treewide: Add SPDX license identifier for missed files
[linux-block.git] / fs / nfs / super.c
CommitLineData
457c8996 1// SPDX-License-Identifier: GPL-2.0-only
f7b422b1
DH
2/*
3 * linux/fs/nfs/super.c
4 *
5 * Copyright (C) 1992 Rick Sladkey
6 *
7 * nfs superblock handling functions
8 *
526719ba 9 * Modularised by Alan Cox <alan@lxorguk.ukuu.org.uk>, while hacking some
f7b422b1
DH
10 * experimental NFS changes. Modularisation taken straight from SYS5 fs.
11 *
12 * Change to nfs_read_super() to permit NFS mounts to multi-homed hosts.
13 * J.S.Peatfield@damtp.cam.ac.uk
14 *
15 * Split from inode.c by David Howells <dhowells@redhat.com>
16 *
54ceac45
DH
17 * - superblocks are indexed on server only - all inodes, dentries, etc. associated with a
18 * particular server are held in the same superblock
19 * - NFS superblocks can have several effective roots to the dentry tree
20 * - directory type roots are spliced into the tree when a path from one root reaches the root
21 * of another (see nfs_lookup())
f7b422b1
DH
22 */
23
f7b422b1
DH
24#include <linux/module.h>
25#include <linux/init.h>
26
27#include <linux/time.h>
28#include <linux/kernel.h>
29#include <linux/mm.h>
30#include <linux/string.h>
31#include <linux/stat.h>
32#include <linux/errno.h>
33#include <linux/unistd.h>
34#include <linux/sunrpc/clnt.h>
5976687a 35#include <linux/sunrpc/addr.h>
f7b422b1
DH
36#include <linux/sunrpc/stats.h>
37#include <linux/sunrpc/metrics.h>
0896a725 38#include <linux/sunrpc/xprtsock.h>
2cf7ff7a 39#include <linux/sunrpc/xprtrdma.h>
f7b422b1
DH
40#include <linux/nfs_fs.h>
41#include <linux/nfs_mount.h>
42#include <linux/nfs4_mount.h>
43#include <linux/lockd/bind.h>
f7b422b1
DH
44#include <linux/seq_file.h>
45#include <linux/mount.h>
c02d7adf 46#include <linux/namei.h>
f7b422b1
DH
47#include <linux/vfs.h>
48#include <linux/inet.h>
fd00a8ff 49#include <linux/in6.h>
5a0e3ad6 50#include <linux/slab.h>
fd00a8ff 51#include <net/ipv6.h>
d8e7748a 52#include <linux/netdevice.h>
f7b422b1 53#include <linux/nfs_xdr.h>
b5d5dfbd 54#include <linux/magic.h>
bf0fd768 55#include <linux/parser.h>
e50a7a1a 56#include <linux/nsproxy.h>
2446ab60 57#include <linux/rcupdate.h>
f7b422b1 58
7c0f6ba6 59#include <linux/uaccess.h>
f7b422b1
DH
60
61#include "nfs4_fs.h"
62#include "callback.h"
63#include "delegation.h"
64#include "iostat.h"
65#include "internal.h"
08734048 66#include "fscache.h"
76e697ba 67#include "nfs4session.h"
ae50c0b5 68#include "pnfs.h"
ab7017a3 69#include "nfs.h"
f7b422b1
DH
70
71#define NFSDBG_FACILITY NFSDBG_VFS
b72e4f42 72#define NFS_TEXT_DATA 1
f7b422b1 73
1c606fb7 74#if IS_ENABLED(CONFIG_NFS_V3)
1e657bd5
PZ
75#define NFS_DEFAULT_VERSION 3
76#else
77#define NFS_DEFAULT_VERSION 2
78#endif
79
bf0fd768
CL
80enum {
81 /* Mount options that take no arguments */
91a575e1 82 Opt_soft, Opt_softerr, Opt_hard,
bf0fd768
CL
83 Opt_posix, Opt_noposix,
84 Opt_cto, Opt_nocto,
85 Opt_ac, Opt_noac,
86 Opt_lock, Opt_nolock,
2cf7ff7a 87 Opt_udp, Opt_tcp, Opt_rdma,
bf0fd768
CL
88 Opt_acl, Opt_noacl,
89 Opt_rdirplus, Opt_nordirplus,
75180df2 90 Opt_sharecache, Opt_nosharecache,
d740351b 91 Opt_resvport, Opt_noresvport,
b797cac7 92 Opt_fscache, Opt_nofscache,
89652617 93 Opt_migration, Opt_nomigration,
bf0fd768
CL
94
95 /* Mount options that take integer arguments */
96 Opt_port,
97 Opt_rsize, Opt_wsize, Opt_bsize,
98 Opt_timeo, Opt_retrans,
99 Opt_acregmin, Opt_acregmax,
100 Opt_acdirmin, Opt_acdirmax,
101 Opt_actimeo,
102 Opt_namelen,
103 Opt_mountport,
e887cbcf 104 Opt_mountvers,
3fd5be9e 105 Opt_minorversion,
bf0fd768
CL
106
107 /* Mount options that take string arguments */
0d71b058 108 Opt_nfsvers,
33832034 109 Opt_sec, Opt_proto, Opt_mountproto, Opt_mounthost,
0ac83779 110 Opt_addr, Opt_mountaddr, Opt_clientaddr,
7973c1f1 111 Opt_lookupcache,
b797cac7 112 Opt_fscache_uniq,
5eebde23 113 Opt_local_lock,
bf0fd768 114
f45663ce
CL
115 /* Special mount options */
116 Opt_userspace, Opt_deprecated, Opt_sloppy,
bf0fd768
CL
117
118 Opt_err
119};
120
a447c093 121static const match_table_t nfs_mount_option_tokens = {
bf0fd768
CL
122 { Opt_userspace, "bg" },
123 { Opt_userspace, "fg" },
ecbb3845
CL
124 { Opt_userspace, "retry=%s" },
125
f45663ce
CL
126 { Opt_sloppy, "sloppy" },
127
bf0fd768 128 { Opt_soft, "soft" },
91a575e1 129 { Opt_softerr, "softerr" },
bf0fd768 130 { Opt_hard, "hard" },
d33e4dfe
CL
131 { Opt_deprecated, "intr" },
132 { Opt_deprecated, "nointr" },
bf0fd768
CL
133 { Opt_posix, "posix" },
134 { Opt_noposix, "noposix" },
135 { Opt_cto, "cto" },
136 { Opt_nocto, "nocto" },
137 { Opt_ac, "ac" },
138 { Opt_noac, "noac" },
139 { Opt_lock, "lock" },
140 { Opt_nolock, "nolock" },
bf0fd768
CL
141 { Opt_udp, "udp" },
142 { Opt_tcp, "tcp" },
2cf7ff7a 143 { Opt_rdma, "rdma" },
bf0fd768
CL
144 { Opt_acl, "acl" },
145 { Opt_noacl, "noacl" },
146 { Opt_rdirplus, "rdirplus" },
147 { Opt_nordirplus, "nordirplus" },
75180df2
TM
148 { Opt_sharecache, "sharecache" },
149 { Opt_nosharecache, "nosharecache" },
d740351b
CL
150 { Opt_resvport, "resvport" },
151 { Opt_noresvport, "noresvport" },
b797cac7 152 { Opt_fscache, "fsc" },
b797cac7 153 { Opt_nofscache, "nofsc" },
89652617
CL
154 { Opt_migration, "migration" },
155 { Opt_nomigration, "nomigration" },
bf0fd768 156
a5a16bae
CL
157 { Opt_port, "port=%s" },
158 { Opt_rsize, "rsize=%s" },
159 { Opt_wsize, "wsize=%s" },
160 { Opt_bsize, "bsize=%s" },
161 { Opt_timeo, "timeo=%s" },
162 { Opt_retrans, "retrans=%s" },
163 { Opt_acregmin, "acregmin=%s" },
164 { Opt_acregmax, "acregmax=%s" },
165 { Opt_acdirmin, "acdirmin=%s" },
166 { Opt_acdirmax, "acdirmax=%s" },
167 { Opt_actimeo, "actimeo=%s" },
168 { Opt_namelen, "namlen=%s" },
169 { Opt_mountport, "mountport=%s" },
170 { Opt_mountvers, "mountvers=%s" },
0d71b058
TM
171 { Opt_minorversion, "minorversion=%s" },
172
a5a16bae
CL
173 { Opt_nfsvers, "nfsvers=%s" },
174 { Opt_nfsvers, "vers=%s" },
bf0fd768
CL
175
176 { Opt_sec, "sec=%s" },
177 { Opt_proto, "proto=%s" },
178 { Opt_mountproto, "mountproto=%s" },
179 { Opt_addr, "addr=%s" },
180 { Opt_clientaddr, "clientaddr=%s" },
33832034 181 { Opt_mounthost, "mounthost=%s" },
0ac83779 182 { Opt_mountaddr, "mountaddr=%s" },
bf0fd768 183
7973c1f1 184 { Opt_lookupcache, "lookupcache=%s" },
a6d5ff64 185 { Opt_fscache_uniq, "fsc=%s" },
5eebde23 186 { Opt_local_lock, "local_lock=%s" },
7973c1f1 187
3862279a
TM
188 /* The following needs to be listed after all other options */
189 { Opt_nfsvers, "v%s" },
190
bf0fd768
CL
191 { Opt_err, NULL }
192};
193
194enum {
ee671b01 195 Opt_xprt_udp, Opt_xprt_udp6, Opt_xprt_tcp, Opt_xprt_tcp6, Opt_xprt_rdma,
181342c5 196 Opt_xprt_rdma6,
bf0fd768
CL
197
198 Opt_xprt_err
199};
200
a447c093 201static const match_table_t nfs_xprt_protocol_tokens = {
bf0fd768 202 { Opt_xprt_udp, "udp" },
ee671b01 203 { Opt_xprt_udp6, "udp6" },
bf0fd768 204 { Opt_xprt_tcp, "tcp" },
ee671b01 205 { Opt_xprt_tcp6, "tcp6" },
2cf7ff7a 206 { Opt_xprt_rdma, "rdma" },
181342c5 207 { Opt_xprt_rdma6, "rdma6" },
bf0fd768
CL
208
209 { Opt_xprt_err, NULL }
210};
211
212enum {
213 Opt_sec_none, Opt_sec_sys,
214 Opt_sec_krb5, Opt_sec_krb5i, Opt_sec_krb5p,
215 Opt_sec_lkey, Opt_sec_lkeyi, Opt_sec_lkeyp,
216 Opt_sec_spkm, Opt_sec_spkmi, Opt_sec_spkmp,
217
218 Opt_sec_err
219};
220
a447c093 221static const match_table_t nfs_secflavor_tokens = {
bf0fd768
CL
222 { Opt_sec_none, "none" },
223 { Opt_sec_none, "null" },
224 { Opt_sec_sys, "sys" },
225
226 { Opt_sec_krb5, "krb5" },
227 { Opt_sec_krb5i, "krb5i" },
228 { Opt_sec_krb5p, "krb5p" },
229
230 { Opt_sec_lkey, "lkey" },
231 { Opt_sec_lkeyi, "lkeyi" },
232 { Opt_sec_lkeyp, "lkeyp" },
233
8d042218
OK
234 { Opt_sec_spkm, "spkm3" },
235 { Opt_sec_spkmi, "spkm3i" },
236 { Opt_sec_spkmp, "spkm3p" },
237
bf0fd768
CL
238 { Opt_sec_err, NULL }
239};
240
7973c1f1
TM
241enum {
242 Opt_lookupcache_all, Opt_lookupcache_positive,
243 Opt_lookupcache_none,
244
245 Opt_lookupcache_err
246};
247
248static match_table_t nfs_lookupcache_tokens = {
249 { Opt_lookupcache_all, "all" },
250 { Opt_lookupcache_positive, "pos" },
251 { Opt_lookupcache_positive, "positive" },
252 { Opt_lookupcache_none, "none" },
253
254 { Opt_lookupcache_err, NULL }
255};
256
5eebde23
SJ
257enum {
258 Opt_local_lock_all, Opt_local_lock_flock, Opt_local_lock_posix,
259 Opt_local_lock_none,
260
261 Opt_local_lock_err
262};
263
264static match_table_t nfs_local_lock_tokens = {
265 { Opt_local_lock_all, "all" },
266 { Opt_local_lock_flock, "flock" },
267 { Opt_local_lock_posix, "posix" },
268 { Opt_local_lock_none, "none" },
269
270 { Opt_local_lock_err, NULL }
271};
272
0d71b058
TM
273enum {
274 Opt_vers_2, Opt_vers_3, Opt_vers_4, Opt_vers_4_0,
42c2c424 275 Opt_vers_4_1, Opt_vers_4_2,
0d71b058
TM
276
277 Opt_vers_err
278};
279
280static match_table_t nfs_vers_tokens = {
281 { Opt_vers_2, "2" },
282 { Opt_vers_3, "3" },
283 { Opt_vers_4, "4" },
284 { Opt_vers_4_0, "4.0" },
285 { Opt_vers_4_1, "4.1" },
42c2c424 286 { Opt_vers_4_2, "4.2" },
0d71b058
TM
287
288 { Opt_vers_err, NULL }
289};
bf0fd768 290
31f43471
AV
291static struct dentry *nfs_xdev_mount(struct file_system_type *fs_type,
292 int flags, const char *dev_name, void *raw_data);
f7b422b1 293
ab7017a3 294struct file_system_type nfs_fs_type = {
f7b422b1
DH
295 .owner = THIS_MODULE,
296 .name = "nfs",
01194981 297 .mount = nfs_fs_mount,
f7b422b1 298 .kill_sb = nfs_kill_super,
ecf3d1f1 299 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
f7b422b1 300};
7f78e035 301MODULE_ALIAS_FS("nfs");
ddda8e0a 302EXPORT_SYMBOL_GPL(nfs_fs_type);
f7b422b1 303
54ceac45 304struct file_system_type nfs_xdev_fs_type = {
f7b422b1
DH
305 .owner = THIS_MODULE,
306 .name = "nfs",
31f43471 307 .mount = nfs_xdev_mount,
f7b422b1 308 .kill_sb = nfs_kill_super,
ecf3d1f1 309 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
f7b422b1
DH
310};
311
6a74490d 312const struct super_operations nfs_sops = {
f7b422b1 313 .alloc_inode = nfs_alloc_inode,
ca1a199e 314 .free_inode = nfs_free_inode,
f7b422b1 315 .write_inode = nfs_write_inode,
eed99357 316 .drop_inode = nfs_drop_inode,
f7b422b1 317 .statfs = nfs_statfs,
b57922d9 318 .evict_inode = nfs_evict_inode,
f7b422b1
DH
319 .umount_begin = nfs_umount_begin,
320 .show_options = nfs_show_options,
c7f404b4
AV
321 .show_devname = nfs_show_devname,
322 .show_path = nfs_show_path,
f7b422b1 323 .show_stats = nfs_show_stats,
48b605f8 324 .remount_fs = nfs_remount,
f7b422b1 325};
ddda8e0a 326EXPORT_SYMBOL_GPL(nfs_sops);
f7b422b1 327
89d77c8f 328#if IS_ENABLED(CONFIG_NFS_V4)
b72e4f42 329static void nfs4_validate_mount_flags(struct nfs_parsed_mount_data *);
d72c727c
BS
330static int nfs4_validate_mount_data(void *options,
331 struct nfs_parsed_mount_data *args, const char *dev_name);
1ae811ee 332
333struct file_system_type nfs4_fs_type = {
334 .owner = THIS_MODULE,
335 .name = "nfs4",
336 .mount = nfs_fs_mount,
337 .kill_sb = nfs_kill_super,
ecf3d1f1 338 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
1ae811ee 339};
7f78e035 340MODULE_ALIAS_FS("nfs4");
fa7614dd 341MODULE_ALIAS("nfs4");
1ae811ee 342EXPORT_SYMBOL_GPL(nfs4_fs_type);
343
344static int __init register_nfs4_fs(void)
345{
346 return register_filesystem(&nfs4_fs_type);
347}
348
349static void unregister_nfs4_fs(void)
350{
351 unregister_filesystem(&nfs4_fs_type);
352}
353#else
354static int __init register_nfs4_fs(void)
355{
356 return 0;
357}
358
359static void unregister_nfs4_fs(void)
360{
361}
f7b422b1
DH
362#endif
363
8e1f936b 364static struct shrinker acl_shrinker = {
1ab6c499
DC
365 .count_objects = nfs_access_cache_count,
366 .scan_objects = nfs_access_cache_scan,
8e1f936b
RR
367 .seeks = DEFAULT_SEEKS,
368};
979df72e 369
f7b422b1
DH
370/*
371 * Register the NFS filesystems
372 */
373int __init register_nfs_fs(void)
374{
375 int ret;
376
377 ret = register_filesystem(&nfs_fs_type);
378 if (ret < 0)
379 goto error_0;
380
1ae811ee 381 ret = register_nfs4_fs();
f7b422b1
DH
382 if (ret < 0)
383 goto error_1;
1ae811ee 384
385 ret = nfs_register_sysctl();
386 if (ret < 0)
387 goto error_2;
5ef8d792
KM
388 ret = register_shrinker(&acl_shrinker);
389 if (ret < 0)
390 goto error_3;
f7b422b1 391 return 0;
5ef8d792
KM
392error_3:
393 nfs_unregister_sysctl();
1ae811ee 394error_2:
395 unregister_nfs4_fs();
f7b422b1
DH
396error_1:
397 unregister_filesystem(&nfs_fs_type);
f7b422b1
DH
398error_0:
399 return ret;
400}
401
402/*
403 * Unregister the NFS filesystems
404 */
405void __exit unregister_nfs_fs(void)
406{
8e1f936b 407 unregister_shrinker(&acl_shrinker);
49af7ee1 408 nfs_unregister_sysctl();
1ae811ee 409 unregister_nfs4_fs();
f7b422b1
DH
410 unregister_filesystem(&nfs_fs_type);
411}
412
ea7c38fe 413bool nfs_sb_active(struct super_block *sb)
ef818a28 414{
1daef0a8 415 struct nfs_server *server = NFS_SB(sb);
ef818a28 416
ea7c38fe
TM
417 if (!atomic_inc_not_zero(&sb->s_active))
418 return false;
419 if (atomic_inc_return(&server->active) != 1)
420 atomic_dec(&sb->s_active);
421 return true;
ef818a28 422}
89d77c8f 423EXPORT_SYMBOL_GPL(nfs_sb_active);
ef818a28 424
1daef0a8 425void nfs_sb_deactive(struct super_block *sb)
ef818a28
SD
426{
427 struct nfs_server *server = NFS_SB(sb);
1daef0a8
TM
428
429 if (atomic_dec_and_test(&server->active))
430 deactivate_super(sb);
ef818a28 431}
89d77c8f 432EXPORT_SYMBOL_GPL(nfs_sb_deactive);
ef818a28 433
f7b422b1
DH
434/*
435 * Deliver file system statistics to userspace
436 */
fbdefd64 437int nfs_statfs(struct dentry *dentry, struct kstatfs *buf)
f7b422b1 438{
0c7d90cf 439 struct nfs_server *server = NFS_SB(dentry->d_sb);
f7b422b1
DH
440 unsigned char blockbits;
441 unsigned long blockres;
2b0143b5 442 struct nfs_fh *fh = NFS_FH(d_inode(dentry));
ca7e9a0d
TM
443 struct nfs_fsstat res;
444 int error = -ENOMEM;
445
446 res.fattr = nfs_alloc_fattr();
447 if (res.fattr == NULL)
448 goto out_err;
f7b422b1 449
8fa5c000 450 error = server->nfs_client->rpc_ops->statfs(server, fh, &res);
fbf3fdd2
MZ
451 if (unlikely(error == -ESTALE)) {
452 struct dentry *pd_dentry;
453
454 pd_dentry = dget_parent(dentry);
455 if (pd_dentry != NULL) {
2b0143b5 456 nfs_zap_caches(d_inode(pd_dentry));
fbf3fdd2
MZ
457 dput(pd_dentry);
458 }
459 }
ca7e9a0d 460 nfs_free_fattr(res.fattr);
f7b422b1
DH
461 if (error < 0)
462 goto out_err;
ca7e9a0d 463
1a0ba9ae 464 buf->f_type = NFS_SUPER_MAGIC;
f7b422b1
DH
465
466 /*
467 * Current versions of glibc do not correctly handle the
468 * case where f_frsize != f_bsize. Eventually we want to
469 * report the value of wtmult in this field.
