NFS: Remove unused XDR decoder functions
[deliverable/linux.git] / fs / nfs / super.c
CommitLineData
f7b422b1
DH
1/*
2 * linux/fs/nfs/super.c
3 *
4 * Copyright (C) 1992 Rick Sladkey
5 *
6 * nfs superblock handling functions
7 *
526719ba 8 * Modularised by Alan Cox <alan@lxorguk.ukuu.org.uk>, while hacking some
f7b422b1
DH
9 * experimental NFS changes. Modularisation taken straight from SYS5 fs.
10 *
11 * Change to nfs_read_super() to permit NFS mounts to multi-homed hosts.
12 * J.S.Peatfield@damtp.cam.ac.uk
13 *
14 * Split from inode.c by David Howells <dhowells@redhat.com>
15 *
54ceac45
DH
16 * - superblocks are indexed on server only - all inodes, dentries, etc. associated with a
17 * particular server are held in the same superblock
18 * - NFS superblocks can have several effective roots to the dentry tree
19 * - directory type roots are spliced into the tree when a path from one root reaches the root
20 * of another (see nfs_lookup())
f7b422b1
DH
21 */
22
f7b422b1
DH
23#include <linux/module.h>
24#include <linux/init.h>
25
26#include <linux/time.h>
27#include <linux/kernel.h>
28#include <linux/mm.h>
29#include <linux/string.h>
30#include <linux/stat.h>
31#include <linux/errno.h>
32#include <linux/unistd.h>
33#include <linux/sunrpc/clnt.h>
34#include <linux/sunrpc/stats.h>
35#include <linux/sunrpc/metrics.h>
0896a725 36#include <linux/sunrpc/xprtsock.h>
2cf7ff7a 37#include <linux/sunrpc/xprtrdma.h>
f7b422b1
DH
38#include <linux/nfs_fs.h>
39#include <linux/nfs_mount.h>
40#include <linux/nfs4_mount.h>
41#include <linux/lockd/bind.h>
42#include <linux/smp_lock.h>
43#include <linux/seq_file.h>
44#include <linux/mount.h>
45#include <linux/nfs_idmap.h>
46#include <linux/vfs.h>
47#include <linux/inet.h>
fd00a8ff
CL
48#include <linux/in6.h>
49#include <net/ipv6.h>
d8e7748a 50#include <linux/netdevice.h>
f7b422b1 51#include <linux/nfs_xdr.h>
b5d5dfbd 52#include <linux/magic.h>
bf0fd768 53#include <linux/parser.h>
f7b422b1
DH
54
55#include <asm/system.h>
56#include <asm/uaccess.h>
57
58#include "nfs4_fs.h"
59#include "callback.h"
60#include "delegation.h"
61#include "iostat.h"
62#include "internal.h"
08734048 63#include "fscache.h"
f7b422b1
DH
64
65#define NFSDBG_FACILITY NFSDBG_VFS
66
bf0fd768
CL
67enum {
68 /* Mount options that take no arguments */
69 Opt_soft, Opt_hard,
bf0fd768
CL
70 Opt_posix, Opt_noposix,
71 Opt_cto, Opt_nocto,
72 Opt_ac, Opt_noac,
73 Opt_lock, Opt_nolock,
74 Opt_v2, Opt_v3,
2cf7ff7a 75 Opt_udp, Opt_tcp, Opt_rdma,
bf0fd768
CL
76 Opt_acl, Opt_noacl,
77 Opt_rdirplus, Opt_nordirplus,
75180df2 78 Opt_sharecache, Opt_nosharecache,
d740351b 79 Opt_resvport, Opt_noresvport,
b797cac7 80 Opt_fscache, Opt_nofscache,
bf0fd768
CL
81
82 /* Mount options that take integer arguments */
83 Opt_port,
84 Opt_rsize, Opt_wsize, Opt_bsize,
85 Opt_timeo, Opt_retrans,
86 Opt_acregmin, Opt_acregmax,
87 Opt_acdirmin, Opt_acdirmax,
88 Opt_actimeo,
89 Opt_namelen,
90 Opt_mountport,
e887cbcf 91 Opt_mountvers,
ad879cef 92 Opt_nfsvers,
bf0fd768
CL
93
94 /* Mount options that take string arguments */
33832034 95 Opt_sec, Opt_proto, Opt_mountproto, Opt_mounthost,
0ac83779 96 Opt_addr, Opt_mountaddr, Opt_clientaddr,
7973c1f1 97 Opt_lookupcache,
b797cac7 98 Opt_fscache_uniq,
bf0fd768 99
f45663ce
CL
100 /* Special mount options */
101 Opt_userspace, Opt_deprecated, Opt_sloppy,
bf0fd768
CL
102
103 Opt_err
104};
105
a447c093 106static const match_table_t nfs_mount_option_tokens = {
bf0fd768
CL
107 { Opt_userspace, "bg" },
108 { Opt_userspace, "fg" },
ecbb3845
CL
109 { Opt_userspace, "retry=%s" },
110
f45663ce
CL
111 { Opt_sloppy, "sloppy" },
112
bf0fd768
CL
113 { Opt_soft, "soft" },
114 { Opt_hard, "hard" },
d33e4dfe
CL
115 { Opt_deprecated, "intr" },
116 { Opt_deprecated, "nointr" },
bf0fd768
CL
117 { Opt_posix, "posix" },
118 { Opt_noposix, "noposix" },
119 { Opt_cto, "cto" },
120 { Opt_nocto, "nocto" },
121 { Opt_ac, "ac" },
122 { Opt_noac, "noac" },
123 { Opt_lock, "lock" },
124 { Opt_nolock, "nolock" },
125 { Opt_v2, "v2" },
126 { Opt_v3, "v3" },
127 { Opt_udp, "udp" },
128 { Opt_tcp, "tcp" },
2cf7ff7a 129 { Opt_rdma, "rdma" },
bf0fd768
CL
130 { Opt_acl, "acl" },
131 { Opt_noacl, "noacl" },
132 { Opt_rdirplus, "rdirplus" },
133 { Opt_nordirplus, "nordirplus" },
75180df2
TM
134 { Opt_sharecache, "sharecache" },
135 { Opt_nosharecache, "nosharecache" },
d740351b
CL
136 { Opt_resvport, "resvport" },
137 { Opt_noresvport, "noresvport" },
b797cac7
DH
138 { Opt_fscache, "fsc" },
139 { Opt_fscache_uniq, "fsc=%s" },
140 { Opt_nofscache, "nofsc" },
bf0fd768
CL
141
142 { Opt_port, "port=%u" },
143 { Opt_rsize, "rsize=%u" },
144 { Opt_wsize, "wsize=%u" },
145 { Opt_bsize, "bsize=%u" },
146 { Opt_timeo, "timeo=%u" },
147 { Opt_retrans, "retrans=%u" },
148 { Opt_acregmin, "acregmin=%u" },
149 { Opt_acregmax, "acregmax=%u" },
150 { Opt_acdirmin, "acdirmin=%u" },
151 { Opt_acdirmax, "acdirmax=%u" },
152 { Opt_actimeo, "actimeo=%u" },
bf0fd768
CL
153 { Opt_namelen, "namlen=%u" },
154 { Opt_mountport, "mountport=%u" },
bf0fd768 155 { Opt_mountvers, "mountvers=%u" },
bf0fd768
CL
156 { Opt_nfsvers, "nfsvers=%u" },
157 { Opt_nfsvers, "vers=%u" },
158
159 { Opt_sec, "sec=%s" },
160 { Opt_proto, "proto=%s" },
161 { Opt_mountproto, "mountproto=%s" },
162 { Opt_addr, "addr=%s" },
163 { Opt_clientaddr, "clientaddr=%s" },
33832034 164 { Opt_mounthost, "mounthost=%s" },
0ac83779 165 { Opt_mountaddr, "mountaddr=%s" },
bf0fd768 166
7973c1f1
TM
167 { Opt_lookupcache, "lookupcache=%s" },
168
bf0fd768
CL
169 { Opt_err, NULL }
170};
171
172enum {
2cf7ff7a 173 Opt_xprt_udp, Opt_xprt_tcp, Opt_xprt_rdma,
bf0fd768
CL
174
175 Opt_xprt_err
176};
177
a447c093 178static const match_table_t nfs_xprt_protocol_tokens = {
bf0fd768
CL
179 { Opt_xprt_udp, "udp" },
180 { Opt_xprt_tcp, "tcp" },
2cf7ff7a 181 { Opt_xprt_rdma, "rdma" },
bf0fd768
CL
182
183 { Opt_xprt_err, NULL }
184};
185
186enum {
187 Opt_sec_none, Opt_sec_sys,
188 Opt_sec_krb5, Opt_sec_krb5i, Opt_sec_krb5p,
189 Opt_sec_lkey, Opt_sec_lkeyi, Opt_sec_lkeyp,
190 Opt_sec_spkm, Opt_sec_spkmi, Opt_sec_spkmp,
191
192 Opt_sec_err
193};
194
a447c093 195static const match_table_t nfs_secflavor_tokens = {
bf0fd768
CL
196 { Opt_sec_none, "none" },
197 { Opt_sec_none, "null" },
198 { Opt_sec_sys, "sys" },
199
200 { Opt_sec_krb5, "krb5" },
201 { Opt_sec_krb5i, "krb5i" },
202 { Opt_sec_krb5p, "krb5p" },
203
204 { Opt_sec_lkey, "lkey" },
205 { Opt_sec_lkeyi, "lkeyi" },
206 { Opt_sec_lkeyp, "lkeyp" },
207
8d042218
OK
208 { Opt_sec_spkm, "spkm3" },
209 { Opt_sec_spkmi, "spkm3i" },
210 { Opt_sec_spkmp, "spkm3p" },
211
bf0fd768
CL
212 { Opt_sec_err, NULL }
213};
214
7973c1f1
TM
215enum {
216 Opt_lookupcache_all, Opt_lookupcache_positive,
217 Opt_lookupcache_none,
218
219 Opt_lookupcache_err
220};
221
222static match_table_t nfs_lookupcache_tokens = {
223 { Opt_lookupcache_all, "all" },
224 { Opt_lookupcache_positive, "pos" },
225 { Opt_lookupcache_positive, "positive" },
226 { Opt_lookupcache_none, "none" },
227
228 { Opt_lookupcache_err, NULL }
229};
230
bf0fd768 231
42faad99 232static void nfs_umount_begin(struct super_block *);
816724e6 233static int nfs_statfs(struct dentry *, struct kstatfs *);
f7b422b1
DH
234static int nfs_show_options(struct seq_file *, struct vfsmount *);
235static int nfs_show_stats(struct seq_file *, struct vfsmount *);
816724e6 236static int nfs_get_sb(struct file_system_type *, int, const char *, void *, struct vfsmount *);
54ceac45 237static int nfs_xdev_get_sb(struct file_system_type *fs_type,
816724e6 238 int flags, const char *dev_name, void *raw_data, struct vfsmount *mnt);
f7b422b1 239static void nfs_kill_super(struct super_block *);
48b605f8 240static int nfs_remount(struct super_block *sb, int *flags, char *raw_data);
f7b422b1
DH
241
242static struct file_system_type nfs_fs_type = {
243 .owner = THIS_MODULE,
244 .name = "nfs",
245 .get_sb = nfs_get_sb,
246 .kill_sb = nfs_kill_super,
349457cc 247 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_REVAL_DOT|FS_BINARY_MOUNTDATA,
f7b422b1
DH
248};
249
54ceac45 250struct file_system_type nfs_xdev_fs_type = {
f7b422b1
DH
251 .owner = THIS_MODULE,
252 .name = "nfs",
54ceac45 253 .get_sb = nfs_xdev_get_sb,
f7b422b1 254 .kill_sb = nfs_kill_super,
349457cc 255 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_REVAL_DOT|FS_BINARY_MOUNTDATA,
f7b422b1
DH
256};
257
ee9b6d61 258static const struct super_operations nfs_sops = {
f7b422b1
DH
259 .alloc_inode = nfs_alloc_inode,
260 .destroy_inode = nfs_destroy_inode,
261 .write_inode = nfs_write_inode,
262 .statfs = nfs_statfs,
263 .clear_inode = nfs_clear_inode,
264 .umount_begin = nfs_umount_begin,
265 .show_options = nfs_show_options,
266 .show_stats = nfs_show_stats,
48b605f8 267 .remount_fs = nfs_remount,
f7b422b1
DH
268};
269
270#ifdef CONFIG_NFS_V4
816724e6
TM
271static int nfs4_get_sb(struct file_system_type *fs_type,
272 int flags, const char *dev_name, void *raw_data, struct vfsmount *mnt);
54ceac45
DH
273static int nfs4_xdev_get_sb(struct file_system_type *fs_type,
274 int flags, const char *dev_name, void *raw_data, struct vfsmount *mnt);
275static int nfs4_referral_get_sb(struct file_system_type *fs_type,
276 int flags, const char *dev_name, void *raw_data, struct vfsmount *mnt);
f7b422b1
DH
277static void nfs4_kill_super(struct super_block *sb);
278
279static struct file_system_type nfs4_fs_type = {
280 .owner = THIS_MODULE,
281 .name = "nfs4",
282 .get_sb = nfs4_get_sb,
283 .kill_sb = nfs4_kill_super,
349457cc 284 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_REVAL_DOT|FS_BINARY_MOUNTDATA,
f7b422b1
DH
285};
286
54ceac45 287struct file_system_type nfs4_xdev_fs_type = {
f7b422b1
DH
288 .owner = THIS_MODULE,
289 .name = "nfs4",
54ceac45 290 .get_sb = nfs4_xdev_get_sb,
f7b422b1 291 .kill_sb = nfs4_kill_super,
349457cc 292 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_REVAL_DOT|FS_BINARY_MOUNTDATA,
f7b422b1
DH
293};
294
54ceac45 295struct file_system_type nfs4_referral_fs_type = {
f7b422b1
DH
296 .owner = THIS_MODULE,
297 .name = "nfs4",
54ceac45 298 .get_sb = nfs4_referral_get_sb,
f7b422b1 299 .kill_sb = nfs4_kill_super,
349457cc 300 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_REVAL_DOT|FS_BINARY_MOUNTDATA,
f7b422b1
DH
301};
302
ee9b6d61 303static const struct super_operations nfs4_sops = {
f7b422b1
DH
304 .alloc_inode = nfs_alloc_inode,
305 .destroy_inode = nfs_destroy_inode,
306 .write_inode = nfs_write_inode,
307 .statfs = nfs_statfs,
308 .clear_inode = nfs4_clear_inode,
309 .umount_begin = nfs_umount_begin,
310 .show_options = nfs_show_options,
311 .show_stats = nfs_show_stats,
48b605f8 312 .remount_fs = nfs_remount,
f7b422b1
DH
313};
314#endif
315
8e1f936b
RR
316static struct shrinker acl_shrinker = {
317 .shrink = nfs_access_cache_shrinker,
318 .seeks = DEFAULT_SEEKS,
319};
979df72e 320
f7b422b1
DH
321/*
322 * Register the NFS filesystems
323 */
324int __init register_nfs_fs(void)
325{
326 int ret;
327
328 ret = register_filesystem(&nfs_fs_type);
329 if (ret < 0)
330 goto error_0;
331
f7b422b1
DH
332 ret = nfs_register_sysctl();
333 if (ret < 0)
334 goto error_1;
89a09141 335#ifdef CONFIG_NFS_V4
f7b422b1
DH
336 ret = register_filesystem(&nfs4_fs_type);
337 if (ret < 0)
338 goto error_2;
339#endif
8e1f936b 340 register_shrinker(&acl_shrinker);
f7b422b1
DH
341 return 0;
342
343#ifdef CONFIG_NFS_V4
344error_2:
345 nfs_unregister_sysctl();
89a09141 346#endif
f7b422b1
DH
347error_1:
348 unregister_filesystem(&nfs_fs_type);
f7b422b1
DH
349error_0:
350 return ret;
351}
352
353/*
354 * Unregister the NFS filesystems
355 */
356void __exit unregister_nfs_fs(void)
357{
8e1f936b 358 unregister_shrinker(&acl_shrinker);
f7b422b1
DH
359#ifdef CONFIG_NFS_V4
360 unregister_filesystem(&nfs4_fs_type);
f7b422b1 361#endif
49af7ee1 362 nfs_unregister_sysctl();
f7b422b1
DH
363 unregister_filesystem(&nfs_fs_type);
364}
365
1daef0a8 366void nfs_sb_active(struct super_block *sb)
ef818a28 367{
1daef0a8 368 struct nfs_server *server = NFS_SB(sb);
ef818a28 369
1daef0a8
TM
370 if (atomic_inc_return(&server->active) == 1)
371 atomic_inc(&sb->s_active);
ef818a28
SD
372}
373
1daef0a8 374void nfs_sb_deactive(struct super_block *sb)
ef818a28
SD
375{
376 struct nfs_server *server = NFS_SB(sb);
1daef0a8
TM
377
378 if (atomic_dec_and_test(&server->active))
379 deactivate_super(sb);
ef818a28
SD
380}
381
f7b422b1
DH
382/*
383 * Deliver file system statistics to userspace
384 */
816724e6 385static int nfs_statfs(struct dentry *dentry, struct kstatfs *buf)
f7b422b1 386{
0c7d90cf 387 struct nfs_server *server = NFS_SB(dentry->d_sb);
f7b422b1
DH
388 unsigned char blockbits;
389 unsigned long blockres;
0c7d90cf 390 struct nfs_fh *fh = NFS_FH(dentry->d_inode);
f7b422b1
DH
391 struct nfs_fattr fattr;
392 struct nfs_fsstat res = {
393 .fattr = &fattr,
394 };
395 int error;
396
8fa5c000 397 error = server->nfs_client->rpc_ops->statfs(server, fh, &res);
f7b422b1
DH
398 if (error < 0)
399 goto out_err;
1a0ba9ae 400 buf->f_type = NFS_SUPER_MAGIC;
f7b422b1
DH
401
402 /*
403 * Current versions of glibc do not correctly handle the
404 * case where f_frsize != f_bsize. Eventually we want to
405 * report the value of wtmult in this field.
