]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - fs/nfs/super.c
NFSv4: Allow security autonegotiation for submounts
[mirror_ubuntu-bionic-kernel.git] / fs / nfs / super.c
CommitLineData
f7b422b1
DH
1/*
2 * linux/fs/nfs/super.c
3 *
4 * Copyright (C) 1992 Rick Sladkey
5 *
6 * nfs superblock handling functions
7 *
526719ba 8 * Modularised by Alan Cox <alan@lxorguk.ukuu.org.uk>, while hacking some
f7b422b1
DH
9 * experimental NFS changes. Modularisation taken straight from SYS5 fs.
10 *
11 * Change to nfs_read_super() to permit NFS mounts to multi-homed hosts.
12 * J.S.Peatfield@damtp.cam.ac.uk
13 *
14 * Split from inode.c by David Howells <dhowells@redhat.com>
15 *
54ceac45
DH
16 * - superblocks are indexed on server only - all inodes, dentries, etc. associated with a
17 * particular server are held in the same superblock
18 * - NFS superblocks can have several effective roots to the dentry tree
19 * - directory type roots are spliced into the tree when a path from one root reaches the root
20 * of another (see nfs_lookup())
f7b422b1
DH
21 */
22
f7b422b1
DH
23#include <linux/module.h>
24#include <linux/init.h>
25
26#include <linux/time.h>
27#include <linux/kernel.h>
28#include <linux/mm.h>
29#include <linux/string.h>
30#include <linux/stat.h>
31#include <linux/errno.h>
32#include <linux/unistd.h>
33#include <linux/sunrpc/clnt.h>
5976687a 34#include <linux/sunrpc/addr.h>
f7b422b1
DH
35#include <linux/sunrpc/stats.h>
36#include <linux/sunrpc/metrics.h>
0896a725 37#include <linux/sunrpc/xprtsock.h>
2cf7ff7a 38#include <linux/sunrpc/xprtrdma.h>
f7b422b1
DH
39#include <linux/nfs_fs.h>
40#include <linux/nfs_mount.h>
41#include <linux/nfs4_mount.h>
42#include <linux/lockd/bind.h>
f7b422b1
DH
43#include <linux/seq_file.h>
44#include <linux/mount.h>
c02d7adf 45#include <linux/namei.h>
f7b422b1
DH
46#include <linux/nfs_idmap.h>
47#include <linux/vfs.h>
48#include <linux/inet.h>
fd00a8ff 49#include <linux/in6.h>
5a0e3ad6 50#include <linux/slab.h>
fd00a8ff 51#include <net/ipv6.h>
d8e7748a 52#include <linux/netdevice.h>
f7b422b1 53#include <linux/nfs_xdr.h>
b5d5dfbd 54#include <linux/magic.h>
bf0fd768 55#include <linux/parser.h>
e50a7a1a 56#include <linux/nsproxy.h>
2446ab60 57#include <linux/rcupdate.h>
f7b422b1 58
f7b422b1
DH
59#include <asm/uaccess.h>
60
61#include "nfs4_fs.h"
62#include "callback.h"
63#include "delegation.h"
64#include "iostat.h"
65#include "internal.h"
08734048 66#include "fscache.h"
76e697ba 67#include "nfs4session.h"
ae50c0b5 68#include "pnfs.h"
ab7017a3 69#include "nfs.h"
f7b422b1
DH
70
71#define NFSDBG_FACILITY NFSDBG_VFS
b72e4f42 72#define NFS_TEXT_DATA 1
f7b422b1 73
1c606fb7 74#if IS_ENABLED(CONFIG_NFS_V3)
1e657bd5
PZ
75#define NFS_DEFAULT_VERSION 3
76#else
77#define NFS_DEFAULT_VERSION 2
78#endif
79
bf0fd768
CL
80enum {
81 /* Mount options that take no arguments */
82 Opt_soft, Opt_hard,
bf0fd768
CL
83 Opt_posix, Opt_noposix,
84 Opt_cto, Opt_nocto,
85 Opt_ac, Opt_noac,
86 Opt_lock, Opt_nolock,
2cf7ff7a 87 Opt_udp, Opt_tcp, Opt_rdma,
bf0fd768
CL
88 Opt_acl, Opt_noacl,
89 Opt_rdirplus, Opt_nordirplus,
75180df2 90 Opt_sharecache, Opt_nosharecache,
d740351b 91 Opt_resvport, Opt_noresvport,
b797cac7 92 Opt_fscache, Opt_nofscache,
89652617 93 Opt_migration, Opt_nomigration,
bf0fd768
CL
94
95 /* Mount options that take integer arguments */
96 Opt_port,
97 Opt_rsize, Opt_wsize, Opt_bsize,
98 Opt_timeo, Opt_retrans,
99 Opt_acregmin, Opt_acregmax,
100 Opt_acdirmin, Opt_acdirmax,
101 Opt_actimeo,
102 Opt_namelen,
103 Opt_mountport,
e887cbcf 104 Opt_mountvers,
3fd5be9e 105 Opt_minorversion,
bf0fd768
CL
106
107 /* Mount options that take string arguments */
0d71b058 108 Opt_nfsvers,
33832034 109 Opt_sec, Opt_proto, Opt_mountproto, Opt_mounthost,
0ac83779 110 Opt_addr, Opt_mountaddr, Opt_clientaddr,
7973c1f1 111 Opt_lookupcache,
b797cac7 112 Opt_fscache_uniq,
5eebde23 113 Opt_local_lock,
bf0fd768 114
f45663ce
CL
115 /* Special mount options */
116 Opt_userspace, Opt_deprecated, Opt_sloppy,
bf0fd768
CL
117
118 Opt_err
119};
120
a447c093 121static const match_table_t nfs_mount_option_tokens = {
bf0fd768
CL
122 { Opt_userspace, "bg" },
123 { Opt_userspace, "fg" },
ecbb3845
CL
124 { Opt_userspace, "retry=%s" },
125
f45663ce
CL
126 { Opt_sloppy, "sloppy" },
127
bf0fd768
CL
128 { Opt_soft, "soft" },
129 { Opt_hard, "hard" },
d33e4dfe
CL
130 { Opt_deprecated, "intr" },
131 { Opt_deprecated, "nointr" },
bf0fd768
CL
132 { Opt_posix, "posix" },
133 { Opt_noposix, "noposix" },
134 { Opt_cto, "cto" },
135 { Opt_nocto, "nocto" },
136 { Opt_ac, "ac" },
137 { Opt_noac, "noac" },
138 { Opt_lock, "lock" },
139 { Opt_nolock, "nolock" },
bf0fd768
CL
140 { Opt_udp, "udp" },
141 { Opt_tcp, "tcp" },
2cf7ff7a 142 { Opt_rdma, "rdma" },
bf0fd768
CL
143 { Opt_acl, "acl" },
144 { Opt_noacl, "noacl" },
145 { Opt_rdirplus, "rdirplus" },
146 { Opt_nordirplus, "nordirplus" },
75180df2
TM
147 { Opt_sharecache, "sharecache" },
148 { Opt_nosharecache, "nosharecache" },
d740351b
CL
149 { Opt_resvport, "resvport" },
150 { Opt_noresvport, "noresvport" },
b797cac7 151 { Opt_fscache, "fsc" },
b797cac7 152 { Opt_nofscache, "nofsc" },
89652617
CL
153 { Opt_migration, "migration" },
154 { Opt_nomigration, "nomigration" },
bf0fd768 155
a5a16bae
CL
156 { Opt_port, "port=%s" },
157 { Opt_rsize, "rsize=%s" },
158 { Opt_wsize, "wsize=%s" },
159 { Opt_bsize, "bsize=%s" },
160 { Opt_timeo, "timeo=%s" },
161 { Opt_retrans, "retrans=%s" },
162 { Opt_acregmin, "acregmin=%s" },
163 { Opt_acregmax, "acregmax=%s" },
164 { Opt_acdirmin, "acdirmin=%s" },
165 { Opt_acdirmax, "acdirmax=%s" },
166 { Opt_actimeo, "actimeo=%s" },
167 { Opt_namelen, "namlen=%s" },
168 { Opt_mountport, "mountport=%s" },
169 { Opt_mountvers, "mountvers=%s" },
0d71b058
TM
170 { Opt_minorversion, "minorversion=%s" },
171
a5a16bae
CL
172 { Opt_nfsvers, "nfsvers=%s" },
173 { Opt_nfsvers, "vers=%s" },
bf0fd768
CL
174
175 { Opt_sec, "sec=%s" },
176 { Opt_proto, "proto=%s" },
177 { Opt_mountproto, "mountproto=%s" },
178 { Opt_addr, "addr=%s" },
179 { Opt_clientaddr, "clientaddr=%s" },
33832034 180 { Opt_mounthost, "mounthost=%s" },
0ac83779 181 { Opt_mountaddr, "mountaddr=%s" },
bf0fd768 182
7973c1f1 183 { Opt_lookupcache, "lookupcache=%s" },
a6d5ff64 184 { Opt_fscache_uniq, "fsc=%s" },
5eebde23 185 { Opt_local_lock, "local_lock=%s" },
7973c1f1 186
3862279a
TM
187 /* The following needs to be listed after all other options */
188 { Opt_nfsvers, "v%s" },
189
bf0fd768
CL
190 { Opt_err, NULL }
191};
192
193enum {
ee671b01 194 Opt_xprt_udp, Opt_xprt_udp6, Opt_xprt_tcp, Opt_xprt_tcp6, Opt_xprt_rdma,
bf0fd768
CL
195
196 Opt_xprt_err
197};
198
a447c093 199static const match_table_t nfs_xprt_protocol_tokens = {
bf0fd768 200 { Opt_xprt_udp, "udp" },
ee671b01 201 { Opt_xprt_udp6, "udp6" },
bf0fd768 202 { Opt_xprt_tcp, "tcp" },
ee671b01 203 { Opt_xprt_tcp6, "tcp6" },
2cf7ff7a 204 { Opt_xprt_rdma, "rdma" },
bf0fd768
CL
205
206 { Opt_xprt_err, NULL }
207};
208
209enum {
210 Opt_sec_none, Opt_sec_sys,
211 Opt_sec_krb5, Opt_sec_krb5i, Opt_sec_krb5p,
212 Opt_sec_lkey, Opt_sec_lkeyi, Opt_sec_lkeyp,
213 Opt_sec_spkm, Opt_sec_spkmi, Opt_sec_spkmp,
214
215 Opt_sec_err
216};
217
a447c093 218static const match_table_t nfs_secflavor_tokens = {
bf0fd768
CL
219 { Opt_sec_none, "none" },
220 { Opt_sec_none, "null" },
221 { Opt_sec_sys, "sys" },
222
223 { Opt_sec_krb5, "krb5" },
224 { Opt_sec_krb5i, "krb5i" },
225 { Opt_sec_krb5p, "krb5p" },
226
227 { Opt_sec_lkey, "lkey" },
228 { Opt_sec_lkeyi, "lkeyi" },
229 { Opt_sec_lkeyp, "lkeyp" },
230
8d042218
OK
231 { Opt_sec_spkm, "spkm3" },
232 { Opt_sec_spkmi, "spkm3i" },
233 { Opt_sec_spkmp, "spkm3p" },
234
bf0fd768
CL
235 { Opt_sec_err, NULL }
236};
237
7973c1f1
TM
238enum {
239 Opt_lookupcache_all, Opt_lookupcache_positive,
240 Opt_lookupcache_none,
241
242 Opt_lookupcache_err
243};
244
245static match_table_t nfs_lookupcache_tokens = {
246 { Opt_lookupcache_all, "all" },
247 { Opt_lookupcache_positive, "pos" },
248 { Opt_lookupcache_positive, "positive" },
249 { Opt_lookupcache_none, "none" },
250
251 { Opt_lookupcache_err, NULL }
252};
253
5eebde23
SJ
254enum {
255 Opt_local_lock_all, Opt_local_lock_flock, Opt_local_lock_posix,
256 Opt_local_lock_none,
257
258 Opt_local_lock_err
259};
260
261static match_table_t nfs_local_lock_tokens = {
262 { Opt_local_lock_all, "all" },
263 { Opt_local_lock_flock, "flock" },
264 { Opt_local_lock_posix, "posix" },
265 { Opt_local_lock_none, "none" },
266
267 { Opt_local_lock_err, NULL }
268};
269
0d71b058
TM
270enum {
271 Opt_vers_2, Opt_vers_3, Opt_vers_4, Opt_vers_4_0,
42c2c424 272 Opt_vers_4_1, Opt_vers_4_2,
0d71b058
TM
273
274 Opt_vers_err
275};
276
277static match_table_t nfs_vers_tokens = {
278 { Opt_vers_2, "2" },
279 { Opt_vers_3, "3" },
280 { Opt_vers_4, "4" },
281 { Opt_vers_4_0, "4.0" },
282 { Opt_vers_4_1, "4.1" },
42c2c424 283 { Opt_vers_4_2, "4.2" },
0d71b058
TM
284
285 { Opt_vers_err, NULL }
286};
bf0fd768 287
31f43471
AV
288static struct dentry *nfs_xdev_mount(struct file_system_type *fs_type,
289 int flags, const char *dev_name, void *raw_data);
f7b422b1 290
ab7017a3 291struct file_system_type nfs_fs_type = {
f7b422b1
DH
292 .owner = THIS_MODULE,
293 .name = "nfs",
01194981 294 .mount = nfs_fs_mount,
f7b422b1 295 .kill_sb = nfs_kill_super,
ecf3d1f1 296 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
f7b422b1 297};
7f78e035 298MODULE_ALIAS_FS("nfs");
ddda8e0a 299EXPORT_SYMBOL_GPL(nfs_fs_type);
f7b422b1 300
54ceac45 301struct file_system_type nfs_xdev_fs_type = {
f7b422b1
DH
302 .owner = THIS_MODULE,
303 .name = "nfs",
31f43471 304 .mount = nfs_xdev_mount,
f7b422b1 305 .kill_sb = nfs_kill_super,
ecf3d1f1 306 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
f7b422b1
DH
307};
308
6a74490d 309const struct super_operations nfs_sops = {
f7b422b1
DH
310 .alloc_inode = nfs_alloc_inode,
311 .destroy_inode = nfs_destroy_inode,
312 .write_inode = nfs_write_inode,
eed99357 313 .drop_inode = nfs_drop_inode,
387c149b 314 .put_super = nfs_put_super,
f7b422b1 315 .statfs = nfs_statfs,
b57922d9 316 .evict_inode = nfs_evict_inode,
f7b422b1
DH
317 .umount_begin = nfs_umount_begin,
318 .show_options = nfs_show_options,
c7f404b4
AV
319 .show_devname = nfs_show_devname,
320 .show_path = nfs_show_path,
f7b422b1 321 .show_stats = nfs_show_stats,
48b605f8 322 .remount_fs = nfs_remount,
f7b422b1 323};
ddda8e0a 324EXPORT_SYMBOL_GPL(nfs_sops);
f7b422b1 325
89d77c8f 326#if IS_ENABLED(CONFIG_NFS_V4)
b72e4f42 327static void nfs4_validate_mount_flags(struct nfs_parsed_mount_data *);
d72c727c
BS
328static int nfs4_validate_mount_data(void *options,
329 struct nfs_parsed_mount_data *args, const char *dev_name);
1ae811ee 330
331struct file_system_type nfs4_fs_type = {
332 .owner = THIS_MODULE,
333 .name = "nfs4",
334 .mount = nfs_fs_mount,
335 .kill_sb = nfs_kill_super,
ecf3d1f1 336 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
1ae811ee 337};
7f78e035 338MODULE_ALIAS_FS("nfs4");
fa7614dd 339MODULE_ALIAS("nfs4");
