Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm
[linux-2.6-block.git] / fs / nfs / super.c
CommitLineData
457c8996 1// SPDX-License-Identifier: GPL-2.0-only
f7b422b1
DH
2/*
3 * linux/fs/nfs/super.c
4 *
5 * Copyright (C) 1992 Rick Sladkey
6 *
7 * nfs superblock handling functions
8 *
526719ba 9 * Modularised by Alan Cox <alan@lxorguk.ukuu.org.uk>, while hacking some
f7b422b1
DH
10 * experimental NFS changes. Modularisation taken straight from SYS5 fs.
11 *
12 * Change to nfs_read_super() to permit NFS mounts to multi-homed hosts.
13 * J.S.Peatfield@damtp.cam.ac.uk
14 *
15 * Split from inode.c by David Howells <dhowells@redhat.com>
16 *
54ceac45
DH
17 * - superblocks are indexed on server only - all inodes, dentries, etc. associated with a
18 * particular server are held in the same superblock
19 * - NFS superblocks can have several effective roots to the dentry tree
20 * - directory type roots are spliced into the tree when a path from one root reaches the root
21 * of another (see nfs_lookup())
f7b422b1
DH
22 */
23
f7b422b1
DH
24#include <linux/module.h>
25#include <linux/init.h>
26
27#include <linux/time.h>
28#include <linux/kernel.h>
29#include <linux/mm.h>
30#include <linux/string.h>
31#include <linux/stat.h>
32#include <linux/errno.h>
33#include <linux/unistd.h>
34#include <linux/sunrpc/clnt.h>
5976687a 35#include <linux/sunrpc/addr.h>
f7b422b1
DH
36#include <linux/sunrpc/stats.h>
37#include <linux/sunrpc/metrics.h>
0896a725 38#include <linux/sunrpc/xprtsock.h>
2cf7ff7a 39#include <linux/sunrpc/xprtrdma.h>
f7b422b1
DH
40#include <linux/nfs_fs.h>
41#include <linux/nfs_mount.h>
42#include <linux/nfs4_mount.h>
43#include <linux/lockd/bind.h>
f7b422b1
DH
44#include <linux/seq_file.h>
45#include <linux/mount.h>
c02d7adf 46#include <linux/namei.h>
f7b422b1
DH
47#include <linux/vfs.h>
48#include <linux/inet.h>
fd00a8ff 49#include <linux/in6.h>
5a0e3ad6 50#include <linux/slab.h>
fd00a8ff 51#include <net/ipv6.h>
d8e7748a 52#include <linux/netdevice.h>
f7b422b1 53#include <linux/nfs_xdr.h>
b5d5dfbd 54#include <linux/magic.h>
bf0fd768 55#include <linux/parser.h>
e50a7a1a 56#include <linux/nsproxy.h>
2446ab60 57#include <linux/rcupdate.h>
f7b422b1 58
7c0f6ba6 59#include <linux/uaccess.h>
f7b422b1
DH
60
61#include "nfs4_fs.h"
62#include "callback.h"
63#include "delegation.h"
64#include "iostat.h"
65#include "internal.h"
08734048 66#include "fscache.h"
76e697ba 67#include "nfs4session.h"
ae50c0b5 68#include "pnfs.h"
ab7017a3 69#include "nfs.h"
f7b422b1
DH
70
71#define NFSDBG_FACILITY NFSDBG_VFS
b72e4f42 72#define NFS_TEXT_DATA 1
f7b422b1 73
1c606fb7 74#if IS_ENABLED(CONFIG_NFS_V3)
1e657bd5
PZ
75#define NFS_DEFAULT_VERSION 3
76#else
77#define NFS_DEFAULT_VERSION 2
78#endif
79
28cc5cd8
TM
80#define NFS_MAX_CONNECTIONS 16
81
bf0fd768
CL
82enum {
83 /* Mount options that take no arguments */
91a575e1 84 Opt_soft, Opt_softerr, Opt_hard,
bf0fd768
CL
85 Opt_posix, Opt_noposix,
86 Opt_cto, Opt_nocto,
87 Opt_ac, Opt_noac,
88 Opt_lock, Opt_nolock,
2cf7ff7a 89 Opt_udp, Opt_tcp, Opt_rdma,
bf0fd768
CL
90 Opt_acl, Opt_noacl,
91 Opt_rdirplus, Opt_nordirplus,
75180df2 92 Opt_sharecache, Opt_nosharecache,
d740351b 93 Opt_resvport, Opt_noresvport,
b797cac7 94 Opt_fscache, Opt_nofscache,
89652617 95 Opt_migration, Opt_nomigration,
bf0fd768
CL
96
97 /* Mount options that take integer arguments */
98 Opt_port,
99 Opt_rsize, Opt_wsize, Opt_bsize,
100 Opt_timeo, Opt_retrans,
101 Opt_acregmin, Opt_acregmax,
102 Opt_acdirmin, Opt_acdirmax,
103 Opt_actimeo,
104 Opt_namelen,
105 Opt_mountport,
e887cbcf 106 Opt_mountvers,
3fd5be9e 107 Opt_minorversion,
bf0fd768
CL
108
109 /* Mount options that take string arguments */
0d71b058 110 Opt_nfsvers,
33832034 111 Opt_sec, Opt_proto, Opt_mountproto, Opt_mounthost,
0ac83779 112 Opt_addr, Opt_mountaddr, Opt_clientaddr,
28cc5cd8 113 Opt_nconnect,
7973c1f1 114 Opt_lookupcache,
b797cac7 115 Opt_fscache_uniq,
5eebde23 116 Opt_local_lock,
bf0fd768 117
f45663ce
CL
118 /* Special mount options */
119 Opt_userspace, Opt_deprecated, Opt_sloppy,
bf0fd768
CL
120
121 Opt_err
122};
123
a447c093 124static const match_table_t nfs_mount_option_tokens = {
bf0fd768
CL
125 { Opt_userspace, "bg" },
126 { Opt_userspace, "fg" },
ecbb3845
CL
127 { Opt_userspace, "retry=%s" },
128
f45663ce
CL
129 { Opt_sloppy, "sloppy" },
130
bf0fd768 131 { Opt_soft, "soft" },
91a575e1 132 { Opt_softerr, "softerr" },
bf0fd768 133 { Opt_hard, "hard" },
d33e4dfe
CL
134 { Opt_deprecated, "intr" },
135 { Opt_deprecated, "nointr" },
bf0fd768
CL
136 { Opt_posix, "posix" },
137 { Opt_noposix, "noposix" },
138 { Opt_cto, "cto" },
139 { Opt_nocto, "nocto" },
140 { Opt_ac, "ac" },
141 { Opt_noac, "noac" },
142 { Opt_lock, "lock" },
143 { Opt_nolock, "nolock" },
bf0fd768
CL
144 { Opt_udp, "udp" },
145 { Opt_tcp, "tcp" },
2cf7ff7a 146 { Opt_rdma, "rdma" },
bf0fd768
CL
147 { Opt_acl, "acl" },
148 { Opt_noacl, "noacl" },
149 { Opt_rdirplus, "rdirplus" },
150 { Opt_nordirplus, "nordirplus" },
75180df2
TM
151 { Opt_sharecache, "sharecache" },
152 { Opt_nosharecache, "nosharecache" },
d740351b
CL
153 { Opt_resvport, "resvport" },
154 { Opt_noresvport, "noresvport" },
b797cac7 155 { Opt_fscache, "fsc" },
b797cac7 156 { Opt_nofscache, "nofsc" },
89652617
CL
157 { Opt_migration, "migration" },
158 { Opt_nomigration, "nomigration" },
bf0fd768 159
a5a16bae
CL
160 { Opt_port, "port=%s" },
161 { Opt_rsize, "rsize=%s" },
162 { Opt_wsize, "wsize=%s" },
163 { Opt_bsize, "bsize=%s" },
164 { Opt_timeo, "timeo=%s" },
165 { Opt_retrans, "retrans=%s" },
166 { Opt_acregmin, "acregmin=%s" },
167 { Opt_acregmax, "acregmax=%s" },
168 { Opt_acdirmin, "acdirmin=%s" },
169 { Opt_acdirmax, "acdirmax=%s" },
170 { Opt_actimeo, "actimeo=%s" },
171 { Opt_namelen, "namlen=%s" },
172 { Opt_mountport, "mountport=%s" },
173 { Opt_mountvers, "mountvers=%s" },
0d71b058
TM
174 { Opt_minorversion, "minorversion=%s" },
175
a5a16bae
CL
176 { Opt_nfsvers, "nfsvers=%s" },
177 { Opt_nfsvers, "vers=%s" },
bf0fd768
CL
178
179 { Opt_sec, "sec=%s" },
180 { Opt_proto, "proto=%s" },
181 { Opt_mountproto, "mountproto=%s" },
182 { Opt_addr, "addr=%s" },
183 { Opt_clientaddr, "clientaddr=%s" },
33832034 184 { Opt_mounthost, "mounthost=%s" },
0ac83779 185 { Opt_mountaddr, "mountaddr=%s" },
bf0fd768 186
28cc5cd8
TM
187 { Opt_nconnect, "nconnect=%s" },
188
7973c1f1 189 { Opt_lookupcache, "lookupcache=%s" },
a6d5ff64 190 { Opt_fscache_uniq, "fsc=%s" },
5eebde23 191 { Opt_local_lock, "local_lock=%s" },
7973c1f1 192
3862279a
TM
193 /* The following needs to be listed after all other options */
194 { Opt_nfsvers, "v%s" },
195
bf0fd768
CL
196 { Opt_err, NULL }
197};
198
199enum {
ee671b01 200 Opt_xprt_udp, Opt_xprt_udp6, Opt_xprt_tcp, Opt_xprt_tcp6, Opt_xprt_rdma,
181342c5 201 Opt_xprt_rdma6,
bf0fd768
CL
202
203 Opt_xprt_err
204};
205
a447c093 206static const match_table_t nfs_xprt_protocol_tokens = {
bf0fd768 207 { Opt_xprt_udp, "udp" },
ee671b01 208 { Opt_xprt_udp6, "udp6" },
bf0fd768 209 { Opt_xprt_tcp, "tcp" },
ee671b01 210 { Opt_xprt_tcp6, "tcp6" },
2cf7ff7a 211 { Opt_xprt_rdma, "rdma" },
181342c5 212 { Opt_xprt_rdma6, "rdma6" },
bf0fd768
CL
213
214 { Opt_xprt_err, NULL }
215};
216
217enum {
218 Opt_sec_none, Opt_sec_sys,
219 Opt_sec_krb5, Opt_sec_krb5i, Opt_sec_krb5p,
220 Opt_sec_lkey, Opt_sec_lkeyi, Opt_sec_lkeyp,
221 Opt_sec_spkm, Opt_sec_spkmi, Opt_sec_spkmp,
222
223 Opt_sec_err
224};
225
a447c093 226static const match_table_t nfs_secflavor_tokens = {
bf0fd768
CL
227 { Opt_sec_none, "none" },
228 { Opt_sec_none, "null" },
229 { Opt_sec_sys, "sys" },
230
231 { Opt_sec_krb5, "krb5" },
232 { Opt_sec_krb5i, "krb5i" },
233 { Opt_sec_krb5p, "krb5p" },
234
235 { Opt_sec_lkey, "lkey" },
236 { Opt_sec_lkeyi, "lkeyi" },
237 { Opt_sec_lkeyp, "lkeyp" },
238
8d042218
OK
239 { Opt_sec_spkm, "spkm3" },
240 { Opt_sec_spkmi, "spkm3i" },
241 { Opt_sec_spkmp, "spkm3p" },
242
bf0fd768
CL
243 { Opt_sec_err, NULL }
244};
245
7973c1f1
TM
246enum {
247 Opt_lookupcache_all, Opt_lookupcache_positive,
248 Opt_lookupcache_none,
249
250 Opt_lookupcache_err
251};
252
253static match_table_t nfs_lookupcache_tokens = {
254 { Opt_lookupcache_all, "all" },
255 { Opt_lookupcache_positive, "pos" },
256 { Opt_lookupcache_positive, "positive" },
257 { Opt_lookupcache_none, "none" },
258
259 { Opt_lookupcache_err, NULL }
260};
261
5eebde23
SJ
262enum {
263 Opt_local_lock_all, Opt_local_lock_flock, Opt_local_lock_posix,
264 Opt_local_lock_none,
265
266 Opt_local_lock_err
267};
268
269static match_table_t nfs_local_lock_tokens = {
270 { Opt_local_lock_all, "all" },
271 { Opt_local_lock_flock, "flock" },
272 { Opt_local_lock_posix, "posix" },
273 { Opt_local_lock_none, "none" },
274
275 { Opt_local_lock_err, NULL }
276};
277
0d71b058
TM
278enum {
279 Opt_vers_2, Opt_vers_3, Opt_vers_4, Opt_vers_4_0,
42c2c424 280 Opt_vers_4_1, Opt_vers_4_2,
0d71b058
TM
281
282 Opt_vers_err
283};
284
285static match_table_t nfs_vers_tokens = {
286 { Opt_vers_2, "2" },
287 { Opt_vers_3, "3" },
288 { Opt_vers_4, "4" },
289 { Opt_vers_4_0, "4.0" },
290 { Opt_vers_4_1, "4.1" },
42c2c424 291 { Opt_vers_4_2, "4.2" },
0d71b058
TM
292
293 { Opt_vers_err, NULL }
294};
bf0fd768 295
31f43471
AV
296static struct dentry *nfs_xdev_mount(struct file_system_type *fs_type,
297 int flags, const char *dev_name, void *raw_data);
f7b422b1 298
ab7017a3 299struct file_system_type nfs_fs_type = {
f7b422b1
DH
300 .owner = THIS_MODULE,
301 .name = "nfs",
01194981 302 .mount = nfs_fs_mount,
f7b422b1 303 .kill_sb = nfs_kill_super,
ecf3d1f1 304 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
f7b422b1 305};
7f78e035 306MODULE_ALIAS_FS("nfs");
ddda8e0a 307EXPORT_SYMBOL_GPL(nfs_fs_type);
f7b422b1 308
54ceac45 309struct file_system_type nfs_xdev_fs_type = {
f7b422b1
DH
310 .owner = THIS_MODULE,
311 .name = "nfs",
31f43471 312 .mount = nfs_xdev_mount,
f7b422b1 313 .kill_sb = nfs_kill_super,
ecf3d1f1 314 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
f7b422b1
DH
315};
316
6a74490d 317const struct super_operations nfs_sops = {
f7b422b1 318 .alloc_inode = nfs_alloc_inode,
ca1a199e 319 .free_inode = nfs_free_inode,
f7b422b1 320 .write_inode = nfs_write_inode,
eed99357 321 .drop_inode = nfs_drop_inode,
f7b422b1 322 .statfs = nfs_statfs,
b57922d9 323 .evict_inode = nfs_evict_inode,
f7b422b1
DH
324 .umount_begin = nfs_umount_begin,
325 .show_options = nfs_show_options,
c7f404b4
AV
326 .show_devname = nfs_show_devname,
327 .show_path = nfs_show_path,
f7b422b1 328 .show_stats = nfs_show_stats,
48b605f8 329 .remount_fs = nfs_remount,
f7b422b1 330};
ddda8e0a 331EXPORT_SYMBOL_GPL(nfs_sops);
f7b422b1 332
89d77c8f 333#if IS_ENABLED(CONFIG_NFS_V4)
b72e4f42 334static void nfs4_validate_mount_flags(struct nfs_parsed_mount_data *);
d72c727c
BS
335static int nfs4_validate_mount_data(void *options,
336 struct nfs_parsed_mount_data *args, const char *dev_name);
1ae811ee 337
338struct file_system_type nfs4_fs_type = {
339 .owner = THIS_MODULE,
340 .name = "nfs4",
341 .mount = nfs_fs_mount,
342 .kill_sb = nfs_kill_super,
ecf3d1f1 343 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
1ae811ee 344};
7f78e035 345MODULE_ALIAS_FS("nfs4");
fa7614dd 346MODULE_ALIAS("nfs4");
1ae811ee 347EXPORT_SYMBOL_GPL(nfs4_fs_type);
348
349static int __init register_nfs4_fs(void)
350{
351 return register_filesystem(&nfs4_fs_type);
352}
353
354static void unregister_nfs4_fs(void)
355{
356 unregister_filesystem(&nfs4_fs_type);
357}
358#else
359static int __init register_nfs4_fs(void)
360{
361 return 0;
362}
363
364static void unregister_nfs4_fs(void)
365{
366}
f7b422b1
DH
367#endif
368
8e1f936b 369static struct shrinker acl_shrinker = {
1ab6c499
DC
370 .count_objects = nfs_access_cache_count,
371 .scan_objects = nfs_access_cache_scan,
8e1f936b
RR
372 .seeks = DEFAULT_SEEKS,
373};
979df72e 374
f7b422b1
DH
375/*
376 * Register the NFS filesystems
377 */
378int __init register_nfs_fs(void)
379{
380 int ret;
381
382 ret = register_filesystem(&nfs_fs_type);
383 if (ret < 0)
384 goto error_0;
385
1ae811ee 386 ret = register_nfs4_fs();
f7b422b1
DH
387 if (ret < 0)
388 goto error_1;
1ae811ee 389
390 ret = nfs_register_sysctl();
391 if (ret < 0)
392 goto error_2;
5ef8d792
KM
393 ret = register_shrinker(&acl_shrinker);
394 if (ret < 0)
395 goto error_3;
f7b422b1 396 return 0;
5ef8d792
KM
397error_3:
398 nfs_unregister_sysctl();
1ae811ee 399error_2:
400 unregister_nfs4_fs();
f7b422b1
DH
401error_1:
402 unregister_filesystem(&nfs_fs_type);
f7b422b1
DH
403error_0:
404 return ret;
405}
406
407/*
408 * Unregister the NFS filesystems
409 */
410void __exit unregister_nfs_fs(void)
411{
8e1f936b 412 unregister_shrinker(&acl_shrinker);
49af7ee1 413 nfs_unregister_sysctl();
1ae811ee 414 unregister_nfs4_fs();
f7b422b1
DH
415 unregister_filesystem(&nfs_fs_type);
416}
417
ea7c38fe 418bool nfs_sb_active(struct super_block *sb)
ef818a28 419{
1daef0a8 420 struct nfs_server *server = NFS_SB(sb);
ef818a28 421
ea7c38fe
TM
422 if (!atomic_inc_not_zero(&sb->s_active))
423 return false;
424 if (atomic_inc_return(&server->active) != 1)
425 atomic_dec(&sb->s_active);
426 return true;
ef818a28 427}
89d77c8f 428EXPORT_SYMBOL_GPL(nfs_sb_active);
ef818a28 429
1daef0a8 430void nfs_sb_deactive(struct super_block *sb)
ef818a28
SD
431{
432 struct nfs_server *server = NFS_SB(sb);
1daef0a8
TM
433
434 if (atomic_dec_and_test(&server->active))
435 deactivate_super(sb);
ef818a28 436}
89d77c8f 437EXPORT_SYMBOL_GPL(nfs_sb_deactive);
ef818a28 438
f7b422b1
DH
439/*
440 * Deliver file system statistics to userspace
441 */
fbdefd64 442int nfs_statfs(struct dentry *dentry, struct kstatfs *buf)
f7b422b1 443{
0c7d90cf 444 struct nfs_server *server = NFS_SB(dentry->d_sb);
f7b422b1
DH
445 unsigned char blockbits;
446 unsigned long blockres;
2b0143b5 447 struct nfs_fh *fh = NFS_FH(d_inode(dentry));
ca7e9a0d
TM
448 struct nfs_fsstat res;
449 int error = -ENOMEM;
450
451 res.fattr = nfs_alloc_fattr();
452 if (res.fattr == NULL)
453 goto out_err;
f7b422b1 454
8fa5c000 455 error = server->nfs_client->rpc_ops->statfs(server, fh, &res);
fbf3fdd2
MZ
456 if (unlikely(error == -ESTALE)) {
457 struct dentry *pd_dentry;
458
459 pd_dentry = dget_parent(dentry);
1cfb7072
AV
460 nfs_zap_caches(d_inode(pd_dentry));
461 dput(pd_dentry);
fbf3fdd2 462 }
ca7e9a0d 463 nfs_free_fattr(res.fattr);
f7b422b1
DH
464 if (error < 0)
465 goto out_err;
ca7e9a0d 466
1a0ba9ae 467 buf->f_type = NFS_SUPER_MAGIC;
f7b422b1
DH
468
469 /*
470 * Current versions of glibc do not correctly handle the
471 * case where f_frsize != f_bsize. Eventually we want to
472 * report the value of wtmult in this field.