470 */
0c7d90cf 471 buf->f_frsize = dentry->d_sb->s_blocksize;
f7b422b1
DH
472
473 /*
474 * On most *nix systems, f_blocks, f_bfree, and f_bavail
475 * are reported in units of f_frsize. Linux hasn't had
476 * an f_frsize field in its statfs struct until recently,
477 * thus historically Linux's sys_statfs reports these
478 * fields in units of f_bsize.
479 */
0c7d90cf
DH
480 buf->f_bsize = dentry->d_sb->s_blocksize;
481 blockbits = dentry->d_sb->s_blocksize_bits;
f7b422b1
DH
482 blockres = (1 << blockbits) - 1;
483 buf->f_blocks = (res.tbytes + blockres) >> blockbits;
484 buf->f_bfree = (res.fbytes + blockres) >> blockbits;
485 buf->f_bavail = (res.abytes + blockres) >> blockbits;
486
487 buf->f_files = res.tfiles;
488 buf->f_ffree = res.afiles;
489
490 buf->f_namelen = server->namelen;
1a0ba9ae 491
f7b422b1
DH
492 return 0;
493
494 out_err:
3110ff80 495 dprintk("%s: statfs error = %d\n", __func__, -error);
1a0ba9ae 496 return error;
f7b422b1 497}
89d77c8f 498EXPORT_SYMBOL_GPL(nfs_statfs);
f7b422b1 499
7d4e2747
DH
500/*
501 * Map the security flavour number to a name
502 */
81039f1f
TM
503static const char *nfs_pseudoflavour_to_name(rpc_authflavor_t flavour)
504{
7d4e2747 505 static const struct {
81039f1f
TM
506 rpc_authflavor_t flavour;
507 const char *str;
4d4b69dd
WAA
508 } sec_flavours[NFS_AUTH_INFO_MAX_FLAVORS] = {
509 /* update NFS_AUTH_INFO_MAX_FLAVORS when this list changes! */
81039f1f
TM
510 { RPC_AUTH_NULL, "null" },
511 { RPC_AUTH_UNIX, "sys" },
512 { RPC_AUTH_GSS_KRB5, "krb5" },
513 { RPC_AUTH_GSS_KRB5I, "krb5i" },
514 { RPC_AUTH_GSS_KRB5P, "krb5p" },
515 { RPC_AUTH_GSS_LKEY, "lkey" },
516 { RPC_AUTH_GSS_LKEYI, "lkeyi" },
517 { RPC_AUTH_GSS_LKEYP, "lkeyp" },
518 { RPC_AUTH_GSS_SPKM, "spkm" },
519 { RPC_AUTH_GSS_SPKMI, "spkmi" },
520 { RPC_AUTH_GSS_SPKMP, "spkmp" },
4d81cd16 521 { UINT_MAX, "unknown" }
81039f1f
TM
522 };
523 int i;
524
4d81cd16 525 for (i = 0; sec_flavours[i].flavour != UINT_MAX; i++) {
81039f1f
TM
526 if (sec_flavours[i].flavour == flavour)
527 break;
528 }
529 return sec_flavours[i].str;
530}
531
ee671b01
JL
532static void nfs_show_mountd_netid(struct seq_file *m, struct nfs_server *nfss,
533 int showdefaults)
534{
535 struct sockaddr *sap = (struct sockaddr *) &nfss->mountd_address;
6f6e3c09 536 char *proto = NULL;
ee671b01 537
ee671b01
JL
538 switch (sap->sa_family) {
539 case AF_INET:
540 switch (nfss->mountd_protocol) {
541 case IPPROTO_UDP:
6f6e3c09 542 proto = RPCBIND_NETID_UDP;
ee671b01
JL
543 break;
544 case IPPROTO_TCP:
6f6e3c09 545 proto = RPCBIND_NETID_TCP;
ee671b01 546 break;
ee671b01
JL
547 }
548 break;
549 case AF_INET6:
550 switch (nfss->mountd_protocol) {
551 case IPPROTO_UDP:
6f6e3c09 552 proto = RPCBIND_NETID_UDP6;
ee671b01
JL
553 break;
554 case IPPROTO_TCP:
6f6e3c09 555 proto = RPCBIND_NETID_TCP6;
ee671b01 556 break;
ee671b01
JL
557 }
558 break;
ee671b01 559 }
6f6e3c09
N
560 if (proto || showdefaults)
561 seq_printf(m, ",mountproto=%s", proto ?: "auto");
ee671b01
JL
562}
563
82d101d5
CL
564static void nfs_show_mountd_options(struct seq_file *m, struct nfs_server *nfss,
565 int showdefaults)
566{
567 struct sockaddr *sap = (struct sockaddr *)&nfss->mountd_address;
568
d5eff1a3
BS
569 if (nfss->flags & NFS_MOUNT_LEGACY_INTERFACE)
570 return;
571
82d101d5
CL
572 switch (sap->sa_family) {
573 case AF_INET: {
574 struct sockaddr_in *sin = (struct sockaddr_in *)sap;
be859405 575 seq_printf(m, ",mountaddr=%pI4", &sin->sin_addr.s_addr);
82d101d5
CL
576 break;
577 }
578 case AF_INET6: {
579 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap;
d250e190 580 seq_printf(m, ",mountaddr=%pI6c", &sin6->sin6_addr);
82d101d5
CL
581 break;
582 }
583 default:
584 if (showdefaults)
585 seq_printf(m, ",mountaddr=unspecified");
586 }
587
588 if (nfss->mountd_version || showdefaults)
589 seq_printf(m, ",mountvers=%u", nfss->mountd_version);
aa699473
SK
590 if ((nfss->mountd_port &&
591 nfss->mountd_port != (unsigned short)NFS_UNSPEC_PORT) ||
592 showdefaults)
82d101d5
CL
593 seq_printf(m, ",mountport=%u", nfss->mountd_port);
594
ee671b01 595 nfs_show_mountd_netid(m, nfss, showdefaults);
82d101d5
CL
596}
597
89d77c8f 598#if IS_ENABLED(CONFIG_NFS_V4)
0be8189f
TM
599static void nfs_show_nfsv4_options(struct seq_file *m, struct nfs_server *nfss,
600 int showdefaults)
601{
602 struct nfs_client *clp = nfss->nfs_client;
603
604 seq_printf(m, ",clientaddr=%s", clp->cl_ipaddr);
0be8189f
TM
605}
606#else
607static void nfs_show_nfsv4_options(struct seq_file *m, struct nfs_server *nfss,
608 int showdefaults)
609{
610}
611#endif
612
7bbceb6f
TM
613static void nfs_show_nfs_version(struct seq_file *m,
614 unsigned int version,
615 unsigned int minorversion)
616{
617 seq_printf(m, ",vers=%u", version);
618 if (version == 4)
619 seq_printf(m, ".%u", minorversion);
620}
621
f7b422b1
DH
622/*
623 * Describe the mount options in force on this server representation
624 */
82d101d5
CL
625static void nfs_show_mount_options(struct seq_file *m, struct nfs_server *nfss,
626 int showdefaults)
f7b422b1 627{
509de811 628 static const struct proc_nfs_info {
f7b422b1 629 int flag;
509de811
DH
630 const char *str;
631 const char *nostr;
f7b422b1 632 } nfs_info[] = {
91a575e1
TM
633 { NFS_MOUNT_SOFT, ",soft", "" },
634 { NFS_MOUNT_SOFTERR, ",softerr", "" },
82d101d5 635 { NFS_MOUNT_POSIX, ",posix", "" },
f7b422b1
DH
636 { NFS_MOUNT_NOCTO, ",nocto", "" },
637 { NFS_MOUNT_NOAC, ",noac", "" },
638 { NFS_MOUNT_NONLM, ",nolock", "" },
639 { NFS_MOUNT_NOACL, ",noacl", "" },
74dd34e6 640 { NFS_MOUNT_NORDIRPLUS, ",nordirplus", "" },
d740351b
CL
641 { NFS_MOUNT_UNSHARED, ",nosharecache", "" },
642 { NFS_MOUNT_NORESVPORT, ",noresvport", "" },
f7b422b1
DH
643 { 0, NULL, NULL }
644 };
509de811 645 const struct proc_nfs_info *nfs_infop;
8fa5c000 646 struct nfs_client *clp = nfss->nfs_client;
82d101d5 647 u32 version = clp->rpc_ops->version;
7c563cc9 648 int local_flock, local_fcntl;
f7b422b1 649
7bbceb6f 650 nfs_show_nfs_version(m, version, clp->cl_minorversion);
2d767432
CL
651 seq_printf(m, ",rsize=%u", nfss->rsize);
652 seq_printf(m, ",wsize=%u", nfss->wsize);
82d101d5
CL
653 if (nfss->bsize != 0)
654 seq_printf(m, ",bsize=%u", nfss->bsize);
655 seq_printf(m, ",namlen=%u", nfss->namelen);
0e0cab74 656 if (nfss->acregmin != NFS_DEF_ACREGMIN*HZ || showdefaults)
2d767432 657 seq_printf(m, ",acregmin=%u", nfss->acregmin/HZ);
0e0cab74 658 if (nfss->acregmax != NFS_DEF_ACREGMAX*HZ || showdefaults)
2d767432 659 seq_printf(m, ",acregmax=%u", nfss->acregmax/HZ);
0e0cab74 660 if (nfss->acdirmin != NFS_DEF_ACDIRMIN*HZ || showdefaults)
2d767432 661 seq_printf(m, ",acdirmin=%u", nfss->acdirmin/HZ);
0e0cab74 662 if (nfss->acdirmax != NFS_DEF_ACDIRMAX*HZ || showdefaults)
2d767432 663 seq_printf(m, ",acdirmax=%u", nfss->acdirmax/HZ);
91a575e1
TM
664 if (!(nfss->flags & (NFS_MOUNT_SOFT|NFS_MOUNT_SOFTERR)))
665 seq_puts(m, ",hard");
f7b422b1
DH
666 for (nfs_infop = nfs_info; nfs_infop->flag; nfs_infop++) {
667 if (nfss->flags & nfs_infop->flag)
668 seq_puts(m, nfs_infop->str);
669 else
670 seq_puts(m, nfs_infop->nostr);
671 }
2446ab60 672 rcu_read_lock();
56928edd 673 seq_printf(m, ",proto=%s",
ee671b01 674 rpc_peeraddr2str(nfss->client, RPC_DISPLAY_NETID));
2446ab60 675 rcu_read_unlock();
82d101d5
CL
676 if (version == 4) {
677 if (nfss->port != NFS_PORT)
678 seq_printf(m, ",port=%u", nfss->port);
679 } else
680 if (nfss->port)
681 seq_printf(m, ",port=%u", nfss->port);
682
33170233
TM
683 seq_printf(m, ",timeo=%lu", 10U * nfss->client->cl_timeout->to_initval / HZ);
684 seq_printf(m, ",retrans=%u", nfss->client->cl_timeout->to_retries);
81039f1f 685 seq_printf(m, ",sec=%s", nfs_pseudoflavour_to_name(nfss->client->cl_auth->au_flavor));
82d101d5
CL
686
687 if (version != 4)
688 nfs_show_mountd_options(m, nfss, showdefaults);
0be8189f
TM
689 else
690 nfs_show_nfsv4_options(m, nfss, showdefaults);
82d101d5 691
b797cac7
DH
692 if (nfss->options & NFS_OPTION_FSCACHE)
693 seq_printf(m, ",fsc");
9b00c643 694
89652617
CL
695 if (nfss->options & NFS_OPTION_MIGRATION)
696 seq_printf(m, ",migration");
697
9b00c643
PL
698 if (nfss->flags & NFS_MOUNT_LOOKUP_CACHE_NONEG) {
699 if (nfss->flags & NFS_MOUNT_LOOKUP_CACHE_NONE)
700 seq_printf(m, ",lookupcache=none");
701 else
702 seq_printf(m, ",lookupcache=pos");
703 }
7c563cc9
SJ
704
705 local_flock = nfss->flags & NFS_MOUNT_LOCAL_FLOCK;
706 local_fcntl = nfss->flags & NFS_MOUNT_LOCAL_FCNTL;
707
708 if (!local_flock && !local_fcntl)
709 seq_printf(m, ",local_lock=none");
710 else if (local_flock && local_fcntl)
711 seq_printf(m, ",local_lock=all");
712 else if (local_flock)
713 seq_printf(m, ",local_lock=flock");
714 else
715 seq_printf(m, ",local_lock=posix");
f7b422b1
DH
716}
717
718/*
719 * Describe the mount options on this VFS mountpoint
720 */
fbdefd64 721int nfs_show_options(struct seq_file *m, struct dentry *root)
f7b422b1 722{
34c80b1d 723 struct nfs_server *nfss = NFS_SB(root->d_sb);
f7b422b1
DH
724
725 nfs_show_mount_options(m, nfss, 0);
726
2446ab60 727 rcu_read_lock();
5d8515ca
CL
728 seq_printf(m, ",addr=%s",
729 rpc_peeraddr2str(nfss->nfs_client->cl_rpcclient,
730 RPC_DISPLAY_ADDR));
2446ab60 731 rcu_read_unlock();
f7b422b1
DH
732
733 return 0;
734}
89d77c8f 735EXPORT_SYMBOL_GPL(nfs_show_options);
45402c38 736
89d77c8f 737#if IS_ENABLED(CONFIG_NFS_V4)
ae50c0b5 738#ifdef CONFIG_NFS_V4_1
45402c38 739static void show_sessions(struct seq_file *m, struct nfs_server *server)
ae50c0b5
BF
740{
741 if (nfs4_has_session(server->nfs_client))
742 seq_printf(m, ",sessions");
743}
744#else
45402c38
HS
745static void show_sessions(struct seq_file *m, struct nfs_server *server) {}
746#endif
ae50c0b5
BF
747#endif
748
749#ifdef CONFIG_NFS_V4_1
45402c38 750static void show_pnfs(struct seq_file *m, struct nfs_server *server)
ae50c0b5
BF
751{
752 seq_printf(m, ",pnfs=");
753 if (server->pnfs_curr_ld)
754 seq_printf(m, "%s", server->pnfs_curr_ld->name);
755 else
756 seq_printf(m, "not configured");
757}
7e03b7cc
TM
758
759static void show_implementation_id(struct seq_file *m, struct nfs_server *nfss)
760{
59155546
CL
761 if (nfss->nfs_client && nfss->nfs_client->cl_implid) {
762 struct nfs41_impl_id *impl_id = nfss->nfs_client->cl_implid;
7e03b7cc
TM
763 seq_printf(m, "\n\timpl_id:\tname='%s',domain='%s',"
764 "date='%llu,%u'",
765 impl_id->name, impl_id->domain,
766 impl_id->date.seconds, impl_id->date.nseconds);
767 }
768}
45402c38 769#else
89d77c8f 770#if IS_ENABLED(CONFIG_NFS_V4)
7e03b7cc
TM
771static void show_pnfs(struct seq_file *m, struct nfs_server *server)
772{
773}
45402c38 774#endif
7e03b7cc
TM
775static void show_implementation_id(struct seq_file *m, struct nfs_server *nfss)
776{
777}
45402c38 778#endif
f7b422b1 779
fbdefd64 780int nfs_show_devname(struct seq_file *m, struct dentry *root)
c7f404b4
AV
781{
782 char *page = (char *) __get_free_page(GFP_KERNEL);
783 char *devname, *dummy;
784 int err = 0;
785 if (!page)
786 return -ENOMEM;
97a54868 787 devname = nfs_path(&dummy, root, page, PAGE_SIZE, 0);
c7f404b4
AV
788 if (IS_ERR(devname))
789 err = PTR_ERR(devname);
790 else
791 seq_escape(m, devname, " \t\n\\");
792 free_page((unsigned long)page);
