Merge branch 'i2c/for-current' of git://git.kernel.org/pub/scm/linux/kernel/git/wsa...
[deliverable/linux.git] / fs / nfs / super.c
CommitLineData
f7b422b1
DH
1/*
2 * linux/fs/nfs/super.c
3 *
4 * Copyright (C) 1992 Rick Sladkey
5 *
6 * nfs superblock handling functions
7 *
526719ba 8 * Modularised by Alan Cox <alan@lxorguk.ukuu.org.uk>, while hacking some
f7b422b1
DH
9 * experimental NFS changes. Modularisation taken straight from SYS5 fs.
10 *
11 * Change to nfs_read_super() to permit NFS mounts to multi-homed hosts.
12 * J.S.Peatfield@damtp.cam.ac.uk
13 *
14 * Split from inode.c by David Howells <dhowells@redhat.com>
15 *
54ceac45
DH
16 * - superblocks are indexed on server only - all inodes, dentries, etc. associated with a
17 * particular server are held in the same superblock
18 * - NFS superblocks can have several effective roots to the dentry tree
19 * - directory type roots are spliced into the tree when a path from one root reaches the root
20 * of another (see nfs_lookup())
f7b422b1
DH
21 */
22
f7b422b1
DH
23#include <linux/module.h>
24#include <linux/init.h>
25
26#include <linux/time.h>
27#include <linux/kernel.h>
28#include <linux/mm.h>
29#include <linux/string.h>
30#include <linux/stat.h>
31#include <linux/errno.h>
32#include <linux/unistd.h>
33#include <linux/sunrpc/clnt.h>
5976687a 34#include <linux/sunrpc/addr.h>
f7b422b1
DH
35#include <linux/sunrpc/stats.h>
36#include <linux/sunrpc/metrics.h>
0896a725 37#include <linux/sunrpc/xprtsock.h>
2cf7ff7a 38#include <linux/sunrpc/xprtrdma.h>
f7b422b1
DH
39#include <linux/nfs_fs.h>
40#include <linux/nfs_mount.h>
41#include <linux/nfs4_mount.h>
42#include <linux/lockd/bind.h>
f7b422b1
DH
43#include <linux/seq_file.h>
44#include <linux/mount.h>
c02d7adf 45#include <linux/namei.h>
f7b422b1
DH
46#include <linux/vfs.h>
47#include <linux/inet.h>
fd00a8ff 48#include <linux/in6.h>
5a0e3ad6 49#include <linux/slab.h>
fd00a8ff 50#include <net/ipv6.h>
d8e7748a 51#include <linux/netdevice.h>
f7b422b1 52#include <linux/nfs_xdr.h>
b5d5dfbd 53#include <linux/magic.h>
bf0fd768 54#include <linux/parser.h>
e50a7a1a 55#include <linux/nsproxy.h>
2446ab60 56#include <linux/rcupdate.h>
f7b422b1 57
f7b422b1
DH
58#include <asm/uaccess.h>
59
60#include "nfs4_fs.h"
61#include "callback.h"
62#include "delegation.h"
63#include "iostat.h"
64#include "internal.h"
08734048 65#include "fscache.h"
76e697ba 66#include "nfs4session.h"
ae50c0b5 67#include "pnfs.h"
ab7017a3 68#include "nfs.h"
f7b422b1
DH
69
70#define NFSDBG_FACILITY NFSDBG_VFS
b72e4f42 71#define NFS_TEXT_DATA 1
f7b422b1 72
1c606fb7 73#if IS_ENABLED(CONFIG_NFS_V3)
1e657bd5
PZ
74#define NFS_DEFAULT_VERSION 3
75#else
76#define NFS_DEFAULT_VERSION 2
77#endif
78
bf0fd768
CL
79enum {
80 /* Mount options that take no arguments */
81 Opt_soft, Opt_hard,
bf0fd768
CL
82 Opt_posix, Opt_noposix,
83 Opt_cto, Opt_nocto,
84 Opt_ac, Opt_noac,
85 Opt_lock, Opt_nolock,
2cf7ff7a 86 Opt_udp, Opt_tcp, Opt_rdma,
bf0fd768
CL
87 Opt_acl, Opt_noacl,
88 Opt_rdirplus, Opt_nordirplus,
75180df2 89 Opt_sharecache, Opt_nosharecache,
d740351b 90 Opt_resvport, Opt_noresvport,
b797cac7 91 Opt_fscache, Opt_nofscache,
89652617 92 Opt_migration, Opt_nomigration,
bf0fd768
CL
93
94 /* Mount options that take integer arguments */
95 Opt_port,
96 Opt_rsize, Opt_wsize, Opt_bsize,
97 Opt_timeo, Opt_retrans,
98 Opt_acregmin, Opt_acregmax,
99 Opt_acdirmin, Opt_acdirmax,
100 Opt_actimeo,
101 Opt_namelen,
102 Opt_mountport,
e887cbcf 103 Opt_mountvers,
3fd5be9e 104 Opt_minorversion,
bf0fd768
CL
105
106 /* Mount options that take string arguments */
0d71b058 107 Opt_nfsvers,
33832034 108 Opt_sec, Opt_proto, Opt_mountproto, Opt_mounthost,
0ac83779 109 Opt_addr, Opt_mountaddr, Opt_clientaddr,
7973c1f1 110 Opt_lookupcache,
b797cac7 111 Opt_fscache_uniq,
5eebde23 112 Opt_local_lock,
bf0fd768 113
f45663ce
CL
114 /* Special mount options */
115 Opt_userspace, Opt_deprecated, Opt_sloppy,
bf0fd768
CL
116
117 Opt_err
118};
119
a447c093 120static const match_table_t nfs_mount_option_tokens = {
bf0fd768
CL
121 { Opt_userspace, "bg" },
122 { Opt_userspace, "fg" },
ecbb3845
CL
123 { Opt_userspace, "retry=%s" },
124
f45663ce
CL
125 { Opt_sloppy, "sloppy" },
126
bf0fd768
CL
127 { Opt_soft, "soft" },
128 { Opt_hard, "hard" },
d33e4dfe
CL
129 { Opt_deprecated, "intr" },
130 { Opt_deprecated, "nointr" },
bf0fd768
CL
131 { Opt_posix, "posix" },
132 { Opt_noposix, "noposix" },
133 { Opt_cto, "cto" },
134 { Opt_nocto, "nocto" },
135 { Opt_ac, "ac" },
136 { Opt_noac, "noac" },
137 { Opt_lock, "lock" },
138 { Opt_nolock, "nolock" },
bf0fd768
CL
139 { Opt_udp, "udp" },
140 { Opt_tcp, "tcp" },
2cf7ff7a 141 { Opt_rdma, "rdma" },
bf0fd768
CL
142 { Opt_acl, "acl" },
143 { Opt_noacl, "noacl" },
144 { Opt_rdirplus, "rdirplus" },
145 { Opt_nordirplus, "nordirplus" },
75180df2
TM
146 { Opt_sharecache, "sharecache" },
147 { Opt_nosharecache, "nosharecache" },
d740351b
CL
148 { Opt_resvport, "resvport" },
149 { Opt_noresvport, "noresvport" },
b797cac7 150 { Opt_fscache, "fsc" },
b797cac7 151 { Opt_nofscache, "nofsc" },
89652617
CL
152 { Opt_migration, "migration" },
153 { Opt_nomigration, "nomigration" },
bf0fd768 154
a5a16bae
CL
155 { Opt_port, "port=%s" },
156 { Opt_rsize, "rsize=%s" },
157 { Opt_wsize, "wsize=%s" },
158 { Opt_bsize, "bsize=%s" },
159 { Opt_timeo, "timeo=%s" },
160 { Opt_retrans, "retrans=%s" },
161 { Opt_acregmin, "acregmin=%s" },
162 { Opt_acregmax, "acregmax=%s" },
163 { Opt_acdirmin, "acdirmin=%s" },
164 { Opt_acdirmax, "acdirmax=%s" },
165 { Opt_actimeo, "actimeo=%s" },
166 { Opt_namelen, "namlen=%s" },
167 { Opt_mountport, "mountport=%s" },
168 { Opt_mountvers, "mountvers=%s" },
0d71b058
TM
169 { Opt_minorversion, "minorversion=%s" },
170
a5a16bae
CL
171 { Opt_nfsvers, "nfsvers=%s" },
172 { Opt_nfsvers, "vers=%s" },
bf0fd768
CL
173
174 { Opt_sec, "sec=%s" },
175 { Opt_proto, "proto=%s" },
176 { Opt_mountproto, "mountproto=%s" },
177 { Opt_addr, "addr=%s" },
178 { Opt_clientaddr, "clientaddr=%s" },
33832034 179 { Opt_mounthost, "mounthost=%s" },
0ac83779 180 { Opt_mountaddr, "mountaddr=%s" },
bf0fd768 181
7973c1f1 182 { Opt_lookupcache, "lookupcache=%s" },
a6d5ff64 183 { Opt_fscache_uniq, "fsc=%s" },
5eebde23 184 { Opt_local_lock, "local_lock=%s" },
7973c1f1 185
3862279a
TM
186 /* The following needs to be listed after all other options */
187 { Opt_nfsvers, "v%s" },
188
bf0fd768
CL
189 { Opt_err, NULL }
190};
191
192enum {
ee671b01 193 Opt_xprt_udp, Opt_xprt_udp6, Opt_xprt_tcp, Opt_xprt_tcp6, Opt_xprt_rdma,
181342c5 194 Opt_xprt_rdma6,
bf0fd768
CL
195
196 Opt_xprt_err
197};
198
a447c093 199static const match_table_t nfs_xprt_protocol_tokens = {
bf0fd768 200 { Opt_xprt_udp, "udp" },
ee671b01 201 { Opt_xprt_udp6, "udp6" },
bf0fd768 202 { Opt_xprt_tcp, "tcp" },
ee671b01 203 { Opt_xprt_tcp6, "tcp6" },
2cf7ff7a 204 { Opt_xprt_rdma, "rdma" },
181342c5 205 { Opt_xprt_rdma6, "rdma6" },
bf0fd768
CL
206
207 { Opt_xprt_err, NULL }
208};
209
210enum {
211 Opt_sec_none, Opt_sec_sys,
212 Opt_sec_krb5, Opt_sec_krb5i, Opt_sec_krb5p,
213 Opt_sec_lkey, Opt_sec_lkeyi, Opt_sec_lkeyp,
214 Opt_sec_spkm, Opt_sec_spkmi, Opt_sec_spkmp,
215
216 Opt_sec_err
217};
218
a447c093 219static const match_table_t nfs_secflavor_tokens = {
bf0fd768
CL
220 { Opt_sec_none, "none" },
221 { Opt_sec_none, "null" },
222 { Opt_sec_sys, "sys" },
223
224 { Opt_sec_krb5, "krb5" },
225 { Opt_sec_krb5i, "krb5i" },
226 { Opt_sec_krb5p, "krb5p" },
227
228 { Opt_sec_lkey, "lkey" },
229 { Opt_sec_lkeyi, "lkeyi" },
230 { Opt_sec_lkeyp, "lkeyp" },
231
8d042218
OK
232 { Opt_sec_spkm, "spkm3" },
233 { Opt_sec_spkmi, "spkm3i" },
234 { Opt_sec_spkmp, "spkm3p" },
235
bf0fd768
CL
236 { Opt_sec_err, NULL }
237};
238
7973c1f1
TM
239enum {
240 Opt_lookupcache_all, Opt_lookupcache_positive,
241 Opt_lookupcache_none,
242
243 Opt_lookupcache_err
244};
245
246static match_table_t nfs_lookupcache_tokens = {
247 { Opt_lookupcache_all, "all" },
248 { Opt_lookupcache_positive, "pos" },
249 { Opt_lookupcache_positive, "positive" },
250 { Opt_lookupcache_none, "none" },
251
252 { Opt_lookupcache_err, NULL }
253};
254
5eebde23
SJ
255enum {
256 Opt_local_lock_all, Opt_local_lock_flock, Opt_local_lock_posix,
257 Opt_local_lock_none,
258
259 Opt_local_lock_err
260};
261
262static match_table_t nfs_local_lock_tokens = {
263 { Opt_local_lock_all, "all" },
264 { Opt_local_lock_flock, "flock" },
265 { Opt_local_lock_posix, "posix" },
266 { Opt_local_lock_none, "none" },
267
268 { Opt_local_lock_err, NULL }
269};
270
0d71b058
TM
271enum {
272 Opt_vers_2, Opt_vers_3, Opt_vers_4, Opt_vers_4_0,
42c2c424 273 Opt_vers_4_1, Opt_vers_4_2,
0d71b058
TM
274
275 Opt_vers_err
276};
277
278static match_table_t nfs_vers_tokens = {
279 { Opt_vers_2, "2" },
280 { Opt_vers_3, "3" },
281 { Opt_vers_4, "4" },
282 { Opt_vers_4_0, "4.0" },
283 { Opt_vers_4_1, "4.1" },
42c2c424 284 { Opt_vers_4_2, "4.2" },
0d71b058
TM
285
286 { Opt_vers_err, NULL }
287};
bf0fd768 288
31f43471
AV
289static struct dentry *nfs_xdev_mount(struct file_system_type *fs_type,
290 int flags, const char *dev_name, void *raw_data);
f7b422b1 291
ab7017a3 292struct file_system_type nfs_fs_type = {
f7b422b1
DH
293 .owner = THIS_MODULE,
294 .name = "nfs",
01194981 295 .mount = nfs_fs_mount,
f7b422b1 296 .kill_sb = nfs_kill_super,
ecf3d1f1 297 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
f7b422b1 298};
7f78e035 299MODULE_ALIAS_FS("nfs");
ddda8e0a 300EXPORT_SYMBOL_GPL(nfs_fs_type);
f7b422b1 301
54ceac45 302struct file_system_type nfs_xdev_fs_type = {
f7b422b1
DH
303 .owner = THIS_MODULE,
304 .name = "nfs",
31f43471 305 .mount = nfs_xdev_mount,
f7b422b1 306 .kill_sb = nfs_kill_super,
ecf3d1f1 307 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
f7b422b1
DH
308};
309
6a74490d 310const struct super_operations nfs_sops = {
f7b422b1
DH
311 .alloc_inode = nfs_alloc_inode,
312 .destroy_inode = nfs_destroy_inode,
313 .write_inode = nfs_write_inode,
eed99357 314 .drop_inode = nfs_drop_inode,
f7b422b1 315 .statfs = nfs_statfs,
b57922d9 316 .evict_inode = nfs_evict_inode,
f7b422b1
DH
317 .umount_begin = nfs_umount_begin,
318 .show_options = nfs_show_options,
c7f404b4
AV
319 .show_devname = nfs_show_devname,
320 .show_path = nfs_show_path,
f7b422b1 321 .show_stats = nfs_show_stats,
48b605f8 322 .remount_fs = nfs_remount,
f7b422b1 323};
ddda8e0a 324EXPORT_SYMBOL_GPL(nfs_sops);
f7b422b1 325
89d77c8f 326#if IS_ENABLED(CONFIG_NFS_V4)
b72e4f42 327static void nfs4_validate_mount_flags(struct nfs_parsed_mount_data *);
d72c727c
BS
328static int nfs4_validate_mount_data(void *options,
329 struct nfs_parsed_mount_data *args, const char *dev_name);
1ae811ee 330
331struct file_system_type nfs4_fs_type = {
332 .owner = THIS_MODULE,
333 .name = "nfs4",
334 .mount = nfs_fs_mount,
335 .kill_sb = nfs_kill_super,
ecf3d1f1 336 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
1ae811ee 337};
7f78e035 338MODULE_ALIAS_FS("nfs4");
fa7614dd 339MODULE_ALIAS("nfs4");
1ae811ee 340EXPORT_SYMBOL_GPL(nfs4_fs_type);
341
342static int __init register_nfs4_fs(void)
343{
344 return register_filesystem(&nfs4_fs_type);
345}
346
347static void unregister_nfs4_fs(void)
348{
349 unregister_filesystem(&nfs4_fs_type);
350}
351#else
352static int __init register_nfs4_fs(void)
353{
354 return 0;
355}
356
357static void unregister_nfs4_fs(void)
358{
359}
f7b422b1
DH
360#endif
361
8e1f936b 362static struct shrinker acl_shrinker = {
1ab6c499
DC
363 .count_objects = nfs_access_cache_count,
364 .scan_objects = nfs_access_cache_scan,
8e1f936b
RR
365 .seeks = DEFAULT_SEEKS,
366};
979df72e 367
f7b422b1
DH
368/*
369 * Register the NFS filesystems
370 */
371int __init register_nfs_fs(void)
372{
373 int ret;
374
375 ret = register_filesystem(&nfs_fs_type);
376 if (ret < 0)
377 goto error_0;
378
1ae811ee 379 ret = register_nfs4_fs();
f7b422b1
DH
380 if (ret < 0)
381 goto error_1;
1ae811ee 382
383 ret = nfs_register_sysctl();
384 if (ret < 0)
385 goto error_2;
5ef8d792
KM
386 ret = register_shrinker(&acl_shrinker);
387 if (ret < 0)
388 goto error_3;
f7b422b1 389 return 0;
5ef8d792
KM
390error_3:
391 nfs_unregister_sysctl();
1ae811ee 392error_2:
393 unregister_nfs4_fs();
f7b422b1
DH
394error_1:
395 unregister_filesystem(&nfs_fs_type);
f7b422b1
DH
396error_0:
397 return ret;
398}
399
400/*
401 * Unregister the NFS filesystems
402 */
403void __exit unregister_nfs_fs(void)
404{
8e1f936b 405 unregister_shrinker(&acl_shrinker);
49af7ee1 406 nfs_unregister_sysctl();
1ae811ee 407 unregister_nfs4_fs();
f7b422b1
DH
408 unregister_filesystem(&nfs_fs_type);
409}
410
ea7c38fe 411bool nfs_sb_active(struct super_block *sb)
ef818a28 412{
1daef0a8 413 struct nfs_server *server = NFS_SB(sb);
ef818a28 414
ea7c38fe
TM
415 if (!atomic_inc_not_zero(&sb->s_active))
416 return false;
417 if (atomic_inc_return(&server->active) != 1)
418 atomic_dec(&sb->s_active);
419 return true;
ef818a28 420}
89d77c8f 421EXPORT_SYMBOL_GPL(nfs_sb_active);
ef818a28 422
1daef0a8 423void nfs_sb_deactive(struct super_block *sb)
ef818a28
SD
424{
425 struct nfs_server *server = NFS_SB(sb);
1daef0a8
TM
426
427 if (atomic_dec_and_test(&server->active))
428 deactivate_super(sb);
ef818a28 429}
89d77c8f 430EXPORT_SYMBOL_GPL(nfs_sb_deactive);
ef818a28 431
f7b422b1
DH
432/*
433 * Deliver file system statistics to userspace
434 */
fbdefd64 435int nfs_statfs(struct dentry *dentry, struct kstatfs *buf)
f7b422b1 436{
0c7d90cf 437 struct nfs_server *server = NFS_SB(dentry->d_sb);
f7b422b1
DH
438 unsigned char blockbits;
439 unsigned long blockres;
2b0143b5 440 struct nfs_fh *fh = NFS_FH(d_inode(dentry));
ca7e9a0d
TM
441 struct nfs_fsstat res;
442 int error = -ENOMEM;
443
444 res.fattr = nfs_alloc_fattr();
445 if (res.fattr == NULL)
446 goto out_err;
f7b422b1 447
8fa5c000 448 error = server->nfs_client->rpc_ops->statfs(server, fh, &res);
fbf3fdd2
MZ
449 if (unlikely(error == -ESTALE)) {
450 struct dentry *pd_dentry;
451
452 pd_dentry = dget_parent(dentry);
453 if (pd_dentry != NULL) {
2b0143b5 454 nfs_zap_caches(d_inode(pd_dentry));
fbf3fdd2
MZ
455 dput(pd_dentry);
456 }
457 }
ca7e9a0d 458 nfs_free_fattr(res.fattr);
f7b422b1
DH
459 if (error < 0)
460 goto out_err;
ca7e9a0d 461
1a0ba9ae 462 buf->f_type = NFS_SUPER_MAGIC;
f7b422b1
DH
463
464 /*
465 * Current versions of glibc do not correctly handle the
466 * case where f_frsize != f_bsize. Eventually we want to
467 * report the value of wtmult in this field.