1ae811ee 340EXPORT_SYMBOL_GPL(nfs4_fs_type);
341
342static int __init register_nfs4_fs(void)
343{
344 return register_filesystem(&nfs4_fs_type);
345}
346
347static void unregister_nfs4_fs(void)
348{
349 unregister_filesystem(&nfs4_fs_type);
350}
351#else
352static int __init register_nfs4_fs(void)
353{
354 return 0;
355}
356
357static void unregister_nfs4_fs(void)
358{
359}
f7b422b1
DH
360#endif
361
8e1f936b
RR
362static struct shrinker acl_shrinker = {
363 .shrink = nfs_access_cache_shrinker,
364 .seeks = DEFAULT_SEEKS,
365};
979df72e 366
f7b422b1
DH
367/*
368 * Register the NFS filesystems
369 */
370int __init register_nfs_fs(void)
371{
372 int ret;
373
374 ret = register_filesystem(&nfs_fs_type);
375 if (ret < 0)
376 goto error_0;
377
1ae811ee 378 ret = register_nfs4_fs();
f7b422b1
DH
379 if (ret < 0)
380 goto error_1;
1ae811ee 381
382 ret = nfs_register_sysctl();
383 if (ret < 0)
384 goto error_2;
8e1f936b 385 register_shrinker(&acl_shrinker);
f7b422b1
DH
386 return 0;
387
1ae811ee 388error_2:
389 unregister_nfs4_fs();
f7b422b1
DH
390error_1:
391 unregister_filesystem(&nfs_fs_type);
f7b422b1
DH
392error_0:
393 return ret;
394}
395
396/*
397 * Unregister the NFS filesystems
398 */
399void __exit unregister_nfs_fs(void)
400{
8e1f936b 401 unregister_shrinker(&acl_shrinker);
49af7ee1 402 nfs_unregister_sysctl();
1ae811ee 403 unregister_nfs4_fs();
f7b422b1
DH
404 unregister_filesystem(&nfs_fs_type);
405}
406
1daef0a8 407void nfs_sb_active(struct super_block *sb)
ef818a28 408{
1daef0a8 409 struct nfs_server *server = NFS_SB(sb);
ef818a28 410
1daef0a8
TM
411 if (atomic_inc_return(&server->active) == 1)
412 atomic_inc(&sb->s_active);
ef818a28 413}
89d77c8f 414EXPORT_SYMBOL_GPL(nfs_sb_active);
ef818a28 415
1daef0a8 416void nfs_sb_deactive(struct super_block *sb)
ef818a28
SD
417{
418 struct nfs_server *server = NFS_SB(sb);
1daef0a8
TM
419
420 if (atomic_dec_and_test(&server->active))
421 deactivate_super(sb);
ef818a28 422}
89d77c8f 423EXPORT_SYMBOL_GPL(nfs_sb_deactive);
ef818a28 424
f7b422b1
DH
425/*
426 * Deliver file system statistics to userspace
427 */
fbdefd64 428int nfs_statfs(struct dentry *dentry, struct kstatfs *buf)
f7b422b1 429{
0c7d90cf 430 struct nfs_server *server = NFS_SB(dentry->d_sb);
f7b422b1
DH
431 unsigned char blockbits;
432 unsigned long blockres;
0c7d90cf 433 struct nfs_fh *fh = NFS_FH(dentry->d_inode);
ca7e9a0d
TM
434 struct nfs_fsstat res;
435 int error = -ENOMEM;
436
437 res.fattr = nfs_alloc_fattr();
438 if (res.fattr == NULL)
439 goto out_err;
f7b422b1 440
8fa5c000 441 error = server->nfs_client->rpc_ops->statfs(server, fh, &res);
fbf3fdd2
MZ
442 if (unlikely(error == -ESTALE)) {
443 struct dentry *pd_dentry;
444
445 pd_dentry = dget_parent(dentry);
446 if (pd_dentry != NULL) {
447 nfs_zap_caches(pd_dentry->d_inode);
448 dput(pd_dentry);
449 }
450 }
ca7e9a0d 451 nfs_free_fattr(res.fattr);
f7b422b1
DH
452 if (error < 0)
453 goto out_err;
ca7e9a0d 454
1a0ba9ae 455 buf->f_type = NFS_SUPER_MAGIC;
f7b422b1
DH
456
457 /*
458 * Current versions of glibc do not correctly handle the
459 * case where f_frsize != f_bsize. Eventually we want to
460 * report the value of wtmult in this field.
461 */
0c7d90cf 462 buf->f_frsize = dentry->d_sb->s_blocksize;
f7b422b1
DH
463
464 /*
465 * On most *nix systems, f_blocks, f_bfree, and f_bavail
466 * are reported in units of f_frsize. Linux hasn't had
467 * an f_frsize field in its statfs struct until recently,
468 * thus historically Linux's sys_statfs reports these
469 * fields in units of f_bsize.
470 */
0c7d90cf
DH
471 buf->f_bsize = dentry->d_sb->s_blocksize;
472 blockbits = dentry->d_sb->s_blocksize_bits;
f7b422b1
DH
473 blockres = (1 << blockbits) - 1;
474 buf->f_blocks = (res.tbytes + blockres) >> blockbits;
475 buf->f_bfree = (res.fbytes + blockres) >> blockbits;
476 buf->f_bavail = (res.abytes + blockres) >> blockbits;
477
478 buf->f_files = res.tfiles;
479 buf->f_ffree = res.afiles;
480
481 buf->f_namelen = server->namelen;
1a0ba9ae 482
f7b422b1
DH
483 return 0;
484
485 out_err:
3110ff80 486 dprintk("%s: statfs error = %d\n", __func__, -error);
1a0ba9ae 487 return error;
f7b422b1 488}
89d77c8f 489EXPORT_SYMBOL_GPL(nfs_statfs);
f7b422b1 490
7d4e2747
DH
491/*
492 * Map the security flavour number to a name
493 */
81039f1f
TM
494static const char *nfs_pseudoflavour_to_name(rpc_authflavor_t flavour)
495{
7d4e2747 496 static const struct {
81039f1f
TM
497 rpc_authflavor_t flavour;
498 const char *str;
499 } sec_flavours[] = {
500 { RPC_AUTH_NULL, "null" },
501 { RPC_AUTH_UNIX, "sys" },
502 { RPC_AUTH_GSS_KRB5, "krb5" },
503 { RPC_AUTH_GSS_KRB5I, "krb5i" },
504 { RPC_AUTH_GSS_KRB5P, "krb5p" },
505 { RPC_AUTH_GSS_LKEY, "lkey" },
506 { RPC_AUTH_GSS_LKEYI, "lkeyi" },
507 { RPC_AUTH_GSS_LKEYP, "lkeyp" },
508 { RPC_AUTH_GSS_SPKM, "spkm" },
509 { RPC_AUTH_GSS_SPKMI, "spkmi" },
510 { RPC_AUTH_GSS_SPKMP, "spkmp" },
4d81cd16 511 { UINT_MAX, "unknown" }
81039f1f
TM
512 };
513 int i;
514
4d81cd16 515 for (i = 0; sec_flavours[i].flavour != UINT_MAX; i++) {
81039f1f
TM
516 if (sec_flavours[i].flavour == flavour)
517 break;
518 }
519 return sec_flavours[i].str;
520}
521
ee671b01
JL
522static void nfs_show_mountd_netid(struct seq_file *m, struct nfs_server *nfss,
523 int showdefaults)
524{
525 struct sockaddr *sap = (struct sockaddr *) &nfss->mountd_address;
526
527 seq_printf(m, ",mountproto=");
528 switch (sap->sa_family) {
529 case AF_INET:
530 switch (nfss->mountd_protocol) {
531 case IPPROTO_UDP:
532 seq_printf(m, RPCBIND_NETID_UDP);
533 break;
534 case IPPROTO_TCP:
535 seq_printf(m, RPCBIND_NETID_TCP);
536 break;
537 default:
538 if (showdefaults)
539 seq_printf(m, "auto");
540 }
541 break;
542 case AF_INET6:
543 switch (nfss->mountd_protocol) {
544 case IPPROTO_UDP:
545 seq_printf(m, RPCBIND_NETID_UDP6);
546 break;
547 case IPPROTO_TCP:
548 seq_printf(m, RPCBIND_NETID_TCP6);
549 break;
550 default:
551 if (showdefaults)
552 seq_printf(m, "auto");
553 }
554 break;
555 default:
556 if (showdefaults)
557 seq_printf(m, "auto");
558 }
559}
560
82d101d5
CL
561static void nfs_show_mountd_options(struct seq_file *m, struct nfs_server *nfss,
562 int showdefaults)
563{
564 struct sockaddr *sap = (struct sockaddr *)&nfss->mountd_address;
565
d5eff1a3
BS
566 if (nfss->flags & NFS_MOUNT_LEGACY_INTERFACE)
567 return;
568
82d101d5
CL
569 switch (sap->sa_family) {
570 case AF_INET: {
571 struct sockaddr_in *sin = (struct sockaddr_in *)sap;
be859405 572 seq_printf(m, ",mountaddr=%pI4", &sin->sin_addr.s_addr);
82d101d5
CL
573 break;
574 }
575 case AF_INET6: {
576 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap;
d250e190 577 seq_printf(m, ",mountaddr=%pI6c", &sin6->sin6_addr);
82d101d5
CL
578 break;
579 }
580 default:
581 if (showdefaults)
582 seq_printf(m, ",mountaddr=unspecified");
583 }
584
585 if (nfss->mountd_version || showdefaults)
586 seq_printf(m, ",mountvers=%u", nfss->mountd_version);
aa699473
SK
587 if ((nfss->mountd_port &&
588 nfss->mountd_port != (unsigned short)NFS_UNSPEC_PORT) ||
589 showdefaults)
82d101d5
CL
590 seq_printf(m, ",mountport=%u", nfss->mountd_port);
591
ee671b01 592 nfs_show_mountd_netid(m, nfss, showdefaults);
82d101d5
CL
593}
594
89d77c8f 595#if IS_ENABLED(CONFIG_NFS_V4)
0be8189f
TM
596static void nfs_show_nfsv4_options(struct seq_file *m, struct nfs_server *nfss,
597 int showdefaults)
598{
599 struct nfs_client *clp = nfss->nfs_client;
600
601 seq_printf(m, ",clientaddr=%s", clp->cl_ipaddr);
0be8189f
TM
602}
603#else
604static void nfs_show_nfsv4_options(struct seq_file *m, struct nfs_server *nfss,
605 int showdefaults)
606{
607}
608#endif
609
7bbceb6f
TM
610static void nfs_show_nfs_version(struct seq_file *m,
611 unsigned int version,
612 unsigned int minorversion)
613{
614 seq_printf(m, ",vers=%u", version);
615 if (version == 4)
616 seq_printf(m, ".%u", minorversion);
617}
618
f7b422b1
DH
619/*
620 * Describe the mount options in force on this server representation
621 */
82d101d5
CL
622static void nfs_show_mount_options(struct seq_file *m, struct nfs_server *nfss,
623 int showdefaults)
f7b422b1 624{
509de811 625 static const struct proc_nfs_info {
f7b422b1 626 int flag;
509de811
DH
627 const char *str;
628 const char *nostr;
f7b422b1
DH
629 } nfs_info[] = {
630 { NFS_MOUNT_SOFT, ",soft", ",hard" },
82d101d5 631 { NFS_MOUNT_POSIX, ",posix", "" },
f7b422b1
DH
632 { NFS_MOUNT_NOCTO, ",nocto", "" },
633 { NFS_MOUNT_NOAC, ",noac", "" },
634 { NFS_MOUNT_NONLM, ",nolock", "" },
635 { NFS_MOUNT_NOACL, ",noacl", "" },
74dd34e6 636 { NFS_MOUNT_NORDIRPLUS, ",nordirplus", "" },
d740351b
CL
637 { NFS_MOUNT_UNSHARED, ",nosharecache", "" },
638 { NFS_MOUNT_NORESVPORT, ",noresvport", "" },
f7b422b1
DH
639 { 0, NULL, NULL }
640 };
509de811 641 const struct proc_nfs_info *nfs_infop;
8fa5c000 642 struct nfs_client *clp = nfss->nfs_client;
82d101d5 643 u32 version = clp->rpc_ops->version;
7c563cc9 644 int local_flock, local_fcntl;
f7b422b1 645
7bbceb6f 646 nfs_show_nfs_version(m, version, clp->cl_minorversion);
2d767432
CL
647 seq_printf(m, ",rsize=%u", nfss->rsize);
648 seq_printf(m, ",wsize=%u", nfss->wsize);
82d101d5
CL
649 if (nfss->bsize != 0)
650 seq_printf(m, ",bsize=%u", nfss->bsize);
651 seq_printf(m, ",namlen=%u", nfss->namelen);
0e0cab74 652 if (nfss->acregmin != NFS_DEF_ACREGMIN*HZ || showdefaults)
2d767432 653 seq_printf(m, ",acregmin=%u", nfss->acregmin/HZ);
0e0cab74 654 if (nfss->acregmax != NFS_DEF_ACREGMAX*HZ || showdefaults)
2d767432 655 seq_printf(m, ",acregmax=%u", nfss->acregmax/HZ);
0e0cab74 656 if (nfss->acdirmin != NFS_DEF_ACDIRMIN*HZ || showdefaults)
2d767432 657 seq_printf(m, ",acdirmin=%u", nfss->acdirmin/HZ);
0e0cab74 658 if (nfss->acdirmax != NFS_DEF_ACDIRMAX*HZ || showdefaults)
2d767432 659 seq_printf(m, ",acdirmax=%u", nfss->acdirmax/HZ);
f7b422b1
DH
660 for (nfs_infop = nfs_info; nfs_infop->flag; nfs_infop++) {
661 if (nfss->flags & nfs_infop->flag)
662 seq_puts(m, nfs_infop->str);
663 else
664 seq_puts(m, nfs_infop->nostr);
665 }
2446ab60 666 rcu_read_lock();
56928edd 667 seq_printf(m, ",proto=%s",
ee671b01 668 rpc_peeraddr2str(nfss->client, RPC_DISPLAY_NETID));
2446ab60 669 rcu_read_unlock();
82d101d5
CL
670 if (version == 4) {
671 if (nfss->port != NFS_PORT)
672 seq_printf(m, ",port=%u", nfss->port);
673 } else
674 if (nfss->port)
675 seq_printf(m, ",port=%u", nfss->port);
676
33170233
TM
677 seq_printf(m, ",timeo=%lu", 10U * nfss->client->cl_timeout->to_initval / HZ);
678 seq_printf(m, ",retrans=%u", nfss->client->cl_timeout->to_retries);
81039f1f 679 seq_printf(m, ",sec=%s", nfs_pseudoflavour_to_name(nfss->client->cl_auth->au_flavor));
82d101d5
CL
680
681 if (version != 4)
682 nfs_show_mountd_options(m, nfss, showdefaults);
0be8189f
TM
683 else
684 nfs_show_nfsv4_options(m, nfss, showdefaults);
82d101d5 685
b797cac7
DH
686 if (nfss->options & NFS_OPTION_FSCACHE)
687 seq_printf(m, ",fsc");
9b00c643 688
89652617
CL
689 if (nfss->options & NFS_OPTION_MIGRATION)
690 seq_printf(m, ",migration");
691
9b00c643
PL