793 return err;
794}
89d77c8f 795EXPORT_SYMBOL_GPL(nfs_show_devname);
c7f404b4 796
fbdefd64 797int nfs_show_path(struct seq_file *m, struct dentry *dentry)
c7f404b4
AV
798{
799 seq_puts(m, "/");
800 return 0;
801}
89d77c8f 802EXPORT_SYMBOL_GPL(nfs_show_path);
c7f404b4 803
f7b422b1
DH
804/*
805 * Present statistical information for this VFS mountpoint
806 */
fbdefd64 807int nfs_show_stats(struct seq_file *m, struct dentry *root)
f7b422b1
DH
808{
809 int i, cpu;
64132379 810 struct nfs_server *nfss = NFS_SB(root->d_sb);
f7b422b1
DH
811 struct rpc_auth *auth = nfss->client->cl_auth;
812 struct nfs_iostats totals = { };
813
814 seq_printf(m, "statvers=%s", NFS_IOSTAT_VERS);
815
816 /*
817 * Display all mount option settings
818 */
819 seq_printf(m, "\n\topts:\t");
bc98a42c 820 seq_puts(m, sb_rdonly(root->d_sb) ? "ro" : "rw");
1751e8a6
LT
821 seq_puts(m, root->d_sb->s_flags & SB_SYNCHRONOUS ? ",sync" : "");
822 seq_puts(m, root->d_sb->s_flags & SB_NOATIME ? ",noatime" : "");
823 seq_puts(m, root->d_sb->s_flags & SB_NODIRATIME ? ",nodiratime" : "");
f7b422b1
DH
824 nfs_show_mount_options(m, nfss, 1);
825
826 seq_printf(m, "\n\tage:\t%lu", (jiffies - nfss->mount_time) / HZ);
827
7e03b7cc 828 show_implementation_id(m, nfss);
7d2ed9ac 829
f7b422b1
DH
830 seq_printf(m, "\n\tcaps:\t");
831 seq_printf(m, "caps=0x%x", nfss->caps);
2d767432
CL
832 seq_printf(m, ",wtmult=%u", nfss->wtmult);
833 seq_printf(m, ",dtsize=%u", nfss->dtsize);
834 seq_printf(m, ",bsize=%u", nfss->bsize);
835 seq_printf(m, ",namlen=%u", nfss->namelen);
f7b422b1 836
89d77c8f 837#if IS_ENABLED(CONFIG_NFS_V4)
40c55319 838 if (nfss->nfs_client->rpc_ops->version == 4) {
f7b422b1
DH
839 seq_printf(m, "\n\tnfsv4:\t");
840 seq_printf(m, "bm0=0x%x", nfss->attr_bitmask[0]);
841 seq_printf(m, ",bm1=0x%x", nfss->attr_bitmask[1]);
a09df2ca 842 seq_printf(m, ",bm2=0x%x", nfss->attr_bitmask[2]);
f7b422b1 843 seq_printf(m, ",acl=0x%x", nfss->acl_bitmask);
ae50c0b5
BF
844 show_sessions(m, nfss);
845 show_pnfs(m, nfss);
f7b422b1
DH
846 }
847#endif
848
849 /*
850 * Display security flavor in effect for this mount
851 */
2d767432 852 seq_printf(m, "\n\tsec:\tflavor=%u", auth->au_ops->au_flavor);
f7b422b1 853 if (auth->au_flavor)
2d767432 854 seq_printf(m, ",pseudoflavor=%u", auth->au_flavor);
f7b422b1
DH
855
856 /*
857 * Display superblock I/O counters
858 */
859 for_each_possible_cpu(cpu) {
860 struct nfs_iostats *stats;
861
862 preempt_disable();
863 stats = per_cpu_ptr(nfss->io_stats, cpu);
864
865 for (i = 0; i < __NFSIOS_COUNTSMAX; i++)
866 totals.events[i] += stats->events[i];
867 for (i = 0; i < __NFSIOS_BYTESMAX; i++)
868 totals.bytes[i] += stats->bytes[i];
6a51091d
DH
869#ifdef CONFIG_NFS_FSCACHE
870 for (i = 0; i < __NFSIOS_FSCACHEMAX; i++)
871 totals.fscache[i] += stats->fscache[i];
872#endif
f7b422b1
DH
873
874 preempt_enable();
875 }
876
877 seq_printf(m, "\n\tevents:\t");
878 for (i = 0; i < __NFSIOS_COUNTSMAX; i++)
879 seq_printf(m, "%lu ", totals.events[i]);
880 seq_printf(m, "\n\tbytes:\t");
881 for (i = 0; i < __NFSIOS_BYTESMAX; i++)
882 seq_printf(m, "%Lu ", totals.bytes[i]);
6a51091d
DH
883#ifdef CONFIG_NFS_FSCACHE
884 if (nfss->options & NFS_OPTION_FSCACHE) {
885 seq_printf(m, "\n\tfsc:\t");
886 for (i = 0; i < __NFSIOS_FSCACHEMAX; i++)
ce85bd29 887 seq_printf(m, "%Lu ", totals.fscache[i]);
6a51091d
DH
888 }
889#endif
f7b422b1
DH
890 seq_printf(m, "\n");
891
016583d7 892 rpc_clnt_show_stats(m, nfss->client);
f7b422b1
DH
893
894 return 0;
895}
89d77c8f 896EXPORT_SYMBOL_GPL(nfs_show_stats);
f7b422b1
DH
897
898/*
899 * Begin unmount by attempting to remove all automounted mountpoints we added
54ceac45 900 * in response to xdev traversals and referrals
f7b422b1 901 */
fbdefd64 902void nfs_umount_begin(struct super_block *sb)
f7b422b1 903{
67e55205 904 struct nfs_server *server;
fc6ae3cf
TM
905 struct rpc_clnt *rpc;
906
67e55205 907 server = NFS_SB(sb);
fc6ae3cf
TM
908 /* -EIO all pending I/O */
909 rpc = server->client_acl;
910 if (!IS_ERR(rpc))
911 rpc_killall_tasks(rpc);
912 rpc = server->client;
913 if (!IS_ERR(rpc))
914 rpc_killall_tasks(rpc);
f7b422b1 915}
89d77c8f 916EXPORT_SYMBOL_GPL(nfs_umount_begin);
f7b422b1 917
db833351 918static struct nfs_parsed_mount_data *nfs_alloc_parsed_mount_data(void)
9423a08a
CL
919{
920 struct nfs_parsed_mount_data *data;
921
922 data = kzalloc(sizeof(*data), GFP_KERNEL);
923 if (data) {
a956beda
TM
924 data->timeo = NFS_UNSPEC_TIMEO;
925 data->retrans = NFS_UNSPEC_RETRANS;
9423a08a
CL
926 data->acregmin = NFS_DEF_ACREGMIN;
927 data->acregmax = NFS_DEF_ACREGMAX;
928 data->acdirmin = NFS_DEF_ACDIRMIN;
929 data->acdirmax = NFS_DEF_ACDIRMAX;
c5811dbd 930 data->mount_server.port = NFS_UNSPEC_PORT;
9423a08a 931 data->nfs_server.port = NFS_UNSPEC_PORT;
c5811dbd 932 data->nfs_server.protocol = XPRT_TRANSPORT_TCP;
a3f73c27 933 data->selected_flavor = RPC_AUTH_MAXFLAVOR;
9423a08a 934 data->minorversion = 0;
b72e4f42 935 data->need_mount = true;
9937347a 936 data->net = current->nsproxy->net_ns;
204cc0cc 937 data->lsm_opts = NULL;
9423a08a
CL
938 }
939 return data;
940}
941
8a0d551a
JL
942static void nfs_free_parsed_mount_data(struct nfs_parsed_mount_data *data)
943{
944 if (data) {
945 kfree(data->client_address);
946 kfree(data->mount_server.hostname);
947 kfree(data->nfs_server.export_path);
948 kfree(data->nfs_server.hostname);
949 kfree(data->fscache_uniq);
950 security_free_mnt_opts(&data->lsm_opts);
951 kfree(data);
952 }
953}
954
fc50d58f 955/*
cdcd7f9a
CL
956 * Sanity-check a server address provided by the mount command.
957 *
958 * Address family must be initialized, and address must not be
959 * the ANY address for that family.
fc50d58f
CL
960 */
961static int nfs_verify_server_address(struct sockaddr *addr)
962{
963 switch (addr->sa_family) {
964 case AF_INET: {
cdcd7f9a 965 struct sockaddr_in *sa = (struct sockaddr_in *)addr;
e6f1cebf 966 return sa->sin_addr.s_addr != htonl(INADDR_ANY);
cdcd7f9a
CL
967 }
968 case AF_INET6: {
969 struct in6_addr *sa = &((struct sockaddr_in6 *)addr)->sin6_addr;
970 return !ipv6_addr_any(sa);
fc50d58f
CL
971 }
972 }
973
53a0b9c4 974 dfprintk(MOUNT, "NFS: Invalid IP address specified\n");
fc50d58f
CL
975 return 0;
976}
977
4cfd74fc
CL
978/*
979 * Select between a default port value and a user-specified port value.
980 * If a zero value is set, then autobind will be used.
981 */
f5855fec 982static void nfs_set_port(struct sockaddr *sap, int *port,
4cfd74fc
CL
983 const unsigned short default_port)
984{
f5855fec
TM
985 if (*port == NFS_UNSPEC_PORT)
986 *port = default_port;
4cfd74fc 987
f5855fec 988 rpc_set_port(sap, *port);
4cfd74fc
CL
989}
990
259875ef
TM
991/*
992 * Sanity check the NFS transport protocol.
993 *
994 */
995static void nfs_validate_transport_protocol(struct nfs_parsed_mount_data *mnt)
996{
997 switch (mnt->nfs_server.protocol) {
998 case XPRT_TRANSPORT_UDP:
999 case XPRT_TRANSPORT_TCP:
1000 case XPRT_TRANSPORT_RDMA:
1001 break;
1002 default:
1003 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
1004 }
1005}
1006
1007/*
1008 * For text based NFSv2/v3 mounts, the mount protocol transport default
1009 * settings should depend upon the specified NFS transport.
1010 */
1011static void nfs_set_mount_transport_protocol(struct nfs_parsed_mount_data *mnt)
1012{
1013 nfs_validate_transport_protocol(mnt);
1014
1015 if (mnt->mount_server.protocol == XPRT_TRANSPORT_UDP ||
1016 mnt->mount_server.protocol == XPRT_TRANSPORT_TCP)
1017 return;
1018 switch (mnt->nfs_server.protocol) {
1019 case XPRT_TRANSPORT_UDP:
1020 mnt->mount_server.protocol = XPRT_TRANSPORT_UDP;
1021 break;
1022 case XPRT_TRANSPORT_TCP:
1023 case XPRT_TRANSPORT_RDMA:
1024 mnt->mount_server.protocol = XPRT_TRANSPORT_TCP;
1025 }
1026}
1027
4d4b69dd
WAA
1028/*
1029 * Add 'flavor' to 'auth_info' if not already present.
1030 * Returns true if 'flavor' ends up in the list, false otherwise
1031 */
1032static bool nfs_auth_info_add(struct nfs_auth_info *auth_info,
1033 rpc_authflavor_t flavor)
1034{
1035 unsigned int i;
00216026 1036 unsigned int max_flavor_len = ARRAY_SIZE(auth_info->flavors);
4d4b69dd
WAA
1037
1038 /* make sure this flavor isn't already in the list */
1039 for (i = 0; i < auth_info->flavor_len; i++) {
1040 if (flavor == auth_info->flavors[i])
1041 return true;
1042 }
1043
1044 if (auth_info->flavor_len + 1 >= max_flavor_len) {
1045 dfprintk(MOUNT, "NFS: too many sec= flavors\n");
1046 return false;
1047 }
1048
1049 auth_info->flavors[auth_info->flavor_len++] = flavor;
1050 return true;
1051}
1052
1053/*
1054 * Return true if 'match' is in auth_info or auth_info is empty.
1055 * Return false otherwise.
1056 */
1057bool nfs_auth_info_match(const struct nfs_auth_info *auth_info,
1058 rpc_authflavor_t match)
1059{
1060 int i;
1061
1062 if (!auth_info->flavor_len)
1063 return true;
1064
1065 for (i = 0; i < auth_info->flavor_len; i++) {
1066 if (auth_info->flavors[i] == match)
1067 return true;
1068 }
1069 return false;
1070}
1071EXPORT_SYMBOL_GPL(nfs_auth_info_match);
1072
01060c89
CL
1073/*
1074 * Parse the value of the 'sec=' option.
01060c89
CL
1075 */
1076static int nfs_parse_security_flavors(char *value,
1077 struct nfs_parsed_mount_data *mnt)
1078{
1079 substring_t args[MAX_OPT_ARGS];
19e7b8d2 1080 rpc_authflavor_t pseudoflavor;
4d4b69dd 1081 char *p;
01060c89
CL
1082
1083 dfprintk(MOUNT, "NFS: parsing sec=%s option\n", value);
1084
4d4b69dd
WAA
1085 while ((p = strsep(&value, ":")) != NULL) {
1086 switch (match_token(p, nfs_secflavor_tokens, args)) {
1087 case Opt_sec_none:
1088 pseudoflavor = RPC_AUTH_NULL;
1089 break;
1090 case Opt_sec_sys:
1091 pseudoflavor = RPC_AUTH_UNIX;
1092 break;
1093 case Opt_sec_krb5:
1094 pseudoflavor = RPC_AUTH_GSS_KRB5;
1095 break;
1096 case Opt_sec_krb5i:
1097 pseudoflavor = RPC_AUTH_GSS_KRB5I;
1098 break;
1099 case Opt_sec_krb5p:
1100 pseudoflavor = RPC_AUTH_GSS_KRB5P;
1101 break;
1102 case Opt_sec_lkey:
1103 pseudoflavor = RPC_AUTH_GSS_LKEY;
1104 break;
1105 case Opt_sec_lkeyi:
1106 pseudoflavor = RPC_AUTH_GSS_LKEYI;
1107 break;
1108 case Opt_sec_lkeyp:
1109 pseudoflavor = RPC_AUTH_GSS_LKEYP;
1110 break;
1111 case Opt_sec_spkm:
1112 pseudoflavor = RPC_AUTH_GSS_SPKM;
1113 break;
1114 case Opt_sec_spkmi:
1115 pseudoflavor = RPC_AUTH_GSS_SPKMI;
1116 break;
1117 case Opt_sec_spkmp:
1118 pseudoflavor = RPC_AUTH_GSS_SPKMP;
1119 break;
1120 default:
1121 dfprintk(MOUNT,
1122 "NFS: sec= option '%s' not recognized\n", p);
1123 return 0;
1124 }
1125
1126 if (!nfs_auth_info_add(&mnt->auth_info, pseudoflavor))
1127 return 0;
01060c89
CL
1128 }
1129
1130 return 1;
1131}
1132
0d71b058
TM
1133static int nfs_parse_version_string(char *string,
1134 struct nfs_parsed_mount_data *mnt,
1135 substring_t *args)
1136{
1137 mnt->flags &= ~NFS_MOUNT_VER3;
1138 switch (match_token(string, nfs_vers_tokens, args)) {
1139 case Opt_vers_2:
1140 mnt->version = 2;
1141 break;
1142 case Opt_vers_3:
1143 mnt->flags |= NFS_MOUNT_VER3;
1144 mnt->version = 3;
1145 break;
1146 case Opt_vers_4:
1147 /* Backward compatibility option. In future,
1148 * the mount program should always supply
1149 * a NFSv4 minor version number.