406 */
0c7d90cf 407 buf->f_frsize = dentry->d_sb->s_blocksize;
f7b422b1
DH
408
409 /*
410 * On most *nix systems, f_blocks, f_bfree, and f_bavail
411 * are reported in units of f_frsize. Linux hasn't had
412 * an f_frsize field in its statfs struct until recently,
413 * thus historically Linux's sys_statfs reports these
414 * fields in units of f_bsize.
415 */
0c7d90cf
DH
416 buf->f_bsize = dentry->d_sb->s_blocksize;
417 blockbits = dentry->d_sb->s_blocksize_bits;
f7b422b1
DH
418 blockres = (1 << blockbits) - 1;
419 buf->f_blocks = (res.tbytes + blockres) >> blockbits;
420 buf->f_bfree = (res.fbytes + blockres) >> blockbits;
421 buf->f_bavail = (res.abytes + blockres) >> blockbits;
422
423 buf->f_files = res.tfiles;
424 buf->f_ffree = res.afiles;
425
426 buf->f_namelen = server->namelen;
1a0ba9ae 427
f7b422b1
DH
428 return 0;
429
430 out_err:
3110ff80 431 dprintk("%s: statfs error = %d\n", __func__, -error);
1a0ba9ae 432 return error;
f7b422b1
DH
433}
434
7d4e2747
DH
435/*
436 * Map the security flavour number to a name
437 */
81039f1f
TM
438static const char *nfs_pseudoflavour_to_name(rpc_authflavor_t flavour)
439{
7d4e2747 440 static const struct {
81039f1f
TM
441 rpc_authflavor_t flavour;
442 const char *str;
443 } sec_flavours[] = {
444 { RPC_AUTH_NULL, "null" },
445 { RPC_AUTH_UNIX, "sys" },
446 { RPC_AUTH_GSS_KRB5, "krb5" },
447 { RPC_AUTH_GSS_KRB5I, "krb5i" },
448 { RPC_AUTH_GSS_KRB5P, "krb5p" },
449 { RPC_AUTH_GSS_LKEY, "lkey" },
450 { RPC_AUTH_GSS_LKEYI, "lkeyi" },
451 { RPC_AUTH_GSS_LKEYP, "lkeyp" },
452 { RPC_AUTH_GSS_SPKM, "spkm" },
453 { RPC_AUTH_GSS_SPKMI, "spkmi" },
454 { RPC_AUTH_GSS_SPKMP, "spkmp" },
4d81cd16 455 { UINT_MAX, "unknown" }
81039f1f
TM
456 };
457 int i;
458
4d81cd16 459 for (i = 0; sec_flavours[i].flavour != UINT_MAX; i++) {
81039f1f
TM
460 if (sec_flavours[i].flavour == flavour)
461 break;
462 }
463 return sec_flavours[i].str;
464}
465
82d101d5
CL
466static void nfs_show_mountd_options(struct seq_file *m, struct nfs_server *nfss,
467 int showdefaults)
468{
469 struct sockaddr *sap = (struct sockaddr *)&nfss->mountd_address;
470
471 switch (sap->sa_family) {
472 case AF_INET: {
473 struct sockaddr_in *sin = (struct sockaddr_in *)sap;
be859405 474 seq_printf(m, ",mountaddr=%pI4", &sin->sin_addr.s_addr);
82d101d5
CL
475 break;
476 }
477 case AF_INET6: {
478 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap;
5b095d98 479 seq_printf(m, ",mountaddr=%pI6", &sin6->sin6_addr);
82d101d5
CL
480 break;
481 }
482 default:
483 if (showdefaults)
484 seq_printf(m, ",mountaddr=unspecified");
485 }
486
487 if (nfss->mountd_version || showdefaults)
488 seq_printf(m, ",mountvers=%u", nfss->mountd_version);
489 if (nfss->mountd_port || showdefaults)
490 seq_printf(m, ",mountport=%u", nfss->mountd_port);
491
492 switch (nfss->mountd_protocol) {
493 case IPPROTO_UDP:
494 seq_printf(m, ",mountproto=udp");
495 break;
496 case IPPROTO_TCP:
497 seq_printf(m, ",mountproto=tcp");
498 break;
499 default:
500 if (showdefaults)
501 seq_printf(m, ",mountproto=auto");
502 }
503}
504
f7b422b1
DH
505/*
506 * Describe the mount options in force on this server representation
507 */
82d101d5
CL
508static void nfs_show_mount_options(struct seq_file *m, struct nfs_server *nfss,
509 int showdefaults)
f7b422b1 510{
509de811 511 static const struct proc_nfs_info {
f7b422b1 512 int flag;
509de811
DH
513 const char *str;
514 const char *nostr;
f7b422b1
DH
515 } nfs_info[] = {
516 { NFS_MOUNT_SOFT, ",soft", ",hard" },
82d101d5 517 { NFS_MOUNT_POSIX, ",posix", "" },
f7b422b1
DH
518 { NFS_MOUNT_NOCTO, ",nocto", "" },
519 { NFS_MOUNT_NOAC, ",noac", "" },
520 { NFS_MOUNT_NONLM, ",nolock", "" },
521 { NFS_MOUNT_NOACL, ",noacl", "" },
74dd34e6 522 { NFS_MOUNT_NORDIRPLUS, ",nordirplus", "" },
d740351b
CL
523 { NFS_MOUNT_UNSHARED, ",nosharecache", "" },
524 { NFS_MOUNT_NORESVPORT, ",noresvport", "" },
f7b422b1
DH
525 { 0, NULL, NULL }
526 };
509de811 527 const struct proc_nfs_info *nfs_infop;
8fa5c000 528 struct nfs_client *clp = nfss->nfs_client;
82d101d5 529 u32 version = clp->rpc_ops->version;
f7b422b1 530
82d101d5 531 seq_printf(m, ",vers=%u", version);
2d767432
CL
532 seq_printf(m, ",rsize=%u", nfss->rsize);
533 seq_printf(m, ",wsize=%u", nfss->wsize);
82d101d5
CL
534 if (nfss->bsize != 0)
535 seq_printf(m, ",bsize=%u", nfss->bsize);
536 seq_printf(m, ",namlen=%u", nfss->namelen);
0e0cab74 537 if (nfss->acregmin != NFS_DEF_ACREGMIN*HZ || showdefaults)
2d767432 538 seq_printf(m, ",acregmin=%u", nfss->acregmin/HZ);
0e0cab74 539 if (nfss->acregmax != NFS_DEF_ACREGMAX*HZ || showdefaults)
2d767432 540 seq_printf(m, ",acregmax=%u", nfss->acregmax/HZ);
0e0cab74 541 if (nfss->acdirmin != NFS_DEF_ACDIRMIN*HZ || showdefaults)
2d767432 542 seq_printf(m, ",acdirmin=%u", nfss->acdirmin/HZ);
0e0cab74 543 if (nfss->acdirmax != NFS_DEF_ACDIRMAX*HZ || showdefaults)
2d767432 544 seq_printf(m, ",acdirmax=%u", nfss->acdirmax/HZ);
f7b422b1
DH
545 for (nfs_infop = nfs_info; nfs_infop->flag; nfs_infop++) {
546 if (nfss->flags & nfs_infop->flag)
547 seq_puts(m, nfs_infop->str);
548 else
549 seq_puts(m, nfs_infop->nostr);
550 }
56928edd
TT
551 seq_printf(m, ",proto=%s",
552 rpc_peeraddr2str(nfss->client, RPC_DISPLAY_PROTO));
82d101d5
CL
553 if (version == 4) {
554 if (nfss->port != NFS_PORT)
555 seq_printf(m, ",port=%u", nfss->port);
556 } else
557 if (nfss->port)
558 seq_printf(m, ",port=%u", nfss->port);
559
33170233
TM
560 seq_printf(m, ",timeo=%lu", 10U * nfss->client->cl_timeout->to_initval / HZ);
561 seq_printf(m, ",retrans=%u", nfss->client->cl_timeout->to_retries);
81039f1f 562 seq_printf(m, ",sec=%s", nfs_pseudoflavour_to_name(nfss->client->cl_auth->au_flavor));
82d101d5
CL
563
564 if (version != 4)
565 nfs_show_mountd_options(m, nfss, showdefaults);
566
567#ifdef CONFIG_NFS_V4
568 if (clp->rpc_ops->version == 4)
569 seq_printf(m, ",clientaddr=%s", clp->cl_ipaddr);
570#endif
b797cac7
DH
571 if (nfss->options & NFS_OPTION_FSCACHE)
572 seq_printf(m, ",fsc");
f7b422b1
DH
573}
574
575/*
576 * Describe the mount options on this VFS mountpoint
577 */
578static int nfs_show_options(struct seq_file *m, struct vfsmount *mnt)
579{
580 struct nfs_server *nfss = NFS_SB(mnt->mnt_sb);
581
582 nfs_show_mount_options(m, nfss, 0);
583
5d8515ca
CL
584 seq_printf(m, ",addr=%s",
585 rpc_peeraddr2str(nfss->nfs_client->cl_rpcclient,
586 RPC_DISPLAY_ADDR));
f7b422b1
DH
587
588 return 0;
589}
590
591/*
592 * Present statistical information for this VFS mountpoint
593 */
594static int nfs_show_stats(struct seq_file *m, struct vfsmount *mnt)
595{
596 int i, cpu;
597 struct nfs_server *nfss = NFS_SB(mnt->mnt_sb);
598 struct rpc_auth *auth = nfss->client->cl_auth;
599 struct nfs_iostats totals = { };
600
601 seq_printf(m, "statvers=%s", NFS_IOSTAT_VERS);
602
603 /*
604 * Display all mount option settings
605 */
606 seq_printf(m, "\n\topts:\t");
607 seq_puts(m, mnt->mnt_sb->s_flags & MS_RDONLY ? "ro" : "rw");
608 seq_puts(m, mnt->mnt_sb->s_flags & MS_SYNCHRONOUS ? ",sync" : "");
609 seq_puts(m, mnt->mnt_sb->s_flags & MS_NOATIME ? ",noatime" : "");
610 seq_puts(m, mnt->mnt_sb->s_flags & MS_NODIRATIME ? ",nodiratime" : "");
611 nfs_show_mount_options(m, nfss, 1);
612
613 seq_printf(m, "\n\tage:\t%lu", (jiffies - nfss->mount_time) / HZ);
614
615 seq_printf(m, "\n\tcaps:\t");
616 seq_printf(m, "caps=0x%x", nfss->caps);
2d767432
CL
617 seq_printf(m, ",wtmult=%u", nfss->wtmult);
618 seq_printf(m, ",dtsize=%u", nfss->dtsize);
619 seq_printf(m, ",bsize=%u", nfss->bsize);
620 seq_printf(m, ",namlen=%u", nfss->namelen);
f7b422b1
DH
621
622#ifdef CONFIG_NFS_V4
40c55319 623 if (nfss->nfs_client->rpc_ops->version == 4) {
f7b422b1
DH
624 seq_printf(m, "\n\tnfsv4:\t");
625 seq_printf(m, "bm0=0x%x", nfss->attr_bitmask[0]);
626 seq_printf(m, ",bm1=0x%x", nfss->attr_bitmask[1]);
627 seq_printf(m, ",acl=0x%x", nfss->acl_bitmask);
628 }
629#endif
630
631 /*
632 * Display security flavor in effect for this mount
633 */
2d767432 634 seq_printf(m, "\n\tsec:\tflavor=%u", auth->au_ops->au_flavor);
f7b422b1 635 if (auth->au_flavor)
2d767432 636 seq_printf(m, ",pseudoflavor=%u", auth->au_flavor);
f7b422b1
DH
637
638 /*
639 * Display superblock I/O counters
640 */
641 for_each_possible_cpu(cpu) {
642 struct nfs_iostats *stats;
643
644 preempt_disable();
645 stats = per_cpu_ptr(nfss->io_stats, cpu);
646
647 for (i = 0; i < __NFSIOS_COUNTSMAX; i++)
648 totals.events[i] += stats->events[i];
649 for (i = 0; i < __NFSIOS_BYTESMAX; i++)
650 totals.bytes[i] += stats->bytes[i];
6a51091d
DH
651#ifdef CONFIG_NFS_FSCACHE
652 for (i = 0; i < __NFSIOS_FSCACHEMAX; i++)
653 totals.fscache[i] += stats->fscache[i];
654#endif
f7b422b1
DH
655
656 preempt_enable();
657 }
658
659 seq_printf(m, "\n\tevents:\t");
660 for (i = 0; i < __NFSIOS_COUNTSMAX; i++)
661 seq_printf(m, "%lu ", totals.events[i]);
662 seq_printf(m, "\n\tbytes:\t");
663 for (i = 0; i < __NFSIOS_BYTESMAX; i++)
664 seq_printf(m, "%Lu ", totals.bytes[i]);
6a51091d
DH
665#ifdef CONFIG_NFS_FSCACHE
666 if (nfss->options & NFS_OPTION_FSCACHE) {
667 seq_printf(m, "\n\tfsc:\t");
668 for (i = 0; i < __NFSIOS_FSCACHEMAX; i++)
669 seq_printf(m, "%Lu ", totals.bytes[i]);
670 }
671#endif
f7b422b1
DH
672 seq_printf(m, "\n");
673
674 rpc_print_iostats(m, nfss->client);
675
676 return 0;
677}
678
679/*
680 * Begin unmount by attempting to remove all automounted mountpoints we added
54ceac45 681 * in response to xdev traversals and referrals
f7b422b1 682 */
42faad99 683static void nfs_umount_begin(struct super_block *sb)
f7b422b1 684{
67e55205 685 struct nfs_server *server;
fc6ae3cf
TM
686 struct rpc_clnt *rpc;
687
67e55205
AIB
688 lock_kernel();
689
690 server = NFS_SB(sb);
fc6ae3cf
TM
691 /* -EIO all pending I/O */
692 rpc = server->client_acl;
693 if (!IS_ERR(rpc))
694 rpc_killall_tasks(rpc);
695 rpc = server->client;
696 if (!IS_ERR(rpc))
697 rpc_killall_tasks(rpc);
67e55205
AIB
698
699 unlock_kernel();
f7b422b1
DH
700}
701
fc50d58f 702/*
cdcd7f9a
CL
703 * Sanity-check a server address provided by the mount command.