468 */
0c7d90cf 469 buf->f_frsize = dentry->d_sb->s_blocksize;
f7b422b1
DH
470
471 /*
472 * On most *nix systems, f_blocks, f_bfree, and f_bavail
473 * are reported in units of f_frsize. Linux hasn't had
474 * an f_frsize field in its statfs struct until recently,
475 * thus historically Linux's sys_statfs reports these
476 * fields in units of f_bsize.
477 */
0c7d90cf
DH
478 buf->f_bsize = dentry->d_sb->s_blocksize;
479 blockbits = dentry->d_sb->s_blocksize_bits;
f7b422b1
DH
480 blockres = (1 << blockbits) - 1;
481 buf->f_blocks = (res.tbytes + blockres) >> blockbits;
482 buf->f_bfree = (res.fbytes + blockres) >> blockbits;
483 buf->f_bavail = (res.abytes + blockres) >> blockbits;
484
485 buf->f_files = res.tfiles;
486 buf->f_ffree = res.afiles;
487
488 buf->f_namelen = server->namelen;
1a0ba9ae 489
f7b422b1
DH
490 return 0;
491
492 out_err:
3110ff80 493 dprintk("%s: statfs error = %d\n", __func__, -error);
1a0ba9ae 494 return error;
f7b422b1 495}
89d77c8f 496EXPORT_SYMBOL_GPL(nfs_statfs);
f7b422b1 497
7d4e2747
DH
498/*
499 * Map the security flavour number to a name
500 */
81039f1f
TM
501static const char *nfs_pseudoflavour_to_name(rpc_authflavor_t flavour)
502{
7d4e2747 503 static const struct {
81039f1f
TM
504 rpc_authflavor_t flavour;
505 const char *str;
4d4b69dd
WAA
506 } sec_flavours[NFS_AUTH_INFO_MAX_FLAVORS] = {
507 /* update NFS_AUTH_INFO_MAX_FLAVORS when this list changes! */
81039f1f
TM
508 { RPC_AUTH_NULL, "null" },
509 { RPC_AUTH_UNIX, "sys" },
510 { RPC_AUTH_GSS_KRB5, "krb5" },
511 { RPC_AUTH_GSS_KRB5I, "krb5i" },
512 { RPC_AUTH_GSS_KRB5P, "krb5p" },
513 { RPC_AUTH_GSS_LKEY, "lkey" },
514 { RPC_AUTH_GSS_LKEYI, "lkeyi" },
515 { RPC_AUTH_GSS_LKEYP, "lkeyp" },
516 { RPC_AUTH_GSS_SPKM, "spkm" },
517 { RPC_AUTH_GSS_SPKMI, "spkmi" },
518 { RPC_AUTH_GSS_SPKMP, "spkmp" },
4d81cd16 519 { UINT_MAX, "unknown" }
81039f1f
TM
520 };
521 int i;
522
4d81cd16 523 for (i = 0; sec_flavours[i].flavour != UINT_MAX; i++) {
81039f1f
TM
524 if (sec_flavours[i].flavour == flavour)
525 break;
526 }
527 return sec_flavours[i].str;
528}
529
ee671b01
JL
530static void nfs_show_mountd_netid(struct seq_file *m, struct nfs_server *nfss,
531 int showdefaults)
532{
533 struct sockaddr *sap = (struct sockaddr *) &nfss->mountd_address;
534
535 seq_printf(m, ",mountproto=");
536 switch (sap->sa_family) {
537 case AF_INET:
538 switch (nfss->mountd_protocol) {
539 case IPPROTO_UDP:
540 seq_printf(m, RPCBIND_NETID_UDP);
541 break;
542 case IPPROTO_TCP:
543 seq_printf(m, RPCBIND_NETID_TCP);
544 break;
545 default:
546 if (showdefaults)
547 seq_printf(m, "auto");
548 }
549 break;
550 case AF_INET6:
551 switch (nfss->mountd_protocol) {
552 case IPPROTO_UDP:
553 seq_printf(m, RPCBIND_NETID_UDP6);
554 break;
555 case IPPROTO_TCP:
556 seq_printf(m, RPCBIND_NETID_TCP6);
557 break;
558 default:
559 if (showdefaults)
560 seq_printf(m, "auto");
561 }
562 break;
563 default:
564 if (showdefaults)
565 seq_printf(m, "auto");
566 }
567}
568
82d101d5
CL
569static void nfs_show_mountd_options(struct seq_file *m, struct nfs_server *nfss,
570 int showdefaults)
571{
572 struct sockaddr *sap = (struct sockaddr *)&nfss->mountd_address;
573
d5eff1a3
BS
574 if (nfss->flags & NFS_MOUNT_LEGACY_INTERFACE)
575 return;
576
82d101d5
CL
577 switch (sap->sa_family) {
578 case AF_INET: {
579 struct sockaddr_in *sin = (struct sockaddr_in *)sap;
be859405 580 seq_printf(m, ",mountaddr=%pI4", &sin->sin_addr.s_addr);
82d101d5
CL
581 break;
582 }
583 case AF_INET6: {
584 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap;
d250e190 585 seq_printf(m, ",mountaddr=%pI6c", &sin6->sin6_addr);
82d101d5
CL
586 break;
587 }
588 default:
589 if (showdefaults)
590 seq_printf(m, ",mountaddr=unspecified");
591 }
592
593 if (nfss->mountd_version || showdefaults)
594 seq_printf(m, ",mountvers=%u", nfss->mountd_version);
aa699473
SK
595 if ((nfss->mountd_port &&
596 nfss->mountd_port != (unsigned short)NFS_UNSPEC_PORT) ||
597 showdefaults)
82d101d5
CL
598 seq_printf(m, ",mountport=%u", nfss->mountd_port);
599
ee671b01 600 nfs_show_mountd_netid(m, nfss, showdefaults);
82d101d5
CL
601}
602
89d77c8f 603#if IS_ENABLED(CONFIG_NFS_V4)
0be8189f
TM
604static void nfs_show_nfsv4_options(struct seq_file *m, struct nfs_server *nfss,
605 int showdefaults)
606{
607 struct nfs_client *clp = nfss->nfs_client;
608
609 seq_printf(m, ",clientaddr=%s", clp->cl_ipaddr);
0be8189f
TM
610}
611#else
612static void nfs_show_nfsv4_options(struct seq_file *m, struct nfs_server *nfss,
613 int showdefaults)
614{
615}
616#endif
617
7bbceb6f
TM
618static void nfs_show_nfs_version(struct seq_file *m,
619 unsigned int version,
620 unsigned int minorversion)
621{
622 seq_printf(m, ",vers=%u", version);
623 if (version == 4)
624 seq_printf(m, ".%u", minorversion);
625}
626
f7b422b1
DH
627/*
628 * Describe the mount options in force on this server representation
629 */
82d101d5
CL
630static void nfs_show_mount_options(struct seq_file *m, struct nfs_server *nfss,
631 int showdefaults)
f7b422b1 632{
509de811 633 static const struct proc_nfs_info {
f7b422b1 634 int flag;
509de811
DH
635 const char *str;
636 const char *nostr;
f7b422b1
DH
637 } nfs_info[] = {
638 { NFS_MOUNT_SOFT, ",soft", ",hard" },
82d101d5 639 { NFS_MOUNT_POSIX, ",posix", "" },
f7b422b1
DH
640 { NFS_MOUNT_NOCTO, ",nocto", "" },
641 { NFS_MOUNT_NOAC, ",noac", "" },
642 { NFS_MOUNT_NONLM, ",nolock", "" },
643 { NFS_MOUNT_NOACL, ",noacl", "" },
74dd34e6 644 { NFS_MOUNT_NORDIRPLUS, ",nordirplus", "" },
d740351b
CL
645 { NFS_MOUNT_UNSHARED, ",nosharecache", "" },
646 { NFS_MOUNT_NORESVPORT, ",noresvport", "" },
f7b422b1
DH
647 { 0, NULL, NULL }
648 };
509de811 649 const struct proc_nfs_info *nfs_infop;
8fa5c000 650 struct nfs_client *clp = nfss->nfs_client;
82d101d5 651 u32 version = clp->rpc_ops->version;
7c563cc9 652 int local_flock, local_fcntl;
f7b422b1 653
7bbceb6f 654 nfs_show_nfs_version(m, version, clp->cl_minorversion);
2d767432
CL
655 seq_printf(m, ",rsize=%u", nfss->rsize);
656 seq_printf(m, ",wsize=%u", nfss->wsize);
82d101d5
CL
657 if (nfss->bsize != 0)
658 seq_printf(m, ",bsize=%u", nfss->bsize);
659 seq_printf(m, ",namlen=%u", nfss->namelen);
0e0cab74 660 if (nfss->acregmin != NFS_DEF_ACREGMIN*HZ || showdefaults)
2d767432 661 seq_printf(m, ",acregmin=%u", nfss->acregmin/HZ);
0e0cab74 662 if (nfss->acregmax != NFS_DEF_ACREGMAX*HZ || showdefaults)
2d767432 663 seq_printf(m, ",acregmax=%u", nfss->acregmax/HZ);
0e0cab74 664 if (nfss->acdirmin != NFS_DEF_ACDIRMIN*HZ || showdefaults)
2d767432 665 seq_printf(m, ",acdirmin=%u", nfss->acdirmin/HZ);
0e0cab74 666 if (nfss->acdirmax != NFS_DEF_ACDIRMAX*HZ || showdefaults)
2d767432 667 seq_printf(m, ",acdirmax=%u", nfss->acdirmax/HZ);
f7b422b1
DH
668 for (nfs_infop = nfs_info; nfs_infop->flag; nfs_infop++) {
669 if (nfss->flags & nfs_infop->flag)
670 seq_puts(m, nfs_infop->str);
671 else
672 seq_puts(m, nfs_infop->nostr);
673 }
2446ab60 674 rcu_read_lock();
56928edd 675 seq_printf(m, ",proto=%s",
ee671b01 676 rpc_peeraddr2str(nfss->client, RPC_DISPLAY_NETID));
2446ab60 677 rcu_read_unlock();
82d101d5
CL
678 if (version == 4) {
679 if (nfss->port != NFS_PORT)
680 seq_printf(m, ",port=%u", nfss->port);
681 } else
682 if (nfss->port)
683 seq_printf(m, ",port=%u", nfss->port);
684
33170233
TM
685 seq_printf(m, ",timeo=%lu", 10U * nfss->client->cl_timeout->to_initval / HZ);
686 seq_printf(m, ",retrans=%u", nfss->client->cl_timeout->to_retries);
81039f1f 687 seq_printf(m, ",sec=%s", nfs_pseudoflavour_to_name(nfss->client->cl_auth->au_flavor));
82d101d5
CL
688
689 if (version != 4)
690 nfs_show_mountd_options(m, nfss, showdefaults);
0be8189f
TM
691 else
692 nfs_show_nfsv4_options(m, nfss, showdefaults);
82d101d5 693
b797cac7
DH
694 if (nfss->options & NFS_OPTION_FSCACHE)
695 seq_printf(m, ",fsc");
9b00c643 696
89652617
CL
697 if (nfss->options & NFS_OPTION_MIGRATION)
698 seq_printf(m, ",migration");
699
9b00c643
PL
700 if (nfss->flags & NFS_MOUNT_LOOKUP_CACHE_NONEG) {
701 if (nfss->flags & NFS_MOUNT_LOOKUP_CACHE_NONE)
702 seq_printf(m, ",lookupcache=none");
703 else
704 seq_printf(m, ",lookupcache=pos");
705 }
7c563cc9
SJ
706
707 local_flock = nfss->flags & NFS_MOUNT_LOCAL_FLOCK;
708 local_fcntl = nfss->flags & NFS_MOUNT_LOCAL_FCNTL;
709
710 if (!local_flock && !local_fcntl)
711 seq_printf(m, ",local_lock=none");
712 else if (local_flock && local_fcntl)
713 seq_printf(m, ",local_lock=all");
714 else if (local_flock)
715 seq_printf(m, ",local_lock=flock");
716 else
717 seq_printf(m, ",local_lock=posix");
f7b422b1
DH
718}
719
720/*
721 * Describe the mount options on this VFS mountpoint
722 */
fbdefd64 723int nfs_show_options(struct seq_file *m, struct dentry *root)
f7b422b1 724{
34c80b1d 725 struct nfs_server *nfss = NFS_SB(root->d_sb);
f7b422b1
DH
726
727 nfs_show_mount_options(m, nfss, 0);
728
2446ab60 729 rcu_read_lock();
5d8515ca
CL
730 seq_printf(m, ",addr=%s",
731 rpc_peeraddr2str(nfss->nfs_client->cl_rpcclient,
732 RPC_DISPLAY_ADDR));
2446ab60 733 rcu_read_unlock();
f7b422b1
DH
734
735 return 0;
736}
89d77c8f 737EXPORT_SYMBOL_GPL(nfs_show_options);
45402c38 738
89d77c8f 739#if IS_ENABLED(CONFIG_NFS_V4)
ae50c0b5 740#ifdef CONFIG_NFS_V4_1
45402c38 741static void show_sessions(struct seq_file *m, struct nfs_server *server)
ae50c0b5
BF
742{
743 if (nfs4_has_session(server->nfs_client))
744 seq_printf(m, ",sessions");
745}
746#else
45402c38
HS
747static void show_sessions(struct seq_file *m, struct nfs_server *server) {}
748#endif
ae50c0b5
BF
749#endif
750
751#ifdef CONFIG_NFS_V4_1
45402c38 752static void show_pnfs(struct seq_file *m, struct nfs_server *server)
ae50c0b5
BF
753{
754 seq_printf(m, ",pnfs=");
755 if (server->pnfs_curr_ld)
756 seq_printf(m, "%s", server->pnfs_curr_ld->name);
757 else
758 seq_printf(m, "not configured");
759}
7e03b7cc
TM
760
761static void show_implementation_id(struct seq_file *m, struct nfs_server *nfss)
762{
59155546
CL
763 if (nfss->nfs_client && nfss->nfs_client->cl_implid) {