692 if (nfss->flags & NFS_MOUNT_LOOKUP_CACHE_NONEG) {
693 if (nfss->flags & NFS_MOUNT_LOOKUP_CACHE_NONE)
694 seq_printf(m, ",lookupcache=none");
695 else
696 seq_printf(m, ",lookupcache=pos");
697 }
7c563cc9
SJ
698
699 local_flock = nfss->flags & NFS_MOUNT_LOCAL_FLOCK;
700 local_fcntl = nfss->flags & NFS_MOUNT_LOCAL_FCNTL;
701
702 if (!local_flock && !local_fcntl)
703 seq_printf(m, ",local_lock=none");
704 else if (local_flock && local_fcntl)
705 seq_printf(m, ",local_lock=all");
706 else if (local_flock)
707 seq_printf(m, ",local_lock=flock");
708 else
709 seq_printf(m, ",local_lock=posix");
f7b422b1
DH
710}
711
712/*
713 * Describe the mount options on this VFS mountpoint
714 */
fbdefd64 715int nfs_show_options(struct seq_file *m, struct dentry *root)
f7b422b1 716{
34c80b1d 717 struct nfs_server *nfss = NFS_SB(root->d_sb);
f7b422b1
DH
718
719 nfs_show_mount_options(m, nfss, 0);
720
2446ab60 721 rcu_read_lock();
5d8515ca
CL
722 seq_printf(m, ",addr=%s",
723 rpc_peeraddr2str(nfss->nfs_client->cl_rpcclient,
724 RPC_DISPLAY_ADDR));
2446ab60 725 rcu_read_unlock();
f7b422b1
DH
726
727 return 0;
728}
89d77c8f 729EXPORT_SYMBOL_GPL(nfs_show_options);
45402c38 730
89d77c8f 731#if IS_ENABLED(CONFIG_NFS_V4)
ae50c0b5 732#ifdef CONFIG_NFS_V4_1
45402c38 733static void show_sessions(struct seq_file *m, struct nfs_server *server)
ae50c0b5
BF
734{
735 if (nfs4_has_session(server->nfs_client))
736 seq_printf(m, ",sessions");
737}
738#else
45402c38
HS
739static void show_sessions(struct seq_file *m, struct nfs_server *server) {}
740#endif
ae50c0b5
BF
741#endif
742
743#ifdef CONFIG_NFS_V4_1
45402c38 744static void show_pnfs(struct seq_file *m, struct nfs_server *server)
ae50c0b5
BF
745{
746 seq_printf(m, ",pnfs=");
747 if (server->pnfs_curr_ld)
748 seq_printf(m, "%s", server->pnfs_curr_ld->name);
749 else
750 seq_printf(m, "not configured");
751}
7e03b7cc
TM
752
753static void show_implementation_id(struct seq_file *m, struct nfs_server *nfss)
754{
59155546
CL
755 if (nfss->nfs_client && nfss->nfs_client->cl_implid) {
756 struct nfs41_impl_id *impl_id = nfss->nfs_client->cl_implid;
7e03b7cc
TM
757 seq_printf(m, "\n\timpl_id:\tname='%s',domain='%s',"
758 "date='%llu,%u'",
759 impl_id->name, impl_id->domain,
760 impl_id->date.seconds, impl_id->date.nseconds);
761 }
762}
45402c38 763#else
89d77c8f 764#if IS_ENABLED(CONFIG_NFS_V4)
7e03b7cc
TM
765static void show_pnfs(struct seq_file *m, struct nfs_server *server)
766{
767}
45402c38 768#endif
7e03b7cc
TM
769static void show_implementation_id(struct seq_file *m, struct nfs_server *nfss)
770{
771}
45402c38 772#endif
f7b422b1 773
fbdefd64 774int nfs_show_devname(struct seq_file *m, struct dentry *root)
c7f404b4
AV
775{
776 char *page = (char *) __get_free_page(GFP_KERNEL);
777 char *devname, *dummy;
778 int err = 0;
779 if (!page)
780 return -ENOMEM;
97a54868 781 devname = nfs_path(&dummy, root, page, PAGE_SIZE, 0);
c7f404b4
AV
782 if (IS_ERR(devname))
783 err = PTR_ERR(devname);
784 else
785 seq_escape(m, devname, " \t\n\\");
786 free_page((unsigned long)page);
787 return err;
788}
89d77c8f 789EXPORT_SYMBOL_GPL(nfs_show_devname);
c7f404b4 790
fbdefd64 791int nfs_show_path(struct seq_file *m, struct dentry *dentry)
c7f404b4
AV
792{
793 seq_puts(m, "/");
794 return 0;
795}
89d77c8f 796EXPORT_SYMBOL_GPL(nfs_show_path);
c7f404b4 797
f7b422b1
DH
798/*
799 * Present statistical information for this VFS mountpoint
800 */
fbdefd64 801int nfs_show_stats(struct seq_file *m, struct dentry *root)
f7b422b1
DH
802{
803 int i, cpu;
64132379 804 struct nfs_server *nfss = NFS_SB(root->d_sb);
f7b422b1
DH
805 struct rpc_auth *auth = nfss->client->cl_auth;
806 struct nfs_iostats totals = { };
807
808 seq_printf(m, "statvers=%s", NFS_IOSTAT_VERS);
809
810 /*
811 * Display all mount option settings
812 */
813 seq_printf(m, "\n\topts:\t");
64132379
AV
814 seq_puts(m, root->d_sb->s_flags & MS_RDONLY ? "ro" : "rw");
815 seq_puts(m, root->d_sb->s_flags & MS_SYNCHRONOUS ? ",sync" : "");
816 seq_puts(m, root->d_sb->s_flags & MS_NOATIME ? ",noatime" : "");
817 seq_puts(m, root->d_sb->s_flags & MS_NODIRATIME ? ",nodiratime" : "");
f7b422b1
DH
818 nfs_show_mount_options(m, nfss, 1);
819
820 seq_printf(m, "\n\tage:\t%lu", (jiffies - nfss->mount_time) / HZ);
821
7e03b7cc 822 show_implementation_id(m, nfss);
7d2ed9ac 823
f7b422b1
DH
824 seq_printf(m, "\n\tcaps:\t");
825 seq_printf(m, "caps=0x%x", nfss->caps);
2d767432
CL
826 seq_printf(m, ",wtmult=%u", nfss->wtmult);
827 seq_printf(m, ",dtsize=%u", nfss->dtsize);
828 seq_printf(m, ",bsize=%u", nfss->bsize);
829 seq_printf(m, ",namlen=%u", nfss->namelen);
f7b422b1 830
89d77c8f 831#if IS_ENABLED(CONFIG_NFS_V4)
40c55319 832 if (nfss->nfs_client->rpc_ops->version == 4) {
f7b422b1
DH
833 seq_printf(m, "\n\tnfsv4:\t");
834 seq_printf(m, "bm0=0x%x", nfss->attr_bitmask[0]);
835 seq_printf(m, ",bm1=0x%x", nfss->attr_bitmask[1]);
a09df2ca 836 seq_printf(m, ",bm2=0x%x", nfss->attr_bitmask[2]);
f7b422b1 837 seq_printf(m, ",acl=0x%x", nfss->acl_bitmask);
ae50c0b5
BF
838 show_sessions(m, nfss);
839 show_pnfs(m, nfss);
f7b422b1
DH
840 }
841#endif
842
843 /*
844 * Display security flavor in effect for this mount
845 */
2d767432 846 seq_printf(m, "\n\tsec:\tflavor=%u", auth->au_ops->au_flavor);
f7b422b1 847 if (auth->au_flavor)
2d767432 848 seq_printf(m, ",pseudoflavor=%u", auth->au_flavor);
f7b422b1
DH
849
850 /*
851 * Display superblock I/O counters
852 */
853 for_each_possible_cpu(cpu) {
854 struct nfs_iostats *stats;
855
856 preempt_disable();
857 stats = per_cpu_ptr(nfss->io_stats, cpu);
858
859 for (i = 0; i < __NFSIOS_COUNTSMAX; i++)
860 totals.events[i] += stats->events[i];
861 for (i = 0; i < __NFSIOS_BYTESMAX; i++)
862 totals.bytes[i] += stats->bytes[i];
6a51091d
DH
863#ifdef CONFIG_NFS_FSCACHE
864 for (i = 0; i < __NFSIOS_FSCACHEMAX; i++)
865 totals.fscache[i] += stats->fscache[i];
866#endif
f7b422b1
DH
867
868 preempt_enable();
869 }
870
871 seq_printf(m, "\n\tevents:\t");
872 for (i = 0; i < __NFSIOS_COUNTSMAX; i++)
873 seq_printf(m, "%lu ", totals.events[i]);
874 seq_printf(m, "\n\tbytes:\t");
875 for (i = 0; i < __NFSIOS_BYTESMAX; i++)
876 seq_printf(m, "%Lu ", totals.bytes[i]);
6a51091d
DH
877#ifdef CONFIG_NFS_FSCACHE
878 if (nfss->options & NFS_OPTION_FSCACHE) {
879 seq_printf(m, "\n\tfsc:\t");
880 for (i = 0; i < __NFSIOS_FSCACHEMAX; i++)
881 seq_printf(m, "%Lu ", totals.bytes[i]);
882 }
883#endif
f7b422b1
DH
884 seq_printf(m, "\n");
885
886 rpc_print_iostats(m, nfss->client);
887
888 return 0;
889}
89d77c8f 890EXPORT_SYMBOL_GPL(nfs_show_stats);
f7b422b1
DH
891
892/*
893 * Begin unmount by attempting to remove all automounted mountpoints we added
54ceac45 894 * in response to xdev traversals and referrals
f7b422b1 895 */
fbdefd64 896void nfs_umount_begin(struct super_block *sb)
f7b422b1 897{
67e55205 898 struct nfs_server *server;
fc6ae3cf
TM
899 struct rpc_clnt *rpc;
900
67e55205 901 server = NFS_SB(sb);
fc6ae3cf
TM
902 /* -EIO all pending I/O */
903 rpc = server->client_acl;
904 if (!IS_ERR(rpc))
905 rpc_killall_tasks(rpc);
906 rpc = server->client;
907 if (!IS_ERR(rpc))
908 rpc_killall_tasks(rpc);
f7b422b1 909}
89d77c8f 910EXPORT_SYMBOL_GPL(nfs_umount_begin);
f7b422b1 911
db833351 912static struct nfs_parsed_mount_data *nfs_alloc_parsed_mount_data(void)
9423a08a
CL
913{
914 struct nfs_parsed_mount_data *data;
915
916 data = kzalloc(sizeof(*data), GFP_KERNEL);
917 if (data) {
9423a08a
CL
918 data->acregmin = NFS_DEF_ACREGMIN;
919 data->acregmax = NFS_DEF_ACREGMAX;
920 data->acdirmin = NFS_DEF_ACDIRMIN;
921 data->acdirmax = NFS_DEF_ACDIRMAX;
c5811dbd 922 data->mount_server.port = NFS_UNSPEC_PORT;
9423a08a 923 data->nfs_server.port = NFS_UNSPEC_PORT;
c5811dbd 924 data->nfs_server.protocol = XPRT_TRANSPORT_TCP;
4580a92d 925 data->auth_flavors[0] = RPC_AUTH_MAXFLAVOR;
74c98811 926 data->auth_flavor_len = 0;
9423a08a 927 data->minorversion = 0;
b72e4f42 928 data->need_mount = true;
9937347a 929 data->net = current->nsproxy->net_ns;
8a0d551a 930 security_init_mnt_opts(&data->lsm_opts);
9423a08a
CL
931 }
932 return data;
933}
934
8a0d551a
JL
935static void nfs_free_parsed_mount_data(struct nfs_parsed_mount_data *data)
936{
937 if (data) {
938 kfree(data->client_address);
939 kfree(data->mount_server.hostname);
940 kfree(data->nfs_server.export_path);
941 kfree(data->nfs_server.hostname);
942 kfree(data->fscache_uniq);
943 security_free_mnt_opts(&data->lsm_opts);
944 kfree(data);
945 }
946}
947
fc50d58f 948/*
cdcd7f9a
CL
949 * Sanity-check a server address provided by the mount command.
950 *
951 * Address family must be initialized, and address must not be
952 * the ANY address for that family.
fc50d58f
CL
953 */
954static int nfs_verify_server_address(struct sockaddr *addr)
955{
956 switch (addr->sa_family) {
957 case AF_INET: {
cdcd7f9a 958 struct sockaddr_in *sa = (struct sockaddr_in *)addr;
e6f1cebf 959 return sa->sin_addr.s_addr != htonl(INADDR_ANY);
cdcd7f9a
CL
960 }
961 case AF_INET6: {
962 struct in6_addr *sa = &((struct sockaddr_in6 *)addr)->sin6_addr;
963 return !ipv6_addr_any(sa);
fc50d58f
CL
964 }
965 }
966
53a0b9c4 967 dfprintk(MOUNT, "NFS: Invalid IP address specified\n");
fc50d58f
CL
968 return 0;
969}
970
4cfd74fc
CL
971/*
972 * Select between a default port value and a user-specified port value.
973 * If a zero value is set, then autobind will be used.
974 */
f5855fec 975static void nfs_set_port(struct sockaddr *sap, int *port,
4cfd74fc
CL
976 const unsigned short default_port)
977{
f5855fec
TM
978 if (*port == NFS_UNSPEC_PORT)
979 *port = default_port;
4cfd74fc 980
f5855fec 981 rpc_set_port(sap, *port);
4cfd74fc
CL
982}
983
259875ef
TM
984/*
985 * Sanity check the NFS transport protocol.
986 *
987 */
988static void nfs_validate_transport_protocol(struct nfs_parsed_mount_data *mnt)
989{
990 switch (mnt->nfs_server.protocol) {
991 case XPRT_TRANSPORT_UDP:
992 case XPRT_TRANSPORT_TCP:
993 case XPRT_TRANSPORT_RDMA:
994 break;
995 default:
996 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
997 }
998}
999
1000/*
1001 * For text based NFSv2/v3 mounts, the mount protocol transport default
1002 * settings should depend upon the specified NFS transport.
1003 */
1004static void nfs_set_mount_transport_protocol(struct nfs_parsed_mount_data *mnt)
1005{
1006 nfs_validate_transport_protocol(mnt);
1007
1008 if (mnt->mount_server.protocol == XPRT_TRANSPORT_UDP ||
1009 mnt->mount_server.protocol == XPRT_TRANSPORT_TCP)
1010 return;
1011 switch (mnt->nfs_server.protocol) {
1012 case XPRT_TRANSPORT_UDP:
1013 mnt->mount_server.protocol = XPRT_TRANSPORT_UDP;
1014 break;
1015 case XPRT_TRANSPORT_TCP:
1016 case XPRT_TRANSPORT_RDMA:
1017 mnt->mount_server.protocol = XPRT_TRANSPORT_TCP;
1018 }
1019}
1020
74c98811
TM
1021static void nfs_set_auth_parsed_mount_data(struct nfs_parsed_mount_data *data,
1022 rpc_authflavor_t pseudoflavor)
1023{
1024 data->auth_flavors[0] = pseudoflavor;
1025 data->auth_flavor_len = 1;
1026}
1027
01060c89
CL
1028/*
1029 * Parse the value of the 'sec=' option.