704 *
705 * Address family must be initialized, and address must not be
706 * the ANY address for that family.
fc50d58f
CL
707 */
708static int nfs_verify_server_address(struct sockaddr *addr)
709{
710 switch (addr->sa_family) {
711 case AF_INET: {
cdcd7f9a 712 struct sockaddr_in *sa = (struct sockaddr_in *)addr;
e6f1cebf 713 return sa->sin_addr.s_addr != htonl(INADDR_ANY);
cdcd7f9a
CL
714 }
715 case AF_INET6: {
716 struct in6_addr *sa = &((struct sockaddr_in6 *)addr)->sin6_addr;
717 return !ipv6_addr_any(sa);
fc50d58f
CL
718 }
719 }
720
721 return 0;
722}
723
ce3b7e19
CL
724static void nfs_parse_ipv4_address(char *string, size_t str_len,
725 struct sockaddr *sap, size_t *addr_len)
9412b927 726{
ce3b7e19
CL
727 struct sockaddr_in *sin = (struct sockaddr_in *)sap;
728 u8 *addr = (u8 *)&sin->sin_addr.s_addr;
9412b927 729
ce3b7e19
CL
730 if (str_len <= INET_ADDRSTRLEN) {
731 dfprintk(MOUNT, "NFS: parsing IPv4 address %*s\n",
732 (int)str_len, string);
733
734 sin->sin_family = AF_INET;
735 *addr_len = sizeof(*sin);
736 if (in4_pton(string, str_len, addr, '\0', NULL))
3c7c7e48 737 return;
ce3b7e19
CL
738 }
739
740 sap->sa_family = AF_UNSPEC;
741 *addr_len = 0;
742}
743
744#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
5e2e7721
CL
745static int nfs_parse_ipv6_scope_id(const char *string, const size_t str_len,
746 const char *delim,
747 struct sockaddr_in6 *sin6)
d8e7748a
CL
748{
749 char *p;
750 size_t len;
751
5e2e7721
CL
752 if ((string + str_len) == delim)
753 return 1;
754
d8e7748a 755 if (*delim != IPV6_SCOPE_DELIMITER)
5e2e7721
CL
756 return 0;
757
758 if (!(ipv6_addr_type(&sin6->sin6_addr) & IPV6_ADDR_LINKLOCAL))
759 return 0;
d8e7748a
CL
760
761 len = (string + str_len) - delim - 1;
762 p = kstrndup(delim + 1, len, GFP_KERNEL);
763 if (p) {
764 unsigned long scope_id = 0;
765 struct net_device *dev;
766
767 dev = dev_get_by_name(&init_net, p);
768 if (dev != NULL) {
769 scope_id = dev->ifindex;
770 dev_put(dev);
771 } else {
5e2e7721
CL
772 if (strict_strtoul(p, 10, &scope_id) == 0) {
773 kfree(p);
774 return 0;
775 }
d8e7748a
CL
776 }
777
778 kfree(p);
5e2e7721 779
d8e7748a
CL
780 sin6->sin6_scope_id = scope_id;
781 dfprintk(MOUNT, "NFS: IPv6 scope ID = %lu\n", scope_id);
5e2e7721 782 return 1;
d8e7748a 783 }
5e2e7721
CL
784
785 return 0;
d8e7748a
CL
786}
787
ce3b7e19
CL
788static void nfs_parse_ipv6_address(char *string, size_t str_len,
789 struct sockaddr *sap, size_t *addr_len)
790{
791 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap;
792 u8 *addr = (u8 *)&sin6->sin6_addr.in6_u;
d8e7748a 793 const char *delim;
ce3b7e19
CL
794
795 if (str_len <= INET6_ADDRSTRLEN) {
796 dfprintk(MOUNT, "NFS: parsing IPv6 address %*s\n",
797 (int)str_len, string);
3c7c7e48 798
ce3b7e19
CL
799 sin6->sin6_family = AF_INET6;
800 *addr_len = sizeof(*sin6);
5e2e7721
CL
801 if (in6_pton(string, str_len, addr,
802 IPV6_SCOPE_DELIMITER, &delim) != 0) {
803 if (nfs_parse_ipv6_scope_id(string, str_len,
804 delim, sin6) != 0)
805 return;
d8e7748a 806 }
3c7c7e48 807 }
9412b927
CL
808
809 sap->sa_family = AF_UNSPEC;
ce3b7e19
CL
810 *addr_len = 0;
811}
812#else
813static void nfs_parse_ipv6_address(char *string, size_t str_len,
814 struct sockaddr *sap, size_t *addr_len)
815{
816 sap->sa_family = AF_UNSPEC;
817 *addr_len = 0;
818}
819#endif
820
821/*
822 * Construct a sockaddr based on the contents of a string that contains
823 * an IP address in presentation format.
824 *
825 * If there is a problem constructing the new sockaddr, set the address
826 * family to AF_UNSPEC.
827 */
ea31a443 828void nfs_parse_ip_address(char *string, size_t str_len,
ce3b7e19
CL
829 struct sockaddr *sap, size_t *addr_len)
830{
831 unsigned int i, colons;
832
833 colons = 0;
834 for (i = 0; i < str_len; i++)
835 if (string[i] == ':')
836 colons++;
837
838 if (colons >= 2)
839 nfs_parse_ipv6_address(string, str_len, sap, addr_len);
840 else
841 nfs_parse_ipv4_address(string, str_len, sap, addr_len);
9412b927
CL
842}
843
259875ef
TM
844/*
845 * Sanity check the NFS transport protocol.
846 *
847 */
848static void nfs_validate_transport_protocol(struct nfs_parsed_mount_data *mnt)
849{
850 switch (mnt->nfs_server.protocol) {
851 case XPRT_TRANSPORT_UDP:
852 case XPRT_TRANSPORT_TCP:
853 case XPRT_TRANSPORT_RDMA:
854 break;
855 default:
856 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
857 }
858}
859
860/*
861 * For text based NFSv2/v3 mounts, the mount protocol transport default
862 * settings should depend upon the specified NFS transport.
863 */
864static void nfs_set_mount_transport_protocol(struct nfs_parsed_mount_data *mnt)
865{
866 nfs_validate_transport_protocol(mnt);
867
868 if (mnt->mount_server.protocol == XPRT_TRANSPORT_UDP ||
869 mnt->mount_server.protocol == XPRT_TRANSPORT_TCP)
870 return;
871 switch (mnt->nfs_server.protocol) {
872 case XPRT_TRANSPORT_UDP:
873 mnt->mount_server.protocol = XPRT_TRANSPORT_UDP;
874 break;
875 case XPRT_TRANSPORT_TCP:
876 case XPRT_TRANSPORT_RDMA:
877 mnt->mount_server.protocol = XPRT_TRANSPORT_TCP;
878 }
879}
880
01060c89
CL
881/*
882 * Parse the value of the 'sec=' option.
883 *
dd07c947 884 * The flavor_len setting is for v4 mounts.
01060c89
CL
885 */
886static int nfs_parse_security_flavors(char *value,
887 struct nfs_parsed_mount_data *mnt)
888{
889 substring_t args[MAX_OPT_ARGS];
890
891 dfprintk(MOUNT, "NFS: parsing sec=%s option\n", value);
892
893 switch (match_token(value, nfs_secflavor_tokens, args)) {
894 case Opt_sec_none:
01060c89
CL
895 mnt->auth_flavor_len = 0;
896 mnt->auth_flavors[0] = RPC_AUTH_NULL;
897 break;
898 case Opt_sec_sys:
01060c89
CL
899 mnt->auth_flavor_len = 0;
900 mnt->auth_flavors[0] = RPC_AUTH_UNIX;
901 break;
902 case Opt_sec_krb5:
01060c89
CL
903 mnt->auth_flavor_len = 1;
904 mnt->auth_flavors[0] = RPC_AUTH_GSS_KRB5;
905 break;
906 case Opt_sec_krb5i:
01060c89
CL
907 mnt->auth_flavor_len = 1;
908 mnt->auth_flavors[0] = RPC_AUTH_GSS_KRB5I;
909 break;
910 case Opt_sec_krb5p:
01060c89
CL
911 mnt->auth_flavor_len = 1;
912 mnt->auth_flavors[0] = RPC_AUTH_GSS_KRB5P;
913 break;
914 case Opt_sec_lkey:
01060c89
CL
915 mnt->auth_flavor_len = 1;
916 mnt->auth_flavors[0] = RPC_AUTH_GSS_LKEY;
917 break;
918 case Opt_sec_lkeyi:
01060c89
CL
919 mnt->auth_flavor_len = 1;
920 mnt->auth_flavors[0] = RPC_AUTH_GSS_LKEYI;
921 break;
922 case Opt_sec_lkeyp:
01060c89
CL
923 mnt->auth_flavor_len = 1;
924 mnt->auth_flavors[0] = RPC_AUTH_GSS_LKEYP;
925 break;
926 case Opt_sec_spkm:
01060c89
CL
927 mnt->auth_flavor_len = 1;
928 mnt->auth_flavors[0] = RPC_AUTH_GSS_SPKM;
929 break;
930 case Opt_sec_spkmi:
01060c89
CL
931 mnt->auth_flavor_len = 1;
932 mnt->auth_flavors[0] = RPC_AUTH_GSS_SPKMI;
933 break;
934 case Opt_sec_spkmp:
01060c89
CL
935 mnt->auth_flavor_len = 1;
936 mnt->auth_flavors[0] = RPC_AUTH_GSS_SPKMP;
937 break;
938 default:
939 return 0;
940 }
941
942 return 1;
943}
944
f45663ce
CL
945static void nfs_parse_invalid_value(const char *option)
946{
947 dfprintk(MOUNT, "NFS: bad value specified for %s option\n", option);
948}
949
bf0fd768
CL
950/*
951 * Error-check and convert a string of mount options from user space into
f45663ce
CL
952 * a data structure. The whole mount string is processed; bad options are
953 * skipped as they are encountered. If there were no errors, return 1;
954 * otherwise return 0 (zero).