1150 */
1151 mnt->version = 4;
1152 break;
1153 case Opt_vers_4_0:
1154 mnt->version = 4;
1155 mnt->minorversion = 0;
1156 break;
1157 case Opt_vers_4_1:
1158 mnt->version = 4;
1159 mnt->minorversion = 1;
1160 break;
42c2c424
SD
1161 case Opt_vers_4_2:
1162 mnt->version = 4;
1163 mnt->minorversion = 2;
1164 break;
0d71b058
TM
1165 default:
1166 return 0;
1167 }
1168 return 1;
1169}
1170
c5cb09b6
RL
1171static int nfs_get_option_str(substring_t args[], char **option)
1172{
1173 kfree(*option);
1174 *option = match_strdup(args);
e25fbe38 1175 return !*option;
c5cb09b6
RL
1176}
1177
1178static int nfs_get_option_ul(substring_t args[], unsigned long *option)
1179{
1180 int rc;
1181 char *string;
1182
1183 string = match_strdup(args);
1184 if (string == NULL)
1185 return -ENOMEM;
7297cb68 1186 rc = kstrtoul(string, 10, option);
c5cb09b6
RL
1187 kfree(string);
1188
1189 return rc;
1190}
1191
a956beda
TM
1192static int nfs_get_option_ul_bound(substring_t args[], unsigned long *option,
1193 unsigned long l_bound, unsigned long u_bound)
1194{
1195 int ret;
1196
1197 ret = nfs_get_option_ul(args, option);
1198 if (ret != 0)
1199 return ret;
1200 if (*option < l_bound || *option > u_bound)
1201 return -ERANGE;
1202 return 0;
1203}
1204
bf0fd768
CL
1205/*
1206 * Error-check and convert a string of mount options from user space into
f45663ce
CL
1207 * a data structure. The whole mount string is processed; bad options are
1208 * skipped as they are encountered. If there were no errors, return 1;
1209 * otherwise return 0 (zero).
bf0fd768
CL
1210 */
1211static int nfs_parse_mount_options(char *raw,
1212 struct nfs_parsed_mount_data *mnt)
1213{
f5c0c26d 1214 char *p, *string;
d23c45fd 1215 int rc, sloppy = 0, invalid_option = 0;
ee671b01
JL
1216 unsigned short protofamily = AF_UNSPEC;
1217 unsigned short mountfamily = AF_UNSPEC;
bf0fd768
CL
1218
1219 if (!raw) {
1220 dfprintk(MOUNT, "NFS: mount options string was NULL.\n");
1221 return 1;
1222 }
1223 dfprintk(MOUNT, "NFS: nfs mount opts='%s'\n", raw);
1224
f5c0c26d 1225 rc = security_sb_eat_lsm_opts(raw, &mnt->lsm_opts);
f9c3a380
EP
1226 if (rc)
1227 goto out_security_failure;
1228
bf0fd768
CL
1229 while ((p = strsep(&raw, ",")) != NULL) {
1230 substring_t args[MAX_OPT_ARGS];
a5a16bae
CL
1231 unsigned long option;
1232 int token;
bf0fd768
CL
1233
1234 if (!*p)
1235 continue;
1236
1237 dfprintk(MOUNT, "NFS: parsing nfs mount option '%s'\n", p);
1238
1239 token = match_token(p, nfs_mount_option_tokens, args);
1240 switch (token) {
f45663ce
CL
1241
1242 /*
1243 * boolean options: foo/nofoo
1244 */
bf0fd768
CL
1245 case Opt_soft:
1246 mnt->flags |= NFS_MOUNT_SOFT;
91a575e1 1247 mnt->flags &= ~NFS_MOUNT_SOFTERR;
bf0fd768 1248 break;
91a575e1
TM
1249 case Opt_softerr:
1250 mnt->flags |= NFS_MOUNT_SOFTERR;
bf0fd768
CL
1251 mnt->flags &= ~NFS_MOUNT_SOFT;
1252 break;
91a575e1
TM
1253 case Opt_hard:
1254 mnt->flags &= ~(NFS_MOUNT_SOFT|NFS_MOUNT_SOFTERR);
1255 break;
bf0fd768
CL
1256 case Opt_posix:
1257 mnt->flags |= NFS_MOUNT_POSIX;
1258 break;
1259 case Opt_noposix:
1260 mnt->flags &= ~NFS_MOUNT_POSIX;
1261 break;
1262 case Opt_cto:
1263 mnt->flags &= ~NFS_MOUNT_NOCTO;
1264 break;
1265 case Opt_nocto:
1266 mnt->flags |= NFS_MOUNT_NOCTO;
1267 break;
1268 case Opt_ac:
1269 mnt->flags &= ~NFS_MOUNT_NOAC;
1270 break;
1271 case Opt_noac:
1272 mnt->flags |= NFS_MOUNT_NOAC;
1273 break;
1274 case Opt_lock:
1275 mnt->flags &= ~NFS_MOUNT_NONLM;
5eebde23
SJ
1276 mnt->flags &= ~(NFS_MOUNT_LOCAL_FLOCK |
1277 NFS_MOUNT_LOCAL_FCNTL);
bf0fd768
CL
1278 break;
1279 case Opt_nolock:
1280 mnt->flags |= NFS_MOUNT_NONLM;
5eebde23
SJ
1281 mnt->flags |= (NFS_MOUNT_LOCAL_FLOCK |
1282 NFS_MOUNT_LOCAL_FCNTL);
bf0fd768 1283 break;
bf0fd768
CL
1284 case Opt_udp:
1285 mnt->flags &= ~NFS_MOUNT_TCP;
0896a725 1286 mnt->nfs_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768
CL
1287 break;
1288 case Opt_tcp:
1289 mnt->flags |= NFS_MOUNT_TCP;
0896a725 1290 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1291 break;
2cf7ff7a
TT
1292 case Opt_rdma:
1293 mnt->flags |= NFS_MOUNT_TCP; /* for side protocols */
1294 mnt->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
a67d18f8 1295 xprt_load_transport(p);
2cf7ff7a 1296 break;
bf0fd768
CL
1297 case Opt_acl:
1298 mnt->flags &= ~NFS_MOUNT_NOACL;
1299 break;
1300 case Opt_noacl:
1301 mnt->flags |= NFS_MOUNT_NOACL;
1302 break;
1303 case Opt_rdirplus:
1304 mnt->flags &= ~NFS_MOUNT_NORDIRPLUS;
1305 break;
1306 case Opt_nordirplus:
1307 mnt->flags |= NFS_MOUNT_NORDIRPLUS;
1308 break;
75180df2
TM
1309 case Opt_sharecache:
1310 mnt->flags &= ~NFS_MOUNT_UNSHARED;
1311 break;
1312 case Opt_nosharecache:
1313 mnt->flags |= NFS_MOUNT_UNSHARED;
1314 break;
d740351b
CL
1315 case Opt_resvport:
1316 mnt->flags &= ~NFS_MOUNT_NORESVPORT;
1317 break;
1318 case Opt_noresvport:
1319 mnt->flags |= NFS_MOUNT_NORESVPORT;
1320 break;
b797cac7
DH
1321 case Opt_fscache:
1322 mnt->options |= NFS_OPTION_FSCACHE;
1323 kfree(mnt->fscache_uniq);
1324 mnt->fscache_uniq = NULL;
1325 break;
1326 case Opt_nofscache:
1327 mnt->options &= ~NFS_OPTION_FSCACHE;
1328 kfree(mnt->fscache_uniq);
1329 mnt->fscache_uniq = NULL;
1330 break;
89652617
CL
1331 case Opt_migration:
1332 mnt->options |= NFS_OPTION_MIGRATION;
1333 break;
1334 case Opt_nomigration:
f02fee22 1335 mnt->options &= ~NFS_OPTION_MIGRATION;
89652617 1336 break;
bf0fd768 1337
f45663ce
CL
1338 /*
1339 * options that take numeric values
1340 */
bf0fd768 1341 case Opt_port:
c5cb09b6
RL
1342 if (nfs_get_option_ul(args, &option) ||
1343 option > USHRT_MAX)
d23c45fd
CL
1344 goto out_invalid_value;
1345 mnt->nfs_server.port = option;
bf0fd768
CL
1346 break;
1347 case Opt_rsize:
c5cb09b6 1348 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1349 goto out_invalid_value;
1350 mnt->rsize = option;
bf0fd768
CL
1351 break;
1352 case Opt_wsize:
c5cb09b6 1353 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1354 goto out_invalid_value;
1355 mnt->wsize = option;
bf0fd768
CL
1356 break;
1357 case Opt_bsize:
c5cb09b6 1358 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1359 goto out_invalid_value;
1360 mnt->bsize = option;
bf0fd768
CL
1361 break;
1362 case Opt_timeo:
a956beda 1363 if (nfs_get_option_ul_bound(args, &option, 1, INT_MAX))
d23c45fd
CL
1364 goto out_invalid_value;
1365 mnt->timeo = option;
bf0fd768
CL
1366 break;
1367 case Opt_retrans:
a956beda 1368 if (nfs_get_option_ul_bound(args, &option, 0, INT_MAX))
d23c45fd
CL
1369 goto out_invalid_value;
1370 mnt->retrans = option;
bf0fd768
CL
1371 break;
1372 case Opt_acregmin:
c5cb09b6 1373 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1374 goto out_invalid_value;
1375 mnt->acregmin = option;
bf0fd768
CL
1376 break;
1377 case Opt_acregmax:
c5cb09b6 1378 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1379 goto out_invalid_value;
1380 mnt->acregmax = option;
bf0fd768
CL
1381 break;
1382 case Opt_acdirmin:
c5cb09b6 1383 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1384 goto out_invalid_value;
1385 mnt->acdirmin = option;
bf0fd768
CL
1386 break;
1387 case Opt_acdirmax:
c5cb09b6 1388 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1389 goto out_invalid_value;
1390 mnt->acdirmax = option;
bf0fd768
CL
1391 break;
1392 case Opt_actimeo:
c5cb09b6 1393 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1394 goto out_invalid_value;
1395 mnt->acregmin = mnt->acregmax =
1396 mnt->acdirmin = mnt->acdirmax = option;
bf0fd768
CL
1397 break;
1398 case Opt_namelen:
c5cb09b6 1399 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1400 goto out_invalid_value;
1401 mnt->namlen = option;
bf0fd768
CL
1402 break;
1403 case Opt_mountport:
c5cb09b6
RL
1404 if (nfs_get_option_ul(args, &option) ||
1405 option > USHRT_MAX)
d23c45fd
CL
1406 goto out_invalid_value;
1407 mnt->mount_server.port = option;
bf0fd768 1408 break;
bf0fd768 1409 case Opt_mountvers:
c5cb09b6 1410 if (nfs_get_option_ul(args, &option) ||
f45663ce 1411 option < NFS_MNT_VERSION ||
d23c45fd
CL
1412 option > NFS_MNT3_VERSION)
1413 goto out_invalid_value;
1414 mnt->mount_server.version = option;
bf0fd768 1415 break;
3fd5be9e 1416 case Opt_minorversion:
c5cb09b6 1417 if (nfs_get_option_ul(args, &option))
f3f4f4ed
CL
1418 goto out_invalid_value;
1419 if (option > NFS4_MAX_MINOR_VERSION)
1420 goto out_invalid_value;
1421 mnt->minorversion = option;
3fd5be9e 1422 break;
bf0fd768 1423
f45663ce
CL
1424 /*
1425 * options that take text values
1426 */
0d71b058
TM
1427 case Opt_nfsvers:
1428 string = match_strdup(args);
1429 if (string == NULL)
1430 goto out_nomem;
1431 rc = nfs_parse_version_string(string, mnt, args);
1432 kfree(string);
1433 if (!rc)
1434 goto out_invalid_value;
1435 break;
bf0fd768
CL
1436 case Opt_sec:
1437 string = match_strdup(args);
1438 if (string == NULL)
1439 goto out_nomem;
01060c89 1440 rc = nfs_parse_security_flavors(string, mnt);
bf0fd768 1441 kfree(string);
f45663ce 1442 if (!rc) {
f45663ce
CL
1443 dfprintk(MOUNT, "NFS: unrecognized "
1444 "security flavor\n");
d23c45fd 1445 return 0;
f45663ce 1446 }
bf0fd768
CL
1447 break;
1448 case Opt_proto:
1449 string = match_strdup(args);
1450 if (string == NULL)
1451 goto out_nomem;
1452 token = match_token(string,
1453 nfs_xprt_protocol_tokens, args);
bf0fd768 1454
ee671b01 1455 protofamily = AF_INET;
bf0fd768 1456 switch (token) {
ee671b01
JL
1457 case Opt_xprt_udp6:
1458 protofamily = AF_INET6;
fd53dde8 1459 /* fall through */
fdb66ff4 1460 case Opt_xprt_udp:
bf0fd768 1461 mnt->flags &= ~NFS_MOUNT_TCP;
0896a725 1462 mnt->nfs_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768 1463 break;
ee671b01
JL
1464 case Opt_xprt_tcp6:
1465 protofamily = AF_INET6;
fd53dde8 1466 /* fall through */
fdb66ff4 1467 case Opt_xprt_tcp:
bf0fd768 1468 mnt->flags |= NFS_MOUNT_TCP;
0896a725 1469 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1470 break;
181342c5
SM
1471 case Opt_xprt_rdma6:
1472 protofamily = AF_INET6;
fd53dde8 1473 /* fall through */
2cf7ff7a
TT
1474 case Opt_xprt_rdma:
1475 /* vector side protocols to TCP */
1476 mnt->flags |= NFS_MOUNT_TCP;
1477 mnt->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
a67d18f8 1478 xprt_load_transport(string);
2cf7ff7a 1479 break;
bf0fd768 1480 default:
f45663ce
CL
1481 dfprintk(MOUNT, "NFS: unrecognized "
1482 "transport protocol\n");
4223a4a1 1483 kfree(string);
d23c45fd 1484 return 0;
bf0fd768 1485 }
c5cb09b6 1486 kfree(string);
bf0fd768
CL
1487 break;
1488 case Opt_mountproto:
1489 string = match_strdup(args);
1490 if (string == NULL)
1491 goto out_nomem;
1492 token = match_token(string,
1493 nfs_xprt_protocol_tokens, args);
d508afb4 1494 kfree(string);
bf0fd768 1495
ee671b01 1496 mountfamily = AF_INET;
bf0fd768 1497 switch (token) {
ee671b01
JL
1498 case Opt_xprt_udp6:
1499 mountfamily = AF_INET6;
fd53dde8 1500 /* fall through */
fdb66ff4 1501 case Opt_xprt_udp:
0896a725 1502 mnt->mount_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768 1503 break;
ee671b01
JL
1504 case Opt_xprt_tcp6:
1505 mountfamily = AF_INET6;
fd53dde8 1506 /* fall through */
fdb66ff4 1507 case Opt_xprt_tcp:
0896a725 1508 mnt->mount_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1509 break;
2cf7ff7a 1510 case Opt_xprt_rdma: /* not used for side protocols */
bf0fd768 1511 default:
f45663ce
CL
1512 dfprintk(MOUNT, "NFS: unrecognized "
1513 "transport protocol\n");
d23c45fd 1514 return 0;
bf0fd768
CL
1515 }
1516 break;
1517 case Opt_addr:
1518 string = match_strdup(args);
1519 if (string == NULL)
1520 goto out_nomem;
53a0b9c4 1521 mnt->nfs_server.addrlen =
b48e1278 1522 rpc_pton(mnt->net, string, strlen(string),
53a0b9c4
CL
1523 (struct sockaddr *)
1524 &mnt->nfs_server.address,
1525 sizeof(mnt->nfs_server.address));
bf0fd768 1526 kfree(string);
53a0b9c4
CL
1527 if (mnt->nfs_server.addrlen == 0)
1528 goto out_invalid_address;
bf0fd768
CL
1529 break;
1530 case Opt_clientaddr:
c5cb09b6 1531 if (nfs_get_option_str(args, &mnt->client_address))
bf0fd768 1532 goto out_nomem;
bf0fd768 1533 break;
33832034 1534 case Opt_mounthost:
c5cb09b6
RL
1535 if (nfs_get_option_str(args,
1536 &mnt->mount_server.hostname))
33832034 1537 goto out_nomem;
33832034 1538 break;
0ac83779 1539 case Opt_mountaddr:
bf0fd768
CL
1540 string = match_strdup(args);
1541 if (string == NULL)
1542 goto out_nomem;
53a0b9c4 1543 mnt->mount_server.addrlen =
b48e1278 1544 rpc_pton(mnt->net, string, strlen(string),
53a0b9c4
CL
1545 (struct sockaddr *)
1546 &mnt->mount_server.address,
1547 sizeof(mnt->mount_server.address));
bf0fd768 1548 kfree(string);
53a0b9c4
CL
1549 if (mnt->mount_server.addrlen == 0)
1550 goto out_invalid_address;
bf0fd768 1551 break;
7973c1f1
TM
1552 case Opt_lookupcache:
1553 string = match_strdup(args);
1554 if (string == NULL)
1555 goto out_nomem;
1556 token = match_token(string,
1557 nfs_lookupcache_tokens, args);
1558 kfree(string);
1559 switch (token) {
1560 case Opt_lookupcache_all:
1561 mnt->flags &= ~(NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE);
1562 break;
1563 case Opt_lookupcache_positive:
1564 mnt->flags &= ~NFS_MOUNT_LOOKUP_CACHE_NONE;
1565 mnt->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG;
1566 break;
1567 case Opt_lookupcache_none:
1568 mnt->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE;
1569 break;
1570 default:
7973c1f1
TM
1571 dfprintk(MOUNT, "NFS: invalid "
1572 "lookupcache argument\n");
d23c45fd 1573 return 0;
7973c1f1
TM
1574 };
1575 break;
a6d5ff64 1576 case Opt_fscache_uniq:
c5cb09b6 1577 if (nfs_get_option_str(args, &mnt->fscache_uniq))
a6d5ff64 1578 goto out_nomem;
a6d5ff64
CL
1579 mnt->options |= NFS_OPTION_FSCACHE;
1580 break;
5eebde23
SJ
1581 case Opt_local_lock:
1582 string = match_strdup(args);
1583 if (string == NULL)
1584 goto out_nomem;
1585 token = match_token(string, nfs_local_lock_tokens,
1586 args);
1587 kfree(string);
1588 switch (token) {
1589 case Opt_local_lock_all:
1590 mnt->flags |= (NFS_MOUNT_LOCAL_FLOCK |
1591 NFS_MOUNT_LOCAL_FCNTL);
1592 break;
1593 case Opt_local_lock_flock:
1594 mnt->flags |= NFS_MOUNT_LOCAL_FLOCK;
1595 break;
1596 case Opt_local_lock_posix:
1597 mnt->flags |= NFS_MOUNT_LOCAL_FCNTL;
1598 break;
1599 case Opt_local_lock_none:
1600 mnt->flags &= ~(NFS_MOUNT_LOCAL_FLOCK |
1601 NFS_MOUNT_LOCAL_FCNTL);
1602 break;
1603 default:
1604 dfprintk(MOUNT, "NFS: invalid "
1605 "local_lock argument\n");
1606 return 0;
1607 };
1608 break;
bf0fd768 1609
f45663ce
CL
1610 /*
1611 * Special options
1612 */
1613 case Opt_sloppy:
1614 sloppy = 1;
1615 dfprintk(MOUNT, "NFS: relaxing parsing rules\n");
1616 break;
bf0fd768
CL
1617 case Opt_userspace:
1618 case Opt_deprecated:
d33e4dfe
CL
1619 dfprintk(MOUNT, "NFS: ignoring mount option "
1620 "'%s'\n", p);
bf0fd768
CL
1621 break;
1622
1623 default:
d23c45fd 1624 invalid_option = 1;
f45663ce
CL
1625 dfprintk(MOUNT, "NFS: unrecognized mount option "
1626 "'%s'\n", p);
bf0fd768
CL
1627 }
1628 }
1629
d23c45fd
CL
1630 if (!sloppy && invalid_option)
1631 return 0;
1632
571b7554
WAA
1633 if (mnt->minorversion && mnt->version != 4)
1634 goto out_minorversion_mismatch;
1635
89652617 1636 if (mnt->options & NFS_OPTION_MIGRATION &&
9e08ef1a 1637 (mnt->version != 4 || mnt->minorversion != 0))
89652617
CL
1638 goto out_migration_misuse;
1639
ee671b01
JL
1640 /*
1641 * verify that any proto=/mountproto= options match the address
1856b225 1642 * families in the addr=/mountaddr= options.
