pnfs: fix lockup caused by pnfs_generic_pg_test
[deliverable/linux.git] / fs / nfs / super.c
CommitLineData
f7b422b1
DH
1/*
2 * linux/fs/nfs/super.c
3 *
4 * Copyright (C) 1992 Rick Sladkey
5 *
6 * nfs superblock handling functions
7 *
526719ba 8 * Modularised by Alan Cox <alan@lxorguk.ukuu.org.uk>, while hacking some
f7b422b1
DH
9 * experimental NFS changes. Modularisation taken straight from SYS5 fs.
10 *
11 * Change to nfs_read_super() to permit NFS mounts to multi-homed hosts.
12 * J.S.Peatfield@damtp.cam.ac.uk
13 *
14 * Split from inode.c by David Howells <dhowells@redhat.com>
15 *
54ceac45
DH
16 * - superblocks are indexed on server only - all inodes, dentries, etc. associated with a
17 * particular server are held in the same superblock
18 * - NFS superblocks can have several effective roots to the dentry tree
19 * - directory type roots are spliced into the tree when a path from one root reaches the root
20 * of another (see nfs_lookup())
f7b422b1
DH
21 */
22
f7b422b1
DH
23#include <linux/module.h>
24#include <linux/init.h>
25
26#include <linux/time.h>
27#include <linux/kernel.h>
28#include <linux/mm.h>
29#include <linux/string.h>
30#include <linux/stat.h>
31#include <linux/errno.h>
32#include <linux/unistd.h>
33#include <linux/sunrpc/clnt.h>
5976687a 34#include <linux/sunrpc/addr.h>
f7b422b1
DH
35#include <linux/sunrpc/stats.h>
36#include <linux/sunrpc/metrics.h>
0896a725 37#include <linux/sunrpc/xprtsock.h>
2cf7ff7a 38#include <linux/sunrpc/xprtrdma.h>
f7b422b1
DH
39#include <linux/nfs_fs.h>
40#include <linux/nfs_mount.h>
41#include <linux/nfs4_mount.h>
42#include <linux/lockd/bind.h>
f7b422b1
DH
43#include <linux/seq_file.h>
44#include <linux/mount.h>
c02d7adf 45#include <linux/namei.h>
f7b422b1
DH
46#include <linux/nfs_idmap.h>
47#include <linux/vfs.h>
48#include <linux/inet.h>
fd00a8ff 49#include <linux/in6.h>
5a0e3ad6 50#include <linux/slab.h>
fd00a8ff 51#include <net/ipv6.h>
d8e7748a 52#include <linux/netdevice.h>
f7b422b1 53#include <linux/nfs_xdr.h>
b5d5dfbd 54#include <linux/magic.h>
bf0fd768 55#include <linux/parser.h>
e50a7a1a 56#include <linux/nsproxy.h>
2446ab60 57#include <linux/rcupdate.h>
f7b422b1 58
f7b422b1
DH
59#include <asm/uaccess.h>
60
61#include "nfs4_fs.h"
62#include "callback.h"
63#include "delegation.h"
64#include "iostat.h"
65#include "internal.h"
08734048 66#include "fscache.h"
76e697ba 67#include "nfs4session.h"
ae50c0b5 68#include "pnfs.h"
ab7017a3 69#include "nfs.h"
f7b422b1
DH
70
71#define NFSDBG_FACILITY NFSDBG_VFS
b72e4f42 72#define NFS_TEXT_DATA 1
f7b422b1 73
1c606fb7 74#if IS_ENABLED(CONFIG_NFS_V3)
1e657bd5
PZ
75#define NFS_DEFAULT_VERSION 3
76#else
77#define NFS_DEFAULT_VERSION 2
78#endif
79
bf0fd768
CL
80enum {
81 /* Mount options that take no arguments */
82 Opt_soft, Opt_hard,
bf0fd768
CL
83 Opt_posix, Opt_noposix,
84 Opt_cto, Opt_nocto,
85 Opt_ac, Opt_noac,
86 Opt_lock, Opt_nolock,
2cf7ff7a 87 Opt_udp, Opt_tcp, Opt_rdma,
bf0fd768
CL
88 Opt_acl, Opt_noacl,
89 Opt_rdirplus, Opt_nordirplus,
75180df2 90 Opt_sharecache, Opt_nosharecache,
d740351b 91 Opt_resvport, Opt_noresvport,
b797cac7 92 Opt_fscache, Opt_nofscache,
89652617 93 Opt_migration, Opt_nomigration,
bf0fd768
CL
94
95 /* Mount options that take integer arguments */
96 Opt_port,
97 Opt_rsize, Opt_wsize, Opt_bsize,
98 Opt_timeo, Opt_retrans,
99 Opt_acregmin, Opt_acregmax,
100 Opt_acdirmin, Opt_acdirmax,
101 Opt_actimeo,
102 Opt_namelen,
103 Opt_mountport,
e887cbcf 104 Opt_mountvers,
3fd5be9e 105 Opt_minorversion,
bf0fd768
CL
106
107 /* Mount options that take string arguments */
0d71b058 108 Opt_nfsvers,
33832034 109 Opt_sec, Opt_proto, Opt_mountproto, Opt_mounthost,
0ac83779 110 Opt_addr, Opt_mountaddr, Opt_clientaddr,
7973c1f1 111 Opt_lookupcache,
b797cac7 112 Opt_fscache_uniq,
5eebde23 113 Opt_local_lock,
bf0fd768 114
f45663ce
CL
115 /* Special mount options */
116 Opt_userspace, Opt_deprecated, Opt_sloppy,
bf0fd768
CL
117
118 Opt_err
119};
120
a447c093 121static const match_table_t nfs_mount_option_tokens = {
bf0fd768
CL
122 { Opt_userspace, "bg" },
123 { Opt_userspace, "fg" },
ecbb3845
CL
124 { Opt_userspace, "retry=%s" },
125
f45663ce
CL
126 { Opt_sloppy, "sloppy" },
127
bf0fd768
CL
128 { Opt_soft, "soft" },
129 { Opt_hard, "hard" },
d33e4dfe
CL
130 { Opt_deprecated, "intr" },
131 { Opt_deprecated, "nointr" },
bf0fd768
CL
132 { Opt_posix, "posix" },
133 { Opt_noposix, "noposix" },
134 { Opt_cto, "cto" },
135 { Opt_nocto, "nocto" },
136 { Opt_ac, "ac" },
137 { Opt_noac, "noac" },
138 { Opt_lock, "lock" },
139 { Opt_nolock, "nolock" },
bf0fd768
CL
140 { Opt_udp, "udp" },
141 { Opt_tcp, "tcp" },
2cf7ff7a 142 { Opt_rdma, "rdma" },
bf0fd768
CL
143 { Opt_acl, "acl" },
144 { Opt_noacl, "noacl" },
145 { Opt_rdirplus, "rdirplus" },
146 { Opt_nordirplus, "nordirplus" },
75180df2
TM
147 { Opt_sharecache, "sharecache" },
148 { Opt_nosharecache, "nosharecache" },
d740351b
CL
149 { Opt_resvport, "resvport" },
150 { Opt_noresvport, "noresvport" },
b797cac7 151 { Opt_fscache, "fsc" },
b797cac7 152 { Opt_nofscache, "nofsc" },
89652617
CL
153 { Opt_migration, "migration" },
154 { Opt_nomigration, "nomigration" },
bf0fd768 155
a5a16bae
CL
156 { Opt_port, "port=%s" },
157 { Opt_rsize, "rsize=%s" },
158 { Opt_wsize, "wsize=%s" },
159 { Opt_bsize, "bsize=%s" },
160 { Opt_timeo, "timeo=%s" },
161 { Opt_retrans, "retrans=%s" },
162 { Opt_acregmin, "acregmin=%s" },
163 { Opt_acregmax, "acregmax=%s" },
164 { Opt_acdirmin, "acdirmin=%s" },
165 { Opt_acdirmax, "acdirmax=%s" },
166 { Opt_actimeo, "actimeo=%s" },
167 { Opt_namelen, "namlen=%s" },
168 { Opt_mountport, "mountport=%s" },
169 { Opt_mountvers, "mountvers=%s" },
0d71b058
TM
170 { Opt_minorversion, "minorversion=%s" },
171
a5a16bae
CL
172 { Opt_nfsvers, "nfsvers=%s" },
173 { Opt_nfsvers, "vers=%s" },
bf0fd768
CL
174
175 { Opt_sec, "sec=%s" },
176 { Opt_proto, "proto=%s" },
177 { Opt_mountproto, "mountproto=%s" },
178 { Opt_addr, "addr=%s" },
179 { Opt_clientaddr, "clientaddr=%s" },
33832034 180 { Opt_mounthost, "mounthost=%s" },
0ac83779 181 { Opt_mountaddr, "mountaddr=%s" },
bf0fd768 182
7973c1f1 183 { Opt_lookupcache, "lookupcache=%s" },
a6d5ff64 184 { Opt_fscache_uniq, "fsc=%s" },
5eebde23 185 { Opt_local_lock, "local_lock=%s" },
7973c1f1 186
3862279a
TM
187 /* The following needs to be listed after all other options */
188 { Opt_nfsvers, "v%s" },
189
bf0fd768
CL
190 { Opt_err, NULL }
191};
192
193enum {
ee671b01 194 Opt_xprt_udp, Opt_xprt_udp6, Opt_xprt_tcp, Opt_xprt_tcp6, Opt_xprt_rdma,
bf0fd768
CL
195
196 Opt_xprt_err
197};
198
a447c093 199static const match_table_t nfs_xprt_protocol_tokens = {
bf0fd768 200 { Opt_xprt_udp, "udp" },
ee671b01 201 { Opt_xprt_udp6, "udp6" },
bf0fd768 202 { Opt_xprt_tcp, "tcp" },
ee671b01 203 { Opt_xprt_tcp6, "tcp6" },
2cf7ff7a 204 { Opt_xprt_rdma, "rdma" },
bf0fd768
CL
205
206 { Opt_xprt_err, NULL }
207};
208
209enum {
210 Opt_sec_none, Opt_sec_sys,
211 Opt_sec_krb5, Opt_sec_krb5i, Opt_sec_krb5p,
212 Opt_sec_lkey, Opt_sec_lkeyi, Opt_sec_lkeyp,
213 Opt_sec_spkm, Opt_sec_spkmi, Opt_sec_spkmp,
214
215 Opt_sec_err
216};
217
a447c093 218static const match_table_t nfs_secflavor_tokens = {
bf0fd768
CL
219 { Opt_sec_none, "none" },
220 { Opt_sec_none, "null" },
221 { Opt_sec_sys, "sys" },
222
223 { Opt_sec_krb5, "krb5" },
224 { Opt_sec_krb5i, "krb5i" },
225 { Opt_sec_krb5p, "krb5p" },
226
227 { Opt_sec_lkey, "lkey" },
228 { Opt_sec_lkeyi, "lkeyi" },
229 { Opt_sec_lkeyp, "lkeyp" },
230
8d042218
OK
231 { Opt_sec_spkm, "spkm3" },
232 { Opt_sec_spkmi, "spkm3i" },
233 { Opt_sec_spkmp, "spkm3p" },
234
bf0fd768
CL
235 { Opt_sec_err, NULL }
236};
237
7973c1f1
TM
238enum {
239 Opt_lookupcache_all, Opt_lookupcache_positive,
240 Opt_lookupcache_none,
241
242 Opt_lookupcache_err
243};
244
245static match_table_t nfs_lookupcache_tokens = {
246 { Opt_lookupcache_all, "all" },
247 { Opt_lookupcache_positive, "pos" },
248 { Opt_lookupcache_positive, "positive" },
249 { Opt_lookupcache_none, "none" },
250
251 { Opt_lookupcache_err, NULL }
252};
253
5eebde23
SJ
254enum {
255 Opt_local_lock_all, Opt_local_lock_flock, Opt_local_lock_posix,
256 Opt_local_lock_none,
257
258 Opt_local_lock_err
259};
260
261static match_table_t nfs_local_lock_tokens = {
262 { Opt_local_lock_all, "all" },
263 { Opt_local_lock_flock, "flock" },
264 { Opt_local_lock_posix, "posix" },
265 { Opt_local_lock_none, "none" },
266
267 { Opt_local_lock_err, NULL }
268};
269
0d71b058
TM
270enum {
271 Opt_vers_2, Opt_vers_3, Opt_vers_4, Opt_vers_4_0,
42c2c424 272 Opt_vers_4_1, Opt_vers_4_2,
0d71b058
TM
273
274 Opt_vers_err
275};
276
277static match_table_t nfs_vers_tokens = {
278 { Opt_vers_2, "2" },
279 { Opt_vers_3, "3" },
280 { Opt_vers_4, "4" },
281 { Opt_vers_4_0, "4.0" },
282 { Opt_vers_4_1, "4.1" },
42c2c424 283 { Opt_vers_4_2, "4.2" },
0d71b058
TM
284
285 { Opt_vers_err, NULL }
286};
bf0fd768 287
31f43471
AV
288static struct dentry *nfs_xdev_mount(struct file_system_type *fs_type,
289 int flags, const char *dev_name, void *raw_data);
f7b422b1 290
ab7017a3 291struct file_system_type nfs_fs_type = {
f7b422b1
DH
292 .owner = THIS_MODULE,
293 .name = "nfs",
01194981 294 .mount = nfs_fs_mount,
f7b422b1 295 .kill_sb = nfs_kill_super,
ecf3d1f1 296 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
f7b422b1 297};
7f78e035 298MODULE_ALIAS_FS("nfs");
ddda8e0a 299EXPORT_SYMBOL_GPL(nfs_fs_type);
f7b422b1 300
54ceac45 301struct file_system_type nfs_xdev_fs_type = {
f7b422b1
DH
302 .owner = THIS_MODULE,
303 .name = "nfs",
31f43471 304 .mount = nfs_xdev_mount,
f7b422b1 305 .kill_sb = nfs_kill_super,
ecf3d1f1 306 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
f7b422b1
DH
307};
308
6a74490d 309const struct super_operations nfs_sops = {
f7b422b1
DH
310 .alloc_inode = nfs_alloc_inode,
311 .destroy_inode = nfs_destroy_inode,
312 .write_inode = nfs_write_inode,
eed99357 313 .drop_inode = nfs_drop_inode,
387c149b 314 .put_super = nfs_put_super,
f7b422b1 315 .statfs = nfs_statfs,
b57922d9 316 .evict_inode = nfs_evict_inode,
f7b422b1
DH
317 .umount_begin = nfs_umount_begin,
318 .show_options = nfs_show_options,
c7f404b4
AV
319 .show_devname = nfs_show_devname,
320 .show_path = nfs_show_path,
f7b422b1 321 .show_stats = nfs_show_stats,
48b605f8 322 .remount_fs = nfs_remount,
f7b422b1 323};
ddda8e0a 324EXPORT_SYMBOL_GPL(nfs_sops);
f7b422b1 325
89d77c8f 326#if IS_ENABLED(CONFIG_NFS_V4)
b72e4f42 327static void nfs4_validate_mount_flags(struct nfs_parsed_mount_data *);
d72c727c
BS
328static int nfs4_validate_mount_data(void *options,
329 struct nfs_parsed_mount_data *args, const char *dev_name);
1ae811ee 330
331struct file_system_type nfs4_fs_type = {
332 .owner = THIS_MODULE,
333 .name = "nfs4",
334 .mount = nfs_fs_mount,
335 .kill_sb = nfs_kill_super,
ecf3d1f1 336 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
1ae811ee 337};
7f78e035 338MODULE_ALIAS_FS("nfs4");
fa7614dd 339MODULE_ALIAS("nfs4");
1ae811ee 340EXPORT_SYMBOL_GPL(nfs4_fs_type);
341
342static int __init register_nfs4_fs(void)
343{
344 return register_filesystem(&nfs4_fs_type);
345}
346
347static void unregister_nfs4_fs(void)
348{
349 unregister_filesystem(&nfs4_fs_type);
350}
351#else
352static int __init register_nfs4_fs(void)
353{
354 return 0;
355}
356
357static void unregister_nfs4_fs(void)
358{
359}
f7b422b1
DH
360#endif
361
8e1f936b 362static struct shrinker acl_shrinker = {
1ab6c499
DC
363 .count_objects = nfs_access_cache_count,
364 .scan_objects = nfs_access_cache_scan,
8e1f936b
RR
365 .seeks = DEFAULT_SEEKS,
366};
979df72e 367
f7b422b1
DH
368/*
369 * Register the NFS filesystems
370 */
371int __init register_nfs_fs(void)
372{
373 int ret;
374
375 ret = register_filesystem(&nfs_fs_type);
376 if (ret < 0)
377 goto error_0;
378
1ae811ee 379 ret = register_nfs4_fs();
f7b422b1
DH
380 if (ret < 0)
381 goto error_1;
1ae811ee 382
383 ret = nfs_register_sysctl();
384 if (ret < 0)
385 goto error_2;
8e1f936b 386 register_shrinker(&acl_shrinker);
f7b422b1
DH
387 return 0;
388
1ae811ee 389error_2:
390 unregister_nfs4_fs();
f7b422b1
DH
391error_1:
392 unregister_filesystem(&nfs_fs_type);
f7b422b1
DH
393error_0:
394 return ret;
395}
396
397/*
398 * Unregister the NFS filesystems
399 */
400void __exit unregister_nfs_fs(void)
401{
8e1f936b 402 unregister_shrinker(&acl_shrinker);
49af7ee1 403 nfs_unregister_sysctl();
1ae811ee 404 unregister_nfs4_fs();
f7b422b1
DH
405 unregister_filesystem(&nfs_fs_type);
406}
407
1daef0a8 408void nfs_sb_active(struct super_block *sb)
ef818a28 409{
1daef0a8 410 struct nfs_server *server = NFS_SB(sb);
ef818a28 411
1daef0a8
TM
412 if (atomic_inc_return(&server->active) == 1)
413 atomic_inc(&sb->s_active);
ef818a28 414}
89d77c8f 415EXPORT_SYMBOL_GPL(nfs_sb_active);
ef818a28 416
1daef0a8 417void nfs_sb_deactive(struct super_block *sb)
ef818a28
SD
418{
419 struct nfs_server *server = NFS_SB(sb);
1daef0a8
TM
420
421 if (atomic_dec_and_test(&server->active))
422 deactivate_super(sb);
ef818a28 423}
89d77c8f 424EXPORT_SYMBOL_GPL(nfs_sb_deactive);
ef818a28 425
f7b422b1
DH
426/*
427 * Deliver file system statistics to userspace
428 */
fbdefd64 429int nfs_statfs(struct dentry *dentry, struct kstatfs *buf)
f7b422b1 430{
0c7d90cf 431 struct nfs_server *server = NFS_SB(dentry->d_sb);
f7b422b1
DH
432 unsigned char blockbits;
433 unsigned long blockres;
0c7d90cf 434 struct nfs_fh *fh = NFS_FH(dentry->d_inode);
ca7e9a0d
TM
435 struct nfs_fsstat res;
436 int error = -ENOMEM;
437
438 res.fattr = nfs_alloc_fattr();
439 if (res.fattr == NULL)
440 goto out_err;
f7b422b1 441
8fa5c000 442 error = server->nfs_client->rpc_ops->statfs(server, fh, &res);
fbf3fdd2
MZ
443 if (unlikely(error == -ESTALE)) {
444 struct dentry *pd_dentry;
445
446 pd_dentry = dget_parent(dentry);
447 if (pd_dentry != NULL) {
448 nfs_zap_caches(pd_dentry->d_inode);
449 dput(pd_dentry);
450 }
451 }
ca7e9a0d 452 nfs_free_fattr(res.fattr);
f7b422b1
DH
453 if (error < 0)
454 goto out_err;
ca7e9a0d 455
1a0ba9ae 456 buf->f_type = NFS_SUPER_MAGIC;
f7b422b1
DH
457
458 /*
459 * Current versions of glibc do not correctly handle the
460 * case where f_frsize != f_bsize. Eventually we want to
461 * report the value of wtmult in this field.