764 struct nfs41_impl_id *impl_id = nfss->nfs_client->cl_implid;
7e03b7cc
TM
765 seq_printf(m, "\n\timpl_id:\tname='%s',domain='%s',"
766 "date='%llu,%u'",
767 impl_id->name, impl_id->domain,
768 impl_id->date.seconds, impl_id->date.nseconds);
769 }
770}
45402c38 771#else
89d77c8f 772#if IS_ENABLED(CONFIG_NFS_V4)
7e03b7cc
TM
773static void show_pnfs(struct seq_file *m, struct nfs_server *server)
774{
775}
45402c38 776#endif
7e03b7cc
TM
777static void show_implementation_id(struct seq_file *m, struct nfs_server *nfss)
778{
779}
45402c38 780#endif
f7b422b1 781
fbdefd64 782int nfs_show_devname(struct seq_file *m, struct dentry *root)
c7f404b4
AV
783{
784 char *page = (char *) __get_free_page(GFP_KERNEL);
785 char *devname, *dummy;
786 int err = 0;
787 if (!page)
788 return -ENOMEM;
97a54868 789 devname = nfs_path(&dummy, root, page, PAGE_SIZE, 0);
c7f404b4
AV
790 if (IS_ERR(devname))
791 err = PTR_ERR(devname);
792 else
793 seq_escape(m, devname, " \t\n\\");
794 free_page((unsigned long)page);
795 return err;
796}
89d77c8f 797EXPORT_SYMBOL_GPL(nfs_show_devname);
c7f404b4 798
fbdefd64 799int nfs_show_path(struct seq_file *m, struct dentry *dentry)
c7f404b4
AV
800{
801 seq_puts(m, "/");
802 return 0;
803}
89d77c8f 804EXPORT_SYMBOL_GPL(nfs_show_path);
c7f404b4 805
f7b422b1
DH
806/*
807 * Present statistical information for this VFS mountpoint
808 */
fbdefd64 809int nfs_show_stats(struct seq_file *m, struct dentry *root)
f7b422b1
DH
810{
811 int i, cpu;
64132379 812 struct nfs_server *nfss = NFS_SB(root->d_sb);
f7b422b1
DH
813 struct rpc_auth *auth = nfss->client->cl_auth;
814 struct nfs_iostats totals = { };
815
816 seq_printf(m, "statvers=%s", NFS_IOSTAT_VERS);
817
818 /*
819 * Display all mount option settings
820 */
821 seq_printf(m, "\n\topts:\t");
64132379
AV
822 seq_puts(m, root->d_sb->s_flags & MS_RDONLY ? "ro" : "rw");
823 seq_puts(m, root->d_sb->s_flags & MS_SYNCHRONOUS ? ",sync" : "");
824 seq_puts(m, root->d_sb->s_flags & MS_NOATIME ? ",noatime" : "");
825 seq_puts(m, root->d_sb->s_flags & MS_NODIRATIME ? ",nodiratime" : "");
f7b422b1
DH
826 nfs_show_mount_options(m, nfss, 1);
827
828 seq_printf(m, "\n\tage:\t%lu", (jiffies - nfss->mount_time) / HZ);
829
7e03b7cc 830 show_implementation_id(m, nfss);
7d2ed9ac 831
f7b422b1
DH
832 seq_printf(m, "\n\tcaps:\t");
833 seq_printf(m, "caps=0x%x", nfss->caps);
2d767432
CL
834 seq_printf(m, ",wtmult=%u", nfss->wtmult);
835 seq_printf(m, ",dtsize=%u", nfss->dtsize);
836 seq_printf(m, ",bsize=%u", nfss->bsize);
837 seq_printf(m, ",namlen=%u", nfss->namelen);
f7b422b1 838
89d77c8f 839#if IS_ENABLED(CONFIG_NFS_V4)
40c55319 840 if (nfss->nfs_client->rpc_ops->version == 4) {
f7b422b1
DH
841 seq_printf(m, "\n\tnfsv4:\t");
842 seq_printf(m, "bm0=0x%x", nfss->attr_bitmask[0]);
843 seq_printf(m, ",bm1=0x%x", nfss->attr_bitmask[1]);
a09df2ca 844 seq_printf(m, ",bm2=0x%x", nfss->attr_bitmask[2]);
f7b422b1 845 seq_printf(m, ",acl=0x%x", nfss->acl_bitmask);
ae50c0b5
BF
846 show_sessions(m, nfss);
847 show_pnfs(m, nfss);
f7b422b1
DH
848 }
849#endif
850
851 /*
852 * Display security flavor in effect for this mount
853 */
2d767432 854 seq_printf(m, "\n\tsec:\tflavor=%u", auth->au_ops->au_flavor);
f7b422b1 855 if (auth->au_flavor)
2d767432 856 seq_printf(m, ",pseudoflavor=%u", auth->au_flavor);
f7b422b1
DH
857
858 /*
859 * Display superblock I/O counters
860 */
861 for_each_possible_cpu(cpu) {
862 struct nfs_iostats *stats;
863
864 preempt_disable();
865 stats = per_cpu_ptr(nfss->io_stats, cpu);
866
867 for (i = 0; i < __NFSIOS_COUNTSMAX; i++)
868 totals.events[i] += stats->events[i];
869 for (i = 0; i < __NFSIOS_BYTESMAX; i++)
870 totals.bytes[i] += stats->bytes[i];
6a51091d
DH
871#ifdef CONFIG_NFS_FSCACHE
872 for (i = 0; i < __NFSIOS_FSCACHEMAX; i++)
873 totals.fscache[i] += stats->fscache[i];
874#endif
f7b422b1
DH
875
876 preempt_enable();
877 }
878
879 seq_printf(m, "\n\tevents:\t");
880 for (i = 0; i < __NFSIOS_COUNTSMAX; i++)
881 seq_printf(m, "%lu ", totals.events[i]);
882 seq_printf(m, "\n\tbytes:\t");
883 for (i = 0; i < __NFSIOS_BYTESMAX; i++)
884 seq_printf(m, "%Lu ", totals.bytes[i]);
6a51091d
DH
885#ifdef CONFIG_NFS_FSCACHE
886 if (nfss->options & NFS_OPTION_FSCACHE) {
887 seq_printf(m, "\n\tfsc:\t");
888 for (i = 0; i < __NFSIOS_FSCACHEMAX; i++)
889 seq_printf(m, "%Lu ", totals.bytes[i]);
890 }
891#endif
f7b422b1
DH
892 seq_printf(m, "\n");
893
894 rpc_print_iostats(m, nfss->client);
895
896 return 0;
897}
89d77c8f 898EXPORT_SYMBOL_GPL(nfs_show_stats);
f7b422b1
DH
899
900/*
901 * Begin unmount by attempting to remove all automounted mountpoints we added
54ceac45 902 * in response to xdev traversals and referrals
f7b422b1 903 */
fbdefd64 904void nfs_umount_begin(struct super_block *sb)
f7b422b1 905{
67e55205 906 struct nfs_server *server;
fc6ae3cf
TM
907 struct rpc_clnt *rpc;
908
67e55205 909 server = NFS_SB(sb);
fc6ae3cf
TM
910 /* -EIO all pending I/O */
911 rpc = server->client_acl;
912 if (!IS_ERR(rpc))
913 rpc_killall_tasks(rpc);
914 rpc = server->client;
915 if (!IS_ERR(rpc))
916 rpc_killall_tasks(rpc);
f7b422b1 917}
89d77c8f 918EXPORT_SYMBOL_GPL(nfs_umount_begin);
f7b422b1 919
db833351 920static struct nfs_parsed_mount_data *nfs_alloc_parsed_mount_data(void)
9423a08a
CL
921{
922 struct nfs_parsed_mount_data *data;
923
924 data = kzalloc(sizeof(*data), GFP_KERNEL);
925 if (data) {
9423a08a
CL
926 data->acregmin = NFS_DEF_ACREGMIN;
927 data->acregmax = NFS_DEF_ACREGMAX;
928 data->acdirmin = NFS_DEF_ACDIRMIN;
929 data->acdirmax = NFS_DEF_ACDIRMAX;
c5811dbd 930 data->mount_server.port = NFS_UNSPEC_PORT;
9423a08a 931 data->nfs_server.port = NFS_UNSPEC_PORT;
c5811dbd 932 data->nfs_server.protocol = XPRT_TRANSPORT_TCP;
a3f73c27 933 data->selected_flavor = RPC_AUTH_MAXFLAVOR;
9423a08a 934 data->minorversion = 0;
b72e4f42 935 data->need_mount = true;
9937347a 936 data->net = current->nsproxy->net_ns;
8a0d551a 937 security_init_mnt_opts(&data->lsm_opts);
9423a08a
CL
938 }
939 return data;
940}
941
8a0d551a
JL
942static void nfs_free_parsed_mount_data(struct nfs_parsed_mount_data *data)
943{
944 if (data) {
945 kfree(data->client_address);
946 kfree(data->mount_server.hostname);
947 kfree(data->nfs_server.export_path);
948 kfree(data->nfs_server.hostname);
949 kfree(data->fscache_uniq);
950 security_free_mnt_opts(&data->lsm_opts);
951 kfree(data);
952 }
953}
954
fc50d58f 955/*
cdcd7f9a
CL
956 * Sanity-check a server address provided by the mount command.
957 *
958 * Address family must be initialized, and address must not be
959 * the ANY address for that family.
fc50d58f
CL
960 */
961static int nfs_verify_server_address(struct sockaddr *addr)
962{
963 switch (addr->sa_family) {
964 case AF_INET: {
cdcd7f9a 965 struct sockaddr_in *sa = (struct sockaddr_in *)addr;
e6f1cebf 966 return sa->sin_addr.s_addr != htonl(INADDR_ANY);
cdcd7f9a
CL
967 }
968 case AF_INET6: {
969 struct in6_addr *sa = &((struct sockaddr_in6 *)addr)->sin6_addr;
970 return !ipv6_addr_any(sa);
fc50d58f
CL
971 }
972 }
973
53a0b9c4 974 dfprintk(MOUNT, "NFS: Invalid IP address specified\n");
fc50d58f
CL
975 return 0;
976}
977
4cfd74fc
CL
978/*
979 * Select between a default port value and a user-specified port value.
980 * If a zero value is set, then autobind will be used.
981 */
f5855fec 982static void nfs_set_port(struct sockaddr *sap, int *port,
4cfd74fc
CL
983 const unsigned short default_port)
984{
f5855fec
TM
985 if (*port == NFS_UNSPEC_PORT)
986 *port = default_port;
4cfd74fc 987
f5855fec 988 rpc_set_port(sap, *port);
4cfd74fc
CL
989}
990
259875ef
TM
991/*
992 * Sanity check the NFS transport protocol.
993 *
994 */
995static void nfs_validate_transport_protocol(struct nfs_parsed_mount_data *mnt)
996{
997 switch (mnt->nfs_server.protocol) {
998 case XPRT_TRANSPORT_UDP:
999 case XPRT_TRANSPORT_TCP:
1000 case XPRT_TRANSPORT_RDMA:
1001 break;
1002 default:
1003 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
1004 }
1005}
1006
1007/*
1008 * For text based NFSv2/v3 mounts, the mount protocol transport default
1009 * settings should depend upon the specified NFS transport.
1010 */
1011static void nfs_set_mount_transport_protocol(struct nfs_parsed_mount_data *mnt)
1012{
1013 nfs_validate_transport_protocol(mnt);
1014
1015 if (mnt->mount_server.protocol == XPRT_TRANSPORT_UDP ||
1016 mnt->mount_server.protocol == XPRT_TRANSPORT_TCP)
1017 return;
1018 switch (mnt->nfs_server.protocol) {
1019 case XPRT_TRANSPORT_UDP:
1020 mnt->mount_server.protocol = XPRT_TRANSPORT_UDP;
1021 break;
1022 case XPRT_TRANSPORT_TCP:
1023 case XPRT_TRANSPORT_RDMA:
1024 mnt->mount_server.protocol = XPRT_TRANSPORT_TCP;
1025 }
1026}
1027
4d4b69dd
WAA
1028/*
1029 * Add 'flavor' to 'auth_info' if not already present.
1030 * Returns true if 'flavor' ends up in the list, false otherwise
1031 */
1032static bool nfs_auth_info_add(struct nfs_auth_info *auth_info,
1033 rpc_authflavor_t flavor)
1034{
1035 unsigned int i;
00216026 1036 unsigned int max_flavor_len = ARRAY_SIZE(auth_info->flavors);
4d4b69dd
WAA
1037
1038 /* make sure this flavor isn't already in the list */
1039 for (i = 0; i < auth_info->flavor_len; i++) {
1040 if (flavor == auth_info->flavors[i])
1041 return true;
1042 }
1043
1044 if (auth_info->flavor_len + 1 >= max_flavor_len) {
1045 dfprintk(MOUNT, "NFS: too many sec= flavors\n");
1046 return false;
1047 }
1048
1049 auth_info->flavors[auth_info->flavor_len++] = flavor;
1050 return true;
1051}
1052
1053/*
1054 * Return true if 'match' is in auth_info or auth_info is empty.
1055 * Return false otherwise.
1056 */
1057bool nfs_auth_info_match(const struct nfs_auth_info *auth_info,
1058 rpc_authflavor_t match)
1059{
1060 int i;
1061
1062 if (!auth_info->flavor_len)
1063 return true;
1064
1065 for (i = 0; i < auth_info->flavor_len; i++) {
1066 if (auth_info->flavors[i] == match)
1067 return true;
1068 }
1069 return false;
1070}
1071EXPORT_SYMBOL_GPL(nfs_auth_info_match);
1072
01060c89
CL
1073/*
1074 * Parse the value of the 'sec=' option.