473 */
0c7d90cf 474 buf->f_frsize = dentry->d_sb->s_blocksize;
f7b422b1
DH
475
476 /*
477 * On most *nix systems, f_blocks, f_bfree, and f_bavail
478 * are reported in units of f_frsize. Linux hasn't had
479 * an f_frsize field in its statfs struct until recently,
480 * thus historically Linux's sys_statfs reports these
481 * fields in units of f_bsize.
482 */
0c7d90cf
DH
483 buf->f_bsize = dentry->d_sb->s_blocksize;
484 blockbits = dentry->d_sb->s_blocksize_bits;
f7b422b1
DH
485 blockres = (1 << blockbits) - 1;
486 buf->f_blocks = (res.tbytes + blockres) >> blockbits;
487 buf->f_bfree = (res.fbytes + blockres) >> blockbits;
488 buf->f_bavail = (res.abytes + blockres) >> blockbits;
489
490 buf->f_files = res.tfiles;
491 buf->f_ffree = res.afiles;
492
493 buf->f_namelen = server->namelen;
1a0ba9ae 494
f7b422b1
DH
495 return 0;
496
497 out_err:
3110ff80 498 dprintk("%s: statfs error = %d\n", __func__, -error);
1a0ba9ae 499 return error;
f7b422b1 500}
89d77c8f 501EXPORT_SYMBOL_GPL(nfs_statfs);
f7b422b1 502
7d4e2747
DH
503/*
504 * Map the security flavour number to a name
505 */
81039f1f
TM
506static const char *nfs_pseudoflavour_to_name(rpc_authflavor_t flavour)
507{
7d4e2747 508 static const struct {
81039f1f
TM
509 rpc_authflavor_t flavour;
510 const char *str;
4d4b69dd
WAA
511 } sec_flavours[NFS_AUTH_INFO_MAX_FLAVORS] = {
512 /* update NFS_AUTH_INFO_MAX_FLAVORS when this list changes! */
81039f1f
TM
513 { RPC_AUTH_NULL, "null" },
514 { RPC_AUTH_UNIX, "sys" },
515 { RPC_AUTH_GSS_KRB5, "krb5" },
516 { RPC_AUTH_GSS_KRB5I, "krb5i" },
517 { RPC_AUTH_GSS_KRB5P, "krb5p" },
518 { RPC_AUTH_GSS_LKEY, "lkey" },
519 { RPC_AUTH_GSS_LKEYI, "lkeyi" },
520 { RPC_AUTH_GSS_LKEYP, "lkeyp" },
521 { RPC_AUTH_GSS_SPKM, "spkm" },
522 { RPC_AUTH_GSS_SPKMI, "spkmi" },
523 { RPC_AUTH_GSS_SPKMP, "spkmp" },
4d81cd16 524 { UINT_MAX, "unknown" }
81039f1f
TM
525 };
526 int i;
527
4d81cd16 528 for (i = 0; sec_flavours[i].flavour != UINT_MAX; i++) {
81039f1f
TM
529 if (sec_flavours[i].flavour == flavour)
530 break;
531 }
532 return sec_flavours[i].str;
533}
534
ee671b01
JL
535static void nfs_show_mountd_netid(struct seq_file *m, struct nfs_server *nfss,
536 int showdefaults)
537{
538 struct sockaddr *sap = (struct sockaddr *) &nfss->mountd_address;
6f6e3c09 539 char *proto = NULL;
ee671b01 540
ee671b01
JL
541 switch (sap->sa_family) {
542 case AF_INET:
543 switch (nfss->mountd_protocol) {
544 case IPPROTO_UDP:
6f6e3c09 545 proto = RPCBIND_NETID_UDP;
ee671b01
JL
546 break;
547 case IPPROTO_TCP:
6f6e3c09 548 proto = RPCBIND_NETID_TCP;
ee671b01 549 break;
ee671b01
JL
550 }
551 break;
552 case AF_INET6:
553 switch (nfss->mountd_protocol) {
554 case IPPROTO_UDP:
6f6e3c09 555 proto = RPCBIND_NETID_UDP6;
ee671b01
JL
556 break;
557 case IPPROTO_TCP:
6f6e3c09 558 proto = RPCBIND_NETID_TCP6;
ee671b01 559 break;
ee671b01
JL
560 }
561 break;
ee671b01 562 }
6f6e3c09
N
563 if (proto || showdefaults)
564 seq_printf(m, ",mountproto=%s", proto ?: "auto");
ee671b01
JL
565}
566
82d101d5
CL
567static void nfs_show_mountd_options(struct seq_file *m, struct nfs_server *nfss,
568 int showdefaults)
569{
570 struct sockaddr *sap = (struct sockaddr *)&nfss->mountd_address;
571
d5eff1a3
BS
572 if (nfss->flags & NFS_MOUNT_LEGACY_INTERFACE)
573 return;
574
82d101d5
CL
575 switch (sap->sa_family) {
576 case AF_INET: {
577 struct sockaddr_in *sin = (struct sockaddr_in *)sap;
be859405 578 seq_printf(m, ",mountaddr=%pI4", &sin->sin_addr.s_addr);
82d101d5
CL
579 break;
580 }
581 case AF_INET6: {
582 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap;
d250e190 583 seq_printf(m, ",mountaddr=%pI6c", &sin6->sin6_addr);
82d101d5
CL
584 break;
585 }
586 default:
587 if (showdefaults)
1c316e39 588 seq_puts(m, ",mountaddr=unspecified");
82d101d5
CL
589 }
590
591 if (nfss->mountd_version || showdefaults)
592 seq_printf(m, ",mountvers=%u", nfss->mountd_version);
aa699473
SK
593 if ((nfss->mountd_port &&
594 nfss->mountd_port != (unsigned short)NFS_UNSPEC_PORT) ||
595 showdefaults)
82d101d5
CL
596 seq_printf(m, ",mountport=%u", nfss->mountd_port);
597
ee671b01 598 nfs_show_mountd_netid(m, nfss, showdefaults);
82d101d5
CL
599}
600
89d77c8f 601#if IS_ENABLED(CONFIG_NFS_V4)
0be8189f
TM
602static void nfs_show_nfsv4_options(struct seq_file *m, struct nfs_server *nfss,
603 int showdefaults)
604{
605 struct nfs_client *clp = nfss->nfs_client;
606
607 seq_printf(m, ",clientaddr=%s", clp->cl_ipaddr);
0be8189f
TM
608}
609#else
610static void nfs_show_nfsv4_options(struct seq_file *m, struct nfs_server *nfss,
611 int showdefaults)
612{
613}
614#endif
615
7bbceb6f
TM
616static void nfs_show_nfs_version(struct seq_file *m,
617 unsigned int version,
618 unsigned int minorversion)
619{
620 seq_printf(m, ",vers=%u", version);
621 if (version == 4)
622 seq_printf(m, ".%u", minorversion);
623}
624
f7b422b1
DH
625/*
626 * Describe the mount options in force on this server representation
627 */
82d101d5
CL
628static void nfs_show_mount_options(struct seq_file *m, struct nfs_server *nfss,
629 int showdefaults)
f7b422b1 630{
509de811 631 static const struct proc_nfs_info {
f7b422b1 632 int flag;
509de811
DH
633 const char *str;
634 const char *nostr;
f7b422b1 635 } nfs_info[] = {
91a575e1
TM
636 { NFS_MOUNT_SOFT, ",soft", "" },
637 { NFS_MOUNT_SOFTERR, ",softerr", "" },
82d101d5 638 { NFS_MOUNT_POSIX, ",posix", "" },
f7b422b1
DH
639 { NFS_MOUNT_NOCTO, ",nocto", "" },
640 { NFS_MOUNT_NOAC, ",noac", "" },
641 { NFS_MOUNT_NONLM, ",nolock", "" },
642 { NFS_MOUNT_NOACL, ",noacl", "" },
74dd34e6 643 { NFS_MOUNT_NORDIRPLUS, ",nordirplus", "" },
d740351b
CL
644 { NFS_MOUNT_UNSHARED, ",nosharecache", "" },
645 { NFS_MOUNT_NORESVPORT, ",noresvport", "" },
f7b422b1
DH
646 { 0, NULL, NULL }
647 };
509de811 648 const struct proc_nfs_info *nfs_infop;
8fa5c000 649 struct nfs_client *clp = nfss->nfs_client;
82d101d5 650 u32 version = clp->rpc_ops->version;
7c563cc9 651 int local_flock, local_fcntl;
f7b422b1 652
7bbceb6f 653 nfs_show_nfs_version(m, version, clp->cl_minorversion);
2d767432
CL
654 seq_printf(m, ",rsize=%u", nfss->rsize);
655 seq_printf(m, ",wsize=%u", nfss->wsize);
82d101d5
CL
656 if (nfss->bsize != 0)
657 seq_printf(m, ",bsize=%u", nfss->bsize);
658 seq_printf(m, ",namlen=%u", nfss->namelen);
0e0cab74 659 if (nfss->acregmin != NFS_DEF_ACREGMIN*HZ || showdefaults)
2d767432 660 seq_printf(m, ",acregmin=%u", nfss->acregmin/HZ);
0e0cab74 661 if (nfss->acregmax != NFS_DEF_ACREGMAX*HZ || showdefaults)
2d767432 662 seq_printf(m, ",acregmax=%u", nfss->acregmax/HZ);
0e0cab74 663 if (nfss->acdirmin != NFS_DEF_ACDIRMIN*HZ || showdefaults)
2d767432 664 seq_printf(m, ",acdirmin=%u", nfss->acdirmin/HZ);
0e0cab74 665 if (nfss->acdirmax != NFS_DEF_ACDIRMAX*HZ || showdefaults)
2d767432 666 seq_printf(m, ",acdirmax=%u", nfss->acdirmax/HZ);
91a575e1
TM
667 if (!(nfss->flags & (NFS_MOUNT_SOFT|NFS_MOUNT_SOFTERR)))
668 seq_puts(m, ",hard");
f7b422b1
DH
669 for (nfs_infop = nfs_info; nfs_infop->flag; nfs_infop++) {
670 if (nfss->flags & nfs_infop->flag)
671 seq_puts(m, nfs_infop->str);
672 else
673 seq_puts(m, nfs_infop->nostr);
674 }
2446ab60 675 rcu_read_lock();
56928edd 676 seq_printf(m, ",proto=%s",
ee671b01 677 rpc_peeraddr2str(nfss->client, RPC_DISPLAY_NETID));
2446ab60 678 rcu_read_unlock();
fd87c8b7
TM
679 if (clp->cl_nconnect > 0)
680 seq_printf(m, ",nconnect=%u", clp->cl_nconnect);
82d101d5
CL
681 if (version == 4) {
682 if (nfss->port != NFS_PORT)
683 seq_printf(m, ",port=%u", nfss->port);
684 } else
685 if (nfss->port)
686 seq_printf(m, ",port=%u", nfss->port);
687
33170233
TM
688 seq_printf(m, ",timeo=%lu", 10U * nfss->client->cl_timeout->to_initval / HZ);
689 seq_printf(m, ",retrans=%u", nfss->client->cl_timeout->to_retries);
81039f1f 690 seq_printf(m, ",sec=%s", nfs_pseudoflavour_to_name(nfss->client->cl_auth->au_flavor));
82d101d5
CL
691
692 if (version != 4)
693 nfs_show_mountd_options(m, nfss, showdefaults);
0be8189f
TM
694 else
695 nfs_show_nfsv4_options(m, nfss, showdefaults);
82d101d5 696
b797cac7 697 if (nfss->options & NFS_OPTION_FSCACHE)
1c316e39 698 seq_puts(m, ",fsc");
9b00c643 699
89652617 700 if (nfss->options & NFS_OPTION_MIGRATION)
1c316e39 701 seq_puts(m, ",migration");
89652617 702
9b00c643
PL
703 if (nfss->flags & NFS_MOUNT_LOOKUP_CACHE_NONEG) {
704 if (nfss->flags & NFS_MOUNT_LOOKUP_CACHE_NONE)
1c316e39 705 seq_puts(m, ",lookupcache=none");
9b00c643 706 else
1c316e39 707 seq_puts(m, ",lookupcache=pos");
9b00c643 708 }
7c563cc9
SJ
709
710 local_flock = nfss->flags & NFS_MOUNT_LOCAL_FLOCK;
711 local_fcntl = nfss->flags & NFS_MOUNT_LOCAL_FCNTL;
712
713 if (!local_flock && !local_fcntl)
1c316e39 714 seq_puts(m, ",local_lock=none");
7c563cc9 715 else if (local_flock && local_fcntl)
1c316e39 716 seq_puts(m, ",local_lock=all");
7c563cc9 717 else if (local_flock)
1c316e39 718 seq_puts(m, ",local_lock=flock");
7c563cc9 719 else
1c316e39 720 seq_puts(m, ",local_lock=posix");
f7b422b1
DH
721}
722
723/*
724 * Describe the mount options on this VFS mountpoint
725 */
fbdefd64 726int nfs_show_options(struct seq_file *m, struct dentry *root)
f7b422b1 727{
34c80b1d 728 struct nfs_server *nfss = NFS_SB(root->d_sb);
f7b422b1
DH
729
730 nfs_show_mount_options(m, nfss, 0);
731
2446ab60 732 rcu_read_lock();
5d8515ca
CL
733 seq_printf(m, ",addr=%s",
734 rpc_peeraddr2str(nfss->nfs_client->cl_rpcclient,
735 RPC_DISPLAY_ADDR));
2446ab60 736 rcu_read_unlock();
f7b422b1
DH
737
738 return 0;
739}
89d77c8f 740EXPORT_SYMBOL_GPL(nfs_show_options);
45402c38 741
89d77c8f 742#if IS_ENABLED(CONFIG_NFS_V4)
1a7441b2
DW
743static void show_lease(struct seq_file *m, struct nfs_server *server)
744{
745 struct nfs_client *clp = server->nfs_client;
746 unsigned long expire;
747
748 seq_printf(m, ",lease_time=%ld", clp->cl_lease_time / HZ);
749 expire = clp->cl_last_renewal + clp->cl_lease_time;
750 seq_printf(m, ",lease_expired=%ld",
751 time_after(expire, jiffies) ? 0 : (jiffies - expire) / HZ);
752}
ae50c0b5 753#ifdef CONFIG_NFS_V4_1
45402c38 754static void show_sessions(struct seq_file *m, struct nfs_server *server)
ae50c0b5
BF
755{
756 if (nfs4_has_session(server->nfs_client))
1c316e39 757 seq_puts(m, ",sessions");
ae50c0b5
BF
758}
759#else
45402c38
HS
760static void show_sessions(struct seq_file *m, struct nfs_server *server) {}
761#endif
ae50c0b5
BF
762#endif
763
764#ifdef CONFIG_NFS_V4_1
45402c38 765static void show_pnfs(struct seq_file *m, struct nfs_server *server)
ae50c0b5
BF
766{
767 seq_printf(m, ",pnfs=");
768 if (server->pnfs_curr_ld)
769 seq_printf(m, "%s", server->pnfs_curr_ld->name);
770 else
771 seq_printf(m, "not configured");
772}
7e03b7cc
TM
773
774static void show_implementation_id(struct seq_file *m, struct nfs_server *nfss)
775{
59155546
CL
776 if (nfss->nfs_client && nfss->nfs_client->cl_implid) {
777 struct nfs41_impl_id *impl_id = nfss->nfs_client->cl_implid;
7e03b7cc
TM
778 seq_printf(m, "\n\timpl_id:\tname='%s',domain='%s',"
779 "date='%llu,%u'",
780 impl_id->name, impl_id->domain,
781 impl_id->date.seconds, impl_id->date.nseconds);
782 }
783}
45402c38 784#else
89d77c8f 785#if IS_ENABLED(CONFIG_NFS_V4)
7e03b7cc
TM
786static void show_pnfs(struct seq_file *m, struct nfs_server *server)
787{
788}
45402c38 789#endif
7e03b7cc
TM
790static void show_implementation_id(struct seq_file *m, struct nfs_server *nfss)
791{
792}
45402c38 793#endif
f7b422b1 794
fbdefd64 795int nfs_show_devname(struct seq_file *m, struct dentry *root)
c7f404b4
AV
796{
797 char *page = (char *) __get_free_page(GFP_KERNEL);
798 char *devname, *dummy;
