_owner_id);
ec409897
BS
255}
256
257void nfs4_free_client(struct nfs_client *clp)
258{
259 nfs4_shutdown_client(clp);
260 nfs_free_client(clp);
261}
262
428360d7
BS
263/*
264 * Initialize the NFS4 callback service
265 */
266static int nfs4_init_callback(struct nfs_client *clp)
267{
c2ef47b7 268 struct rpc_xprt *xprt;
428360d7
BS
269 int error;
270
c2ef47b7 271 xprt = rcu_dereference_raw(clp->cl_rpcclient->cl_xprt);
428360d7 272
c2ef47b7
CL
273 if (nfs4_has_session(clp)) {
274 error = xprt_setup_backchannel(xprt, NFS41_BC_MIN_CALLBACKS);
275 if (error < 0)
428360d7 276 return error;
428360d7 277 }
c2ef47b7
CL
278
279 error = nfs_callback_up(clp->cl_mvops->minor_version, xprt);
280 if (error < 0) {
281 dprintk("%s: failed to start callback. Error = %d\n",
282 __func__, error);
283 return error;
284 }
285 __set_bit(NFS_CS_CALLBACK, &clp->cl_res_state);
286
428360d7
BS
287 return 0;
288}
289
abf79bb3
CL
290/**
291 * nfs40_init_client - nfs_client initialization tasks for NFSv4.0
302fad7b 292 * @clp: nfs_client to initialize
abf79bb3
CL
293 *
294 * Returns zero on success, or a negative errno if some error occurred.
295 */
296int nfs40_init_client(struct nfs_client *clp)
297{
298 struct nfs4_slot_table *tbl;
299 int ret;
300
301 tbl = kzalloc(sizeof(*tbl), GFP_NOFS);
302 if (tbl == NULL)
303 return -ENOMEM;
304
305 ret = nfs4_setup_slot_table(tbl, NFS4_MAX_SLOT_TABLE,
306 "NFSv4.0 transport Slot table");
307 if (ret) {
308 kfree(tbl);
309 return ret;
310 }
311
312 clp->cl_slot_tbl = tbl;
313 return 0;
314}
315
316#if defined(CONFIG_NFS_V4_1)
317
318/**
319 * nfs41_init_client - nfs_client initialization tasks for NFSv4.1+
302fad7b 320 * @clp: nfs_client to initialize
abf79bb3
CL
321 *
322 * Returns zero on success, or a negative errno if some error occurred.
323 */
324int nfs41_init_client(struct nfs_client *clp)
325{
326 struct nfs4_session *session = NULL;
327
328 /*
329 * Create the session and mark it expired.
330 * When a SEQUENCE operation encounters the expired session
331 * it will do session recovery to initialize it.
332 */
333 session = nfs4_alloc_session(clp);
334 if (!session)
335 return -ENOMEM;
336
337 clp->cl_session = session;
338
339 /*
340 * The create session reply races with the server back
341 * channel probe. Mark the client NFS_CS_SESSION_INITING
342 * so that the client back channel can find the
343 * nfs_client struct
344 */
345 nfs_mark_client_ready(clp, NFS_CS_SESSION_INITING);
346 return 0;
347}
348
349#endif /* CONFIG_NFS_V4_1 */
350
428360d7
BS
351/*
352 * Initialize the minor version specific parts of an NFS4 client record
353 */
354static int nfs4_init_client_minor_version(struct nfs_client *clp)
355{
abf79bb3 356 int ret;
428360d7 357
abf79bb3
CL
358 ret = clp->cl_mvops->init_client(clp);
359 if (ret)
360 return ret;
428360d7
BS
361 return nfs4_init_callback(clp);
362}
363
364/**
365 * nfs4_init_client - Initialise an NFS4 client record
366 *
367 * @clp: nfs_client to initialise
302fad7b 368 * @cl_init: pointer to nfs_client_initdata
428360d7
BS
369 *
370 * Returns pointer to an NFS client, or an ERR_PTR value.
371 */
372struct nfs_client *nfs4_init_client(struct nfs_client *clp,
5c6e5b60 373 const struct nfs_client_initdata *cl_init)
428360d7
BS
374{
375 char buf[INET6_ADDRSTRLEN + 1];
5c6e5b60 376 const char *ip_addr = cl_init->ip_addr;
05f4c350 377 struct nfs_client *old;
428360d7
BS
378 int error;
379
4fe6b366 380 if (clp->cl_cons_state == NFS_CS_READY)
428360d7 381 /* the client is initialised already */
428360d7 382 return clp;
428360d7
BS
383
384 /* Check NFS protocol revision and initialize RPC op vector */
385 clp->rpc_ops = &nfs_v4_clientops;
386
98f98cf5
TM
387 if (clp->cl_minorversion != 0)
388 __set_bit(NFS_CS_INFINITE_SLOTS, &clp->cl_flags);
428360d7 389 __set_bit(NFS_CS_DISCRTRY, &clp->cl_flags);
99875249 390 __set_bit(NFS_CS_NO_RETRANS_TIMEOUT, &clp->cl_flags);
6aa23d76 391
5c6e5b60 392 error = nfs_create_rpc_client(clp, cl_init, RPC_AUTH_GSS_KRB5I);
23631227 393 if (error == -EINVAL)
5c6e5b60 394 error = nfs_create_rpc_client(clp, cl_init, RPC_AUTH_UNIX);
428360d7
BS
395 if (error < 0)
396 goto error;
397
398 /* If no clientaddr= option was specified, find a usable cb address */
399 if (ip_addr == NULL) {
400 struct sockaddr_storage cb_addr;
401 struct sockaddr *sap = (struct sockaddr *)&cb_addr;
402
403 error = rpc_localaddr(clp->cl_rpcclient, sap, sizeof(cb_addr));
404 if (error < 0)
405 goto error;
406 error = rpc_ntop(sap, buf, sizeof(buf));
407 if (error < 0)
408 goto error;
409 ip_addr = (const char *)buf;
410 }
411 strlcpy(clp->cl_ipaddr, ip_addr, sizeof(clp->cl_ipaddr));
412
413 error = nfs_idmap_new(clp);
414 if (error < 0) {
415 dprintk("%s: failed to create idmapper. Error = %d\n",
416 __func__, error);
417 goto error;
418 }
419 __set_bit(NFS_CS_IDMAP, &clp->cl_res_state);
420
421 error = nfs4_init_client_minor_version(clp);
422 if (error < 0)
423 goto error;
424
05f4c350
CL
425 error = nfs4_discover_server_trunking(clp, &old);
426 if (error < 0)
427 goto error;
05f4c350 428
c156618e 429 if (clp != old) {
abad2fa5 430 clp->cl_preserve_clid = true;
c156618e
SM
431 /*
432 * Mark the client as having failed initialization so other
433 * processes walking the nfs_client_list in nfs_match_client()
434 * won't try to use it.