ee671b01
JL
1643 */
1644 if (protofamily != AF_UNSPEC &&
1645 protofamily != mnt->nfs_server.address.ss_family)
1646 goto out_proto_mismatch;
1647
1648 if (mountfamily != AF_UNSPEC) {
1649 if (mnt->mount_server.addrlen) {
1650 if (mountfamily != mnt->mount_server.address.ss_family)
1651 goto out_mountproto_mismatch;
1652 } else {
1653 if (mountfamily != mnt->nfs_server.address.ss_family)
1654 goto out_mountproto_mismatch;
1655 }
1656 }
1657
bf0fd768
CL
1658 return 1;
1659
ee671b01
JL
1660out_mountproto_mismatch:
1661 printk(KERN_INFO "NFS: mount server address does not match mountproto= "
1662 "option\n");
1663 return 0;
1664out_proto_mismatch:
1665 printk(KERN_INFO "NFS: server address does not match proto= option\n");
1666 return 0;
53a0b9c4
CL
1667out_invalid_address:
1668 printk(KERN_INFO "NFS: bad IP address specified: %s\n", p);
1669 return 0;
d23c45fd 1670out_invalid_value:
53a0b9c4 1671 printk(KERN_INFO "NFS: bad mount option value specified: %s\n", p);
d23c45fd 1672 return 0;
571b7554
WAA
1673out_minorversion_mismatch:
1674 printk(KERN_INFO "NFS: mount option vers=%u does not support "
1675 "minorversion=%u\n", mnt->version, mnt->minorversion);
1676 return 0;
89652617
CL
1677out_migration_misuse:
1678 printk(KERN_INFO
1679 "NFS: 'migration' not supported for this NFS version\n");
1680 return 0;
bf0fd768
CL
1681out_nomem:
1682 printk(KERN_INFO "NFS: not enough memory to parse option\n");
1683 return 0;
f9c3a380 1684out_security_failure:
f9c3a380
EP
1685 printk(KERN_INFO "NFS: security options invalid: %d\n", rc);
1686 return 0;
bf0fd768
CL
1687}
1688
ec88f28d 1689/*
4d4b69dd
WAA
1690 * Ensure that a specified authtype in args->auth_info is supported by
1691 * the server. Returns 0 and sets args->selected_flavor if it's ok, and
1692 * -EACCES if not.
ec88f28d 1693 */
4d4b69dd 1694static int nfs_verify_authflavors(struct nfs_parsed_mount_data *args,
9111c95b 1695 rpc_authflavor_t *server_authlist, unsigned int count)
ec88f28d 1696{
4d4b69dd 1697 rpc_authflavor_t flavor = RPC_AUTH_MAXFLAVOR;
53a75f22 1698 bool found_auth_null = false;
9111c95b 1699 unsigned int i;
4580a92d 1700
d497ab97
WAA
1701 /*
1702 * If the sec= mount option is used, the specified flavor or AUTH_NULL
1703 * must be in the list returned by the server.
1704 *
1705 * AUTH_NULL has a special meaning when it's in the server list - it
1706 * means that the server will ignore the rpc creds, so any flavor
e68fd7c8 1707 * can be used but still use the sec= that was specified.
53a75f22
CL
1708 *
1709 * Note also that the MNT procedure in MNTv1 does not return a list
1710 * of supported security flavors. In this case, nfs_mount() fabricates
1711 * a security flavor list containing just AUTH_NULL.
d497ab97 1712 */
4580a92d 1713 for (i = 0; i < count; i++) {
4d4b69dd
WAA
1714 flavor = server_authlist[i];
1715
e68fd7c8 1716 if (nfs_auth_info_match(&args->auth_info, flavor))
9111c95b 1717 goto out;
e68fd7c8
SD
1718
1719 if (flavor == RPC_AUTH_NULL)
53a75f22 1720 found_auth_null = true;
e68fd7c8
SD
1721 }
1722
53a75f22
CL
1723 if (found_auth_null) {
1724 flavor = args->auth_info.flavors[0];
e68fd7c8 1725 goto out;
4580a92d 1726 }
ec88f28d 1727
4d4b69dd
WAA
1728 dfprintk(MOUNT,
1729 "NFS: specified auth flavors not supported by server\n");
9111c95b 1730 return -EACCES;
d497ab97 1731
4580a92d 1732out:
4d4b69dd 1733 args->selected_flavor = flavor;
a3f73c27 1734 dfprintk(MOUNT, "NFS: using auth flavor %u\n", args->selected_flavor);
d497ab97 1735 return 0;
ec88f28d
CL
1736}
1737
0076d7b7
CL
1738/*
1739 * Use the remote server's MOUNT service to request the NFS file handle
1740 * corresponding to the provided path.
1741 */
486aa699 1742static int nfs_request_mount(struct nfs_parsed_mount_data *args,
294ae81d
JL
1743 struct nfs_fh *root_fh,
1744 rpc_authflavor_t *server_authlist,
1745 unsigned int *server_authlist_len)
0076d7b7 1746{
c5d120f8
CL
1747 struct nfs_mount_request request = {
1748 .sap = (struct sockaddr *)
1749 &args->mount_server.address,
1750 .dirpath = args->nfs_server.export_path,
1751 .protocol = args->mount_server.protocol,
1752 .fh = root_fh,
50a737f8 1753 .noresvport = args->flags & NFS_MOUNT_NORESVPORT,
294ae81d 1754 .auth_flav_len = server_authlist_len,
ec88f28d 1755 .auth_flavs = server_authlist,
6d59b8d5 1756 .net = args->net,
c5d120f8 1757 };
4c568017 1758 int status;
0076d7b7
CL
1759
1760 if (args->mount_server.version == 0) {
8a6e5deb
TM
1761 switch (args->version) {
1762 default:
1763 args->mount_server.version = NFS_MNT3_VERSION;
1764 break;
1765 case 2:
1766 args->mount_server.version = NFS_MNT_VERSION;
1767 }
0076d7b7 1768 }
c5d120f8 1769 request.version = args->mount_server.version;
0076d7b7 1770
33832034 1771 if (args->mount_server.hostname)
c5d120f8 1772 request.hostname = args->mount_server.hostname;
33832034 1773 else
c5d120f8 1774 request.hostname = args->nfs_server.hostname;
33832034 1775
0076d7b7
CL
1776 /*
1777 * Construct the mount server's address.
1778 */
4c568017 1779 if (args->mount_server.address.ss_family == AF_UNSPEC) {
c5d120f8 1780 memcpy(request.sap, &args->nfs_server.address,
4c568017
CL
1781 args->nfs_server.addrlen);
1782 args->mount_server.addrlen = args->nfs_server.addrlen;
1783 }
c5d120f8 1784 request.salen = args->mount_server.addrlen;
f5855fec 1785 nfs_set_port(request.sap, &args->mount_server.port, 0);
0076d7b7
CL
1786
1787 /*
1788 * Now ask the mount server to map our export path
1789 * to a file handle.
1790 */
c5d120f8 1791 status = nfs_mount(&request);
ec88f28d
CL
1792 if (status != 0) {
1793 dfprintk(MOUNT, "NFS: unable to mount server %s, error %d\n",
1794 request.hostname, status);
1795 return status;
1796 }
0076d7b7 1797
9111c95b 1798 return 0;
0076d7b7
CL
1799}
1800
d17540c6
JL
1801static struct nfs_server *nfs_try_mount_request(struct nfs_mount_info *mount_info,
1802 struct nfs_subversion *nfs_mod)
1803{
1804 int status;
9111c95b
JL
1805 unsigned int i;
1806 bool tried_auth_unix = false;
1807 bool auth_null_in_list = false;
1808 struct nfs_server *server = ERR_PTR(-EACCES);
294ae81d
JL
1809 struct nfs_parsed_mount_data *args = mount_info->parsed;
1810 rpc_authflavor_t authlist[NFS_MAX_SECFLAVORS];
1811 unsigned int authlist_len = ARRAY_SIZE(authlist);
d17540c6 1812
294ae81d
JL
1813 status = nfs_request_mount(args, mount_info->mntfh, authlist,
1814 &authlist_len);
d17540c6
JL
1815 if (status)
1816 return ERR_PTR(status);
1817
9111c95b
JL
1818 /*
1819 * Was a sec= authflavor specified in the options? First, verify
1820 * whether the server supports it, and then just try to use it if so.
1821 */
a3f73c27 1822 if (args->auth_info.flavor_len > 0) {
4d4b69dd 1823 status = nfs_verify_authflavors(args, authlist, authlist_len);
a3f73c27
WAA
1824 dfprintk(MOUNT, "NFS: using auth flavor %u\n",
1825 args->selected_flavor);
9111c95b
JL
1826 if (status)
1827 return ERR_PTR(status);
1828 return nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1829 }
1830
1831 /*
1832 * No sec= option was provided. RFC 2623, section 2.7 suggests we
1833 * SHOULD prefer the flavor listed first. However, some servers list
1834 * AUTH_NULL first. Avoid ever choosing AUTH_NULL.
1835 */
1836 for (i = 0; i < authlist_len; ++i) {
1837 rpc_authflavor_t flavor;
1838 struct rpcsec_gss_info info;
1839
1840 flavor = authlist[i];
1841 switch (flavor) {
1842 case RPC_AUTH_UNIX:
1843 tried_auth_unix = true;
1844 break;
1845 case RPC_AUTH_NULL:
1846 auth_null_in_list = true;
1847 continue;
1848 default:
1849 if (rpcauth_get_gssinfo(flavor, &info) != 0)
1850 continue;
1851 /* Fallthrough */
1852 }
1853 dfprintk(MOUNT, "NFS: attempting to use auth flavor %u\n", flavor);
a3f73c27 1854 args->selected_flavor = flavor;
9111c95b
JL
1855 server = nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1856 if (!IS_ERR(server))
1857 return server;
1858 }
1859
1860 /*
1861 * Nothing we tried so far worked. At this point, give up if we've
1862 * already tried AUTH_UNIX or if the server's list doesn't contain
1863 * AUTH_NULL
1864 */
1865 if (tried_auth_unix || !auth_null_in_list)
1866 return server;
1867
1868 /* Last chance! Try AUTH_UNIX */
1869 dfprintk(MOUNT, "NFS: attempting to use auth flavor %u\n", RPC_AUTH_UNIX);
a3f73c27 1870 args->selected_flavor = RPC_AUTH_UNIX;
d17540c6
JL
1871 return nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1872}
1873
ff9099f2
BS
1874struct dentry *nfs_try_mount(int flags, const char *dev_name,
1875 struct nfs_mount_info *mount_info,
1876 struct nfs_subversion *nfs_mod)
486aa699 1877{
486aa699
BS
1878 struct nfs_server *server;
1879
d17540c6
JL
1880 if (mount_info->parsed->need_mount)
1881 server = nfs_try_mount_request(mount_info, nfs_mod);
1882 else
1883 server = nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
486aa699 1884
486aa699
BS
1885 if (IS_ERR(server))
1886 return ERR_CAST(server);
1887
ab7017a3 1888 return nfs_fs_mount_common(server, flags, dev_name, mount_info, nfs_mod);
486aa699 1889}
ddda8e0a 1890EXPORT_SYMBOL_GPL(nfs_try_mount);
486aa699 1891
c12bacec
RL
1892/*
1893 * Split "dev_name" into "hostname:export_path".
1894 *
1895 * The leftmost colon demarks the split between the server's hostname
1896 * and the export path. If the hostname starts with a left square
1897 * bracket, then it may contain colons.
1898 *
1899 * Note: caller frees hostname and export path, even on error.