462 */
0c7d90cf 463 buf->f_frsize = dentry->d_sb->s_blocksize;
f7b422b1
DH
464
465 /*
466 * On most *nix systems, f_blocks, f_bfree, and f_bavail
467 * are reported in units of f_frsize. Linux hasn't had
468 * an f_frsize field in its statfs struct until recently,
469 * thus historically Linux's sys_statfs reports these
470 * fields in units of f_bsize.
471 */
0c7d90cf
DH
472 buf->f_bsize = dentry->d_sb->s_blocksize;
473 blockbits = dentry->d_sb->s_blocksize_bits;
f7b422b1
DH
474 blockres = (1 << blockbits) - 1;
475 buf->f_blocks = (res.tbytes + blockres) >> blockbits;
476 buf->f_bfree = (res.fbytes + blockres) >> blockbits;
477 buf->f_bavail = (res.abytes + blockres) >> blockbits;
478
479 buf->f_files = res.tfiles;
480 buf->f_ffree = res.afiles;
481
482 buf->f_namelen = server->namelen;
1a0ba9ae 483
f7b422b1
DH
484 return 0;
485
486 out_err:
3110ff80 487 dprintk("%s: statfs error = %d\n", __func__, -error);
1a0ba9ae 488 return error;
f7b422b1 489}
89d77c8f 490EXPORT_SYMBOL_GPL(nfs_statfs);
f7b422b1 491
7d4e2747
DH
492/*
493 * Map the security flavour number to a name
494 */
81039f1f
TM
495static const char *nfs_pseudoflavour_to_name(rpc_authflavor_t flavour)
496{
7d4e2747 497 static const struct {
81039f1f
TM
498 rpc_authflavor_t flavour;
499 const char *str;
4d4b69dd
WAA
500 } sec_flavours[NFS_AUTH_INFO_MAX_FLAVORS] = {
501 /* update NFS_AUTH_INFO_MAX_FLAVORS when this list changes! */
81039f1f
TM
502 { RPC_AUTH_NULL, "null" },
503 { RPC_AUTH_UNIX, "sys" },
504 { RPC_AUTH_GSS_KRB5, "krb5" },
505 { RPC_AUTH_GSS_KRB5I, "krb5i" },
506 { RPC_AUTH_GSS_KRB5P, "krb5p" },
507 { RPC_AUTH_GSS_LKEY, "lkey" },
508 { RPC_AUTH_GSS_LKEYI, "lkeyi" },
509 { RPC_AUTH_GSS_LKEYP, "lkeyp" },
510 { RPC_AUTH_GSS_SPKM, "spkm" },
511 { RPC_AUTH_GSS_SPKMI, "spkmi" },
512 { RPC_AUTH_GSS_SPKMP, "spkmp" },
4d81cd16 513 { UINT_MAX, "unknown" }
81039f1f
TM
514 };
515 int i;
516
4d81cd16 517 for (i = 0; sec_flavours[i].flavour != UINT_MAX; i++) {
81039f1f
TM
518 if (sec_flavours[i].flavour == flavour)
519 break;
520 }
521 return sec_flavours[i].str;
522}
523
ee671b01
JL
524static void nfs_show_mountd_netid(struct seq_file *m, struct nfs_server *nfss,
525 int showdefaults)
526{
527 struct sockaddr *sap = (struct sockaddr *) &nfss->mountd_address;
528
529 seq_printf(m, ",mountproto=");
530 switch (sap->sa_family) {
531 case AF_INET:
532 switch (nfss->mountd_protocol) {
533 case IPPROTO_UDP:
534 seq_printf(m, RPCBIND_NETID_UDP);
535 break;
536 case IPPROTO_TCP:
537 seq_printf(m, RPCBIND_NETID_TCP);
538 break;
539 default:
540 if (showdefaults)
541 seq_printf(m, "auto");
542 }
543 break;
544 case AF_INET6:
545 switch (nfss->mountd_protocol) {
546 case IPPROTO_UDP:
547 seq_printf(m, RPCBIND_NETID_UDP6);
548 break;
549 case IPPROTO_TCP:
550 seq_printf(m, RPCBIND_NETID_TCP6);
551 break;
552 default:
553 if (showdefaults)
554 seq_printf(m, "auto");
555 }
556 break;
557 default:
558 if (showdefaults)
559 seq_printf(m, "auto");
560 }
561}
562
82d101d5
CL
563static void nfs_show_mountd_options(struct seq_file *m, struct nfs_server *nfss,
564 int showdefaults)
565{
566 struct sockaddr *sap = (struct sockaddr *)&nfss->mountd_address;
567
d5eff1a3
BS
568 if (nfss->flags & NFS_MOUNT_LEGACY_INTERFACE)
569 return;
570
82d101d5
CL
571 switch (sap->sa_family) {
572 case AF_INET: {
573 struct sockaddr_in *sin = (struct sockaddr_in *)sap;
be859405 574 seq_printf(m, ",mountaddr=%pI4", &sin->sin_addr.s_addr);
82d101d5
CL
575 break;
576 }
577 case AF_INET6: {
578 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap;
d250e190 579 seq_printf(m, ",mountaddr=%pI6c", &sin6->sin6_addr);
82d101d5
CL
580 break;
581 }
582 default:
583 if (showdefaults)
584 seq_printf(m, ",mountaddr=unspecified");
585 }
586
587 if (nfss->mountd_version || showdefaults)
588 seq_printf(m, ",mountvers=%u", nfss->mountd_version);
aa699473
SK
589 if ((nfss->mountd_port &&
590 nfss->mountd_port != (unsigned short)NFS_UNSPEC_PORT) ||
591 showdefaults)
82d101d5
CL
592 seq_printf(m, ",mountport=%u", nfss->mountd_port);
593
ee671b01 594 nfs_show_mountd_netid(m, nfss, showdefaults);
82d101d5
CL
595}
596
89d77c8f 597#if IS_ENABLED(CONFIG_NFS_V4)
0be8189f
TM
598static void nfs_show_nfsv4_options(struct seq_file *m, struct nfs_server *nfss,
599 int showdefaults)
600{
601 struct nfs_client *clp = nfss->nfs_client;
602
603 seq_printf(m, ",clientaddr=%s", clp->cl_ipaddr);
0be8189f
TM
604}
605#else
606static void nfs_show_nfsv4_options(struct seq_file *m, struct nfs_server *nfss,
607 int showdefaults)
608{
609}
610#endif
611
7bbceb6f
TM
612static void nfs_show_nfs_version(struct seq_file *m,
613 unsigned int version,
614 unsigned int minorversion)
615{
616 seq_printf(m, ",vers=%u", version);
617 if (version == 4)
618 seq_printf(m, ".%u", minorversion);
619}
620
f7b422b1
DH
621/*
622 * Describe the mount options in force on this server representation
623 */
82d101d5
CL
624static void nfs_show_mount_options(struct seq_file *m, struct nfs_server *nfss,
625 int showdefaults)
f7b422b1 626{
509de811 627 static const struct proc_nfs_info {
f7b422b1 628 int flag;
509de811
DH
629 const char *str;
630 const char *nostr;
f7b422b1
DH
631 } nfs_info[] = {
632 { NFS_MOUNT_SOFT, ",soft", ",hard" },
82d101d5 633 { NFS_MOUNT_POSIX, ",posix", "" },
f7b422b1
DH
634 { NFS_MOUNT_NOCTO, ",nocto", "" },
635 { NFS_MOUNT_NOAC, ",noac", "" },
636 { NFS_MOUNT_NONLM, ",nolock", "" },
637 { NFS_MOUNT_NOACL, ",noacl", "" },
74dd34e6 638 { NFS_MOUNT_NORDIRPLUS, ",nordirplus", "" },
d740351b
CL
639 { NFS_MOUNT_UNSHARED, ",nosharecache", "" },
640 { NFS_MOUNT_NORESVPORT, ",noresvport", "" },
f7b422b1
DH
641 { 0, NULL, NULL }
642 };
509de811 643 const struct proc_nfs_info *nfs_infop;
8fa5c000 644 struct nfs_client *clp = nfss->nfs_client;
82d101d5 645 u32 version = clp->rpc_ops->version;
7c563cc9 646 int local_flock, local_fcntl;
f7b422b1 647
7bbceb6f 648 nfs_show_nfs_version(m, version, clp->cl_minorversion);
2d767432
CL
649 seq_printf(m, ",rsize=%u", nfss->rsize);
650 seq_printf(m, ",wsize=%u", nfss->wsize);
82d101d5
CL
651 if (nfss->bsize != 0)
652 seq_printf(m, ",bsize=%u", nfss->bsize);
653 seq_printf(m, ",namlen=%u", nfss->namelen);
0e0cab74 654 if (nfss->acregmin != NFS_DEF_ACREGMIN*HZ || showdefaults)
2d767432 655 seq_printf(m, ",acregmin=%u", nfss->acregmin/HZ);
0e0cab74 656 if (nfss->acregmax != NFS_DEF_ACREGMAX*HZ || showdefaults)
2d767432 657 seq_printf(m, ",acregmax=%u", nfss->acregmax/HZ);
0e0cab74 658 if (nfss->acdirmin != NFS_DEF_ACDIRMIN*HZ || showdefaults)
2d767432 659 seq_printf(m, ",acdirmin=%u", nfss->acdirmin/HZ);
0e0cab74 660 if (nfss->acdirmax != NFS_DEF_ACDIRMAX*HZ || showdefaults)
2d767432 661 seq_printf(m, ",acdirmax=%u", nfss->acdirmax/HZ);
f7b422b1
DH
662 for (nfs_infop = nfs_info; nfs_infop->flag; nfs_infop++) {
663 if (nfss->flags & nfs_infop->flag)
664 seq_puts(m, nfs_infop->str);
665 else
666 seq_puts(m, nfs_infop->nostr);
667 }
2446ab60 668 rcu_read_lock();
56928edd 669 seq_printf(m, ",proto=%s",
ee671b01 670 rpc_peeraddr2str(nfss->client, RPC_DISPLAY_NETID));
2446ab60 671 rcu_read_unlock();
82d101d5
CL
672 if (version == 4) {
673 if (nfss->port != NFS_PORT)
674 seq_printf(m, ",port=%u", nfss->port);
675 } else
676 if (nfss->port)
677 seq_printf(m, ",port=%u", nfss->port);
678
33170233
TM
679 seq_printf(m, ",timeo=%lu", 10U * nfss->client->cl_timeout->to_initval / HZ);
680 seq_printf(m, ",retrans=%u", nfss->client->cl_timeout->to_retries);
81039f1f 681 seq_printf(m, ",sec=%s", nfs_pseudoflavour_to_name(nfss->client->cl_auth->au_flavor));
82d101d5
CL
682
683 if (version != 4)
684 nfs_show_mountd_options(m, nfss, showdefaults);
0be8189f
TM
685 else
686 nfs_show_nfsv4_options(m, nfss, showdefaults);
82d101d5 687
b797cac7
DH
688 if (nfss->options & NFS_OPTION_FSCACHE)
689 seq_printf(m, ",fsc");
9b00c643 690
89652617
CL
691 if (nfss->options & NFS_OPTION_MIGRATION)
692 seq_printf(m, ",migration");
693
9b00c643
PL
694 if (nfss->flags & NFS_MOUNT_LOOKUP_CACHE_NONEG) {
695 if (nfss->flags & NFS_MOUNT_LOOKUP_CACHE_NONE)
696 seq_printf(m, ",lookupcache=none");
697 else
698 seq_printf(m, ",lookupcache=pos");
699 }
7c563cc9
SJ
700
701 local_flock = nfss->flags & NFS_MOUNT_LOCAL_FLOCK;
702 local_fcntl = nfss->flags & NFS_MOUNT_LOCAL_FCNTL;
703
704 if (!local_flock && !local_fcntl)
705 seq_printf(m, ",local_lock=none");
706 else if (local_flock && local_fcntl)
707 seq_printf(m, ",local_lock=all");
708 else if (local_flock)
709 seq_printf(m, ",local_lock=flock");
710 else
711 seq_printf(m, ",local_lock=posix");
f7b422b1
DH
712}
713
714/*
715 * Describe the mount options on this VFS mountpoint
716 */
fbdefd64 717int nfs_show_options(struct seq_file *m, struct dentry *root)
f7b422b1 718{
34c80b1d 719 struct nfs_server *nfss = NFS_SB(root->d_sb);
f7b422b1
DH
720
721 nfs_show_mount_options(m, nfss, 0);
722
2446ab60 723 rcu_read_lock();
5d8515ca
CL
724 seq_printf(m, ",addr=%s",
725 rpc_peeraddr2str(nfss->nfs_client->cl_rpcclient,
726 RPC_DISPLAY_ADDR));
2446ab60 727 rcu_read_unlock();
f7b422b1
DH
728
729 return 0;
730}
89d77c8f 731EXPORT_SYMBOL_GPL(nfs_show_options);
45402c38 732
89d77c8f 733#if IS_ENABLED(CONFIG_NFS_V4)
ae50c0b5 734#ifdef CONFIG_NFS_V4_1
45402c38 735static void show_sessions(struct seq_file *m, struct nfs_server *server)
ae50c0b5
BF
736{
737 if (nfs4_has_session(server->nfs_client))
738 seq_printf(m, ",sessions");
739}
740#else
45402c38
HS
741static void show_sessions(struct seq_file *m, struct nfs_server *server) {}
742#endif
ae50c0b5
BF
743#endif
744
745#ifdef CONFIG_NFS_V4_1
45402c38 746static void show_pnfs(struct seq_file *m, struct nfs_server *server)
ae50c0b5
BF
747{
748 seq_printf(m, ",pnfs=");
749 if (server->pnfs_curr_ld)
750 seq_printf(m, "%s", server->pnfs_curr_ld->name);
751 else
752 seq_printf(m, "not configured");
753}
7e03b7cc
TM
754
755static void show_implementation_id(struct seq_file *m, struct nfs_server *nfss)
756{
59155546
CL
757 if (nfss->nfs_client && nfss->nfs_client->cl_implid) {