01060c89
CL
1075 */
1076static int nfs_parse_security_flavors(char *value,
1077 struct nfs_parsed_mount_data *mnt)
1078{
1079 substring_t args[MAX_OPT_ARGS];
19e7b8d2 1080 rpc_authflavor_t pseudoflavor;
4d4b69dd 1081 char *p;
01060c89
CL
1082
1083 dfprintk(MOUNT, "NFS: parsing sec=%s option\n", value);
1084
4d4b69dd
WAA
1085 while ((p = strsep(&value, ":")) != NULL) {
1086 switch (match_token(p, nfs_secflavor_tokens, args)) {
1087 case Opt_sec_none:
1088 pseudoflavor = RPC_AUTH_NULL;
1089 break;
1090 case Opt_sec_sys:
1091 pseudoflavor = RPC_AUTH_UNIX;
1092 break;
1093 case Opt_sec_krb5:
1094 pseudoflavor = RPC_AUTH_GSS_KRB5;
1095 break;
1096 case Opt_sec_krb5i:
1097 pseudoflavor = RPC_AUTH_GSS_KRB5I;
1098 break;
1099 case Opt_sec_krb5p:
1100 pseudoflavor = RPC_AUTH_GSS_KRB5P;
1101 break;
1102 case Opt_sec_lkey:
1103 pseudoflavor = RPC_AUTH_GSS_LKEY;
1104 break;
1105 case Opt_sec_lkeyi:
1106 pseudoflavor = RPC_AUTH_GSS_LKEYI;
1107 break;
1108 case Opt_sec_lkeyp:
1109 pseudoflavor = RPC_AUTH_GSS_LKEYP;
1110 break;
1111 case Opt_sec_spkm:
1112 pseudoflavor = RPC_AUTH_GSS_SPKM;
1113 break;
1114 case Opt_sec_spkmi:
1115 pseudoflavor = RPC_AUTH_GSS_SPKMI;
1116 break;
1117 case Opt_sec_spkmp:
1118 pseudoflavor = RPC_AUTH_GSS_SPKMP;
1119 break;
1120 default:
1121 dfprintk(MOUNT,
1122 "NFS: sec= option '%s' not recognized\n", p);
1123 return 0;
1124 }
1125
1126 if (!nfs_auth_info_add(&mnt->auth_info, pseudoflavor))
1127 return 0;
01060c89
CL
1128 }
1129
1130 return 1;
1131}
1132
0d71b058
TM
1133static int nfs_parse_version_string(char *string,
1134 struct nfs_parsed_mount_data *mnt,
1135 substring_t *args)
1136{
1137 mnt->flags &= ~NFS_MOUNT_VER3;
1138 switch (match_token(string, nfs_vers_tokens, args)) {
1139 case Opt_vers_2:
1140 mnt->version = 2;
1141 break;
1142 case Opt_vers_3:
1143 mnt->flags |= NFS_MOUNT_VER3;
1144 mnt->version = 3;
1145 break;
1146 case Opt_vers_4:
1147 /* Backward compatibility option. In future,
1148 * the mount program should always supply
1149 * a NFSv4 minor version number.
1150 */
1151 mnt->version = 4;
1152 break;
1153 case Opt_vers_4_0:
1154 mnt->version = 4;
1155 mnt->minorversion = 0;
1156 break;
1157 case Opt_vers_4_1:
1158 mnt->version = 4;
1159 mnt->minorversion = 1;
1160 break;
42c2c424
SD
1161 case Opt_vers_4_2:
1162 mnt->version = 4;
1163 mnt->minorversion = 2;
1164 break;
0d71b058
TM
1165 default:
1166 return 0;
1167 }
1168 return 1;
1169}
1170
c5cb09b6
RL
1171static int nfs_get_option_str(substring_t args[], char **option)
1172{
1173 kfree(*option);
1174 *option = match_strdup(args);
e25fbe38 1175 return !*option;
c5cb09b6
RL
1176}
1177
1178static int nfs_get_option_ul(substring_t args[], unsigned long *option)
1179{
1180 int rc;
1181 char *string;
1182
1183 string = match_strdup(args);
1184 if (string == NULL)
1185 return -ENOMEM;
7297cb68 1186 rc = kstrtoul(string, 10, option);
c5cb09b6
RL
1187 kfree(string);
1188
1189 return rc;
1190}
1191
bf0fd768
CL
1192/*
1193 * Error-check and convert a string of mount options from user space into
f45663ce
CL
1194 * a data structure. The whole mount string is processed; bad options are
1195 * skipped as they are encountered. If there were no errors, return 1;
1196 * otherwise return 0 (zero).
bf0fd768
CL
1197 */
1198static int nfs_parse_mount_options(char *raw,
1199 struct nfs_parsed_mount_data *mnt)
1200{
f9c3a380 1201 char *p, *string, *secdata;
d23c45fd 1202 int rc, sloppy = 0, invalid_option = 0;
ee671b01
JL
1203 unsigned short protofamily = AF_UNSPEC;
1204 unsigned short mountfamily = AF_UNSPEC;
bf0fd768
CL
1205
1206 if (!raw) {
1207 dfprintk(MOUNT, "NFS: mount options string was NULL.\n");
1208 return 1;
1209 }
1210 dfprintk(MOUNT, "NFS: nfs mount opts='%s'\n", raw);
1211
f9c3a380
EP
1212 secdata = alloc_secdata();
1213 if (!secdata)
1214 goto out_nomem;
1215
1216 rc = security_sb_copy_data(raw, secdata);
1217 if (rc)
1218 goto out_security_failure;
1219
1220 rc = security_sb_parse_opts_str(secdata, &mnt->lsm_opts);
1221 if (rc)
1222 goto out_security_failure;
1223
1224 free_secdata(secdata);
1225
bf0fd768
CL
1226 while ((p = strsep(&raw, ",")) != NULL) {
1227 substring_t args[MAX_OPT_ARGS];
a5a16bae
CL
1228 unsigned long option;
1229 int token;
bf0fd768
CL
1230
1231 if (!*p)
1232 continue;
1233
1234 dfprintk(MOUNT, "NFS: parsing nfs mount option '%s'\n", p);
1235
1236 token = match_token(p, nfs_mount_option_tokens, args);
1237 switch (token) {
f45663ce
CL
1238
1239 /*
1240 * boolean options: foo/nofoo
1241 */
bf0fd768
CL
1242 case Opt_soft:
1243 mnt->flags |= NFS_MOUNT_SOFT;
1244 break;
1245 case Opt_hard:
1246 mnt->flags &= ~NFS_MOUNT_SOFT;
1247 break;
bf0fd768
CL
1248 case Opt_posix:
1249 mnt->flags |= NFS_MOUNT_POSIX;
1250 break;
1251 case Opt_noposix:
1252 mnt->flags &= ~NFS_MOUNT_POSIX;
1253 break;
1254 case Opt_cto:
1255 mnt->flags &= ~NFS_MOUNT_NOCTO;
1256 break;
1257 case Opt_nocto:
1258 mnt->flags |= NFS_MOUNT_NOCTO;
1259 break;
1260 case Opt_ac:
1261 mnt->flags &= ~NFS_MOUNT_NOAC;
1262 break;
1263 case Opt_noac:
1264 mnt->flags |= NFS_MOUNT_NOAC;
1265 break;
1266 case Opt_lock:
1267 mnt->flags &= ~NFS_MOUNT_NONLM;
5eebde23
SJ
1268 mnt->flags &= ~(NFS_MOUNT_LOCAL_FLOCK |
1269 NFS_MOUNT_LOCAL_FCNTL);
bf0fd768
CL
1270 break;
1271 case Opt_nolock:
1272 mnt->flags |= NFS_MOUNT_NONLM;
5eebde23
SJ
1273 mnt->flags |= (NFS_MOUNT_LOCAL_FLOCK |
1274 NFS_MOUNT_LOCAL_FCNTL);
bf0fd768 1275 break;
bf0fd768
CL
1276 case Opt_udp:
1277 mnt->flags &= ~NFS_MOUNT_TCP;
0896a725 1278 mnt->nfs_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768
CL
1279 break;
1280 case Opt_tcp:
1281 mnt->flags |= NFS_MOUNT_TCP;
0896a725 1282 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1283 break;
2cf7ff7a
TT
1284 case Opt_rdma:
1285 mnt->flags |= NFS_MOUNT_TCP; /* for side protocols */
1286 mnt->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
a67d18f8 1287 xprt_load_transport(p);
2cf7ff7a 1288 break;
bf0fd768
CL
1289 case Opt_acl:
1290 mnt->flags &= ~NFS_MOUNT_NOACL;
1291 break;
1292 case Opt_noacl:
1293 mnt->flags |= NFS_MOUNT_NOACL;
1294 break;
1295 case Opt_rdirplus:
1296 mnt->flags &= ~NFS_MOUNT_NORDIRPLUS;
1297 break;
1298 case Opt_nordirplus:
1299 mnt->flags |= NFS_MOUNT_NORDIRPLUS;
1300 break;
75180df2
TM
1301 case Opt_sharecache:
1302 mnt->flags &= ~NFS_MOUNT_UNSHARED;
1303 break;
1304 case Opt_nosharecache:
1305 mnt->flags |= NFS_MOUNT_UNSHARED;
1306 break;
d740351b
CL
1307 case Opt_resvport:
1308 mnt->flags &= ~NFS_MOUNT_NORESVPORT;
1309 break;
1310 case Opt_noresvport:
1311 mnt->flags |= NFS_MOUNT_NORESVPORT;
1312 break;
b797cac7
DH
1313 case Opt_fscache:
1314 mnt->options |= NFS_OPTION_FSCACHE;
1315 kfree(mnt->fscache_uniq);
1316 mnt->fscache_uniq = NULL;
1317 break;
1318 case Opt_nofscache:
1319 mnt->options &= ~NFS_OPTION_FSCACHE;
1320 kfree(mnt->fscache_uniq);
1321 mnt->fscache_uniq = NULL;
1322 break;
89652617
CL
1323 case Opt_migration:
1324 mnt->options |= NFS_OPTION_MIGRATION;
1325 break;
1326 case Opt_nomigration:
1327 mnt->options &= NFS_OPTION_MIGRATION;
1328 break;
bf0fd768 1329
f45663ce
CL
1330 /*
1331 * options that take numeric values
1332 */
bf0fd768 1333 case Opt_port:
c5cb09b6
RL
1334 if (nfs_get_option_ul(args, &option) ||
1335 option > USHRT_MAX)
d23c45fd
CL
1336 goto out_invalid_value;
1337 mnt->nfs_server.port = option;
bf0fd768
CL
1338 break;
1339 case Opt_rsize:
c5cb09b6 1340 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1341 goto out_invalid_value;
1342 mnt->rsize = option;
bf0fd768
CL
1343 break;
1344 case Opt_wsize:
c5cb09b6 1345 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1346 goto out_invalid_value;
1347 mnt->wsize = option;
bf0fd768
CL
1348 break;
1349 case Opt_bsize:
c5cb09b6 1350 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1351 goto out_invalid_value;
1352 mnt->bsize = option;
bf0fd768
CL
1353 break;
1354 case Opt_timeo:
c5cb09b6 1355 if (nfs_get_option_ul(args, &option) || option == 0)
d23c45fd
CL
1356 goto out_invalid_value;
1357 mnt->timeo = option;
bf0fd768
CL
1358 break;
1359 case Opt_retrans:
c5cb09b6 1360 if (nfs_get_option_ul(args, &option) || option == 0)
d23c45fd
CL
1361 goto out_invalid_value;
1362 mnt->retrans = option;
bf0fd768
CL
1363 break;
1364 case Opt_acregmin:
c5cb09b6 1365 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1366 goto out_invalid_value;
1367 mnt->acregmin = option;
bf0fd768
CL
1368 break;
1369 case Opt_acregmax:
c5cb09b6 1370 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1371 goto out_invalid_value;
1372 mnt->acregmax = option;
bf0fd768
CL
1373 break;
1374 case Opt_acdirmin:
c5cb09b6 1375 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1376 goto out_invalid_value;
1377 mnt->acdirmin = option;
bf0fd768
CL
1378 break;
1379 case Opt_acdirmax:
c5cb09b6 1380 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1381 goto out_invalid_value;
1382 mnt->acdirmax = option;
bf0fd768
CL
1383 break;
1384 case Opt_actimeo:
c5cb09b6 1385 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1386 goto out_invalid_value;
1387 mnt->acregmin = mnt->acregmax =
1388 mnt->acdirmin = mnt->acdirmax = option;
bf0fd768
CL
1389 break;
1390 case Opt_namelen:
c5cb09b6 1391 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1392 goto out_invalid_value;
1393 mnt->namlen = option;
bf0fd768
CL
1394 break;
1395 case Opt_mountport:
c5cb09b6
RL
1396 if (nfs_get_option_ul(args, &option) ||
1397 option > USHRT_MAX)
d23c45fd
CL
1398 goto out_invalid_value;
1399 mnt->mount_server.port = option;
bf0fd768 1400 break;
bf0fd768 1401 case Opt_mountvers:
c5cb09b6 1402 if (nfs_get_option_ul(args, &option) ||
f45663ce 1403 option < NFS_MNT_VERSION ||
d23c45fd
CL
1404 option > NFS_MNT3_VERSION)
1405 goto out_invalid_value;
1406 mnt->mount_server.version = option;
bf0fd768 1407 break;
3fd5be9e 1408 case Opt_minorversion:
c5cb09b6 1409 if (nfs_get_option_ul(args, &option))
f3f4f4ed
CL
1410 goto out_invalid_value;
1411 if (option > NFS4_MAX_MINOR_VERSION)
1412 goto out_invalid_value;
1413 mnt->minorversion = option;
3fd5be9e 1414 break;
bf0fd768 1415
f45663ce
CL
1416 /*
1417 * options that take text values
1418 */
0d71b058
TM
1419 case Opt_nfsvers:
1420 string = match_strdup(args);
1421 if (string == NULL)
1422 goto out_nomem;
1423 rc = nfs_parse_version_string(string, mnt, args);
1424 kfree(string);
1425 if (!rc)
1426 goto out_invalid_value;
1427 break;
bf0fd768
CL
1428 case Opt_sec:
1429 string = match_strdup(args);
1430 if (string == NULL)
1431 goto out_nomem;
01060c89 1432 rc = nfs_parse_security_flavors(string, mnt);
bf0fd768 1433 kfree(string);
f45663ce 1434 if (!rc) {
f45663ce
CL
1435 dfprintk(MOUNT, "NFS: unrecognized "
1436 "security flavor\n");
d23c45fd 1437 return 0;
f45663ce 1438 }
bf0fd768
CL
1439 break;
1440 case Opt_proto:
1441 string = match_strdup(args);
1442 if (string == NULL)
1443 goto out_nomem;
1444 token = match_token(string,
1445 nfs_xprt_protocol_tokens, args);
bf0fd768 1446
ee671b01 1447 protofamily = AF_INET;
bf0fd768 1448 switch (token) {
ee671b01
JL
1449 case Opt_xprt_udp6:
1450 protofamily = AF_INET6;
fdb66ff4 1451 case Opt_xprt_udp:
bf0fd768 1452 mnt->flags &= ~NFS_MOUNT_TCP;
0896a725 1453 mnt->nfs_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768 1454 break;
ee671b01
JL
1455 case Opt_xprt_tcp6:
1456 protofamily = AF_INET6;
fdb66ff4 1457 case Opt_xprt_tcp:
bf0fd768 1458 mnt->flags |= NFS_MOUNT_TCP;
0896a725 1459 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1460 break;
181342c5
SM
1461 case Opt_xprt_rdma6:
1462 protofamily = AF_INET6;
2cf7ff7a
TT
1463 case Opt_xprt_rdma:
1464 /* vector side protocols to TCP */
1465 mnt->flags |= NFS_MOUNT_TCP;
1466 mnt->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
a67d18f8 1467 xprt_load_transport(string);
2cf7ff7a 1468 break;
bf0fd768 1469 default:
f45663ce
CL
1470 dfprintk(MOUNT, "NFS: unrecognized "
1471 "transport protocol\n");
4223a4a1 1472 kfree(string);
d23c45fd 1473 return 0;
bf0fd768 1474 }
c5cb09b6 1475 kfree(string);
bf0fd768
CL
1476 break;
1477 case Opt_mountproto:
1478 string = match_strdup(args);
1479 if (string == NULL)
1480 goto out_nomem;
1481 token = match_token(string,
1482 nfs_xprt_protocol_tokens, args);
d508afb4 1483 kfree(string);
bf0fd768 1484
ee671b01 1485 mountfamily = AF_INET;
bf0fd768 1486 switch (token) {
ee671b01
JL
1487 case Opt_xprt_udp6:
1488 mountfamily = AF_INET6;
fdb66ff4 1489 case Opt_xprt_udp:
0896a725 1490 mnt->mount_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768 1491 break;
ee671b01
JL
1492 case Opt_xprt_tcp6:
1493 mountfamily = AF_INET6;
fdb66ff4 1494 case Opt_xprt_tcp:
0896a725 1495 mnt->mount_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1496 break;
2cf7ff7a 1497 case Opt_xprt_rdma: /* not used for side protocols */
bf0fd768 1498 default:
f45663ce
CL
1499 dfprintk(MOUNT, "NFS: unrecognized "
1500 "transport protocol\n");