1900 */
1901static int nfs_parse_devname(const char *dev_name,
1902 char **hostname, size_t maxnamlen,
1903 char **export_path, size_t maxpathlen)
dc045898
CL
1904{
1905 size_t len;
c12bacec 1906 char *end;
dc045898 1907
80ff0017
YL
1908 if (unlikely(!dev_name || !*dev_name)) {
1909 dfprintk(MOUNT, "NFS: device name not specified\n");
1910 return -EINVAL;
1911 }
1912
c12bacec
RL
1913 /* Is the host name protected with square brakcets? */
1914 if (*dev_name == '[') {
1915 end = strchr(++dev_name, ']');
1916 if (end == NULL || end[1] != ':')
dc045898 1917 goto out_bad_devname;
dc045898 1918
c12bacec
RL
1919 len = end - dev_name;
1920 end++;
1921 } else {
1922 char *comma;
dc045898 1923
c12bacec
RL
1924 end = strchr(dev_name, ':');
1925 if (end == NULL)
1926 goto out_bad_devname;
1927 len = end - dev_name;
d1aa0825 1928
c12bacec
RL
1929 /* kill possible hostname list: not supported */
1930 comma = strchr(dev_name, ',');
1931 if (comma != NULL && comma < end)
40cc394b 1932 len = comma - dev_name;
c12bacec 1933 }
d1aa0825 1934
d1aa0825
CL
1935 if (len > maxnamlen)
1936 goto out_hostname;
1937
1938 /* N.B. caller will free nfs_server.hostname in all cases */
c12bacec 1939 *hostname = kstrndup(dev_name, len, GFP_KERNEL);
d1aa0825
CL
1940 if (*hostname == NULL)
1941 goto out_nomem;
c12bacec 1942 len = strlen(++end);
d1aa0825
CL
1943 if (len > maxpathlen)
1944 goto out_path;
1945 *export_path = kstrndup(end, len, GFP_KERNEL);
1946 if (!*export_path)
1947 goto out_nomem;
1948
c12bacec 1949 dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", *export_path);
d1aa0825
CL
1950 return 0;
1951
1952out_bad_devname:
1953 dfprintk(MOUNT, "NFS: device name not in host:path format\n");
1954 return -EINVAL;
1955
1956out_nomem:
1957 dfprintk(MOUNT, "NFS: not enough memory to parse device name\n");
1958 return -ENOMEM;
1959
1960out_hostname:
1961 dfprintk(MOUNT, "NFS: server hostname too long\n");
1962 return -ENAMETOOLONG;
1963
1964out_path:
1965 dfprintk(MOUNT, "NFS: export pathname too long\n");
1966 return -ENAMETOOLONG;
1967}
1968
f7b422b1 1969/*
54ceac45
DH
1970 * Validate the NFS2/NFS3 mount data
1971 * - fills in the mount root filehandle
136d558c
CL
1972 *
1973 * For option strings, user space handles the following behaviors:
1974 *
1975 * + DNS: mapping server host name to IP address ("addr=" option)
1976 *
1977 * + failure mode: how to behave if a mount request can't be handled
1978 * immediately ("fg/bg" option)
1979 *
1980 * + retry: how often to retry a mount request ("retry=" option)
1981 *
1982 * + breaking back: trying proto=udp after proto=tcp, v2 after v3,
1983 * mountproto=tcp after mountproto=udp, and so on
f7b422b1 1984 */
d72c727c
BS
1985static int nfs23_validate_mount_data(void *options,
1986 struct nfs_parsed_mount_data *args,
1987 struct nfs_fh *mntfh,
1988 const char *dev_name)
f7b422b1 1989{
2283f8d6 1990 struct nfs_mount_data *data = (struct nfs_mount_data *)options;
4cfd74fc 1991 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
74c98811 1992 int extra_flags = NFS_MOUNT_LEGACY_INTERFACE;
136d558c 1993
5df36e78
CL
1994 if (data == NULL)
1995 goto out_no_data;
f7b422b1 1996
c5afc8da 1997 args->version = NFS_DEFAULT_VERSION;
54ceac45 1998 switch (data->version) {
5df36e78 1999 case 1:
fd53dde8 2000 data->namlen = 0; /* fall through */
5df36e78 2001 case 2:
fd53dde8 2002 data->bsize = 0; /* fall through */
5df36e78
CL
2003 case 3:
2004 if (data->flags & NFS_MOUNT_VER3)
2005 goto out_no_v3;
2006 data->root.size = NFS2_FHSIZE;
2007 memcpy(data->root.data, data->old_root.data, NFS2_FHSIZE);
74c98811
TM
2008 /* Turn off security negotiation */
2009 extra_flags |= NFS_MOUNT_SECFLAVOUR;
fd53dde8 2010 /* fall through */
5df36e78
CL
2011 case 4:
2012 if (data->flags & NFS_MOUNT_SECFLAVOUR)
2013 goto out_no_sec;
fd53dde8 2014 /* fall through */
5df36e78
CL
2015 case 5:
2016 memset(data->context, 0, sizeof(data->context));
fd53dde8 2017 /* fall through */
5df36e78 2018 case 6:
b7e24457
TM
2019 if (data->flags & NFS_MOUNT_VER3) {
2020 if (data->root.size > NFS3_FHSIZE || data->root.size == 0)
2021 goto out_invalid_fh;
5df36e78 2022 mntfh->size = data->root.size;
764302cc
CL
2023 args->version = 3;
2024 } else {
5df36e78 2025 mntfh->size = NFS2_FHSIZE;
764302cc
CL
2026 args->version = 2;
2027 }
5df36e78 2028
5df36e78
CL
2029
2030 memcpy(mntfh->data, data->root.data, mntfh->size);
2031 if (mntfh->size < sizeof(mntfh->data))
2032 memset(mntfh->data + mntfh->size, 0,
2033 sizeof(mntfh->data) - mntfh->size);
6e88e061 2034
2283f8d6
TT
2035 /*
2036 * Translate to nfs_parsed_mount_data, which nfs_fill_super
2037 * can deal with.
2038 */
ff3525a5 2039 args->flags = data->flags & NFS_MOUNT_FLAGMASK;
74c98811 2040 args->flags |= extra_flags;
2283f8d6
TT
2041 args->rsize = data->rsize;
2042 args->wsize = data->wsize;
2283f8d6
TT
2043 args->timeo = data->timeo;
2044 args->retrans = data->retrans;
2045 args->acregmin = data->acregmin;
2046 args->acregmax = data->acregmax;
2047 args->acdirmin = data->acdirmin;
2048 args->acdirmax = data->acdirmax;
b72e4f42 2049 args->need_mount = false;
4c568017 2050
4cfd74fc 2051 memcpy(sap, &data->addr, sizeof(data->addr));
4c568017 2052 args->nfs_server.addrlen = sizeof(data->addr);
872ece86 2053 args->nfs_server.port = ntohs(data->addr.sin_port);
7c2bd9a3
TH
2054 if (sap->sa_family != AF_INET ||
2055 !nfs_verify_server_address(sap))
4c568017
CL
2056 goto out_no_address;
2057
2283f8d6 2058 if (!(data->flags & NFS_MOUNT_TCP))
0896a725 2059 args->nfs_server.protocol = XPRT_TRANSPORT_UDP;
2283f8d6
TT
2060 /* N.B. caller will free nfs_server.hostname in all cases */
2061 args->nfs_server.hostname = kstrdup(data->hostname, GFP_KERNEL);
2062 args->namlen = data->namlen;
2063 args->bsize = data->bsize;
dd07c947
CL
2064
2065 if (data->flags & NFS_MOUNT_SECFLAVOUR)
a3f73c27 2066 args->selected_flavor = data->pseudoflavor;
74c98811 2067 else
a3f73c27 2068 args->selected_flavor = RPC_AUTH_UNIX;
63649bd7
CG
2069 if (!args->nfs_server.hostname)
2070 goto out_nomem;
f9c3a380 2071
5eebde23
SJ
2072 if (!(data->flags & NFS_MOUNT_NONLM))
2073 args->flags &= ~(NFS_MOUNT_LOCAL_FLOCK|
2074 NFS_MOUNT_LOCAL_FCNTL);
2075 else
2076 args->flags |= (NFS_MOUNT_LOCAL_FLOCK|
2077 NFS_MOUNT_LOCAL_FCNTL);
f9c3a380
EP
2078 /*
2079 * The legacy version 6 binary mount data from userspace has a
2080 * field used only to transport selinux information into the
2081 * the kernel. To continue to support that functionality we
2082 * have a touch of selinux knowledge here in the NFS code. The
2083 * userspace code converted context=blah to just blah so we are
2084 * converting back to the full string selinux understands.
2085 */
2086 if (data->context[0]){
2087#ifdef CONFIG_SECURITY_SELINUX
2088 int rc;
f9c3a380 2089 data->context[NFS_MAX_CONTEXT_LEN] = '\0';
757cbe59
AV
2090 rc = security_add_mnt_opt("context", data->context,
2091 strlen(data->context), &args->lsm_opts);
f9c3a380
EP
2092 if (rc)
2093 return rc;
2094#else
2095 return -EINVAL;
2096#endif
2097 }
2098
5df36e78 2099 break;
b72e4f42
BS
2100 default:
2101 return NFS_TEXT_DATA;
f7b422b1 2102 }
54ceac45 2103
5df36e78 2104 return 0;
f7b422b1 2105
5df36e78
CL
2106out_no_data:
2107 dfprintk(MOUNT, "NFS: mount program didn't pass any mount data\n");
2108 return -EINVAL;
54ceac45 2109
5df36e78
CL
2110out_no_v3:
2111 dfprintk(MOUNT, "NFS: nfs_mount_data version %d does not support v3\n",
2112 data->version);
2113 return -EINVAL;
f7b422b1 2114
5df36e78
CL
2115out_no_sec:
2116 dfprintk(MOUNT, "NFS: nfs_mount_data version supports only AUTH_SYS\n");
2117 return -EINVAL;
2118
63649bd7
CG
2119out_nomem:
2120 dfprintk(MOUNT, "NFS: not enough memory to handle mount options\n");
2121 return -ENOMEM;
2122
5df36e78
CL
2123out_no_address:
2124 dfprintk(MOUNT, "NFS: mount program didn't pass remote address\n");
2125 return -EINVAL;
2126
2127out_invalid_fh:
2128 dfprintk(MOUNT, "NFS: invalid root filehandle\n");
2129 return -EINVAL;
f7b422b1
DH
2130}
2131
89d77c8f 2132#if IS_ENABLED(CONFIG_NFS_V4)
d72c727c
BS
2133static int nfs_validate_mount_data(struct file_system_type *fs_type,
2134 void *options,
2135 struct nfs_parsed_mount_data *args,
2136 struct nfs_fh *mntfh,
2137 const char *dev_name)
2138{
2139 if (fs_type == &nfs_fs_type)
2140 return nfs23_validate_mount_data(options, args, mntfh, dev_name);
2141 return nfs4_validate_mount_data(options, args, dev_name);
2142}
2143#else
2144static int nfs_validate_mount_data(struct file_system_type *fs_type,
2145 void *options,
2146 struct nfs_parsed_mount_data *args,
2147 struct nfs_fh *mntfh,
2148 const char *dev_name)
2149{
2150 return nfs23_validate_mount_data(options, args, mntfh, dev_name);
2151}
2152#endif
2153
b72e4f42
BS
2154static int nfs_validate_text_mount_data(void *options,
2155 struct nfs_parsed_mount_data *args,
2156 const char *dev_name)
2157{
2158 int port = 0;
2159 int max_namelen = PAGE_SIZE;
2160 int max_pathlen = NFS_MAXPATHLEN;
2161 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
2162
2163 if (nfs_parse_mount_options((char *)options, args) == 0)
2164 return -EINVAL;
2165
2166 if (!nfs_verify_server_address(sap))
2167 goto out_no_address;
2168
2169 if (args->version == 4) {
89d77c8f 2170#if IS_ENABLED(CONFIG_NFS_V4)
0dfbb5f0
CL
2171 if (args->nfs_server.protocol == XPRT_TRANSPORT_RDMA)
2172 port = NFS_RDMA_PORT;
2173 else
2174 port = NFS_PORT;
b72e4f42
BS
2175 max_namelen = NFS4_MAXNAMLEN;
2176 max_pathlen = NFS4_MAXPATHLEN;
2177 nfs_validate_transport_protocol(args);
6da1a034
TM
2178 if (args->nfs_server.protocol == XPRT_TRANSPORT_UDP)
2179 goto out_invalid_transport_udp;
b72e4f42
BS
2180 nfs4_validate_mount_flags(args);
2181#else
2182 goto out_v4_not_compiled;
2183#endif /* CONFIG_NFS_V4 */
0dfbb5f0 2184 } else {
b72e4f42 2185 nfs_set_mount_transport_protocol(args);
0dfbb5f0
CL
2186 if (args->nfs_server.protocol == XPRT_TRANSPORT_RDMA)
2187 port = NFS_RDMA_PORT;
2188 }
b72e4f42
BS
2189
2190 nfs_set_port(sap, &args->nfs_server.port, port);
2191
b72e4f42
BS
2192 return nfs_parse_devname(dev_name,
2193 &args->nfs_server.hostname,
2194 max_namelen,
2195 &args->nfs_server.export_path,
2196 max_pathlen);
2197
89d77c8f 2198#if !IS_ENABLED(CONFIG_NFS_V4)
b72e4f42
BS
2199out_v4_not_compiled:
2200 dfprintk(MOUNT, "NFS: NFSv4 is not compiled into kernel\n");
2201 return -EPROTONOSUPPORT;
6da1a034
TM
2202#else
2203out_invalid_transport_udp:
2204 dfprintk(MOUNT, "NFSv4: Unsupported transport protocol udp\n");
2205 return -EINVAL;
b72e4f42
BS
2206#endif /* !CONFIG_NFS_V4 */
2207
2208out_no_address:
2209 dfprintk(MOUNT, "NFS: mount program didn't pass remote address\n");
2210 return -EINVAL;
b72e4f42
BS
2211}
2212
71a6ec8a 2213#define NFS_REMOUNT_CMP_FLAGMASK ~(NFS_MOUNT_INTR \
c8e47028
SM
2214 | NFS_MOUNT_SECURE \
2215 | NFS_MOUNT_TCP \
2216 | NFS_MOUNT_VER3 \
2217 | NFS_MOUNT_KERBEROS \
2218 | NFS_MOUNT_NONLM \
2219 | NFS_MOUNT_BROKEN_SUID \
2220 | NFS_MOUNT_STRICTLOCK \
c8e47028
SM
2221 | NFS_MOUNT_LEGACY_INTERFACE)
2222
71a6ec8a
SM
2223#define NFS_MOUNT_CMP_FLAGMASK (NFS_REMOUNT_CMP_FLAGMASK & \
2224 ~(NFS_MOUNT_UNSHARED | NFS_MOUNT_NORESVPORT))
2225
48b605f8
JL
2226static int
2227nfs_compare_remount_data(struct nfs_server *nfss,
2228 struct nfs_parsed_mount_data *data)
2229{
71a6ec8a 2230 if ((data->flags ^ nfss->flags) & NFS_REMOUNT_CMP_FLAGMASK ||
48b605f8
JL
2231 data->rsize != nfss->rsize ||
2232 data->wsize != nfss->wsize ||
57acc40d
JL
2233 data->version != nfss->nfs_client->rpc_ops->version ||
2234 data->minorversion != nfss->nfs_client->cl_minorversion ||
48b605f8 2235 data->retrans != nfss->client->cl_timeout->to_retries ||
09a330f4 2236 !nfs_auth_info_match(&data->auth_info, nfss->client->cl_auth->au_flavor) ||
48b605f8
JL
2237 data->acregmin != nfss->acregmin / HZ ||
2238 data->acregmax != nfss->acregmax / HZ ||
2239 data->acdirmin != nfss->acdirmin / HZ ||
2240 data->acdirmax != nfss->acdirmax / HZ ||
2241 data->timeo != (10U * nfss->client->cl_timeout->to_initval / HZ) ||
bcd2ea17 2242 data->nfs_server.port != nfss->port ||
48b605f8 2243 data->nfs_server.addrlen != nfss->nfs_client->cl_addrlen ||
a1be9eee
SR
2244 !rpc_cmp_addr((struct sockaddr *)&data->nfs_server.address,
2245 (struct sockaddr *)&nfss->nfs_client->cl_addr))
48b605f8
JL
2246 return -EINVAL;
2247
2248 return 0;
2249}
2250
fbdefd64 2251int
48b605f8
JL
2252nfs_remount(struct super_block *sb, int *flags, char *raw_data)
2253{
2254 int error;
2255 struct nfs_server *nfss = sb->s_fs_info;
2256 struct nfs_parsed_mount_data *data;
2257 struct nfs_mount_data *options = (struct nfs_mount_data *)raw_data;
2258 struct nfs4_mount_data *options4 = (struct nfs4_mount_data *)raw_data;
cd100725 2259 u32 nfsvers = nfss->nfs_client->rpc_ops->version;
48b605f8 2260
02b9984d
TT
2261 sync_filesystem(sb);
2262
48b605f8
JL
2263 /*
2264 * Userspace mount programs that send binary options generally send
2265 * them populated with default values. We have no way to know which
2266 * ones were explicitly specified. Fall back to legacy behavior and
2267 * just return success.