758 struct nfs41_impl_id *impl_id = nfss->nfs_client->cl_implid;
7e03b7cc
TM
759 seq_printf(m, "\n\timpl_id:\tname='%s',domain='%s',"
760 "date='%llu,%u'",
761 impl_id->name, impl_id->domain,
762 impl_id->date.seconds, impl_id->date.nseconds);
763 }
764}
45402c38 765#else
89d77c8f 766#if IS_ENABLED(CONFIG_NFS_V4)
7e03b7cc
TM
767static void show_pnfs(struct seq_file *m, struct nfs_server *server)
768{
769}
45402c38 770#endif
7e03b7cc
TM
771static void show_implementation_id(struct seq_file *m, struct nfs_server *nfss)
772{
773}
45402c38 774#endif
f7b422b1 775
fbdefd64 776int nfs_show_devname(struct seq_file *m, struct dentry *root)
c7f404b4
AV
777{
778 char *page = (char *) __get_free_page(GFP_KERNEL);
779 char *devname, *dummy;
780 int err = 0;
781 if (!page)
782 return -ENOMEM;
97a54868 783 devname = nfs_path(&dummy, root, page, PAGE_SIZE, 0);
c7f404b4
AV
784 if (IS_ERR(devname))
785 err = PTR_ERR(devname);
786 else
787 seq_escape(m, devname, " \t\n\\");
788 free_page((unsigned long)page);
789 return err;
790}
89d77c8f 791EXPORT_SYMBOL_GPL(nfs_show_devname);
c7f404b4 792
fbdefd64 793int nfs_show_path(struct seq_file *m, struct dentry *dentry)
c7f404b4
AV
794{
795 seq_puts(m, "/");
796 return 0;
797}
89d77c8f 798EXPORT_SYMBOL_GPL(nfs_show_path);
c7f404b4 799
f7b422b1
DH
800/*
801 * Present statistical information for this VFS mountpoint
802 */
fbdefd64 803int nfs_show_stats(struct seq_file *m, struct dentry *root)
f7b422b1
DH
804{
805 int i, cpu;
64132379 806 struct nfs_server *nfss = NFS_SB(root->d_sb);
f7b422b1
DH
807 struct rpc_auth *auth = nfss->client->cl_auth;
808 struct nfs_iostats totals = { };
809
810 seq_printf(m, "statvers=%s", NFS_IOSTAT_VERS);
811
812 /*
813 * Display all mount option settings
814 */
815 seq_printf(m, "\n\topts:\t");
64132379
AV
816 seq_puts(m, root->d_sb->s_flags & MS_RDONLY ? "ro" : "rw");
817 seq_puts(m, root->d_sb->s_flags & MS_SYNCHRONOUS ? ",sync" : "");
818 seq_puts(m, root->d_sb->s_flags & MS_NOATIME ? ",noatime" : "");
819 seq_puts(m, root->d_sb->s_flags & MS_NODIRATIME ? ",nodiratime" : "");
f7b422b1
DH
820 nfs_show_mount_options(m, nfss, 1);
821
822 seq_printf(m, "\n\tage:\t%lu", (jiffies - nfss->mount_time) / HZ);
823
7e03b7cc 824 show_implementation_id(m, nfss);
7d2ed9ac 825
f7b422b1
DH
826 seq_printf(m, "\n\tcaps:\t");
827 seq_printf(m, "caps=0x%x", nfss->caps);
2d767432
CL
828 seq_printf(m, ",wtmult=%u", nfss->wtmult);
829 seq_printf(m, ",dtsize=%u", nfss->dtsize);
830 seq_printf(m, ",bsize=%u", nfss->bsize);
831 seq_printf(m, ",namlen=%u", nfss->namelen);
f7b422b1 832
89d77c8f 833#if IS_ENABLED(CONFIG_NFS_V4)
40c55319 834 if (nfss->nfs_client->rpc_ops->version == 4) {
f7b422b1
DH
835 seq_printf(m, "\n\tnfsv4:\t");
836 seq_printf(m, "bm0=0x%x", nfss->attr_bitmask[0]);
837 seq_printf(m, ",bm1=0x%x", nfss->attr_bitmask[1]);
a09df2ca 838 seq_printf(m, ",bm2=0x%x", nfss->attr_bitmask[2]);
f7b422b1 839 seq_printf(m, ",acl=0x%x", nfss->acl_bitmask);
ae50c0b5
BF
840 show_sessions(m, nfss);
841 show_pnfs(m, nfss);
f7b422b1
DH
842 }
843#endif
844
845 /*
846 * Display security flavor in effect for this mount
847 */
2d767432 848 seq_printf(m, "\n\tsec:\tflavor=%u", auth->au_ops->au_flavor);
f7b422b1 849 if (auth->au_flavor)
2d767432 850 seq_printf(m, ",pseudoflavor=%u", auth->au_flavor);
f7b422b1
DH
851
852 /*
853 * Display superblock I/O counters
854 */
855 for_each_possible_cpu(cpu) {
856 struct nfs_iostats *stats;
857
858 preempt_disable();
859 stats = per_cpu_ptr(nfss->io_stats, cpu);
860
861 for (i = 0; i < __NFSIOS_COUNTSMAX; i++)
862 totals.events[i] += stats->events[i];
863 for (i = 0; i < __NFSIOS_BYTESMAX; i++)
864 totals.bytes[i] += stats->bytes[i];
6a51091d
DH
865#ifdef CONFIG_NFS_FSCACHE
866 for (i = 0; i < __NFSIOS_FSCACHEMAX; i++)
867 totals.fscache[i] += stats->fscache[i];
868#endif
f7b422b1
DH
869
870 preempt_enable();
871 }
872
873 seq_printf(m, "\n\tevents:\t");
874 for (i = 0; i < __NFSIOS_COUNTSMAX; i++)
875 seq_printf(m, "%lu ", totals.events[i]);
876 seq_printf(m, "\n\tbytes:\t");
877 for (i = 0; i < __NFSIOS_BYTESMAX; i++)
878 seq_printf(m, "%Lu ", totals.bytes[i]);
6a51091d
DH
879#ifdef CONFIG_NFS_FSCACHE
880 if (nfss->options & NFS_OPTION_FSCACHE) {
881 seq_printf(m, "\n\tfsc:\t");
882 for (i = 0; i < __NFSIOS_FSCACHEMAX; i++)
883 seq_printf(m, "%Lu ", totals.bytes[i]);
884 }
885#endif
f7b422b1
DH
886 seq_printf(m, "\n");
887
888 rpc_print_iostats(m, nfss->client);
889
890 return 0;
891}
89d77c8f 892EXPORT_SYMBOL_GPL(nfs_show_stats);
f7b422b1
DH
893
894/*
895 * Begin unmount by attempting to remove all automounted mountpoints we added
54ceac45 896 * in response to xdev traversals and referrals
f7b422b1 897 */
fbdefd64 898void nfs_umount_begin(struct super_block *sb)
f7b422b1 899{
67e55205 900 struct nfs_server *server;
fc6ae3cf
TM
901 struct rpc_clnt *rpc;
902
67e55205 903 server = NFS_SB(sb);
fc6ae3cf
TM
904 /* -EIO all pending I/O */
905 rpc = server->client_acl;
906 if (!IS_ERR(rpc))
907 rpc_killall_tasks(rpc);
908 rpc = server->client;
909 if (!IS_ERR(rpc))
910 rpc_killall_tasks(rpc);
f7b422b1 911}
89d77c8f 912EXPORT_SYMBOL_GPL(nfs_umount_begin);
f7b422b1 913
db833351 914static struct nfs_parsed_mount_data *nfs_alloc_parsed_mount_data(void)
9423a08a
CL
915{
916 struct nfs_parsed_mount_data *data;
917
918 data = kzalloc(sizeof(*data), GFP_KERNEL);
919 if (data) {
9423a08a
CL
920 data->acregmin = NFS_DEF_ACREGMIN;
921 data->acregmax = NFS_DEF_ACREGMAX;
922 data->acdirmin = NFS_DEF_ACDIRMIN;
923 data->acdirmax = NFS_DEF_ACDIRMAX;
c5811dbd 924 data->mount_server.port = NFS_UNSPEC_PORT;
9423a08a 925 data->nfs_server.port = NFS_UNSPEC_PORT;
c5811dbd 926 data->nfs_server.protocol = XPRT_TRANSPORT_TCP;
a3f73c27 927 data->selected_flavor = RPC_AUTH_MAXFLAVOR;
9423a08a 928 data->minorversion = 0;
b72e4f42 929 data->need_mount = true;
9937347a 930 data->net = current->nsproxy->net_ns;
8a0d551a 931 security_init_mnt_opts(&data->lsm_opts);
9423a08a
CL
932 }
933 return data;
934}
935
8a0d551a
JL
936static void nfs_free_parsed_mount_data(struct nfs_parsed_mount_data *data)
937{
938 if (data) {
939 kfree(data->client_address);
940 kfree(data->mount_server.hostname);
941 kfree(data->nfs_server.export_path);
942 kfree(data->nfs_server.hostname);
943 kfree(data->fscache_uniq);
944 security_free_mnt_opts(&data->lsm_opts);
945 kfree(data);
946 }
947}
948
fc50d58f 949/*
cdcd7f9a
CL
950 * Sanity-check a server address provided by the mount command.
951 *
952 * Address family must be initialized, and address must not be
953 * the ANY address for that family.
fc50d58f
CL
954 */
955static int nfs_verify_server_address(struct sockaddr *addr)
956{
957 switch (addr->sa_family) {
958 case AF_INET: {
cdcd7f9a 959 struct sockaddr_in *sa = (struct sockaddr_in *)addr;
e6f1cebf 960 return sa->sin_addr.s_addr != htonl(INADDR_ANY);
cdcd7f9a
CL
961 }
962 case AF_INET6: {
963 struct in6_addr *sa = &((struct sockaddr_in6 *)addr)->sin6_addr;
964 return !ipv6_addr_any(sa);
fc50d58f
CL
965 }
966 }
967
53a0b9c4 968 dfprintk(MOUNT, "NFS: Invalid IP address specified\n");
fc50d58f
CL
969 return 0;
970}
971
4cfd74fc
CL
972/*
973 * Select between a default port value and a user-specified port value.
974 * If a zero value is set, then autobind will be used.
975 */
f5855fec 976static void nfs_set_port(struct sockaddr *sap, int *port,
4cfd74fc
CL
977 const unsigned short default_port)
978{
f5855fec
TM
979 if (*port == NFS_UNSPEC_PORT)
980 *port = default_port;
4cfd74fc 981
f5855fec 982 rpc_set_port(sap, *port);
4cfd74fc
CL
983}
984
259875ef
TM
985/*
986 * Sanity check the NFS transport protocol.
987 *
988 */
989static void nfs_validate_transport_protocol(struct nfs_parsed_mount_data *mnt)
990{
991 switch (mnt->nfs_server.protocol) {
992 case XPRT_TRANSPORT_UDP:
993 case XPRT_TRANSPORT_TCP:
994 case XPRT_TRANSPORT_RDMA:
995 break;
996 default:
997 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
998 }
999}
1000
1001/*
1002 * For text based NFSv2/v3 mounts, the mount protocol transport default
1003 * settings should depend upon the specified NFS transport.
1004 */
1005static void nfs_set_mount_transport_protocol(struct nfs_parsed_mount_data *mnt)
1006{
1007 nfs_validate_transport_protocol(mnt);
1008
1009 if (mnt->mount_server.protocol == XPRT_TRANSPORT_UDP ||
1010 mnt->mount_server.protocol == XPRT_TRANSPORT_TCP)
1011 return;
1012 switch (mnt->nfs_server.protocol) {
1013 case XPRT_TRANSPORT_UDP:
1014 mnt->mount_server.protocol = XPRT_TRANSPORT_UDP;
1015 break;
1016 case XPRT_TRANSPORT_TCP:
1017 case XPRT_TRANSPORT_RDMA:
1018 mnt->mount_server.protocol = XPRT_TRANSPORT_TCP;
1019 }
1020}
1021
4d4b69dd
WAA
1022/*
1023 * Add 'flavor' to 'auth_info' if not already present.
1024 * Returns true if 'flavor' ends up in the list, false otherwise
1025 */
1026static bool nfs_auth_info_add(struct nfs_auth_info *auth_info,
1027 rpc_authflavor_t flavor)
1028{
1029 unsigned int i;
1030 unsigned int max_flavor_len = (sizeof(auth_info->flavors) /
1031 sizeof(auth_info->flavors[0]));
1032
1033 /* make sure this flavor isn't already in the list */
1034 for (i = 0; i < auth_info->flavor_len; i++) {
1035 if (flavor == auth_info->flavors[i])
1036 return true;
1037 }
1038
1039 if (auth_info->flavor_len + 1 >= max_flavor_len) {
1040 dfprintk(MOUNT, "NFS: too many sec= flavors\n");
1041 return false;
1042 }
1043
1044 auth_info->flavors[auth_info->flavor_len++] = flavor;
1045 return true;
1046}
1047
1048/*
1049 * Return true if 'match' is in auth_info or auth_info is empty.
1050 * Return false otherwise.
1051 */
1052bool nfs_auth_info_match(const struct nfs_auth_info *auth_info,
1053 rpc_authflavor_t match)
1054{
1055 int i;
1056
1057 if (!auth_info->flavor_len)
1058 return true;
1059
1060 for (i = 0; i < auth_info->flavor_len; i++) {
1061 if (auth_info->flavors[i] == match)
1062 return true;
1063 }
1064 return false;
1065}
1066EXPORT_SYMBOL_GPL(nfs_auth_info_match);
1067
01060c89
CL
1068/*
1069 * Parse the value of the 'sec=' option.