d23c45fd 1501 return 0;
bf0fd768
CL
1502 }
1503 break;
1504 case Opt_addr:
1505 string = match_strdup(args);
1506 if (string == NULL)
1507 goto out_nomem;
53a0b9c4 1508 mnt->nfs_server.addrlen =
b48e1278 1509 rpc_pton(mnt->net, string, strlen(string),
53a0b9c4
CL
1510 (struct sockaddr *)
1511 &mnt->nfs_server.address,
1512 sizeof(mnt->nfs_server.address));
bf0fd768 1513 kfree(string);
53a0b9c4
CL
1514 if (mnt->nfs_server.addrlen == 0)
1515 goto out_invalid_address;
bf0fd768
CL
1516 break;
1517 case Opt_clientaddr:
c5cb09b6 1518 if (nfs_get_option_str(args, &mnt->client_address))
bf0fd768 1519 goto out_nomem;
bf0fd768 1520 break;
33832034 1521 case Opt_mounthost:
c5cb09b6
RL
1522 if (nfs_get_option_str(args,
1523 &mnt->mount_server.hostname))
33832034 1524 goto out_nomem;
33832034 1525 break;
0ac83779 1526 case Opt_mountaddr:
bf0fd768
CL
1527 string = match_strdup(args);
1528 if (string == NULL)
1529 goto out_nomem;
53a0b9c4 1530 mnt->mount_server.addrlen =
b48e1278 1531 rpc_pton(mnt->net, string, strlen(string),
53a0b9c4
CL
1532 (struct sockaddr *)
1533 &mnt->mount_server.address,
1534 sizeof(mnt->mount_server.address));
bf0fd768 1535 kfree(string);
53a0b9c4
CL
1536 if (mnt->mount_server.addrlen == 0)
1537 goto out_invalid_address;
bf0fd768 1538 break;
7973c1f1
TM
1539 case Opt_lookupcache:
1540 string = match_strdup(args);
1541 if (string == NULL)
1542 goto out_nomem;
1543 token = match_token(string,
1544 nfs_lookupcache_tokens, args);
1545 kfree(string);
1546 switch (token) {
1547 case Opt_lookupcache_all:
1548 mnt->flags &= ~(NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE);
1549 break;
1550 case Opt_lookupcache_positive:
1551 mnt->flags &= ~NFS_MOUNT_LOOKUP_CACHE_NONE;
1552 mnt->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG;
1553 break;
1554 case Opt_lookupcache_none:
1555 mnt->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE;
1556 break;
1557 default:
7973c1f1
TM
1558 dfprintk(MOUNT, "NFS: invalid "
1559 "lookupcache argument\n");
d23c45fd 1560 return 0;
7973c1f1
TM
1561 };
1562 break;
a6d5ff64 1563 case Opt_fscache_uniq:
c5cb09b6 1564 if (nfs_get_option_str(args, &mnt->fscache_uniq))
a6d5ff64 1565 goto out_nomem;
a6d5ff64
CL
1566 mnt->options |= NFS_OPTION_FSCACHE;
1567 break;
5eebde23
SJ
1568 case Opt_local_lock:
1569 string = match_strdup(args);
1570 if (string == NULL)
1571 goto out_nomem;
1572 token = match_token(string, nfs_local_lock_tokens,
1573 args);
1574 kfree(string);
1575 switch (token) {
1576 case Opt_local_lock_all:
1577 mnt->flags |= (NFS_MOUNT_LOCAL_FLOCK |
1578 NFS_MOUNT_LOCAL_FCNTL);
1579 break;
1580 case Opt_local_lock_flock:
1581 mnt->flags |= NFS_MOUNT_LOCAL_FLOCK;
1582 break;
1583 case Opt_local_lock_posix:
1584 mnt->flags |= NFS_MOUNT_LOCAL_FCNTL;
1585 break;
1586 case Opt_local_lock_none:
1587 mnt->flags &= ~(NFS_MOUNT_LOCAL_FLOCK |
1588 NFS_MOUNT_LOCAL_FCNTL);
1589 break;
1590 default:
1591 dfprintk(MOUNT, "NFS: invalid "
1592 "local_lock argument\n");
1593 return 0;
1594 };
1595 break;
bf0fd768 1596
f45663ce
CL
1597 /*
1598 * Special options
1599 */
1600 case Opt_sloppy:
1601 sloppy = 1;
1602 dfprintk(MOUNT, "NFS: relaxing parsing rules\n");
1603 break;
bf0fd768
CL
1604 case Opt_userspace:
1605 case Opt_deprecated:
d33e4dfe
CL
1606 dfprintk(MOUNT, "NFS: ignoring mount option "
1607 "'%s'\n", p);
bf0fd768
CL
1608 break;
1609
1610 default:
d23c45fd 1611 invalid_option = 1;
f45663ce
CL
1612 dfprintk(MOUNT, "NFS: unrecognized mount option "
1613 "'%s'\n", p);
bf0fd768
CL
1614 }
1615 }
1616
d23c45fd
CL
1617 if (!sloppy && invalid_option)
1618 return 0;
1619
571b7554
WAA
1620 if (mnt->minorversion && mnt->version != 4)
1621 goto out_minorversion_mismatch;
1622
89652617 1623 if (mnt->options & NFS_OPTION_MIGRATION &&
9e08ef1a 1624 (mnt->version != 4 || mnt->minorversion != 0))
89652617
CL
1625 goto out_migration_misuse;
1626
ee671b01
JL
1627 /*
1628 * verify that any proto=/mountproto= options match the address
1856b225 1629 * families in the addr=/mountaddr= options.
ee671b01
JL
1630 */
1631 if (protofamily != AF_UNSPEC &&
1632 protofamily != mnt->nfs_server.address.ss_family)
1633 goto out_proto_mismatch;
1634
1635 if (mountfamily != AF_UNSPEC) {
1636 if (mnt->mount_server.addrlen) {
1637 if (mountfamily != mnt->mount_server.address.ss_family)
1638 goto out_mountproto_mismatch;
1639 } else {
1640 if (mountfamily != mnt->nfs_server.address.ss_family)
1641 goto out_mountproto_mismatch;
1642 }
1643 }
1644
bf0fd768
CL
1645 return 1;
1646
ee671b01
JL
1647out_mountproto_mismatch:
1648 printk(KERN_INFO "NFS: mount server address does not match mountproto= "
1649 "option\n");
1650 return 0;
1651out_proto_mismatch:
1652 printk(KERN_INFO "NFS: server address does not match proto= option\n");
1653 return 0;
53a0b9c4
CL
1654out_invalid_address:
1655 printk(KERN_INFO "NFS: bad IP address specified: %s\n", p);
1656 return 0;
d23c45fd 1657out_invalid_value:
53a0b9c4 1658 printk(KERN_INFO "NFS: bad mount option value specified: %s\n", p);
d23c45fd 1659 return 0;
571b7554
WAA
1660out_minorversion_mismatch:
1661 printk(KERN_INFO "NFS: mount option vers=%u does not support "
1662 "minorversion=%u\n", mnt->version, mnt->minorversion);
1663 return 0;
89652617
CL
1664out_migration_misuse:
1665 printk(KERN_INFO
1666 "NFS: 'migration' not supported for this NFS version\n");
1667 return 0;
bf0fd768
CL
1668out_nomem:
1669 printk(KERN_INFO "NFS: not enough memory to parse option\n");
1670 return 0;
f9c3a380
EP
1671out_security_failure:
1672 free_secdata(secdata);
1673 printk(KERN_INFO "NFS: security options invalid: %d\n", rc);
1674 return 0;
bf0fd768
CL
1675}
1676
ec88f28d 1677/*
4d4b69dd
WAA
1678 * Ensure that a specified authtype in args->auth_info is supported by
1679 * the server. Returns 0 and sets args->selected_flavor if it's ok, and
1680 * -EACCES if not.
ec88f28d 1681 */
4d4b69dd 1682static int nfs_verify_authflavors(struct nfs_parsed_mount_data *args,
9111c95b 1683 rpc_authflavor_t *server_authlist, unsigned int count)
ec88f28d 1684{
4d4b69dd 1685 rpc_authflavor_t flavor = RPC_AUTH_MAXFLAVOR;
9111c95b 1686 unsigned int i;
e68fd7c8 1687 int use_auth_null = false;
4580a92d 1688
d497ab97
WAA
1689 /*
1690 * If the sec= mount option is used, the specified flavor or AUTH_NULL
1691 * must be in the list returned by the server.
1692 *
1693 * AUTH_NULL has a special meaning when it's in the server list - it
1694 * means that the server will ignore the rpc creds, so any flavor
e68fd7c8 1695 * can be used but still use the sec= that was specified.
d497ab97 1696 */
4580a92d 1697 for (i = 0; i < count; i++) {
4d4b69dd
WAA
1698 flavor = server_authlist[i];
1699
e68fd7c8 1700 if (nfs_auth_info_match(&args->auth_info, flavor))
9111c95b 1701 goto out;
e68fd7c8
SD
1702
1703 if (flavor == RPC_AUTH_NULL)
1704 use_auth_null = true;
1705 }
1706
1707 if (use_auth_null) {
1708 flavor = RPC_AUTH_NULL;
1709 goto out;
4580a92d 1710 }
ec88f28d 1711
4d4b69dd
WAA
1712 dfprintk(MOUNT,
1713 "NFS: specified auth flavors not supported by server\n");
9111c95b 1714 return -EACCES;
d497ab97 1715
4580a92d 1716out:
4d4b69dd 1717 args->selected_flavor = flavor;
a3f73c27 1718 dfprintk(MOUNT, "NFS: using auth flavor %u\n", args->selected_flavor);
d497ab97 1719 return 0;
ec88f28d
CL
1720}
1721
0076d7b7
CL
1722/*
1723 * Use the remote server's MOUNT service to request the NFS file handle
1724 * corresponding to the provided path.
1725 */
486aa699 1726static int nfs_request_mount(struct nfs_parsed_mount_data *args,
294ae81d
JL
1727 struct nfs_fh *root_fh,
1728 rpc_authflavor_t *server_authlist,
1729 unsigned int *server_authlist_len)
0076d7b7 1730{
c5d120f8
CL
1731 struct nfs_mount_request request = {
1732 .sap = (struct sockaddr *)
1733 &args->mount_server.address,
1734 .dirpath = args->nfs_server.export_path,
1735 .protocol = args->mount_server.protocol,
1736 .fh = root_fh,
50a737f8 1737 .noresvport = args->flags & NFS_MOUNT_NORESVPORT,
294ae81d 1738 .auth_flav_len = server_authlist_len,
ec88f28d 1739 .auth_flavs = server_authlist,
6d59b8d5 1740 .net = args->net,
c5d120f8 1741 };
4c568017 1742 int status;
0076d7b7
CL
1743
1744 if (args->mount_server.version == 0) {
8a6e5deb
TM
1745 switch (args->version) {
1746 default:
1747 args->mount_server.version = NFS_MNT3_VERSION;
1748 break;
1749 case 2:
1750 args->mount_server.version = NFS_MNT_VERSION;
1751 }
0076d7b7 1752 }
c5d120f8 1753 request.version = args->mount_server.version;
0076d7b7 1754
33832034 1755 if (args->mount_server.hostname)
c5d120f8 1756 request.hostname = args->mount_server.hostname;
33832034 1757 else
c5d120f8 1758 request.hostname = args->nfs_server.hostname;
33832034 1759
0076d7b7
CL
1760 /*
1761 * Construct the mount server's address.
1762 */
4c568017 1763 if (args->mount_server.address.ss_family == AF_UNSPEC) {
c5d120f8 1764 memcpy(request.sap, &args->nfs_server.address,
4c568017
CL
1765 args->nfs_server.addrlen);
1766 args->mount_server.addrlen = args->nfs_server.addrlen;
1767 }
c5d120f8 1768 request.salen = args->mount_server.addrlen;
f5855fec 1769 nfs_set_port(request.sap, &args->mount_server.port, 0);
0076d7b7
CL
1770
1771 /*
1772 * Now ask the mount server to map our export path
1773 * to a file handle.
1774 */
c5d120f8 1775 status = nfs_mount(&request);
ec88f28d
CL
1776 if (status != 0) {
1777 dfprintk(MOUNT, "NFS: unable to mount server %s, error %d\n",
1778 request.hostname, status);
1779 return status;
1780 }
0076d7b7 1781
9111c95b 1782 return 0;
0076d7b7
CL
1783}
1784
d17540c6
JL
1785static struct nfs_server *nfs_try_mount_request(struct nfs_mount_info *mount_info,
1786 struct nfs_subversion *nfs_mod)
1787{
1788 int status;
9111c95b
JL
1789 unsigned int i;
1790 bool tried_auth_unix = false;
1791 bool auth_null_in_list = false;
1792 struct nfs_server *server = ERR_PTR(-EACCES);
294ae81d
JL
1793 struct nfs_parsed_mount_data *args = mount_info->parsed;
1794 rpc_authflavor_t authlist[NFS_MAX_SECFLAVORS];
1795 unsigned int authlist_len = ARRAY_SIZE(authlist);
d17540c6 1796
294ae81d
JL
1797 status = nfs_request_mount(args, mount_info->mntfh, authlist,
1798 &authlist_len);
d17540c6
JL
1799 if (status)
1800 return ERR_PTR(status);
1801
9111c95b
JL
1802 /*
1803 * Was a sec= authflavor specified in the options? First, verify
1804 * whether the server supports it, and then just try to use it if so.
1805 */
a3f73c27 1806 if (args->auth_info.flavor_len > 0) {
4d4b69dd 1807 status = nfs_verify_authflavors(args, authlist, authlist_len);
a3f73c27
WAA
1808 dfprintk(MOUNT, "NFS: using auth flavor %u\n",
1809 args->selected_flavor);
9111c95b
JL
1810 if (status)
1811 return ERR_PTR(status);
1812 return nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1813 }
1814
1815 /*
1816 * No sec= option was provided. RFC 2623, section 2.7 suggests we
1817 * SHOULD prefer the flavor listed first. However, some servers list
1818 * AUTH_NULL first. Avoid ever choosing AUTH_NULL.
1819 */
1820 for (i = 0; i < authlist_len; ++i) {
1821 rpc_authflavor_t flavor;
1822 struct rpcsec_gss_info info;
1823
1824 flavor = authlist[i];
1825 switch (flavor) {
1826 case RPC_AUTH_UNIX:
1827 tried_auth_unix = true;
1828 break;
1829 case RPC_AUTH_NULL:
1830 auth_null_in_list = true;
1831 continue;
1832 default:
1833 if (rpcauth_get_gssinfo(flavor, &info) != 0)
1834 continue;
1835 /* Fallthrough */
1836 }
1837 dfprintk(MOUNT, "NFS: attempting to use auth flavor %u\n", flavor);
a3f73c27 1838 args->selected_flavor = flavor;
9111c95b
JL
1839 server = nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1840 if (!IS_ERR(server))
1841 return server;
1842 }
1843
1844 /*
1845 * Nothing we tried so far worked. At this point, give up if we've
1846 * already tried AUTH_UNIX or if the server's list doesn't contain
1847 * AUTH_NULL
1848 */
1849 if (tried_auth_unix || !auth_null_in_list)
1850 return server;
1851
1852 /* Last chance! Try AUTH_UNIX */
1853 dfprintk(MOUNT, "NFS: attempting to use auth flavor %u\n", RPC_AUTH_UNIX);
a3f73c27 1854 args->selected_flavor = RPC_AUTH_UNIX;
d17540c6
JL
1855 return nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1856}
1857
ff9099f2
BS
1858struct dentry *nfs_try_mount(int flags, const char *dev_name,
1859 struct nfs_mount_info *mount_info,
1860 struct nfs_subversion *nfs_mod)
486aa699 1861{
486aa699
BS
1862 struct nfs_server *server;
1863
d17540c6
JL
1864 if (mount_info->parsed->need_mount)
1865 server = nfs_try_mount_request(mount_info, nfs_mod);
1866 else
1867 server = nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
486aa699 1868
486aa699
BS
1869 if (IS_ERR(server))
1870 return ERR_CAST(server);
1871
ab7017a3 1872 return nfs_fs_mount_common(server, flags, dev_name, mount_info, nfs_mod);
486aa699 1873}
ddda8e0a 1874EXPORT_SYMBOL_GPL(nfs_try_mount);
486aa699 1875
c12bacec
RL
1876/*
1877 * Split "dev_name" into "hostname:export_path".