bf0fd768
CL
955 */
956static int nfs_parse_mount_options(char *raw,
957 struct nfs_parsed_mount_data *mnt)
958{
f9c3a380 959 char *p, *string, *secdata;
f45663ce 960 int rc, sloppy = 0, errors = 0;
bf0fd768
CL
961
962 if (!raw) {
963 dfprintk(MOUNT, "NFS: mount options string was NULL.\n");
964 return 1;
965 }
966 dfprintk(MOUNT, "NFS: nfs mount opts='%s'\n", raw);
967
f9c3a380
EP
968 secdata = alloc_secdata();
969 if (!secdata)
970 goto out_nomem;
971
972 rc = security_sb_copy_data(raw, secdata);
973 if (rc)
974 goto out_security_failure;
975
976 rc = security_sb_parse_opts_str(secdata, &mnt->lsm_opts);
977 if (rc)
978 goto out_security_failure;
979
980 free_secdata(secdata);
981
bf0fd768
CL
982 while ((p = strsep(&raw, ",")) != NULL) {
983 substring_t args[MAX_OPT_ARGS];
984 int option, token;
985
986 if (!*p)
987 continue;
988
989 dfprintk(MOUNT, "NFS: parsing nfs mount option '%s'\n", p);
990
991 token = match_token(p, nfs_mount_option_tokens, args);
992 switch (token) {
f45663ce
CL
993
994 /*
995 * boolean options: foo/nofoo
996 */
bf0fd768
CL
997 case Opt_soft:
998 mnt->flags |= NFS_MOUNT_SOFT;
999 break;
1000 case Opt_hard:
1001 mnt->flags &= ~NFS_MOUNT_SOFT;
1002 break;
bf0fd768
CL
1003 case Opt_posix:
1004 mnt->flags |= NFS_MOUNT_POSIX;
1005 break;
1006 case Opt_noposix:
1007 mnt->flags &= ~NFS_MOUNT_POSIX;
1008 break;
1009 case Opt_cto:
1010 mnt->flags &= ~NFS_MOUNT_NOCTO;
1011 break;
1012 case Opt_nocto:
1013 mnt->flags |= NFS_MOUNT_NOCTO;
1014 break;
1015 case Opt_ac:
1016 mnt->flags &= ~NFS_MOUNT_NOAC;
1017 break;
1018 case Opt_noac:
1019 mnt->flags |= NFS_MOUNT_NOAC;
1020 break;
1021 case Opt_lock:
1022 mnt->flags &= ~NFS_MOUNT_NONLM;
1023 break;
1024 case Opt_nolock:
1025 mnt->flags |= NFS_MOUNT_NONLM;
1026 break;
1027 case Opt_v2:
1028 mnt->flags &= ~NFS_MOUNT_VER3;
1029 break;
1030 case Opt_v3:
1031 mnt->flags |= NFS_MOUNT_VER3;
1032 break;
1033 case Opt_udp:
1034 mnt->flags &= ~NFS_MOUNT_TCP;
0896a725 1035 mnt->nfs_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768
CL
1036 break;
1037 case Opt_tcp:
1038 mnt->flags |= NFS_MOUNT_TCP;
0896a725 1039 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1040 break;
2cf7ff7a
TT
1041 case Opt_rdma:
1042 mnt->flags |= NFS_MOUNT_TCP; /* for side protocols */
1043 mnt->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
a67d18f8 1044 xprt_load_transport(p);
2cf7ff7a 1045 break;
bf0fd768
CL
1046 case Opt_acl:
1047 mnt->flags &= ~NFS_MOUNT_NOACL;
1048 break;
1049 case Opt_noacl:
1050 mnt->flags |= NFS_MOUNT_NOACL;
1051 break;
1052 case Opt_rdirplus:
1053 mnt->flags &= ~NFS_MOUNT_NORDIRPLUS;
1054 break;
1055 case Opt_nordirplus:
1056 mnt->flags |= NFS_MOUNT_NORDIRPLUS;
1057 break;
75180df2
TM
1058 case Opt_sharecache:
1059 mnt->flags &= ~NFS_MOUNT_UNSHARED;
1060 break;
1061 case Opt_nosharecache:
1062 mnt->flags |= NFS_MOUNT_UNSHARED;
1063 break;
d740351b
CL
1064 case Opt_resvport:
1065 mnt->flags &= ~NFS_MOUNT_NORESVPORT;
1066 break;
1067 case Opt_noresvport:
1068 mnt->flags |= NFS_MOUNT_NORESVPORT;
1069 break;
b797cac7
DH
1070 case Opt_fscache:
1071 mnt->options |= NFS_OPTION_FSCACHE;
1072 kfree(mnt->fscache_uniq);
1073 mnt->fscache_uniq = NULL;
1074 break;
1075 case Opt_nofscache:
1076 mnt->options &= ~NFS_OPTION_FSCACHE;
1077 kfree(mnt->fscache_uniq);
1078 mnt->fscache_uniq = NULL;
1079 break;
1080 case Opt_fscache_uniq:
1081 string = match_strdup(args);
1082 if (!string)
1083 goto out_nomem;
1084 kfree(mnt->fscache_uniq);
1085 mnt->fscache_uniq = string;
1086 mnt->options |= NFS_OPTION_FSCACHE;
1087 break;
bf0fd768 1088
f45663ce
CL
1089 /*
1090 * options that take numeric values
1091 */
bf0fd768 1092 case Opt_port:
f45663ce
CL
1093 if (match_int(args, &option) ||
1094 option < 0 || option > USHORT_MAX) {
1095 errors++;
1096 nfs_parse_invalid_value("port");
1097 } else
1098 mnt->nfs_server.port = option;
bf0fd768
CL
1099 break;
1100 case Opt_rsize:
f45663ce
CL
1101 if (match_int(args, &option) || option < 0) {
1102 errors++;
1103 nfs_parse_invalid_value("rsize");
1104 } else
1105 mnt->rsize = option;
bf0fd768
CL
1106 break;
1107 case Opt_wsize:
f45663ce
CL
1108 if (match_int(args, &option) || option < 0) {
1109 errors++;
1110 nfs_parse_invalid_value("wsize");
1111 } else
1112 mnt->wsize = option;
bf0fd768
CL
1113 break;
1114 case Opt_bsize:
f45663ce
CL
1115 if (match_int(args, &option) || option < 0) {
1116 errors++;
1117 nfs_parse_invalid_value("bsize");
1118 } else
1119 mnt->bsize = option;
bf0fd768
CL
1120 break;
1121 case Opt_timeo:
f45663ce
CL
1122 if (match_int(args, &option) || option <= 0) {
1123 errors++;
1124 nfs_parse_invalid_value("timeo");
1125 } else
1126 mnt->timeo = option;
bf0fd768
CL
1127 break;
1128 case Opt_retrans:
f45663ce
CL
1129 if (match_int(args, &option) || option <= 0) {
1130 errors++;
1131 nfs_parse_invalid_value("retrans");
1132 } else
1133 mnt->retrans = option;
bf0fd768
CL
1134 break;
1135 case Opt_acregmin:
f45663ce
CL
1136 if (match_int(args, &option) || option < 0) {
1137 errors++;
1138 nfs_parse_invalid_value("acregmin");
1139 } else
1140 mnt->acregmin = option;
bf0fd768
CL
1141 break;
1142 case Opt_acregmax:
f45663ce
CL
1143 if (match_int(args, &option) || option < 0) {
1144 errors++;
1145 nfs_parse_invalid_value("acregmax");
1146 } else
1147 mnt->acregmax = option;
bf0fd768
CL
1148 break;
1149 case Opt_acdirmin:
f45663ce
CL
1150 if (match_int(args, &option) || option < 0) {
1151 errors++;
1152 nfs_parse_invalid_value("acdirmin");
1153 } else
1154 mnt->acdirmin = option;
bf0fd768
CL
1155 break;
1156 case Opt_acdirmax:
f45663ce
CL
1157 if (match_int(args, &option) || option < 0) {
1158 errors++;
1159 nfs_parse_invalid_value("acdirmax");
1160 } else
1161 mnt->acdirmax = option;
bf0fd768
CL
1162 break;
1163 case Opt_actimeo:
f45663ce
CL
1164 if (match_int(args, &option) || option < 0) {
1165 errors++;
1166 nfs_parse_invalid_value("actimeo");
1167 } else
1168 mnt->acregmin = mnt->acregmax =
1169 mnt->acdirmin = mnt->acdirmax = option;
bf0fd768
CL
1170 break;
1171 case Opt_namelen:
f45663ce
CL
1172 if (match_int(args, &option) || option < 0) {
1173 errors++;
1174 nfs_parse_invalid_value("namlen");
1175 } else
1176 mnt->namlen = option;
bf0fd768
CL
1177 break;
1178 case Opt_mountport:
f45663ce
CL
1179 if (match_int(args, &option) ||
1180 option < 0 || option > USHORT_MAX) {
1181 errors++;
1182 nfs_parse_invalid_value("mountport");
1183 } else
1184 mnt->mount_server.port = option;
bf0fd768 1185 break;
bf0fd768 1186 case Opt_mountvers:
f45663ce
CL
1187 if (match_int(args, &option) ||
1188 option < NFS_MNT_VERSION ||
1189 option > NFS_MNT3_VERSION) {
1190 errors++;
1191 nfs_parse_invalid_value("mountvers");
1192 } else
1193 mnt->mount_server.version = option;
bf0fd768 1194 break;
bf0fd768 1195 case Opt_nfsvers:
f45663ce
CL
1196 if (match_int(args, &option)) {
1197 errors++;
1198 nfs_parse_invalid_value("nfsvers");
1199 break;
1200 }
bf0fd768 1201 switch (option) {
f45663ce 1202 case NFS2_VERSION:
bf0fd768
CL
1203 mnt->flags &= ~NFS_MOUNT_VER3;
1204 break;
f45663ce 1205 case NFS3_VERSION:
bf0fd768
CL
1206 mnt->flags |= NFS_MOUNT_VER3;
1207 break;
1208 default:
f45663ce
CL
1209 errors++;
1210 nfs_parse_invalid_value("nfsvers");
bf0fd768
CL
1211 }
1212 break;
1213
f45663ce
CL
1214 /*
1215 * options that take text values
1216 */
bf0fd768
CL
1217 case Opt_sec:
1218 string = match_strdup(args);
1219 if (string == NULL)
1220 goto out_nomem;
01060c89 1221 rc = nfs_parse_security_flavors(string, mnt);
bf0fd768 1222 kfree(string);
f45663ce
CL
1223 if (!rc) {
1224 errors++;
1225 dfprintk(MOUNT, "NFS: unrecognized "
1226 "security flavor\n");
1227 }
bf0fd768
CL
1228 break;
1229 case Opt_proto:
1230 string = match_strdup(args);
1231 if (string == NULL)
1232 goto out_nomem;
1233 token = match_token(string,
1234 nfs_xprt_protocol_tokens, args);
bf0fd768
CL
1235
1236 switch (token) {
fdb66ff4 1237 case Opt_xprt_udp:
bf0fd768 1238 mnt->flags &= ~NFS_MOUNT_TCP;
0896a725 1239 mnt->nfs_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768 1240 break;
fdb66ff4 1241 case Opt_xprt_tcp:
bf0fd768 1242 mnt->flags |= NFS_MOUNT_TCP;
0896a725 1243 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1244 break;
2cf7ff7a
TT
1245 case Opt_xprt_rdma:
1246 /* vector side protocols to TCP */
1247 mnt->flags |= NFS_MOUNT_TCP;
1248 mnt->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
a67d18f8 1249 xprt_load_transport(string);
2cf7ff7a 1250 break;
bf0fd768 1251 default:
f45663ce
CL
1252 errors++;
1253 dfprintk(MOUNT, "NFS: unrecognized "
1254 "transport protocol\n");
bf0fd768 1255 }
a67d18f8 1256 kfree(string);
bf0fd768
CL
1257 break;
1258 case Opt_mountproto:
1259 string = match_strdup(args);
1260 if (string == NULL)
1261 goto out_nomem;
1262 token = match_token(string,
1263 nfs_xprt_protocol_tokens, args);
d508afb4 1264 kfree(string);
bf0fd768
CL
1265
1266 switch (token) {
fdb66ff4 1267 case Opt_xprt_udp:
0896a725 1268 mnt->mount_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768 1269 break;
fdb66ff4 1270 case Opt_xprt_tcp:
0896a725 1271 mnt->mount_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1272 break;
2cf7ff7a 1273 case Opt_xprt_rdma: /* not used for side protocols */
bf0fd768 1274 default:
f45663ce
CL
1275 errors++;
1276 dfprintk(MOUNT, "NFS: unrecognized "
1277 "transport protocol\n");
bf0fd768
CL
1278 }
1279 break;
1280 case Opt_addr:
1281 string = match_strdup(args);
1282 if (string == NULL)
1283 goto out_nomem;
ce3b7e19
CL
1284 nfs_parse_ip_address(string, strlen(string),
1285 (struct sockaddr *)
1286 &mnt->nfs_server.address,
1287 &mnt->nfs_server.addrlen);
bf0fd768
CL
1288 kfree(string);
1289 break;
1290 case Opt_clientaddr:
1291 string = match_strdup(args);
1292 if (string == NULL)
1293 goto out_nomem;
fc601477 1294 kfree(mnt->client_address);
bf0fd768
CL
1295 mnt->client_address = string;
1296 break;
33832034
CL
1297 case Opt_mounthost:
1298 string = match_strdup(args);
1299 if (string == NULL)
1300 goto out_nomem;
fc601477 1301 kfree(mnt->mount_server.hostname);
33832034
CL
1302 mnt->mount_server.hostname = string;
1303 break;
0ac83779 1304 case Opt_mountaddr:
bf0fd768
CL
1305 string = match_strdup(args);
1306 if (string == NULL)
1307 goto out_nomem;
ce3b7e19
CL
1308 nfs_parse_ip_address(string, strlen(string),
1309 (struct sockaddr *)
1310 &mnt->mount_server.address,
1311 &mnt->mount_server.addrlen);
bf0fd768
CL
1312 kfree(string);
1313 break;
7973c1f1
TM
1314 case Opt_lookupcache:
1315 string = match_strdup(args);
1316 if (string == NULL)
1317 goto out_nomem;
1318 token = match_token(string,
1319 nfs_lookupcache_tokens, args);
1320 kfree(string);
1321 switch (token) {
1322 case Opt_lookupcache_all:
1323 mnt->flags &= ~(NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE);
1324 break;
1325 case Opt_lookupcache_positive:
1326 mnt->flags &= ~NFS_MOUNT_LOOKUP_CACHE_NONE;
1327 mnt->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG;
1328 break;
1329 case Opt_lookupcache_none:
1330 mnt->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE;
1331 break;
1332 default:
1333 errors++;
1334 dfprintk(MOUNT, "NFS: invalid "
1335 "lookupcache argument\n");
1336 };
1337 break;
bf0fd768 1338
f45663ce
CL
1339 /*
1340 * Special options
1341 */
1342 case Opt_sloppy:
1343 sloppy = 1;
1344 dfprintk(MOUNT, "NFS: relaxing parsing rules\n");
1345 break;
bf0fd768
CL
1346 case Opt_userspace:
1347 case Opt_deprecated:
d33e4dfe
CL
1348 dfprintk(MOUNT, "NFS: ignoring mount option "
1349 "'%s'\n", p);
bf0fd768
CL
1350 break;
1351
1352 default:
f45663ce
CL
1353 errors++;
1354 dfprintk(MOUNT, "NFS: unrecognized mount option "
1355 "'%s'\n", p);
bf0fd768
CL
1356 }
1357 }
1358
af904dea
CL
1359 if (errors > 0) {
1360 dfprintk(MOUNT, "NFS: parsing encountered %d error%s\n",
1361 errors, (errors == 1 ? "" : "s"));
1362 if (!sloppy)
1363 return 0;
1364 }
bf0fd768
CL
1365 return 1;
1366
1367out_nomem:
1368 printk(KERN_INFO "NFS: not enough memory to parse option\n");
1369 return 0;
f9c3a380
EP
1370out_security_failure:
1371 free_secdata(secdata);
1372 printk(KERN_INFO "NFS: security options invalid: %d\n", rc);
1373 return 0;
bf0fd768
CL
1374}
1375
0076d7b7
CL
1376/*
1377 * Use the remote server's MOUNT service to request the NFS file handle
1378 * corresponding to the provided path.