01060c89
CL
1070 */
1071static int nfs_parse_security_flavors(char *value,
1072 struct nfs_parsed_mount_data *mnt)
1073{
1074 substring_t args[MAX_OPT_ARGS];
19e7b8d2 1075 rpc_authflavor_t pseudoflavor;
4d4b69dd 1076 char *p;
01060c89
CL
1077
1078 dfprintk(MOUNT, "NFS: parsing sec=%s option\n", value);
1079
4d4b69dd
WAA
1080 while ((p = strsep(&value, ":")) != NULL) {
1081 switch (match_token(p, nfs_secflavor_tokens, args)) {
1082 case Opt_sec_none:
1083 pseudoflavor = RPC_AUTH_NULL;
1084 break;
1085 case Opt_sec_sys:
1086 pseudoflavor = RPC_AUTH_UNIX;
1087 break;
1088 case Opt_sec_krb5:
1089 pseudoflavor = RPC_AUTH_GSS_KRB5;
1090 break;
1091 case Opt_sec_krb5i:
1092 pseudoflavor = RPC_AUTH_GSS_KRB5I;
1093 break;
1094 case Opt_sec_krb5p:
1095 pseudoflavor = RPC_AUTH_GSS_KRB5P;
1096 break;
1097 case Opt_sec_lkey:
1098 pseudoflavor = RPC_AUTH_GSS_LKEY;
1099 break;
1100 case Opt_sec_lkeyi:
1101 pseudoflavor = RPC_AUTH_GSS_LKEYI;
1102 break;
1103 case Opt_sec_lkeyp:
1104 pseudoflavor = RPC_AUTH_GSS_LKEYP;
1105 break;
1106 case Opt_sec_spkm:
1107 pseudoflavor = RPC_AUTH_GSS_SPKM;
1108 break;
1109 case Opt_sec_spkmi:
1110 pseudoflavor = RPC_AUTH_GSS_SPKMI;
1111 break;
1112 case Opt_sec_spkmp:
1113 pseudoflavor = RPC_AUTH_GSS_SPKMP;
1114 break;
1115 default:
1116 dfprintk(MOUNT,
1117 "NFS: sec= option '%s' not recognized\n", p);
1118 return 0;
1119 }
1120
1121 if (!nfs_auth_info_add(&mnt->auth_info, pseudoflavor))
1122 return 0;
01060c89
CL
1123 }
1124
1125 return 1;
1126}
1127
0d71b058
TM
1128static int nfs_parse_version_string(char *string,
1129 struct nfs_parsed_mount_data *mnt,
1130 substring_t *args)
1131{
1132 mnt->flags &= ~NFS_MOUNT_VER3;
1133 switch (match_token(string, nfs_vers_tokens, args)) {
1134 case Opt_vers_2:
1135 mnt->version = 2;
1136 break;
1137 case Opt_vers_3:
1138 mnt->flags |= NFS_MOUNT_VER3;
1139 mnt->version = 3;
1140 break;
1141 case Opt_vers_4:
1142 /* Backward compatibility option. In future,
1143 * the mount program should always supply
1144 * a NFSv4 minor version number.
1145 */
1146 mnt->version = 4;
1147 break;
1148 case Opt_vers_4_0:
1149 mnt->version = 4;
1150 mnt->minorversion = 0;
1151 break;
1152 case Opt_vers_4_1:
1153 mnt->version = 4;
1154 mnt->minorversion = 1;
1155 break;
42c2c424
SD
1156 case Opt_vers_4_2:
1157 mnt->version = 4;
1158 mnt->minorversion = 2;
1159 break;
0d71b058
TM
1160 default:
1161 return 0;
1162 }
1163 return 1;
1164}
1165
c5cb09b6
RL
1166static int nfs_get_option_str(substring_t args[], char **option)
1167{
1168 kfree(*option);
1169 *option = match_strdup(args);
e25fbe38 1170 return !*option;
c5cb09b6
RL
1171}
1172
1173static int nfs_get_option_ul(substring_t args[], unsigned long *option)
1174{
1175 int rc;
1176 char *string;
1177
1178 string = match_strdup(args);
1179 if (string == NULL)
1180 return -ENOMEM;
7297cb68 1181 rc = kstrtoul(string, 10, option);
c5cb09b6
RL
1182 kfree(string);
1183
1184 return rc;
1185}
1186
bf0fd768
CL
1187/*
1188 * Error-check and convert a string of mount options from user space into
f45663ce
CL
1189 * a data structure. The whole mount string is processed; bad options are
1190 * skipped as they are encountered. If there were no errors, return 1;
1191 * otherwise return 0 (zero).
bf0fd768
CL
1192 */
1193static int nfs_parse_mount_options(char *raw,
1194 struct nfs_parsed_mount_data *mnt)
1195{
f9c3a380 1196 char *p, *string, *secdata;
d23c45fd 1197 int rc, sloppy = 0, invalid_option = 0;
ee671b01
JL
1198 unsigned short protofamily = AF_UNSPEC;
1199 unsigned short mountfamily = AF_UNSPEC;
bf0fd768
CL
1200
1201 if (!raw) {
1202 dfprintk(MOUNT, "NFS: mount options string was NULL.\n");
1203 return 1;
1204 }
1205 dfprintk(MOUNT, "NFS: nfs mount opts='%s'\n", raw);
1206
f9c3a380
EP
1207 secdata = alloc_secdata();
1208 if (!secdata)
1209 goto out_nomem;
1210
1211 rc = security_sb_copy_data(raw, secdata);
1212 if (rc)
1213 goto out_security_failure;
1214
1215 rc = security_sb_parse_opts_str(secdata, &mnt->lsm_opts);
1216 if (rc)
1217 goto out_security_failure;
1218
1219 free_secdata(secdata);
1220
bf0fd768
CL
1221 while ((p = strsep(&raw, ",")) != NULL) {
1222 substring_t args[MAX_OPT_ARGS];
a5a16bae
CL
1223 unsigned long option;
1224 int token;
bf0fd768
CL
1225
1226 if (!*p)
1227 continue;
1228
1229 dfprintk(MOUNT, "NFS: parsing nfs mount option '%s'\n", p);
1230
1231 token = match_token(p, nfs_mount_option_tokens, args);
1232 switch (token) {
f45663ce
CL
1233
1234 /*
1235 * boolean options: foo/nofoo
1236 */
bf0fd768
CL
1237 case Opt_soft:
1238 mnt->flags |= NFS_MOUNT_SOFT;
1239 break;
1240 case Opt_hard:
1241 mnt->flags &= ~NFS_MOUNT_SOFT;
1242 break;
bf0fd768
CL
1243 case Opt_posix:
1244 mnt->flags |= NFS_MOUNT_POSIX;
1245 break;
1246 case Opt_noposix:
1247 mnt->flags &= ~NFS_MOUNT_POSIX;
1248 break;
1249 case Opt_cto:
1250 mnt->flags &= ~NFS_MOUNT_NOCTO;
1251 break;
1252 case Opt_nocto:
1253 mnt->flags |= NFS_MOUNT_NOCTO;
1254 break;
1255 case Opt_ac:
1256 mnt->flags &= ~NFS_MOUNT_NOAC;
1257 break;
1258 case Opt_noac:
1259 mnt->flags |= NFS_MOUNT_NOAC;
1260 break;
1261 case Opt_lock:
1262 mnt->flags &= ~NFS_MOUNT_NONLM;
5eebde23
SJ
1263 mnt->flags &= ~(NFS_MOUNT_LOCAL_FLOCK |
1264 NFS_MOUNT_LOCAL_FCNTL);
bf0fd768
CL
1265 break;
1266 case Opt_nolock:
1267 mnt->flags |= NFS_MOUNT_NONLM;
5eebde23
SJ
1268 mnt->flags |= (NFS_MOUNT_LOCAL_FLOCK |
1269 NFS_MOUNT_LOCAL_FCNTL);
bf0fd768 1270 break;
bf0fd768
CL
1271 case Opt_udp:
1272 mnt->flags &= ~NFS_MOUNT_TCP;
0896a725 1273 mnt->nfs_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768
CL
1274 break;
1275 case Opt_tcp:
1276 mnt->flags |= NFS_MOUNT_TCP;
0896a725 1277 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1278 break;
2cf7ff7a
TT
1279 case Opt_rdma:
1280 mnt->flags |= NFS_MOUNT_TCP; /* for side protocols */
1281 mnt->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
a67d18f8 1282 xprt_load_transport(p);
2cf7ff7a 1283 break;
bf0fd768
CL
1284 case Opt_acl:
1285 mnt->flags &= ~NFS_MOUNT_NOACL;
1286 break;
1287 case Opt_noacl:
1288 mnt->flags |= NFS_MOUNT_NOACL;
1289 break;
1290 case Opt_rdirplus:
1291 mnt->flags &= ~NFS_MOUNT_NORDIRPLUS;
1292 break;
1293 case Opt_nordirplus:
1294 mnt->flags |= NFS_MOUNT_NORDIRPLUS;
1295 break;
75180df2
TM
1296 case Opt_sharecache:
1297 mnt->flags &= ~NFS_MOUNT_UNSHARED;
1298 break;
1299 case Opt_nosharecache:
1300 mnt->flags |= NFS_MOUNT_UNSHARED;
1301 break;
d740351b
CL
1302 case Opt_resvport:
1303 mnt->flags &= ~NFS_MOUNT_NORESVPORT;
1304 break;
1305 case Opt_noresvport:
1306 mnt->flags |= NFS_MOUNT_NORESVPORT;
1307 break;
b797cac7
DH
1308 case Opt_fscache:
1309 mnt->options |= NFS_OPTION_FSCACHE;
1310 kfree(mnt->fscache_uniq);
1311 mnt->fscache_uniq = NULL;
1312 break;
1313 case Opt_nofscache:
1314 mnt->options &= ~NFS_OPTION_FSCACHE;
1315 kfree(mnt->fscache_uniq);
1316 mnt->fscache_uniq = NULL;
1317 break;
89652617
CL
1318 case Opt_migration:
1319 mnt->options |= NFS_OPTION_MIGRATION;
1320 break;
1321 case Opt_nomigration:
1322 mnt->options &= NFS_OPTION_MIGRATION;
1323 break;
bf0fd768 1324
f45663ce
CL
1325 /*
1326 * options that take numeric values
1327 */
bf0fd768 1328 case Opt_port:
c5cb09b6
RL
1329 if (nfs_get_option_ul(args, &option) ||
1330 option > USHRT_MAX)
d23c45fd
CL
1331 goto out_invalid_value;
1332 mnt->nfs_server.port = option;
bf0fd768
CL
1333 break;
1334 case Opt_rsize:
c5cb09b6 1335 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1336 goto out_invalid_value;
1337 mnt->rsize = option;
bf0fd768
CL
1338 break;
1339 case Opt_wsize:
c5cb09b6 1340 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1341 goto out_invalid_value;
1342 mnt->wsize = option;
bf0fd768
CL
1343 break;
1344 case Opt_bsize:
c5cb09b6 1345 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1346 goto out_invalid_value;
1347 mnt->bsize = option;
bf0fd768
CL
1348 break;
1349 case Opt_timeo:
c5cb09b6 1350 if (nfs_get_option_ul(args, &option) || option == 0)
d23c45fd
CL
1351 goto out_invalid_value;
1352 mnt->timeo = option;
bf0fd768
CL
1353 break;
1354 case Opt_retrans:
c5cb09b6 1355 if (nfs_get_option_ul(args, &option) || option == 0)
d23c45fd
CL
1356 goto out_invalid_value;
1357 mnt->retrans = option;
bf0fd768
CL
1358 break;
1359 case Opt_acregmin:
c5cb09b6 1360 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1361 goto out_invalid_value;
1362 mnt->acregmin = option;
bf0fd768
CL
1363 break;
1364 case Opt_acregmax:
c5cb09b6 1365 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1366 goto out_invalid_value;
1367 mnt->acregmax = option;
bf0fd768
CL
1368 break;
1369 case Opt_acdirmin:
c5cb09b6 1370 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1371 goto out_invalid_value;
1372 mnt->acdirmin = option;
bf0fd768
CL
1373 break;
1374 case Opt_acdirmax:
c5cb09b6 1375 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1376 goto out_invalid_value;
1377 mnt->acdirmax = option;
bf0fd768
CL
1378 break;
1379 case Opt_actimeo:
c5cb09b6 1380 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1381 goto out_invalid_value;
1382 mnt->acregmin = mnt->acregmax =
1383 mnt->acdirmin = mnt->acdirmax = option;
bf0fd768
CL
1384 break;
1385 case Opt_namelen:
c5cb09b6 1386 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1387 goto out_invalid_value;
1388 mnt->namlen = option;
bf0fd768
CL
1389 break;
1390 case Opt_mountport:
c5cb09b6
RL
1391 if (nfs_get_option_ul(args, &option) ||
1392 option > USHRT_MAX)
d23c45fd
CL
1393 goto out_invalid_value;
1394 mnt->mount_server.port = option;
bf0fd768 1395 break;
bf0fd768 1396 case Opt_mountvers:
c5cb09b6 1397 if (nfs_get_option_ul(args, &option) ||
f45663ce 1398 option < NFS_MNT_VERSION ||
d23c45fd
CL
1399 option > NFS_MNT3_VERSION)
1400 goto out_invalid_value;
1401 mnt->mount_server.version = option;
bf0fd768 1402 break;
3fd5be9e 1403 case Opt_minorversion:
c5cb09b6 1404 if (nfs_get_option_ul(args, &option))
f3f4f4ed
CL
1405 goto out_invalid_value;
1406 if (option > NFS4_MAX_MINOR_VERSION)
1407 goto out_invalid_value;
1408 mnt->minorversion = option;
3fd5be9e 1409 break;
bf0fd768 1410
f45663ce
CL
1411 /*
1412 * options that take text values
1413 */
0d71b058
TM
1414 case Opt_nfsvers:
1415 string = match_strdup(args);
1416 if (string == NULL)
1417 goto out_nomem;
1418 rc = nfs_parse_version_string(string, mnt, args);
1419 kfree(string);
1420 if (!rc)
1421 goto out_invalid_value;
1422 break;
bf0fd768
CL
1423 case Opt_sec:
1424 string = match_strdup(args);
1425 if (string == NULL)
1426 goto out_nomem;
01060c89 1427 rc = nfs_parse_security_flavors(string, mnt);
bf0fd768 1428 kfree(string);
f45663ce 1429 if (!rc) {
f45663ce
CL
1430 dfprintk(MOUNT, "NFS: unrecognized "
1431 "security flavor\n");
d23c45fd 1432 return 0;
f45663ce 1433 }
bf0fd768
CL
1434 break;
1435 case Opt_proto:
1436 string = match_strdup(args);
1437 if (string == NULL)
1438 goto out_nomem;
1439 token = match_token(string,
1440 nfs_xprt_protocol_tokens, args);
bf0fd768 1441
ee671b01 1442 protofamily = AF_INET;
bf0fd768 1443 switch (token) {
ee671b01
JL
1444 case Opt_xprt_udp6:
1445 protofamily = AF_INET6;
fdb66ff4 1446 case Opt_xprt_udp:
bf0fd768 1447 mnt->flags &= ~NFS_MOUNT_TCP;
0896a725 1448 mnt->nfs_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768 1449 break;
ee671b01
JL
1450 case Opt_xprt_tcp6:
1451 protofamily = AF_INET6;
fdb66ff4 1452 case Opt_xprt_tcp:
bf0fd768 1453 mnt->flags |= NFS_MOUNT_TCP;
0896a725 1454 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1455 break;
2cf7ff7a
TT
1456 case Opt_xprt_rdma:
1457 /* vector side protocols to TCP */
1458 mnt->flags |= NFS_MOUNT_TCP;
1459 mnt->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
a67d18f8 1460 xprt_load_transport(string);
2cf7ff7a 1461 break;
bf0fd768 1462 default:
f45663ce
CL
1463 dfprintk(MOUNT, "NFS: unrecognized "
1464 "transport protocol\n");
4223a4a1 1465 kfree(string);
d23c45fd 1466 return 0;
bf0fd768 1467 }
c5cb09b6 1468 kfree(string);
bf0fd768
CL
1469 break;
1470 case Opt_mountproto:
1471 string = match_strdup(args);
1472 if (string == NULL)
1473 goto out_nomem;
1474 token = match_token(string,
1475 nfs_xprt_protocol_tokens, args);
d508afb4 1476 kfree(string);
bf0fd768 1477
ee671b01 1478 mountfamily = AF_INET;
bf0fd768 1479 switch (token) {
ee671b01
JL
1480 case Opt_xprt_udp6:
1481 mountfamily = AF_INET6;
fdb66ff4 1482 case Opt_xprt_udp:
0896a725 1483 mnt->mount_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768 1484 break;
ee671b01
JL
1485 case Opt_xprt_tcp6:
1486 mountfamily = AF_INET6;
fdb66ff4 1487 case Opt_xprt_tcp:
0896a725 1488 mnt->mount_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1489 break;
2cf7ff7a 1490 case Opt_xprt_rdma: /* not used for side protocols */
bf0fd768 1491 default:
f45663ce
CL
1492 dfprintk(MOUNT, "NFS: unrecognized "
1493 "transport protocol\n");
d23c45fd 1494 return 0;
bf0fd768
CL
1495 }