435 */
436 nfs_mark_client_ready(clp, -EPERM);
437 }
8dcbec6d 438 clear_bit(NFS_CS_TSM_POSSIBLE, &clp->cl_flags);
80738b38 439 nfs_put_client(clp);
abad2fa5 440 return old;
428360d7
BS
441
442error:
443 nfs_mark_client_ready(clp, error);
444 nfs_put_client(clp);
428360d7
BS
445 return ERR_PTR(error);
446}
fcf10398 447
05f4c350
CL
448/*
449 * SETCLIENTID just did a callback update with the callback ident in
450 * "drop," but server trunking discovery claims "drop" and "keep" are
451 * actually the same server. Swap the callback IDs so that "keep"
452 * will continue to use the callback ident the server now knows about,
453 * and so that "keep"'s original callback ident is destroyed when
454 * "drop" is freed.
455 */
456static void nfs4_swap_callback_idents(struct nfs_client *keep,
457 struct nfs_client *drop)
458{
459 struct nfs_net *nn = net_generic(keep->cl_net, nfs_net_id);
460 unsigned int save = keep->cl_cb_ident;
461
462 if (keep->cl_cb_ident == drop->cl_cb_ident)
463 return;
464
465 dprintk("%s: keeping callback ident %u and dropping ident %u\n",
466 __func__, keep->cl_cb_ident, drop->cl_cb_ident);
467
468 spin_lock(&nn->nfs_client_lock);
469
470 idr_replace(&nn->cb_ident_idr, keep, drop->cl_cb_ident);
471 keep->cl_cb_ident = drop->cl_cb_ident;
472
473 idr_replace(&nn->cb_ident_idr, drop, save);
474 drop->cl_cb_ident = save;
475
476 spin_unlock(&nn->nfs_client_lock);
477}
478
55b9df93
TM
479static bool nfs4_match_client_owner_id(const struct nfs_client *clp1,
480 const struct nfs_client *clp2)
481{
482 if (clp1->cl_owner_id == NULL || clp2->cl_owner_id == NULL)
483 return true;
484 return strcmp(clp1->cl_owner_id, clp2->cl_owner_id) == 0;
485}
486
ced85a75
BF
487static bool nfs4_same_verifier(nfs4_verifier *v1, nfs4_verifier *v2)
488{
489 return memcmp(v1->data, v2->data, sizeof(v1->data)) == 0;
490}
491
14d1bbb0
AS
492static int nfs4_match_client(struct nfs_client *pos, struct nfs_client *new,
493 struct nfs_client **prev, struct nfs_net *nn)
494{
495 int status;
496
497 if (pos->rpc_ops != new->rpc_ops)
498 return 1;
499
500 if (pos->cl_minorversion != new->cl_minorversion)
501 return 1;
502
503 /* If "pos" isn't marked ready, we can't trust the
504 * remaining fields in "pos", especially the client
505 * ID and serverowner fields. Wait for CREATE_SESSION
506 * to finish. */
507 if (pos->cl_cons_state > NFS_CS_READY) {
212bf41d 508 refcount_inc(&pos->cl_count);
14d1bbb0
AS
509 spin_unlock(&nn->nfs_client_lock);
510
511 nfs_put_client(*prev);
512 *prev = pos;
513
514 status = nfs_wait_client_init_complete(pos);
515 spin_lock(&nn->nfs_client_lock);
516
517 if (status < 0)
518 return status;
519 }
520
521 if (pos->cl_cons_state != NFS_CS_READY)
522 return 1;
523
524 if (pos->cl_clientid != new->cl_clientid)
525 return 1;
526
527 /* NFSv4.1 always uses the uniform string, however someone
528 * might switch the uniquifier string on us.
529 */
530 if (!nfs4_match_client_owner_id(pos, new))
531 return 1;
532
533 return 0;
534}
535
05f4c350
CL
536/**
537 * nfs40_walk_client_list - Find server that recognizes a client ID
538 *
539 * @new: nfs_client with client ID to test
540 * @result: OUT: found nfs_client, or new
541 * @cred: credential to use for trunking test
542 *
543 * Returns zero, a negative errno, or a negative NFS4ERR status.
544 * If zero is returned, an nfs_client pointer is planted in "result."
545 *
546 * NB: nfs40_walk_client_list() relies on the new nfs_client being
547 * the last nfs_client on the list.