1878 *
1879 * The leftmost colon demarks the split between the server's hostname
1880 * and the export path. If the hostname starts with a left square
1881 * bracket, then it may contain colons.
1882 *
1883 * Note: caller frees hostname and export path, even on error.
1884 */
1885static int nfs_parse_devname(const char *dev_name,
1886 char **hostname, size_t maxnamlen,
1887 char **export_path, size_t maxpathlen)
dc045898
CL
1888{
1889 size_t len;
c12bacec 1890 char *end;
dc045898 1891
c12bacec
RL
1892 /* Is the host name protected with square brakcets? */
1893 if (*dev_name == '[') {
1894 end = strchr(++dev_name, ']');
1895 if (end == NULL || end[1] != ':')
dc045898 1896 goto out_bad_devname;
dc045898 1897
c12bacec
RL
1898 len = end - dev_name;
1899 end++;
1900 } else {
1901 char *comma;
dc045898 1902
c12bacec
RL
1903 end = strchr(dev_name, ':');
1904 if (end == NULL)
1905 goto out_bad_devname;
1906 len = end - dev_name;
d1aa0825 1907
c12bacec
RL
1908 /* kill possible hostname list: not supported */
1909 comma = strchr(dev_name, ',');
1910 if (comma != NULL && comma < end)
1911 *comma = 0;
1912 }
d1aa0825 1913
d1aa0825
CL
1914 if (len > maxnamlen)
1915 goto out_hostname;
1916
1917 /* N.B. caller will free nfs_server.hostname in all cases */
c12bacec 1918 *hostname = kstrndup(dev_name, len, GFP_KERNEL);
d1aa0825
CL
1919 if (*hostname == NULL)
1920 goto out_nomem;
c12bacec 1921 len = strlen(++end);
d1aa0825
CL
1922 if (len > maxpathlen)
1923 goto out_path;
1924 *export_path = kstrndup(end, len, GFP_KERNEL);
1925 if (!*export_path)
1926 goto out_nomem;
1927
c12bacec 1928 dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", *export_path);
d1aa0825
CL
1929 return 0;
1930
1931out_bad_devname:
1932 dfprintk(MOUNT, "NFS: device name not in host:path format\n");
1933 return -EINVAL;
1934
1935out_nomem:
1936 dfprintk(MOUNT, "NFS: not enough memory to parse device name\n");
1937 return -ENOMEM;
1938
1939out_hostname:
1940 dfprintk(MOUNT, "NFS: server hostname too long\n");
1941 return -ENAMETOOLONG;
1942
1943out_path:
1944 dfprintk(MOUNT, "NFS: export pathname too long\n");
1945 return -ENAMETOOLONG;
1946}
1947
f7b422b1 1948/*
54ceac45
DH
1949 * Validate the NFS2/NFS3 mount data
1950 * - fills in the mount root filehandle
136d558c
CL
1951 *
1952 * For option strings, user space handles the following behaviors:
1953 *
1954 * + DNS: mapping server host name to IP address ("addr=" option)
1955 *
1956 * + failure mode: how to behave if a mount request can't be handled
1957 * immediately ("fg/bg" option)
1958 *
1959 * + retry: how often to retry a mount request ("retry=" option)
1960 *
1961 * + breaking back: trying proto=udp after proto=tcp, v2 after v3,
1962 * mountproto=tcp after mountproto=udp, and so on
f7b422b1 1963 */
d72c727c
BS
1964static int nfs23_validate_mount_data(void *options,
1965 struct nfs_parsed_mount_data *args,
1966 struct nfs_fh *mntfh,
1967 const char *dev_name)
f7b422b1 1968{
2283f8d6 1969 struct nfs_mount_data *data = (struct nfs_mount_data *)options;
4cfd74fc 1970 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
74c98811 1971 int extra_flags = NFS_MOUNT_LEGACY_INTERFACE;
136d558c 1972
5df36e78
CL
1973 if (data == NULL)
1974 goto out_no_data;
f7b422b1 1975
c5afc8da 1976 args->version = NFS_DEFAULT_VERSION;
54ceac45 1977 switch (data->version) {
5df36e78
CL
1978 case 1:
1979 data->namlen = 0;
1980 case 2:
1981 data->bsize = 0;
1982 case 3:
1983 if (data->flags & NFS_MOUNT_VER3)
1984 goto out_no_v3;
1985 data->root.size = NFS2_FHSIZE;
1986 memcpy(data->root.data, data->old_root.data, NFS2_FHSIZE);
74c98811
TM
1987 /* Turn off security negotiation */
1988 extra_flags |= NFS_MOUNT_SECFLAVOUR;
5df36e78
CL
1989 case 4:
1990 if (data->flags & NFS_MOUNT_SECFLAVOUR)
1991 goto out_no_sec;
1992 case 5:
1993 memset(data->context, 0, sizeof(data->context));
1994 case 6:
b7e24457
TM
1995 if (data->flags & NFS_MOUNT_VER3) {
1996 if (data->root.size > NFS3_FHSIZE || data->root.size == 0)
1997 goto out_invalid_fh;
5df36e78 1998 mntfh->size = data->root.size;
764302cc
CL
1999 args->version = 3;
2000 } else {
5df36e78 2001 mntfh->size = NFS2_FHSIZE;
764302cc
CL
2002 args->version = 2;
2003 }
5df36e78 2004
5df36e78
CL
2005
2006 memcpy(mntfh->data, data->root.data, mntfh->size);
2007 if (mntfh->size < sizeof(mntfh->data))
2008 memset(mntfh->data + mntfh->size, 0,
2009 sizeof(mntfh->data) - mntfh->size);
6e88e061 2010
2283f8d6
TT
2011 /*
2012 * Translate to nfs_parsed_mount_data, which nfs_fill_super
2013 * can deal with.
2014 */
ff3525a5 2015 args->flags = data->flags & NFS_MOUNT_FLAGMASK;
74c98811 2016 args->flags |= extra_flags;
2283f8d6
TT
2017 args->rsize = data->rsize;
2018 args->wsize = data->wsize;
2283f8d6
TT
2019 args->timeo = data->timeo;
2020 args->retrans = data->retrans;
2021 args->acregmin = data->acregmin;
2022 args->acregmax = data->acregmax;
2023 args->acdirmin = data->acdirmin;
2024 args->acdirmax = data->acdirmax;
b72e4f42 2025 args->need_mount = false;
4c568017 2026
4cfd74fc 2027 memcpy(sap, &data->addr, sizeof(data->addr));
4c568017 2028 args->nfs_server.addrlen = sizeof(data->addr);
872ece86 2029 args->nfs_server.port = ntohs(data->addr.sin_port);
4cfd74fc 2030 if (!nfs_verify_server_address(sap))
4c568017
CL
2031 goto out_no_address;
2032
2283f8d6 2033 if (!(data->flags & NFS_MOUNT_TCP))
0896a725 2034 args->nfs_server.protocol = XPRT_TRANSPORT_UDP;
2283f8d6
TT
2035 /* N.B. caller will free nfs_server.hostname in all cases */
2036 args->nfs_server.hostname = kstrdup(data->hostname, GFP_KERNEL);
2037 args->namlen = data->namlen;
2038 args->bsize = data->bsize;
dd07c947
CL
2039
2040 if (data->flags & NFS_MOUNT_SECFLAVOUR)
a3f73c27 2041 args->selected_flavor = data->pseudoflavor;
74c98811 2042 else
a3f73c27 2043 args->selected_flavor = RPC_AUTH_UNIX;
63649bd7
CG
2044 if (!args->nfs_server.hostname)
2045 goto out_nomem;
f9c3a380 2046
5eebde23
SJ
2047 if (!(data->flags & NFS_MOUNT_NONLM))
2048 args->flags &= ~(NFS_MOUNT_LOCAL_FLOCK|
2049 NFS_MOUNT_LOCAL_FCNTL);
2050 else
2051 args->flags |= (NFS_MOUNT_LOCAL_FLOCK|
2052 NFS_MOUNT_LOCAL_FCNTL);
f9c3a380
EP
2053 /*
2054 * The legacy version 6 binary mount data from userspace has a
2055 * field used only to transport selinux information into the
2056 * the kernel. To continue to support that functionality we
2057 * have a touch of selinux knowledge here in the NFS code. The
2058 * userspace code converted context=blah to just blah so we are
2059 * converting back to the full string selinux understands.
2060 */
2061 if (data->context[0]){
2062#ifdef CONFIG_SECURITY_SELINUX
2063 int rc;
2064 char *opts_str = kmalloc(sizeof(data->context) + 8, GFP_KERNEL);
2065 if (!opts_str)
2066 return -ENOMEM;
2067 strcpy(opts_str, "context=");
2068 data->context[NFS_MAX_CONTEXT_LEN] = '\0';
2069 strcat(opts_str, &data->context[0]);
2070 rc = security_sb_parse_opts_str(opts_str, &args->lsm_opts);
2071 kfree(opts_str);
2072 if (rc)
2073 return rc;
2074#else
2075 return -EINVAL;
2076#endif
2077 }
2078
5df36e78 2079 break;
b72e4f42
BS
2080 default:
2081 return NFS_TEXT_DATA;
f7b422b1 2082 }
54ceac45 2083
5df36e78 2084 return 0;
f7b422b1 2085
5df36e78
CL
2086out_no_data:
2087 dfprintk(MOUNT, "NFS: mount program didn't pass any mount data\n");
2088 return -EINVAL;
54ceac45 2089
5df36e78
CL
2090out_no_v3:
2091 dfprintk(MOUNT, "NFS: nfs_mount_data version %d does not support v3\n",
2092 data->version);
2093 return -EINVAL;
f7b422b1 2094
5df36e78
CL
2095out_no_sec:
2096 dfprintk(MOUNT, "NFS: nfs_mount_data version supports only AUTH_SYS\n");
2097 return -EINVAL;
2098
63649bd7
CG
2099out_nomem:
2100 dfprintk(MOUNT, "NFS: not enough memory to handle mount options\n");
2101 return -ENOMEM;
2102
5df36e78
CL
2103out_no_address:
2104 dfprintk(MOUNT, "NFS: mount program didn't pass remote address\n");
2105 return -EINVAL;
2106
2107out_invalid_fh:
2108 dfprintk(MOUNT, "NFS: invalid root filehandle\n");
2109 return -EINVAL;
f7b422b1
DH
2110}
2111
89d77c8f 2112#if IS_ENABLED(CONFIG_NFS_V4)
d72c727c
BS
2113static int nfs_validate_mount_data(struct file_system_type *fs_type,
2114 void *options,
2115 struct nfs_parsed_mount_data *args,
2116 struct nfs_fh *mntfh,
2117 const char *dev_name)
2118{
2119 if (fs_type == &nfs_fs_type)
2120 return nfs23_validate_mount_data(options, args, mntfh, dev_name);
2121 return nfs4_validate_mount_data(options, args, dev_name);
2122}
2123#else
2124static int nfs_validate_mount_data(struct file_system_type *fs_type,
2125 void *options,
2126 struct nfs_parsed_mount_data *args,
2127 struct nfs_fh *mntfh,
2128 const char *dev_name)
2129{
2130 return nfs23_validate_mount_data(options, args, mntfh, dev_name);
2131}
2132#endif
2133
b72e4f42
BS
2134static int nfs_validate_text_mount_data(void *options,
2135 struct nfs_parsed_mount_data *args,
2136 const char *dev_name)
2137{
2138 int port = 0;
2139 int max_namelen = PAGE_SIZE;
2140 int max_pathlen = NFS_MAXPATHLEN;
2141 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
2142
2143 if (nfs_parse_mount_options((char *)options, args) == 0)
2144 return -EINVAL;
2145
2146 if (!nfs_verify_server_address(sap))
2147 goto out_no_address;
2148
2149 if (args->version == 4) {
89d77c8f 2150#if IS_ENABLED(CONFIG_NFS_V4)
b72e4f42
BS
2151 port = NFS_PORT;
2152 max_namelen = NFS4_MAXNAMLEN;
2153 max_pathlen = NFS4_MAXPATHLEN;
2154 nfs_validate_transport_protocol(args);
6da1a034
TM
2155 if (args->nfs_server.protocol == XPRT_TRANSPORT_UDP)
2156 goto out_invalid_transport_udp;
b72e4f42
BS
2157 nfs4_validate_mount_flags(args);
2158#else
2159 goto out_v4_not_compiled;
2160#endif /* CONFIG_NFS_V4 */
2161 } else
2162 nfs_set_mount_transport_protocol(args);
2163
2164 nfs_set_port(sap, &args->nfs_server.port, port);
2165
b72e4f42
BS
2166 return nfs_parse_devname(dev_name,
2167 &args->nfs_server.hostname,
2168 max_namelen,
2169 &args->nfs_server.export_path,
2170 max_pathlen);
2171
89d77c8f 2172#if !IS_ENABLED(CONFIG_NFS_V4)
b72e4f42
BS
2173out_v4_not_compiled:
2174 dfprintk(MOUNT, "NFS: NFSv4 is not compiled into kernel\n");
2175 return -EPROTONOSUPPORT;
6da1a034
TM
2176#else
2177out_invalid_transport_udp:
2178 dfprintk(MOUNT, "NFSv4: Unsupported transport protocol udp\n");
2179 return -EINVAL;
b72e4f42
BS
2180#endif /* !CONFIG_NFS_V4 */
2181
2182out_no_address:
2183 dfprintk(MOUNT, "NFS: mount program didn't pass remote address\n");
2184 return -EINVAL;
b72e4f42
BS
2185}
2186
71a6ec8a 2187#define NFS_REMOUNT_CMP_FLAGMASK ~(NFS_MOUNT_INTR \
c8e47028
SM
2188 | NFS_MOUNT_SECURE \
2189 | NFS_MOUNT_TCP \
2190 | NFS_MOUNT_VER3 \
2191 | NFS_MOUNT_KERBEROS \
2192 | NFS_MOUNT_NONLM \
2193 | NFS_MOUNT_BROKEN_SUID \
2194 | NFS_MOUNT_STRICTLOCK \
c8e47028
SM
2195 | NFS_MOUNT_LEGACY_INTERFACE)
2196
71a6ec8a
SM
2197#define NFS_MOUNT_CMP_FLAGMASK (NFS_REMOUNT_CMP_FLAGMASK & \
2198 ~(NFS_MOUNT_UNSHARED | NFS_MOUNT_NORESVPORT))
2199
48b605f8
JL
2200static int
2201nfs_compare_remount_data(struct nfs_server *nfss,
2202 struct nfs_parsed_mount_data *data)
2203{
71a6ec8a 2204 if ((data->flags ^ nfss->flags) & NFS_REMOUNT_CMP_FLAGMASK ||
48b605f8
JL
2205 data->rsize != nfss->rsize ||
2206 data->wsize != nfss->wsize ||
57acc40d
JL
2207 data->version != nfss->nfs_client->rpc_ops->version ||
2208 data->minorversion != nfss->nfs_client->cl_minorversion ||
48b605f8 2209 data->retrans != nfss->client->cl_timeout->to_retries ||
09a330f4 2210 !nfs_auth_info_match(&data->auth_info, nfss->client->cl_auth->au_flavor) ||
48b605f8
JL
2211 data->acregmin != nfss->acregmin / HZ ||
2212 data->acregmax != nfss->acregmax / HZ ||
2213 data->acdirmin != nfss->acdirmin / HZ ||
2214 data->acdirmax != nfss->acdirmax / HZ ||
2215 data->timeo != (10U * nfss->client->cl_timeout->to_initval / HZ) ||
bcd2ea17 2216 data->nfs_server.port != nfss->port ||
48b605f8 2217 data->nfs_server.addrlen != nfss->nfs_client->cl_addrlen ||
a1be9eee
SR
2218 !rpc_cmp_addr((struct sockaddr *)&data->nfs_server.address,
2219 (struct sockaddr *)&nfss->nfs_client->cl_addr))
48b605f8
JL
2220 return -EINVAL;
2221
2222 return 0;
2223}
2224
fbdefd64 2225int
48b605f8
JL
2226nfs_remount(struct super_block *sb, int *flags, char *raw_data)
2227{
2228 int error;
2229 struct nfs_server *nfss = sb->s_fs_info;
2230 struct nfs_parsed_mount_data *data;
2231 struct nfs_mount_data *options = (struct nfs_mount_data *)raw_data;
2232 struct nfs4_mount_data *options4 = (struct nfs4_mount_data *)raw_data;
cd100725 2233 u32 nfsvers = nfss->nfs_client->rpc_ops->version;
48b605f8 2234
02b9984d
TT
2235 sync_filesystem(sb);
2236
48b605f8
JL
2237 /*
2238 * Userspace mount programs that send binary options generally send
2239 * them populated with default values. We have no way to know which
2240 * ones were explicitly specified. Fall back to legacy behavior and
2241 * just return success.