01060c89
CL
1030 */
1031static int nfs_parse_security_flavors(char *value,
1032 struct nfs_parsed_mount_data *mnt)
1033{
1034 substring_t args[MAX_OPT_ARGS];
19e7b8d2 1035 rpc_authflavor_t pseudoflavor;
01060c89
CL
1036
1037 dfprintk(MOUNT, "NFS: parsing sec=%s option\n", value);
1038
1039 switch (match_token(value, nfs_secflavor_tokens, args)) {
1040 case Opt_sec_none:
19e7b8d2 1041 pseudoflavor = RPC_AUTH_NULL;
01060c89
CL
1042 break;
1043 case Opt_sec_sys:
19e7b8d2 1044 pseudoflavor = RPC_AUTH_UNIX;
01060c89
CL
1045 break;
1046 case Opt_sec_krb5:
19e7b8d2 1047 pseudoflavor = RPC_AUTH_GSS_KRB5;
01060c89
CL
1048 break;
1049 case Opt_sec_krb5i:
19e7b8d2 1050 pseudoflavor = RPC_AUTH_GSS_KRB5I;
01060c89
CL
1051 break;
1052 case Opt_sec_krb5p:
19e7b8d2 1053 pseudoflavor = RPC_AUTH_GSS_KRB5P;
01060c89
CL
1054 break;
1055 case Opt_sec_lkey:
19e7b8d2 1056 pseudoflavor = RPC_AUTH_GSS_LKEY;
01060c89
CL
1057 break;
1058 case Opt_sec_lkeyi:
19e7b8d2 1059 pseudoflavor = RPC_AUTH_GSS_LKEYI;
01060c89
CL
1060 break;
1061 case Opt_sec_lkeyp:
19e7b8d2 1062 pseudoflavor = RPC_AUTH_GSS_LKEYP;
01060c89
CL
1063 break;
1064 case Opt_sec_spkm:
19e7b8d2 1065 pseudoflavor = RPC_AUTH_GSS_SPKM;
01060c89
CL
1066 break;
1067 case Opt_sec_spkmi:
19e7b8d2 1068 pseudoflavor = RPC_AUTH_GSS_SPKMI;
01060c89
CL
1069 break;
1070 case Opt_sec_spkmp:
19e7b8d2 1071 pseudoflavor = RPC_AUTH_GSS_SPKMP;
01060c89
CL
1072 break;
1073 default:
1074 return 0;
1075 }
1076
9b7160c5 1077 mnt->flags |= NFS_MOUNT_SECFLAVOUR;
19e7b8d2 1078 nfs_set_auth_parsed_mount_data(mnt, pseudoflavor);
01060c89
CL
1079 return 1;
1080}
1081
0d71b058
TM
1082static int nfs_parse_version_string(char *string,
1083 struct nfs_parsed_mount_data *mnt,
1084 substring_t *args)
1085{
1086 mnt->flags &= ~NFS_MOUNT_VER3;
1087 switch (match_token(string, nfs_vers_tokens, args)) {
1088 case Opt_vers_2:
1089 mnt->version = 2;
1090 break;
1091 case Opt_vers_3:
1092 mnt->flags |= NFS_MOUNT_VER3;
1093 mnt->version = 3;
1094 break;
1095 case Opt_vers_4:
1096 /* Backward compatibility option. In future,
1097 * the mount program should always supply
1098 * a NFSv4 minor version number.
1099 */
1100 mnt->version = 4;
1101 break;
1102 case Opt_vers_4_0:
1103 mnt->version = 4;
1104 mnt->minorversion = 0;
1105 break;
1106 case Opt_vers_4_1:
1107 mnt->version = 4;
1108 mnt->minorversion = 1;
1109 break;
42c2c424
SD
1110 case Opt_vers_4_2:
1111 mnt->version = 4;
1112 mnt->minorversion = 2;
1113 break;
0d71b058
TM
1114 default:
1115 return 0;
1116 }
1117 return 1;
1118}
1119
c5cb09b6
RL
1120static int nfs_get_option_str(substring_t args[], char **option)
1121{
1122 kfree(*option);
1123 *option = match_strdup(args);
e25fbe38 1124 return !*option;
c5cb09b6
RL
1125}
1126
1127static int nfs_get_option_ul(substring_t args[], unsigned long *option)
1128{
1129 int rc;
1130 char *string;
1131
1132 string = match_strdup(args);
1133 if (string == NULL)
1134 return -ENOMEM;
7297cb68 1135 rc = kstrtoul(string, 10, option);
c5cb09b6
RL
1136 kfree(string);
1137
1138 return rc;
1139}
1140
bf0fd768
CL
1141/*
1142 * Error-check and convert a string of mount options from user space into
f45663ce
CL
1143 * a data structure. The whole mount string is processed; bad options are
1144 * skipped as they are encountered. If there were no errors, return 1;
1145 * otherwise return 0 (zero).
bf0fd768
CL
1146 */
1147static int nfs_parse_mount_options(char *raw,
1148 struct nfs_parsed_mount_data *mnt)
1149{
f9c3a380 1150 char *p, *string, *secdata;
d23c45fd 1151 int rc, sloppy = 0, invalid_option = 0;
ee671b01
JL
1152 unsigned short protofamily = AF_UNSPEC;
1153 unsigned short mountfamily = AF_UNSPEC;
bf0fd768
CL
1154
1155 if (!raw) {
1156 dfprintk(MOUNT, "NFS: mount options string was NULL.\n");
1157 return 1;
1158 }
1159 dfprintk(MOUNT, "NFS: nfs mount opts='%s'\n", raw);
1160
f9c3a380
EP
1161 secdata = alloc_secdata();
1162 if (!secdata)
1163 goto out_nomem;
1164
1165 rc = security_sb_copy_data(raw, secdata);
1166 if (rc)
1167 goto out_security_failure;
1168
1169 rc = security_sb_parse_opts_str(secdata, &mnt->lsm_opts);
1170 if (rc)
1171 goto out_security_failure;
1172
1173 free_secdata(secdata);
1174
bf0fd768
CL
1175 while ((p = strsep(&raw, ",")) != NULL) {
1176 substring_t args[MAX_OPT_ARGS];
a5a16bae
CL
1177 unsigned long option;
1178 int token;
bf0fd768
CL
1179
1180 if (!*p)
1181 continue;
1182
1183 dfprintk(MOUNT, "NFS: parsing nfs mount option '%s'\n", p);
1184
1185 token = match_token(p, nfs_mount_option_tokens, args);
1186 switch (token) {
f45663ce
CL
1187
1188 /*
1189 * boolean options: foo/nofoo
1190 */
bf0fd768
CL
1191 case Opt_soft:
1192 mnt->flags |= NFS_MOUNT_SOFT;
1193 break;
1194 case Opt_hard:
1195 mnt->flags &= ~NFS_MOUNT_SOFT;
1196 break;
bf0fd768
CL
1197 case Opt_posix:
1198 mnt->flags |= NFS_MOUNT_POSIX;
1199 break;
1200 case Opt_noposix:
1201 mnt->flags &= ~NFS_MOUNT_POSIX;
1202 break;
1203 case Opt_cto:
1204 mnt->flags &= ~NFS_MOUNT_NOCTO;
1205 break;
1206 case Opt_nocto:
1207 mnt->flags |= NFS_MOUNT_NOCTO;
1208 break;
1209 case Opt_ac:
1210 mnt->flags &= ~NFS_MOUNT_NOAC;
1211 break;
1212 case Opt_noac:
1213 mnt->flags |= NFS_MOUNT_NOAC;
1214 break;
1215 case Opt_lock:
1216 mnt->flags &= ~NFS_MOUNT_NONLM;
5eebde23
SJ
1217 mnt->flags &= ~(NFS_MOUNT_LOCAL_FLOCK |
1218 NFS_MOUNT_LOCAL_FCNTL);
bf0fd768
CL
1219 break;
1220 case Opt_nolock:
1221 mnt->flags |= NFS_MOUNT_NONLM;
5eebde23
SJ
1222 mnt->flags |= (NFS_MOUNT_LOCAL_FLOCK |
1223 NFS_MOUNT_LOCAL_FCNTL);
bf0fd768 1224 break;
bf0fd768
CL
1225 case Opt_udp:
1226 mnt->flags &= ~NFS_MOUNT_TCP;
0896a725 1227 mnt->nfs_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768
CL
1228 break;
1229 case Opt_tcp:
1230 mnt->flags |= NFS_MOUNT_TCP;
0896a725 1231 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1232 break;
2cf7ff7a
TT
1233 case Opt_rdma:
1234 mnt->flags |= NFS_MOUNT_TCP; /* for side protocols */
1235 mnt->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
a67d18f8 1236 xprt_load_transport(p);
2cf7ff7a 1237 break;
bf0fd768
CL
1238 case Opt_acl:
1239 mnt->flags &= ~NFS_MOUNT_NOACL;
1240 break;
1241 case Opt_noacl:
1242 mnt->flags |= NFS_MOUNT_NOACL;
1243 break;
1244 case Opt_rdirplus:
1245 mnt->flags &= ~NFS_MOUNT_NORDIRPLUS;
1246 break;
1247 case Opt_nordirplus:
1248 mnt->flags |= NFS_MOUNT_NORDIRPLUS;
1249 break;
75180df2
TM
1250 case Opt_sharecache:
1251 mnt->flags &= ~NFS_MOUNT_UNSHARED;
1252 break;
1253 case Opt_nosharecache:
1254 mnt->flags |= NFS_MOUNT_UNSHARED;
1255 break;
d740351b
CL
1256 case Opt_resvport:
1257 mnt->flags &= ~NFS_MOUNT_NORESVPORT;
1258 break;
1259 case Opt_noresvport:
1260 mnt->flags |= NFS_MOUNT_NORESVPORT;
1261 break;
b797cac7
DH
1262 case Opt_fscache:
1263 mnt->options |= NFS_OPTION_FSCACHE;
1264 kfree(mnt->fscache_uniq);
1265 mnt->fscache_uniq = NULL;
1266 break;
1267 case Opt_nofscache:
1268 mnt->options &= ~NFS_OPTION_FSCACHE;
1269 kfree(mnt->fscache_uniq);
1270 mnt->fscache_uniq = NULL;
1271 break;
89652617
CL
1272 case Opt_migration:
1273 mnt->options |= NFS_OPTION_MIGRATION;
1274 break;
1275 case Opt_nomigration:
1276 mnt->options &= NFS_OPTION_MIGRATION;
1277 break;
bf0fd768 1278
f45663ce
CL
1279 /*
1280 * options that take numeric values
1281 */
bf0fd768 1282 case Opt_port:
c5cb09b6
RL
1283 if (nfs_get_option_ul(args, &option) ||
1284 option > USHRT_MAX)
d23c45fd
CL
1285 goto out_invalid_value;
1286 mnt->nfs_server.port = option;
bf0fd768
CL
1287 break;
1288 case Opt_rsize:
c5cb09b6 1289 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1290 goto out_invalid_value;
1291 mnt->rsize = option;
bf0fd768
CL
1292 break;
1293 case Opt_wsize:
c5cb09b6 1294 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1295 goto out_invalid_value;
1296 mnt->wsize = option;
bf0fd768
CL
1297 break;
1298 case Opt_bsize:
c5cb09b6 1299 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1300 goto out_invalid_value;
1301 mnt->bsize = option;
bf0fd768
CL
1302 break;
1303 case Opt_timeo:
c5cb09b6 1304 if (nfs_get_option_ul(args, &option) || option == 0)
d23c45fd
CL
1305 goto out_invalid_value;
1306 mnt->timeo = option;
bf0fd768
CL
1307 break;
1308 case Opt_retrans:
c5cb09b6 1309 if (nfs_get_option_ul(args, &option) || option == 0)
d23c45fd
CL
1310 goto out_invalid_value;
1311 mnt->retrans = option;
bf0fd768
CL
1312 break;
1313 case Opt_acregmin:
c5cb09b6 1314 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1315 goto out_invalid_value;
1316 mnt->acregmin = option;
bf0fd768
CL
1317 break;
1318 case Opt_acregmax:
c5cb09b6 1319 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1320 goto out_invalid_value;
1321 mnt->acregmax = option;
bf0fd768
CL
1322 break;
1323 case Opt_acdirmin:
c5cb09b6 1324 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1325 goto out_invalid_value;
1326 mnt->acdirmin = option;
bf0fd768
CL
1327 break;
1328 case Opt_acdirmax:
c5cb09b6 1329 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1330 goto out_invalid_value;
1331 mnt->acdirmax = option;
bf0fd768
CL
1332 break;
1333 case Opt_actimeo:
c5cb09b6 1334 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1335 goto out_invalid_value;
1336 mnt->acregmin = mnt->acregmax =
1337 mnt->acdirmin = mnt->acdirmax = option;
bf0fd768
CL
1338 break;
1339 case Opt_namelen:
c5cb09b6 1340 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1341 goto out_invalid_value;
1342 mnt->namlen = option;
bf0fd768
CL
1343 break;
1344 case Opt_mountport:
c5cb09b6
RL
1345 if (nfs_get_option_ul(args, &option) ||
1346 option > USHRT_MAX)
d23c45fd
CL
1347 goto out_invalid_value;
1348 mnt->mount_server.port = option;
bf0fd768 1349 break;
bf0fd768 1350 case Opt_mountvers:
c5cb09b6 1351 if (nfs_get_option_ul(args, &option) ||
f45663ce 1352 option < NFS_MNT_VERSION ||
d23c45fd
CL
1353 option > NFS_MNT3_VERSION)
1354 goto out_invalid_value;
1355 mnt->mount_server.version = option;
bf0fd768 1356 break;
3fd5be9e 1357 case Opt_minorversion:
c5cb09b6 1358 if (nfs_get_option_ul(args, &option))
f3f4f4ed
CL
1359 goto out_invalid_value;
1360 if (option > NFS4_MAX_MINOR_VERSION)
1361 goto out_invalid_value;
1362 mnt->minorversion = option;
3fd5be9e 1363 break;
bf0fd768 1364
f45663ce
CL
1365 /*
1366 * options that take text values
1367 */
0d71b058
TM
1368 case Opt_nfsvers:
1369 string = match_strdup(args);
1370 if (string == NULL)
1371 goto out_nomem;
1372 rc = nfs_parse_version_string(string, mnt, args);
1373 kfree(string);
1374 if (!rc)
1375 goto out_invalid_value;
1376 break;
bf0fd768
CL
1377 case Opt_sec:
1378 string = match_strdup(args);
1379 if (string == NULL)
1380 goto out_nomem;
01060c89 1381 rc = nfs_parse_security_flavors(string, mnt);
bf0fd768 1382 kfree(string);
f45663ce 1383 if (!rc) {
f45663ce
CL
1384 dfprintk(MOUNT, "NFS: unrecognized "
1385 "security flavor\n");
d23c45fd 1386 return 0;
f45663ce 1387 }
bf0fd768
CL
1388 break;
1389 case Opt_proto:
1390 string = match_strdup(args);
1391 if (string == NULL)
1392 goto out_nomem;
1393 token = match_token(string,
1394 nfs_xprt_protocol_tokens, args);
bf0fd768 1395
ee671b01 1396 protofamily = AF_INET;
bf0fd768 1397 switch (token) {
ee671b01
JL
1398 case Opt_xprt_udp6:
1399 protofamily = AF_INET6;
fdb66ff4 1400 case Opt_xprt_udp:
bf0fd768 1401 mnt->flags &= ~NFS_MOUNT_TCP;
0896a725 1402 mnt->nfs_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768 1403 break;
ee671b01
JL
1404 case Opt_xprt_tcp6:
1405 protofamily = AF_INET6;
fdb66ff4 1406 case Opt_xprt_tcp:
bf0fd768 1407 mnt->flags |= NFS_MOUNT_TCP;
0896a725 1408 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1409 break;
2cf7ff7a
TT
1410 case Opt_xprt_rdma:
1411 /* vector side protocols to TCP */
1412 mnt->flags |= NFS_MOUNT_TCP;
1413 mnt->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
a67d18f8 1414 xprt_load_transport(string);
2cf7ff7a 1415 break;
bf0fd768 1416 default:
f45663ce
CL
1417 dfprintk(MOUNT, "NFS: unrecognized "
1418 "transport protocol\n");
4223a4a1 1419 kfree(string);
d23c45fd 1420 return 0;
bf0fd768 1421 }
c5cb09b6 1422 kfree(string);
bf0fd768
CL
1423 break;
1424 case Opt_mountproto:
1425 string = match_strdup(args);
1426 if (string == NULL)
1427 goto out_nomem;
1428 token = match_token(string,
1429 nfs_xprt_protocol_tokens, args);
d508afb4 1430 kfree(string);
bf0fd768 1431
ee671b01 1432 mountfamily = AF_INET;
bf0fd768 1433 switch (token) {
ee671b01
JL
1434 case Opt_xprt_udp6:
1435 mountfamily = AF_INET6;
fdb66ff4 1436 case Opt_xprt_udp:
0896a725 1437 mnt->mount_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768 1438 break;
ee671b01
JL
1439 case Opt_xprt_tcp6:
1440 mountfamily = AF_INET6;
fdb66ff4 1441 case Opt_xprt_tcp:
0896a725 1442 mnt->mount_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1443 break;
2cf7ff7a 1444 case Opt_xprt_rdma: /* not used for side protocols */
bf0fd768 1445 default:
f45663ce
CL
1446 dfprintk(MOUNT, "NFS: unrecognized "
1447 "transport protocol\n");
d23c45fd 1448 return 0;
bf0fd768
CL
1449 }
1450 break;
1451 case Opt_addr:
1452 string = match_strdup(args);
1453 if (string == NULL)
1454 goto out_nomem;
53a0b9c4 1455 mnt->nfs_server.addrlen =
b48e1278 1456 rpc_pton(mnt->net, string, strlen(string),
53a0b9c4
CL
1457 (struct sockaddr *)
1458 &mnt->nfs_server.address,
1459 sizeof(mnt->nfs_server.address));
bf0fd768 1460 kfree(string);
53a0b9c4
CL
1461 if (mnt->nfs_server.addrlen == 0)
1462 goto out_invalid_address;
bf0fd768
CL
1463 break;
1464 case Opt_clientaddr:
c5cb09b6 1465 if (nfs_get_option_str(args, &mnt->client_address))
bf0fd768 1466 goto out_nomem;
bf0fd768 1467 break;
33832034 1468 case Opt_mounthost:
c5cb09b6
RL
1469 if (nfs_get_option_str(args,
1470 &mnt->mount_server.hostname))
33832034 1471 goto out_nomem;
33832034 1472 break;
0ac83779 1473 case Opt_mountaddr:
bf0fd768
CL
1474 string = match_strdup(args);
1475 if (string == NULL)
1476 goto out_nomem;
53a0b9c4 1477 mnt->mount_server.addrlen =
b48e1278 1478 rpc_pton(mnt->net, string, strlen(string),
53a0b9c4
CL
1479 (struct sockaddr *)
1480 &mnt->mount_server.address,
1481 sizeof(mnt->mount_server.address));
bf0fd768 1482 kfree(string);
53a0b9c4
CL
1483 if (mnt->mount_server.addrlen == 0)
1484 goto out_invalid_address;
bf0fd768 1485 break;
7973c1f1
TM
1486 case Opt_lookupcache:
1487 string = match_strdup(args);
1488 if (string == NULL)
1489 goto out_nomem;
1490 token = match_token(string,
1491 nfs_lookupcache_tokens, args);
1492 kfree(string);
1493 switch (token) {
1494 case Opt_lookupcache_all:
1495 mnt->flags &= ~(NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE);
1496 break;
1497 case Opt_lookupcache_positive:
1498 mnt->flags &= ~NFS_MOUNT_LOOKUP_CACHE_NONE;
1499 mnt->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG;
1500 break;
1501 case Opt_lookupcache_none:
1502 mnt->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE;
1503 break;
1504 default:
7973c1f1
TM
1505 dfprintk(MOUNT, "NFS: invalid "
1506 "lookupcache argument\n");
d23c45fd 1507 return 0;
7973c1f1
TM
1508 };
1509 break;
a6d5ff64 1510 case Opt_fscache_uniq:
c5cb09b6 1511 if (nfs_get_option_str(args, &mnt->fscache_uniq))
a6d5ff64 1512 goto out_nomem;
a6d5ff64
CL
1513 mnt->options |= NFS_OPTION_FSCACHE;
1514 break;
5eebde23
SJ
1515 case Opt_local_lock:
1516 string = match_strdup(args);
1517 if (string == NULL)
1518 goto out_nomem;
1519 token = match_token(string, nfs_local_lock_tokens,
1520 args);
1521 kfree(string);
1522 switch (token) {
1523 case Opt_local_lock_all:
1524 mnt->flags |= (NFS_MOUNT_LOCAL_FLOCK |
1525 NFS_MOUNT_LOCAL_FCNTL);
1526 break;
1527 case Opt_local_lock_flock:
1528 mnt->flags |= NFS_MOUNT_LOCAL_FLOCK;
1529 break;
1530 case Opt_local_lock_posix:
1531 mnt->flags |= NFS_MOUNT_LOCAL_FCNTL;
1532 break;
1533 case Opt_local_lock_none:
1534 mnt->flags &= ~(NFS_MOUNT_LOCAL_FLOCK |
1535 NFS_MOUNT_LOCAL_FCNTL);
1536 break;
1537 default:
1538 dfprintk(MOUNT, "NFS: invalid "
1539 "local_lock argument\n");
1540 return 0;
1541 };
1542 break;
bf0fd768 1543
f45663ce
CL
1544 /*
1545 * Special options
1546 */
1547 case Opt_sloppy:
1548 sloppy = 1;
1549 dfprintk(MOUNT, "NFS: relaxing parsing rules\n");
1550 break;
bf0fd768
CL
1551 case Opt_userspace:
1552 case Opt_deprecated:
d33e4dfe
CL
1553 dfprintk(MOUNT, "NFS: ignoring mount option "
1554 "'%s'\n", p);
bf0fd768
CL
1555 break;
1556
1557 default:
d23c45fd 1558 invalid_option = 1;
f45663ce
CL
1559 dfprintk(MOUNT, "NFS: unrecognized mount option "
1560 "'%s'\n", p);
bf0fd768
CL
1561 }
1562 }
1563
d23c45fd
CL
1564 if (!sloppy && invalid_option)
1565 return 0;
1566
571b7554
WAA
1567 if (mnt->minorversion && mnt->version != 4)
1568 goto out_minorversion_mismatch;
1569
89652617
CL
1570 if (mnt->options & NFS_OPTION_MIGRATION &&
1571 mnt->version != 4 && mnt->minorversion != 0)
1572 goto out_migration_misuse;
1573
ee671b01
JL
1574 /*
1575 * verify that any proto=/mountproto= options match the address
1856b225 1576 * families in the addr=/mountaddr= options.
ee671b01
JL
1577 */
1578 if (protofamily != AF_UNSPEC &&
1579 protofamily != mnt->nfs_server.address.ss_family)
1580 goto out_proto_mismatch;
1581
1582 if (mountfamily != AF_UNSPEC) {
1583 if (mnt->mount_server.addrlen) {
1584 if (mountfamily != mnt->mount_server.address.ss_family)
1585 goto out_mountproto_mismatch;
1586 } else {
1587 if (mountfamily != mnt->nfs_server.address.ss_family)
1588 goto out_mountproto_mismatch;
1589 }
1590 }
1591
bf0fd768
CL
1592 return 1;
1593
ee671b01
JL
1594out_mountproto_mismatch:
1595 printk(KERN_INFO "NFS: mount server address does not match mountproto= "
1596 "option\n");
1597 return 0;
1598out_proto_mismatch:
1599 printk(KERN_INFO "NFS: server address does not match proto= option\n");
1600 return 0;
53a0b9c4
CL
1601out_invalid_address:
1602 printk(KERN_INFO "NFS: bad IP address specified: %s\n", p);
1603 return 0;
d23c45fd 1604out_invalid_value:
53a0b9c4 1605 printk(KERN_INFO "NFS: bad mount option value specified: %s\n", p);
d23c45fd 1606 return 0;
571b7554
WAA
1607out_minorversion_mismatch:
1608 printk(KERN_INFO "NFS: mount option vers=%u does not support "
1609 "minorversion=%u\n", mnt->version, mnt->minorversion);
1610 return 0;
89652617
CL
1611out_migration_misuse:
1612 printk(KERN_INFO
1613 "NFS: 'migration' not supported for this NFS version\n");
1614 return 0;
bf0fd768
CL
1615out_nomem:
1616 printk(KERN_INFO "NFS: not enough memory to parse option\n");
1617 return 0;
f9c3a380
EP
1618out_security_failure:
1619 free_secdata(secdata);
1620 printk(KERN_INFO "NFS: security options invalid: %d\n", rc);
1621 return 0;
bf0fd768
CL
1622}
1623
ec88f28d 1624/*
9111c95b
JL
1625 * Ensure that the specified authtype in args->auth_flavors[0] is supported by
1626 * the server. Returns 0 if it's ok, and -EACCES if not.
ec88f28d 1627 */
9111c95b
JL
1628static int nfs_verify_authflavor(struct nfs_parsed_mount_data *args,
1629 rpc_authflavor_t *server_authlist, unsigned int count)
ec88f28d 1630{
9111c95b 1631 unsigned int i;
4580a92d 1632
d497ab97
WAA
1633 /*
1634 * If the sec= mount option is used, the specified flavor or AUTH_NULL
1635 * must be in the list returned by the server.
1636 *
1637 * AUTH_NULL has a special meaning when it's in the server list - it
1638 * means that the server will ignore the rpc creds, so any flavor
1639 * can be used.
1640 */
4580a92d 1641 for (i = 0; i < count; i++) {
9111c95b
JL
1642 if (args->auth_flavors[0] == server_authlist[i] ||
1643 server_authlist[i] == RPC_AUTH_NULL)
1644 goto out;
4580a92d 1645 }
ec88f28d 1646
9111c95b
JL
1647 dfprintk(MOUNT, "NFS: auth flavor %u not supported by server\n",
1648 args->auth_flavors[0]);
1649 return -EACCES;
d497ab97 1650
4580a92d 1651out:
9111c95b 1652 dfprintk(MOUNT, "NFS: using auth flavor %u\n", args->auth_flavors[0]);
d497ab97 1653 return 0;
ec88f28d
CL
1654}
1655
0076d7b7
CL
1656/*
1657 * Use the remote server's MOUNT service to request the NFS file handle
1658 * corresponding to the provided path.
1659 */
486aa699 1660static int nfs_request_mount(struct nfs_parsed_mount_data *args,
294ae81d
JL
1661 struct nfs_fh *root_fh,
1662 rpc_authflavor_t *server_authlist,
1663 unsigned int *server_authlist_len)
0076d7b7 1664{
c5d120f8
CL
1665 struct nfs_mount_request request = {
1666 .sap = (struct sockaddr *)
1667 &args->mount_server.address,
1668 .dirpath = args->nfs_server.export_path,
1669 .protocol = args->mount_server.protocol,
1670 .fh = root_fh,
50a737f8 1671 .noresvport = args->flags & NFS_MOUNT_NORESVPORT,
294ae81d 1672 .auth_flav_len = server_authlist_len,
ec88f28d 1673 .auth_flavs = server_authlist,
6d59b8d5 1674 .net = args->net,
c5d120f8 1675 };
4c568017 1676 int status;
0076d7b7
CL
1677
1678 if (args->mount_server.version == 0) {
8a6e5deb
TM
1679 switch (args->version) {
1680 default:
1681 args->mount_server.version = NFS_MNT3_VERSION;
1682 break;
1683 case 2:
1684 args->mount_server.version = NFS_MNT_VERSION;
1685 }
0076d7b7 1686 }
c5d120f8 1687 request.version = args->mount_server.version;
0076d7b7 1688
33832034 1689 if (args->mount_server.hostname)
c5d120f8 1690 request.hostname = args->mount_server.hostname;
33832034 1691 else
c5d120f8 1692 request.hostname = args->nfs_server.hostname;
33832034 1693
0076d7b7
CL
1694 /*
1695 * Construct the mount server's address.
1696 */
4c568017 1697 if (args->mount_server.address.ss_family == AF_UNSPEC) {
c5d120f8 1698 memcpy(request.sap, &args->nfs_server.address,
4c568017
CL
1699 args->nfs_server.addrlen);
1700 args->mount_server.addrlen = args->nfs_server.addrlen;
1701 }
c5d120f8 1702 request.salen = args->mount_server.addrlen;
f5855fec 1703 nfs_set_port(request.sap, &args->mount_server.port, 0);
0076d7b7
CL
1704
1705 /*
1706 * Now ask the mount server to map our export path
1707 * to a file handle.
1708 */
c5d120f8 1709 status = nfs_mount(&request);
ec88f28d
CL
1710 if (status != 0) {
1711 dfprintk(MOUNT, "NFS: unable to mount server %s, error %d\n",
1712 request.hostname, status);
1713 return status;
1714 }
0076d7b7 1715
9111c95b 1716 return 0;
0076d7b7
CL
1717}
1718
d17540c6
JL
1719static struct nfs_server *nfs_try_mount_request(struct nfs_mount_info *mount_info,
1720 struct nfs_subversion *nfs_mod)
1721{
1722 int status;
9111c95b
JL
1723 unsigned int i;
1724 bool tried_auth_unix = false;
1725 bool auth_null_in_list = false;
1726 struct nfs_server *server = ERR_PTR(-EACCES);
294ae81d
JL
1727 struct nfs_parsed_mount_data *args = mount_info->parsed;
1728 rpc_authflavor_t authlist[NFS_MAX_SECFLAVORS];
1729 unsigned int authlist_len = ARRAY_SIZE(authlist);
d17540c6 1730
294ae81d
JL
1731 status = nfs_request_mount(args, mount_info->mntfh, authlist,
1732 &authlist_len);
d17540c6
JL
1733 if (status)
1734 return ERR_PTR(status);
1735
9111c95b
JL
1736 /*
1737 * Was a sec= authflavor specified in the options? First, verify
1738 * whether the server supports it, and then just try to use it if so.