548 */
549int nfs40_walk_client_list(struct nfs_client *new,
550 struct nfs_client **result,
a52458b4 551 const struct cred *cred)
05f4c350
CL
552{
553 struct nfs_net *nn = net_generic(new->cl_net, nfs_net_id);
7b1f1fd1 554 struct nfs_client *pos, *prev = NULL;
05f4c350
CL
555 struct nfs4_setclientid_res clid = {
556 .clientid = new->cl_clientid,
557 .confirm = new->cl_confirm,
558 };
4ae19c2d 559 int status = -NFS4ERR_STALE_CLIENTID;
05f4c350
CL
560
561 spin_lock(&nn->nfs_client_lock);
7b1f1fd1 562 list_for_each_entry(pos, &nn->nfs_client_list, cl_share_link) {
080af20c 563
c156618e
SM
564 if (pos == new)
565 goto found;
566
14d1bbb0
AS
567 status = nfs4_match_client(pos, new, &prev, nn);
568 if (status < 0)
569 goto out_unlock;
570 if (status != 0)
55b9df93 571 continue;
ced85a75
BF
572 /*
573 * We just sent a new SETCLIENTID, which should have
574 * caused the server to return a new cl_confirm. So if
575 * cl_confirm is the same, then this is a different
576 * server that just returned the same cl_confirm by
577 * coincidence:
578 */
579 if ((new != pos) && nfs4_same_verifier(&pos->cl_confirm,
580 &new->cl_confirm))
581 continue;
582 /*
583 * But if the cl_confirm's are different, then the only
584 * way that a SETCLIENTID_CONFIRM to pos can succeed is
585 * if new and pos point to the same server:
586 */
c156618e 587found:
212bf41d 588 refcount_inc(&pos->cl_count);
05f4c350
CL
589 spin_unlock(&nn->nfs_client_lock);
590
fe0bf118 591 nfs_put_client(prev);
4ae19c2d 592 prev = pos;
05f4c350
CL
593
594 status = nfs4_proc_setclientid_confirm(pos, &clid, cred);
4ae19c2d
TM
595 switch (status) {
596 case -NFS4ERR_STALE_CLIENTID:
597 break;
598 case 0:
05f4c350 599 nfs4_swap_callback_idents(pos, new);
ced85a75 600 pos->cl_confirm = new->cl_confirm;
c156618e 601 nfs_mark_client_ready(pos, NFS_CS_READY);
05f4c350 602
4ae19c2d 603 prev = NULL;
05f4c350 604 *result = pos;
f9b7ebdf
TM
605 goto out;
606 case -ERESTARTSYS:
607 case -ETIMEDOUT:
608 /* The callback path may have been inadvertently
609 * changed. Schedule recovery!
610 */
611 nfs4_schedule_path_down_recovery(pos);
4ae19c2d
TM
612 default:
613 goto out;
05f4c350
CL
614 }
615
616 spin_lock(&nn->nfs_client_lock);
05f4c350 617 }
14d1bbb0 618out_unlock:
4ae19c2d 619 spin_unlock(&nn->nfs_client_lock);
05f4c350 620
202c312d 621 /* No match found. The server lost our clientid */
4ae19c2d 622out:
fe0bf118 623 nfs_put_client(prev);
4ae19c2d 624 return status;
05f4c350
CL
625}
626
627#ifdef CONFIG_NFS_V4_1
628/*
1fc0703a 629 * Returns true if the server major ids match
05f4c350 630 */
0491567b 631bool
e7b7cbf6
AA
632nfs4_check_serverowner_major_id(struct nfs41_server_owner *o1,
633 struct nfs41_server_owner *o2)
05f4c350 634{
05f4c350 635 if (o1->major_id_sz != o2->major_id_sz)
ddfa0d48
AS
636 return false;
637 return memcmp(o1->major_id, o2->major_id, o1->major_id_sz) == 0;
05f4c350
CL
638}
639
ba84db96
AA
640/*
641 * Returns true if the server scopes match
642 */
643static bool
644nfs4_check_server_scope(struct nfs41_server_scope *s1,
645 struct nfs41_server_scope *s2)
646{
647 if (s1->server_scope_sz != s2->server_scope_sz)
8da0f934
AS
648 return false;
649 return memcmp(s1->server_scope, s2->server_scope,
650 s1->server_scope_sz) == 0;
ba84db96
AA
651}
652
653/**
ad0849a7 654 * nfs4_detect_session_trunking - Checks for session trunking.
ba84db96
AA
655 * @clp: original mount nfs_client
656 * @res: result structure from an exchange_id using the original mount
657 * nfs_client with a new multi_addr transport
302fad7b
TM
658 * @xprt: pointer to the transport to add.
659 *
660 * Called after a successful EXCHANGE_ID on a multi-addr connection.
661 * Upon success, add the transport.
ba84db96
AA
662 *
663 * Returns zero on success, otherwise -EINVAL
664 *
665 * Note: since the exchange_id for the new multi_addr transport uses the
666 * same nfs_client from the original mount, the cl_owner_id is reused,
667 * so eir_clientowner is the same.
668 */
669int nfs4_detect_session_trunking(struct nfs_client *clp,
670 struct nfs41_exchange_id_res *res,
671 struct rpc_xprt *xprt)
672{
673 /* Check eir_clientid */
f251fd9e 674 if (clp->cl_clientid != res->clientid)
ba84db96
AA
675 goto out_err;
676
677 /* Check eir_server_owner so_major_id */
678 if (!nfs4_check_serverowner_major_id(clp->cl_serverowner,
679 res->server_owner))
680 goto out_err;
681
682 /* Check eir_server_owner so_minor_id */
5b6d3ff6 683 if (clp->cl_serverowner->minor_id != res->server_owner->minor_id)
ba84db96
AA
684 goto out_err;
685
686 /* Check eir_server_scope */
687 if (!nfs4_check_server_scope(clp->cl_serverscope, res->server_scope))
688 goto out_err;
689
690 pr_info("NFS: %s: Session trunking succeeded for %s\n",
691 clp->cl_hostname,
692 xprt->address_strings[RPC_DISPLAY_ADDR]);
693
694 return 0;
695out_err:
696 pr_info("NFS: %s: Session trunking failed for %s\n", clp->cl_hostname,
697 xprt->address_strings[RPC_DISPLAY_ADDR]);
698
699 return -EINVAL;
700}
701
05f4c350
CL
702/**
703 * nfs41_walk_client_list - Find nfs_client that matches a client/server owner
704 *
705 * @new: nfs_client with client ID to test
706 * @result: OUT: found nfs_client, or new
707 * @cred: credential to use for trunking test
708 *
709 * Returns zero, a negative errno, or a negative NFS4ERR status.