799 int err = 0;
800 if (!page)
801 return -ENOMEM;
97a54868 802 devname = nfs_path(&dummy, root, page, PAGE_SIZE, 0);
c7f404b4
AV
803 if (IS_ERR(devname))
804 err = PTR_ERR(devname);
805 else
806 seq_escape(m, devname, " \t\n\\");
807 free_page((unsigned long)page);
808 return err;
809}
89d77c8f 810EXPORT_SYMBOL_GPL(nfs_show_devname);
c7f404b4 811
fbdefd64 812int nfs_show_path(struct seq_file *m, struct dentry *dentry)
c7f404b4
AV
813{
814 seq_puts(m, "/");
815 return 0;
816}
89d77c8f 817EXPORT_SYMBOL_GPL(nfs_show_path);
c7f404b4 818
f7b422b1
DH
819/*
820 * Present statistical information for this VFS mountpoint
821 */
fbdefd64 822int nfs_show_stats(struct seq_file *m, struct dentry *root)
f7b422b1
DH
823{
824 int i, cpu;
64132379 825 struct nfs_server *nfss = NFS_SB(root->d_sb);
f7b422b1
DH
826 struct rpc_auth *auth = nfss->client->cl_auth;
827 struct nfs_iostats totals = { };
828
829 seq_printf(m, "statvers=%s", NFS_IOSTAT_VERS);
830
831 /*
832 * Display all mount option settings
833 */
1c316e39 834 seq_puts(m, "\n\topts:\t");
bc98a42c 835 seq_puts(m, sb_rdonly(root->d_sb) ? "ro" : "rw");
1751e8a6
LT
836 seq_puts(m, root->d_sb->s_flags & SB_SYNCHRONOUS ? ",sync" : "");
837 seq_puts(m, root->d_sb->s_flags & SB_NOATIME ? ",noatime" : "");
838 seq_puts(m, root->d_sb->s_flags & SB_NODIRATIME ? ",nodiratime" : "");
f7b422b1
DH
839 nfs_show_mount_options(m, nfss, 1);
840
841 seq_printf(m, "\n\tage:\t%lu", (jiffies - nfss->mount_time) / HZ);
842
7e03b7cc 843 show_implementation_id(m, nfss);
7d2ed9ac 844
1c316e39 845 seq_puts(m, "\n\tcaps:\t");
f7b422b1 846 seq_printf(m, "caps=0x%x", nfss->caps);
2d767432
CL
847 seq_printf(m, ",wtmult=%u", nfss->wtmult);
848 seq_printf(m, ",dtsize=%u", nfss->dtsize);
849 seq_printf(m, ",bsize=%u", nfss->bsize);
850 seq_printf(m, ",namlen=%u", nfss->namelen);
f7b422b1 851
89d77c8f 852#if IS_ENABLED(CONFIG_NFS_V4)
40c55319 853 if (nfss->nfs_client->rpc_ops->version == 4) {
1c316e39 854 seq_puts(m, "\n\tnfsv4:\t");
f7b422b1
DH
855 seq_printf(m, "bm0=0x%x", nfss->attr_bitmask[0]);
856 seq_printf(m, ",bm1=0x%x", nfss->attr_bitmask[1]);
a09df2ca 857 seq_printf(m, ",bm2=0x%x", nfss->attr_bitmask[2]);
f7b422b1 858 seq_printf(m, ",acl=0x%x", nfss->acl_bitmask);
ae50c0b5
BF
859 show_sessions(m, nfss);
860 show_pnfs(m, nfss);
1a7441b2 861 show_lease(m, nfss);
f7b422b1
DH
862 }
863#endif
864
865 /*
866 * Display security flavor in effect for this mount
867 */
2d767432 868 seq_printf(m, "\n\tsec:\tflavor=%u", auth->au_ops->au_flavor);
f7b422b1 869 if (auth->au_flavor)
2d767432 870 seq_printf(m, ",pseudoflavor=%u", auth->au_flavor);
f7b422b1
DH
871
872 /*
873 * Display superblock I/O counters
874 */
875 for_each_possible_cpu(cpu) {
876 struct nfs_iostats *stats;
877
878 preempt_disable();
879 stats = per_cpu_ptr(nfss->io_stats, cpu);
880
881 for (i = 0; i < __NFSIOS_COUNTSMAX; i++)
882 totals.events[i] += stats->events[i];
883 for (i = 0; i < __NFSIOS_BYTESMAX; i++)
884 totals.bytes[i] += stats->bytes[i];
6a51091d
DH
885#ifdef CONFIG_NFS_FSCACHE
886 for (i = 0; i < __NFSIOS_FSCACHEMAX; i++)
887 totals.fscache[i] += stats->fscache[i];
888#endif
f7b422b1
DH
889
890 preempt_enable();
891 }
892
1c316e39 893 seq_puts(m, "\n\tevents:\t");
f7b422b1
DH
894 for (i = 0; i < __NFSIOS_COUNTSMAX; i++)
895 seq_printf(m, "%lu ", totals.events[i]);
1c316e39 896 seq_puts(m, "\n\tbytes:\t");
f7b422b1
DH
897 for (i = 0; i < __NFSIOS_BYTESMAX; i++)
898 seq_printf(m, "%Lu ", totals.bytes[i]);
6a51091d
DH
899#ifdef CONFIG_NFS_FSCACHE
900 if (nfss->options & NFS_OPTION_FSCACHE) {
1c316e39 901 seq_puts(m, "\n\tfsc:\t");
6a51091d 902 for (i = 0; i < __NFSIOS_FSCACHEMAX; i++)
ce85bd29 903 seq_printf(m, "%Lu ", totals.fscache[i]);
6a51091d
DH
904 }
905#endif
9bcaa35c 906 seq_putc(m, '\n');
f7b422b1 907
016583d7 908 rpc_clnt_show_stats(m, nfss->client);
f7b422b1
DH
909
910 return 0;
911}
89d77c8f 912EXPORT_SYMBOL_GPL(nfs_show_stats);
f7b422b1
DH
913
914/*
915 * Begin unmount by attempting to remove all automounted mountpoints we added
54ceac45 916 * in response to xdev traversals and referrals
f7b422b1 917 */
fbdefd64 918void nfs_umount_begin(struct super_block *sb)
f7b422b1 919{
67e55205 920 struct nfs_server *server;
fc6ae3cf
TM
921 struct rpc_clnt *rpc;
922
67e55205 923 server = NFS_SB(sb);
fc6ae3cf
TM
924 /* -EIO all pending I/O */
925 rpc = server->client_acl;
926 if (!IS_ERR(rpc))
927 rpc_killall_tasks(rpc);
928 rpc = server->client;
929 if (!IS_ERR(rpc))
930 rpc_killall_tasks(rpc);
f7b422b1 931}
89d77c8f 932EXPORT_SYMBOL_GPL(nfs_umount_begin);
f7b422b1 933
db833351 934static struct nfs_parsed_mount_data *nfs_alloc_parsed_mount_data(void)
9423a08a
CL
935{
936 struct nfs_parsed_mount_data *data;
937
938 data = kzalloc(sizeof(*data), GFP_KERNEL);
939 if (data) {
a956beda
TM
940 data->timeo = NFS_UNSPEC_TIMEO;
941 data->retrans = NFS_UNSPEC_RETRANS;
9423a08a
CL
942 data->acregmin = NFS_DEF_ACREGMIN;
943 data->acregmax = NFS_DEF_ACREGMAX;
944 data->acdirmin = NFS_DEF_ACDIRMIN;
945 data->acdirmax = NFS_DEF_ACDIRMAX;
c5811dbd 946 data->mount_server.port = NFS_UNSPEC_PORT;
9423a08a 947 data->nfs_server.port = NFS_UNSPEC_PORT;
c5811dbd 948 data->nfs_server.protocol = XPRT_TRANSPORT_TCP;
a3f73c27 949 data->selected_flavor = RPC_AUTH_MAXFLAVOR;
9423a08a 950 data->minorversion = 0;
b72e4f42 951 data->need_mount = true;
9937347a 952 data->net = current->nsproxy->net_ns;
204cc0cc 953 data->lsm_opts = NULL;
9423a08a
CL
954 }
955 return data;
956}
957
8a0d551a
JL
958static void nfs_free_parsed_mount_data(struct nfs_parsed_mount_data *data)
959{
960 if (data) {
961 kfree(data->client_address);
962 kfree(data->mount_server.hostname);
963 kfree(data->nfs_server.export_path);
964 kfree(data->nfs_server.hostname);
965 kfree(data->fscache_uniq);
966 security_free_mnt_opts(&data->lsm_opts);
967 kfree(data);
968 }
969}
970
fc50d58f 971/*
cdcd7f9a
CL
972 * Sanity-check a server address provided by the mount command.
973 *
974 * Address family must be initialized, and address must not be
975 * the ANY address for that family.
fc50d58f
CL
976 */
977static int nfs_verify_server_address(struct sockaddr *addr)
978{
979 switch (addr->sa_family) {
980 case AF_INET: {
cdcd7f9a 981 struct sockaddr_in *sa = (struct sockaddr_in *)addr;
e6f1cebf 982 return sa->sin_addr.s_addr != htonl(INADDR_ANY);
cdcd7f9a
CL
983 }
984 case AF_INET6: {
985 struct in6_addr *sa = &((struct sockaddr_in6 *)addr)->sin6_addr;
986 return !ipv6_addr_any(sa);
fc50d58f
CL
987 }
988 }
989
53a0b9c4 990 dfprintk(MOUNT, "NFS: Invalid IP address specified\n");
fc50d58f
CL
991 return 0;
992}
993
4cfd74fc
CL
994/*
995 * Select between a default port value and a user-specified port value.
996 * If a zero value is set, then autobind will be used.
997 */
f5855fec 998static void nfs_set_port(struct sockaddr *sap, int *port,
4cfd74fc
CL
999 const unsigned short default_port)
1000{
f5855fec
TM
1001 if (*port == NFS_UNSPEC_PORT)
1002 *port = default_port;
4cfd74fc 1003
f5855fec 1004 rpc_set_port(sap, *port);
4cfd74fc
CL
1005}
1006
259875ef
TM
1007/*
1008 * Sanity check the NFS transport protocol.
1009 *
1010 */
1011static void nfs_validate_transport_protocol(struct nfs_parsed_mount_data *mnt)
1012{
1013 switch (mnt->nfs_server.protocol) {
1014 case XPRT_TRANSPORT_UDP:
1015 case XPRT_TRANSPORT_TCP:
1016 case XPRT_TRANSPORT_RDMA:
1017 break;
1018 default:
1019 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
1020 }
1021}
1022
1023/*
1024 * For text based NFSv2/v3 mounts, the mount protocol transport default
1025 * settings should depend upon the specified NFS transport.
1026 */
1027static void nfs_set_mount_transport_protocol(struct nfs_parsed_mount_data *mnt)
1028{
1029 nfs_validate_transport_protocol(mnt);
1030
1031 if (mnt->mount_server.protocol == XPRT_TRANSPORT_UDP ||
1032 mnt->mount_server.protocol == XPRT_TRANSPORT_TCP)
1033 return;
1034 switch (mnt->nfs_server.protocol) {
1035 case XPRT_TRANSPORT_UDP:
1036 mnt->mount_server.protocol = XPRT_TRANSPORT_UDP;
1037 break;
1038 case XPRT_TRANSPORT_TCP:
1039 case XPRT_TRANSPORT_RDMA:
1040 mnt->mount_server.protocol = XPRT_TRANSPORT_TCP;
1041 }
1042}
1043
4d4b69dd
WAA
1044/*
1045 * Add 'flavor' to 'auth_info' if not already present.
1046 * Returns true if 'flavor' ends up in the list, false otherwise
1047 */
1048static bool nfs_auth_info_add(struct nfs_auth_info *auth_info,
1049 rpc_authflavor_t flavor)
1050{
1051 unsigned int i;
00216026 1052 unsigned int max_flavor_len = ARRAY_SIZE(auth_info->flavors);
4d4b69dd
WAA
1053
1054 /* make sure this flavor isn't already in the list */
1055 for (i = 0; i < auth_info->flavor_len; i++) {
1056 if (flavor == auth_info->flavors[i])
1057 return true;
1058 }
1059
1060 if (auth_info->flavor_len + 1 >= max_flavor_len) {
1061 dfprintk(MOUNT, "NFS: too many sec= flavors\n");
1062 return false;
1063 }
1064
1065 auth_info->flavors[auth_info->flavor_len++] = flavor;
1066 return true;
1067}
1068
1069/*
1070 * Return true if 'match' is in auth_info or auth_info is empty.
1071 * Return false otherwise.
1072 */
1073bool nfs_auth_info_match(const struct nfs_auth_info *auth_info,
1074 rpc_authflavor_t match)
1075{
1076 int i;
1077
1078 if (!auth_info->flavor_len)
1079 return true;
1080
1081 for (i = 0; i < auth_info->flavor_len; i++) {
1082 if (auth_info->flavors[i] == match)
1083 return true;
1084 }
1085 return false;
1086}
1087EXPORT_SYMBOL_GPL(nfs_auth_info_match);
1088
01060c89
CL
1089/*
1090 * Parse the value of the 'sec=' option.
01060c89
CL
1091 */
1092static int nfs_parse_security_flavors(char *value,
1093 struct nfs_parsed_mount_data *mnt)
1094{
1095 substring_t args[MAX_OPT_ARGS];
19e7b8d2 1096 rpc_authflavor_t pseudoflavor;
4d4b69dd 1097 char *p;
01060c89
CL
1098
1099 dfprintk(MOUNT, "NFS: parsing sec=%s option\n", value);
1100
4d4b69dd
WAA
1101 while ((p = strsep(&value, ":")) != NULL) {
1102 switch (match_token(p, nfs_secflavor_tokens, args)) {
1103 case Opt_sec_none:
1104 pseudoflavor = RPC_AUTH_NULL;
1105 break;
1106 case Opt_sec_sys:
1107 pseudoflavor = RPC_AUTH_UNIX;
1108 break;
1109 case Opt_sec_krb5:
1110 pseudoflavor = RPC_AUTH_GSS_KRB5;
1111 break;
1112 case Opt_sec_krb5i:
1113 pseudoflavor = RPC_AUTH_GSS_KRB5I;
1114 break;
1115 case Opt_sec_krb5p:
1116 pseudoflavor = RPC_AUTH_GSS_KRB5P;
1117 break;
1118 case Opt_sec_lkey:
1119 pseudoflavor = RPC_AUTH_GSS_LKEY;
1120 break;
1121 case Opt_sec_lkeyi:
1122 pseudoflavor = RPC_AUTH_GSS_LKEYI;
1123 break;
1124 case Opt_sec_lkeyp:
1125 pseudoflavor = RPC_AUTH_GSS_LKEYP;
1126 break;
1127 case Opt_sec_spkm:
1128 pseudoflavor = RPC_AUTH_GSS_SPKM;
1129 break;
1130 case Opt_sec_spkmi:
1131 pseudoflavor = RPC_AUTH_GSS_SPKMI;
1132 break;
1133 case Opt_sec_spkmp:
1134 pseudoflavor = RPC_AUTH_GSS_SPKMP;
1135 break;
1136 default:
1137 dfprintk(MOUNT,
1138 "NFS: sec= option '%s' not recognized\n", p);
1139 return 0;
1140 }
1141
1142 if (!nfs_auth_info_add(&mnt->auth_info, pseudoflavor))
1143 return 0;
01060c89
CL
1144 }
1145
1146 return 1;
1147}
1148
0d71b058
TM
1149static int nfs_parse_version_string(char *string,
1150 struct nfs_parsed_mount_data *mnt,
1151 substring_t *args)
1152{
1153 mnt->flags &= ~NFS_MOUNT_VER3;
1154 switch (match_token(string, nfs_vers_tokens, args)) {
1155 case Opt_vers_2:
1156 mnt->version = 2;
1157 break;
1158 case Opt_vers_3:
1159 mnt->flags |= NFS_MOUNT_VER3;
1160 mnt->version = 3;
1161 break;
1162 case Opt_vers_4:
1163 /* Backward compatibility option. In future,
1164 * the mount program should always supply
1165 * a NFSv4 minor version number.