2242 */
31c94469
MZ
2243 if ((nfsvers == 4 && (!options4 || options4->version == 1)) ||
2244 (nfsvers <= 3 && (!options || (options->version >= 1 &&
2245 options->version <= 6))))
48b605f8
JL
2246 return 0;
2247
2248 data = kzalloc(sizeof(*data), GFP_KERNEL);
2249 if (data == NULL)
2250 return -ENOMEM;
2251
2252 /* fill out struct with values from existing mount */
2253 data->flags = nfss->flags;
2254 data->rsize = nfss->rsize;
2255 data->wsize = nfss->wsize;
2256 data->retrans = nfss->client->cl_timeout->to_retries;
a3f73c27 2257 data->selected_flavor = nfss->client->cl_auth->au_flavor;
48b605f8
JL
2258 data->acregmin = nfss->acregmin / HZ;
2259 data->acregmax = nfss->acregmax / HZ;
2260 data->acdirmin = nfss->acdirmin / HZ;
2261 data->acdirmax = nfss->acdirmax / HZ;
2262 data->timeo = 10U * nfss->client->cl_timeout->to_initval / HZ;
bcd2ea17 2263 data->nfs_server.port = nfss->port;
48b605f8 2264 data->nfs_server.addrlen = nfss->nfs_client->cl_addrlen;
57acc40d
JL
2265 data->version = nfsvers;
2266 data->minorversion = nfss->nfs_client->cl_minorversion;
a914722f 2267 data->net = current->nsproxy->net_ns;
48b605f8
JL
2268 memcpy(&data->nfs_server.address, &nfss->nfs_client->cl_addr,
2269 data->nfs_server.addrlen);
2270
2271 /* overwrite those values with any that were specified */
1966903f
JL
2272 error = -EINVAL;
2273 if (!nfs_parse_mount_options((char *)options, data))
48b605f8
JL
2274 goto out;
2275
26c4c170
JL
2276 /*
2277 * noac is a special case. It implies -o sync, but that's not
2278 * necessarily reflected in the mtab options. do_remount_sb
2279 * will clear MS_SYNCHRONOUS if -o sync wasn't specified in the
2280 * remount options, so we have to explicitly reset it.
2281 */
2282 if (data->flags & NFS_MOUNT_NOAC)
2283 *flags |= MS_SYNCHRONOUS;
2284
48b605f8
JL
2285 /* compare new mount options with old ones */
2286 error = nfs_compare_remount_data(nfss, data);
2287out:
2288 kfree(data);
2289 return error;
2290}
89d77c8f 2291EXPORT_SYMBOL_GPL(nfs_remount);
48b605f8 2292
f7b422b1 2293/*
54ceac45 2294 * Initialise the common bits of the superblock
f7b422b1 2295 */
fbdefd64 2296inline void nfs_initialise_sb(struct super_block *sb)
f7b422b1 2297{
54ceac45 2298 struct nfs_server *server = NFS_SB(sb);
5006a76c 2299
54ceac45 2300 sb->s_magic = NFS_SUPER_MAGIC;
f7b422b1 2301
54ceac45
DH
2302 /* We probably want something more informative here */
2303 snprintf(sb->s_id, sizeof(sb->s_id),
5a7c9eec 2304 "%u:%u", MAJOR(sb->s_dev), MINOR(sb->s_dev));
5006a76c 2305
54ceac45
DH
2306 if (sb->s_blocksize == 0)
2307 sb->s_blocksize = nfs_block_bits(server->wsize,
2308 &sb->s_blocksize_bits);
f7b422b1 2309
32a88aa1
JA
2310 sb->s_bdi = &server->backing_dev_info;
2311
54ceac45 2312 nfs_super_set_maxbytes(sb, server->maxfilesize);
f7b422b1
DH
2313}
2314
2315/*
54ceac45 2316 * Finish setting up an NFS2/3 superblock
f7b422b1 2317 */
fbdefd64 2318void nfs_fill_super(struct super_block *sb, struct nfs_mount_info *mount_info)
f7b422b1 2319{
c40f8d1d 2320 struct nfs_parsed_mount_data *data = mount_info->parsed;
f7b422b1 2321 struct nfs_server *server = NFS_SB(sb);
5006a76c 2322
54ceac45
DH
2323 sb->s_blocksize_bits = 0;
2324 sb->s_blocksize = 0;
6a74490d
BS
2325 sb->s_xattr = server->nfs_client->cl_nfs_mod->xattr;
2326 sb->s_op = server->nfs_client->cl_nfs_mod->sops;
2327 if (data && data->bsize)
54ceac45 2328 sb->s_blocksize = nfs_block_size(data->bsize, &sb->s_blocksize_bits);
f7b422b1 2329
6a74490d 2330 if (server->nfs_client->rpc_ops->version != 2) {
54ceac45
DH
2331 /* The VFS shouldn't apply the umask to mode bits. We will do
2332 * so ourselves when necessary.
2333 */
2334 sb->s_flags |= MS_POSIXACL;
2335 sb->s_time_gran = 1;
816724e6 2336 }
54ceac45 2337
54ceac45 2338 nfs_initialise_sb(sb);
f7b422b1 2339}
89d77c8f 2340EXPORT_SYMBOL_GPL(nfs_fill_super);
f7b422b1
DH
2341
2342/*
3cadf4b8 2343 * Finish setting up a cloned NFS2/3/4 superblock
f7b422b1 2344 */
fbdefd64 2345void nfs_clone_super(struct super_block *sb, struct nfs_mount_info *mount_info)
f7b422b1 2346{
8c958e0c 2347 const struct super_block *old_sb = mount_info->cloned->sb;
54ceac45
DH
2348 struct nfs_server *server = NFS_SB(sb);
2349
2350 sb->s_blocksize_bits = old_sb->s_blocksize_bits;
2351 sb->s_blocksize = old_sb->s_blocksize;
2352 sb->s_maxbytes = old_sb->s_maxbytes;
3cadf4b8
BS
2353 sb->s_xattr = old_sb->s_xattr;
2354 sb->s_op = old_sb->s_op;
2355 sb->s_time_gran = 1;
f7b422b1 2356
3cadf4b8 2357 if (server->nfs_client->rpc_ops->version != 2) {
54ceac45
DH
2358 /* The VFS shouldn't apply the umask to mode bits. We will do
2359 * so ourselves when necessary.
f7b422b1
DH
2360 */
2361 sb->s_flags |= MS_POSIXACL;
f7b422b1
DH
2362 }
2363
54ceac45 2364 nfs_initialise_sb(sb);
f7b422b1
DH
2365}
2366
275a5d24
TM
2367static int nfs_compare_mount_options(const struct super_block *s, const struct nfs_server *b, int flags)
2368{
2369 const struct nfs_server *a = s->s_fs_info;
2370 const struct rpc_clnt *clnt_a = a->client;
2371 const struct rpc_clnt *clnt_b = b->client;
2372
2373 if ((s->s_flags & NFS_MS_MASK) != (flags & NFS_MS_MASK))
2374 goto Ebusy;
2375 if (a->nfs_client != b->nfs_client)
2376 goto Ebusy;
0aea92bf 2377 if ((a->flags ^ b->flags) & NFS_MOUNT_CMP_FLAGMASK)
275a5d24
TM
2378 goto Ebusy;
2379 if (a->wsize != b->wsize)
2380 goto Ebusy;
2381 if (a->rsize != b->rsize)
2382 goto Ebusy;
2383 if (a->acregmin != b->acregmin)
2384 goto Ebusy;
2385 if (a->acregmax != b->acregmax)
2386 goto Ebusy;
2387 if (a->acdirmin != b->acdirmin)
2388 goto Ebusy;
2389 if (a->acdirmax != b->acdirmax)
2390 goto Ebusy;
5837f6df 2391 if (b->auth_info.flavor_len > 0 &&
0aea92bf 2392 clnt_a->cl_auth->au_flavor != clnt_b->cl_auth->au_flavor)
275a5d24 2393 goto Ebusy;
e89a5a43 2394 return 1;
275a5d24 2395Ebusy:
e89a5a43
TM
2396 return 0;
2397}
2398
2399struct nfs_sb_mountdata {
2400 struct nfs_server *server;
2401 int mntflags;
2402};
2403
2404static int nfs_set_super(struct super_block *s, void *data)
2405{
2406 struct nfs_sb_mountdata *sb_mntdata = data;
2407 struct nfs_server *server = sb_mntdata->server;
2408 int ret;
2409
2410 s->s_flags = sb_mntdata->mntflags;
2411 s->s_fs_info = server;
8b244ff2 2412 s->s_d_op = server->nfs_client->rpc_ops->dentry_ops;
e89a5a43
TM
2413 ret = set_anon_super(s, server);
2414 if (ret == 0)
2415 server->s_dev = s->s_dev;
2416 return ret;
2417}
2418
fd00a8ff
CL
2419static int nfs_compare_super_address(struct nfs_server *server1,
2420 struct nfs_server *server2)
2421{
2422 struct sockaddr *sap1, *sap2;
7e3fcf61
BF
2423 struct rpc_xprt *xprt1 = server1->client->cl_xprt;
2424 struct rpc_xprt *xprt2 = server2->client->cl_xprt;
2425
2426 if (!net_eq(xprt1->xprt_net, xprt2->xprt_net))
2427 return 0;
fd00a8ff
CL
2428
2429 sap1 = (struct sockaddr *)&server1->nfs_client->cl_addr;
2430 sap2 = (struct sockaddr *)&server2->nfs_client->cl_addr;
2431
2432 if (sap1->sa_family != sap2->sa_family)
2433 return 0;
2434
2435 switch (sap1->sa_family) {
2436 case AF_INET: {
2437 struct sockaddr_in *sin1 = (struct sockaddr_in *)sap1;
2438 struct sockaddr_in *sin2 = (struct sockaddr_in *)sap2;
2439 if (sin1->sin_addr.s_addr != sin2->sin_addr.s_addr)
2440 return 0;
2441 if (sin1->sin_port != sin2->sin_port)
2442 return 0;
2443 break;
2444 }
2445 case AF_INET6: {
2446 struct sockaddr_in6 *sin1 = (struct sockaddr_in6 *)sap1;
2447 struct sockaddr_in6 *sin2 = (struct sockaddr_in6 *)sap2;
2448 if (!ipv6_addr_equal(&sin1->sin6_addr, &sin2->sin6_addr))
2449 return 0;
2450 if (sin1->sin6_port != sin2->sin6_port)
2451 return 0;
2452 break;
2453 }
2454 default:
2455 return 0;
2456 }
2457
2458 return 1;
2459}
2460
e89a5a43
TM
2461static int nfs_compare_super(struct super_block *sb, void *data)
2462{
2463 struct nfs_sb_mountdata *sb_mntdata = data;
2464 struct nfs_server *server = sb_mntdata->server, *old = NFS_SB(sb);
2465 int mntflags = sb_mntdata->mntflags;
2466
fd00a8ff 2467 if (!nfs_compare_super_address(old, server))
e89a5a43
TM
2468 return 0;
2469 /* Note: NFS_MOUNT_UNSHARED == NFS4_MOUNT_UNSHARED */
2470 if (old->flags & NFS_MOUNT_UNSHARED)
2471 return 0;
2472 if (memcmp(&old->fsid, &server->fsid, sizeof(old->fsid)) != 0)
2473 return 0;
2474 return nfs_compare_mount_options(sb, server, mntflags);
275a5d24
TM
2475}
2476
39ffb921 2477#ifdef CONFIG_NFS_FSCACHE
2311b943
BS
2478static void nfs_get_cache_cookie(struct super_block *sb,
2479 struct nfs_parsed_mount_data *parsed,
2480 struct nfs_clone_mount *cloned)
2481{
c4271c6e 2482 struct nfs_server *nfss = NFS_SB(sb);
2311b943
BS
2483 char *uniq = NULL;
2484 int ulen = 0;
2485
c4271c6e
TM
2486 nfss->fscache_key = NULL;
2487 nfss->fscache = NULL;
2488
2489 if (parsed) {
2490 if (!(parsed->options & NFS_OPTION_FSCACHE))
2491 return;
2492 if (parsed->fscache_uniq) {
2493 uniq = parsed->fscache_uniq;
2494 ulen = strlen(parsed->fscache_uniq);
2495 }
2311b943
BS
2496 } else if (cloned) {
2497 struct nfs_server *mnt_s = NFS_SB(cloned->sb);
c4271c6e
TM
2498 if (!(mnt_s->options & NFS_OPTION_FSCACHE))
2499 return;
2311b943
BS
2500 if (mnt_s->fscache_key) {
2501 uniq = mnt_s->fscache_key->key.uniquifier;
2502 ulen = mnt_s->fscache_key->key.uniq_len;
2503 };
c4271c6e
TM
2504 } else
2505 return;
2311b943
BS
2506
2507 nfs_fscache_get_super_cookie(sb, uniq, ulen);
2508}
39ffb921
TM
2509#else
2510static void nfs_get_cache_cookie(struct super_block *sb,
2511 struct nfs_parsed_mount_data *parsed,
2512 struct nfs_clone_mount *cloned)
2513{
2514}
2515#endif
2311b943 2516
fa799759
MS
2517static int nfs_bdi_register(struct nfs_server *server)
2518{
2519 return bdi_register_dev(&server->backing_dev_info, server->s_dev);
2520}
2521
fbdefd64
BS
2522int nfs_set_sb_security(struct super_block *s, struct dentry *mntroot,
2523 struct nfs_mount_info *mount_info)
3d176e3f 2524{
aa9c2669
DQ
2525 int error;
2526 unsigned long kflags = 0, kflags_out = 0;
2527 if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL)
2528 kflags |= SECURITY_LSM_NATIVE_LABELS;
2529
2530 error = security_sb_set_mnt_opts(s, &mount_info->parsed->lsm_opts,
2531 kflags, &kflags_out);
2532 if (error)
2533 goto err;
2534
2535 if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL &&
2536 !(kflags_out & SECURITY_LSM_NATIVE_LABELS))
2537 NFS_SB(s)->caps &= ~NFS_CAP_SECURITY_LABEL;
2538err:
2539 return error;
3d176e3f 2540}
89d77c8f 2541EXPORT_SYMBOL_GPL(nfs_set_sb_security);
3d176e3f 2542
fbdefd64
BS
2543int nfs_clone_sb_security(struct super_block *s, struct dentry *mntroot,
2544 struct nfs_mount_info *mount_info)
3d176e3f
BS
2545{
2546 /* clone any lsm security options from the parent to the new sb */
2b0143b5 2547 if (d_inode(mntroot)->i_op != NFS_SB(s)->nfs_client->rpc_ops->dir_inode_ops)
3d176e3f 2548 return -ESTALE;
094f7b69 2549 return security_sb_clone_mnt_opts(mount_info->cloned->sb, s);
3d176e3f 2550}
89d77c8f 2551EXPORT_SYMBOL_GPL(nfs_clone_sb_security);
3d176e3f 2552
ab7017a3 2553struct dentry *nfs_fs_mount_common(struct nfs_server *server,
fbdefd64 2554 int flags, const char *dev_name,
ab7017a3
BS
2555 struct nfs_mount_info *mount_info,
2556 struct nfs_subversion *nfs_mod)
f7b422b1 2557{
f7b422b1 2558 struct super_block *s;
01194981 2559 struct dentry *mntroot = ERR_PTR(-ENOMEM);
75180df2 2560 int (*compare_super)(struct super_block *, void *) = nfs_compare_super;
e89a5a43
TM
2561 struct nfs_sb_mountdata sb_mntdata = {
2562 .mntflags = flags,
c40f8d1d 2563 .server = server,
e89a5a43 2564 };
01194981 2565 int error;
33852a1f 2566
75180df2
TM
2567 if (server->flags & NFS_MOUNT_UNSHARED)
2568 compare_super = NULL;
2569
fb2088cc
SP
2570 /* -o noac implies -o sync */
2571 if (server->flags & NFS_MOUNT_NOAC)
2572 sb_mntdata.mntflags |= MS_SYNCHRONOUS;
2573
e890db01
SM
2574 if (mount_info->cloned != NULL && mount_info->cloned->sb != NULL)