710 * If zero is returned, an nfs_client pointer is planted in "result."
711 *
712 * NB: nfs41_walk_client_list() relies on the new nfs_client being
713 * the last nfs_client on the list.
714 */
715int nfs41_walk_client_list(struct nfs_client *new,
716 struct nfs_client **result,
a52458b4 717 const struct cred *cred)
05f4c350
CL
718{
719 struct nfs_net *nn = net_generic(new->cl_net, nfs_net_id);
7b1f1fd1 720 struct nfs_client *pos, *prev = NULL;
202c312d 721 int status = -NFS4ERR_STALE_CLIENTID;
05f4c350
CL
722
723 spin_lock(&nn->nfs_client_lock);
7b1f1fd1 724 list_for_each_entry(pos, &nn->nfs_client_list, cl_share_link) {
080af20c 725
48d66b97
TM
726 if (pos == new)
727 goto found;
728
14d1bbb0
AS
729 status = nfs4_match_client(pos, new, &prev, nn);
730 if (status < 0)
731 goto out;
732 if (status != 0)
05f4c350
CL
733 continue;
734
1fc0703a
TM
735 /*
736 * Note that session trunking is just a special subcase of
737 * client id trunking. In either case, we want to fall back
738 * to using the existing nfs_client.
739 */
e7b7cbf6
AA
740 if (!nfs4_check_serverowner_major_id(pos->cl_serverowner,
741 new->cl_serverowner))
05f4c350
CL
742 continue;
743
48d66b97 744found:
212bf41d 745 refcount_inc(&pos->cl_count);
7b1f1fd1 746 *result = pos;
eb04e0ac 747 status = 0;
7b1f1fd1 748 break;
05f4c350
CL
749 }
750
14d1bbb0 751out:
05f4c350 752 spin_unlock(&nn->nfs_client_lock);
fe0bf118 753 nfs_put_client(prev);
202c312d 754 return status;
05f4c350
CL
755}
756#endif /* CONFIG_NFS_V4_1 */
757
fcf10398
BS
758static void nfs4_destroy_server(struct nfs_server *server)
759{
c77e2283
TM
760 LIST_HEAD(freeme);
761
fcf10398
BS
762 nfs_server_return_all_delegations(server);
763 unset_pnfs_layoutdriver(server);
c77e2283
TM
764 nfs4_purge_state_owners(server, &freeme);
765 nfs4_free_state_owners(&freeme);
fcf10398
BS
766}
767
768/*
769 * NFSv4.0 callback thread helper
770 *
771 * Find a client by callback identifier
772 */
773struct nfs_client *
774nfs4_find_client_ident(struct net *net, int cb_ident)
775{
776 struct nfs_client *clp;
777 struct nfs_net *nn = net_generic(net, nfs_net_id);
778
779 spin_lock(&nn->nfs_client_lock);
780 clp = idr_find(&nn->cb_ident_idr, cb_ident);
781 if (clp)
212bf41d 782 refcount_inc(&clp->cl_count);
fcf10398
BS
783 spin_unlock(&nn->nfs_client_lock);
784 return clp;
785}
786
787#if defined(CONFIG_NFS_V4_1)
788/* Common match routine for v4.0 and v4.1 callback services */
789static bool nfs4_cb_match_client(const struct sockaddr *addr,
790 struct nfs_client *clp, u32 minorversion)
791{
792 struct sockaddr *clap = (struct sockaddr *)&clp->cl_addr;
793
794 /* Don't match clients that failed to initialise */
795 if (!(clp->cl_cons_state == NFS_CS_READY ||
796 clp->cl_cons_state == NFS_CS_SESSION_INITING))
797 return false;
798
799 smp_rmb();
800
801 /* Match the version and minorversion */
802 if (clp->rpc_ops->version != 4 ||
803 clp->cl_minorversion != minorversion)
804 return false;
805
806 /* Match only the IP address, not the port number */
d8efa4e6 807 return rpc_cmp_addr(addr, clap);
fcf10398
BS
808}
809
810/*
811 * NFSv4.1 callback thread helper
812 * For CB_COMPOUND calls, find a client by IP address, protocol version,
813 * minorversion, and sessionID
814 *
815 * Returns NULL if no such client
816 */
817struct nfs_client *
818nfs4_find_client_sessionid(struct net *net, const struct sockaddr *addr,
459de2ed 819 struct nfs4_sessionid *sid, u32 minorversion)
fcf10398
BS
820{
821 struct nfs_client *clp;
822 struct nfs_net *nn = net_generic(net, nfs_net_id);
823
824 spin_lock(&nn->nfs_client_lock);
825 list_for_each_entry(clp, &nn->nfs_client_list, cl_share_link) {
6089dd0d 826 if (!nfs4_cb_match_client(addr, clp, minorversion))
fcf10398
BS
827 continue;
828
829 if (!nfs4_has_session(clp))
830 continue;
831
832 /* Match sessionid*/
833 if (memcmp(clp->cl_session->sess_id.data,
834 sid->data, NFS4_MAX_SESSIONID_LEN) != 0)
835 continue;
836
212bf41d 837 refcount_inc(&clp->cl_count);
fcf10398
BS
838 spin_unlock(&nn->nfs_client_lock);
839 return clp;
840 }
841 spin_unlock(&nn->nfs_client_lock);
842 return NULL;
843}
844