1379 */
1380static int nfs_try_mount(struct nfs_parsed_mount_data *args,
1381 struct nfs_fh *root_fh)
1382{
8e02f6b9 1383 unsigned int auth_flavor_len = 0;
c5d120f8
CL
1384 struct nfs_mount_request request = {
1385 .sap = (struct sockaddr *)
1386 &args->mount_server.address,
1387 .dirpath = args->nfs_server.export_path,
1388 .protocol = args->mount_server.protocol,
1389 .fh = root_fh,
50a737f8 1390 .noresvport = args->flags & NFS_MOUNT_NORESVPORT,
8e02f6b9 1391 .auth_flav_len = &auth_flavor_len,
c5d120f8 1392 };
4c568017 1393 int status;
0076d7b7
CL
1394
1395 if (args->mount_server.version == 0) {
1396 if (args->flags & NFS_MOUNT_VER3)
1397 args->mount_server.version = NFS_MNT3_VERSION;
1398 else
1399 args->mount_server.version = NFS_MNT_VERSION;
1400 }
c5d120f8 1401 request.version = args->mount_server.version;
0076d7b7 1402
33832034 1403 if (args->mount_server.hostname)
c5d120f8 1404 request.hostname = args->mount_server.hostname;
33832034 1405 else
c5d120f8 1406 request.hostname = args->nfs_server.hostname;
33832034 1407
0076d7b7
CL
1408 /*
1409 * Construct the mount server's address.
1410 */
4c568017 1411 if (args->mount_server.address.ss_family == AF_UNSPEC) {
c5d120f8 1412 memcpy(request.sap, &args->nfs_server.address,
4c568017
CL
1413 args->nfs_server.addrlen);
1414 args->mount_server.addrlen = args->nfs_server.addrlen;
1415 }
c5d120f8 1416 request.salen = args->mount_server.addrlen;
4c568017 1417
aad70007
JL
1418 /*
1419 * autobind will be used if mount_server.port == 0
1420 */
c5d120f8 1421 nfs_set_port(request.sap, args->mount_server.port);
0076d7b7
CL
1422
1423 /*
1424 * Now ask the mount server to map our export path
1425 * to a file handle.
1426 */
c5d120f8 1427 status = nfs_mount(&request);
efd8340b
CL
1428 if (status == 0)
1429 return 0;
0076d7b7 1430
396cee97 1431 dfprintk(MOUNT, "NFS: unable to mount server %s, error %d\n",
c5d120f8 1432 request.hostname, status);
0076d7b7
CL
1433 return status;
1434}
1435
d1aa0825
CL
1436static int nfs_parse_simple_hostname(const char *dev_name,
1437 char **hostname, size_t maxnamlen,
1438 char **export_path, size_t maxpathlen)
dc045898
CL
1439{
1440 size_t len;
1441 char *colon, *comma;
1442
1443 colon = strchr(dev_name, ':');
1444 if (colon == NULL)
1445 goto out_bad_devname;
1446
1447 len = colon - dev_name;
1448 if (len > maxnamlen)
1449 goto out_hostname;
1450
1451 /* N.B. caller will free nfs_server.hostname in all cases */
1452 *hostname = kstrndup(dev_name, len, GFP_KERNEL);
1453 if (!*hostname)
1454 goto out_nomem;
1455
1456 /* kill possible hostname list: not supported */
1457 comma = strchr(*hostname, ',');
1458 if (comma != NULL) {
1459 if (comma == *hostname)
1460 goto out_bad_devname;
1461 *comma = '\0';
1462 }
1463
1464 colon++;
1465 len = strlen(colon);
1466 if (len > maxpathlen)
1467 goto out_path;
1468 *export_path = kstrndup(colon, len, GFP_KERNEL);
1469 if (!*export_path)
1470 goto out_nomem;
1471
1472 dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", *export_path);
1473 return 0;
1474
1475out_bad_devname:
1476 dfprintk(MOUNT, "NFS: device name not in host:path format\n");
1477 return -EINVAL;
1478
1479out_nomem:
1480 dfprintk(MOUNT, "NFS: not enough memory to parse device name\n");
1481 return -ENOMEM;
1482
1483out_hostname:
1484 dfprintk(MOUNT, "NFS: server hostname too long\n");
1485 return -ENAMETOOLONG;
1486
1487out_path:
1488 dfprintk(MOUNT, "NFS: export pathname too long\n");
1489 return -ENAMETOOLONG;
1490}
1491
d1aa0825
CL
1492/*
1493 * Hostname has square brackets around it because it contains one or
1494 * more colons. We look for the first closing square bracket, and a
1495 * colon must follow it.
1496 */
1497static int nfs_parse_protected_hostname(const char *dev_name,
1498 char **hostname, size_t maxnamlen,
1499 char **export_path, size_t maxpathlen)
1500{
1501 size_t len;
1502 char *start, *end;
1503
1504 start = (char *)(dev_name + 1);
1505
1506 end = strchr(start, ']');
1507 if (end == NULL)
1508 goto out_bad_devname;
1509 if (*(end + 1) != ':')
1510 goto out_bad_devname;
1511
1512 len = end - start;
1513 if (len > maxnamlen)
1514 goto out_hostname;
1515
1516 /* N.B. caller will free nfs_server.hostname in all cases */
1517 *hostname = kstrndup(start, len, GFP_KERNEL);
1518 if (*hostname == NULL)
1519 goto out_nomem;
1520
1521 end += 2;
1522 len = strlen(end);
1523 if (len > maxpathlen)
1524 goto out_path;
1525 *export_path = kstrndup(end, len, GFP_KERNEL);
1526 if (!*export_path)
1527 goto out_nomem;
1528
1529 return 0;
1530
1531out_bad_devname:
1532 dfprintk(MOUNT, "NFS: device name not in host:path format\n");
1533 return -EINVAL;
1534
1535out_nomem:
1536 dfprintk(MOUNT, "NFS: not enough memory to parse device name\n");
1537 return -ENOMEM;
1538
1539out_hostname:
1540 dfprintk(MOUNT, "NFS: server hostname too long\n");
1541 return -ENAMETOOLONG;
1542
1543out_path:
1544 dfprintk(MOUNT, "NFS: export pathname too long\n");
1545 return -ENAMETOOLONG;
1546}
1547
1548/*
1549 * Split "dev_name" into "hostname:export_path".
1550 *
1551 * The leftmost colon demarks the split between the server's hostname
1552 * and the export path. If the hostname starts with a left square
1553 * bracket, then it may contain colons.
1554 *
1555 * Note: caller frees hostname and export path, even on error.
1556 */
1557static int nfs_parse_devname(const char *dev_name,
1558 char **hostname, size_t maxnamlen,
1559 char **export_path, size_t maxpathlen)
1560{
1561 if (*dev_name == '[')
1562 return nfs_parse_protected_hostname(dev_name,
1563 hostname, maxnamlen,
1564 export_path, maxpathlen);
1565
1566 return nfs_parse_simple_hostname(dev_name,
1567 hostname, maxnamlen,
1568 export_path, maxpathlen);
1569}
1570
f7b422b1 1571/*
54ceac45
DH
1572 * Validate the NFS2/NFS3 mount data
1573 * - fills in the mount root filehandle
136d558c
CL
1574 *
1575 * For option strings, user space handles the following behaviors:
1576 *
1577 * + DNS: mapping server host name to IP address ("addr=" option)
1578 *
1579 * + failure mode: how to behave if a mount request can't be handled
1580 * immediately ("fg/bg" option)
1581 *
1582 * + retry: how often to retry a mount request ("retry=" option)
1583 *
1584 * + breaking back: trying proto=udp after proto=tcp, v2 after v3,
1585 * mountproto=tcp after mountproto=udp, and so on
f7b422b1 1586 */
2283f8d6
TT
1587static int nfs_validate_mount_data(void *options,
1588 struct nfs_parsed_mount_data *args,
136d558c
CL
1589 struct nfs_fh *mntfh,
1590 const char *dev_name)
f7b422b1 1591{
2283f8d6 1592 struct nfs_mount_data *data = (struct nfs_mount_data *)options;
136d558c 1593
5df36e78
CL
1594 if (data == NULL)
1595 goto out_no_data;
f7b422b1 1596
2283f8d6
TT
1597 args->flags = (NFS_MOUNT_VER3 | NFS_MOUNT_TCP);
1598 args->rsize = NFS_MAX_FILE_IO_SIZE;
1599 args->wsize = NFS_MAX_FILE_IO_SIZE;
0e0cab74
CL
1600 args->acregmin = NFS_DEF_ACREGMIN;
1601 args->acregmax = NFS_DEF_ACREGMAX;
1602 args->acdirmin = NFS_DEF_ACDIRMIN;
1603 args->acdirmax = NFS_DEF_ACDIRMAX;
f22d6d79 1604 args->mount_server.port = 0; /* autobind unless user sets port */
f22d6d79 1605 args->nfs_server.port = 0; /* autobind unless user sets port */
0896a725 1606 args->nfs_server.protocol = XPRT_TRANSPORT_TCP;
dd07c947 1607 args->auth_flavors[0] = RPC_AUTH_UNIX;
2283f8d6 1608
54ceac45 1609 switch (data->version) {
5df36e78
CL
1610 case 1:
1611 data->namlen = 0;
1612 case 2:
1613 data->bsize = 0;
1614 case 3:
1615 if (data->flags & NFS_MOUNT_VER3)
1616 goto out_no_v3;
1617 data->root.size = NFS2_FHSIZE;
1618 memcpy(data->root.data, data->old_root.data, NFS2_FHSIZE);
1619 case 4:
1620 if (data->flags & NFS_MOUNT_SECFLAVOUR)
1621 goto out_no_sec;
1622 case 5:
1623 memset(data->context, 0, sizeof(data->context));
1624 case 6:
b7e24457
TM
1625 if (data->flags & NFS_MOUNT_VER3) {
1626 if (data->root.size > NFS3_FHSIZE || data->root.size == 0)
1627 goto out_invalid_fh;
5df36e78 1628 mntfh->size = data->root.size;
b7e24457 1629 } else
5df36e78
CL
1630 mntfh->size = NFS2_FHSIZE;
1631
5df36e78
CL
1632
1633 memcpy(mntfh->data, data->root.data, mntfh->size);
1634 if (mntfh->size < sizeof(mntfh->data))
1635 memset(mntfh->data + mntfh->size, 0,
1636 sizeof(mntfh->data) - mntfh->size);
6e88e061 1637
2283f8d6
TT
1638 /*
1639 * Translate to nfs_parsed_mount_data, which nfs_fill_super
1640 * can deal with.
1641 */
ff3525a5 1642 args->flags = data->flags & NFS_MOUNT_FLAGMASK;
2283f8d6
TT
1643 args->rsize = data->rsize;
1644 args->wsize = data->wsize;
2283f8d6
TT
1645 args->timeo = data->timeo;
1646 args->retrans = data->retrans;
1647 args->acregmin = data->acregmin;
1648 args->acregmax = data->acregmax;
1649 args->acdirmin = data->acdirmin;
1650 args->acdirmax = data->acdirmax;
4c568017
CL
1651
1652 memcpy(&args->nfs_server.address, &data->addr,
1653 sizeof(data->addr));
1654 args->nfs_server.addrlen = sizeof(data->addr);
1655 if (!nfs_verify_server_address((struct sockaddr *)
1656 &args->nfs_server.address))
1657 goto out_no_address;
1658
2283f8d6 1659 if (!(data->flags & NFS_MOUNT_TCP))
0896a725 1660 args->nfs_server.protocol = XPRT_TRANSPORT_UDP;
2283f8d6
TT
1661 /* N.B. caller will free nfs_server.hostname in all cases */
1662 args->nfs_server.hostname = kstrdup(data->hostname, GFP_KERNEL);
1663 args->namlen = data->namlen;
1664 args->bsize = data->bsize;
dd07c947
CL
1665
1666 if (data->flags & NFS_MOUNT_SECFLAVOUR)
1667 args->auth_flavors[0] = data->pseudoflavor;
63649bd7
CG
1668 if (!args->nfs_server.hostname)
1669 goto out_nomem;
f9c3a380
EP
1670
1671 /*
1672 * The legacy version 6 binary mount data from userspace has a
1673 * field used only to transport selinux information into the
1674 * the kernel. To continue to support that functionality we
1675 * have a touch of selinux knowledge here in the NFS code. The
1676 * userspace code converted context=blah to just blah so we are
1677 * converting back to the full string selinux understands.