1739 */
74c98811 1740 if (args->auth_flavor_len > 0) {
9111c95b
JL
1741 status = nfs_verify_authflavor(args, authlist, authlist_len);
1742 dfprintk(MOUNT, "NFS: using auth flavor %u\n", args->auth_flavors[0]);
1743 if (status)
1744 return ERR_PTR(status);
1745 return nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1746 }
1747
1748 /*
1749 * No sec= option was provided. RFC 2623, section 2.7 suggests we
1750 * SHOULD prefer the flavor listed first. However, some servers list
1751 * AUTH_NULL first. Avoid ever choosing AUTH_NULL.
1752 */
1753 for (i = 0; i < authlist_len; ++i) {
1754 rpc_authflavor_t flavor;
1755 struct rpcsec_gss_info info;
1756
1757 flavor = authlist[i];
1758 switch (flavor) {
1759 case RPC_AUTH_UNIX:
1760 tried_auth_unix = true;
1761 break;
1762 case RPC_AUTH_NULL:
1763 auth_null_in_list = true;
1764 continue;
1765 default:
1766 if (rpcauth_get_gssinfo(flavor, &info) != 0)
1767 continue;
1768 /* Fallthrough */
1769 }
1770 dfprintk(MOUNT, "NFS: attempting to use auth flavor %u\n", flavor);
74c98811 1771 nfs_set_auth_parsed_mount_data(args, flavor);
9111c95b
JL
1772 server = nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1773 if (!IS_ERR(server))
1774 return server;
1775 }
1776
1777 /*
1778 * Nothing we tried so far worked. At this point, give up if we've
1779 * already tried AUTH_UNIX or if the server's list doesn't contain
1780 * AUTH_NULL
1781 */
1782 if (tried_auth_unix || !auth_null_in_list)
1783 return server;
1784
1785 /* Last chance! Try AUTH_UNIX */
1786 dfprintk(MOUNT, "NFS: attempting to use auth flavor %u\n", RPC_AUTH_UNIX);
74c98811 1787 nfs_set_auth_parsed_mount_data(args, RPC_AUTH_UNIX);
d17540c6
JL
1788 return nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1789}
1790
ff9099f2
BS
1791struct dentry *nfs_try_mount(int flags, const char *dev_name,
1792 struct nfs_mount_info *mount_info,
1793 struct nfs_subversion *nfs_mod)
486aa699 1794{
486aa699
BS
1795 struct nfs_server *server;
1796
d17540c6
JL
1797 if (mount_info->parsed->need_mount)
1798 server = nfs_try_mount_request(mount_info, nfs_mod);
1799 else
1800 server = nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
486aa699 1801
486aa699
BS
1802 if (IS_ERR(server))
1803 return ERR_CAST(server);
1804
ab7017a3 1805 return nfs_fs_mount_common(server, flags, dev_name, mount_info, nfs_mod);
486aa699 1806}
ddda8e0a 1807EXPORT_SYMBOL_GPL(nfs_try_mount);
486aa699 1808
c12bacec
RL
1809/*
1810 * Split "dev_name" into "hostname:export_path".
1811 *
1812 * The leftmost colon demarks the split between the server's hostname
1813 * and the export path. If the hostname starts with a left square
1814 * bracket, then it may contain colons.
1815 *
1816 * Note: caller frees hostname and export path, even on error.
1817 */
1818static int nfs_parse_devname(const char *dev_name,
1819 char **hostname, size_t maxnamlen,
1820 char **export_path, size_t maxpathlen)
dc045898
CL
1821{
1822 size_t len;
c12bacec 1823 char *end;
dc045898 1824
c12bacec
RL
1825 /* Is the host name protected with square brakcets? */
1826 if (*dev_name == '[') {
1827 end = strchr(++dev_name, ']');
1828 if (end == NULL || end[1] != ':')
dc045898 1829 goto out_bad_devname;
dc045898 1830
c12bacec
RL
1831 len = end - dev_name;
1832 end++;
1833 } else {
1834 char *comma;
dc045898 1835
c12bacec
RL
1836 end = strchr(dev_name, ':');
1837 if (end == NULL)
1838 goto out_bad_devname;
1839 len = end - dev_name;
d1aa0825 1840
c12bacec
RL
1841 /* kill possible hostname list: not supported */
1842 comma = strchr(dev_name, ',');
1843 if (comma != NULL && comma < end)
1844 *comma = 0;
1845 }
d1aa0825 1846
d1aa0825
CL
1847 if (len > maxnamlen)
1848 goto out_hostname;
1849
1850 /* N.B. caller will free nfs_server.hostname in all cases */
c12bacec 1851 *hostname = kstrndup(dev_name, len, GFP_KERNEL);
d1aa0825
CL
1852 if (*hostname == NULL)
1853 goto out_nomem;
c12bacec 1854 len = strlen(++end);
d1aa0825
CL
1855 if (len > maxpathlen)
1856 goto out_path;
1857 *export_path = kstrndup(end, len, GFP_KERNEL);
1858 if (!*export_path)
1859 goto out_nomem;
1860
c12bacec 1861 dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", *export_path);
d1aa0825
CL
1862 return 0;
1863
1864out_bad_devname:
1865 dfprintk(MOUNT, "NFS: device name not in host:path format\n");
1866 return -EINVAL;
1867
1868out_nomem:
1869 dfprintk(MOUNT, "NFS: not enough memory to parse device name\n");
1870 return -ENOMEM;
1871
1872out_hostname:
1873 dfprintk(MOUNT, "NFS: server hostname too long\n");
1874 return -ENAMETOOLONG;
1875
1876out_path:
1877 dfprintk(MOUNT, "NFS: export pathname too long\n");
1878 return -ENAMETOOLONG;
1879}
1880
f7b422b1 1881/*
54ceac45
DH
1882 * Validate the NFS2/NFS3 mount data
1883 * - fills in the mount root filehandle
136d558c
CL
1884 *
1885 * For option strings, user space handles the following behaviors:
1886 *
1887 * + DNS: mapping server host name to IP address ("addr=" option)
1888 *
1889 * + failure mode: how to behave if a mount request can't be handled
1890 * immediately ("fg/bg" option)
1891 *
1892 * + retry: how often to retry a mount request ("retry=" option)
1893 *
1894 * + breaking back: trying proto=udp after proto=tcp, v2 after v3,
1895 * mountproto=tcp after mountproto=udp, and so on
f7b422b1 1896 */
d72c727c
BS
1897static int nfs23_validate_mount_data(void *options,
1898 struct nfs_parsed_mount_data *args,
1899 struct nfs_fh *mntfh,
1900 const char *dev_name)
f7b422b1 1901{
2283f8d6 1902 struct nfs_mount_data *data = (struct nfs_mount_data *)options;
4cfd74fc 1903 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
74c98811 1904 int extra_flags = NFS_MOUNT_LEGACY_INTERFACE;
136d558c 1905
5df36e78
CL
1906 if (data == NULL)
1907 goto out_no_data;
f7b422b1 1908
c5afc8da 1909 args->version = NFS_DEFAULT_VERSION;
54ceac45 1910 switch (data->version) {
5df36e78
CL
1911 case 1:
1912 data->namlen = 0;
1913 case 2:
1914 data->bsize = 0;
1915 case 3:
1916 if (data->flags & NFS_MOUNT_VER3)
1917 goto out_no_v3;
1918 data->root.size = NFS2_FHSIZE;
1919 memcpy(data->root.data, data->old_root.data, NFS2_FHSIZE);
74c98811
TM
1920 /* Turn off security negotiation */
1921 extra_flags |= NFS_MOUNT_SECFLAVOUR;
5df36e78
CL
1922 case 4:
1923 if (data->flags & NFS_MOUNT_SECFLAVOUR)
1924 goto out_no_sec;
1925 case 5:
1926 memset(data->context, 0, sizeof(data->context));
1927 case 6:
b7e24457
TM
1928 if (data->flags & NFS_MOUNT_VER3) {
1929 if (data->root.size > NFS3_FHSIZE || data->root.size == 0)
1930 goto out_invalid_fh;
5df36e78 1931 mntfh->size = data->root.size;
764302cc
CL
1932 args->version = 3;
1933 } else {
5df36e78 1934 mntfh->size = NFS2_FHSIZE;
764302cc
CL
1935 args->version = 2;
1936 }
5df36e78 1937
5df36e78
CL
1938
1939 memcpy(mntfh->data, data->root.data, mntfh->size);
1940 if (mntfh->size < sizeof(mntfh->data))
1941 memset(mntfh->data + mntfh->size, 0,
1942 sizeof(mntfh->data) - mntfh->size);
6e88e061 1943
2283f8d6
TT
1944 /*
1945 * Translate to nfs_parsed_mount_data, which nfs_fill_super
1946 * can deal with.
1947 */
ff3525a5 1948 args->flags = data->flags & NFS_MOUNT_FLAGMASK;
74c98811 1949 args->flags |= extra_flags;
2283f8d6
TT
1950 args->rsize = data->rsize;
1951 args->wsize = data->wsize;
2283f8d6
TT
1952 args->timeo = data->timeo;
1953 args->retrans = data->retrans;
1954 args->acregmin = data->acregmin;
1955 args->acregmax = data->acregmax;
1956 args->acdirmin = data->acdirmin;
1957 args->acdirmax = data->acdirmax;
b72e4f42 1958 args->need_mount = false;
4c568017 1959
4cfd74fc 1960 memcpy(sap, &data->addr, sizeof(data->addr));
4c568017 1961 args->nfs_server.addrlen = sizeof(data->addr);
872ece86 1962 args->nfs_server.port = ntohs(data->addr.sin_port);
4cfd74fc 1963 if (!nfs_verify_server_address(sap))
4c568017
CL
1964 goto out_no_address;
1965
2283f8d6 1966 if (!(data->flags & NFS_MOUNT_TCP))
0896a725 1967 args->nfs_server.protocol = XPRT_TRANSPORT_UDP;
2283f8d6
TT
1968 /* N.B. caller will free nfs_server.hostname in all cases */
1969 args->nfs_server.hostname = kstrdup(data->hostname, GFP_KERNEL);
1970 args->namlen = data->namlen;
1971 args->bsize = data->bsize;
dd07c947
CL
1972
1973 if (data->flags & NFS_MOUNT_SECFLAVOUR)
74c98811
TM
1974 nfs_set_auth_parsed_mount_data(args, data->pseudoflavor);
1975 else
1976 nfs_set_auth_parsed_mount_data(args, RPC_AUTH_UNIX);
63649bd7
CG
1977 if (!args->nfs_server.hostname)
1978 goto out_nomem;
f9c3a380 1979
5eebde23
SJ
1980 if (!(data->flags & NFS_MOUNT_NONLM))
1981 args->flags &= ~(NFS_MOUNT_LOCAL_FLOCK|
1982 NFS_MOUNT_LOCAL_FCNTL);
1983 else
1984 args->flags |= (NFS_MOUNT_LOCAL_FLOCK|
1985 NFS_MOUNT_LOCAL_FCNTL);
f9c3a380
EP
1986 /*
1987 * The legacy version 6 binary mount data from userspace has a
1988 * field used only to transport selinux information into the
1989 * the kernel. To continue to support that functionality we
1990 * have a touch of selinux knowledge here in the NFS code. The
1991 * userspace code converted context=blah to just blah so we are
1992 * converting back to the full string selinux understands.