1166 */
1167 mnt->version = 4;
1168 break;
1169 case Opt_vers_4_0:
1170 mnt->version = 4;
1171 mnt->minorversion = 0;
1172 break;
1173 case Opt_vers_4_1:
1174 mnt->version = 4;
1175 mnt->minorversion = 1;
1176 break;
42c2c424
SD
1177 case Opt_vers_4_2:
1178 mnt->version = 4;
1179 mnt->minorversion = 2;
1180 break;
0d71b058
TM
1181 default:
1182 return 0;
1183 }
1184 return 1;
1185}
1186
c5cb09b6
RL
1187static int nfs_get_option_str(substring_t args[], char **option)
1188{
1189 kfree(*option);
1190 *option = match_strdup(args);
e25fbe38 1191 return !*option;
c5cb09b6
RL
1192}
1193
1194static int nfs_get_option_ul(substring_t args[], unsigned long *option)
1195{
1196 int rc;
1197 char *string;
1198
1199 string = match_strdup(args);
1200 if (string == NULL)
1201 return -ENOMEM;
7297cb68 1202 rc = kstrtoul(string, 10, option);
c5cb09b6
RL
1203 kfree(string);
1204
1205 return rc;
1206}
1207
a956beda
TM
1208static int nfs_get_option_ul_bound(substring_t args[], unsigned long *option,
1209 unsigned long l_bound, unsigned long u_bound)
1210{
1211 int ret;
1212
1213 ret = nfs_get_option_ul(args, option);
1214 if (ret != 0)
1215 return ret;
1216 if (*option < l_bound || *option > u_bound)
1217 return -ERANGE;
1218 return 0;
1219}
1220
bf0fd768
CL
1221/*
1222 * Error-check and convert a string of mount options from user space into
f45663ce
CL
1223 * a data structure. The whole mount string is processed; bad options are
1224 * skipped as they are encountered. If there were no errors, return 1;
1225 * otherwise return 0 (zero).
bf0fd768
CL
1226 */
1227static int nfs_parse_mount_options(char *raw,
1228 struct nfs_parsed_mount_data *mnt)
1229{
f5c0c26d 1230 char *p, *string;
d23c45fd 1231 int rc, sloppy = 0, invalid_option = 0;
ee671b01
JL
1232 unsigned short protofamily = AF_UNSPEC;
1233 unsigned short mountfamily = AF_UNSPEC;
bf0fd768
CL
1234
1235 if (!raw) {
1236 dfprintk(MOUNT, "NFS: mount options string was NULL.\n");
1237 return 1;
1238 }
1239 dfprintk(MOUNT, "NFS: nfs mount opts='%s'\n", raw);
1240
f5c0c26d 1241 rc = security_sb_eat_lsm_opts(raw, &mnt->lsm_opts);
f9c3a380
EP
1242 if (rc)
1243 goto out_security_failure;
1244
bf0fd768
CL
1245 while ((p = strsep(&raw, ",")) != NULL) {
1246 substring_t args[MAX_OPT_ARGS];
a5a16bae
CL
1247 unsigned long option;
1248 int token;
bf0fd768
CL
1249
1250 if (!*p)
1251 continue;
1252
1253 dfprintk(MOUNT, "NFS: parsing nfs mount option '%s'\n", p);
1254
1255 token = match_token(p, nfs_mount_option_tokens, args);
1256 switch (token) {
f45663ce
CL
1257
1258 /*
1259 * boolean options: foo/nofoo
1260 */
bf0fd768
CL
1261 case Opt_soft:
1262 mnt->flags |= NFS_MOUNT_SOFT;
91a575e1 1263 mnt->flags &= ~NFS_MOUNT_SOFTERR;
bf0fd768 1264 break;
91a575e1
TM
1265 case Opt_softerr:
1266 mnt->flags |= NFS_MOUNT_SOFTERR;
bf0fd768
CL
1267 mnt->flags &= ~NFS_MOUNT_SOFT;
1268 break;
91a575e1
TM
1269 case Opt_hard:
1270 mnt->flags &= ~(NFS_MOUNT_SOFT|NFS_MOUNT_SOFTERR);
1271 break;
bf0fd768
CL
1272 case Opt_posix:
1273 mnt->flags |= NFS_MOUNT_POSIX;
1274 break;
1275 case Opt_noposix:
1276 mnt->flags &= ~NFS_MOUNT_POSIX;
1277 break;
1278 case Opt_cto:
1279 mnt->flags &= ~NFS_MOUNT_NOCTO;
1280 break;
1281 case Opt_nocto:
1282 mnt->flags |= NFS_MOUNT_NOCTO;
1283 break;
1284 case Opt_ac:
1285 mnt->flags &= ~NFS_MOUNT_NOAC;
1286 break;
1287 case Opt_noac:
1288 mnt->flags |= NFS_MOUNT_NOAC;
1289 break;
1290 case Opt_lock:
1291 mnt->flags &= ~NFS_MOUNT_NONLM;
5eebde23
SJ
1292 mnt->flags &= ~(NFS_MOUNT_LOCAL_FLOCK |
1293 NFS_MOUNT_LOCAL_FCNTL);
bf0fd768
CL
1294 break;
1295 case Opt_nolock:
1296 mnt->flags |= NFS_MOUNT_NONLM;
5eebde23
SJ
1297 mnt->flags |= (NFS_MOUNT_LOCAL_FLOCK |
1298 NFS_MOUNT_LOCAL_FCNTL);
bf0fd768 1299 break;
bf0fd768
CL
1300 case Opt_udp:
1301 mnt->flags &= ~NFS_MOUNT_TCP;
0896a725 1302 mnt->nfs_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768
CL
1303 break;
1304 case Opt_tcp:
1305 mnt->flags |= NFS_MOUNT_TCP;
0896a725 1306 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1307 break;
2cf7ff7a
TT
1308 case Opt_rdma:
1309 mnt->flags |= NFS_MOUNT_TCP; /* for side protocols */
1310 mnt->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
a67d18f8 1311 xprt_load_transport(p);
2cf7ff7a 1312 break;
bf0fd768
CL
1313 case Opt_acl:
1314 mnt->flags &= ~NFS_MOUNT_NOACL;
1315 break;
1316 case Opt_noacl:
1317 mnt->flags |= NFS_MOUNT_NOACL;
1318 break;
1319 case Opt_rdirplus:
1320 mnt->flags &= ~NFS_MOUNT_NORDIRPLUS;
1321 break;
1322 case Opt_nordirplus:
1323 mnt->flags |= NFS_MOUNT_NORDIRPLUS;
1324 break;
75180df2
TM
1325 case Opt_sharecache:
1326 mnt->flags &= ~NFS_MOUNT_UNSHARED;
1327 break;
1328 case Opt_nosharecache:
1329 mnt->flags |= NFS_MOUNT_UNSHARED;
1330 break;
d740351b
CL
1331 case Opt_resvport:
1332 mnt->flags &= ~NFS_MOUNT_NORESVPORT;
1333 break;
1334 case Opt_noresvport:
1335 mnt->flags |= NFS_MOUNT_NORESVPORT;
1336 break;
b797cac7
DH
1337 case Opt_fscache:
1338 mnt->options |= NFS_OPTION_FSCACHE;
1339 kfree(mnt->fscache_uniq);
1340 mnt->fscache_uniq = NULL;
1341 break;
1342 case Opt_nofscache:
1343 mnt->options &= ~NFS_OPTION_FSCACHE;
1344 kfree(mnt->fscache_uniq);
1345 mnt->fscache_uniq = NULL;
1346 break;
89652617
CL
1347 case Opt_migration:
1348 mnt->options |= NFS_OPTION_MIGRATION;
1349 break;
1350 case Opt_nomigration:
f02fee22 1351 mnt->options &= ~NFS_OPTION_MIGRATION;
89652617 1352 break;
bf0fd768 1353
f45663ce
CL
1354 /*
1355 * options that take numeric values
1356 */
bf0fd768 1357 case Opt_port:
c5cb09b6
RL
1358 if (nfs_get_option_ul(args, &option) ||
1359 option > USHRT_MAX)
d23c45fd
CL
1360 goto out_invalid_value;
1361 mnt->nfs_server.port = option;
bf0fd768
CL
1362 break;
1363 case Opt_rsize:
c5cb09b6 1364 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1365 goto out_invalid_value;
1366 mnt->rsize = option;
bf0fd768
CL
1367 break;
1368 case Opt_wsize:
c5cb09b6 1369 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1370 goto out_invalid_value;
1371 mnt->wsize = option;
bf0fd768
CL
1372 break;
1373 case Opt_bsize:
c5cb09b6 1374 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1375 goto out_invalid_value;
1376 mnt->bsize = option;
bf0fd768
CL
1377 break;
1378 case Opt_timeo:
a956beda 1379 if (nfs_get_option_ul_bound(args, &option, 1, INT_MAX))
d23c45fd
CL
1380 goto out_invalid_value;
1381 mnt->timeo = option;
bf0fd768
CL
1382 break;
1383 case Opt_retrans:
a956beda 1384 if (nfs_get_option_ul_bound(args, &option, 0, INT_MAX))
d23c45fd
CL
1385 goto out_invalid_value;
1386 mnt->retrans = option;
bf0fd768
CL
1387 break;
1388 case Opt_acregmin:
c5cb09b6 1389 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1390 goto out_invalid_value;
1391 mnt->acregmin = option;
bf0fd768
CL
1392 break;
1393 case Opt_acregmax:
c5cb09b6 1394 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1395 goto out_invalid_value;
1396 mnt->acregmax = option;
bf0fd768
CL
1397 break;
1398 case Opt_acdirmin:
c5cb09b6 1399 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1400 goto out_invalid_value;
1401 mnt->acdirmin = option;
bf0fd768
CL
1402 break;
1403 case Opt_acdirmax:
c5cb09b6 1404 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1405 goto out_invalid_value;
1406 mnt->acdirmax = option;
bf0fd768
CL
1407 break;
1408 case Opt_actimeo:
c5cb09b6 1409 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1410 goto out_invalid_value;
1411 mnt->acregmin = mnt->acregmax =
1412 mnt->acdirmin = mnt->acdirmax = option;
bf0fd768
CL
1413 break;
1414 case Opt_namelen:
c5cb09b6 1415 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1416 goto out_invalid_value;
1417 mnt->namlen = option;
bf0fd768
CL
1418 break;
1419 case Opt_mountport:
c5cb09b6
RL
1420 if (nfs_get_option_ul(args, &option) ||
1421 option > USHRT_MAX)
d23c45fd
CL
1422 goto out_invalid_value;
1423 mnt->mount_server.port = option;
bf0fd768 1424 break;
bf0fd768 1425 case Opt_mountvers:
c5cb09b6 1426 if (nfs_get_option_ul(args, &option) ||
f45663ce 1427 option < NFS_MNT_VERSION ||
d23c45fd
CL
1428 option > NFS_MNT3_VERSION)
1429 goto out_invalid_value;
1430 mnt->mount_server.version = option;
bf0fd768 1431 break;
3fd5be9e 1432 case Opt_minorversion:
c5cb09b6 1433 if (nfs_get_option_ul(args, &option))
f3f4f4ed
CL
1434 goto out_invalid_value;
1435 if (option > NFS4_MAX_MINOR_VERSION)
1436 goto out_invalid_value;
1437 mnt->minorversion = option;
3fd5be9e 1438 break;
bf0fd768 1439
f45663ce
CL
1440 /*
1441 * options that take text values
1442 */
0d71b058
TM
1443 case Opt_nfsvers:
1444 string = match_strdup(args);
1445 if (string == NULL)
1446 goto out_nomem;
1447 rc = nfs_parse_version_string(string, mnt, args);
1448 kfree(string);
1449 if (!rc)
1450 goto out_invalid_value;
1451 break;
bf0fd768
CL
1452 case Opt_sec:
1453 string = match_strdup(args);
1454 if (string == NULL)
1455 goto out_nomem;
01060c89 1456 rc = nfs_parse_security_flavors(string, mnt);
bf0fd768 1457 kfree(string);
f45663ce 1458 if (!rc) {
f45663ce
CL
1459 dfprintk(MOUNT, "NFS: unrecognized "
1460 "security flavor\n");
d23c45fd 1461 return 0;
f45663ce 1462 }
bf0fd768
CL
1463 break;
1464 case Opt_proto:
1465 string = match_strdup(args);
1466 if (string == NULL)
1467 goto out_nomem;
1468 token = match_token(string,
1469 nfs_xprt_protocol_tokens, args);
bf0fd768 1470
ee671b01 1471 protofamily = AF_INET;
bf0fd768 1472 switch (token) {
ee671b01
JL
1473 case Opt_xprt_udp6:
1474 protofamily = AF_INET6;
fd53dde8 1475 /* fall through */
fdb66ff4 1476 case Opt_xprt_udp:
bf0fd768 1477 mnt->flags &= ~NFS_MOUNT_TCP;
0896a725 1478 mnt->nfs_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768 1479 break;
ee671b01
JL
1480 case Opt_xprt_tcp6:
1481 protofamily = AF_INET6;
fd53dde8 1482 /* fall through */
fdb66ff4 1483 case Opt_xprt_tcp:
bf0fd768 1484 mnt->flags |= NFS_MOUNT_TCP;
0896a725 1485 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1486 break;
181342c5
SM
1487 case Opt_xprt_rdma6:
1488 protofamily = AF_INET6;
fd53dde8 1489 /* fall through */
2cf7ff7a
TT
1490 case Opt_xprt_rdma:
1491 /* vector side protocols to TCP */
1492 mnt->flags |= NFS_MOUNT_TCP;
1493 mnt->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
a67d18f8 1494 xprt_load_transport(string);
2cf7ff7a 1495 break;
bf0fd768 1496 default:
f45663ce
CL
1497 dfprintk(MOUNT, "NFS: unrecognized "
1498 "transport protocol\n");
4223a4a1 1499 kfree(string);
d23c45fd 1500 return 0;
bf0fd768 1501 }
c5cb09b6 1502 kfree(string);
bf0fd768
CL
1503 break;
1504 case Opt_mountproto:
1505 string = match_strdup(args);
1506 if (string == NULL)
1507 goto out_nomem;
1508 token = match_token(string,
1509 nfs_xprt_protocol_tokens, args);
d508afb4 1510 kfree(string);
bf0fd768 1511
ee671b01 1512 mountfamily = AF_INET;
bf0fd768 1513 switch (token) {
ee671b01
JL
1514 case Opt_xprt_udp6:
1515 mountfamily = AF_INET6;
fd53dde8 1516 /* fall through */
fdb66ff4 1517 case Opt_xprt_udp:
0896a725 1518 mnt->mount_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768 1519 break;
ee671b01
JL
1520 case Opt_xprt_tcp6:
1521 mountfamily = AF_INET6;
fd53dde8 1522 /* fall through */
fdb66ff4 1523 case Opt_xprt_tcp:
0896a725 1524 mnt->mount_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1525 break;
2cf7ff7a 1526 case Opt_xprt_rdma: /* not used for side protocols */
bf0fd768 1527 default:
f45663ce
CL
1528 dfprintk(MOUNT, "NFS: unrecognized "
1529 "transport protocol\n");
d23c45fd 1530 return 0;
bf0fd768
CL
1531 }
1532 break;
1533 case Opt_addr:
1534 string = match_strdup(args);
1535 if (string == NULL)
1536 goto out_nomem;
53a0b9c4 1537 mnt->nfs_server.addrlen =
b48e1278 1538 rpc_pton(mnt->net, string, strlen(string),
53a0b9c4
CL
1539 (struct sockaddr *)
1540 &mnt->nfs_server.address,
1541 sizeof(mnt->nfs_server.address));
bf0fd768 1542 kfree(string);
53a0b9c4
CL
1543 if (mnt->nfs_server.addrlen == 0)
1544 goto out_invalid_address;
bf0fd768
CL
1545 break;
1546 case Opt_clientaddr:
c5cb09b6 1547 if (nfs_get_option_str(args, &mnt->client_address))
bf0fd768 1548 goto out_nomem;
bf0fd768 1549 break;
33832034 1550 case Opt_mounthost:
c5cb09b6
RL
1551 if (nfs_get_option_str(args,
1552 &mnt->mount_server.hostname))
33832034 1553 goto out_nomem;
33832034 1554 break;
0ac83779 1555 case Opt_mountaddr:
bf0fd768
CL
1556 string = match_strdup(args);
1557 if (string == NULL)
1558 goto out_nomem;
53a0b9c4 1559 mnt->mount_server.addrlen =
b48e1278 1560 rpc_pton(mnt->net, string, strlen(string),
53a0b9c4
CL
1561 (struct sockaddr *)
1562 &mnt->mount_server.address,
1563 sizeof(mnt->mount_server.address));
bf0fd768 1564 kfree(string);
53a0b9c4
CL
1565 if (mnt->mount_server.addrlen == 0)
1566 goto out_invalid_address;
bf0fd768 1567 break;
28cc5cd8
TM
1568 case Opt_nconnect:
1569 if (nfs_get_option_ul_bound(args, &option, 1, NFS_MAX_CONNECTIONS))
1570 goto out_invalid_value;
1571 mnt->nfs_server.nconnect = option;
1572 break;
7973c1f1
TM
1573 case Opt_lookupcache:
1574 string = match_strdup(args);
1575 if (string == NULL)
1576 goto out_nomem;
1577 token = match_token(string,
1578 nfs_lookupcache_tokens, args);
1579 kfree(string);
1580 switch (token) {
1581 case Opt_lookupcache_all:
1582 mnt->flags &= ~(NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE);
1583 break;
1584 case Opt_lookupcache_positive:
1585 mnt->flags &= ~NFS_MOUNT_LOOKUP_CACHE_NONE;
1586 mnt->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG;
1587 break;
1588 case Opt_lookupcache_none:
1589 mnt->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE;
1590 break;
1591 default:
7973c1f1
TM
1592 dfprintk(MOUNT, "NFS: invalid "
1593 "lookupcache argument\n");
d23c45fd 1594 return 0;
7973c1f1
TM
1595 };
1596 break;
a6d5ff64 1597 case Opt_fscache_uniq:
c5cb09b6 1598 if (nfs_get_option_str(args, &mnt->fscache_uniq))
a6d5ff64 1599 goto out_nomem;
a6d5ff64
CL
1600 mnt->options |= NFS_OPTION_FSCACHE;
1601 break;
5eebde23
SJ
1602 case Opt_local_lock:
1603 string = match_strdup(args);
1604 if (string == NULL)
1605 goto out_nomem;
1606 token = match_token(string, nfs_local_lock_tokens,
1607 args);
1608 kfree(string);
1609 switch (token) {
1610 case Opt_local_lock_all:
1611 mnt->flags |= (NFS_MOUNT_LOCAL_FLOCK |
1612 NFS_MOUNT_LOCAL_FCNTL);
1613 break;
1614 case Opt_local_lock_flock:
1615 mnt->flags |= NFS_MOUNT_LOCAL_FLOCK;
1616 break;
1617 case Opt_local_lock_posix:
1618 mnt->flags |= NFS_MOUNT_LOCAL_FCNTL;
1619 break;
1620 case Opt_local_lock_none:
1621 mnt->flags &= ~(NFS_MOUNT_LOCAL_FLOCK |
1622 NFS_MOUNT_LOCAL_FCNTL);
1623 break;
1624 default:
1625 dfprintk(MOUNT, "NFS: invalid "
1626 "local_lock argument\n");
1627 return 0;
1628 };
1629 break;
bf0fd768 1630
f45663ce
CL
1631 /*
1632 * Special options
1633 */
1634 case Opt_sloppy:
1635 sloppy = 1;
1636 dfprintk(MOUNT, "NFS: relaxing parsing rules\n");
1637 break;
bf0fd768
CL
1638 case Opt_userspace:
1639 case Opt_deprecated:
d33e4dfe
CL
1640 dfprintk(MOUNT, "NFS: ignoring mount option "
1641 "'%s'\n", p);
bf0fd768
CL
1642 break;
1643
1644 default:
d23c45fd 1645 invalid_option = 1;
f45663ce
CL
1646 dfprintk(MOUNT, "NFS: unrecognized mount option "
1647 "'%s'\n", p);
bf0fd768
CL
1648 }
1649 }
1650
d23c45fd
CL
1651 if (!sloppy && invalid_option)
1652 return 0;
1653
571b7554
WAA
1654 if (mnt->minorversion && mnt->version != 4)
1655 goto out_minorversion_mismatch;
1656
89652617 1657 if (mnt->options & NFS_OPTION_MIGRATION &&
9e08ef1a 1658 (mnt->version != 4 || mnt->minorversion != 0))
89652617
CL
1659 goto out_migration_misuse;
1660
ee671b01
JL
1661 /*
1662 * verify that any proto=/mountproto= options match the address
1856b225 1663 * families in the addr=/mountaddr= options.