1678 */
1679 if (data->context[0]){
1680#ifdef CONFIG_SECURITY_SELINUX
1681 int rc;
1682 char *opts_str = kmalloc(sizeof(data->context) + 8, GFP_KERNEL);
1683 if (!opts_str)
1684 return -ENOMEM;
1685 strcpy(opts_str, "context=");
1686 data->context[NFS_MAX_CONTEXT_LEN] = '\0';
1687 strcat(opts_str, &data->context[0]);
1688 rc = security_sb_parse_opts_str(opts_str, &args->lsm_opts);
1689 kfree(opts_str);
1690 if (rc)
1691 return rc;
1692#else
1693 return -EINVAL;
1694#endif
1695 }
1696
5df36e78 1697 break;
136d558c 1698 default: {
136d558c 1699 int status;
136d558c 1700
2283f8d6
TT
1701 if (nfs_parse_mount_options((char *)options, args) == 0)
1702 return -EINVAL;
136d558c 1703
6e88e061
CL
1704 if (!nfs_verify_server_address((struct sockaddr *)
1705 &args->nfs_server.address))
1706 goto out_no_address;
1707
ed596a8a
CL
1708 nfs_set_port((struct sockaddr *)&args->nfs_server.address,
1709 args->nfs_server.port);
1710
259875ef
TM
1711 nfs_set_mount_transport_protocol(args);
1712
dc045898
CL
1713 status = nfs_parse_devname(dev_name,
1714 &args->nfs_server.hostname,
1715 PAGE_SIZE,
1716 &args->nfs_server.export_path,
1717 NFS_MAXPATHLEN);
1718 if (!status)
1719 status = nfs_try_mount(args, mntfh);
136d558c 1720
dc045898
CL
1721 kfree(args->nfs_server.export_path);
1722 args->nfs_server.export_path = NULL;
136d558c 1723
136d558c 1724 if (status)
fdc6e2c8 1725 return status;
136d558c 1726
136d558c
CL
1727 break;
1728 }
f7b422b1 1729 }
54ceac45
DH
1730
1731#ifndef CONFIG_NFS_V3
2283f8d6 1732 if (args->flags & NFS_MOUNT_VER3)
5df36e78
CL
1733 goto out_v3_not_compiled;
1734#endif /* !CONFIG_NFS_V3 */
f7b422b1 1735
5df36e78 1736 return 0;
f7b422b1 1737
5df36e78
CL
1738out_no_data:
1739 dfprintk(MOUNT, "NFS: mount program didn't pass any mount data\n");
1740 return -EINVAL;
54ceac45 1741
5df36e78
CL
1742out_no_v3:
1743 dfprintk(MOUNT, "NFS: nfs_mount_data version %d does not support v3\n",
1744 data->version);
1745 return -EINVAL;
f7b422b1 1746
5df36e78
CL
1747out_no_sec:
1748 dfprintk(MOUNT, "NFS: nfs_mount_data version supports only AUTH_SYS\n");
1749 return -EINVAL;
1750
5df36e78
CL
1751#ifndef CONFIG_NFS_V3
1752out_v3_not_compiled:
1753 dfprintk(MOUNT, "NFS: NFSv3 is not compiled into kernel\n");
1754 return -EPROTONOSUPPORT;
1755#endif /* !CONFIG_NFS_V3 */
1756
63649bd7
CG
1757out_nomem:
1758 dfprintk(MOUNT, "NFS: not enough memory to handle mount options\n");
1759 return -ENOMEM;
1760
5df36e78
CL
1761out_no_address:
1762 dfprintk(MOUNT, "NFS: mount program didn't pass remote address\n");
1763 return -EINVAL;
1764
1765out_invalid_fh:
1766 dfprintk(MOUNT, "NFS: invalid root filehandle\n");
1767 return -EINVAL;
f7b422b1
DH
1768}
1769
48b605f8
JL
1770static int
1771nfs_compare_remount_data(struct nfs_server *nfss,
1772 struct nfs_parsed_mount_data *data)
1773{
1774 if (data->flags != nfss->flags ||
1775 data->rsize != nfss->rsize ||
1776 data->wsize != nfss->wsize ||
1777 data->retrans != nfss->client->cl_timeout->to_retries ||
1778 data->auth_flavors[0] != nfss->client->cl_auth->au_flavor ||
1779 data->acregmin != nfss->acregmin / HZ ||
1780 data->acregmax != nfss->acregmax / HZ ||
1781 data->acdirmin != nfss->acdirmin / HZ ||
1782 data->acdirmax != nfss->acdirmax / HZ ||
1783 data->timeo != (10U * nfss->client->cl_timeout->to_initval / HZ) ||
1784 data->nfs_server.addrlen != nfss->nfs_client->cl_addrlen ||
1785 memcmp(&data->nfs_server.address, &nfss->nfs_client->cl_addr,
1786 data->nfs_server.addrlen) != 0)
1787 return -EINVAL;
1788
1789 return 0;
1790}
1791
1792static int
1793nfs_remount(struct super_block *sb, int *flags, char *raw_data)
1794{
1795 int error;
1796 struct nfs_server *nfss = sb->s_fs_info;
1797 struct nfs_parsed_mount_data *data;
1798 struct nfs_mount_data *options = (struct nfs_mount_data *)raw_data;
1799 struct nfs4_mount_data *options4 = (struct nfs4_mount_data *)raw_data;
cd100725 1800 u32 nfsvers = nfss->nfs_client->rpc_ops->version;
48b605f8
JL
1801
1802 /*
1803 * Userspace mount programs that send binary options generally send
1804 * them populated with default values. We have no way to know which
1805 * ones were explicitly specified. Fall back to legacy behavior and
1806 * just return success.
1807 */
31c94469
MZ
1808 if ((nfsvers == 4 && (!options4 || options4->version == 1)) ||
1809 (nfsvers <= 3 && (!options || (options->version >= 1 &&
1810 options->version <= 6))))
48b605f8
JL
1811 return 0;
1812
1813 data = kzalloc(sizeof(*data), GFP_KERNEL);
1814 if (data == NULL)
1815 return -ENOMEM;
1816
337eb00a 1817 lock_kernel();
48b605f8
JL
1818 /* fill out struct with values from existing mount */
1819 data->flags = nfss->flags;
1820 data->rsize = nfss->rsize;
1821 data->wsize = nfss->wsize;
1822 data->retrans = nfss->client->cl_timeout->to_retries;
1823 data->auth_flavors[0] = nfss->client->cl_auth->au_flavor;
1824 data->acregmin = nfss->acregmin / HZ;
1825 data->acregmax = nfss->acregmax / HZ;
1826 data->acdirmin = nfss->acdirmin / HZ;
1827 data->acdirmax = nfss->acdirmax / HZ;
1828 data->timeo = 10U * nfss->client->cl_timeout->to_initval / HZ;
1829 data->nfs_server.addrlen = nfss->nfs_client->cl_addrlen;
1830 memcpy(&data->nfs_server.address, &nfss->nfs_client->cl_addr,
1831 data->nfs_server.addrlen);
1832
1833 /* overwrite those values with any that were specified */
1834 error = nfs_parse_mount_options((char *)options, data);
1835 if (error < 0)
1836 goto out;
1837
1838 /* compare new mount options with old ones */
1839 error = nfs_compare_remount_data(nfss, data);
1840out:
1841 kfree(data);
337eb00a 1842 unlock_kernel();
48b605f8
JL
1843 return error;
1844}
1845
f7b422b1 1846/*
54ceac45 1847 * Initialise the common bits of the superblock
f7b422b1 1848 */
54ceac45 1849static inline void nfs_initialise_sb(struct super_block *sb)
f7b422b1 1850{
54ceac45 1851 struct nfs_server *server = NFS_SB(sb);
5006a76c 1852
54ceac45 1853 sb->s_magic = NFS_SUPER_MAGIC;
f7b422b1 1854
54ceac45
DH
1855 /* We probably want something more informative here */
1856 snprintf(sb->s_id, sizeof(sb->s_id),
1857 "%x:%x", MAJOR(sb->s_dev), MINOR(sb->s_dev));
5006a76c 1858
54ceac45
DH
1859 if (sb->s_blocksize == 0)
1860 sb->s_blocksize = nfs_block_bits(server->wsize,
1861 &sb->s_blocksize_bits);
f7b422b1 1862
54ceac45
DH
1863 if (server->flags & NFS_MOUNT_NOAC)
1864 sb->s_flags |= MS_SYNCHRONOUS;
f7b422b1 1865
54ceac45 1866 nfs_super_set_maxbytes(sb, server->maxfilesize);
f7b422b1
DH
1867}
1868
1869/*
54ceac45 1870 * Finish setting up an NFS2/3 superblock
f7b422b1 1871 */
2283f8d6
TT
1872static void nfs_fill_super(struct super_block *sb,
1873 struct nfs_parsed_mount_data *data)
f7b422b1
DH
1874{
1875 struct nfs_server *server = NFS_SB(sb);
5006a76c 1876
54ceac45
DH
1877 sb->s_blocksize_bits = 0;
1878 sb->s_blocksize = 0;
1879 if (data->bsize)
1880 sb->s_blocksize = nfs_block_size(data->bsize, &sb->s_blocksize_bits);
f7b422b1 1881
54ceac45
DH
1882 if (server->flags & NFS_MOUNT_VER3) {
1883 /* The VFS shouldn't apply the umask to mode bits. We will do
1884 * so ourselves when necessary.
1885 */
1886 sb->s_flags |= MS_POSIXACL;
1887 sb->s_time_gran = 1;
816724e6 1888 }
54ceac45
DH
1889
1890 sb->s_op = &nfs_sops;
1891 nfs_initialise_sb(sb);
f7b422b1
DH
1892}
1893
1894/*
54ceac45 1895 * Finish setting up a cloned NFS2/3 superblock
f7b422b1 1896 */
54ceac45
DH
1897static void nfs_clone_super(struct super_block *sb,
1898 const struct super_block *old_sb)
f7b422b1 1899{
54ceac45
DH
1900 struct nfs_server *server = NFS_SB(sb);
1901
1902 sb->s_blocksize_bits = old_sb->s_blocksize_bits;
1903 sb->s_blocksize = old_sb->s_blocksize;
1904 sb->s_maxbytes = old_sb->s_maxbytes;
f7b422b1 1905
f7b422b1 1906 if (server->flags & NFS_MOUNT_VER3) {
54ceac45
DH
1907 /* The VFS shouldn't apply the umask to mode bits. We will do
1908 * so ourselves when necessary.
f7b422b1
DH
1909 */
1910 sb->s_flags |= MS_POSIXACL;
f7b422b1 1911 sb->s_time_gran = 1;
f7b422b1
DH
1912 }
1913
54ceac45
DH
1914 sb->s_op = old_sb->s_op;
1915 nfs_initialise_sb(sb);
f7b422b1
DH
1916}
1917
275a5d24
TM
1918static int nfs_compare_mount_options(const struct super_block *s, const struct nfs_server *b, int flags)
1919{
1920 const struct nfs_server *a = s->s_fs_info;
1921 const struct rpc_clnt *clnt_a = a->client;
1922 const struct rpc_clnt *clnt_b = b->client;
1923
1924 if ((s->s_flags & NFS_MS_MASK) != (flags & NFS_MS_MASK))
1925 goto Ebusy;
1926 if (a->nfs_client != b->nfs_client)
1927 goto Ebusy;
1928 if (a->flags != b->flags)
1929 goto Ebusy;
1930 if (a->wsize != b->wsize)
1931 goto Ebusy;
1932 if (a->rsize != b->rsize)
1933 goto Ebusy;
1934 if (a->acregmin != b->acregmin)
1935 goto Ebusy;
1936 if (a->acregmax != b->acregmax)
1937 goto Ebusy;
1938 if (a->acdirmin != b->acdirmin)
1939 goto Ebusy;
1940 if (a->acdirmax != b->acdirmax)
1941 goto Ebusy;
1942 if (clnt_a->cl_auth->au_flavor != clnt_b->cl_auth->au_flavor)
1943 goto Ebusy;
e89a5a43 1944 return 1;
275a5d24 1945Ebusy:
e89a5a43
TM
1946 return 0;
1947}
1948
1949struct nfs_sb_mountdata {
1950 struct nfs_server *server;
1951 int mntflags;
1952};
1953
1954static int nfs_set_super(struct super_block *s, void *data)
1955{
1956 struct nfs_sb_mountdata *sb_mntdata = data;
1957 struct nfs_server *server = sb_mntdata->server;
1958 int ret;
1959
1960 s->s_flags = sb_mntdata->mntflags;
1961 s->s_fs_info = server;
1962 ret = set_anon_super(s, server);
1963 if (ret == 0)
1964 server->s_dev = s->s_dev;
1965 return ret;
1966}
1967
fd00a8ff
CL
1968static int nfs_compare_super_address(struct nfs_server *server1,
1969 struct nfs_server *server2)
1970{
1971 struct sockaddr *sap1, *sap2;
1972
1973 sap1 = (struct sockaddr *)&server1->nfs_client->cl_addr;
1974 sap2 = (struct sockaddr *)&server2->nfs_client->cl_addr;
1975
1976 if (sap1->sa_family != sap2->sa_family)
1977 return 0;
1978
1979 switch (sap1->sa_family) {
1980 case AF_INET: {
1981 struct sockaddr_in *sin1 = (struct sockaddr_in *)sap1;
1982 struct sockaddr_in *sin2 = (struct sockaddr_in *)sap2;
1983 if (sin1->sin_addr.s_addr != sin2->sin_addr.s_addr)
1984 return 0;
1985 if (sin1->sin_port != sin2->sin_port)
1986 return 0;
1987 break;
1988 }
1989 case AF_INET6: {
1990 struct sockaddr_in6 *sin1 = (struct sockaddr_in6 *)sap1;
1991 struct sockaddr_in6 *sin2 = (struct sockaddr_in6 *)sap2;
1992 if (!ipv6_addr_equal(&sin1->sin6_addr, &sin2->sin6_addr))
1993 return 0;
1994 if (sin1->sin6_port != sin2->sin6_port)
1995 return 0;
1996 break;
1997 }
1998 default:
1999 return 0;
2000 }
2001