1496 break;
1497 case Opt_addr:
1498 string = match_strdup(args);
1499 if (string == NULL)
1500 goto out_nomem;
53a0b9c4 1501 mnt->nfs_server.addrlen =
b48e1278 1502 rpc_pton(mnt->net, string, strlen(string),
53a0b9c4
CL
1503 (struct sockaddr *)
1504 &mnt->nfs_server.address,
1505 sizeof(mnt->nfs_server.address));
bf0fd768 1506 kfree(string);
53a0b9c4
CL
1507 if (mnt->nfs_server.addrlen == 0)
1508 goto out_invalid_address;
bf0fd768
CL
1509 break;
1510 case Opt_clientaddr:
c5cb09b6 1511 if (nfs_get_option_str(args, &mnt->client_address))
bf0fd768 1512 goto out_nomem;
bf0fd768 1513 break;
33832034 1514 case Opt_mounthost:
c5cb09b6
RL
1515 if (nfs_get_option_str(args,
1516 &mnt->mount_server.hostname))
33832034 1517 goto out_nomem;
33832034 1518 break;
0ac83779 1519 case Opt_mountaddr:
bf0fd768
CL
1520 string = match_strdup(args);
1521 if (string == NULL)
1522 goto out_nomem;
53a0b9c4 1523 mnt->mount_server.addrlen =
b48e1278 1524 rpc_pton(mnt->net, string, strlen(string),
53a0b9c4
CL
1525 (struct sockaddr *)
1526 &mnt->mount_server.address,
1527 sizeof(mnt->mount_server.address));
bf0fd768 1528 kfree(string);
53a0b9c4
CL
1529 if (mnt->mount_server.addrlen == 0)
1530 goto out_invalid_address;
bf0fd768 1531 break;
7973c1f1
TM
1532 case Opt_lookupcache:
1533 string = match_strdup(args);
1534 if (string == NULL)
1535 goto out_nomem;
1536 token = match_token(string,
1537 nfs_lookupcache_tokens, args);
1538 kfree(string);
1539 switch (token) {
1540 case Opt_lookupcache_all:
1541 mnt->flags &= ~(NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE);
1542 break;
1543 case Opt_lookupcache_positive:
1544 mnt->flags &= ~NFS_MOUNT_LOOKUP_CACHE_NONE;
1545 mnt->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG;
1546 break;
1547 case Opt_lookupcache_none:
1548 mnt->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE;
1549 break;
1550 default:
7973c1f1
TM
1551 dfprintk(MOUNT, "NFS: invalid "
1552 "lookupcache argument\n");
d23c45fd 1553 return 0;
7973c1f1
TM
1554 };
1555 break;
a6d5ff64 1556 case Opt_fscache_uniq:
c5cb09b6 1557 if (nfs_get_option_str(args, &mnt->fscache_uniq))
a6d5ff64 1558 goto out_nomem;
a6d5ff64
CL
1559 mnt->options |= NFS_OPTION_FSCACHE;
1560 break;
5eebde23
SJ
1561 case Opt_local_lock:
1562 string = match_strdup(args);
1563 if (string == NULL)
1564 goto out_nomem;
1565 token = match_token(string, nfs_local_lock_tokens,
1566 args);
1567 kfree(string);
1568 switch (token) {
1569 case Opt_local_lock_all:
1570 mnt->flags |= (NFS_MOUNT_LOCAL_FLOCK |
1571 NFS_MOUNT_LOCAL_FCNTL);
1572 break;
1573 case Opt_local_lock_flock:
1574 mnt->flags |= NFS_MOUNT_LOCAL_FLOCK;
1575 break;
1576 case Opt_local_lock_posix:
1577 mnt->flags |= NFS_MOUNT_LOCAL_FCNTL;
1578 break;
1579 case Opt_local_lock_none:
1580 mnt->flags &= ~(NFS_MOUNT_LOCAL_FLOCK |
1581 NFS_MOUNT_LOCAL_FCNTL);
1582 break;
1583 default:
1584 dfprintk(MOUNT, "NFS: invalid "
1585 "local_lock argument\n");
1586 return 0;
1587 };
1588 break;
bf0fd768 1589
f45663ce
CL
1590 /*
1591 * Special options
1592 */
1593 case Opt_sloppy:
1594 sloppy = 1;
1595 dfprintk(MOUNT, "NFS: relaxing parsing rules\n");
1596 break;
bf0fd768
CL
1597 case Opt_userspace:
1598 case Opt_deprecated:
d33e4dfe
CL
1599 dfprintk(MOUNT, "NFS: ignoring mount option "
1600 "'%s'\n", p);
bf0fd768
CL
1601 break;
1602
1603 default:
d23c45fd 1604 invalid_option = 1;
f45663ce
CL
1605 dfprintk(MOUNT, "NFS: unrecognized mount option "
1606 "'%s'\n", p);
bf0fd768
CL
1607 }
1608 }
1609
d23c45fd
CL
1610 if (!sloppy && invalid_option)
1611 return 0;
1612
571b7554
WAA
1613 if (mnt->minorversion && mnt->version != 4)
1614 goto out_minorversion_mismatch;
1615
89652617 1616 if (mnt->options & NFS_OPTION_MIGRATION &&
9e08ef1a 1617 (mnt->version != 4 || mnt->minorversion != 0))
89652617
CL
1618 goto out_migration_misuse;
1619
ee671b01
JL
1620 /*
1621 * verify that any proto=/mountproto= options match the address
1856b225 1622 * families in the addr=/mountaddr= options.
ee671b01
JL
1623 */
1624 if (protofamily != AF_UNSPEC &&
1625 protofamily != mnt->nfs_server.address.ss_family)
1626 goto out_proto_mismatch;
1627
1628 if (mountfamily != AF_UNSPEC) {
1629 if (mnt->mount_server.addrlen) {
1630 if (mountfamily != mnt->mount_server.address.ss_family)
1631 goto out_mountproto_mismatch;
1632 } else {
1633 if (mountfamily != mnt->nfs_server.address.ss_family)
1634 goto out_mountproto_mismatch;
1635 }
1636 }
1637
bf0fd768
CL
1638 return 1;
1639
ee671b01
JL
1640out_mountproto_mismatch:
1641 printk(KERN_INFO "NFS: mount server address does not match mountproto= "
1642 "option\n");
1643 return 0;
1644out_proto_mismatch:
1645 printk(KERN_INFO "NFS: server address does not match proto= option\n");
1646 return 0;
53a0b9c4
CL
1647out_invalid_address:
1648 printk(KERN_INFO "NFS: bad IP address specified: %s\n", p);
1649 return 0;
d23c45fd 1650out_invalid_value:
53a0b9c4 1651 printk(KERN_INFO "NFS: bad mount option value specified: %s\n", p);
d23c45fd 1652 return 0;
571b7554
WAA
1653out_minorversion_mismatch:
1654 printk(KERN_INFO "NFS: mount option vers=%u does not support "
1655 "minorversion=%u\n", mnt->version, mnt->minorversion);
1656 return 0;
89652617
CL
1657out_migration_misuse:
1658 printk(KERN_INFO
1659 "NFS: 'migration' not supported for this NFS version\n");
1660 return 0;
bf0fd768
CL
1661out_nomem:
1662 printk(KERN_INFO "NFS: not enough memory to parse option\n");
1663 return 0;
f9c3a380
EP
1664out_security_failure:
1665 free_secdata(secdata);
1666 printk(KERN_INFO "NFS: security options invalid: %d\n", rc);
1667 return 0;
bf0fd768
CL
1668}
1669
ec88f28d 1670/*
4d4b69dd
WAA
1671 * Ensure that a specified authtype in args->auth_info is supported by
1672 * the server. Returns 0 and sets args->selected_flavor if it's ok, and
1673 * -EACCES if not.
ec88f28d 1674 */
4d4b69dd 1675static int nfs_verify_authflavors(struct nfs_parsed_mount_data *args,
9111c95b 1676 rpc_authflavor_t *server_authlist, unsigned int count)
ec88f28d 1677{
4d4b69dd 1678 rpc_authflavor_t flavor = RPC_AUTH_MAXFLAVOR;
9111c95b 1679 unsigned int i;
4580a92d 1680
d497ab97
WAA
1681 /*
1682 * If the sec= mount option is used, the specified flavor or AUTH_NULL
1683 * must be in the list returned by the server.
1684 *
1685 * AUTH_NULL has a special meaning when it's in the server list - it
1686 * means that the server will ignore the rpc creds, so any flavor
1687 * can be used.
1688 */
4580a92d 1689 for (i = 0; i < count; i++) {
4d4b69dd
WAA
1690 flavor = server_authlist[i];
1691
1692 if (nfs_auth_info_match(&args->auth_info, flavor) ||
1693 flavor == RPC_AUTH_NULL)
9111c95b 1694 goto out;
4580a92d 1695 }
ec88f28d 1696
4d4b69dd
WAA
1697 dfprintk(MOUNT,
1698 "NFS: specified auth flavors not supported by server\n");
9111c95b 1699 return -EACCES;
d497ab97 1700
4580a92d 1701out:
4d4b69dd 1702 args->selected_flavor = flavor;
a3f73c27 1703 dfprintk(MOUNT, "NFS: using auth flavor %u\n", args->selected_flavor);
d497ab97 1704 return 0;
ec88f28d
CL
1705}
1706
0076d7b7
CL
1707/*
1708 * Use the remote server's MOUNT service to request the NFS file handle
1709 * corresponding to the provided path.
1710 */
486aa699 1711static int nfs_request_mount(struct nfs_parsed_mount_data *args,
294ae81d
JL
1712 struct nfs_fh *root_fh,
1713 rpc_authflavor_t *server_authlist,
1714 unsigned int *server_authlist_len)
0076d7b7 1715{
c5d120f8
CL
1716 struct nfs_mount_request request = {
1717 .sap = (struct sockaddr *)
1718 &args->mount_server.address,
1719 .dirpath = args->nfs_server.export_path,
1720 .protocol = args->mount_server.protocol,
1721 .fh = root_fh,
50a737f8 1722 .noresvport = args->flags & NFS_MOUNT_NORESVPORT,
294ae81d 1723 .auth_flav_len = server_authlist_len,
ec88f28d 1724 .auth_flavs = server_authlist,
6d59b8d5 1725 .net = args->net,
c5d120f8 1726 };
4c568017 1727 int status;
0076d7b7
CL
1728
1729 if (args->mount_server.version == 0) {
8a6e5deb
TM
1730 switch (args->version) {
1731 default:
1732 args->mount_server.version = NFS_MNT3_VERSION;
1733 break;
1734 case 2:
1735 args->mount_server.version = NFS_MNT_VERSION;
1736 }
0076d7b7 1737 }
c5d120f8 1738 request.version = args->mount_server.version;
0076d7b7 1739
33832034 1740 if (args->mount_server.hostname)
c5d120f8 1741 request.hostname = args->mount_server.hostname;
33832034 1742 else
c5d120f8 1743 request.hostname = args->nfs_server.hostname;
33832034 1744
0076d7b7
CL
1745 /*
1746 * Construct the mount server's address.
1747 */
4c568017 1748 if (args->mount_server.address.ss_family == AF_UNSPEC) {
c5d120f8 1749 memcpy(request.sap, &args->nfs_server.address,
4c568017
CL
1750 args->nfs_server.addrlen);
1751 args->mount_server.addrlen = args->nfs_server.addrlen;
1752 }
c5d120f8 1753 request.salen = args->mount_server.addrlen;
f5855fec 1754 nfs_set_port(request.sap, &args->mount_server.port, 0);
0076d7b7
CL
1755
1756 /*
1757 * Now ask the mount server to map our export path
1758 * to a file handle.
1759 */
c5d120f8 1760 status = nfs_mount(&request);
ec88f28d
CL
1761 if (status != 0) {
1762 dfprintk(MOUNT, "NFS: unable to mount server %s, error %d\n",
1763 request.hostname, status);
1764 return status;
1765 }
0076d7b7 1766
9111c95b 1767 return 0;
0076d7b7
CL
1768}
1769
d17540c6
JL
1770static struct nfs_server *nfs_try_mount_request(struct nfs_mount_info *mount_info,
1771 struct nfs_subversion *nfs_mod)
1772{
1773 int status;
9111c95b
JL
1774 unsigned int i;
1775 bool tried_auth_unix = false;
1776 bool auth_null_in_list = false;
1777 struct nfs_server *server = ERR_PTR(-EACCES);
294ae81d
JL
1778 struct nfs_parsed_mount_data *args = mount_info->parsed;
1779 rpc_authflavor_t authlist[NFS_MAX_SECFLAVORS];
1780 unsigned int authlist_len = ARRAY_SIZE(authlist);
d17540c6 1781
294ae81d
JL
1782 status = nfs_request_mount(args, mount_info->mntfh, authlist,
1783 &authlist_len);
d17540c6
JL
1784 if (status)
1785 return ERR_PTR(status);
1786
9111c95b
JL
1787 /*
1788 * Was a sec= authflavor specified in the options? First, verify
1789 * whether the server supports it, and then just try to use it if so.
1790 */
a3f73c27 1791 if (args->auth_info.flavor_len > 0) {
4d4b69dd 1792 status = nfs_verify_authflavors(args, authlist, authlist_len);
a3f73c27
WAA
1793 dfprintk(MOUNT, "NFS: using auth flavor %u\n",
1794 args->selected_flavor);
9111c95b
JL
1795 if (status)
1796 return ERR_PTR(status);
1797 return nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1798 }
1799
1800 /*
1801 * No sec= option was provided. RFC 2623, section 2.7 suggests we
1802 * SHOULD prefer the flavor listed first. However, some servers list
1803 * AUTH_NULL first. Avoid ever choosing AUTH_NULL.
1804 */
1805 for (i = 0; i < authlist_len; ++i) {
1806 rpc_authflavor_t flavor;
1807 struct rpcsec_gss_info info;
1808
1809 flavor = authlist[i];
1810 switch (flavor) {
1811 case RPC_AUTH_UNIX:
1812 tried_auth_unix = true;
1813 break;
1814 case RPC_AUTH_NULL:
1815 auth_null_in_list = true;
1816 continue;
1817 default:
1818 if (rpcauth_get_gssinfo(flavor, &info) != 0)
1819 continue;
1820 /* Fallthrough */
1821 }
1822 dfprintk(MOUNT, "NFS: attempting to use auth flavor %u\n", flavor);
a3f73c27 1823 args->selected_flavor = flavor;
9111c95b
JL
1824 server = nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1825 if (!IS_ERR(server))
1826 return server;
1827 }
1828
1829 /*
1830 * Nothing we tried so far worked. At this point, give up if we've
1831 * already tried AUTH_UNIX or if the server's list doesn't contain
1832 * AUTH_NULL
1833 */
1834 if (tried_auth_unix || !auth_null_in_list)
1835 return server;
1836
1837 /* Last chance! Try AUTH_UNIX */
1838 dfprintk(MOUNT, "NFS: attempting to use auth flavor %u\n", RPC_AUTH_UNIX);
a3f73c27 1839 args->selected_flavor = RPC_AUTH_UNIX;
d17540c6
JL
1840 return nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1841}
1842
ff9099f2
BS
1843struct dentry *nfs_try_mount(int flags, const char *dev_name,
1844 struct nfs_mount_info *mount_info,
1845 struct nfs_subversion *nfs_mod)
486aa699 1846{
486aa699
BS
1847 struct nfs_server *server;
1848
d17540c6
JL
1849 if (mount_info->parsed->need_mount)
1850 server = nfs_try_mount_request(mount_info, nfs_mod);
1851 else
1852 server = nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
486aa699 1853
486aa699
BS
1854 if (IS_ERR(server))
1855 return ERR_CAST(server);
1856
ab7017a3 1857 return nfs_fs_mount_common(server, flags, dev_name, mount_info, nfs_mod);
486aa699 1858}
ddda8e0a 1859EXPORT_SYMBOL_GPL(nfs_try_mount);
486aa699 1860
c12bacec
RL
1861/*
1862 * Split "dev_name" into "hostname:export_path".
1863 *
1864 * The leftmost colon demarks the split between the server's hostname
1865 * and the export path. If the hostname starts with a left square
1866 * bracket, then it may contain colons.
1867 *
1868 * Note: caller frees hostname and export path, even on error.