845#else /* CONFIG_NFS_V4_1 */
846
847struct nfs_client *
848nfs4_find_client_sessionid(struct net *net, const struct sockaddr *addr,
459de2ed 849 struct nfs4_sessionid *sid, u32 minorversion)
fcf10398
BS
850{
851 return NULL;
852}
853#endif /* CONFIG_NFS_V4_1 */
854
855/*
856 * Set up an NFS4 client
857 */
858static int nfs4_set_client(struct nfs_server *server,
859 const char *hostname,
860 const struct sockaddr *addr,
861 const size_t addrlen,
862 const char *ip_addr,
fcf10398 863 int proto, const struct rpc_timeout *timeparms,
6619079d
TM
864 u32 minorversion, unsigned int nconnect,
865 struct net *net)
fcf10398
BS
866{
867 struct nfs_client_initdata cl_init = {
868 .hostname = hostname,
869 .addr = addr,
870 .addrlen = addrlen,
5c6e5b60 871 .ip_addr = ip_addr,
ab7017a3 872 .nfs_mod = &nfs_v4,
fcf10398
BS
873 .proto = proto,
874 .minorversion = minorversion,
875 .net = net,
5c6e5b60 876 .timeparms = timeparms,
1a58e8a0 877 .cred = server->cred,
fcf10398
BS
878 };
879 struct nfs_client *clp;
fcf10398 880
e6237b6f
TM
881 if (minorversion == 0)
882 __set_bit(NFS_CS_REUSEPORT, &cl_init.init_flags);
dbc4fec6 883 if (proto == XPRT_TRANSPORT_TCP)
6619079d 884 cl_init.nconnect = nconnect;
e6237b6f 885
fcf10398 886 if (server->flags & NFS_MOUNT_NORESVPORT)
d0372b67 887 __set_bit(NFS_CS_NORESVPORT, &cl_init.init_flags);
f112bb48 888 if (server->options & NFS_OPTION_MIGRATION)
d0372b67 889 __set_bit(NFS_CS_MIGRATION, &cl_init.init_flags);
8dcbec6d 890 if (test_bit(NFS_MIG_TSM_POSSIBLE, &server->mig_status))
d0372b67 891 __set_bit(NFS_CS_TSM_POSSIBLE, &cl_init.init_flags);
801b5643 892 server->port = rpc_get_port(addr);
fcf10398
BS
893
894 /* Allocate or find a client reference we can use */
7d38de3f 895 clp = nfs_get_client(&cl_init);
2dc42c0d
AS
896 if (IS_ERR(clp))
897 return PTR_ERR(clp);
fcf10398 898
ad86f605
BB
899 if (server->nfs_client == clp) {
900 nfs_put_client(clp);
2dc42c0d 901 return -ELOOP;
ad86f605 902 }
52442f9b 903
fcf10398
BS
904 /*
905 * Query for the lease time on clientid setup or renewal
906 *
907 * Note that this will be set on nfs_clients that were created
908 * only for the DS role and did not set this bit, but now will
909 * serve a dual role.
910 */
911 set_bit(NFS_CS_CHECK_LEASE_TIME, &clp->cl_res_state);
912
913 server->nfs_client = clp;
fcf10398 914 return 0;
fcf10398
BS
915}
916
917/*
918 * Set up a pNFS Data Server client.
919 *
920 * Return any existing nfs_client that matches server address,port,version
921 * and minorversion.
922 *
923 * For a new nfs_client, use a soft mount (default), a low retrans and a
924 * low timeout interval so that if a connection is lost, we retry through
925 * the MDS.
926 */
3fc75f12 927struct nfs_client *nfs4_set_ds_client(struct nfs_server *mds_srv,
fcf10398 928 const struct sockaddr *ds_addr, int ds_addrlen,
064172f3 929 int ds_proto, unsigned int ds_timeo, unsigned int ds_retrans,
7d38de3f 930 u32 minor_version)
fcf10398 931{
5c6e5b60 932 struct rpc_timeout ds_timeout;
3fc75f12 933 struct nfs_client *mds_clp = mds_srv->nfs_client;
fcf10398
BS
934 struct nfs_client_initdata cl_init = {
935 .addr = ds_addr,
936 .addrlen = ds_addrlen,
5c6e5b60
TM
937 .nodename = mds_clp->cl_rpcclient->cl_nodename,
938 .ip_addr = mds_clp->cl_ipaddr,
ab7017a3 939 .nfs_mod = &nfs_v4,
fcf10398 940 .proto = ds_proto,
30626f9c 941 .minorversion = minor_version,
fcf10398 942 .net = mds_clp->cl_net,
5c6e5b60 943 .timeparms = &ds_timeout,
1a58e8a0 944 .cred = mds_srv->cred,
fcf10398 945 };
a363e32e
PT
946 char buf[INET6_ADDRSTRLEN + 1];
947
948 if (rpc_ntop(ds_addr, buf, sizeof(buf)) <= 0)
949 return ERR_PTR(-EINVAL);
950 cl_init.hostname = buf;
fcf10398 951
bb71e4a5
TM
952 if (mds_clp->cl_nconnect > 1 && ds_proto == XPRT_TRANSPORT_TCP)
953 cl_init.nconnect = mds_clp->cl_nconnect;
954
3fc75f12
TM
955 if (mds_srv->flags & NFS_MOUNT_NORESVPORT)
956 __set_bit(NFS_CS_NORESVPORT, &cl_init.init_flags);
957
fcf10398
BS
958 /*
959 * Set an authflavor equual to the MDS value. Use the MDS nfs_client
960 * cl_ipaddr so as to use the same EXCHANGE_ID co_ownerid as the MDS
961 * (section 13.1 RFC 5661).