ee671b01
JL
1664 */
1665 if (protofamily != AF_UNSPEC &&
1666 protofamily != mnt->nfs_server.address.ss_family)
1667 goto out_proto_mismatch;
1668
1669 if (mountfamily != AF_UNSPEC) {
1670 if (mnt->mount_server.addrlen) {
1671 if (mountfamily != mnt->mount_server.address.ss_family)
1672 goto out_mountproto_mismatch;
1673 } else {
1674 if (mountfamily != mnt->nfs_server.address.ss_family)
1675 goto out_mountproto_mismatch;
1676 }
1677 }
1678
bf0fd768
CL
1679 return 1;
1680
ee671b01
JL
1681out_mountproto_mismatch:
1682 printk(KERN_INFO "NFS: mount server address does not match mountproto= "
1683 "option\n");
1684 return 0;
1685out_proto_mismatch:
1686 printk(KERN_INFO "NFS: server address does not match proto= option\n");
1687 return 0;
53a0b9c4
CL
1688out_invalid_address:
1689 printk(KERN_INFO "NFS: bad IP address specified: %s\n", p);
1690 return 0;
d23c45fd 1691out_invalid_value:
53a0b9c4 1692 printk(KERN_INFO "NFS: bad mount option value specified: %s\n", p);
d23c45fd 1693 return 0;
571b7554
WAA
1694out_minorversion_mismatch:
1695 printk(KERN_INFO "NFS: mount option vers=%u does not support "
1696 "minorversion=%u\n", mnt->version, mnt->minorversion);
1697 return 0;
89652617
CL
1698out_migration_misuse:
1699 printk(KERN_INFO
1700 "NFS: 'migration' not supported for this NFS version\n");
1701 return 0;
bf0fd768
CL
1702out_nomem:
1703 printk(KERN_INFO "NFS: not enough memory to parse option\n");
1704 return 0;
f9c3a380 1705out_security_failure:
f9c3a380
EP
1706 printk(KERN_INFO "NFS: security options invalid: %d\n", rc);
1707 return 0;
bf0fd768
CL
1708}
1709
ec88f28d 1710/*
4d4b69dd
WAA
1711 * Ensure that a specified authtype in args->auth_info is supported by
1712 * the server. Returns 0 and sets args->selected_flavor if it's ok, and
1713 * -EACCES if not.
ec88f28d 1714 */
4d4b69dd 1715static int nfs_verify_authflavors(struct nfs_parsed_mount_data *args,
9111c95b 1716 rpc_authflavor_t *server_authlist, unsigned int count)
ec88f28d 1717{
4d4b69dd 1718 rpc_authflavor_t flavor = RPC_AUTH_MAXFLAVOR;
53a75f22 1719 bool found_auth_null = false;
9111c95b 1720 unsigned int i;
4580a92d 1721
d497ab97
WAA
1722 /*
1723 * If the sec= mount option is used, the specified flavor or AUTH_NULL
1724 * must be in the list returned by the server.
1725 *
1726 * AUTH_NULL has a special meaning when it's in the server list - it
1727 * means that the server will ignore the rpc creds, so any flavor
e68fd7c8 1728 * can be used but still use the sec= that was specified.
53a75f22
CL
1729 *
1730 * Note also that the MNT procedure in MNTv1 does not return a list
1731 * of supported security flavors. In this case, nfs_mount() fabricates
1732 * a security flavor list containing just AUTH_NULL.
d497ab97 1733 */
4580a92d 1734 for (i = 0; i < count; i++) {
4d4b69dd
WAA
1735 flavor = server_authlist[i];
1736
e68fd7c8 1737 if (nfs_auth_info_match(&args->auth_info, flavor))
9111c95b 1738 goto out;
e68fd7c8
SD
1739
1740 if (flavor == RPC_AUTH_NULL)
53a75f22 1741 found_auth_null = true;
e68fd7c8
SD
1742 }
1743
53a75f22
CL
1744 if (found_auth_null) {
1745 flavor = args->auth_info.flavors[0];
e68fd7c8 1746 goto out;
4580a92d 1747 }
ec88f28d 1748
4d4b69dd
WAA
1749 dfprintk(MOUNT,
1750 "NFS: specified auth flavors not supported by server\n");
9111c95b 1751 return -EACCES;
d497ab97 1752
4580a92d 1753out:
4d4b69dd 1754 args->selected_flavor = flavor;
a3f73c27 1755 dfprintk(MOUNT, "NFS: using auth flavor %u\n", args->selected_flavor);
d497ab97 1756 return 0;
ec88f28d
CL
1757}
1758
0076d7b7
CL
1759/*
1760 * Use the remote server's MOUNT service to request the NFS file handle
1761 * corresponding to the provided path.
1762 */
486aa699 1763static int nfs_request_mount(struct nfs_parsed_mount_data *args,
294ae81d
JL
1764 struct nfs_fh *root_fh,
1765 rpc_authflavor_t *server_authlist,
1766 unsigned int *server_authlist_len)
0076d7b7 1767{
c5d120f8
CL
1768 struct nfs_mount_request request = {
1769 .sap = (struct sockaddr *)
1770 &args->mount_server.address,
1771 .dirpath = args->nfs_server.export_path,
1772 .protocol = args->mount_server.protocol,
1773 .fh = root_fh,
50a737f8 1774 .noresvport = args->flags & NFS_MOUNT_NORESVPORT,
294ae81d 1775 .auth_flav_len = server_authlist_len,
ec88f28d 1776 .auth_flavs = server_authlist,
6d59b8d5 1777 .net = args->net,
c5d120f8 1778 };
4c568017 1779 int status;
0076d7b7
CL
1780
1781 if (args->mount_server.version == 0) {
8a6e5deb
TM
1782 switch (args->version) {
1783 default:
1784 args->mount_server.version = NFS_MNT3_VERSION;
1785 break;
1786 case 2:
1787 args->mount_server.version = NFS_MNT_VERSION;
1788 }
0076d7b7 1789 }
c5d120f8 1790 request.version = args->mount_server.version;
0076d7b7 1791
33832034 1792 if (args->mount_server.hostname)
c5d120f8 1793 request.hostname = args->mount_server.hostname;
33832034 1794 else
c5d120f8 1795 request.hostname = args->nfs_server.hostname;
33832034 1796
0076d7b7
CL
1797 /*
1798 * Construct the mount server's address.
1799 */
4c568017 1800 if (args->mount_server.address.ss_family == AF_UNSPEC) {
c5d120f8 1801 memcpy(request.sap, &args->nfs_server.address,
4c568017
CL
1802 args->nfs_server.addrlen);
1803 args->mount_server.addrlen = args->nfs_server.addrlen;
1804 }
c5d120f8 1805 request.salen = args->mount_server.addrlen;
f5855fec 1806 nfs_set_port(request.sap, &args->mount_server.port, 0);
0076d7b7
CL
1807
1808 /*
1809 * Now ask the mount server to map our export path
1810 * to a file handle.
1811 */
c5d120f8 1812 status = nfs_mount(&request);
ec88f28d
CL
1813 if (status != 0) {
1814 dfprintk(MOUNT, "NFS: unable to mount server %s, error %d\n",
1815 request.hostname, status);
1816 return status;
1817 }
0076d7b7 1818
9111c95b 1819 return 0;
0076d7b7
CL
1820}
1821
d17540c6
JL
1822static struct nfs_server *nfs_try_mount_request(struct nfs_mount_info *mount_info,
1823 struct nfs_subversion *nfs_mod)
1824{
1825 int status;
9111c95b
JL
1826 unsigned int i;
1827 bool tried_auth_unix = false;
1828 bool auth_null_in_list = false;
1829 struct nfs_server *server = ERR_PTR(-EACCES);
294ae81d
JL
1830 struct nfs_parsed_mount_data *args = mount_info->parsed;
1831 rpc_authflavor_t authlist[NFS_MAX_SECFLAVORS];
1832 unsigned int authlist_len = ARRAY_SIZE(authlist);
d17540c6 1833
294ae81d
JL
1834 status = nfs_request_mount(args, mount_info->mntfh, authlist,
1835 &authlist_len);
d17540c6
JL
1836 if (status)
1837 return ERR_PTR(status);
1838
9111c95b
JL
1839 /*
1840 * Was a sec= authflavor specified in the options? First, verify
1841 * whether the server supports it, and then just try to use it if so.
1842 */
a3f73c27 1843 if (args->auth_info.flavor_len > 0) {
4d4b69dd 1844 status = nfs_verify_authflavors(args, authlist, authlist_len);
a3f73c27
WAA
1845 dfprintk(MOUNT, "NFS: using auth flavor %u\n",
1846 args->selected_flavor);
9111c95b
JL
1847 if (status)
1848 return ERR_PTR(status);
1849 return nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1850 }
1851
1852 /*
1853 * No sec= option was provided. RFC 2623, section 2.7 suggests we
1854 * SHOULD prefer the flavor listed first. However, some servers list
1855 * AUTH_NULL first. Avoid ever choosing AUTH_NULL.
1856 */
1857 for (i = 0; i < authlist_len; ++i) {
1858 rpc_authflavor_t flavor;
1859 struct rpcsec_gss_info info;
1860
1861 flavor = authlist[i];
1862 switch (flavor) {
1863 case RPC_AUTH_UNIX:
1864 tried_auth_unix = true;
1865 break;
1866 case RPC_AUTH_NULL:
1867 auth_null_in_list = true;
1868 continue;
1869 default:
1870 if (rpcauth_get_gssinfo(flavor, &info) != 0)
1871 continue;
1872 /* Fallthrough */
1873 }
1874 dfprintk(MOUNT, "NFS: attempting to use auth flavor %u\n", flavor);
a3f73c27 1875 args->selected_flavor = flavor;
9111c95b
JL
1876 server = nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1877 if (!IS_ERR(server))
1878 return server;
1879 }
1880
1881 /*
1882 * Nothing we tried so far worked. At this point, give up if we've
1883 * already tried AUTH_UNIX or if the server's list doesn't contain
1884 * AUTH_NULL
1885 */
1886 if (tried_auth_unix || !auth_null_in_list)
1887 return server;
1888
1889 /* Last chance! Try AUTH_UNIX */
1890 dfprintk(MOUNT, "NFS: attempting to use auth flavor %u\n", RPC_AUTH_UNIX);
a3f73c27 1891 args->selected_flavor = RPC_AUTH_UNIX;
d17540c6
JL
1892 return nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1893}
1894
ff9099f2
BS
1895struct dentry *nfs_try_mount(int flags, const char *dev_name,
1896 struct nfs_mount_info *mount_info,
1897 struct nfs_subversion *nfs_mod)
486aa699 1898{
486aa699
BS
1899 struct nfs_server *server;
1900
d17540c6
JL
1901 if (mount_info->parsed->need_mount)
1902 server = nfs_try_mount_request(mount_info, nfs_mod);
1903 else
1904 server = nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
486aa699 1905
486aa699
BS
1906 if (IS_ERR(server))
1907 return ERR_CAST(server);
1908
ab7017a3 1909 return nfs_fs_mount_common(server, flags, dev_name, mount_info, nfs_mod);
486aa699 1910}
ddda8e0a 1911EXPORT_SYMBOL_GPL(nfs_try_mount);
486aa699 1912
c12bacec
RL
1913/*
1914 * Split "dev_name" into "hostname:export_path".
1915 *
1916 * The leftmost colon demarks the split between the server's hostname
1917 * and the export path. If the hostname starts with a left square
1918 * bracket, then it may contain colons.
1919 *
1920 * Note: caller frees hostname and export path, even on error.