2268 */
31c94469
MZ
2269 if ((nfsvers == 4 && (!options4 || options4->version == 1)) ||
2270 (nfsvers <= 3 && (!options || (options->version >= 1 &&
2271 options->version <= 6))))
48b605f8
JL
2272 return 0;
2273
6a0440e5 2274 data = nfs_alloc_parsed_mount_data();
48b605f8
JL
2275 if (data == NULL)
2276 return -ENOMEM;
2277
2278 /* fill out struct with values from existing mount */
2279 data->flags = nfss->flags;
2280 data->rsize = nfss->rsize;
2281 data->wsize = nfss->wsize;
2282 data->retrans = nfss->client->cl_timeout->to_retries;
a3f73c27 2283 data->selected_flavor = nfss->client->cl_auth->au_flavor;
48b605f8
JL
2284 data->acregmin = nfss->acregmin / HZ;
2285 data->acregmax = nfss->acregmax / HZ;
2286 data->acdirmin = nfss->acdirmin / HZ;
2287 data->acdirmax = nfss->acdirmax / HZ;
2288 data->timeo = 10U * nfss->client->cl_timeout->to_initval / HZ;
bcd2ea17 2289 data->nfs_server.port = nfss->port;
48b605f8 2290 data->nfs_server.addrlen = nfss->nfs_client->cl_addrlen;
57acc40d
JL
2291 data->version = nfsvers;
2292 data->minorversion = nfss->nfs_client->cl_minorversion;
a914722f 2293 data->net = current->nsproxy->net_ns;
48b605f8
JL
2294 memcpy(&data->nfs_server.address, &nfss->nfs_client->cl_addr,
2295 data->nfs_server.addrlen);
2296
2297 /* overwrite those values with any that were specified */
1966903f
JL
2298 error = -EINVAL;
2299 if (!nfs_parse_mount_options((char *)options, data))
48b605f8
JL
2300 goto out;
2301
26c4c170
JL
2302 /*
2303 * noac is a special case. It implies -o sync, but that's not
2304 * necessarily reflected in the mtab options. do_remount_sb
1751e8a6 2305 * will clear SB_SYNCHRONOUS if -o sync wasn't specified in the
26c4c170
JL
2306 * remount options, so we have to explicitly reset it.
2307 */
2308 if (data->flags & NFS_MOUNT_NOAC)
1751e8a6 2309 *flags |= SB_SYNCHRONOUS;
26c4c170 2310
48b605f8
JL
2311 /* compare new mount options with old ones */
2312 error = nfs_compare_remount_data(nfss, data);
6a0440e5 2313 if (!error)
204cc0cc 2314 error = security_sb_remount(sb, data->lsm_opts);
48b605f8 2315out:
6a0440e5 2316 nfs_free_parsed_mount_data(data);
48b605f8
JL
2317 return error;
2318}
89d77c8f 2319EXPORT_SYMBOL_GPL(nfs_remount);
48b605f8 2320
f7b422b1 2321/*
54ceac45 2322 * Initialise the common bits of the superblock
f7b422b1 2323 */
4f253e1e 2324static void nfs_initialise_sb(struct super_block *sb)
f7b422b1 2325{
54ceac45 2326 struct nfs_server *server = NFS_SB(sb);
5006a76c 2327
54ceac45 2328 sb->s_magic = NFS_SUPER_MAGIC;
f7b422b1 2329
54ceac45
DH
2330 /* We probably want something more informative here */
2331 snprintf(sb->s_id, sizeof(sb->s_id),
5a7c9eec 2332 "%u:%u", MAJOR(sb->s_dev), MINOR(sb->s_dev));
5006a76c 2333
54ceac45
DH
2334 if (sb->s_blocksize == 0)
2335 sb->s_blocksize = nfs_block_bits(server->wsize,
2336 &sb->s_blocksize_bits);
f7b422b1 2337
54ceac45 2338 nfs_super_set_maxbytes(sb, server->maxfilesize);
f7b422b1
DH
2339}
2340
2341/*
54ceac45 2342 * Finish setting up an NFS2/3 superblock
f7b422b1 2343 */
9052c7cf 2344void nfs_fill_super(struct super_block *sb, struct nfs_mount_info *mount_info)
f7b422b1 2345{
c40f8d1d 2346 struct nfs_parsed_mount_data *data = mount_info->parsed;
f7b422b1 2347 struct nfs_server *server = NFS_SB(sb);
5006a76c 2348
54ceac45
DH
2349 sb->s_blocksize_bits = 0;
2350 sb->s_blocksize = 0;
6a74490d
BS
2351 sb->s_xattr = server->nfs_client->cl_nfs_mod->xattr;
2352 sb->s_op = server->nfs_client->cl_nfs_mod->sops;
2353 if (data && data->bsize)
54ceac45 2354 sb->s_blocksize = nfs_block_size(data->bsize, &sb->s_blocksize_bits);
f7b422b1 2355
6a74490d 2356 if (server->nfs_client->rpc_ops->version != 2) {
54ceac45
DH
2357 /* The VFS shouldn't apply the umask to mode bits. We will do
2358 * so ourselves when necessary.
2359 */
1751e8a6 2360 sb->s_flags |= SB_POSIXACL;
54ceac45 2361 sb->s_time_gran = 1;
20fa1902 2362 sb->s_export_op = &nfs_export_ops;
816724e6 2363 }
54ceac45 2364
54ceac45 2365 nfs_initialise_sb(sb);
f7b422b1 2366}
89d77c8f 2367EXPORT_SYMBOL_GPL(nfs_fill_super);
f7b422b1
DH
2368
2369/*
3cadf4b8 2370 * Finish setting up a cloned NFS2/3/4 superblock
f7b422b1 2371 */
4f253e1e
JK
2372static void nfs_clone_super(struct super_block *sb,
2373 struct nfs_mount_info *mount_info)
f7b422b1 2374{
8c958e0c 2375 const struct super_block *old_sb = mount_info->cloned->sb;
54ceac45
DH
2376 struct nfs_server *server = NFS_SB(sb);
2377
2378 sb->s_blocksize_bits = old_sb->s_blocksize_bits;
2379 sb->s_blocksize = old_sb->s_blocksize;
2380 sb->s_maxbytes = old_sb->s_maxbytes;
3cadf4b8
BS
2381 sb->s_xattr = old_sb->s_xattr;
2382 sb->s_op = old_sb->s_op;
2383 sb->s_time_gran = 1;
20fa1902 2384 sb->s_export_op = old_sb->s_export_op;
f7b422b1 2385
3cadf4b8 2386 if (server->nfs_client->rpc_ops->version != 2) {
54ceac45
DH
2387 /* The VFS shouldn't apply the umask to mode bits. We will do
2388 * so ourselves when necessary.
f7b422b1 2389 */
1751e8a6 2390 sb->s_flags |= SB_POSIXACL;
f7b422b1
DH
2391 }
2392
54ceac45 2393 nfs_initialise_sb(sb);
f7b422b1
DH
2394}
2395
275a5d24
TM
2396static int nfs_compare_mount_options(const struct super_block *s, const struct nfs_server *b, int flags)
2397{
2398 const struct nfs_server *a = s->s_fs_info;
2399 const struct rpc_clnt *clnt_a = a->client;
2400 const struct rpc_clnt *clnt_b = b->client;
2401
2402 if ((s->s_flags & NFS_MS_MASK) != (flags & NFS_MS_MASK))
2403 goto Ebusy;
2404 if (a->nfs_client != b->nfs_client)
2405 goto Ebusy;
0aea92bf 2406 if ((a->flags ^ b->flags) & NFS_MOUNT_CMP_FLAGMASK)
275a5d24
TM
2407 goto Ebusy;
2408 if (a->wsize != b->wsize)
2409 goto Ebusy;
2410 if (a->rsize != b->rsize)
2411 goto Ebusy;
2412 if (a->acregmin != b->acregmin)
2413 goto Ebusy;
2414 if (a->acregmax != b->acregmax)
2415 goto Ebusy;
2416 if (a->acdirmin != b->acdirmin)
2417 goto Ebusy;
2418 if (a->acdirmax != b->acdirmax)
2419 goto Ebusy;
594d1644 2420 if (clnt_a->cl_auth->au_flavor != clnt_b->cl_auth->au_flavor)
275a5d24 2421 goto Ebusy;
e89a5a43 2422 return 1;
275a5d24 2423Ebusy:
e89a5a43
TM
2424 return 0;
2425}
2426
2427struct nfs_sb_mountdata {
2428 struct nfs_server *server;
2429 int mntflags;
2430};
2431
2432static int nfs_set_super(struct super_block *s, void *data)
2433{
2434 struct nfs_sb_mountdata *sb_mntdata = data;
2435 struct nfs_server *server = sb_mntdata->server;
2436 int ret;
2437
2438 s->s_flags = sb_mntdata->mntflags;
2439 s->s_fs_info = server;
8b244ff2 2440 s->s_d_op = server->nfs_client->rpc_ops->dentry_ops;
e89a5a43
TM
2441 ret = set_anon_super(s, server);
2442 if (ret == 0)
2443 server->s_dev = s->s_dev;
2444 return ret;
2445}
2446
fd00a8ff
CL
2447static int nfs_compare_super_address(struct nfs_server *server1,
2448 struct nfs_server *server2)
2449{
2450 struct sockaddr *sap1, *sap2;
7e3fcf61
BF
2451 struct rpc_xprt *xprt1 = server1->client->cl_xprt;
2452 struct rpc_xprt *xprt2 = server2->client->cl_xprt;
2453
2454 if (!net_eq(xprt1->xprt_net, xprt2->xprt_net))
2455 return 0;
fd00a8ff
CL
2456
2457 sap1 = (struct sockaddr *)&server1->nfs_client->cl_addr;
2458 sap2 = (struct sockaddr *)&server2->nfs_client->cl_addr;
2459
2460 if (sap1->sa_family != sap2->sa_family)
2461 return 0;
2462
2463 switch (sap1->sa_family) {
2464 case AF_INET: {
2465 struct sockaddr_in *sin1 = (struct sockaddr_in *)sap1;
2466 struct sockaddr_in *sin2 = (struct sockaddr_in *)sap2;
2467 if (sin1->sin_addr.s_addr != sin2->sin_addr.s_addr)
2468 return 0;
2469 if (sin1->sin_port != sin2->sin_port)
2470 return 0;
2471 break;
2472 }
2473 case AF_INET6: {
2474 struct sockaddr_in6 *sin1 = (struct sockaddr_in6 *)sap1;
2475 struct sockaddr_in6 *sin2 = (struct sockaddr_in6 *)sap2;
2476 if (!ipv6_addr_equal(&sin1->sin6_addr, &sin2->sin6_addr))
2477 return 0;
2478 if (sin1->sin6_port != sin2->sin6_port)
2479 return 0;
2480 break;
2481 }
2482 default:
2483 return 0;
2484 }
2485
2486 return 1;
2487}
2488
3b7eb5e3
TM
2489static int nfs_compare_userns(const struct nfs_server *old,
2490 const struct nfs_server *new)
2491{
2492 const struct user_namespace *oldns = &init_user_ns;
2493 const struct user_namespace *newns = &init_user_ns;
2494
2495 if (old->client && old->client->cl_cred)
2496 oldns = old->client->cl_cred->user_ns;
2497 if (new->client && new->client->cl_cred)
2498 newns = new->client->cl_cred->user_ns;
2499 if (oldns != newns)
2500 return 0;
2501 return 1;
2502}
2503
e89a5a43
TM
2504static int nfs_compare_super(struct super_block *sb, void *data)
2505{
2506 struct nfs_sb_mountdata *sb_mntdata = data;
2507 struct nfs_server *server = sb_mntdata->server, *old = NFS_SB(sb);
2508 int mntflags = sb_mntdata->mntflags;
2509
fd00a8ff 2510 if (!nfs_compare_super_address(old, server))
e89a5a43
TM
2511 return 0;
2512 /* Note: NFS_MOUNT_UNSHARED == NFS4_MOUNT_UNSHARED */
2513 if (old->flags & NFS_MOUNT_UNSHARED)
2514 return 0;
2515 if (memcmp(&old->fsid, &server->fsid, sizeof(old->fsid)) != 0)
2516 return 0;
3b7eb5e3
TM
2517 if (!nfs_compare_userns(old, server))
2518 return 0;
e89a5a43 2519 return nfs_compare_mount_options(sb, server, mntflags);
275a5d24
TM
2520}
2521
39ffb921 2522#ifdef CONFIG_NFS_FSCACHE
2311b943
BS
2523static void nfs_get_cache_cookie(struct super_block *sb,
2524 struct nfs_parsed_mount_data *parsed,
2525 struct nfs_clone_mount *cloned)
2526{
c4271c6e 2527 struct nfs_server *nfss = NFS_SB(sb);
2311b943
BS
2528 char *uniq = NULL;
2529 int ulen = 0;
2530
c4271c6e
TM
2531 nfss->fscache_key = NULL;
2532 nfss->fscache = NULL;
2533
2534 if (parsed) {
2535 if (!(parsed->options & NFS_OPTION_FSCACHE))
2536 return;
2537 if (parsed->fscache_uniq) {
2538 uniq = parsed->fscache_uniq;
2539 ulen = strlen(parsed->fscache_uniq);
2540 }
2311b943
BS
2541 } else if (cloned) {
2542 struct nfs_server *mnt_s = NFS_SB(cloned->sb);
c4271c6e
TM
2543 if (!(mnt_s->options & NFS_OPTION_FSCACHE))
2544 return;
2311b943
BS
2545 if (mnt_s->fscache_key) {
2546 uniq = mnt_s->fscache_key->key.uniquifier;
2547 ulen = mnt_s->fscache_key->key.uniq_len;
2548 };
c4271c6e
TM
2549 } else
2550 return;
2311b943
BS
2551
2552 nfs_fscache_get_super_cookie(sb, uniq, ulen);
2553}
39ffb921
TM
2554#else
2555static void nfs_get_cache_cookie(struct super_block *sb,
2556 struct nfs_parsed_mount_data *parsed,
2557 struct nfs_clone_mount *cloned)
2558{
2559}
2560#endif
2311b943 2561
fbdefd64
BS
2562int nfs_set_sb_security(struct super_block *s, struct dentry *mntroot,
2563 struct nfs_mount_info *mount_info)
3d176e3f 2564{
aa9c2669
DQ
2565 int error;
2566 unsigned long kflags = 0, kflags_out = 0;
2567 if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL)
2568 kflags |= SECURITY_LSM_NATIVE_LABELS;
2569
204cc0cc 2570 error = security_sb_set_mnt_opts(s, mount_info->parsed->lsm_opts,
aa9c2669
DQ
2571 kflags, &kflags_out);
2572 if (error)
2573 goto err;
2574
2575 if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL &&
2576 !(kflags_out & SECURITY_LSM_NATIVE_LABELS))
2577 NFS_SB(s)->caps &= ~NFS_CAP_SECURITY_LABEL;
2578err:
2579 return error;
3d176e3f 2580}
89d77c8f 2581EXPORT_SYMBOL_GPL(nfs_set_sb_security);
3d176e3f 2582
fbdefd64
BS
2583int nfs_clone_sb_security(struct super_block *s, struct dentry *mntroot,
2584 struct nfs_mount_info *mount_info)
3d176e3f 2585{
0b4d3452
SM
2586 int error;
2587 unsigned long kflags = 0, kflags_out = 0;
2588
3d176e3f 2589 /* clone any lsm security options from the parent to the new sb */
2b0143b5 2590 if (d_inode(mntroot)->i_op != NFS_SB(s)->nfs_client->rpc_ops->dir_inode_ops)
3d176e3f 2591 return -ESTALE;
0b4d3452
SM
2592
2593 if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL)
2594 kflags |= SECURITY_LSM_NATIVE_LABELS;
2595
2596 error = security_sb_clone_mnt_opts(mount_info->cloned->sb, s, kflags,
2597 &kflags_out);
2598 if (error)
2599 return error;
2600
2601 if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL &&
2602 !(kflags_out & SECURITY_LSM_NATIVE_LABELS))
2603 NFS_SB(s)->caps &= ~NFS_CAP_SECURITY_LABEL;
2604 return 0;
3d176e3f 2605}
89d77c8f 2606EXPORT_SYMBOL_GPL(nfs_clone_sb_security);
3d176e3f 2607
ab7017a3 2608struct dentry *nfs_fs_mount_common(struct nfs_server *server,
fbdefd64 2609 int flags, const char *dev_name,
ab7017a3
BS
2610 struct nfs_mount_info *mount_info,
2611 struct nfs_subversion *nfs_mod)
f7b422b1 2612{
f7b422b1 2613 struct super_block *s;
01194981 2614 struct dentry *mntroot = ERR_PTR(-ENOMEM);
75180df2 2615 int (*compare_super)(struct super_block *, void *) = nfs_compare_super;
e89a5a43
TM
2616 struct nfs_sb_mountdata sb_mntdata = {
2617 .mntflags = flags,
c40f8d1d 2618 .server = server,
e89a5a43 2619 };
01194981 2620 int error;
33852a1f 2621
75180df2
TM
2622 if (server->flags & NFS_MOUNT_UNSHARED)
2623 compare_super = NULL;
2624
fb2088cc
SP
2625 /* -o noac implies -o sync */
2626 if (server->flags & NFS_MOUNT_NOAC)
1751e8a6 2627 sb_mntdata.mntflags |= SB_SYNCHRONOUS;