962 */
963 nfs_init_timeout_values(&ds_timeout, ds_proto, ds_timeo, ds_retrans);
4fe6b366 964 return nfs_get_client(&cl_init);
fcf10398
BS
965}
966EXPORT_SYMBOL_GPL(nfs4_set_ds_client);
967
968/*
969 * Session has been established, and the client marked ready.
943cff67
TM
970 * Limit the mount rsize, wsize and dtsize using negotiated fore
971 * channel attributes.
fcf10398 972 */
943cff67 973static void nfs4_session_limit_rwsize(struct nfs_server *server)
fcf10398
BS
974{
975#ifdef CONFIG_NFS_V4_1
976 struct nfs4_session *sess;
977 u32 server_resp_sz;
978 u32 server_rqst_sz;
979
980 if (!nfs4_has_session(server->nfs_client))
981 return;
982 sess = server->nfs_client->cl_session;
983 server_resp_sz = sess->fc_attrs.max_resp_sz - nfs41_maxread_overhead;
984 server_rqst_sz = sess->fc_attrs.max_rqst_sz - nfs41_maxwrite_overhead;
985
943cff67
TM
986 if (server->dtsize > server_resp_sz)
987 server->dtsize = server_resp_sz;
988 if (server->rsize > server_resp_sz)
fcf10398 989 server->rsize = server_resp_sz;
943cff67 990 if (server->wsize > server_rqst_sz)
fcf10398
BS
991 server->wsize = server_rqst_sz;
992#endif /* CONFIG_NFS_V4_1 */
993}
994
04a5da69
FL
995/*
996 * Limit xattr sizes using the channel attributes.
997 */
998static void nfs4_session_limit_xasize(struct nfs_server *server)
999{
1000#ifdef CONFIG_NFS_V4_2
1001 struct nfs4_session *sess;
1002 u32 server_gxa_sz;
1003 u32 server_sxa_sz;
1004 u32 server_lxa_sz;
1005
1006 if (!nfs4_has_session(server->nfs_client))
1007 return;
1008
1009 sess = server->nfs_client->cl_session;
1010
1011 server_gxa_sz = sess->fc_attrs.max_resp_sz - nfs42_maxgetxattr_overhead;
1012 server_sxa_sz = sess->fc_attrs.max_rqst_sz - nfs42_maxsetxattr_overhead;
1013 server_lxa_sz = sess->fc_attrs.max_resp_sz -
1014 nfs42_maxlistxattrs_overhead;
1015
1016 if (server->gxasize > server_gxa_sz)
1017 server->gxasize = server_gxa_sz;
1018 if (server->sxasize > server_sxa_sz)
1019 server->sxasize = server_sxa_sz;
1020 if (server->lxasize > server_lxa_sz)
1021 server->lxasize = server_lxa_sz;
1022#endif
1023}
1024
fcf10398 1025static int nfs4_server_common_setup(struct nfs_server *server,
5e6b1990 1026 struct nfs_fh *mntfh, bool auth_probe)
fcf10398
BS
1027{
1028 struct nfs_fattr *fattr;
1029 int error;
1030
fcf10398
BS
1031 /* data servers support only a subset of NFSv4.1 */
1032 if (is_ds_only_client(server->nfs_client))
1033 return -EPROTONOSUPPORT;
1034
1035 fattr = nfs_alloc_fattr();
1036 if (fattr == NULL)
1037 return -ENOMEM;
1038
1039 /* We must ensure the session is initialised first */
18aad3d5 1040 error = nfs4_init_session(server->nfs_client);
fcf10398
BS
1041 if (error < 0)
1042 goto out;
1043
39c6daae
TM
1044 /* Set the basic capabilities */
1045 server->caps |= server->nfs_client->cl_mvops->init_caps;
1046 if (server->flags & NFS_MOUNT_NORDIRPLUS)
1047 server->caps &= ~NFS_CAP_READDIRPLUS;
c5675526
AS
1048 if (server->nfs_client->cl_proto == XPRT_TRANSPORT_RDMA)
1049 server->caps &= ~NFS_CAP_READ_PLUS;
39c6daae
TM
1050 /*
1051 * Don't use NFS uid/gid mapping if we're using AUTH_SYS or lower
1052 * authentication.