1921 */
1922static int nfs_parse_devname(const char *dev_name,
1923 char **hostname, size_t maxnamlen,
1924 char **export_path, size_t maxpathlen)
dc045898
CL
1925{
1926 size_t len;
c12bacec 1927 char *end;
dc045898 1928
80ff0017
YL
1929 if (unlikely(!dev_name || !*dev_name)) {
1930 dfprintk(MOUNT, "NFS: device name not specified\n");
1931 return -EINVAL;
1932 }
1933
c12bacec
RL
1934 /* Is the host name protected with square brakcets? */
1935 if (*dev_name == '[') {
1936 end = strchr(++dev_name, ']');
1937 if (end == NULL || end[1] != ':')
dc045898 1938 goto out_bad_devname;
dc045898 1939
c12bacec
RL
1940 len = end - dev_name;
1941 end++;
1942 } else {
1943 char *comma;
dc045898 1944
c12bacec
RL
1945 end = strchr(dev_name, ':');
1946 if (end == NULL)
1947 goto out_bad_devname;
1948 len = end - dev_name;
d1aa0825 1949
c12bacec
RL
1950 /* kill possible hostname list: not supported */
1951 comma = strchr(dev_name, ',');
1952 if (comma != NULL && comma < end)
40cc394b 1953 len = comma - dev_name;
c12bacec 1954 }
d1aa0825 1955
d1aa0825
CL
1956 if (len > maxnamlen)
1957 goto out_hostname;
1958
1959 /* N.B. caller will free nfs_server.hostname in all cases */
c12bacec 1960 *hostname = kstrndup(dev_name, len, GFP_KERNEL);
d1aa0825
CL
1961 if (*hostname == NULL)
1962 goto out_nomem;
c12bacec 1963 len = strlen(++end);
d1aa0825
CL
1964 if (len > maxpathlen)
1965 goto out_path;
1966 *export_path = kstrndup(end, len, GFP_KERNEL);
1967 if (!*export_path)
1968 goto out_nomem;
1969
c12bacec 1970 dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", *export_path);
d1aa0825
CL
1971 return 0;
1972
1973out_bad_devname:
1974 dfprintk(MOUNT, "NFS: device name not in host:path format\n");
1975 return -EINVAL;
1976
1977out_nomem:
1978 dfprintk(MOUNT, "NFS: not enough memory to parse device name\n");
1979 return -ENOMEM;
1980
1981out_hostname:
1982 dfprintk(MOUNT, "NFS: server hostname too long\n");
1983 return -ENAMETOOLONG;
1984
1985out_path:
1986 dfprintk(MOUNT, "NFS: export pathname too long\n");
1987 return -ENAMETOOLONG;
1988}
1989
f7b422b1 1990/*
54ceac45
DH
1991 * Validate the NFS2/NFS3 mount data
1992 * - fills in the mount root filehandle
136d558c
CL
1993 *
1994 * For option strings, user space handles the following behaviors:
1995 *
1996 * + DNS: mapping server host name to IP address ("addr=" option)
1997 *
1998 * + failure mode: how to behave if a mount request can't be handled
1999 * immediately ("fg/bg" option)
2000 *
2001 * + retry: how often to retry a mount request ("retry=" option)
2002 *
2003 * + breaking back: trying proto=udp after proto=tcp, v2 after v3,
2004 * mountproto=tcp after mountproto=udp, and so on
f7b422b1 2005 */
d72c727c
BS
2006static int nfs23_validate_mount_data(void *options,
2007 struct nfs_parsed_mount_data *args,
2008 struct nfs_fh *mntfh,
2009 const char *dev_name)
f7b422b1 2010{
2283f8d6 2011 struct nfs_mount_data *data = (struct nfs_mount_data *)options;
4cfd74fc 2012 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
74c98811 2013 int extra_flags = NFS_MOUNT_LEGACY_INTERFACE;
136d558c 2014
5df36e78
CL
2015 if (data == NULL)
2016 goto out_no_data;
f7b422b1 2017
c5afc8da 2018 args->version = NFS_DEFAULT_VERSION;
54ceac45 2019 switch (data->version) {
5df36e78 2020 case 1:
fd53dde8 2021 data->namlen = 0; /* fall through */
5df36e78 2022 case 2:
fd53dde8 2023 data->bsize = 0; /* fall through */
5df36e78
CL
2024 case 3:
2025 if (data->flags & NFS_MOUNT_VER3)
2026 goto out_no_v3;
2027 data->root.size = NFS2_FHSIZE;
2028 memcpy(data->root.data, data->old_root.data, NFS2_FHSIZE);
74c98811
TM
2029 /* Turn off security negotiation */
2030 extra_flags |= NFS_MOUNT_SECFLAVOUR;
fd53dde8 2031 /* fall through */
5df36e78
CL
2032 case 4:
2033 if (data->flags & NFS_MOUNT_SECFLAVOUR)
2034 goto out_no_sec;
fd53dde8 2035 /* fall through */
5df36e78
CL
2036 case 5:
2037 memset(data->context, 0, sizeof(data->context));
fd53dde8 2038 /* fall through */
5df36e78 2039 case 6:
b7e24457
TM
2040 if (data->flags & NFS_MOUNT_VER3) {
2041 if (data->root.size > NFS3_FHSIZE || data->root.size == 0)
2042 goto out_invalid_fh;
5df36e78 2043 mntfh->size = data->root.size;
764302cc
CL
2044 args->version = 3;
2045 } else {
5df36e78 2046 mntfh->size = NFS2_FHSIZE;
764302cc
CL
2047 args->version = 2;
2048 }
5df36e78 2049
5df36e78
CL
2050
2051 memcpy(mntfh->data, data->root.data, mntfh->size);
2052 if (mntfh->size < sizeof(mntfh->data))
2053 memset(mntfh->data + mntfh->size, 0,
2054 sizeof(mntfh->data) - mntfh->size);
6e88e061 2055
2283f8d6
TT
2056 /*
2057 * Translate to nfs_parsed_mount_data, which nfs_fill_super
2058 * can deal with.
2059 */
ff3525a5 2060 args->flags = data->flags & NFS_MOUNT_FLAGMASK;
74c98811 2061 args->flags |= extra_flags;
2283f8d6
TT
2062 args->rsize = data->rsize;
2063 args->wsize = data->wsize;
2283f8d6
TT
2064 args->timeo = data->timeo;
2065 args->retrans = data->retrans;
2066 args->acregmin = data->acregmin;
2067 args->acregmax = data->acregmax;
2068 args->acdirmin = data->acdirmin;
2069 args->acdirmax = data->acdirmax;
b72e4f42 2070 args->need_mount = false;
4c568017 2071
4cfd74fc 2072 memcpy(sap, &data->addr, sizeof(data->addr));
4c568017 2073 args->nfs_server.addrlen = sizeof(data->addr);
872ece86 2074 args->nfs_server.port = ntohs(data->addr.sin_port);
7c2bd9a3
TH
2075 if (sap->sa_family != AF_INET ||
2076 !nfs_verify_server_address(sap))
4c568017
CL
2077 goto out_no_address;
2078
2283f8d6 2079 if (!(data->flags & NFS_MOUNT_TCP))
0896a725 2080 args->nfs_server.protocol = XPRT_TRANSPORT_UDP;
2283f8d6
TT
2081 /* N.B. caller will free nfs_server.hostname in all cases */
2082 args->nfs_server.hostname = kstrdup(data->hostname, GFP_KERNEL);
2083 args->namlen = data->namlen;
2084 args->bsize = data->bsize;
dd07c947
CL
2085
2086 if (data->flags & NFS_MOUNT_SECFLAVOUR)
a3f73c27 2087 args->selected_flavor = data->pseudoflavor;
74c98811 2088 else
a3f73c27 2089 args->selected_flavor = RPC_AUTH_UNIX;
63649bd7
CG
2090 if (!args->nfs_server.hostname)
2091 goto out_nomem;
f9c3a380 2092
5eebde23
SJ
2093 if (!(data->flags & NFS_MOUNT_NONLM))
2094 args->flags &= ~(NFS_MOUNT_LOCAL_FLOCK|
2095 NFS_MOUNT_LOCAL_FCNTL);
2096 else
2097 args->flags |= (NFS_MOUNT_LOCAL_FLOCK|
2098 NFS_MOUNT_LOCAL_FCNTL);
f9c3a380
EP
2099 /*
2100 * The legacy version 6 binary mount data from userspace has a
2101 * field used only to transport selinux information into the
2102 * the kernel. To continue to support that functionality we
2103 * have a touch of selinux knowledge here in the NFS code. The
2104 * userspace code converted context=blah to just blah so we are
2105 * converting back to the full string selinux understands.
2106 */
2107 if (data->context[0]){
2108#ifdef CONFIG_SECURITY_SELINUX
2109 int rc;
f9c3a380 2110 data->context[NFS_MAX_CONTEXT_LEN] = '\0';
757cbe59
AV
2111 rc = security_add_mnt_opt("context", data->context,
2112 strlen(data->context), &args->lsm_opts);
f9c3a380
EP
2113 if (rc)
2114 return rc;
2115#else
2116 return -EINVAL;
2117#endif
2118 }
2119
5df36e78 2120 break;
b72e4f42
BS
2121 default:
2122 return NFS_TEXT_DATA;
f7b422b1 2123 }
54ceac45 2124
5df36e78 2125 return 0;
f7b422b1 2126
5df36e78
CL
2127out_no_data:
2128 dfprintk(MOUNT, "NFS: mount program didn't pass any mount data\n");
2129 return -EINVAL;
54ceac45 2130
5df36e78
CL
2131out_no_v3:
2132 dfprintk(MOUNT, "NFS: nfs_mount_data version %d does not support v3\n",
2133 data->version);
2134 return -EINVAL;
f7b422b1 2135
5df36e78
CL
2136out_no_sec:
2137 dfprintk(MOUNT, "NFS: nfs_mount_data version supports only AUTH_SYS\n");
2138 return -EINVAL;
2139
63649bd7
CG
2140out_nomem:
2141 dfprintk(MOUNT, "NFS: not enough memory to handle mount options\n");
2142 return -ENOMEM;
2143
5df36e78
CL
2144out_no_address:
2145 dfprintk(MOUNT, "NFS: mount program didn't pass remote address\n");
2146 return -EINVAL;
2147
2148out_invalid_fh:
2149 dfprintk(MOUNT, "NFS: invalid root filehandle\n");
2150 return -EINVAL;
f7b422b1
DH
2151}
2152
89d77c8f 2153#if IS_ENABLED(CONFIG_NFS_V4)
d72c727c
BS
2154static int nfs_validate_mount_data(struct file_system_type *fs_type,
2155 void *options,
2156 struct nfs_parsed_mount_data *args,
2157 struct nfs_fh *mntfh,
2158 const char *dev_name)
2159{
2160 if (fs_type == &nfs_fs_type)
2161 return nfs23_validate_mount_data(options, args, mntfh, dev_name);
2162 return nfs4_validate_mount_data(options, args, dev_name);
2163}
2164#else
2165static int nfs_validate_mount_data(struct file_system_type *fs_type,
2166 void *options,
2167 struct nfs_parsed_mount_data *args,
2168 struct nfs_fh *mntfh,
2169 const char *dev_name)
2170{
2171 return nfs23_validate_mount_data(options, args, mntfh, dev_name);
2172}
2173#endif
2174
b72e4f42
BS
2175static int nfs_validate_text_mount_data(void *options,
2176 struct nfs_parsed_mount_data *args,
2177 const char *dev_name)
2178{
2179 int port = 0;
2180 int max_namelen = PAGE_SIZE;
2181 int max_pathlen = NFS_MAXPATHLEN;
2182 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
2183
2184 if (nfs_parse_mount_options((char *)options, args) == 0)
2185 return -EINVAL;
2186
2187 if (!nfs_verify_server_address(sap))
2188 goto out_no_address;
2189
2190 if (args->version == 4) {
89d77c8f 2191#if IS_ENABLED(CONFIG_NFS_V4)
0dfbb5f0
CL
2192 if (args->nfs_server.protocol == XPRT_TRANSPORT_RDMA)
2193 port = NFS_RDMA_PORT;
2194 else
2195 port = NFS_PORT;
b72e4f42
BS
2196 max_namelen = NFS4_MAXNAMLEN;
2197 max_pathlen = NFS4_MAXPATHLEN;
2198 nfs_validate_transport_protocol(args);
6da1a034
TM
2199 if (args->nfs_server.protocol == XPRT_TRANSPORT_UDP)
2200 goto out_invalid_transport_udp;
b72e4f42
BS
2201 nfs4_validate_mount_flags(args);
2202#else
2203 goto out_v4_not_compiled;
2204#endif /* CONFIG_NFS_V4 */
0dfbb5f0 2205 } else {
b72e4f42 2206 nfs_set_mount_transport_protocol(args);
0dfbb5f0
CL
2207 if (args->nfs_server.protocol == XPRT_TRANSPORT_RDMA)
2208 port = NFS_RDMA_PORT;
2209 }
b72e4f42
BS
2210
2211 nfs_set_port(sap, &args->nfs_server.port, port);
2212
b72e4f42
BS
2213 return nfs_parse_devname(dev_name,
2214 &args->nfs_server.hostname,
2215 max_namelen,
2216 &args->nfs_server.export_path,
2217 max_pathlen);
2218
89d77c8f 2219#if !IS_ENABLED(CONFIG_NFS_V4)
b72e4f42
BS
2220out_v4_not_compiled:
2221 dfprintk(MOUNT, "NFS: NFSv4 is not compiled into kernel\n");
2222 return -EPROTONOSUPPORT;
6da1a034
TM
2223#else
2224out_invalid_transport_udp:
2225 dfprintk(MOUNT, "NFSv4: Unsupported transport protocol udp\n");
2226 return -EINVAL;
b72e4f42
BS
2227#endif /* !CONFIG_NFS_V4 */
2228
2229out_no_address:
2230 dfprintk(MOUNT, "NFS: mount program didn't pass remote address\n");
2231 return -EINVAL;
b72e4f42
BS
2232}
2233
71a6ec8a 2234#define NFS_REMOUNT_CMP_FLAGMASK ~(NFS_MOUNT_INTR \
c8e47028
SM
2235 | NFS_MOUNT_SECURE \
2236 | NFS_MOUNT_TCP \
2237 | NFS_MOUNT_VER3 \
2238 | NFS_MOUNT_KERBEROS \
2239 | NFS_MOUNT_NONLM \
2240 | NFS_MOUNT_BROKEN_SUID \
2241 | NFS_MOUNT_STRICTLOCK \
c8e47028
SM
2242 | NFS_MOUNT_LEGACY_INTERFACE)
2243
71a6ec8a
SM
2244#define NFS_MOUNT_CMP_FLAGMASK (NFS_REMOUNT_CMP_FLAGMASK & \
2245 ~(NFS_MOUNT_UNSHARED | NFS_MOUNT_NORESVPORT))
2246
48b605f8
JL
2247static int
2248nfs_compare_remount_data(struct nfs_server *nfss,
2249 struct nfs_parsed_mount_data *data)
2250{
71a6ec8a 2251 if ((data->flags ^ nfss->flags) & NFS_REMOUNT_CMP_FLAGMASK ||
48b605f8
JL
2252 data->rsize != nfss->rsize ||
2253 data->wsize != nfss->wsize ||
57acc40d
JL
2254 data->version != nfss->nfs_client->rpc_ops->version ||
2255 data->minorversion != nfss->nfs_client->cl_minorversion ||
48b605f8 2256 data->retrans != nfss->client->cl_timeout->to_retries ||
09a330f4 2257 !nfs_auth_info_match(&data->auth_info, nfss->client->cl_auth->au_flavor) ||
48b605f8
JL
2258 data->acregmin != nfss->acregmin / HZ ||
2259 data->acregmax != nfss->acregmax / HZ ||
2260 data->acdirmin != nfss->acdirmin / HZ ||
2261 data->acdirmax != nfss->acdirmax / HZ ||
2262 data->timeo != (10U * nfss->client->cl_timeout->to_initval / HZ) ||
dea1bb35 2263 (data->options & NFS_OPTION_FSCACHE) != (nfss->options & NFS_OPTION_FSCACHE) ||
bcd2ea17 2264 data->nfs_server.port != nfss->port ||
48b605f8 2265 data->nfs_server.addrlen != nfss->nfs_client->cl_addrlen ||
a1be9eee
SR
2266 !rpc_cmp_addr((struct sockaddr *)&data->nfs_server.address,
2267 (struct sockaddr *)&nfss->nfs_client->cl_addr))
48b605f8
JL
2268 return -EINVAL;
2269
2270 return 0;
2271}
2272
fbdefd64 2273int
48b605f8
JL
2274nfs_remount(struct super_block *sb, int *flags, char *raw_data)
2275{
2276 int error;
2277 struct nfs_server *nfss = sb->s_fs_info;
2278 struct nfs_parsed_mount_data *data;
2279 struct nfs_mount_data *options = (struct nfs_mount_data *)raw_data;
2280 struct nfs4_mount_data *options4 = (struct nfs4_mount_data *)raw_data;
cd100725 2281 u32 nfsvers = nfss->nfs_client->rpc_ops->version;
48b605f8 2282
02b9984d
TT
2283 sync_filesystem(sb);
2284
48b605f8
JL
2285 /*
2286 * Userspace mount programs that send binary options generally send
2287 * them populated with default values. We have no way to know which
2288 * ones were explicitly specified. Fall back to legacy behavior and
2289 * just return success.
2290 */
31c94469
MZ
2291 if ((nfsvers == 4 && (!options4 || options4->version == 1)) ||
2292 (nfsvers <= 3 && (!options || (options->version >= 1 &&
2293 options->version <= 6))))
48b605f8
JL
2294 return 0;
2295
6a0440e5 2296 data = nfs_alloc_parsed_mount_data();
48b605f8
JL
2297 if (data == NULL)
2298 return -ENOMEM;
2299
2300 /* fill out struct with values from existing mount */
2301 data->flags = nfss->flags;
2302 data->rsize = nfss->rsize;
2303 data->wsize = nfss->wsize;
2304 data->retrans = nfss->client->cl_timeout->to_retries;
a3f73c27 2305 data->selected_flavor = nfss->client->cl_auth->au_flavor;
48b605f8
JL
2306 data->acregmin = nfss->acregmin / HZ;
2307 data->acregmax = nfss->acregmax / HZ;
2308 data->acdirmin = nfss->acdirmin / HZ;
2309 data->acdirmax = nfss->acdirmax / HZ;
2310 data->timeo = 10U * nfss->client->cl_timeout->to_initval / HZ;
bcd2ea17 2311 data->nfs_server.port = nfss->port;
48b605f8 2312 data->nfs_server.addrlen = nfss->nfs_client->cl_addrlen;
57acc40d
JL
2313 data->version = nfsvers;
2314 data->minorversion = nfss->nfs_client->cl_minorversion;
a914722f 2315 data->net = current->nsproxy->net_ns;
48b605f8
JL
2316 memcpy(&data->nfs_server.address, &nfss->nfs_client->cl_addr,
2317 data->nfs_server.addrlen);
2318
2319 /* overwrite those values with any that were specified */
1966903f
JL
2320 error = -EINVAL;
2321 if (!nfs_parse_mount_options((char *)options, data))
48b605f8
JL
2322 goto out;
2323
26c4c170
JL
2324 /*
2325 * noac is a special case. It implies -o sync, but that's not
2326 * necessarily reflected in the mtab options. do_remount_sb
1751e8a6 2327 * will clear SB_SYNCHRONOUS if -o sync wasn't specified in the
26c4c170
JL
2328 * remount options, so we have to explicitly reset it.