2002 return 1;
2003}
2004
e89a5a43
TM
2005static int nfs_compare_super(struct super_block *sb, void *data)
2006{
2007 struct nfs_sb_mountdata *sb_mntdata = data;
2008 struct nfs_server *server = sb_mntdata->server, *old = NFS_SB(sb);
2009 int mntflags = sb_mntdata->mntflags;
2010
fd00a8ff 2011 if (!nfs_compare_super_address(old, server))
e89a5a43
TM
2012 return 0;
2013 /* Note: NFS_MOUNT_UNSHARED == NFS4_MOUNT_UNSHARED */
2014 if (old->flags & NFS_MOUNT_UNSHARED)
2015 return 0;
2016 if (memcmp(&old->fsid, &server->fsid, sizeof(old->fsid)) != 0)
2017 return 0;
2018 return nfs_compare_mount_options(sb, server, mntflags);
275a5d24
TM
2019}
2020
fa799759
MS
2021static int nfs_bdi_register(struct nfs_server *server)
2022{
2023 return bdi_register_dev(&server->backing_dev_info, server->s_dev);
2024}
2025
816724e6
TM
2026static int nfs_get_sb(struct file_system_type *fs_type,
2027 int flags, const char *dev_name, void *raw_data, struct vfsmount *mnt)
f7b422b1 2028{
f7b422b1
DH
2029 struct nfs_server *server = NULL;
2030 struct super_block *s;
33852a1f
TM
2031 struct nfs_parsed_mount_data *data;
2032 struct nfs_fh *mntfh;
54ceac45 2033 struct dentry *mntroot;
75180df2 2034 int (*compare_super)(struct super_block *, void *) = nfs_compare_super;
e89a5a43
TM
2035 struct nfs_sb_mountdata sb_mntdata = {
2036 .mntflags = flags,
2037 };
33852a1f
TM
2038 int error = -ENOMEM;
2039
2040 data = kzalloc(sizeof(*data), GFP_KERNEL);
2041 mntfh = kzalloc(sizeof(*mntfh), GFP_KERNEL);
2042 if (data == NULL || mntfh == NULL)
2043 goto out_free_fh;
f7b422b1 2044
33852a1f 2045 security_init_mnt_opts(&data->lsm_opts);
f9c3a380 2046
54ceac45 2047 /* Validate the mount data */
33852a1f 2048 error = nfs_validate_mount_data(raw_data, data, mntfh, dev_name);
54ceac45 2049 if (error < 0)
0655960f 2050 goto out;
f7b422b1 2051
54ceac45 2052 /* Get a volume representation */
33852a1f 2053 server = nfs_create_server(data, mntfh);
54ceac45
DH
2054 if (IS_ERR(server)) {
2055 error = PTR_ERR(server);
0655960f 2056 goto out;
f7b422b1 2057 }
e89a5a43 2058 sb_mntdata.server = server;
f7b422b1 2059
75180df2
TM
2060 if (server->flags & NFS_MOUNT_UNSHARED)
2061 compare_super = NULL;
2062
54ceac45 2063 /* Get a superblock - note that we may end up sharing one that already exists */
e89a5a43 2064 s = sget(fs_type, compare_super, nfs_set_super, &sb_mntdata);
816724e6
TM
2065 if (IS_ERR(s)) {
2066 error = PTR_ERR(s);
54ceac45 2067 goto out_err_nosb;
816724e6
TM
2068 }
2069
54ceac45
DH
2070 if (s->s_fs_info != server) {
2071 nfs_free_server(server);
2072 server = NULL;
fa799759
MS
2073 } else {
2074 error = nfs_bdi_register(server);
2075 if (error)
2076 goto error_splat_super;
54ceac45 2077 }
f7b422b1 2078
54ceac45
DH
2079 if (!s->s_root) {
2080 /* initial superblock/root creation */
33852a1f 2081 nfs_fill_super(s, data);
08734048 2082 nfs_fscache_get_super_cookie(s, data);
54ceac45 2083 }
f7b422b1 2084
33852a1f 2085 mntroot = nfs_get_root(s, mntfh);
54ceac45
DH
2086 if (IS_ERR(mntroot)) {
2087 error = PTR_ERR(mntroot);
2088 goto error_splat_super;
f7b422b1 2089 }
816724e6 2090
33852a1f 2091 error = security_sb_set_mnt_opts(s, &data->lsm_opts);
f9c3a380
EP
2092 if (error)
2093 goto error_splat_root;
2094
54ceac45
DH
2095 s->s_flags |= MS_ACTIVE;
2096 mnt->mnt_sb = s;
2097 mnt->mnt_root = mntroot;
0655960f
CL
2098 error = 0;
2099
2100out:
33852a1f
TM
2101 kfree(data->nfs_server.hostname);
2102 kfree(data->mount_server.hostname);
08734048 2103 kfree(data->fscache_uniq);
33852a1f
TM
2104 security_free_mnt_opts(&data->lsm_opts);
2105out_free_fh:
2106 kfree(mntfh);
2107 kfree(data);
0655960f 2108 return error;
816724e6 2109
54ceac45
DH
2110out_err_nosb:
2111 nfs_free_server(server);
0655960f 2112 goto out;
54ceac45 2113
f9c3a380
EP
2114error_splat_root:
2115 dput(mntroot);
54ceac45 2116error_splat_super:
6f5bbff9 2117 deactivate_locked_super(s);
0655960f 2118 goto out;
f7b422b1
DH
2119}
2120
54ceac45
DH
2121/*
2122 * Destroy an NFS2/3 superblock
2123 */
f7b422b1
DH
2124static void nfs_kill_super(struct super_block *s)
2125{
2126 struct nfs_server *server = NFS_SB(s);
2127
fa799759 2128 bdi_unregister(&server->backing_dev_info);
f7b422b1 2129 kill_anon_super(s);
08734048 2130 nfs_fscache_release_super_cookie(s);
54ceac45 2131 nfs_free_server(server);
f7b422b1
DH
2132}
2133
54ceac45
DH
2134/*
2135 * Clone an NFS2/3 server record on xdev traversal (FSID-change)
2136 */
2137static int nfs_xdev_get_sb(struct file_system_type *fs_type, int flags,
2138 const char *dev_name, void *raw_data,
2139 struct vfsmount *mnt)
f7b422b1
DH
2140{
2141 struct nfs_clone_mount *data = raw_data;
54ceac45
DH
2142 struct super_block *s;
2143 struct nfs_server *server;
2144 struct dentry *mntroot;
75180df2 2145 int (*compare_super)(struct super_block *, void *) = nfs_compare_super;
e89a5a43
TM
2146 struct nfs_sb_mountdata sb_mntdata = {
2147 .mntflags = flags,
2148 };
54ceac45 2149 int error;
f7b422b1 2150
54ceac45 2151 dprintk("--> nfs_xdev_get_sb()\n");
f7b422b1 2152
54ceac45
DH
2153 /* create a new volume representation */
2154 server = nfs_clone_server(NFS_SB(data->sb), data->fh, data->fattr);
2155 if (IS_ERR(server)) {
2156 error = PTR_ERR(server);
2157 goto out_err_noserver;
2158 }
e89a5a43 2159 sb_mntdata.server = server;
8fa5c000 2160
75180df2
TM
2161 if (server->flags & NFS_MOUNT_UNSHARED)
2162 compare_super = NULL;
2163
54ceac45 2164 /* Get a superblock - note that we may end up sharing one that already exists */
e89a5a43 2165 s = sget(&nfs_fs_type, compare_super, nfs_set_super, &sb_mntdata);
54ceac45
DH
2166 if (IS_ERR(s)) {
2167 error = PTR_ERR(s);
2168 goto out_err_nosb;
2169 }
5006a76c 2170
54ceac45
DH
2171 if (s->s_fs_info != server) {
2172 nfs_free_server(server);
2173 server = NULL;
fa799759
MS
2174 } else {
2175 error = nfs_bdi_register(server);
2176 if (error)
2177 goto error_splat_super;
f7b422b1 2178 }
24c8dbbb 2179
54ceac45
DH
2180 if (!s->s_root) {
2181 /* initial superblock/root creation */
54ceac45
DH
2182 nfs_clone_super(s, data->sb);
2183 }
f7b422b1 2184
54ceac45
DH
2185 mntroot = nfs_get_root(s, data->fh);
2186 if (IS_ERR(mntroot)) {
2187 error = PTR_ERR(mntroot);
2188 goto error_splat_super;
f7b422b1 2189 }
e9cc6c23 2190 if (mntroot->d_inode->i_op != NFS_SB(s)->nfs_client->rpc_ops->dir_inode_ops) {
4c1fe2f7
NB
2191 dput(mntroot);
2192 error = -ESTALE;
2193 goto error_splat_super;
2194 }
f7b422b1 2195
54ceac45
DH
2196 s->s_flags |= MS_ACTIVE;
2197 mnt->mnt_sb = s;
2198 mnt->mnt_root = mntroot;
f7b422b1 2199
f9c3a380
EP
2200 /* clone any lsm security options from the parent to the new sb */
2201 security_sb_clone_mnt_opts(data->sb, s);
2202
54ceac45
DH
2203 dprintk("<-- nfs_xdev_get_sb() = 0\n");
2204 return 0;
24c8dbbb 2205
54ceac45
DH
2206out_err_nosb:
2207 nfs_free_server(server);
2208out_err_noserver:
2209 dprintk("<-- nfs_xdev_get_sb() = %d [error]\n", error);
2210 return error;
f7b422b1 2211
54ceac45 2212error_splat_super:
6f5bbff9 2213 deactivate_locked_super(s);
54ceac45
DH
2214 dprintk("<-- nfs_xdev_get_sb() = %d [splat]\n", error);
2215 return error;
f7b422b1
DH
2216}
2217
54ceac45
DH
2218#ifdef CONFIG_NFS_V4
2219
f7b422b1 2220/*
54ceac45 2221 * Finish setting up a cloned NFS4 superblock
f7b422b1 2222 */
54ceac45
DH
2223static void nfs4_clone_super(struct super_block *sb,
2224 const struct super_block *old_sb)
f7b422b1 2225{
54ceac45
DH
2226 sb->s_blocksize_bits = old_sb->s_blocksize_bits;
2227 sb->s_blocksize = old_sb->s_blocksize;
2228 sb->s_maxbytes = old_sb->s_maxbytes;
f7b422b1 2229 sb->s_time_gran = 1;
54ceac45
DH
2230 sb->s_op = old_sb->s_op;
2231 nfs_initialise_sb(sb);
f7b422b1
DH
2232}
2233
54ceac45
DH
2234/*
2235 * Set up an NFS4 superblock
2236 */
2237static void nfs4_fill_super(struct super_block *sb)
f7b422b1 2238{
54ceac45
DH
2239 sb->s_time_gran = 1;
2240 sb->s_op = &nfs4_sops;
2241 nfs_initialise_sb(sb);
f7b422b1
DH
2242}
2243
01c3f052
TM
2244static void nfs4_validate_mount_flags(struct nfs_parsed_mount_data *args)
2245{
2246 args->flags &= ~(NFS_MOUNT_NONLM|NFS_MOUNT_NOACL|NFS_MOUNT_VER3);
2247}
2248
f0768ebd
CL
2249/*
2250 * Validate NFSv4 mount options
2251 */
91ea40b9
TT
2252static int nfs4_validate_mount_data(void *options,
2253 struct nfs_parsed_mount_data *args,
2254 const char *dev_name)
f0768ebd 2255{
4c568017 2256 struct sockaddr_in *ap;
91ea40b9 2257 struct nfs4_mount_data *data = (struct nfs4_mount_data *)options;
f0768ebd
CL
2258 char *c;
2259
2260 if (data == NULL)
2261 goto out_no_data;
2262
91ea40b9
TT
2263 args->rsize = NFS_MAX_FILE_IO_SIZE;
2264 args->wsize = NFS_MAX_FILE_IO_SIZE;
0e0cab74
CL
2265 args->acregmin = NFS_DEF_ACREGMIN;
2266 args->acregmax = NFS_DEF_ACREGMAX;
2267 args->acdirmin = NFS_DEF_ACDIRMIN;
2268 args->acdirmax = NFS_DEF_ACDIRMAX;
f22d6d79 2269 args->nfs_server.port = NFS_PORT; /* 2049 unless user set port= */
6738b251
CL
2270 args->auth_flavors[0] = RPC_AUTH_UNIX;
2271 args->auth_flavor_len = 0;
91ea40b9 2272
f0768ebd
CL
2273 switch (data->version) {
2274 case 1:
4c568017
CL
2275 ap = (struct sockaddr_in *)&args->nfs_server.address;
2276 if (data->host_addrlen > sizeof(args->nfs_server.address))
2277 goto out_no_address;
2278 if (data->host_addrlen == 0)
f0768ebd 2279 goto out_no_address;
4c568017
CL
2280 args->nfs_server.addrlen = data->host_addrlen;
2281 if (copy_from_user(ap, data->host_addr, data->host_addrlen))
f0768ebd 2282 return -EFAULT;
91ea40b9
TT
2283 if (!nfs_verify_server_address((struct sockaddr *)
2284 &args->nfs_server.address))
f0768ebd
CL
2285 goto out_no_address;
2286
6738b251
CL
2287 if (data->auth_flavourlen) {
2288 if (data->auth_flavourlen > 1)
2289 goto out_inval_auth;
20c71f5e 2290 if (copy_from_user(&args->auth_flavors[0],
91ea40b9 2291 data->auth_flavours,
20c71f5e 2292 sizeof(args->auth_flavors[0])))
f0768ebd 2293 return -EFAULT;
f0768ebd
CL
2294 }
2295
2296 c = strndup_user(data->hostname.data, NFS4_MAXNAMLEN);
2297 if (IS_ERR(c))
2298 return PTR_ERR(c);
91ea40b9 2299 args->nfs_server.hostname = c;
f0768ebd
CL
2300
2301 c = strndup_user(data->mnt_path.data, NFS4_MAXPATHLEN);
2302 if (IS_ERR(c))
2303 return PTR_ERR(c);
91ea40b9
TT
2304 args->nfs_server.export_path = c;
2305 dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", c);
f0768ebd
CL
2306
2307 c = strndup_user(data->client_addr.data, 16);
2308 if (IS_ERR(c))
2309 return PTR_ERR(c);
91ea40b9
TT
2310 args->client_address = c;
2311
2312 /*
2313 * Translate to nfs_parsed_mount_data, which nfs4_fill_super
2314 * can deal with.