1053 */
1054 if (nfs4_disable_idmapping &&
1055 server->client->cl_auth->au_flavor == RPC_AUTH_UNIX)
1056 server->caps |= NFS_CAP_UIDGID_NOMAP;
1057
1058
fcf10398 1059 /* Probe the root fh to retrieve its FSID and filehandle */
5e6b1990 1060 error = nfs4_get_rootfh(server, mntfh, auth_probe);
fcf10398
BS
1061 if (error < 0)
1062 goto out;
1063
1064 dprintk("Server FSID: %llx:%llx\n",
1065 (unsigned long long) server->fsid.major,
1066 (unsigned long long) server->fsid.minor);
9e6ee76d 1067 nfs_display_fhandle(mntfh, "Pseudo-fs root FH");
fcf10398 1068
fcf10398
BS
1069 error = nfs_probe_fsinfo(server, mntfh, fattr);
1070 if (error < 0)
1071 goto out;
1072
943cff67 1073 nfs4_session_limit_rwsize(server);
04a5da69 1074 nfs4_session_limit_xasize(server);
943cff67 1075
fcf10398
BS
1076 if (server->namelen == 0 || server->namelen > NFS4_MAXNAMLEN)
1077 server->namelen = NFS4_MAXNAMLEN;
1078
1079 nfs_server_insert_lists(server);
1080 server->mount_time = jiffies;
1081 server->destroy = nfs4_destroy_server;
1082out:
1083 nfs_free_fattr(fattr);
1084 return error;
1085}
1086
1087/*
1088 * Create a version 4 volume record
1089 */
62a55d08 1090static int nfs4_init_server(struct nfs_server *server, struct fs_context *fc)
fcf10398 1091{
62a55d08 1092 struct nfs_fs_context *ctx = nfs_fc2context(fc);
fcf10398
BS
1093 struct rpc_timeout timeparms;
1094 int error;
1095
5eb005ca
DH
1096 nfs_init_timeout_values(&timeparms, ctx->nfs_server.protocol,
1097 ctx->timeo, ctx->retrans);
fcf10398
BS
1098
1099 /* Initialise the client representation from the mount data */
5eb005ca
DH
1100 server->flags = ctx->flags;
1101 server->options = ctx->options;
1102 server->auth_info = ctx->auth_info;
fcf10398 1103
4d4b69dd
WAA
1104 /* Use the first specified auth flavor. If this flavor isn't
1105 * allowed by the server, use the SECINFO path to try the
1106 * other specified flavors */
5eb005ca
DH
1107 if (ctx->auth_info.flavor_len >= 1)
1108 ctx->selected_flavor = ctx->auth_info.flavors[0];
a3f73c27 1109 else
5eb005ca 1110 ctx->selected_flavor = RPC_AUTH_UNIX;
5e6b1990 1111
fcf10398
BS
1112 /* Get a client record */
1113 error = nfs4_set_client(server,
62a55d08
SM
1114 ctx->nfs_server.hostname,
1115 &ctx->nfs_server.address,
1116 ctx->nfs_server.addrlen,
1117 ctx->client_address,
1118 ctx->nfs_server.protocol,
1119 &timeparms,
1120 ctx->minorversion,
1121 ctx->nfs_server.nconnect,
1122 fc->net_ns);
fcf10398 1123 if (error < 0)
1073d9b4 1124 return error;
fcf10398 1125
5eb005ca
DH
1126 if (ctx->rsize)
1127 server->rsize = nfs_block_size(ctx->rsize, NULL);
1128 if (ctx->wsize)
1129 server->wsize = nfs_block_size(ctx->wsize, NULL);
fcf10398 1130
5eb005ca
DH
1131 server->acregmin = ctx->acregmin * HZ;
1132 server->acregmax = ctx->acregmax * HZ;
1133 server->acdirmin = ctx->acdirmin * HZ;
1134 server->acdirmax = ctx->acdirmax * HZ;
1135 server->port = ctx->nfs_server.port;
fcf10398 1136
1073d9b4 1137 return nfs_init_server_rpcclient(server, &timeparms,
5eb005ca 1138 ctx->selected_flavor);
fcf10398
BS
1139}
1140
1141/*
1142 * Create a version 4 volume record
1143 * - keyed on server and FSID
1144 */
62a55d08 1145struct nfs_server *nfs4_create_server(struct fs_context *fc)
fcf10398 1146{
62a55d08 1147 struct nfs_fs_context *ctx = nfs_fc2context(fc);
fcf10398 1148 struct nfs_server *server;
5e6b1990 1149 bool auth_probe;
fcf10398
BS
1150 int error;
1151
fcf10398
BS
1152 server = nfs_alloc_server();
1153 if (!server)
1154 return ERR_PTR(-ENOMEM);
1155
d3ff46fe 1156 server->cred = get_cred(fc->cred);
1a58e8a0 1157
62a55d08 1158 auth_probe = ctx->auth_info.flavor_len < 1;
5e6b1990 1159
fcf10398 1160 /* set up the general RPC client */
62a55d08 1161 error = nfs4_init_server(server, fc);
fcf10398
BS
1162 if (error < 0)
1163 goto error;
1164
62a55d08 1165 error = nfs4_server_common_setup(server, ctx->mntfh, auth_probe);
fcf10398
BS
1166 if (error < 0)
1167 goto error;
1168
fcf10398
BS
1169 return server;
1170
1171error:
1172 nfs_free_server(server);
fcf10398
BS
1173 return ERR_PTR(error);
1174}
1175
1176/*
1177 * Create an NFS4 referral server record
1178 */
62a55d08 1179struct nfs_server *nfs4_create_referral_server(struct fs_context *fc)
fcf10398 1180{
62a55d08 1181 struct nfs_fs_context *ctx = nfs_fc2context(fc);
fcf10398
BS
1182 struct nfs_client *parent_client;
1183 struct nfs_server *server, *parent_server;
5837f6df 1184 bool auth_probe;
fcf10398
BS
1185 int error;
1186
fcf10398
BS
1187 server = nfs_alloc_server();
1188 if (!server)
1189 return ERR_PTR(-ENOMEM);
1190
62a55d08 1191 parent_server = NFS_SB(ctx->clone_data.sb);
fcf10398
BS
1192 parent_client = parent_server->nfs_client;
1193
1a58e8a0
TM
1194 server->cred = get_cred(parent_server->cred);
1195
fcf10398
BS
1196 /* Initialise the client representation from the parent server */
1197 nfs_server_copy_userdata(server, parent_server);