2329 */
2330 if (data->flags & NFS_MOUNT_NOAC)
1751e8a6 2331 *flags |= SB_SYNCHRONOUS;
26c4c170 2332
48b605f8
JL
2333 /* compare new mount options with old ones */
2334 error = nfs_compare_remount_data(nfss, data);
6a0440e5 2335 if (!error)
204cc0cc 2336 error = security_sb_remount(sb, data->lsm_opts);
48b605f8 2337out:
6a0440e5 2338 nfs_free_parsed_mount_data(data);
48b605f8
JL
2339 return error;
2340}
89d77c8f 2341EXPORT_SYMBOL_GPL(nfs_remount);
48b605f8 2342
f7b422b1 2343/*
54ceac45 2344 * Initialise the common bits of the superblock
f7b422b1 2345 */
4f253e1e 2346static void nfs_initialise_sb(struct super_block *sb)
f7b422b1 2347{
54ceac45 2348 struct nfs_server *server = NFS_SB(sb);
5006a76c 2349
54ceac45 2350 sb->s_magic = NFS_SUPER_MAGIC;
f7b422b1 2351
54ceac45
DH
2352 /* We probably want something more informative here */
2353 snprintf(sb->s_id, sizeof(sb->s_id),
5a7c9eec 2354 "%u:%u", MAJOR(sb->s_dev), MINOR(sb->s_dev));
5006a76c 2355
54ceac45
DH
2356 if (sb->s_blocksize == 0)
2357 sb->s_blocksize = nfs_block_bits(server->wsize,
2358 &sb->s_blocksize_bits);
f7b422b1 2359
54ceac45 2360 nfs_super_set_maxbytes(sb, server->maxfilesize);
f7b422b1
DH
2361}
2362
2363/*
54ceac45 2364 * Finish setting up an NFS2/3 superblock
f7b422b1 2365 */
9052c7cf 2366void nfs_fill_super(struct super_block *sb, struct nfs_mount_info *mount_info)
f7b422b1 2367{
c40f8d1d 2368 struct nfs_parsed_mount_data *data = mount_info->parsed;
f7b422b1 2369 struct nfs_server *server = NFS_SB(sb);
5006a76c 2370
54ceac45
DH
2371 sb->s_blocksize_bits = 0;
2372 sb->s_blocksize = 0;
6a74490d
BS
2373 sb->s_xattr = server->nfs_client->cl_nfs_mod->xattr;
2374 sb->s_op = server->nfs_client->cl_nfs_mod->sops;
2375 if (data && data->bsize)
54ceac45 2376 sb->s_blocksize = nfs_block_size(data->bsize, &sb->s_blocksize_bits);
f7b422b1 2377
6a74490d 2378 if (server->nfs_client->rpc_ops->version != 2) {
54ceac45
DH
2379 /* The VFS shouldn't apply the umask to mode bits. We will do
2380 * so ourselves when necessary.
2381 */
1751e8a6 2382 sb->s_flags |= SB_POSIXACL;
54ceac45 2383 sb->s_time_gran = 1;
20fa1902 2384 sb->s_export_op = &nfs_export_ops;
1fcb79c1
DD
2385 } else
2386 sb->s_time_gran = 1000;
2387
2388 if (server->nfs_client->rpc_ops->version != 4) {
2389 sb->s_time_min = 0;
2390 sb->s_time_max = U32_MAX;
2391 } else {
2392 sb->s_time_min = S64_MIN;
2393 sb->s_time_max = S64_MAX;
816724e6 2394 }
54ceac45 2395
54ceac45 2396 nfs_initialise_sb(sb);
f7b422b1 2397}
89d77c8f 2398EXPORT_SYMBOL_GPL(nfs_fill_super);
f7b422b1
DH
2399
2400/*
3cadf4b8 2401 * Finish setting up a cloned NFS2/3/4 superblock
f7b422b1 2402 */
4f253e1e
JK
2403static void nfs_clone_super(struct super_block *sb,
2404 struct nfs_mount_info *mount_info)
f7b422b1 2405{
8c958e0c 2406 const struct super_block *old_sb = mount_info->cloned->sb;
54ceac45
DH
2407 struct nfs_server *server = NFS_SB(sb);
2408
2409 sb->s_blocksize_bits = old_sb->s_blocksize_bits;
2410 sb->s_blocksize = old_sb->s_blocksize;
2411 sb->s_maxbytes = old_sb->s_maxbytes;
3cadf4b8
BS
2412 sb->s_xattr = old_sb->s_xattr;
2413 sb->s_op = old_sb->s_op;
20fa1902 2414 sb->s_export_op = old_sb->s_export_op;
f7b422b1 2415
3cadf4b8 2416 if (server->nfs_client->rpc_ops->version != 2) {
54ceac45
DH
2417 /* The VFS shouldn't apply the umask to mode bits. We will do
2418 * so ourselves when necessary.
f7b422b1 2419 */
1751e8a6 2420 sb->s_flags |= SB_POSIXACL;
1fcb79c1
DD
2421 sb->s_time_gran = 1;
2422 } else
2423 sb->s_time_gran = 1000;
2424
2425 if (server->nfs_client->rpc_ops->version != 4) {
2426 sb->s_time_min = 0;
2427 sb->s_time_max = U32_MAX;
2428 } else {
2429 sb->s_time_min = S64_MIN;
2430 sb->s_time_max = S64_MAX;
f7b422b1
DH
2431 }
2432
54ceac45 2433 nfs_initialise_sb(sb);
f7b422b1
DH
2434}
2435
275a5d24
TM
2436static int nfs_compare_mount_options(const struct super_block *s, const struct nfs_server *b, int flags)
2437{
2438 const struct nfs_server *a = s->s_fs_info;
2439 const struct rpc_clnt *clnt_a = a->client;
2440 const struct rpc_clnt *clnt_b = b->client;
2441
2442 if ((s->s_flags & NFS_MS_MASK) != (flags & NFS_MS_MASK))
2443 goto Ebusy;
2444 if (a->nfs_client != b->nfs_client)
2445 goto Ebusy;
0aea92bf 2446 if ((a->flags ^ b->flags) & NFS_MOUNT_CMP_FLAGMASK)
275a5d24
TM
2447 goto Ebusy;
2448 if (a->wsize != b->wsize)
2449 goto Ebusy;
2450 if (a->rsize != b->rsize)
2451 goto Ebusy;
2452 if (a->acregmin != b->acregmin)
2453 goto Ebusy;
2454 if (a->acregmax != b->acregmax)
2455 goto Ebusy;
2456 if (a->acdirmin != b->acdirmin)
2457 goto Ebusy;
2458 if (a->acdirmax != b->acdirmax)
2459 goto Ebusy;
594d1644 2460 if (clnt_a->cl_auth->au_flavor != clnt_b->cl_auth->au_flavor)
275a5d24 2461 goto Ebusy;
e89a5a43 2462 return 1;
275a5d24 2463Ebusy:
e89a5a43
TM
2464 return 0;
2465}
2466
2467struct nfs_sb_mountdata {
2468 struct nfs_server *server;
2469 int mntflags;
2470};
2471
2472static int nfs_set_super(struct super_block *s, void *data)
2473{
2474 struct nfs_sb_mountdata *sb_mntdata = data;
2475 struct nfs_server *server = sb_mntdata->server;
2476 int ret;
2477
2478 s->s_flags = sb_mntdata->mntflags;
2479 s->s_fs_info = server;
8b244ff2 2480 s->s_d_op = server->nfs_client->rpc_ops->dentry_ops;
e89a5a43
TM
2481 ret = set_anon_super(s, server);
2482 if (ret == 0)
2483 server->s_dev = s->s_dev;
2484 return ret;
2485}
2486
fd00a8ff
CL
2487static int nfs_compare_super_address(struct nfs_server *server1,
2488 struct nfs_server *server2)
2489{
2490 struct sockaddr *sap1, *sap2;
7e3fcf61
BF
2491 struct rpc_xprt *xprt1 = server1->client->cl_xprt;
2492 struct rpc_xprt *xprt2 = server2->client->cl_xprt;
2493
2494 if (!net_eq(xprt1->xprt_net, xprt2->xprt_net))
2495 return 0;
fd00a8ff
CL
2496
2497 sap1 = (struct sockaddr *)&server1->nfs_client->cl_addr;
2498 sap2 = (struct sockaddr *)&server2->nfs_client->cl_addr;
2499
2500 if (sap1->sa_family != sap2->sa_family)
2501 return 0;
2502
2503 switch (sap1->sa_family) {
2504 case AF_INET: {
2505 struct sockaddr_in *sin1 = (struct sockaddr_in *)sap1;
2506 struct sockaddr_in *sin2 = (struct sockaddr_in *)sap2;
2507 if (sin1->sin_addr.s_addr != sin2->sin_addr.s_addr)
2508 return 0;
2509 if (sin1->sin_port != sin2->sin_port)
2510 return 0;
2511 break;
2512 }
2513 case AF_INET6: {
2514 struct sockaddr_in6 *sin1 = (struct sockaddr_in6 *)sap1;
2515 struct sockaddr_in6 *sin2 = (struct sockaddr_in6 *)sap2;
2516 if (!ipv6_addr_equal(&sin1->sin6_addr, &sin2->sin6_addr))
2517 return 0;
2518 if (sin1->sin6_port != sin2->sin6_port)
2519 return 0;
2520 break;
2521 }
2522 default:
2523 return 0;
2524 }
2525
2526 return 1;
2527}
2528
3b7eb5e3
TM
2529static int nfs_compare_userns(const struct nfs_server *old,
2530 const struct nfs_server *new)
2531{
2532 const struct user_namespace *oldns = &init_user_ns;
2533 const struct user_namespace *newns = &init_user_ns;
2534
2535 if (old->client && old->client->cl_cred)
2536 oldns = old->client->cl_cred->user_ns;
2537 if (new->client && new->client->cl_cred)
2538 newns = new->client->cl_cred->user_ns;
2539 if (oldns != newns)
2540 return 0;
2541 return 1;
2542}
2543
e89a5a43
TM
2544static int nfs_compare_super(struct super_block *sb, void *data)
2545{
2546 struct nfs_sb_mountdata *sb_mntdata = data;
2547 struct nfs_server *server = sb_mntdata->server, *old = NFS_SB(sb);
2548 int mntflags = sb_mntdata->mntflags;
2549
fd00a8ff 2550 if (!nfs_compare_super_address(old, server))
e89a5a43
TM
2551 return 0;
2552 /* Note: NFS_MOUNT_UNSHARED == NFS4_MOUNT_UNSHARED */
2553 if (old->flags & NFS_MOUNT_UNSHARED)
2554 return 0;
2555 if (memcmp(&old->fsid, &server->fsid, sizeof(old->fsid)) != 0)
2556 return 0;
3b7eb5e3
TM
2557 if (!nfs_compare_userns(old, server))
2558 return 0;
e89a5a43 2559 return nfs_compare_mount_options(sb, server, mntflags);
275a5d24
TM
2560}
2561
39ffb921 2562#ifdef CONFIG_NFS_FSCACHE
2311b943
BS
2563static void nfs_get_cache_cookie(struct super_block *sb,
2564 struct nfs_parsed_mount_data *parsed,
2565 struct nfs_clone_mount *cloned)
2566{
c4271c6e 2567 struct nfs_server *nfss = NFS_SB(sb);
2311b943
BS
2568 char *uniq = NULL;
2569 int ulen = 0;
2570
c4271c6e
TM
2571 nfss->fscache_key = NULL;
2572 nfss->fscache = NULL;
2573
2574 if (parsed) {
2575 if (!(parsed->options & NFS_OPTION_FSCACHE))
2576 return;
2577 if (parsed->fscache_uniq) {
2578 uniq = parsed->fscache_uniq;
2579 ulen = strlen(parsed->fscache_uniq);
2580 }
2311b943
BS
2581 } else if (cloned) {
2582 struct nfs_server *mnt_s = NFS_SB(cloned->sb);
c4271c6e
TM
2583 if (!(mnt_s->options & NFS_OPTION_FSCACHE))
2584 return;
2311b943
BS
2585 if (mnt_s->fscache_key) {
2586 uniq = mnt_s->fscache_key->key.uniquifier;
2587 ulen = mnt_s->fscache_key->key.uniq_len;
2588 };
c4271c6e
TM
2589 } else
2590 return;
2311b943
BS
2591
2592 nfs_fscache_get_super_cookie(sb, uniq, ulen);
2593}
39ffb921
TM
2594#else
2595static void nfs_get_cache_cookie(struct super_block *sb,
2596 struct nfs_parsed_mount_data *parsed,
2597 struct nfs_clone_mount *cloned)
2598{
2599}
2600#endif
2311b943 2601
fbdefd64
BS
2602int nfs_set_sb_security(struct super_block *s, struct dentry *mntroot,
2603 struct nfs_mount_info *mount_info)
3d176e3f 2604{
aa9c2669
DQ
2605 int error;
2606 unsigned long kflags = 0, kflags_out = 0;
2607 if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL)
2608 kflags |= SECURITY_LSM_NATIVE_LABELS;
2609
204cc0cc 2610 error = security_sb_set_mnt_opts(s, mount_info->parsed->lsm_opts,
aa9c2669
DQ
2611 kflags, &kflags_out);
2612 if (error)
2613 goto err;
2614
2615 if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL &&
2616 !(kflags_out & SECURITY_LSM_NATIVE_LABELS))
2617 NFS_SB(s)->caps &= ~NFS_CAP_SECURITY_LABEL;
2618err:
2619 return error;
3d176e3f 2620}
89d77c8f 2621EXPORT_SYMBOL_GPL(nfs_set_sb_security);
3d176e3f 2622
fbdefd64
BS
2623int nfs_clone_sb_security(struct super_block *s, struct dentry *mntroot,
2624 struct nfs_mount_info *mount_info)
3d176e3f 2625{
0b4d3452
SM
2626 int error;
2627 unsigned long kflags = 0, kflags_out = 0;
2628
3d176e3f 2629 /* clone any lsm security options from the parent to the new sb */
2b0143b5 2630 if (d_inode(mntroot)->i_op != NFS_SB(s)->nfs_client->rpc_ops->dir_inode_ops)
3d176e3f 2631 return -ESTALE;
0b4d3452
SM
2632
2633 if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL)
2634 kflags |= SECURITY_LSM_NATIVE_LABELS;
2635
2636 error = security_sb_clone_mnt_opts(mount_info->cloned->sb, s, kflags,
2637 &kflags_out);
2638 if (error)
2639 return error;
2640
2641 if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL &&
2642 !(kflags_out & SECURITY_LSM_NATIVE_LABELS))
2643 NFS_SB(s)->caps &= ~NFS_CAP_SECURITY_LABEL;
2644 return 0;
3d176e3f 2645}
89d77c8f 2646EXPORT_SYMBOL_GPL(nfs_clone_sb_security);
3d176e3f 2647
c128e575
TM
2648static void nfs_set_readahead(struct backing_dev_info *bdi,
2649 unsigned long iomax_pages)
2650{
2651 bdi->ra_pages = VM_READAHEAD_PAGES;
2652 bdi->io_pages = iomax_pages;
2653}
2654
ab7017a3 2655struct dentry *nfs_fs_mount_common(struct nfs_server *server,
fbdefd64 2656 int flags, const char *dev_name,
ab7017a3
BS
2657 struct nfs_mount_info *mount_info,
2658 struct nfs_subversion *nfs_mod)
f7b422b1 2659{
f7b422b1 2660 struct super_block *s;
01194981 2661 struct dentry *mntroot = ERR_PTR(-ENOMEM);
75180df2 2662 int (*compare_super)(struct super_block *, void *) = nfs_compare_super;
e89a5a43
TM
2663 struct nfs_sb_mountdata sb_mntdata = {
2664 .mntflags = flags,
c40f8d1d 2665 .server = server,
e89a5a43 2666 };
01194981 2667 int error;
33852a1f 2668
75180df2
TM
2669 if (server->flags & NFS_MOUNT_UNSHARED)
2670 compare_super = NULL;
2671
fb2088cc
SP
2672 /* -o noac implies -o sync */
2673 if (server->flags & NFS_MOUNT_NOAC)
1751e8a6 2674 sb_mntdata.mntflags |= SB_SYNCHRONOUS;
fb2088cc 2675
e890db01 2676 if (mount_info->cloned != NULL && mount_info->cloned->sb != NULL)
1751e8a6
LT
2677 if (mount_info->cloned->sb->s_flags & SB_SYNCHRONOUS)
2678 sb_mntdata.mntflags |= SB_SYNCHRONOUS;
e890db01 2679
54ceac45 2680 /* Get a superblock - note that we may end up sharing one that already exists */
ab7017a3 2681 s = sget(nfs_mod->nfs_fs, compare_super, nfs_set_super, flags, &sb_mntdata);
816724e6 2682 if (IS_ERR(s)) {
01194981 2683 mntroot = ERR_CAST(s);
54ceac45 2684 goto out_err_nosb;