1869 */
1870static int nfs_parse_devname(const char *dev_name,
1871 char **hostname, size_t maxnamlen,
1872 char **export_path, size_t maxpathlen)
dc045898
CL
1873{
1874 size_t len;
c12bacec 1875 char *end;
dc045898 1876
c12bacec
RL
1877 /* Is the host name protected with square brakcets? */
1878 if (*dev_name == '[') {
1879 end = strchr(++dev_name, ']');
1880 if (end == NULL || end[1] != ':')
dc045898 1881 goto out_bad_devname;
dc045898 1882
c12bacec
RL
1883 len = end - dev_name;
1884 end++;
1885 } else {
1886 char *comma;
dc045898 1887
c12bacec
RL
1888 end = strchr(dev_name, ':');
1889 if (end == NULL)
1890 goto out_bad_devname;
1891 len = end - dev_name;
d1aa0825 1892
c12bacec
RL
1893 /* kill possible hostname list: not supported */
1894 comma = strchr(dev_name, ',');
1895 if (comma != NULL && comma < end)
1896 *comma = 0;
1897 }
d1aa0825 1898
d1aa0825
CL
1899 if (len > maxnamlen)
1900 goto out_hostname;
1901
1902 /* N.B. caller will free nfs_server.hostname in all cases */
c12bacec 1903 *hostname = kstrndup(dev_name, len, GFP_KERNEL);
d1aa0825
CL
1904 if (*hostname == NULL)
1905 goto out_nomem;
c12bacec 1906 len = strlen(++end);
d1aa0825
CL
1907 if (len > maxpathlen)
1908 goto out_path;
1909 *export_path = kstrndup(end, len, GFP_KERNEL);
1910 if (!*export_path)
1911 goto out_nomem;
1912
c12bacec 1913 dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", *export_path);
d1aa0825
CL
1914 return 0;
1915
1916out_bad_devname:
1917 dfprintk(MOUNT, "NFS: device name not in host:path format\n");
1918 return -EINVAL;
1919
1920out_nomem:
1921 dfprintk(MOUNT, "NFS: not enough memory to parse device name\n");
1922 return -ENOMEM;
1923
1924out_hostname:
1925 dfprintk(MOUNT, "NFS: server hostname too long\n");
1926 return -ENAMETOOLONG;
1927
1928out_path:
1929 dfprintk(MOUNT, "NFS: export pathname too long\n");
1930 return -ENAMETOOLONG;
1931}
1932
f7b422b1 1933/*
54ceac45
DH
1934 * Validate the NFS2/NFS3 mount data
1935 * - fills in the mount root filehandle
136d558c
CL
1936 *
1937 * For option strings, user space handles the following behaviors:
1938 *
1939 * + DNS: mapping server host name to IP address ("addr=" option)
1940 *
1941 * + failure mode: how to behave if a mount request can't be handled
1942 * immediately ("fg/bg" option)
1943 *
1944 * + retry: how often to retry a mount request ("retry=" option)
1945 *
1946 * + breaking back: trying proto=udp after proto=tcp, v2 after v3,
1947 * mountproto=tcp after mountproto=udp, and so on
f7b422b1 1948 */
d72c727c
BS
1949static int nfs23_validate_mount_data(void *options,
1950 struct nfs_parsed_mount_data *args,
1951 struct nfs_fh *mntfh,
1952 const char *dev_name)
f7b422b1 1953{
2283f8d6 1954 struct nfs_mount_data *data = (struct nfs_mount_data *)options;
4cfd74fc 1955 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
74c98811 1956 int extra_flags = NFS_MOUNT_LEGACY_INTERFACE;
136d558c 1957
5df36e78
CL
1958 if (data == NULL)
1959 goto out_no_data;
f7b422b1 1960
c5afc8da 1961 args->version = NFS_DEFAULT_VERSION;
54ceac45 1962 switch (data->version) {
5df36e78
CL
1963 case 1:
1964 data->namlen = 0;
1965 case 2:
1966 data->bsize = 0;
1967 case 3:
1968 if (data->flags & NFS_MOUNT_VER3)
1969 goto out_no_v3;
1970 data->root.size = NFS2_FHSIZE;
1971 memcpy(data->root.data, data->old_root.data, NFS2_FHSIZE);
74c98811
TM
1972 /* Turn off security negotiation */
1973 extra_flags |= NFS_MOUNT_SECFLAVOUR;
5df36e78
CL
1974 case 4:
1975 if (data->flags & NFS_MOUNT_SECFLAVOUR)
1976 goto out_no_sec;
1977 case 5:
1978 memset(data->context, 0, sizeof(data->context));
1979 case 6:
b7e24457
TM
1980 if (data->flags & NFS_MOUNT_VER3) {
1981 if (data->root.size > NFS3_FHSIZE || data->root.size == 0)
1982 goto out_invalid_fh;
5df36e78 1983 mntfh->size = data->root.size;
764302cc
CL
1984 args->version = 3;
1985 } else {
5df36e78 1986 mntfh->size = NFS2_FHSIZE;
764302cc
CL
1987 args->version = 2;
1988 }
5df36e78 1989
5df36e78
CL
1990
1991 memcpy(mntfh->data, data->root.data, mntfh->size);
1992 if (mntfh->size < sizeof(mntfh->data))
1993 memset(mntfh->data + mntfh->size, 0,
1994 sizeof(mntfh->data) - mntfh->size);
6e88e061 1995
2283f8d6
TT
1996 /*
1997 * Translate to nfs_parsed_mount_data, which nfs_fill_super
1998 * can deal with.
1999 */
ff3525a5 2000 args->flags = data->flags & NFS_MOUNT_FLAGMASK;
74c98811 2001 args->flags |= extra_flags;
2283f8d6
TT
2002 args->rsize = data->rsize;
2003 args->wsize = data->wsize;
2283f8d6
TT
2004 args->timeo = data->timeo;
2005 args->retrans = data->retrans;
2006 args->acregmin = data->acregmin;
2007 args->acregmax = data->acregmax;
2008 args->acdirmin = data->acdirmin;
2009 args->acdirmax = data->acdirmax;
b72e4f42 2010 args->need_mount = false;
4c568017 2011
4cfd74fc 2012 memcpy(sap, &data->addr, sizeof(data->addr));
4c568017 2013 args->nfs_server.addrlen = sizeof(data->addr);
872ece86 2014 args->nfs_server.port = ntohs(data->addr.sin_port);
4cfd74fc 2015 if (!nfs_verify_server_address(sap))
4c568017
CL
2016 goto out_no_address;
2017
2283f8d6 2018 if (!(data->flags & NFS_MOUNT_TCP))
0896a725 2019 args->nfs_server.protocol = XPRT_TRANSPORT_UDP;
2283f8d6
TT
2020 /* N.B. caller will free nfs_server.hostname in all cases */
2021 args->nfs_server.hostname = kstrdup(data->hostname, GFP_KERNEL);
2022 args->namlen = data->namlen;
2023 args->bsize = data->bsize;
dd07c947
CL
2024
2025 if (data->flags & NFS_MOUNT_SECFLAVOUR)
a3f73c27 2026 args->selected_flavor = data->pseudoflavor;
74c98811 2027 else
a3f73c27 2028 args->selected_flavor = RPC_AUTH_UNIX;
63649bd7
CG
2029 if (!args->nfs_server.hostname)
2030 goto out_nomem;
f9c3a380 2031
5eebde23
SJ
2032 if (!(data->flags & NFS_MOUNT_NONLM))
2033 args->flags &= ~(NFS_MOUNT_LOCAL_FLOCK|
2034 NFS_MOUNT_LOCAL_FCNTL);
2035 else
2036 args->flags |= (NFS_MOUNT_LOCAL_FLOCK|
2037 NFS_MOUNT_LOCAL_FCNTL);
f9c3a380
EP
2038 /*
2039 * The legacy version 6 binary mount data from userspace has a
2040 * field used only to transport selinux information into the
2041 * the kernel. To continue to support that functionality we
2042 * have a touch of selinux knowledge here in the NFS code. The
2043 * userspace code converted context=blah to just blah so we are
2044 * converting back to the full string selinux understands.
2045 */
2046 if (data->context[0]){
2047#ifdef CONFIG_SECURITY_SELINUX
2048 int rc;
2049 char *opts_str = kmalloc(sizeof(data->context) + 8, GFP_KERNEL);
2050 if (!opts_str)
2051 return -ENOMEM;
2052 strcpy(opts_str, "context=");
2053 data->context[NFS_MAX_CONTEXT_LEN] = '\0';
2054 strcat(opts_str, &data->context[0]);
2055 rc = security_sb_parse_opts_str(opts_str, &args->lsm_opts);
2056 kfree(opts_str);
2057 if (rc)
2058 return rc;
2059#else
2060 return -EINVAL;
2061#endif
2062 }
2063
5df36e78 2064 break;
b72e4f42
BS
2065 default:
2066 return NFS_TEXT_DATA;
f7b422b1 2067 }
54ceac45 2068
1c606fb7 2069#if !IS_ENABLED(CONFIG_NFS_V3)
8a6e5deb 2070 if (args->version == 3)
5df36e78
CL
2071 goto out_v3_not_compiled;
2072#endif /* !CONFIG_NFS_V3 */
f7b422b1 2073
5df36e78 2074 return 0;
f7b422b1 2075
5df36e78
CL
2076out_no_data:
2077 dfprintk(MOUNT, "NFS: mount program didn't pass any mount data\n");
2078 return -EINVAL;
54ceac45 2079
5df36e78
CL
2080out_no_v3:
2081 dfprintk(MOUNT, "NFS: nfs_mount_data version %d does not support v3\n",
2082 data->version);
2083 return -EINVAL;
f7b422b1 2084
5df36e78
CL
2085out_no_sec:
2086 dfprintk(MOUNT, "NFS: nfs_mount_data version supports only AUTH_SYS\n");
2087 return -EINVAL;
2088
1c606fb7 2089#if !IS_ENABLED(CONFIG_NFS_V3)
5df36e78
CL
2090out_v3_not_compiled:
2091 dfprintk(MOUNT, "NFS: NFSv3 is not compiled into kernel\n");
2092 return -EPROTONOSUPPORT;
2093#endif /* !CONFIG_NFS_V3 */
2094
63649bd7
CG
2095out_nomem:
2096 dfprintk(MOUNT, "NFS: not enough memory to handle mount options\n");
2097 return -ENOMEM;
2098
5df36e78
CL
2099out_no_address:
2100 dfprintk(MOUNT, "NFS: mount program didn't pass remote address\n");
2101 return -EINVAL;
2102
2103out_invalid_fh:
2104 dfprintk(MOUNT, "NFS: invalid root filehandle\n");
2105 return -EINVAL;
f7b422b1
DH
2106}
2107
89d77c8f 2108#if IS_ENABLED(CONFIG_NFS_V4)
d72c727c
BS
2109static int nfs_validate_mount_data(struct file_system_type *fs_type,
2110 void *options,
2111 struct nfs_parsed_mount_data *args,
2112 struct nfs_fh *mntfh,
2113 const char *dev_name)
2114{
2115 if (fs_type == &nfs_fs_type)
2116 return nfs23_validate_mount_data(options, args, mntfh, dev_name);
2117 return nfs4_validate_mount_data(options, args, dev_name);
2118}
2119#else
2120static int nfs_validate_mount_data(struct file_system_type *fs_type,
2121 void *options,
2122 struct nfs_parsed_mount_data *args,
2123 struct nfs_fh *mntfh,
2124 const char *dev_name)
2125{
2126 return nfs23_validate_mount_data(options, args, mntfh, dev_name);
2127}
2128#endif
2129
b72e4f42
BS
2130static int nfs_validate_text_mount_data(void *options,
2131 struct nfs_parsed_mount_data *args,
2132 const char *dev_name)
2133{
2134 int port = 0;
2135 int max_namelen = PAGE_SIZE;
2136 int max_pathlen = NFS_MAXPATHLEN;
2137 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
2138
2139 if (nfs_parse_mount_options((char *)options, args) == 0)
2140 return -EINVAL;
2141
2142 if (!nfs_verify_server_address(sap))
2143 goto out_no_address;
2144
2145 if (args->version == 4) {
89d77c8f 2146#if IS_ENABLED(CONFIG_NFS_V4)
b72e4f42
BS
2147 port = NFS_PORT;
2148 max_namelen = NFS4_MAXNAMLEN;
2149 max_pathlen = NFS4_MAXPATHLEN;
2150 nfs_validate_transport_protocol(args);
6da1a034
TM
2151 if (args->nfs_server.protocol == XPRT_TRANSPORT_UDP)
2152 goto out_invalid_transport_udp;
b72e4f42
BS
2153 nfs4_validate_mount_flags(args);
2154#else
2155 goto out_v4_not_compiled;
2156#endif /* CONFIG_NFS_V4 */
2157 } else
2158 nfs_set_mount_transport_protocol(args);
2159
2160 nfs_set_port(sap, &args->nfs_server.port, port);
2161
b72e4f42
BS
2162 return nfs_parse_devname(dev_name,
2163 &args->nfs_server.hostname,
2164 max_namelen,
2165 &args->nfs_server.export_path,
2166 max_pathlen);
2167
89d77c8f 2168#if !IS_ENABLED(CONFIG_NFS_V4)
b72e4f42
BS
2169out_v4_not_compiled:
2170 dfprintk(MOUNT, "NFS: NFSv4 is not compiled into kernel\n");
2171 return -EPROTONOSUPPORT;
6da1a034
TM
2172#else
2173out_invalid_transport_udp:
2174 dfprintk(MOUNT, "NFSv4: Unsupported transport protocol udp\n");
2175 return -EINVAL;
b72e4f42
BS
2176#endif /* !CONFIG_NFS_V4 */
2177
2178out_no_address:
2179 dfprintk(MOUNT, "NFS: mount program didn't pass remote address\n");
2180 return -EINVAL;
b72e4f42
BS
2181}
2182
c8e47028
SM
2183#define NFS_MOUNT_CMP_FLAGMASK ~(NFS_MOUNT_INTR \
2184 | NFS_MOUNT_SECURE \
2185 | NFS_MOUNT_TCP \
2186 | NFS_MOUNT_VER3 \
2187 | NFS_MOUNT_KERBEROS \
2188 | NFS_MOUNT_NONLM \
2189 | NFS_MOUNT_BROKEN_SUID \
2190 | NFS_MOUNT_STRICTLOCK \
2191 | NFS_MOUNT_UNSHARED \
2192 | NFS_MOUNT_NORESVPORT \
2193 | NFS_MOUNT_LEGACY_INTERFACE)
2194
48b605f8
JL
2195static int
2196nfs_compare_remount_data(struct nfs_server *nfss,
2197 struct nfs_parsed_mount_data *data)
2198{
c8e47028 2199 if ((data->flags ^ nfss->flags) & NFS_MOUNT_CMP_FLAGMASK ||
48b605f8
JL
2200 data->rsize != nfss->rsize ||
2201 data->wsize != nfss->wsize ||
57acc40d
JL
2202 data->version != nfss->nfs_client->rpc_ops->version ||
2203 data->minorversion != nfss->nfs_client->cl_minorversion ||
48b605f8 2204 data->retrans != nfss->client->cl_timeout->to_retries ||
a3f73c27 2205 data->selected_flavor != nfss->client->cl_auth->au_flavor ||
48b605f8
JL
2206 data->acregmin != nfss->acregmin / HZ ||
2207 data->acregmax != nfss->acregmax / HZ ||
2208 data->acdirmin != nfss->acdirmin / HZ ||
2209 data->acdirmax != nfss->acdirmax / HZ ||
2210 data->timeo != (10U * nfss->client->cl_timeout->to_initval / HZ) ||
bcd2ea17 2211 data->nfs_server.port != nfss->port ||
48b605f8 2212 data->nfs_server.addrlen != nfss->nfs_client->cl_addrlen ||
a1be9eee
SR
2213 !rpc_cmp_addr((struct sockaddr *)&data->nfs_server.address,
2214 (struct sockaddr *)&nfss->nfs_client->cl_addr))
48b605f8
JL
2215 return -EINVAL;
2216
2217 return 0;
2218}
2219
fbdefd64 2220int
48b605f8
JL
2221nfs_remount(struct super_block *sb, int *flags, char *raw_data)
2222{
2223 int error;
2224 struct nfs_server *nfss = sb->s_fs_info;
2225 struct nfs_parsed_mount_data *data;
2226 struct nfs_mount_data *options = (struct nfs_mount_data *)raw_data;
2227 struct nfs4_mount_data *options4 = (struct nfs4_mount_data *)raw_data;
cd100725 2228 u32 nfsvers = nfss->nfs_client->rpc_ops->version;
48b605f8 2229
02b9984d
TT
2230 sync_filesystem(sb);
2231
48b605f8
JL
2232 /*
2233 * Userspace mount programs that send binary options generally send
2234 * them populated with default values. We have no way to know which
2235 * ones were explicitly specified. Fall back to legacy behavior and
2236 * just return success.