2315 */
2316
2317 args->flags = data->flags & NFS4_MOUNT_FLAGMASK;
2318 args->rsize = data->rsize;
2319 args->wsize = data->wsize;
2320 args->timeo = data->timeo;
2321 args->retrans = data->retrans;
2322 args->acregmin = data->acregmin;
2323 args->acregmax = data->acregmax;
2324 args->acdirmin = data->acdirmin;
2325 args->acdirmax = data->acdirmax;
2326 args->nfs_server.protocol = data->proto;
259875ef 2327 nfs_validate_transport_protocol(args);
f0768ebd
CL
2328
2329 break;
80071225 2330 default: {
dc045898 2331 int status;
91ea40b9
TT
2332
2333 if (nfs_parse_mount_options((char *)options, args) == 0)
80071225
CL
2334 return -EINVAL;
2335
2336 if (!nfs_verify_server_address((struct sockaddr *)
91ea40b9 2337 &args->nfs_server.address))
80071225 2338 return -EINVAL;
80071225 2339
ed596a8a
CL
2340 nfs_set_port((struct sockaddr *)&args->nfs_server.address,
2341 args->nfs_server.port);
2342
259875ef
TM
2343 nfs_validate_transport_protocol(args);
2344
01c3f052
TM
2345 nfs4_validate_mount_flags(args);
2346
6738b251 2347 if (args->auth_flavor_len > 1)
80071225 2348 goto out_inval_auth;
80071225 2349
91ea40b9 2350 if (args->client_address == NULL)
0a87cf12
JL
2351 goto out_no_client_address;
2352
dc045898
CL
2353 status = nfs_parse_devname(dev_name,
2354 &args->nfs_server.hostname,
2355 NFS4_MAXNAMLEN,
2356 &args->nfs_server.export_path,
2357 NFS4_MAXPATHLEN);
2358 if (status < 0)
2359 return status;
2360
80071225
CL
2361 break;
2362 }
f0768ebd
CL
2363 }
2364
2365 return 0;
2366
2367out_no_data:
2368 dfprintk(MOUNT, "NFS4: mount program didn't pass any mount data\n");
2369 return -EINVAL;
2370
2371out_inval_auth:
2372 dfprintk(MOUNT, "NFS4: Invalid number of RPC auth flavours %d\n",
2373 data->auth_flavourlen);
2374 return -EINVAL;
2375
2376out_no_address:
2377 dfprintk(MOUNT, "NFS4: mount program didn't pass remote address\n");
2378 return -EINVAL;
0a87cf12
JL
2379
2380out_no_client_address:
2381 dfprintk(MOUNT, "NFS4: mount program didn't pass callback address\n");
2382 return -EINVAL;
f0768ebd
CL
2383}
2384
54ceac45
DH
2385/*
2386 * Get the superblock for an NFS4 mountpoint
2387 */
816724e6
TM
2388static int nfs4_get_sb(struct file_system_type *fs_type,
2389 int flags, const char *dev_name, void *raw_data, struct vfsmount *mnt)
f7b422b1 2390{
33852a1f 2391 struct nfs_parsed_mount_data *data;
54ceac45
DH
2392 struct super_block *s;
2393 struct nfs_server *server;
33852a1f 2394 struct nfs_fh *mntfh;
54ceac45 2395 struct dentry *mntroot;
75180df2 2396 int (*compare_super)(struct super_block *, void *) = nfs_compare_super;
e89a5a43
TM
2397 struct nfs_sb_mountdata sb_mntdata = {
2398 .mntflags = flags,
2399 };
33852a1f
TM
2400 int error = -ENOMEM;
2401
2402 data = kzalloc(sizeof(*data), GFP_KERNEL);
2403 mntfh = kzalloc(sizeof(*mntfh), GFP_KERNEL);
2404 if (data == NULL || mntfh == NULL)
2405 goto out_free_fh;
f7b422b1 2406
33852a1f 2407 security_init_mnt_opts(&data->lsm_opts);
f9c3a380 2408
f0768ebd 2409 /* Validate the mount data */
33852a1f 2410 error = nfs4_validate_mount_data(raw_data, data, dev_name);
f0768ebd
CL
2411 if (error < 0)
2412 goto out;
f7b422b1 2413
54ceac45 2414 /* Get a volume representation */
33852a1f 2415 server = nfs4_create_server(data, mntfh);
54ceac45
DH
2416 if (IS_ERR(server)) {
2417 error = PTR_ERR(server);
29eb981a 2418 goto out;
f7b422b1 2419 }
e89a5a43 2420 sb_mntdata.server = server;
f7b422b1 2421
75180df2
TM
2422 if (server->flags & NFS4_MOUNT_UNSHARED)
2423 compare_super = NULL;
2424
54ceac45 2425 /* Get a superblock - note that we may end up sharing one that already exists */
e89a5a43 2426 s = sget(fs_type, compare_super, nfs_set_super, &sb_mntdata);
816724e6
TM
2427 if (IS_ERR(s)) {
2428 error = PTR_ERR(s);
f7b422b1 2429 goto out_free;
816724e6
TM
2430 }
2431
5dd3177a
TM
2432 if (s->s_fs_info != server) {
2433 nfs_free_server(server);
2434 server = NULL;
fa799759
MS
2435 } else {
2436 error = nfs_bdi_register(server);
2437 if (error)
2438 goto error_splat_super;
5dd3177a
TM
2439 }
2440
54ceac45
DH
2441 if (!s->s_root) {
2442 /* initial superblock/root creation */
54ceac45 2443 nfs4_fill_super(s);
08734048 2444 nfs_fscache_get_super_cookie(s, data);
54ceac45 2445 }
f7b422b1 2446
33852a1f 2447 mntroot = nfs4_get_root(s, mntfh);
54ceac45
DH
2448 if (IS_ERR(mntroot)) {
2449 error = PTR_ERR(mntroot);
2450 goto error_splat_super;
f7b422b1 2451 }
54ceac45 2452
33852a1f 2453 error = security_sb_set_mnt_opts(s, &data->lsm_opts);
46c8ac74
EP
2454 if (error)
2455 goto error_splat_root;
2456
f7b422b1 2457 s->s_flags |= MS_ACTIVE;
54ceac45
DH
2458 mnt->mnt_sb = s;
2459 mnt->mnt_root = mntroot;
29eb981a
CL
2460 error = 0;
2461
2462out:
33852a1f
TM
2463 kfree(data->client_address);
2464 kfree(data->nfs_server.export_path);
2465 kfree(data->nfs_server.hostname);
08734048 2466 kfree(data->fscache_uniq);
33852a1f
TM
2467 security_free_mnt_opts(&data->lsm_opts);
2468out_free_fh:
2469 kfree(mntfh);
2470 kfree(data);
29eb981a 2471 return error;
54ceac45 2472
f7b422b1 2473out_free:
54ceac45 2474 nfs_free_server(server);
29eb981a 2475 goto out;
54ceac45 2476
46c8ac74
EP
2477error_splat_root:
2478 dput(mntroot);
54ceac45 2479error_splat_super:
6f5bbff9 2480 deactivate_locked_super(s);
29eb981a 2481 goto out;
f7b422b1
DH
2482}
2483
2484static void nfs4_kill_super(struct super_block *sb)
2485{
2486 struct nfs_server *server = NFS_SB(sb);
2487
515d8611 2488 nfs_super_return_all_delegations(sb);
f7b422b1
DH
2489 kill_anon_super(sb);
2490
2491 nfs4_renewd_prepare_shutdown(server);
08734048 2492 nfs_fscache_release_super_cookie(sb);
54ceac45 2493 nfs_free_server(server);
f7b422b1
DH
2494}
2495
2496/*
54ceac45 2497 * Clone an NFS4 server record on xdev traversal (FSID-change)
f7b422b1 2498 */
54ceac45
DH
2499static int nfs4_xdev_get_sb(struct file_system_type *fs_type, int flags,
2500 const char *dev_name, void *raw_data,
2501 struct vfsmount *mnt)
f7b422b1 2502{
54ceac45
DH
2503 struct nfs_clone_mount *data = raw_data;
2504 struct super_block *s;
2505 struct nfs_server *server;
2506 struct dentry *mntroot;
75180df2 2507 int (*compare_super)(struct super_block *, void *) = nfs_compare_super;
e89a5a43
TM
2508 struct nfs_sb_mountdata sb_mntdata = {
2509 .mntflags = flags,
2510 };
54ceac45 2511 int error;
f7b422b1 2512
54ceac45 2513 dprintk("--> nfs4_xdev_get_sb()\n");
f7b422b1 2514
54ceac45
DH
2515 /* create a new volume representation */
2516 server = nfs_clone_server(NFS_SB(data->sb), data->fh, data->fattr);
2517 if (IS_ERR(server)) {
2518 error = PTR_ERR(server);
2519 goto out_err_noserver;
f7b422b1 2520 }
e89a5a43 2521 sb_mntdata.server = server;
f7b422b1 2522
75180df2
TM
2523 if (server->flags & NFS4_MOUNT_UNSHARED)
2524 compare_super = NULL;
2525
54ceac45 2526 /* Get a superblock - note that we may end up sharing one that already exists */
ec9a05c9 2527 s = sget(&nfs4_fs_type, compare_super, nfs_set_super, &sb_mntdata);
54ceac45
DH
2528 if (IS_ERR(s)) {
2529 error = PTR_ERR(s);
2530 goto out_err_nosb;
f7b422b1 2531 }
f7b422b1 2532
54ceac45
DH
2533 if (s->s_fs_info != server) {
2534 nfs_free_server(server);
2535 server = NULL;
fa799759
MS
2536 } else {
2537 error = nfs_bdi_register(server);
2538 if (error)
2539 goto error_splat_super;
54ceac45 2540 }
f7b422b1 2541
54ceac45
DH
2542 if (!s->s_root) {
2543 /* initial superblock/root creation */
54ceac45
DH
2544 nfs4_clone_super(s, data->sb);
2545 }
f7b422b1 2546
54ceac45
DH
2547 mntroot = nfs4_get_root(s, data->fh);
2548 if (IS_ERR(mntroot)) {
2549 error = PTR_ERR(mntroot);
2550 goto error_splat_super;
2551 }
e9cc6c23
TM
2552 if (mntroot->d_inode->i_op != NFS_SB(s)->nfs_client->rpc_ops->dir_inode_ops) {
2553 dput(mntroot);
2554 error = -ESTALE;
2555 goto error_splat_super;
2556 }
f7b422b1 2557
54ceac45
DH
2558 s->s_flags |= MS_ACTIVE;
2559 mnt->mnt_sb = s;
2560 mnt->mnt_root = mntroot;
2561
46c8ac74
EP
2562 security_sb_clone_mnt_opts(data->sb, s);
2563
54ceac45
DH
2564 dprintk("<-- nfs4_xdev_get_sb() = 0\n");
2565 return 0;
2566
2567out_err_nosb:
2568 nfs_free_server(server);
2569out_err_noserver:
2570 dprintk("<-- nfs4_xdev_get_sb() = %d [error]\n", error);
2571 return error;
2572
2573error_splat_super:
6f5bbff9 2574 deactivate_locked_super(s);
54ceac45
DH
2575 dprintk("<-- nfs4_xdev_get_sb() = %d [splat]\n", error);
2576 return error;
f7b422b1
DH
2577}
2578
54ceac45
DH
2579/*
2580 * Create an NFS4 server record on referral traversal
2581 */
2582static int nfs4_referral_get_sb(struct file_system_type *fs_type, int flags,
2583 const char *dev_name, void *raw_data,
2584 struct vfsmount *mnt)
f7b422b1
DH
2585{
2586 struct nfs_clone_mount *data = raw_data;
54ceac45
DH
2587 struct super_block *s;
2588 struct nfs_server *server;
2589 struct dentry *mntroot;
2590 struct nfs_fh mntfh;
75180df2 2591 int (*compare_super)(struct super_block *, void *) = nfs_compare_super;
e89a5a43
TM
2592 struct nfs_sb_mountdata sb_mntdata = {
2593 .mntflags = flags,
2594 };
54ceac45
DH
2595 int error;
2596
2597 dprintk("--> nfs4_referral_get_sb()\n");
2598
2599 /* create a new volume representation */
2600 server = nfs4_create_referral_server(data, &mntfh);
2601 if (IS_ERR(server)) {
2602 error = PTR_ERR(server);
2603 goto out_err_noserver;
2604 }
e89a5a43 2605 sb_mntdata.server = server;
54ceac45 2606
75180df2
TM
2607 if (server->flags & NFS4_MOUNT_UNSHARED)
2608 compare_super = NULL;
2609
54ceac45 2610 /* Get a superblock - note that we may end up sharing one that already exists */
ec9a05c9 2611 s = sget(&nfs4_fs_type, compare_super, nfs_set_super, &sb_mntdata);
54ceac45
DH
2612 if (IS_ERR(s)) {
2613 error = PTR_ERR(s);
2614 goto out_err_nosb;
2615 }
2616
2617 if (s->s_fs_info != server) {
2618 nfs_free_server(server);
2619 server = NULL;
fa799759
MS
2620 } else {
2621 error = nfs_bdi_register(server);
2622 if (error)
2623 goto error_splat_super;
54ceac45
DH
2624 }
2625
2626 if (!s->s_root) {
2627 /* initial superblock/root creation */
54ceac45
DH
2628 nfs4_fill_super(s);
2629 }
2630
f2d0d85e 2631 mntroot = nfs4_get_root(s, &mntfh);
54ceac45
DH
2632 if (IS_ERR(mntroot)) {
2633 error = PTR_ERR(mntroot);
2634 goto error_splat_super;
2635 }
e9cc6c23
TM
2636 if (mntroot->d_inode->i_op != NFS_SB(s)->nfs_client->rpc_ops->dir_inode_ops) {
2637 dput(mntroot);
2638 error = -ESTALE;
2639 goto error_splat_super;
2640 }
54ceac45
DH
2641
2642 s->s_flags |= MS_ACTIVE;
2643 mnt->mnt_sb = s;
2644 mnt->mnt_root = mntroot;
2645
46c8ac74
EP
2646 security_sb_clone_mnt_opts(data->sb, s);
2647
54ceac45
DH
2648 dprintk("<-- nfs4_referral_get_sb() = 0\n");
2649 return 0;
2650
2651out_err_nosb:
2652 nfs_free_server(server);
2653out_err_noserver:
2654 dprintk("<-- nfs4_referral_get_sb() = %d [error]\n", error);
2655 return error;
2656
2657error_splat_super:
6f5bbff9 2658 deactivate_locked_super(s);
54ceac45
DH
2659 dprintk("<-- nfs4_referral_get_sb() = %d [splat]\n", error);
2660 return error;
f7b422b1
DH
2661}
2662
54ceac45 2663#endif /* CONFIG_NFS_V4 */
This page took 0.537139 seconds and 5 git commands to generate.