2575 if (mount_info->cloned->sb->s_flags & MS_SYNCHRONOUS)
2576 sb_mntdata.mntflags |= MS_SYNCHRONOUS;
2577
54ceac45 2578 /* Get a superblock - note that we may end up sharing one that already exists */
ab7017a3 2579 s = sget(nfs_mod->nfs_fs, compare_super, nfs_set_super, flags, &sb_mntdata);
816724e6 2580 if (IS_ERR(s)) {
01194981 2581 mntroot = ERR_CAST(s);
54ceac45 2582 goto out_err_nosb;
816724e6
TM
2583 }
2584
54ceac45
DH
2585 if (s->s_fs_info != server) {
2586 nfs_free_server(server);
2587 server = NULL;
fa799759
MS
2588 } else {
2589 error = nfs_bdi_register(server);
01194981
AV
2590 if (error) {
2591 mntroot = ERR_PTR(error);
7b14a213 2592 goto error_splat_super;
01194981 2593 }
ce6cda18 2594 server->super = s;
54ceac45 2595 }
f7b422b1 2596
54ceac45
DH
2597 if (!s->s_root) {
2598 /* initial superblock/root creation */
c40f8d1d 2599 mount_info->fill_super(s, mount_info);
3d176e3f 2600 nfs_get_cache_cookie(s, mount_info->parsed, mount_info->cloned);
54ceac45 2601 }
f7b422b1 2602
87c7083d 2603 mntroot = nfs_get_root(s, mount_info->mntfh, dev_name);
01194981 2604 if (IS_ERR(mntroot))
54ceac45 2605 goto error_splat_super;
816724e6 2606
3d176e3f 2607 error = mount_info->set_security(s, mntroot, mount_info);
f9c3a380
EP
2608 if (error)
2609 goto error_splat_root;
2610
54ceac45 2611 s->s_flags |= MS_ACTIVE;
0655960f
CL
2612
2613out:
01194981 2614 return mntroot;
816724e6 2615
54ceac45
DH
2616out_err_nosb:
2617 nfs_free_server(server);
0655960f 2618 goto out;
54ceac45 2619
f9c3a380
EP
2620error_splat_root:
2621 dput(mntroot);
01194981 2622 mntroot = ERR_PTR(error);
54ceac45 2623error_splat_super:
6f5bbff9 2624 deactivate_locked_super(s);
0655960f 2625 goto out;
f7b422b1 2626}
89d77c8f 2627EXPORT_SYMBOL_GPL(nfs_fs_mount_common);
f7b422b1 2628
fbdefd64 2629struct dentry *nfs_fs_mount(struct file_system_type *fs_type,
c40f8d1d
BS
2630 int flags, const char *dev_name, void *raw_data)
2631{
c40f8d1d
BS
2632 struct nfs_mount_info mount_info = {
2633 .fill_super = nfs_fill_super,
3d176e3f 2634 .set_security = nfs_set_sb_security,
c40f8d1d 2635 };
c40f8d1d 2636 struct dentry *mntroot = ERR_PTR(-ENOMEM);
ab7017a3 2637 struct nfs_subversion *nfs_mod;
c40f8d1d
BS
2638 int error;
2639
46058d46 2640 mount_info.parsed = nfs_alloc_parsed_mount_data();
87c7083d
BS
2641 mount_info.mntfh = nfs_alloc_fhandle();
2642 if (mount_info.parsed == NULL || mount_info.mntfh == NULL)
c40f8d1d
BS
2643 goto out;
2644
2645 /* Validate the mount data */
87c7083d 2646 error = nfs_validate_mount_data(fs_type, raw_data, mount_info.parsed, mount_info.mntfh, dev_name);
b72e4f42 2647 if (error == NFS_TEXT_DATA)
46058d46 2648 error = nfs_validate_text_mount_data(raw_data, mount_info.parsed, dev_name);
c40f8d1d
BS
2649 if (error < 0) {
2650 mntroot = ERR_PTR(error);
2651 goto out;
2652 }
c40f8d1d 2653
ab7017a3
BS
2654 nfs_mod = get_nfs_version(mount_info.parsed->version);
2655 if (IS_ERR(nfs_mod)) {
2656 mntroot = ERR_CAST(nfs_mod);
2657 goto out;
2658 }
2659
ff9099f2 2660 mntroot = nfs_mod->rpc_ops->try_mount(flags, dev_name, &mount_info, nfs_mod);
ab7017a3
BS
2661
2662 put_nfs_version(nfs_mod);
c40f8d1d 2663out:
46058d46 2664 nfs_free_parsed_mount_data(mount_info.parsed);
87c7083d 2665 nfs_free_fhandle(mount_info.mntfh);
c40f8d1d
BS
2666 return mntroot;
2667}
89d77c8f 2668EXPORT_SYMBOL_GPL(nfs_fs_mount);
c40f8d1d 2669
54ceac45
DH
2670/*
2671 * Destroy an NFS2/3 superblock
2672 */
fbdefd64 2673void nfs_kill_super(struct super_block *s)
f7b422b1
DH
2674{
2675 struct nfs_server *server = NFS_SB(s);
7b14a213
CH
2676 dev_t dev = s->s_dev;
2677
2678 generic_shutdown_super(s);
f7b422b1 2679
08734048 2680 nfs_fscache_release_super_cookie(s);
7b14a213 2681
54ceac45 2682 nfs_free_server(server);
7b14a213 2683 free_anon_bdev(dev);
f7b422b1 2684}
89d77c8f 2685EXPORT_SYMBOL_GPL(nfs_kill_super);
f7b422b1 2686
54ceac45 2687/*
8c958e0c 2688 * Clone an NFS2/3/4 server record on xdev traversal (FSID-change)
54ceac45 2689 */
3dd4f8ef 2690static struct dentry *
e8f25e6d
BS
2691nfs_xdev_mount(struct file_system_type *fs_type, int flags,
2692 const char *dev_name, void *raw_data)
f7b422b1 2693{
e8f25e6d
BS
2694 struct nfs_clone_mount *data = raw_data;
2695 struct nfs_mount_info mount_info = {
2696 .fill_super = nfs_clone_super,
2697 .set_security = nfs_clone_sb_security,
2698 .cloned = data,
2699 };
54ceac45 2700 struct nfs_server *server;
3d176e3f 2701 struct dentry *mntroot = ERR_PTR(-ENOMEM);
ab7017a3 2702 struct nfs_subversion *nfs_mod = NFS_SB(data->sb)->nfs_client->cl_nfs_mod;
f7b422b1 2703
dee972b9 2704 dprintk("--> nfs_xdev_mount()\n");
f7b422b1 2705
e8f25e6d 2706 mount_info.mntfh = mount_info.cloned->fh;
87c7083d 2707
54ceac45 2708 /* create a new volume representation */
1179acc6 2709 server = nfs_mod->rpc_ops->clone_server(NFS_SB(data->sb), data->fh, data->fattr, data->authflavor);
f7b422b1 2710
dee972b9
TM
2711 if (IS_ERR(server))
2712 mntroot = ERR_CAST(server);
2713 else
2714 mntroot = nfs_fs_mount_common(server, flags,
2715 dev_name, &mount_info, nfs_mod);
24c8dbbb 2716
dee972b9
TM
2717 dprintk("<-- nfs_xdev_mount() = %ld\n",
2718 IS_ERR(mntroot) ? PTR_ERR(mntroot) : 0L);
2719 return mntroot;
f7b422b1
DH
2720}
2721
89d77c8f 2722#if IS_ENABLED(CONFIG_NFS_V4)
54ceac45 2723
01c3f052
TM
2724static void nfs4_validate_mount_flags(struct nfs_parsed_mount_data *args)
2725{
5eebde23
SJ
2726 args->flags &= ~(NFS_MOUNT_NONLM|NFS_MOUNT_NOACL|NFS_MOUNT_VER3|
2727 NFS_MOUNT_LOCAL_FLOCK|NFS_MOUNT_LOCAL_FCNTL);
01c3f052
TM
2728}
2729
f0768ebd
CL
2730/*
2731 * Validate NFSv4 mount options
2732 */
91ea40b9
TT
2733static int nfs4_validate_mount_data(void *options,
2734 struct nfs_parsed_mount_data *args,
2735 const char *dev_name)
f0768ebd 2736{
4cfd74fc 2737 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
91ea40b9 2738 struct nfs4_mount_data *data = (struct nfs4_mount_data *)options;
f0768ebd
CL
2739 char *c;
2740
2741 if (data == NULL)
2742 goto out_no_data;
2743
cdf66442
BS
2744 args->version = 4;
2745
f0768ebd
CL
2746 switch (data->version) {
2747 case 1:
4c568017
CL
2748 if (data->host_addrlen > sizeof(args->nfs_server.address))
2749 goto out_no_address;
2750 if (data->host_addrlen == 0)
f0768ebd 2751 goto out_no_address;
4c568017 2752 args->nfs_server.addrlen = data->host_addrlen;
4cfd74fc 2753 if (copy_from_user(sap, data->host_addr, data->host_addrlen))
f0768ebd 2754 return -EFAULT;
4cfd74fc 2755 if (!nfs_verify_server_address(sap))
f0768ebd 2756 goto out_no_address;
872ece86 2757 args->nfs_server.port = ntohs(((struct sockaddr_in *)sap)->sin_port);
f0768ebd 2758
6738b251 2759 if (data->auth_flavourlen) {
74c98811 2760 rpc_authflavor_t pseudoflavor;
6738b251
CL
2761 if (data->auth_flavourlen > 1)
2762 goto out_inval_auth;
74c98811 2763 if (copy_from_user(&pseudoflavor,
91ea40b9 2764 data->auth_flavours,
74c98811 2765 sizeof(pseudoflavor)))
f0768ebd 2766 return -EFAULT;
a3f73c27 2767 args->selected_flavor = pseudoflavor;
74c98811 2768 } else
a3f73c27 2769 args->selected_flavor = RPC_AUTH_UNIX;
f0768ebd
CL
2770
2771 c = strndup_user(data->hostname.data, NFS4_MAXNAMLEN);
2772 if (IS_ERR(c))
2773 return PTR_ERR(c);
91ea40b9 2774 args->nfs_server.hostname = c;
f0768ebd
CL
2775
2776 c = strndup_user(data->mnt_path.data, NFS4_MAXPATHLEN);
2777 if (IS_ERR(c))
2778 return PTR_ERR(c);
91ea40b9
TT
2779 args->nfs_server.export_path = c;
2780 dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", c);
f0768ebd
CL
2781
2782 c = strndup_user(data->client_addr.data, 16);
2783 if (IS_ERR(c))
2784 return PTR_ERR(c);
91ea40b9
TT
2785 args->client_address = c;
2786
2787 /*
2788 * Translate to nfs_parsed_mount_data, which nfs4_fill_super
2789 * can deal with.
2790 */
2791
2792 args->flags = data->flags & NFS4_MOUNT_FLAGMASK;
2793 args->rsize = data->rsize;
2794 args->wsize = data->wsize;
2795 args->timeo = data->timeo;
2796 args->retrans = data->retrans;
2797 args->acregmin = data->acregmin;
2798 args->acregmax = data->acregmax;
2799 args->acdirmin = data->acdirmin;
2800 args->acdirmax = data->acdirmax;
2801 args->nfs_server.protocol = data->proto;
259875ef 2802 nfs_validate_transport_protocol(args);
6da1a034
TM
2803 if (args->nfs_server.protocol == XPRT_TRANSPORT_UDP)
2804 goto out_invalid_transport_udp;
f0768ebd
CL
2805
2806 break;
7630c852 2807 default:
b72e4f42 2808 return NFS_TEXT_DATA;
f0768ebd
CL
2809 }
2810
2811 return 0;
2812
2813out_no_data:
2814 dfprintk(MOUNT, "NFS4: mount program didn't pass any mount data\n");
2815 return -EINVAL;
2816
2817out_inval_auth:
2818 dfprintk(MOUNT, "NFS4: Invalid number of RPC auth flavours %d\n",
2819 data->auth_flavourlen);
2820 return -EINVAL;
2821
2822out_no_address:
2823 dfprintk(MOUNT, "NFS4: mount program didn't pass remote address\n");
2824 return -EINVAL;
6da1a034
TM
2825
2826out_invalid_transport_udp:
2827 dfprintk(MOUNT, "NFSv4: Unsupported transport protocol udp\n");
2828 return -EINVAL;
f0768ebd
CL
2829}
2830
fac1e8e4
BS
2831/*
2832 * NFS v4 module parameters need to stay in the
2833 * NFS client for backwards compatibility
2834 */
2835unsigned int nfs_callback_set_tcpport;
fac1e8e4
BS
2836/* Default cache timeout is 10 minutes */
2837unsigned int nfs_idmap_cache_timeout = 600;
2838/* Turn off NFSv4 uid/gid mapping when using AUTH_SYS */
2839bool nfs4_disable_idmapping = true;
2840unsigned short max_session_slots = NFS4_DEF_SLOT_TABLE_SIZE;
2841unsigned short send_implementation_id = 1;
6f2ea7f2 2842char nfs4_client_id_uniquifier[NFS4_CLIENT_ID_UNIQ_LEN] = "";
f6de7a39 2843bool recover_lost_locks = false;
fac1e8e4 2844
89d77c8f 2845EXPORT_SYMBOL_GPL(nfs_callback_set_tcpport);
89d77c8f
BS
2846EXPORT_SYMBOL_GPL(nfs_idmap_cache_timeout);
2847EXPORT_SYMBOL_GPL(nfs4_disable_idmapping);
2848EXPORT_SYMBOL_GPL(max_session_slots);
2849EXPORT_SYMBOL_GPL(send_implementation_id);
6f2ea7f2 2850EXPORT_SYMBOL_GPL(nfs4_client_id_uniquifier);
f6de7a39 2851EXPORT_SYMBOL_GPL(recover_lost_locks);
89d77c8f 2852
fac1e8e4
BS
2853#define NFS_CALLBACK_MAXPORTNR (65535U)
2854
2855static int param_set_portnr(const char *val, const struct kernel_param *kp)
2856{
2857 unsigned long num;
2858 int ret;
2859
2860 if (!val)
2861 return -EINVAL;
7297cb68 2862 ret = kstrtoul(val, 0, &num);
fac1e8e4
BS
2863 if (ret == -EINVAL || num > NFS_CALLBACK_MAXPORTNR)
2864 return -EINVAL;
2865 *((unsigned int *)kp->arg) = num;
2866 return 0;
2867}
9c27847d 2868static const struct kernel_param_ops param_ops_portnr = {
fac1e8e4
BS
2869 .set = param_set_portnr,
2870 .get = param_get_uint,
2871};
2872#define param_check_portnr(name, p) __param_check(name, p, unsigned int);
2873
2874module_param_named(callback_tcpport, nfs_callback_set_tcpport, portnr, 0644);
2875module_param(nfs_idmap_cache_timeout, int, 0644);
2876module_param(nfs4_disable_idmapping, bool, 0644);
6f2ea7f2
CL
2877module_param_string(nfs4_unique_id, nfs4_client_id_uniquifier,
2878 NFS4_CLIENT_ID_UNIQ_LEN, 0600);
fac1e8e4
BS
2879MODULE_PARM_DESC(nfs4_disable_idmapping,
2880 "Turn off NFSv4 idmapping when using 'sec=sys'");
2881module_param(max_session_slots, ushort, 0644);
2882MODULE_PARM_DESC(max_session_slots, "Maximum number of outstanding NFSv4.1 "
2883 "requests the client will negotiate");
2884module_param(send_implementation_id, ushort, 0644);
2885MODULE_PARM_DESC(send_implementation_id,
2886 "Send implementation ID with NFSv4.1 exchange_id");
6f2ea7f2 2887MODULE_PARM_DESC(nfs4_unique_id, "nfs_client_id4 uniquifier string");
425e776d 2888
f6de7a39
TM
2889module_param(recover_lost_locks, bool, 0644);
2890MODULE_PARM_DESC(recover_lost_locks,
2891 "If the server reports that a lock might be lost, "
2892 "try to recover it risking data corruption.");
2893
2894
54ceac45 2895#endif /* CONFIG_NFS_V4 */
This page took 0.97234 seconds and 5 git commands to generate.