2237 */
31c94469
MZ
2238 if ((nfsvers == 4 && (!options4 || options4->version == 1)) ||
2239 (nfsvers <= 3 && (!options || (options->version >= 1 &&
2240 options->version <= 6))))
48b605f8
JL
2241 return 0;
2242
2243 data = kzalloc(sizeof(*data), GFP_KERNEL);
2244 if (data == NULL)
2245 return -ENOMEM;
2246
2247 /* fill out struct with values from existing mount */
2248 data->flags = nfss->flags;
2249 data->rsize = nfss->rsize;
2250 data->wsize = nfss->wsize;
2251 data->retrans = nfss->client->cl_timeout->to_retries;
a3f73c27 2252 data->selected_flavor = nfss->client->cl_auth->au_flavor;
0f5f49b8 2253 data->auth_info = nfss->auth_info;
48b605f8
JL
2254 data->acregmin = nfss->acregmin / HZ;
2255 data->acregmax = nfss->acregmax / HZ;
2256 data->acdirmin = nfss->acdirmin / HZ;
2257 data->acdirmax = nfss->acdirmax / HZ;
2258 data->timeo = 10U * nfss->client->cl_timeout->to_initval / HZ;
bcd2ea17 2259 data->nfs_server.port = nfss->port;
48b605f8 2260 data->nfs_server.addrlen = nfss->nfs_client->cl_addrlen;
57acc40d
JL
2261 data->version = nfsvers;
2262 data->minorversion = nfss->nfs_client->cl_minorversion;
48b605f8
JL
2263 memcpy(&data->nfs_server.address, &nfss->nfs_client->cl_addr,
2264 data->nfs_server.addrlen);
2265
2266 /* overwrite those values with any that were specified */
1966903f
JL
2267 error = -EINVAL;
2268 if (!nfs_parse_mount_options((char *)options, data))
48b605f8
JL
2269 goto out;
2270
26c4c170
JL
2271 /*
2272 * noac is a special case. It implies -o sync, but that's not
2273 * necessarily reflected in the mtab options. do_remount_sb
2274 * will clear MS_SYNCHRONOUS if -o sync wasn't specified in the
2275 * remount options, so we have to explicitly reset it.
2276 */
2277 if (data->flags & NFS_MOUNT_NOAC)
2278 *flags |= MS_SYNCHRONOUS;
2279
48b605f8
JL
2280 /* compare new mount options with old ones */
2281 error = nfs_compare_remount_data(nfss, data);
2282out:
2283 kfree(data);
2284 return error;
2285}
89d77c8f 2286EXPORT_SYMBOL_GPL(nfs_remount);
48b605f8 2287
f7b422b1 2288/*
54ceac45 2289 * Initialise the common bits of the superblock
f7b422b1 2290 */
fbdefd64 2291inline void nfs_initialise_sb(struct super_block *sb)
f7b422b1 2292{
54ceac45 2293 struct nfs_server *server = NFS_SB(sb);
5006a76c 2294
54ceac45 2295 sb->s_magic = NFS_SUPER_MAGIC;
f7b422b1 2296
54ceac45
DH
2297 /* We probably want something more informative here */
2298 snprintf(sb->s_id, sizeof(sb->s_id),
5a7c9eec 2299 "%u:%u", MAJOR(sb->s_dev), MINOR(sb->s_dev));
5006a76c 2300
54ceac45
DH
2301 if (sb->s_blocksize == 0)
2302 sb->s_blocksize = nfs_block_bits(server->wsize,
2303 &sb->s_blocksize_bits);
f7b422b1 2304
32a88aa1
JA
2305 sb->s_bdi = &server->backing_dev_info;
2306
54ceac45 2307 nfs_super_set_maxbytes(sb, server->maxfilesize);
f7b422b1
DH
2308}
2309
2310/*
54ceac45 2311 * Finish setting up an NFS2/3 superblock
f7b422b1 2312 */
fbdefd64 2313void nfs_fill_super(struct super_block *sb, struct nfs_mount_info *mount_info)
f7b422b1 2314{
c40f8d1d 2315 struct nfs_parsed_mount_data *data = mount_info->parsed;
f7b422b1 2316 struct nfs_server *server = NFS_SB(sb);
5006a76c 2317
54ceac45
DH
2318 sb->s_blocksize_bits = 0;
2319 sb->s_blocksize = 0;
6a74490d
BS
2320 sb->s_xattr = server->nfs_client->cl_nfs_mod->xattr;
2321 sb->s_op = server->nfs_client->cl_nfs_mod->sops;
2322 if (data && data->bsize)
54ceac45 2323 sb->s_blocksize = nfs_block_size(data->bsize, &sb->s_blocksize_bits);
f7b422b1 2324
6a74490d 2325 if (server->nfs_client->rpc_ops->version != 2) {
54ceac45
DH
2326 /* The VFS shouldn't apply the umask to mode bits. We will do
2327 * so ourselves when necessary.
2328 */
2329 sb->s_flags |= MS_POSIXACL;
2330 sb->s_time_gran = 1;
816724e6 2331 }
54ceac45 2332
54ceac45 2333 nfs_initialise_sb(sb);
f7b422b1 2334}
89d77c8f 2335EXPORT_SYMBOL_GPL(nfs_fill_super);
f7b422b1
DH
2336
2337/*
3cadf4b8 2338 * Finish setting up a cloned NFS2/3/4 superblock
f7b422b1 2339 */
fbdefd64 2340void nfs_clone_super(struct super_block *sb, struct nfs_mount_info *mount_info)
f7b422b1 2341{
8c958e0c 2342 const struct super_block *old_sb = mount_info->cloned->sb;
54ceac45
DH
2343 struct nfs_server *server = NFS_SB(sb);
2344
2345 sb->s_blocksize_bits = old_sb->s_blocksize_bits;
2346 sb->s_blocksize = old_sb->s_blocksize;
2347 sb->s_maxbytes = old_sb->s_maxbytes;
3cadf4b8
BS
2348 sb->s_xattr = old_sb->s_xattr;
2349 sb->s_op = old_sb->s_op;
2350 sb->s_time_gran = 1;
f7b422b1 2351
3cadf4b8 2352 if (server->nfs_client->rpc_ops->version != 2) {
54ceac45
DH
2353 /* The VFS shouldn't apply the umask to mode bits. We will do
2354 * so ourselves when necessary.
f7b422b1
DH
2355 */
2356 sb->s_flags |= MS_POSIXACL;
f7b422b1
DH
2357 }
2358
54ceac45 2359 nfs_initialise_sb(sb);
f7b422b1
DH
2360}
2361
275a5d24
TM
2362static int nfs_compare_mount_options(const struct super_block *s, const struct nfs_server *b, int flags)
2363{
2364 const struct nfs_server *a = s->s_fs_info;
2365 const struct rpc_clnt *clnt_a = a->client;
2366 const struct rpc_clnt *clnt_b = b->client;
2367
2368 if ((s->s_flags & NFS_MS_MASK) != (flags & NFS_MS_MASK))
2369 goto Ebusy;
2370 if (a->nfs_client != b->nfs_client)
2371 goto Ebusy;
0aea92bf 2372 if ((a->flags ^ b->flags) & NFS_MOUNT_CMP_FLAGMASK)
275a5d24
TM
2373 goto Ebusy;
2374 if (a->wsize != b->wsize)
2375 goto Ebusy;
2376 if (a->rsize != b->rsize)
2377 goto Ebusy;
2378 if (a->acregmin != b->acregmin)
2379 goto Ebusy;
2380 if (a->acregmax != b->acregmax)
2381 goto Ebusy;
2382 if (a->acdirmin != b->acdirmin)
2383 goto Ebusy;
2384 if (a->acdirmax != b->acdirmax)
2385 goto Ebusy;
5837f6df 2386 if (b->auth_info.flavor_len > 0 &&
0aea92bf 2387 clnt_a->cl_auth->au_flavor != clnt_b->cl_auth->au_flavor)
275a5d24 2388 goto Ebusy;
e89a5a43 2389 return 1;
275a5d24 2390Ebusy:
e89a5a43
TM
2391 return 0;
2392}
2393
2394struct nfs_sb_mountdata {
2395 struct nfs_server *server;
2396 int mntflags;
2397};
2398
2399static int nfs_set_super(struct super_block *s, void *data)
2400{
2401 struct nfs_sb_mountdata *sb_mntdata = data;
2402 struct nfs_server *server = sb_mntdata->server;
2403 int ret;
2404
2405 s->s_flags = sb_mntdata->mntflags;
2406 s->s_fs_info = server;
8b244ff2 2407 s->s_d_op = server->nfs_client->rpc_ops->dentry_ops;
e89a5a43
TM
2408 ret = set_anon_super(s, server);
2409 if (ret == 0)
2410 server->s_dev = s->s_dev;
2411 return ret;
2412}
2413
fd00a8ff
CL
2414static int nfs_compare_super_address(struct nfs_server *server1,
2415 struct nfs_server *server2)
2416{
2417 struct sockaddr *sap1, *sap2;
2418
2419 sap1 = (struct sockaddr *)&server1->nfs_client->cl_addr;
2420 sap2 = (struct sockaddr *)&server2->nfs_client->cl_addr;
2421
2422 if (sap1->sa_family != sap2->sa_family)
2423 return 0;
2424
2425 switch (sap1->sa_family) {
2426 case AF_INET: {
2427 struct sockaddr_in *sin1 = (struct sockaddr_in *)sap1;
2428 struct sockaddr_in *sin2 = (struct sockaddr_in *)sap2;
2429 if (sin1->sin_addr.s_addr != sin2->sin_addr.s_addr)
2430 return 0;
2431 if (sin1->sin_port != sin2->sin_port)
2432 return 0;
2433 break;
2434 }
2435 case AF_INET6: {
2436 struct sockaddr_in6 *sin1 = (struct sockaddr_in6 *)sap1;
2437 struct sockaddr_in6 *sin2 = (struct sockaddr_in6 *)sap2;
2438 if (!ipv6_addr_equal(&sin1->sin6_addr, &sin2->sin6_addr))
2439 return 0;
2440 if (sin1->sin6_port != sin2->sin6_port)
2441 return 0;
2442 break;
2443 }
2444 default:
2445 return 0;
2446 }
2447
2448 return 1;
2449}
2450
e89a5a43
TM
2451static int nfs_compare_super(struct super_block *sb, void *data)
2452{
2453 struct nfs_sb_mountdata *sb_mntdata = data;
2454 struct nfs_server *server = sb_mntdata->server, *old = NFS_SB(sb);
2455 int mntflags = sb_mntdata->mntflags;
2456
fd00a8ff 2457 if (!nfs_compare_super_address(old, server))
e89a5a43
TM
2458 return 0;
2459 /* Note: NFS_MOUNT_UNSHARED == NFS4_MOUNT_UNSHARED */
2460 if (old->flags & NFS_MOUNT_UNSHARED)
2461 return 0;
2462 if (memcmp(&old->fsid, &server->fsid, sizeof(old->fsid)) != 0)
2463 return 0;
2464 return nfs_compare_mount_options(sb, server, mntflags);
275a5d24
TM
2465}
2466
39ffb921 2467#ifdef CONFIG_NFS_FSCACHE
2311b943
BS
2468static void nfs_get_cache_cookie(struct super_block *sb,
2469 struct nfs_parsed_mount_data *parsed,
2470 struct nfs_clone_mount *cloned)
2471{
c4271c6e 2472 struct nfs_server *nfss = NFS_SB(sb);
2311b943
BS
2473 char *uniq = NULL;
2474 int ulen = 0;
2475
c4271c6e
TM
2476 nfss->fscache_key = NULL;
2477 nfss->fscache = NULL;
2478
2479 if (parsed) {
2480 if (!(parsed->options & NFS_OPTION_FSCACHE))
2481 return;
2482 if (parsed->fscache_uniq) {
2483 uniq = parsed->fscache_uniq;
2484 ulen = strlen(parsed->fscache_uniq);
2485 }
2311b943
BS
2486 } else if (cloned) {
2487 struct nfs_server *mnt_s = NFS_SB(cloned->sb);
c4271c6e
TM
2488 if (!(mnt_s->options & NFS_OPTION_FSCACHE))
2489 return;
2311b943
BS
2490 if (mnt_s->fscache_key) {
2491 uniq = mnt_s->fscache_key->key.uniquifier;
2492 ulen = mnt_s->fscache_key->key.uniq_len;
2493 };
c4271c6e
TM
2494 } else
2495 return;
2311b943
BS
2496
2497 nfs_fscache_get_super_cookie(sb, uniq, ulen);
2498}
39ffb921
TM
2499#else
2500static void nfs_get_cache_cookie(struct super_block *sb,
2501 struct nfs_parsed_mount_data *parsed,
2502 struct nfs_clone_mount *cloned)
2503{
2504}
2505#endif
2311b943 2506
fa799759
MS
2507static int nfs_bdi_register(struct nfs_server *server)
2508{
2509 return bdi_register_dev(&server->backing_dev_info, server->s_dev);
2510}
2511
fbdefd64
BS
2512int nfs_set_sb_security(struct super_block *s, struct dentry *mntroot,
2513 struct nfs_mount_info *mount_info)
3d176e3f 2514{
aa9c2669
DQ
2515 int error;
2516 unsigned long kflags = 0, kflags_out = 0;
2517 if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL)
2518 kflags |= SECURITY_LSM_NATIVE_LABELS;
2519
2520 error = security_sb_set_mnt_opts(s, &mount_info->parsed->lsm_opts,
2521 kflags, &kflags_out);
2522 if (error)
2523 goto err;
2524
2525 if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL &&
2526 !(kflags_out & SECURITY_LSM_NATIVE_LABELS))
2527 NFS_SB(s)->caps &= ~NFS_CAP_SECURITY_LABEL;
2528err:
2529 return error;
3d176e3f 2530}
89d77c8f 2531EXPORT_SYMBOL_GPL(nfs_set_sb_security);
3d176e3f 2532
fbdefd64
BS
2533int nfs_clone_sb_security(struct super_block *s, struct dentry *mntroot,
2534 struct nfs_mount_info *mount_info)
3d176e3f
BS
2535{
2536 /* clone any lsm security options from the parent to the new sb */
3d176e3f
BS
2537 if (mntroot->d_inode->i_op != NFS_SB(s)->nfs_client->rpc_ops->dir_inode_ops)
2538 return -ESTALE;
094f7b69 2539 return security_sb_clone_mnt_opts(mount_info->cloned->sb, s);
3d176e3f 2540}
89d77c8f 2541EXPORT_SYMBOL_GPL(nfs_clone_sb_security);
3d176e3f 2542
ab7017a3 2543struct dentry *nfs_fs_mount_common(struct nfs_server *server,
fbdefd64 2544 int flags, const char *dev_name,
ab7017a3
BS
2545 struct nfs_mount_info *mount_info,
2546 struct nfs_subversion *nfs_mod)
f7b422b1 2547{
f7b422b1 2548 struct super_block *s;
01194981 2549 struct dentry *mntroot = ERR_PTR(-ENOMEM);
75180df2 2550 int (*compare_super)(struct super_block *, void *) = nfs_compare_super;
e89a5a43
TM
2551 struct nfs_sb_mountdata sb_mntdata = {
2552 .mntflags = flags,
c40f8d1d 2553 .server = server,
e89a5a43 2554 };
01194981 2555 int error;
33852a1f 2556
75180df2
TM
2557 if (server->flags & NFS_MOUNT_UNSHARED)
2558 compare_super = NULL;
2559
fb2088cc
SP
2560 /* -o noac implies -o sync */
2561 if (server->flags & NFS_MOUNT_NOAC)
2562 sb_mntdata.mntflags |= MS_SYNCHRONOUS;
2563
e890db01
SM
2564 if (mount_info->cloned != NULL && mount_info->cloned->sb != NULL)
2565 if (mount_info->cloned->sb->s_flags & MS_SYNCHRONOUS)
2566 sb_mntdata.mntflags |= MS_SYNCHRONOUS;
2567
54ceac45 2568 /* Get a superblock - note that we may end up sharing one that already exists */
ab7017a3 2569 s = sget(nfs_mod->nfs_fs, compare_super, nfs_set_super, flags, &sb_mntdata);