fb2088cc 2628
e890db01 2629 if (mount_info->cloned != NULL && mount_info->cloned->sb != NULL)
1751e8a6
LT
2630 if (mount_info->cloned->sb->s_flags & SB_SYNCHRONOUS)
2631 sb_mntdata.mntflags |= SB_SYNCHRONOUS;
e890db01 2632
54ceac45 2633 /* Get a superblock - note that we may end up sharing one that already exists */
ab7017a3 2634 s = sget(nfs_mod->nfs_fs, compare_super, nfs_set_super, flags, &sb_mntdata);
816724e6 2635 if (IS_ERR(s)) {
01194981 2636 mntroot = ERR_CAST(s);
54ceac45 2637 goto out_err_nosb;
816724e6
TM
2638 }
2639
54ceac45
DH
2640 if (s->s_fs_info != server) {
2641 nfs_free_server(server);
2642 server = NULL;
fa799759 2643 } else {
9052c7cf
JK
2644 error = super_setup_bdi_name(s, "%u:%u", MAJOR(server->s_dev),
2645 MINOR(server->s_dev));
2646 if (error) {
2647 mntroot = ERR_PTR(error);
2648 goto error_splat_super;
2649 }
2650 s->s_bdi->ra_pages = server->rpages * NFS_MAX_READAHEAD;
ce6cda18 2651 server->super = s;
54ceac45 2652 }
f7b422b1 2653
54ceac45
DH
2654 if (!s->s_root) {
2655 /* initial superblock/root creation */
9052c7cf 2656 mount_info->fill_super(s, mount_info);
3d176e3f 2657 nfs_get_cache_cookie(s, mount_info->parsed, mount_info->cloned);
95dd7758
EB
2658 if (!(server->flags & NFS_MOUNT_UNSHARED))
2659 s->s_iflags |= SB_I_MULTIROOT;
54ceac45 2660 }
f7b422b1 2661
87c7083d 2662 mntroot = nfs_get_root(s, mount_info->mntfh, dev_name);
01194981 2663 if (IS_ERR(mntroot))
54ceac45 2664 goto error_splat_super;
816724e6 2665
3d176e3f 2666 error = mount_info->set_security(s, mntroot, mount_info);
f9c3a380
EP
2667 if (error)
2668 goto error_splat_root;
2669
1751e8a6 2670 s->s_flags |= SB_ACTIVE;
0655960f
CL
2671
2672out:
01194981 2673 return mntroot;
816724e6 2674
54ceac45
DH
2675out_err_nosb:
2676 nfs_free_server(server);
0655960f 2677 goto out;
54ceac45 2678
f9c3a380
EP
2679error_splat_root:
2680 dput(mntroot);
01194981 2681 mntroot = ERR_PTR(error);
54ceac45 2682error_splat_super:
6f5bbff9 2683 deactivate_locked_super(s);
0655960f 2684 goto out;
f7b422b1 2685}
89d77c8f 2686EXPORT_SYMBOL_GPL(nfs_fs_mount_common);
f7b422b1 2687
fbdefd64 2688struct dentry *nfs_fs_mount(struct file_system_type *fs_type,
c40f8d1d
BS
2689 int flags, const char *dev_name, void *raw_data)
2690{
c40f8d1d
BS
2691 struct nfs_mount_info mount_info = {
2692 .fill_super = nfs_fill_super,
3d176e3f 2693 .set_security = nfs_set_sb_security,
c40f8d1d 2694 };
c40f8d1d 2695 struct dentry *mntroot = ERR_PTR(-ENOMEM);
ab7017a3 2696 struct nfs_subversion *nfs_mod;
c40f8d1d
BS
2697 int error;
2698
46058d46 2699 mount_info.parsed = nfs_alloc_parsed_mount_data();
87c7083d
BS
2700 mount_info.mntfh = nfs_alloc_fhandle();
2701 if (mount_info.parsed == NULL || mount_info.mntfh == NULL)
c40f8d1d
BS
2702 goto out;
2703
2704 /* Validate the mount data */
87c7083d 2705 error = nfs_validate_mount_data(fs_type, raw_data, mount_info.parsed, mount_info.mntfh, dev_name);
b72e4f42 2706 if (error == NFS_TEXT_DATA)
46058d46 2707 error = nfs_validate_text_mount_data(raw_data, mount_info.parsed, dev_name);
c40f8d1d
BS
2708 if (error < 0) {
2709 mntroot = ERR_PTR(error);
2710 goto out;
2711 }
c40f8d1d 2712
ab7017a3
BS
2713 nfs_mod = get_nfs_version(mount_info.parsed->version);
2714 if (IS_ERR(nfs_mod)) {
2715 mntroot = ERR_CAST(nfs_mod);
2716 goto out;
2717 }
2718
ff9099f2 2719 mntroot = nfs_mod->rpc_ops->try_mount(flags, dev_name, &mount_info, nfs_mod);
ab7017a3
BS
2720
2721 put_nfs_version(nfs_mod);
c40f8d1d 2722out:
46058d46 2723 nfs_free_parsed_mount_data(mount_info.parsed);
87c7083d 2724 nfs_free_fhandle(mount_info.mntfh);
c40f8d1d
BS
2725 return mntroot;
2726}
89d77c8f 2727EXPORT_SYMBOL_GPL(nfs_fs_mount);
c40f8d1d 2728
54ceac45
DH
2729/*
2730 * Destroy an NFS2/3 superblock
2731 */
fbdefd64 2732void nfs_kill_super(struct super_block *s)
f7b422b1
DH
2733{
2734 struct nfs_server *server = NFS_SB(s);
7b14a213
CH
2735 dev_t dev = s->s_dev;
2736
2737 generic_shutdown_super(s);
f7b422b1 2738
08734048 2739 nfs_fscache_release_super_cookie(s);
7b14a213 2740
54ceac45 2741 nfs_free_server(server);
7b14a213 2742 free_anon_bdev(dev);
f7b422b1 2743}
89d77c8f 2744EXPORT_SYMBOL_GPL(nfs_kill_super);
f7b422b1 2745
54ceac45 2746/*
8c958e0c 2747 * Clone an NFS2/3/4 server record on xdev traversal (FSID-change)
54ceac45 2748 */
3dd4f8ef 2749static struct dentry *
e8f25e6d
BS
2750nfs_xdev_mount(struct file_system_type *fs_type, int flags,
2751 const char *dev_name, void *raw_data)
f7b422b1 2752{
e8f25e6d
BS
2753 struct nfs_clone_mount *data = raw_data;
2754 struct nfs_mount_info mount_info = {
2755 .fill_super = nfs_clone_super,
2756 .set_security = nfs_clone_sb_security,
2757 .cloned = data,
2758 };
54ceac45 2759 struct nfs_server *server;
3d176e3f 2760 struct dentry *mntroot = ERR_PTR(-ENOMEM);
ab7017a3 2761 struct nfs_subversion *nfs_mod = NFS_SB(data->sb)->nfs_client->cl_nfs_mod;
f7b422b1 2762
dee972b9 2763 dprintk("--> nfs_xdev_mount()\n");
f7b422b1 2764
e8f25e6d 2765 mount_info.mntfh = mount_info.cloned->fh;
87c7083d 2766
54ceac45 2767 /* create a new volume representation */
1179acc6 2768 server = nfs_mod->rpc_ops->clone_server(NFS_SB(data->sb), data->fh, data->fattr, data->authflavor);
f7b422b1 2769
dee972b9
TM
2770 if (IS_ERR(server))
2771 mntroot = ERR_CAST(server);
2772 else
2773 mntroot = nfs_fs_mount_common(server, flags,
2774 dev_name, &mount_info, nfs_mod);
24c8dbbb 2775
dee972b9
TM
2776 dprintk("<-- nfs_xdev_mount() = %ld\n",
2777 IS_ERR(mntroot) ? PTR_ERR(mntroot) : 0L);
2778 return mntroot;
f7b422b1
DH
2779}
2780
89d77c8f 2781#if IS_ENABLED(CONFIG_NFS_V4)
54ceac45 2782
01c3f052
TM
2783static void nfs4_validate_mount_flags(struct nfs_parsed_mount_data *args)
2784{
5eebde23
SJ
2785 args->flags &= ~(NFS_MOUNT_NONLM|NFS_MOUNT_NOACL|NFS_MOUNT_VER3|
2786 NFS_MOUNT_LOCAL_FLOCK|NFS_MOUNT_LOCAL_FCNTL);
01c3f052
TM
2787}
2788
f0768ebd
CL
2789/*
2790 * Validate NFSv4 mount options
2791 */
91ea40b9
TT
2792static int nfs4_validate_mount_data(void *options,
2793 struct nfs_parsed_mount_data *args,
2794 const char *dev_name)
f0768ebd 2795{
4cfd74fc 2796 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
91ea40b9 2797 struct nfs4_mount_data *data = (struct nfs4_mount_data *)options;
f0768ebd
CL
2798 char *c;
2799
2800 if (data == NULL)
2801 goto out_no_data;
2802
cdf66442
BS
2803 args->version = 4;
2804
f0768ebd
CL
2805 switch (data->version) {
2806 case 1:
4c568017
CL
2807 if (data->host_addrlen > sizeof(args->nfs_server.address))
2808 goto out_no_address;
2809 if (data->host_addrlen == 0)
f0768ebd 2810 goto out_no_address;
4c568017 2811 args->nfs_server.addrlen = data->host_addrlen;
4cfd74fc 2812 if (copy_from_user(sap, data->host_addr, data->host_addrlen))
f0768ebd 2813 return -EFAULT;
4cfd74fc 2814 if (!nfs_verify_server_address(sap))
f0768ebd 2815 goto out_no_address;
872ece86 2816 args->nfs_server.port = ntohs(((struct sockaddr_in *)sap)->sin_port);
f0768ebd 2817
6738b251 2818 if (data->auth_flavourlen) {
74c98811 2819 rpc_authflavor_t pseudoflavor;
6738b251
CL
2820 if (data->auth_flavourlen > 1)
2821 goto out_inval_auth;
74c98811 2822 if (copy_from_user(&pseudoflavor,
91ea40b9 2823 data->auth_flavours,
74c98811 2824 sizeof(pseudoflavor)))
f0768ebd 2825 return -EFAULT;
a3f73c27 2826 args->selected_flavor = pseudoflavor;
74c98811 2827 } else
a3f73c27 2828 args->selected_flavor = RPC_AUTH_UNIX;
f0768ebd
CL
2829
2830 c = strndup_user(data->hostname.data, NFS4_MAXNAMLEN);
2831 if (IS_ERR(c))
2832 return PTR_ERR(c);
91ea40b9 2833 args->nfs_server.hostname = c;
f0768ebd
CL
2834
2835 c = strndup_user(data->mnt_path.data, NFS4_MAXPATHLEN);
2836 if (IS_ERR(c))
2837 return PTR_ERR(c);
91ea40b9
TT
2838 args->nfs_server.export_path = c;
2839 dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", c);
f0768ebd
CL
2840
2841 c = strndup_user(data->client_addr.data, 16);
2842 if (IS_ERR(c))
2843 return PTR_ERR(c);
91ea40b9
TT
2844 args->client_address = c;
2845
2846 /*
2847 * Translate to nfs_parsed_mount_data, which nfs4_fill_super
2848 * can deal with.
2849 */
2850
2851 args->flags = data->flags & NFS4_MOUNT_FLAGMASK;
2852 args->rsize = data->rsize;
2853 args->wsize = data->wsize;
2854 args->timeo = data->timeo;
2855 args->retrans = data->retrans;
2856 args->acregmin = data->acregmin;
2857 args->acregmax = data->acregmax;
2858 args->acdirmin = data->acdirmin;
2859 args->acdirmax = data->acdirmax;
2860 args->nfs_server.protocol = data->proto;
259875ef 2861 nfs_validate_transport_protocol(args);
6da1a034
TM
2862 if (args->nfs_server.protocol == XPRT_TRANSPORT_UDP)
2863 goto out_invalid_transport_udp;
f0768ebd
CL
2864
2865 break;
7630c852 2866 default:
b72e4f42 2867 return NFS_TEXT_DATA;
f0768ebd
CL
2868 }
2869
2870 return 0;
2871
2872out_no_data:
2873 dfprintk(MOUNT, "NFS4: mount program didn't pass any mount data\n");
2874 return -EINVAL;
2875
2876out_inval_auth:
2877 dfprintk(MOUNT, "NFS4: Invalid number of RPC auth flavours %d\n",
2878 data->auth_flavourlen);
2879 return -EINVAL;
2880
2881out_no_address:
2882 dfprintk(MOUNT, "NFS4: mount program didn't pass remote address\n");
2883 return -EINVAL;
6da1a034
TM
2884
2885out_invalid_transport_udp:
2886 dfprintk(MOUNT, "NFSv4: Unsupported transport protocol udp\n");
2887 return -EINVAL;
f0768ebd
CL
2888}
2889
fac1e8e4
BS
2890/*
2891 * NFS v4 module parameters need to stay in the
2892 * NFS client for backwards compatibility
2893 */
2894unsigned int nfs_callback_set_tcpport;
5405fc44 2895unsigned short nfs_callback_nr_threads;
fac1e8e4
BS
2896/* Default cache timeout is 10 minutes */
2897unsigned int nfs_idmap_cache_timeout = 600;
2898/* Turn off NFSv4 uid/gid mapping when using AUTH_SYS */
2899bool nfs4_disable_idmapping = true;
2900unsigned short max_session_slots = NFS4_DEF_SLOT_TABLE_SIZE;
5405fc44 2901unsigned short max_session_cb_slots = NFS4_DEF_CB_SLOT_TABLE_SIZE;
fac1e8e4 2902unsigned short send_implementation_id = 1;
6f2ea7f2 2903char nfs4_client_id_uniquifier[NFS4_CLIENT_ID_UNIQ_LEN] = "";
f6de7a39 2904bool recover_lost_locks = false;
fac1e8e4 2905
5405fc44 2906EXPORT_SYMBOL_GPL(nfs_callback_nr_threads);
89d77c8f 2907EXPORT_SYMBOL_GPL(nfs_callback_set_tcpport);
89d77c8f
BS
2908EXPORT_SYMBOL_GPL(nfs_idmap_cache_timeout);
2909EXPORT_SYMBOL_GPL(nfs4_disable_idmapping);
2910EXPORT_SYMBOL_GPL(max_session_slots);
5405fc44 2911EXPORT_SYMBOL_GPL(max_session_cb_slots);
89d77c8f 2912EXPORT_SYMBOL_GPL(send_implementation_id);
6f2ea7f2 2913EXPORT_SYMBOL_GPL(nfs4_client_id_uniquifier);
f6de7a39 2914EXPORT_SYMBOL_GPL(recover_lost_locks);
89d77c8f 2915
fac1e8e4
BS
2916#define NFS_CALLBACK_MAXPORTNR (65535U)
2917
2918static int param_set_portnr(const char *val, const struct kernel_param *kp)
2919{
2920 unsigned long num;
2921 int ret;
2922
2923 if (!val)
2924 return -EINVAL;
7297cb68 2925 ret = kstrtoul(val, 0, &num);
379ebf07 2926 if (ret || num > NFS_CALLBACK_MAXPORTNR)
fac1e8e4
BS
2927 return -EINVAL;
2928 *((unsigned int *)kp->arg) = num;
2929 return 0;
2930}
9c27847d 2931static const struct kernel_param_ops param_ops_portnr = {
fac1e8e4
BS
2932 .set = param_set_portnr,
2933 .get = param_get_uint,
2934};
2935#define param_check_portnr(name, p) __param_check(name, p, unsigned int);
2936
2937module_param_named(callback_tcpport, nfs_callback_set_tcpport, portnr, 0644);
5405fc44
TM
2938module_param_named(callback_nr_threads, nfs_callback_nr_threads, ushort, 0644);
2939MODULE_PARM_DESC(callback_nr_threads, "Number of threads that will be "
2940 "assigned to the NFSv4 callback channels.");
fac1e8e4
BS
2941module_param(nfs_idmap_cache_timeout, int, 0644);
2942module_param(nfs4_disable_idmapping, bool, 0644);
6f2ea7f2
CL
2943module_param_string(nfs4_unique_id, nfs4_client_id_uniquifier,
2944 NFS4_CLIENT_ID_UNIQ_LEN, 0600);
fac1e8e4
BS
2945MODULE_PARM_DESC(nfs4_disable_idmapping,
2946 "Turn off NFSv4 idmapping when using 'sec=sys'");
2947module_param(max_session_slots, ushort, 0644);
2948MODULE_PARM_DESC(max_session_slots, "Maximum number of outstanding NFSv4.1 "
2949 "requests the client will negotiate");
5405fc44 2950module_param(max_session_cb_slots, ushort, 0644);
f36ab161 2951MODULE_PARM_DESC(max_session_cb_slots, "Maximum number of parallel NFSv4.1 "
5405fc44 2952 "callbacks the client will process for a given server");
fac1e8e4
BS
2953module_param(send_implementation_id, ushort, 0644);
2954MODULE_PARM_DESC(send_implementation_id,
2955 "Send implementation ID with NFSv4.1 exchange_id");
6f2ea7f2 2956MODULE_PARM_DESC(nfs4_unique_id, "nfs_client_id4 uniquifier string");
425e776d 2957
f6de7a39
TM
2958module_param(recover_lost_locks, bool, 0644);
2959MODULE_PARM_DESC(recover_lost_locks,
2960 "If the server reports that a lock might be lost, "
2961 "try to recover it risking data corruption.");
2962
2963
54ceac45 2964#endif /* CONFIG_NFS_V4 */