816724e6
TM
2685 }
2686
54ceac45
DH
2687 if (s->s_fs_info != server) {
2688 nfs_free_server(server);
2689 server = NULL;
fa799759 2690 } else {
9052c7cf
JK
2691 error = super_setup_bdi_name(s, "%u:%u", MAJOR(server->s_dev),
2692 MINOR(server->s_dev));
2693 if (error) {
2694 mntroot = ERR_PTR(error);
2695 goto error_splat_super;
2696 }
c128e575 2697 nfs_set_readahead(s->s_bdi, server->rpages);
ce6cda18 2698 server->super = s;
54ceac45 2699 }
f7b422b1 2700
54ceac45
DH
2701 if (!s->s_root) {
2702 /* initial superblock/root creation */
9052c7cf 2703 mount_info->fill_super(s, mount_info);
3d176e3f 2704 nfs_get_cache_cookie(s, mount_info->parsed, mount_info->cloned);
95dd7758
EB
2705 if (!(server->flags & NFS_MOUNT_UNSHARED))
2706 s->s_iflags |= SB_I_MULTIROOT;
54ceac45 2707 }
f7b422b1 2708
87c7083d 2709 mntroot = nfs_get_root(s, mount_info->mntfh, dev_name);
01194981 2710 if (IS_ERR(mntroot))
54ceac45 2711 goto error_splat_super;
816724e6 2712
3d176e3f 2713 error = mount_info->set_security(s, mntroot, mount_info);
f9c3a380
EP
2714 if (error)
2715 goto error_splat_root;
2716
1751e8a6 2717 s->s_flags |= SB_ACTIVE;
0655960f
CL
2718
2719out:
01194981 2720 return mntroot;
816724e6 2721
54ceac45
DH
2722out_err_nosb:
2723 nfs_free_server(server);
0655960f 2724 goto out;
54ceac45 2725
f9c3a380
EP
2726error_splat_root:
2727 dput(mntroot);
01194981 2728 mntroot = ERR_PTR(error);
54ceac45 2729error_splat_super:
6f5bbff9 2730 deactivate_locked_super(s);
0655960f 2731 goto out;
f7b422b1 2732}
89d77c8f 2733EXPORT_SYMBOL_GPL(nfs_fs_mount_common);
f7b422b1 2734
fbdefd64 2735struct dentry *nfs_fs_mount(struct file_system_type *fs_type,
c40f8d1d
BS
2736 int flags, const char *dev_name, void *raw_data)
2737{
c40f8d1d
BS
2738 struct nfs_mount_info mount_info = {
2739 .fill_super = nfs_fill_super,
3d176e3f 2740 .set_security = nfs_set_sb_security,
c40f8d1d 2741 };
c40f8d1d 2742 struct dentry *mntroot = ERR_PTR(-ENOMEM);
ab7017a3 2743 struct nfs_subversion *nfs_mod;
c40f8d1d
BS
2744 int error;
2745
46058d46 2746 mount_info.parsed = nfs_alloc_parsed_mount_data();
87c7083d
BS
2747 mount_info.mntfh = nfs_alloc_fhandle();
2748 if (mount_info.parsed == NULL || mount_info.mntfh == NULL)
c40f8d1d
BS
2749 goto out;
2750
2751 /* Validate the mount data */
87c7083d 2752 error = nfs_validate_mount_data(fs_type, raw_data, mount_info.parsed, mount_info.mntfh, dev_name);
b72e4f42 2753 if (error == NFS_TEXT_DATA)
46058d46 2754 error = nfs_validate_text_mount_data(raw_data, mount_info.parsed, dev_name);
c40f8d1d
BS
2755 if (error < 0) {
2756 mntroot = ERR_PTR(error);
2757 goto out;
2758 }
c40f8d1d 2759
ab7017a3
BS
2760 nfs_mod = get_nfs_version(mount_info.parsed->version);
2761 if (IS_ERR(nfs_mod)) {
2762 mntroot = ERR_CAST(nfs_mod);
2763 goto out;
2764 }
2765
ff9099f2 2766 mntroot = nfs_mod->rpc_ops->try_mount(flags, dev_name, &mount_info, nfs_mod);
ab7017a3
BS
2767
2768 put_nfs_version(nfs_mod);
c40f8d1d 2769out:
46058d46 2770 nfs_free_parsed_mount_data(mount_info.parsed);
87c7083d 2771 nfs_free_fhandle(mount_info.mntfh);
c40f8d1d
BS
2772 return mntroot;
2773}
89d77c8f 2774EXPORT_SYMBOL_GPL(nfs_fs_mount);
c40f8d1d 2775
54ceac45
DH
2776/*
2777 * Destroy an NFS2/3 superblock
2778 */
fbdefd64 2779void nfs_kill_super(struct super_block *s)
f7b422b1
DH
2780{
2781 struct nfs_server *server = NFS_SB(s);
7b14a213
CH
2782 dev_t dev = s->s_dev;
2783
2784 generic_shutdown_super(s);
f7b422b1 2785
08734048 2786 nfs_fscache_release_super_cookie(s);
7b14a213 2787
54ceac45 2788 nfs_free_server(server);
7b14a213 2789 free_anon_bdev(dev);
f7b422b1 2790}
89d77c8f 2791EXPORT_SYMBOL_GPL(nfs_kill_super);
f7b422b1 2792
54ceac45 2793/*
8c958e0c 2794 * Clone an NFS2/3/4 server record on xdev traversal (FSID-change)
54ceac45 2795 */
3dd4f8ef 2796static struct dentry *
e8f25e6d
BS
2797nfs_xdev_mount(struct file_system_type *fs_type, int flags,
2798 const char *dev_name, void *raw_data)
f7b422b1 2799{
e8f25e6d
BS
2800 struct nfs_clone_mount *data = raw_data;
2801 struct nfs_mount_info mount_info = {
2802 .fill_super = nfs_clone_super,
2803 .set_security = nfs_clone_sb_security,
2804 .cloned = data,
2805 };
54ceac45 2806 struct nfs_server *server;
3d176e3f 2807 struct dentry *mntroot = ERR_PTR(-ENOMEM);
ab7017a3 2808 struct nfs_subversion *nfs_mod = NFS_SB(data->sb)->nfs_client->cl_nfs_mod;
f7b422b1 2809
dee972b9 2810 dprintk("--> nfs_xdev_mount()\n");
f7b422b1 2811
e8f25e6d 2812 mount_info.mntfh = mount_info.cloned->fh;
87c7083d 2813
54ceac45 2814 /* create a new volume representation */
1179acc6 2815 server = nfs_mod->rpc_ops->clone_server(NFS_SB(data->sb), data->fh, data->fattr, data->authflavor);
f7b422b1 2816
dee972b9
TM
2817 if (IS_ERR(server))
2818 mntroot = ERR_CAST(server);
2819 else
2820 mntroot = nfs_fs_mount_common(server, flags,
2821 dev_name, &mount_info, nfs_mod);
24c8dbbb 2822
dee972b9
TM
2823 dprintk("<-- nfs_xdev_mount() = %ld\n",
2824 IS_ERR(mntroot) ? PTR_ERR(mntroot) : 0L);
2825 return mntroot;
f7b422b1
DH
2826}
2827
89d77c8f 2828#if IS_ENABLED(CONFIG_NFS_V4)
54ceac45 2829
01c3f052
TM
2830static void nfs4_validate_mount_flags(struct nfs_parsed_mount_data *args)
2831{
5eebde23
SJ
2832 args->flags &= ~(NFS_MOUNT_NONLM|NFS_MOUNT_NOACL|NFS_MOUNT_VER3|
2833 NFS_MOUNT_LOCAL_FLOCK|NFS_MOUNT_LOCAL_FCNTL);
01c3f052
TM
2834}
2835
f0768ebd
CL
2836/*
2837 * Validate NFSv4 mount options
2838 */
91ea40b9
TT
2839static int nfs4_validate_mount_data(void *options,
2840 struct nfs_parsed_mount_data *args,
2841 const char *dev_name)
f0768ebd 2842{
4cfd74fc 2843 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
91ea40b9 2844 struct nfs4_mount_data *data = (struct nfs4_mount_data *)options;
f0768ebd
CL
2845 char *c;
2846
2847 if (data == NULL)
2848 goto out_no_data;
2849
cdf66442
BS
2850 args->version = 4;
2851
f0768ebd
CL
2852 switch (data->version) {
2853 case 1:
4c568017
CL
2854 if (data->host_addrlen > sizeof(args->nfs_server.address))
2855 goto out_no_address;
2856 if (data->host_addrlen == 0)
f0768ebd 2857 goto out_no_address;
4c568017 2858 args->nfs_server.addrlen = data->host_addrlen;
4cfd74fc 2859 if (copy_from_user(sap, data->host_addr, data->host_addrlen))
f0768ebd 2860 return -EFAULT;
4cfd74fc 2861 if (!nfs_verify_server_address(sap))
f0768ebd 2862 goto out_no_address;
872ece86 2863 args->nfs_server.port = ntohs(((struct sockaddr_in *)sap)->sin_port);
f0768ebd 2864
6738b251 2865 if (data->auth_flavourlen) {
74c98811 2866 rpc_authflavor_t pseudoflavor;
6738b251
CL
2867 if (data->auth_flavourlen > 1)
2868 goto out_inval_auth;
74c98811 2869 if (copy_from_user(&pseudoflavor,
91ea40b9 2870 data->auth_flavours,
74c98811 2871 sizeof(pseudoflavor)))
f0768ebd 2872 return -EFAULT;
a3f73c27 2873 args->selected_flavor = pseudoflavor;
74c98811 2874 } else
a3f73c27 2875 args->selected_flavor = RPC_AUTH_UNIX;
f0768ebd
CL
2876
2877 c = strndup_user(data->hostname.data, NFS4_MAXNAMLEN);
2878 if (IS_ERR(c))
2879 return PTR_ERR(c);
91ea40b9 2880 args->nfs_server.hostname = c;
f0768ebd
CL
2881
2882 c = strndup_user(data->mnt_path.data, NFS4_MAXPATHLEN);
2883 if (IS_ERR(c))
2884 return PTR_ERR(c);
91ea40b9
TT
2885 args->nfs_server.export_path = c;
2886 dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", c);
f0768ebd
CL
2887
2888 c = strndup_user(data->client_addr.data, 16);
2889 if (IS_ERR(c))
2890 return PTR_ERR(c);
91ea40b9
TT
2891 args->client_address = c;
2892
2893 /*
2894 * Translate to nfs_parsed_mount_data, which nfs4_fill_super
2895 * can deal with.
2896 */
2897
2898 args->flags = data->flags & NFS4_MOUNT_FLAGMASK;
2899 args->rsize = data->rsize;
2900 args->wsize = data->wsize;
2901 args->timeo = data->timeo;
2902 args->retrans = data->retrans;
2903 args->acregmin = data->acregmin;
2904 args->acregmax = data->acregmax;
2905 args->acdirmin = data->acdirmin;
2906 args->acdirmax = data->acdirmax;
2907 args->nfs_server.protocol = data->proto;
259875ef 2908 nfs_validate_transport_protocol(args);
6da1a034
TM
2909 if (args->nfs_server.protocol == XPRT_TRANSPORT_UDP)
2910 goto out_invalid_transport_udp;
f0768ebd
CL
2911
2912 break;
7630c852 2913 default:
b72e4f42 2914 return NFS_TEXT_DATA;
f0768ebd
CL
2915 }
2916
2917 return 0;
2918
2919out_no_data:
2920 dfprintk(MOUNT, "NFS4: mount program didn't pass any mount data\n");
2921 return -EINVAL;
2922
2923out_inval_auth:
2924 dfprintk(MOUNT, "NFS4: Invalid number of RPC auth flavours %d\n",
2925 data->auth_flavourlen);
2926 return -EINVAL;
2927
2928out_no_address:
2929 dfprintk(MOUNT, "NFS4: mount program didn't pass remote address\n");
2930 return -EINVAL;
6da1a034
TM
2931
2932out_invalid_transport_udp:
2933 dfprintk(MOUNT, "NFSv4: Unsupported transport protocol udp\n");
2934 return -EINVAL;
f0768ebd
CL
2935}
2936
fac1e8e4
BS
2937/*
2938 * NFS v4 module parameters need to stay in the
2939 * NFS client for backwards compatibility
2940 */
2941unsigned int nfs_callback_set_tcpport;
5405fc44 2942unsigned short nfs_callback_nr_threads;
fac1e8e4
BS
2943/* Default cache timeout is 10 minutes */
2944unsigned int nfs_idmap_cache_timeout = 600;
2945/* Turn off NFSv4 uid/gid mapping when using AUTH_SYS */
2946bool nfs4_disable_idmapping = true;
2947unsigned short max_session_slots = NFS4_DEF_SLOT_TABLE_SIZE;
5405fc44 2948unsigned short max_session_cb_slots = NFS4_DEF_CB_SLOT_TABLE_SIZE;
fac1e8e4 2949unsigned short send_implementation_id = 1;
6f2ea7f2 2950char nfs4_client_id_uniquifier[NFS4_CLIENT_ID_UNIQ_LEN] = "";
f6de7a39 2951bool recover_lost_locks = false;
fac1e8e4 2952
5405fc44 2953EXPORT_SYMBOL_GPL(nfs_callback_nr_threads);
89d77c8f 2954EXPORT_SYMBOL_GPL(nfs_callback_set_tcpport);
89d77c8f
BS
2955EXPORT_SYMBOL_GPL(nfs_idmap_cache_timeout);
2956EXPORT_SYMBOL_GPL(nfs4_disable_idmapping);
2957EXPORT_SYMBOL_GPL(max_session_slots);
5405fc44 2958EXPORT_SYMBOL_GPL(max_session_cb_slots);
89d77c8f 2959EXPORT_SYMBOL_GPL(send_implementation_id);
6f2ea7f2 2960EXPORT_SYMBOL_GPL(nfs4_client_id_uniquifier);
f6de7a39 2961EXPORT_SYMBOL_GPL(recover_lost_locks);
89d77c8f 2962
fac1e8e4
BS
2963#define NFS_CALLBACK_MAXPORTNR (65535U)
2964
2965static int param_set_portnr(const char *val, const struct kernel_param *kp)
2966{
2967 unsigned long num;
2968 int ret;
2969
2970 if (!val)
2971 return -EINVAL;
7297cb68 2972 ret = kstrtoul(val, 0, &num);
379ebf07 2973 if (ret || num > NFS_CALLBACK_MAXPORTNR)
fac1e8e4
BS
2974 return -EINVAL;
2975 *((unsigned int *)kp->arg) = num;
2976 return 0;
2977}
9c27847d 2978static const struct kernel_param_ops param_ops_portnr = {
fac1e8e4
BS
2979 .set = param_set_portnr,
2980 .get = param_get_uint,
2981};
2982#define param_check_portnr(name, p) __param_check(name, p, unsigned int);
2983
2984module_param_named(callback_tcpport, nfs_callback_set_tcpport, portnr, 0644);
5405fc44
TM
2985module_param_named(callback_nr_threads, nfs_callback_nr_threads, ushort, 0644);
2986MODULE_PARM_DESC(callback_nr_threads, "Number of threads that will be "
2987 "assigned to the NFSv4 callback channels.");
fac1e8e4
BS
2988module_param(nfs_idmap_cache_timeout, int, 0644);
2989module_param(nfs4_disable_idmapping, bool, 0644);
6f2ea7f2
CL
2990module_param_string(nfs4_unique_id, nfs4_client_id_uniquifier,
2991 NFS4_CLIENT_ID_UNIQ_LEN, 0600);
fac1e8e4
BS
2992MODULE_PARM_DESC(nfs4_disable_idmapping,
2993 "Turn off NFSv4 idmapping when using 'sec=sys'");
2994module_param(max_session_slots, ushort, 0644);
2995MODULE_PARM_DESC(max_session_slots, "Maximum number of outstanding NFSv4.1 "
2996 "requests the client will negotiate");
5405fc44 2997module_param(max_session_cb_slots, ushort, 0644);
f36ab161 2998MODULE_PARM_DESC(max_session_cb_slots, "Maximum number of parallel NFSv4.1 "
5405fc44 2999 "callbacks the client will process for a given server");
fac1e8e4
BS
3000module_param(send_implementation_id, ushort, 0644);
3001MODULE_PARM_DESC(send_implementation_id,
3002 "Send implementation ID with NFSv4.1 exchange_id");
6f2ea7f2 3003MODULE_PARM_DESC(nfs4_unique_id, "nfs_client_id4 uniquifier string");
425e776d 3004
f6de7a39
TM
3005module_param(recover_lost_locks, bool, 0644);
3006MODULE_PARM_DESC(recover_lost_locks,
3007 "If the server reports that a lock might be lost, "
3008 "try to recover it risking data corruption.");
3009
3010
54ceac45 3011#endif /* CONFIG_NFS_V4 */