816724e6 2570 if (IS_ERR(s)) {
01194981 2571 mntroot = ERR_CAST(s);
54ceac45 2572 goto out_err_nosb;
816724e6
TM
2573 }
2574
54ceac45
DH
2575 if (s->s_fs_info != server) {
2576 nfs_free_server(server);
2577 server = NULL;
fa799759
MS
2578 } else {
2579 error = nfs_bdi_register(server);
01194981
AV
2580 if (error) {
2581 mntroot = ERR_PTR(error);
cfbc0683 2582 goto error_splat_bdi;
01194981 2583 }
ce6cda18 2584 server->super = s;
54ceac45 2585 }
f7b422b1 2586
54ceac45
DH
2587 if (!s->s_root) {
2588 /* initial superblock/root creation */
c40f8d1d 2589 mount_info->fill_super(s, mount_info);
3d176e3f 2590 nfs_get_cache_cookie(s, mount_info->parsed, mount_info->cloned);
54ceac45 2591 }
f7b422b1 2592
87c7083d 2593 mntroot = nfs_get_root(s, mount_info->mntfh, dev_name);
01194981 2594 if (IS_ERR(mntroot))
54ceac45 2595 goto error_splat_super;
816724e6 2596
3d176e3f 2597 error = mount_info->set_security(s, mntroot, mount_info);
f9c3a380
EP
2598 if (error)
2599 goto error_splat_root;
2600
54ceac45 2601 s->s_flags |= MS_ACTIVE;
0655960f
CL
2602
2603out:
01194981 2604 return mntroot;
816724e6 2605
54ceac45
DH
2606out_err_nosb:
2607 nfs_free_server(server);
0655960f 2608 goto out;
54ceac45 2609
f9c3a380
EP
2610error_splat_root:
2611 dput(mntroot);
01194981 2612 mntroot = ERR_PTR(error);
54ceac45 2613error_splat_super:
cfbc0683
N
2614 if (server && !s->s_root)
2615 bdi_unregister(&server->backing_dev_info);
2616error_splat_bdi:
6f5bbff9 2617 deactivate_locked_super(s);
0655960f 2618 goto out;
f7b422b1 2619}
89d77c8f 2620EXPORT_SYMBOL_GPL(nfs_fs_mount_common);
f7b422b1 2621
fbdefd64 2622struct dentry *nfs_fs_mount(struct file_system_type *fs_type,
c40f8d1d
BS
2623 int flags, const char *dev_name, void *raw_data)
2624{
c40f8d1d
BS
2625 struct nfs_mount_info mount_info = {
2626 .fill_super = nfs_fill_super,
3d176e3f 2627 .set_security = nfs_set_sb_security,
c40f8d1d 2628 };
c40f8d1d 2629 struct dentry *mntroot = ERR_PTR(-ENOMEM);
ab7017a3 2630 struct nfs_subversion *nfs_mod;
c40f8d1d
BS
2631 int error;
2632
46058d46 2633 mount_info.parsed = nfs_alloc_parsed_mount_data();
87c7083d
BS
2634 mount_info.mntfh = nfs_alloc_fhandle();
2635 if (mount_info.parsed == NULL || mount_info.mntfh == NULL)
c40f8d1d
BS
2636 goto out;
2637
2638 /* Validate the mount data */
87c7083d 2639 error = nfs_validate_mount_data(fs_type, raw_data, mount_info.parsed, mount_info.mntfh, dev_name);
b72e4f42 2640 if (error == NFS_TEXT_DATA)
46058d46 2641 error = nfs_validate_text_mount_data(raw_data, mount_info.parsed, dev_name);
c40f8d1d
BS
2642 if (error < 0) {
2643 mntroot = ERR_PTR(error);
2644 goto out;
2645 }
c40f8d1d 2646
ab7017a3
BS
2647 nfs_mod = get_nfs_version(mount_info.parsed->version);
2648 if (IS_ERR(nfs_mod)) {
2649 mntroot = ERR_CAST(nfs_mod);
2650 goto out;
2651 }
2652
ff9099f2 2653 mntroot = nfs_mod->rpc_ops->try_mount(flags, dev_name, &mount_info, nfs_mod);
ab7017a3
BS
2654
2655 put_nfs_version(nfs_mod);
c40f8d1d 2656out:
46058d46 2657 nfs_free_parsed_mount_data(mount_info.parsed);
87c7083d 2658 nfs_free_fhandle(mount_info.mntfh);
c40f8d1d
BS
2659 return mntroot;
2660}
89d77c8f 2661EXPORT_SYMBOL_GPL(nfs_fs_mount);
c40f8d1d 2662
387c149b
TM
2663/*
2664 * Ensure that we unregister the bdi before kill_anon_super
2665 * releases the device name
2666 */
fbdefd64 2667void nfs_put_super(struct super_block *s)
387c149b
TM
2668{
2669 struct nfs_server *server = NFS_SB(s);
2670
2671 bdi_unregister(&server->backing_dev_info);
2672}
89d77c8f 2673EXPORT_SYMBOL_GPL(nfs_put_super);
387c149b 2674
54ceac45
DH
2675/*
2676 * Destroy an NFS2/3 superblock
2677 */
fbdefd64 2678void nfs_kill_super(struct super_block *s)
f7b422b1
DH
2679{
2680 struct nfs_server *server = NFS_SB(s);
2681
2682 kill_anon_super(s);
08734048 2683 nfs_fscache_release_super_cookie(s);
54ceac45 2684 nfs_free_server(server);
f7b422b1 2685}
89d77c8f 2686EXPORT_SYMBOL_GPL(nfs_kill_super);
f7b422b1 2687
54ceac45 2688/*
8c958e0c 2689 * Clone an NFS2/3/4 server record on xdev traversal (FSID-change)
54ceac45 2690 */
3dd4f8ef 2691static struct dentry *
e8f25e6d
BS
2692nfs_xdev_mount(struct file_system_type *fs_type, int flags,
2693 const char *dev_name, void *raw_data)
f7b422b1 2694{
e8f25e6d
BS
2695 struct nfs_clone_mount *data = raw_data;
2696 struct nfs_mount_info mount_info = {
2697 .fill_super = nfs_clone_super,
2698 .set_security = nfs_clone_sb_security,
2699 .cloned = data,
2700 };
54ceac45 2701 struct nfs_server *server;
3d176e3f 2702 struct dentry *mntroot = ERR_PTR(-ENOMEM);
ab7017a3 2703 struct nfs_subversion *nfs_mod = NFS_SB(data->sb)->nfs_client->cl_nfs_mod;
f7b422b1 2704
dee972b9 2705 dprintk("--> nfs_xdev_mount()\n");
f7b422b1 2706
e8f25e6d 2707 mount_info.mntfh = mount_info.cloned->fh;
87c7083d 2708
54ceac45 2709 /* create a new volume representation */
1179acc6 2710 server = nfs_mod->rpc_ops->clone_server(NFS_SB(data->sb), data->fh, data->fattr, data->authflavor);
f7b422b1 2711
dee972b9
TM
2712 if (IS_ERR(server))
2713 mntroot = ERR_CAST(server);
2714 else
2715 mntroot = nfs_fs_mount_common(server, flags,
2716 dev_name, &mount_info, nfs_mod);
24c8dbbb 2717
dee972b9
TM
2718 dprintk("<-- nfs_xdev_mount() = %ld\n",
2719 IS_ERR(mntroot) ? PTR_ERR(mntroot) : 0L);
2720 return mntroot;
f7b422b1
DH
2721}
2722
89d77c8f 2723#if IS_ENABLED(CONFIG_NFS_V4)
54ceac45 2724
01c3f052
TM
2725static void nfs4_validate_mount_flags(struct nfs_parsed_mount_data *args)
2726{
5eebde23
SJ
2727 args->flags &= ~(NFS_MOUNT_NONLM|NFS_MOUNT_NOACL|NFS_MOUNT_VER3|
2728 NFS_MOUNT_LOCAL_FLOCK|NFS_MOUNT_LOCAL_FCNTL);
01c3f052
TM
2729}
2730
f0768ebd
CL
2731/*
2732 * Validate NFSv4 mount options
2733 */
91ea40b9
TT
2734static int nfs4_validate_mount_data(void *options,
2735 struct nfs_parsed_mount_data *args,
2736 const char *dev_name)
f0768ebd 2737{
4cfd74fc 2738 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
91ea40b9 2739 struct nfs4_mount_data *data = (struct nfs4_mount_data *)options;
f0768ebd
CL
2740 char *c;
2741
2742 if (data == NULL)
2743 goto out_no_data;
2744
cdf66442
BS
2745 args->version = 4;
2746
f0768ebd
CL
2747 switch (data->version) {
2748 case 1:
4c568017
CL
2749 if (data->host_addrlen > sizeof(args->nfs_server.address))
2750 goto out_no_address;
2751 if (data->host_addrlen == 0)
f0768ebd 2752 goto out_no_address;
4c568017 2753 args->nfs_server.addrlen = data->host_addrlen;
4cfd74fc 2754 if (copy_from_user(sap, data->host_addr, data->host_addrlen))
f0768ebd 2755 return -EFAULT;
4cfd74fc 2756 if (!nfs_verify_server_address(sap))
f0768ebd 2757 goto out_no_address;
872ece86 2758 args->nfs_server.port = ntohs(((struct sockaddr_in *)sap)->sin_port);
f0768ebd 2759
6738b251 2760 if (data->auth_flavourlen) {
74c98811 2761 rpc_authflavor_t pseudoflavor;
6738b251
CL
2762 if (data->auth_flavourlen > 1)
2763 goto out_inval_auth;
74c98811 2764 if (copy_from_user(&pseudoflavor,
91ea40b9 2765 data->auth_flavours,
74c98811 2766 sizeof(pseudoflavor)))
f0768ebd 2767 return -EFAULT;
a3f73c27 2768 args->selected_flavor = pseudoflavor;
74c98811 2769 } else
a3f73c27 2770 args->selected_flavor = RPC_AUTH_UNIX;
f0768ebd
CL
2771
2772 c = strndup_user(data->hostname.data, NFS4_MAXNAMLEN);
2773 if (IS_ERR(c))
2774 return PTR_ERR(c);
91ea40b9 2775 args->nfs_server.hostname = c;
f0768ebd
CL
2776
2777 c = strndup_user(data->mnt_path.data, NFS4_MAXPATHLEN);
2778 if (IS_ERR(c))
2779 return PTR_ERR(c);
91ea40b9
TT
2780 args->nfs_server.export_path = c;
2781 dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", c);
f0768ebd
CL
2782
2783 c = strndup_user(data->client_addr.data, 16);
2784 if (IS_ERR(c))
2785 return PTR_ERR(c);
91ea40b9
TT
2786 args->client_address = c;
2787
2788 /*
2789 * Translate to nfs_parsed_mount_data, which nfs4_fill_super
2790 * can deal with.
2791 */
2792
2793 args->flags = data->flags & NFS4_MOUNT_FLAGMASK;
2794 args->rsize = data->rsize;
2795 args->wsize = data->wsize;
2796 args->timeo = data->timeo;
2797 args->retrans = data->retrans;
2798 args->acregmin = data->acregmin;
2799 args->acregmax = data->acregmax;
2800 args->acdirmin = data->acdirmin;
2801 args->acdirmax = data->acdirmax;
2802 args->nfs_server.protocol = data->proto;
259875ef 2803 nfs_validate_transport_protocol(args);
6da1a034
TM
2804 if (args->nfs_server.protocol == XPRT_TRANSPORT_UDP)
2805 goto out_invalid_transport_udp;
f0768ebd
CL
2806
2807 break;
7630c852 2808 default:
b72e4f42 2809 return NFS_TEXT_DATA;
f0768ebd
CL
2810 }
2811
2812 return 0;
2813
2814out_no_data:
2815 dfprintk(MOUNT, "NFS4: mount program didn't pass any mount data\n");
2816 return -EINVAL;
2817
2818out_inval_auth:
2819 dfprintk(MOUNT, "NFS4: Invalid number of RPC auth flavours %d\n",
2820 data->auth_flavourlen);
2821 return -EINVAL;
2822
2823out_no_address:
2824 dfprintk(MOUNT, "NFS4: mount program didn't pass remote address\n");
2825 return -EINVAL;
6da1a034
TM
2826
2827out_invalid_transport_udp:
2828 dfprintk(MOUNT, "NFSv4: Unsupported transport protocol udp\n");
2829 return -EINVAL;
f0768ebd
CL
2830}
2831
fac1e8e4
BS
2832/*
2833 * NFS v4 module parameters need to stay in the
2834 * NFS client for backwards compatibility
2835 */
2836unsigned int nfs_callback_set_tcpport;
2837unsigned short nfs_callback_tcpport;
2838/* Default cache timeout is 10 minutes */
2839unsigned int nfs_idmap_cache_timeout = 600;
2840/* Turn off NFSv4 uid/gid mapping when using AUTH_SYS */
2841bool nfs4_disable_idmapping = true;
2842unsigned short max_session_slots = NFS4_DEF_SLOT_TABLE_SIZE;
2843unsigned short send_implementation_id = 1;
6f2ea7f2 2844char nfs4_client_id_uniquifier[NFS4_CLIENT_ID_UNIQ_LEN] = "";
f6de7a39 2845bool recover_lost_locks = false;
fac1e8e4 2846
89d77c8f
BS
2847EXPORT_SYMBOL_GPL(nfs_callback_set_tcpport);
2848EXPORT_SYMBOL_GPL(nfs_callback_tcpport);
2849EXPORT_SYMBOL_GPL(nfs_idmap_cache_timeout);
2850EXPORT_SYMBOL_GPL(nfs4_disable_idmapping);
2851EXPORT_SYMBOL_GPL(max_session_slots);
2852EXPORT_SYMBOL_GPL(send_implementation_id);
6f2ea7f2 2853EXPORT_SYMBOL_GPL(nfs4_client_id_uniquifier);
f6de7a39 2854EXPORT_SYMBOL_GPL(recover_lost_locks);
89d77c8f 2855
fac1e8e4
BS
2856#define NFS_CALLBACK_MAXPORTNR (65535U)
2857
2858static int param_set_portnr(const char *val, const struct kernel_param *kp)
2859{
2860 unsigned long num;
2861 int ret;
2862
2863 if (!val)
2864 return -EINVAL;
7297cb68 2865 ret = kstrtoul(val, 0, &num);
fac1e8e4
BS
2866 if (ret == -EINVAL || num > NFS_CALLBACK_MAXPORTNR)
2867 return -EINVAL;
2868 *((unsigned int *)kp->arg) = num;
2869 return 0;
2870}
2871static struct kernel_param_ops param_ops_portnr = {
2872 .set = param_set_portnr,
2873 .get = param_get_uint,
2874};
2875#define param_check_portnr(name, p) __param_check(name, p, unsigned int);
2876
2877module_param_named(callback_tcpport, nfs_callback_set_tcpport, portnr, 0644);
2878module_param(nfs_idmap_cache_timeout, int, 0644);
2879module_param(nfs4_disable_idmapping, bool, 0644);
6f2ea7f2
CL
2880module_param_string(nfs4_unique_id, nfs4_client_id_uniquifier,
2881 NFS4_CLIENT_ID_UNIQ_LEN, 0600);
fac1e8e4
BS
2882MODULE_PARM_DESC(nfs4_disable_idmapping,
2883 "Turn off NFSv4 idmapping when using 'sec=sys'");
2884module_param(max_session_slots, ushort, 0644);
2885MODULE_PARM_DESC(max_session_slots, "Maximum number of outstanding NFSv4.1 "
2886 "requests the client will negotiate");
2887module_param(send_implementation_id, ushort, 0644);
2888MODULE_PARM_DESC(send_implementation_id,
2889 "Send implementation ID with NFSv4.1 exchange_id");
6f2ea7f2 2890MODULE_PARM_DESC(nfs4_unique_id, "nfs_client_id4 uniquifier string");
425e776d 2891
f6de7a39
TM
2892module_param(recover_lost_locks, bool, 0644);
2893MODULE_PARM_DESC(recover_lost_locks,
2894 "If the server reports that a lock might be lost, "
2895 "try to recover it risking data corruption.");
2896
2897
54ceac45 2898#endif /* CONFIG_NFS_V4 */
This page took 0.886009 seconds and 5 git commands to generate.