1993 */
1994 if (data->context[0]){
1995#ifdef CONFIG_SECURITY_SELINUX
1996 int rc;
1997 char *opts_str = kmalloc(sizeof(data->context) + 8, GFP_KERNEL);
1998 if (!opts_str)
1999 return -ENOMEM;
2000 strcpy(opts_str, "context=");
2001 data->context[NFS_MAX_CONTEXT_LEN] = '\0';
2002 strcat(opts_str, &data->context[0]);
2003 rc = security_sb_parse_opts_str(opts_str, &args->lsm_opts);
2004 kfree(opts_str);
2005 if (rc)
2006 return rc;
2007#else
2008 return -EINVAL;
2009#endif
2010 }
2011
5df36e78 2012 break;
b72e4f42
BS
2013 default:
2014 return NFS_TEXT_DATA;
f7b422b1 2015 }
54ceac45 2016
1c606fb7 2017#if !IS_ENABLED(CONFIG_NFS_V3)
8a6e5deb 2018 if (args->version == 3)
5df36e78
CL
2019 goto out_v3_not_compiled;
2020#endif /* !CONFIG_NFS_V3 */
f7b422b1 2021
5df36e78 2022 return 0;
f7b422b1 2023
5df36e78
CL
2024out_no_data:
2025 dfprintk(MOUNT, "NFS: mount program didn't pass any mount data\n");
2026 return -EINVAL;
54ceac45 2027
5df36e78
CL
2028out_no_v3:
2029 dfprintk(MOUNT, "NFS: nfs_mount_data version %d does not support v3\n",
2030 data->version);
2031 return -EINVAL;
f7b422b1 2032
5df36e78
CL
2033out_no_sec:
2034 dfprintk(MOUNT, "NFS: nfs_mount_data version supports only AUTH_SYS\n");
2035 return -EINVAL;
2036
1c606fb7 2037#if !IS_ENABLED(CONFIG_NFS_V3)
5df36e78
CL
2038out_v3_not_compiled:
2039 dfprintk(MOUNT, "NFS: NFSv3 is not compiled into kernel\n");
2040 return -EPROTONOSUPPORT;
2041#endif /* !CONFIG_NFS_V3 */
2042
63649bd7
CG
2043out_nomem:
2044 dfprintk(MOUNT, "NFS: not enough memory to handle mount options\n");
2045 return -ENOMEM;
2046
5df36e78
CL
2047out_no_address:
2048 dfprintk(MOUNT, "NFS: mount program didn't pass remote address\n");
2049 return -EINVAL;
2050
2051out_invalid_fh:
2052 dfprintk(MOUNT, "NFS: invalid root filehandle\n");
2053 return -EINVAL;
f7b422b1
DH
2054}
2055
89d77c8f 2056#if IS_ENABLED(CONFIG_NFS_V4)
d72c727c
BS
2057static int nfs_validate_mount_data(struct file_system_type *fs_type,
2058 void *options,
2059 struct nfs_parsed_mount_data *args,
2060 struct nfs_fh *mntfh,
2061 const char *dev_name)
2062{
2063 if (fs_type == &nfs_fs_type)
2064 return nfs23_validate_mount_data(options, args, mntfh, dev_name);
2065 return nfs4_validate_mount_data(options, args, dev_name);
2066}
2067#else
2068static int nfs_validate_mount_data(struct file_system_type *fs_type,
2069 void *options,
2070 struct nfs_parsed_mount_data *args,
2071 struct nfs_fh *mntfh,
2072 const char *dev_name)
2073{
2074 return nfs23_validate_mount_data(options, args, mntfh, dev_name);
2075}
2076#endif
2077
b72e4f42
BS
2078static int nfs_validate_text_mount_data(void *options,
2079 struct nfs_parsed_mount_data *args,
2080 const char *dev_name)
2081{
2082 int port = 0;
2083 int max_namelen = PAGE_SIZE;
2084 int max_pathlen = NFS_MAXPATHLEN;
2085 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
2086
2087 if (nfs_parse_mount_options((char *)options, args) == 0)
2088 return -EINVAL;
2089
2090 if (!nfs_verify_server_address(sap))
2091 goto out_no_address;
2092
2093 if (args->version == 4) {
89d77c8f 2094#if IS_ENABLED(CONFIG_NFS_V4)
b72e4f42
BS
2095 port = NFS_PORT;
2096 max_namelen = NFS4_MAXNAMLEN;
2097 max_pathlen = NFS4_MAXPATHLEN;
2098 nfs_validate_transport_protocol(args);
6da1a034
TM
2099 if (args->nfs_server.protocol == XPRT_TRANSPORT_UDP)
2100 goto out_invalid_transport_udp;
b72e4f42
BS
2101 nfs4_validate_mount_flags(args);
2102#else
2103 goto out_v4_not_compiled;
2104#endif /* CONFIG_NFS_V4 */
2105 } else
2106 nfs_set_mount_transport_protocol(args);
2107
2108 nfs_set_port(sap, &args->nfs_server.port, port);
2109
2110 if (args->auth_flavor_len > 1)
2111 goto out_bad_auth;
2112
2113 return nfs_parse_devname(dev_name,
2114 &args->nfs_server.hostname,
2115 max_namelen,
2116 &args->nfs_server.export_path,
2117 max_pathlen);
2118
89d77c8f 2119#if !IS_ENABLED(CONFIG_NFS_V4)
b72e4f42
BS
2120out_v4_not_compiled:
2121 dfprintk(MOUNT, "NFS: NFSv4 is not compiled into kernel\n");
2122 return -EPROTONOSUPPORT;
6da1a034
TM
2123#else
2124out_invalid_transport_udp:
2125 dfprintk(MOUNT, "NFSv4: Unsupported transport protocol udp\n");
2126 return -EINVAL;
b72e4f42
BS
2127#endif /* !CONFIG_NFS_V4 */
2128
2129out_no_address:
2130 dfprintk(MOUNT, "NFS: mount program didn't pass remote address\n");
2131 return -EINVAL;
2132
2133out_bad_auth:
2134 dfprintk(MOUNT, "NFS: Too many RPC auth flavours specified\n");
2135 return -EINVAL;
2136}
2137
48b605f8
JL
2138static int
2139nfs_compare_remount_data(struct nfs_server *nfss,
2140 struct nfs_parsed_mount_data *data)
2141{
2142 if (data->flags != nfss->flags ||
2143 data->rsize != nfss->rsize ||
2144 data->wsize != nfss->wsize ||
2145 data->retrans != nfss->client->cl_timeout->to_retries ||
2146 data->auth_flavors[0] != nfss->client->cl_auth->au_flavor ||
2147 data->acregmin != nfss->acregmin / HZ ||
2148 data->acregmax != nfss->acregmax / HZ ||
2149 data->acdirmin != nfss->acdirmin / HZ ||
2150 data->acdirmax != nfss->acdirmax / HZ ||
2151 data->timeo != (10U * nfss->client->cl_timeout->to_initval / HZ) ||
bcd2ea17 2152 data->nfs_server.port != nfss->port ||
48b605f8 2153 data->nfs_server.addrlen != nfss->nfs_client->cl_addrlen ||
a1be9eee
SR
2154 !rpc_cmp_addr((struct sockaddr *)&data->nfs_server.address,
2155 (struct sockaddr *)&nfss->nfs_client->cl_addr))
48b605f8
JL
2156 return -EINVAL;
2157
2158 return 0;
2159}
2160
fbdefd64 2161int
48b605f8
JL
2162nfs_remount(struct super_block *sb, int *flags, char *raw_data)
2163{
2164 int error;
2165 struct nfs_server *nfss = sb->s_fs_info;
2166 struct nfs_parsed_mount_data *data;
2167 struct nfs_mount_data *options = (struct nfs_mount_data *)raw_data;
2168 struct nfs4_mount_data *options4 = (struct nfs4_mount_data *)raw_data;
cd100725 2169 u32 nfsvers = nfss->nfs_client->rpc_ops->version;
48b605f8
JL
2170
2171 /*
2172 * Userspace mount programs that send binary options generally send
2173 * them populated with default values. We have no way to know which
2174 * ones were explicitly specified. Fall back to legacy behavior and
2175 * just return success.
2176 */
31c94469
MZ
2177 if ((nfsvers == 4 && (!options4 || options4->version == 1)) ||
2178 (nfsvers <= 3 && (!options || (options->version >= 1 &&
2179 options->version <= 6))))
48b605f8
JL
2180 return 0;
2181
2182 data = kzalloc(sizeof(*data), GFP_KERNEL);
2183 if (data == NULL)
2184 return -ENOMEM;
2185
2186 /* fill out struct with values from existing mount */
2187 data->flags = nfss->flags;
2188 data->rsize = nfss->rsize;
2189 data->wsize = nfss->wsize;
2190 data->retrans = nfss->client->cl_timeout->to_retries;
74c98811 2191 nfs_set_auth_parsed_mount_data(data, nfss->client->cl_auth->au_flavor);
48b605f8
JL
2192 data->acregmin = nfss->acregmin / HZ;
2193 data->acregmax = nfss->acregmax / HZ;
2194 data->acdirmin = nfss->acdirmin / HZ;
2195 data->acdirmax = nfss->acdirmax / HZ;
2196 data->timeo = 10U * nfss->client->cl_timeout->to_initval / HZ;
bcd2ea17 2197 data->nfs_server.port = nfss->port;
48b605f8
JL
2198 data->nfs_server.addrlen = nfss->nfs_client->cl_addrlen;
2199 memcpy(&data->nfs_server.address, &nfss->nfs_client->cl_addr,
2200 data->nfs_server.addrlen);
2201
2202 /* overwrite those values with any that were specified */
2203 error = nfs_parse_mount_options((char *)options, data);
2204 if (error < 0)
2205 goto out;
2206
26c4c170
JL
2207 /*
2208 * noac is a special case. It implies -o sync, but that's not
2209 * necessarily reflected in the mtab options. do_remount_sb
2210 * will clear MS_SYNCHRONOUS if -o sync wasn't specified in the
2211 * remount options, so we have to explicitly reset it.
2212 */
2213 if (data->flags & NFS_MOUNT_NOAC)
2214 *flags |= MS_SYNCHRONOUS;
2215
48b605f8
JL
2216 /* compare new mount options with old ones */
2217 error = nfs_compare_remount_data(nfss, data);
2218out:
2219 kfree(data);
2220 return error;
2221}
89d77c8f 2222EXPORT_SYMBOL_GPL(nfs_remount);
48b605f8 2223
f7b422b1 2224/*
54ceac45 2225 * Initialise the common bits of the superblock
f7b422b1 2226 */
fbdefd64 2227inline void nfs_initialise_sb(struct super_block *sb)
f7b422b1 2228{
54ceac45 2229 struct nfs_server *server = NFS_SB(sb);
5006a76c 2230
54ceac45 2231 sb->s_magic = NFS_SUPER_MAGIC;
f7b422b1 2232
54ceac45
DH
2233 /* We probably want something more informative here */
2234 snprintf(sb->s_id, sizeof(sb->s_id),
5a7c9eec 2235 "%u:%u", MAJOR(sb->s_dev), MINOR(sb->s_dev));
5006a76c 2236
54ceac45
DH
2237 if (sb->s_blocksize == 0)
2238 sb->s_blocksize = nfs_block_bits(server->wsize,
2239 &sb->s_blocksize_bits);
f7b422b1 2240
32a88aa1
JA
2241 sb->s_bdi = &server->backing_dev_info;
2242
54ceac45 2243 nfs_super_set_maxbytes(sb, server->maxfilesize);
f7b422b1
DH
2244}
2245
2246/*
54ceac45 2247 * Finish setting up an NFS2/3 superblock
f7b422b1 2248 */
fbdefd64 2249void nfs_fill_super(struct super_block *sb, struct nfs_mount_info *mount_info)
f7b422b1 2250{
c40f8d1d 2251 struct nfs_parsed_mount_data *data = mount_info->parsed;
f7b422b1 2252 struct nfs_server *server = NFS_SB(sb);
5006a76c 2253
54ceac45
DH
2254 sb->s_blocksize_bits = 0;
2255 sb->s_blocksize = 0;
6a74490d
BS
2256 sb->s_xattr = server->nfs_client->cl_nfs_mod->xattr;
2257 sb->s_op = server->nfs_client->cl_nfs_mod->sops;
2258 if (data && data->bsize)
54ceac45 2259 sb->s_blocksize = nfs_block_size(data->bsize, &sb->s_blocksize_bits);
f7b422b1 2260
6a74490d 2261 if (server->nfs_client->rpc_ops->version != 2) {
54ceac45
DH
2262 /* The VFS shouldn't apply the umask to mode bits. We will do
2263 * so ourselves when necessary.
2264 */
2265 sb->s_flags |= MS_POSIXACL;
2266 sb->s_time_gran = 1;
816724e6 2267 }
54ceac45 2268
54ceac45 2269 nfs_initialise_sb(sb);
f7b422b1 2270}
89d77c8f 2271EXPORT_SYMBOL_GPL(nfs_fill_super);
f7b422b1
DH
2272
2273/*
3cadf4b8 2274 * Finish setting up a cloned NFS2/3/4 superblock
f7b422b1 2275 */
fbdefd64 2276void nfs_clone_super(struct super_block *sb, struct nfs_mount_info *mount_info)
f7b422b1 2277{
8c958e0c 2278 const struct super_block *old_sb = mount_info->cloned->sb;
54ceac45
DH
2279 struct nfs_server *server = NFS_SB(sb);
2280
2281 sb->s_blocksize_bits = old_sb->s_blocksize_bits;
2282 sb->s_blocksize = old_sb->s_blocksize;
2283 sb->s_maxbytes = old_sb->s_maxbytes;
3cadf4b8
BS
2284 sb->s_xattr = old_sb->s_xattr;
2285 sb->s_op = old_sb->s_op;
2286 sb->s_time_gran = 1;
f7b422b1 2287
3cadf4b8 2288 if (server->nfs_client->rpc_ops->version != 2) {
54ceac45
DH
2289 /* The VFS shouldn't apply the umask to mode bits. We will do
2290 * so ourselves when necessary.
f7b422b1
DH
2291 */
2292 sb->s_flags |= MS_POSIXACL;
f7b422b1
DH
2293 }
2294
54ceac45 2295 nfs_initialise_sb(sb);
f7b422b1
DH
2296}
2297
275a5d24
TM
2298static int nfs_compare_mount_options(const struct super_block *s, const struct nfs_server *b, int flags)
2299{
2300 const struct nfs_server *a = s->s_fs_info;
2301 const struct rpc_clnt *clnt_a = a->client;
2302 const struct rpc_clnt *clnt_b = b->client;
2303
2304 if ((s->s_flags & NFS_MS_MASK) != (flags & NFS_MS_MASK))
2305 goto Ebusy;
2306 if (a->nfs_client != b->nfs_client)
2307 goto Ebusy;
2308 if (a->flags != b->flags)
2309 goto Ebusy;
2310 if (a->wsize != b->wsize)
2311 goto Ebusy;
2312 if (a->rsize != b->rsize)
2313 goto Ebusy;
2314 if (a->acregmin != b->acregmin)
2315 goto Ebusy;
2316 if (a->acregmax != b->acregmax)
2317 goto Ebusy;
2318 if (a->acdirmin != b->acdirmin)
2319 goto Ebusy;
2320 if (a->acdirmax != b->acdirmax)
2321 goto Ebusy;
2322 if (clnt_a->cl_auth->au_flavor != clnt_b->cl_auth->au_flavor)
2323 goto Ebusy;
e89a5a43 2324 return 1;
275a5d24 2325Ebusy:
e89a5a43
TM
2326 return 0;
2327}
2328
2329struct nfs_sb_mountdata {
2330 struct nfs_server *server;
2331 int mntflags;
2332};
2333
2334static int nfs_set_super(struct super_block *s, void *data)
2335{
2336 struct nfs_sb_mountdata *sb_mntdata = data;
2337 struct nfs_server *server = sb_mntdata->server;
2338 int ret;
2339
2340 s->s_flags = sb_mntdata->mntflags;
2341 s->s_fs_info = server;
8b244ff2 2342 s->s_d_op = server->nfs_client->rpc_ops->dentry_ops;
e89a5a43
TM
2343 ret = set_anon_super(s, server);
2344 if (ret == 0)
2345 server->s_dev = s->s_dev;
2346 return ret;
2347}
2348
fd00a8ff
CL
2349static int nfs_compare_super_address(struct nfs_server *server1,
2350 struct nfs_server *server2)
2351{
2352 struct sockaddr *sap1, *sap2;
2353
2354 sap1 = (struct sockaddr *)&server1->nfs_client->cl_addr;
2355 sap2 = (struct sockaddr *)&server2->nfs_client->cl_addr;
2356
2357 if (sap1->sa_family != sap2->sa_family)
2358 return 0;
2359
2360 switch (sap1->sa_family) {