fcf10398 1198
530ea421 1199 /* Get a client representation */
23a88ade 1200#if IS_ENABLED(CONFIG_SUNRPC_XPRT_RDMA)
62a55d08
SM
1201 rpc_set_port(&ctx->nfs_server.address, NFS_RDMA_PORT);
1202 error = nfs4_set_client(server,
1203 ctx->nfs_server.hostname,
1204 &ctx->nfs_server.address,
1205 ctx->nfs_server.addrlen,
fcf10398 1206 parent_client->cl_ipaddr,
530ea421
CL
1207 XPRT_TRANSPORT_RDMA,
1208 parent_server->client->cl_timeout,
1209 parent_client->cl_mvops->minor_version,
6619079d 1210 parent_client->cl_nconnect,
530ea421
CL
1211 parent_client->cl_net);
1212 if (!error)
1213 goto init_server;
23a88ade 1214#endif /* IS_ENABLED(CONFIG_SUNRPC_XPRT_RDMA) */
530ea421 1215
62a55d08
SM
1216 rpc_set_port(&ctx->nfs_server.address, NFS_PORT);
1217 error = nfs4_set_client(server,
1218 ctx->nfs_server.hostname,
1219 &ctx->nfs_server.address,
1220 ctx->nfs_server.addrlen,
530ea421
CL
1221 parent_client->cl_ipaddr,
1222 XPRT_TRANSPORT_TCP,
fcf10398
BS
1223 parent_server->client->cl_timeout,
1224 parent_client->cl_mvops->minor_version,
6619079d 1225 parent_client->cl_nconnect,
fcf10398
BS
1226 parent_client->cl_net);
1227 if (error < 0)
1228 goto error;
1229
23a88ade 1230#if IS_ENABLED(CONFIG_SUNRPC_XPRT_RDMA)
530ea421
CL
1231init_server:
1232#endif
62a55d08
SM
1233 error = nfs_init_server_rpcclient(server, parent_server->client->cl_timeout,
1234 ctx->selected_flavor);
fcf10398
BS
1235 if (error < 0)
1236 goto error;
1237
5837f6df
WAA
1238 auth_probe = parent_server->auth_info.flavor_len < 1;
1239
62a55d08 1240 error = nfs4_server_common_setup(server, ctx->mntfh, auth_probe);
fcf10398
BS
1241 if (error < 0)
1242 goto error;
1243
fcf10398
BS
1244 return server;
1245
1246error:
1247 nfs_free_server(server);
fcf10398
BS
1248 return ERR_PTR(error);
1249}
32e62b7c
CL
1250
1251/*
1252 * Grab the destination's particulars, including lease expiry time.
1253 *
1254 * Returns zero if probe succeeded and retrieved FSID matches the FSID
1255 * we have cached.
1256 */
1257static int nfs_probe_destination(struct nfs_server *server)
1258{
2b0143b5 1259 struct inode *inode = d_inode(server->super->s_root);
32e62b7c
CL
1260 struct nfs_fattr *fattr;
1261 int error;
1262
1263 fattr = nfs_alloc_fattr();
1264 if (fattr == NULL)
1265 return -ENOMEM;
1266
1267 /* Sanity: the probe won't work if the destination server
1268 * does not recognize the migrated FH. */
1269 error = nfs_probe_fsinfo(server, NFS_FH(inode), fattr);
1270
1271 nfs_free_fattr(fattr);
1272 return error;
1273}
1274
1275/**
1276 * nfs4_update_server - Move an nfs_server to a different nfs_client
1277 *
1278 * @server: represents FSID to be moved
1279 * @hostname: new end-point's hostname
1280 * @sap: new end-point's socket address
1281 * @salen: size of "sap"
292f503c 1282 * @net: net namespace
32e62b7c
CL
1283 *
1284 * The nfs_server must be quiescent before this function is invoked.
1285 * Either its session is drained (NFSv4.1+), or its transport is
1286 * plugged and drained (NFSv4.0).
1287 *
1288 * Returns zero on success, or a negative errno value.
1289 */
1290int nfs4_update_server(struct nfs_server *server, const char *hostname,
292f503c 1291 struct sockaddr *sap, size_t salen, struct net *net)
32e62b7c
CL
1292{
1293 struct nfs_client *clp = server->nfs_client;
1294 struct rpc_clnt *clnt = server->client;
1295 struct xprt_create xargs = {
1296 .ident = clp->cl_proto,
292f503c 1297 .net = net,
32e62b7c
CL
1298 .dstaddr = sap,
1299 .addrlen = salen,
1300 .servername = hostname,
1301 };
1302 char buf[INET6_ADDRSTRLEN + 1];
1303 struct sockaddr_storage address;
1304 struct sockaddr *localaddr = (struct sockaddr *)&address;
1305 int error;
1306
32e62b7c 1307 error = rpc_switch_client_transport(clnt, &xargs, clnt->cl_timeout);
4fe6b366
AS
1308 if (error != 0)
1309 return error;
32e62b7c
CL
1310
1311 error = rpc_localaddr(clnt, localaddr, sizeof(address));
4fe6b366
AS
1312 if (error != 0)
1313 return error;
32e62b7c 1314
4fe6b366
AS
1315 if (rpc_ntop(localaddr, buf, sizeof(buf)) == 0)
1316 return -EAFNOSUPPORT;
32e62b7c
CL
1317
1318 nfs_server_remove_lists(server);
8dcbec6d 1319 set_bit(NFS_MIG_TSM_POSSIBLE, &server->mig_status);
32e62b7c 1320 error = nfs4_set_client(server, hostname, sap, salen, buf,
32e62b7c 1321 clp->cl_proto, clnt->cl_timeout,
6619079d
TM
1322 clp->cl_minorversion,
1323 clp->cl_nconnect, net);
8dcbec6d 1324 clear_bit(NFS_MIG_TSM_POSSIBLE, &server->mig_status);
32e62b7c
CL
1325 if (error != 0) {
1326 nfs_server_insert_lists(server);
4fe6b366 1327 return error;
32e62b7c 1328 }
ad86f605 1329 nfs_put_client(clp);
32e62b7c
CL
1330
1331 if (server->nfs_client->cl_hostname == NULL)
1332 server->nfs_client->cl_hostname = kstrdup(hostname, GFP_KERNEL);
1333 nfs_server_insert_lists(server);
1334
4fe6b366 1335 return nfs_probe_destination(server);
32e62b7c 1336}