2361 case AF_INET: {
2362 struct sockaddr_in *sin1 = (struct sockaddr_in *)sap1;
2363 struct sockaddr_in *sin2 = (struct sockaddr_in *)sap2;
2364 if (sin1->sin_addr.s_addr != sin2->sin_addr.s_addr)
2365 return 0;
2366 if (sin1->sin_port != sin2->sin_port)
2367 return 0;
2368 break;
2369 }
2370 case AF_INET6: {
2371 struct sockaddr_in6 *sin1 = (struct sockaddr_in6 *)sap1;
2372 struct sockaddr_in6 *sin2 = (struct sockaddr_in6 *)sap2;
2373 if (!ipv6_addr_equal(&sin1->sin6_addr, &sin2->sin6_addr))
2374 return 0;
2375 if (sin1->sin6_port != sin2->sin6_port)
2376 return 0;
2377 break;
2378 }
2379 default:
2380 return 0;
2381 }
2382
2383 return 1;
2384}
2385
e89a5a43
TM
2386static int nfs_compare_super(struct super_block *sb, void *data)
2387{
2388 struct nfs_sb_mountdata *sb_mntdata = data;
2389 struct nfs_server *server = sb_mntdata->server, *old = NFS_SB(sb);
2390 int mntflags = sb_mntdata->mntflags;
2391
fd00a8ff 2392 if (!nfs_compare_super_address(old, server))
e89a5a43
TM
2393 return 0;
2394 /* Note: NFS_MOUNT_UNSHARED == NFS4_MOUNT_UNSHARED */
2395 if (old->flags & NFS_MOUNT_UNSHARED)
2396 return 0;
2397 if (memcmp(&old->fsid, &server->fsid, sizeof(old->fsid)) != 0)
2398 return 0;
2399 return nfs_compare_mount_options(sb, server, mntflags);
275a5d24
TM
2400}
2401
39ffb921 2402#ifdef CONFIG_NFS_FSCACHE
2311b943
BS
2403static void nfs_get_cache_cookie(struct super_block *sb,
2404 struct nfs_parsed_mount_data *parsed,
2405 struct nfs_clone_mount *cloned)
2406{
c4271c6e 2407 struct nfs_server *nfss = NFS_SB(sb);
2311b943
BS
2408 char *uniq = NULL;
2409 int ulen = 0;
2410
c4271c6e
TM
2411 nfss->fscache_key = NULL;
2412 nfss->fscache = NULL;
2413
2414 if (parsed) {
2415 if (!(parsed->options & NFS_OPTION_FSCACHE))
2416 return;
2417 if (parsed->fscache_uniq) {
2418 uniq = parsed->fscache_uniq;
2419 ulen = strlen(parsed->fscache_uniq);
2420 }
2311b943
BS
2421 } else if (cloned) {
2422 struct nfs_server *mnt_s = NFS_SB(cloned->sb);
c4271c6e
TM
2423 if (!(mnt_s->options & NFS_OPTION_FSCACHE))
2424 return;
2311b943
BS
2425 if (mnt_s->fscache_key) {
2426 uniq = mnt_s->fscache_key->key.uniquifier;
2427 ulen = mnt_s->fscache_key->key.uniq_len;
2428 };
c4271c6e
TM
2429 } else
2430 return;
2311b943
BS
2431
2432 nfs_fscache_get_super_cookie(sb, uniq, ulen);
2433}
39ffb921
TM
2434#else
2435static void nfs_get_cache_cookie(struct super_block *sb,
2436 struct nfs_parsed_mount_data *parsed,
2437 struct nfs_clone_mount *cloned)
2438{
2439}
2440#endif
2311b943 2441
fa799759
MS
2442static int nfs_bdi_register(struct nfs_server *server)
2443{
2444 return bdi_register_dev(&server->backing_dev_info, server->s_dev);
2445}
2446
fbdefd64
BS
2447int nfs_set_sb_security(struct super_block *s, struct dentry *mntroot,
2448 struct nfs_mount_info *mount_info)
3d176e3f 2449{
aa9c2669
DQ
2450 int error;
2451 unsigned long kflags = 0, kflags_out = 0;
2452 if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL)
2453 kflags |= SECURITY_LSM_NATIVE_LABELS;
2454
2455 error = security_sb_set_mnt_opts(s, &mount_info->parsed->lsm_opts,
2456 kflags, &kflags_out);
2457 if (error)
2458 goto err;
2459
2460 if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL &&
2461 !(kflags_out & SECURITY_LSM_NATIVE_LABELS))
2462 NFS_SB(s)->caps &= ~NFS_CAP_SECURITY_LABEL;
2463err:
2464 return error;
3d176e3f 2465}
89d77c8f 2466EXPORT_SYMBOL_GPL(nfs_set_sb_security);
3d176e3f 2467
fbdefd64
BS
2468int nfs_clone_sb_security(struct super_block *s, struct dentry *mntroot,
2469 struct nfs_mount_info *mount_info)
3d176e3f
BS
2470{
2471 /* clone any lsm security options from the parent to the new sb */
3d176e3f
BS
2472 if (mntroot->d_inode->i_op != NFS_SB(s)->nfs_client->rpc_ops->dir_inode_ops)
2473 return -ESTALE;
094f7b69 2474 return security_sb_clone_mnt_opts(mount_info->cloned->sb, s);
3d176e3f 2475}
89d77c8f 2476EXPORT_SYMBOL_GPL(nfs_clone_sb_security);
3d176e3f 2477
ab7017a3 2478struct dentry *nfs_fs_mount_common(struct nfs_server *server,
fbdefd64 2479 int flags, const char *dev_name,
ab7017a3
BS
2480 struct nfs_mount_info *mount_info,
2481 struct nfs_subversion *nfs_mod)
f7b422b1 2482{
f7b422b1 2483 struct super_block *s;
01194981 2484 struct dentry *mntroot = ERR_PTR(-ENOMEM);
75180df2 2485 int (*compare_super)(struct super_block *, void *) = nfs_compare_super;
e89a5a43
TM
2486 struct nfs_sb_mountdata sb_mntdata = {
2487 .mntflags = flags,
c40f8d1d 2488 .server = server,
e89a5a43 2489 };
01194981 2490 int error;
33852a1f 2491
75180df2
TM
2492 if (server->flags & NFS_MOUNT_UNSHARED)
2493 compare_super = NULL;
2494
fb2088cc
SP
2495 /* -o noac implies -o sync */
2496 if (server->flags & NFS_MOUNT_NOAC)
2497 sb_mntdata.mntflags |= MS_SYNCHRONOUS;
2498
54ceac45 2499 /* Get a superblock - note that we may end up sharing one that already exists */
ab7017a3 2500 s = sget(nfs_mod->nfs_fs, compare_super, nfs_set_super, flags, &sb_mntdata);
816724e6 2501 if (IS_ERR(s)) {
01194981 2502 mntroot = ERR_CAST(s);
54ceac45 2503 goto out_err_nosb;
816724e6
TM
2504 }
2505
54ceac45
DH
2506 if (s->s_fs_info != server) {
2507 nfs_free_server(server);
2508 server = NULL;
fa799759
MS
2509 } else {
2510 error = nfs_bdi_register(server);
01194981
AV
2511 if (error) {
2512 mntroot = ERR_PTR(error);
cfbc0683 2513 goto error_splat_bdi;
01194981 2514 }
54ceac45 2515 }
f7b422b1 2516
54ceac45
DH
2517 if (!s->s_root) {
2518 /* initial superblock/root creation */
c40f8d1d 2519 mount_info->fill_super(s, mount_info);
3d176e3f 2520 nfs_get_cache_cookie(s, mount_info->parsed, mount_info->cloned);
54ceac45 2521 }
f7b422b1 2522
87c7083d 2523 mntroot = nfs_get_root(s, mount_info->mntfh, dev_name);
01194981 2524 if (IS_ERR(mntroot))
54ceac45 2525 goto error_splat_super;
816724e6 2526
3d176e3f 2527 error = mount_info->set_security(s, mntroot, mount_info);
f9c3a380
EP
2528 if (error)
2529 goto error_splat_root;
2530
54ceac45 2531 s->s_flags |= MS_ACTIVE;
0655960f
CL
2532
2533out:
01194981 2534 return mntroot;
816724e6 2535
54ceac45
DH
2536out_err_nosb:
2537 nfs_free_server(server);
0655960f 2538 goto out;
54ceac45 2539
f9c3a380
EP
2540error_splat_root:
2541 dput(mntroot);
01194981 2542 mntroot = ERR_PTR(error);
54ceac45 2543error_splat_super:
cfbc0683
N
2544 if (server && !s->s_root)
2545 bdi_unregister(&server->backing_dev_info);
2546error_splat_bdi:
6f5bbff9 2547 deactivate_locked_super(s);
0655960f 2548 goto out;
f7b422b1 2549}
89d77c8f 2550EXPORT_SYMBOL_GPL(nfs_fs_mount_common);
f7b422b1 2551
fbdefd64 2552struct dentry *nfs_fs_mount(struct file_system_type *fs_type,
c40f8d1d
BS
2553 int flags, const char *dev_name, void *raw_data)
2554{
c40f8d1d
BS
2555 struct nfs_mount_info mount_info = {
2556 .fill_super = nfs_fill_super,
3d176e3f 2557 .set_security = nfs_set_sb_security,
c40f8d1d 2558 };
c40f8d1d 2559 struct dentry *mntroot = ERR_PTR(-ENOMEM);
ab7017a3 2560 struct nfs_subversion *nfs_mod;
c40f8d1d
BS
2561 int error;
2562
46058d46 2563 mount_info.parsed = nfs_alloc_parsed_mount_data();
87c7083d
BS
2564 mount_info.mntfh = nfs_alloc_fhandle();
2565 if (mount_info.parsed == NULL || mount_info.mntfh == NULL)
c40f8d1d
BS
2566 goto out;
2567
2568 /* Validate the mount data */
87c7083d 2569 error = nfs_validate_mount_data(fs_type, raw_data, mount_info.parsed, mount_info.mntfh, dev_name);
b72e4f42 2570 if (error == NFS_TEXT_DATA)
46058d46 2571 error = nfs_validate_text_mount_data(raw_data, mount_info.parsed, dev_name);
c40f8d1d
BS
2572 if (error < 0) {
2573 mntroot = ERR_PTR(error);
2574 goto out;
2575 }
c40f8d1d 2576
ab7017a3
BS
2577 nfs_mod = get_nfs_version(mount_info.parsed->version);
2578 if (IS_ERR(nfs_mod)) {
2579 mntroot = ERR_CAST(nfs_mod);
2580 goto out;
2581 }
2582
ff9099f2 2583 mntroot = nfs_mod->rpc_ops->try_mount(flags, dev_name, &mount_info, nfs_mod);
ab7017a3
BS
2584
2585 put_nfs_version(nfs_mod);
c40f8d1d 2586out:
46058d46 2587 nfs_free_parsed_mount_data(mount_info.parsed);
87c7083d 2588 nfs_free_fhandle(mount_info.mntfh);
c40f8d1d
BS
2589 return mntroot;
2590}
89d77c8f 2591EXPORT_SYMBOL_GPL(nfs_fs_mount);
c40f8d1d 2592
387c149b
TM
2593/*
2594 * Ensure that we unregister the bdi before kill_anon_super
2595 * releases the device name
2596 */
fbdefd64 2597void nfs_put_super(struct super_block *s)
387c149b
TM
2598{
2599 struct nfs_server *server = NFS_SB(s);
2600
2601 bdi_unregister(&server->backing_dev_info);
2602}
89d77c8f 2603EXPORT_SYMBOL_GPL(nfs_put_super);
387c149b 2604
54ceac45
DH
2605/*
2606 * Destroy an NFS2/3 superblock
2607 */
fbdefd64 2608void nfs_kill_super(struct super_block *s)
f7b422b1
DH
2609{
2610 struct nfs_server *server = NFS_SB(s);
2611
2612 kill_anon_super(s);
08734048 2613 nfs_fscache_release_super_cookie(s);
54ceac45 2614 nfs_free_server(server);
f7b422b1 2615}
89d77c8f 2616EXPORT_SYMBOL_GPL(nfs_kill_super);
f7b422b1 2617
54ceac45 2618/*
8c958e0c 2619 * Clone an NFS2/3/4 server record on xdev traversal (FSID-change)
54ceac45 2620 */
3dd4f8ef 2621static struct dentry *
e8f25e6d
BS
2622nfs_xdev_mount(struct file_system_type *fs_type, int flags,
2623 const char *dev_name, void *raw_data)
f7b422b1 2624{
e8f25e6d
BS
2625 struct nfs_clone_mount *data = raw_data;
2626 struct nfs_mount_info mount_info = {
2627 .fill_super = nfs_clone_super,
2628 .set_security = nfs_clone_sb_security,
2629 .cloned = data,
2630 };
54ceac45 2631 struct nfs_server *server;
3d176e3f 2632 struct dentry *mntroot = ERR_PTR(-ENOMEM);
ab7017a3 2633 struct nfs_subversion *nfs_mod = NFS_SB(data->sb)->nfs_client->cl_nfs_mod;
f7b422b1 2634
dee972b9 2635 dprintk("--> nfs_xdev_mount()\n");
f7b422b1 2636
e8f25e6d 2637 mount_info.mntfh = mount_info.cloned->fh;
87c7083d 2638
54ceac45 2639 /* create a new volume representation */
1179acc6 2640 server = nfs_mod->rpc_ops->clone_server(NFS_SB(data->sb), data->fh, data->fattr, data->authflavor);
f7b422b1 2641
dee972b9
TM
2642 if (IS_ERR(server))
2643 mntroot = ERR_CAST(server);
2644 else
2645 mntroot = nfs_fs_mount_common(server, flags,
2646 dev_name, &mount_info, nfs_mod);
24c8dbbb 2647
dee972b9
TM
2648 dprintk("<-- nfs_xdev_mount() = %ld\n",
2649 IS_ERR(mntroot) ? PTR_ERR(mntroot) : 0L);
2650 return mntroot;
f7b422b1
DH
2651}
2652
89d77c8f 2653#if IS_ENABLED(CONFIG_NFS_V4)
54ceac45 2654
01c3f052
TM
2655static void nfs4_validate_mount_flags(struct nfs_parsed_mount_data *args)
2656{
5eebde23
SJ
2657 args->flags &= ~(NFS_MOUNT_NONLM|NFS_MOUNT_NOACL|NFS_MOUNT_VER3|
2658 NFS_MOUNT_LOCAL_FLOCK|NFS_MOUNT_LOCAL_FCNTL);
01c3f052
TM
2659}
2660
f0768ebd
CL
2661/*
2662 * Validate NFSv4 mount options
2663 */
91ea40b9
TT
2664static int nfs4_validate_mount_data(void *options,
2665 struct nfs_parsed_mount_data *args,
2666 const char *dev_name)
f0768ebd 2667{
4cfd74fc 2668 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
91ea40b9 2669 struct nfs4_mount_data *data = (struct nfs4_mount_data *)options;
f0768ebd
CL
2670 char *c;
2671
2672 if (data == NULL)
2673 goto out_no_data;
2674
cdf66442
BS
2675 args->version = 4;
2676
f0768ebd
CL
2677 switch (data->version) {
2678 case 1:
4c568017
CL
2679 if (data->host_addrlen > sizeof(args->nfs_server.address))
2680 goto out_no_address;
2681 if (data->host_addrlen == 0)
f0768ebd 2682 goto out_no_address;
4c568017 2683 args->nfs_server.addrlen = data->host_addrlen;
4cfd74fc 2684 if (copy_from_user(sap, data->host_addr, data->host_addrlen))
f0768ebd 2685 return -EFAULT;
4cfd74fc 2686 if (!nfs_verify_server_address(sap))
f0768ebd 2687 goto out_no_address;
872ece86 2688 args->nfs_server.port = ntohs(((struct sockaddr_in *)sap)->sin_port);
f0768ebd 2689
6738b251 2690 if (data->auth_flavourlen) {
74c98811 2691 rpc_authflavor_t pseudoflavor;
6738b251
CL
2692 if (data->auth_flavourlen > 1)
2693 goto out_inval_auth;
74c98811 2694 if (copy_from_user(&pseudoflavor,
91ea40b9 2695 data->auth_flavours,
74c98811 2696 sizeof(pseudoflavor)))
f0768ebd 2697 return -EFAULT;
74c98811
TM
2698 nfs_set_auth_parsed_mount_data(args, pseudoflavor);
2699 } else
2700 nfs_set_auth_parsed_mount_data(args, RPC_AUTH_UNIX);
f0768ebd
CL
2701
2702 c = strndup_user(data->hostname.data, NFS4_MAXNAMLEN);
2703 if (IS_ERR(c))
2704 return PTR_ERR(c);
91ea40b9 2705 args->nfs_server.hostname = c;
f0768ebd
CL
2706
2707 c = strndup_user(data->mnt_path.data, NFS4_MAXPATHLEN);
2708 if (IS_ERR(c))
2709 return PTR_ERR(c);
91ea40b9
TT
2710 args->nfs_server.export_path = c;
2711 dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", c);
f0768ebd
CL
2712
2713 c = strndup_user(data->client_addr.data, 16);
2714 if (IS_ERR(c))
2715 return PTR_ERR(c);
91ea40b9
TT
2716 args->client_address = c;
2717
2718 /*
2719 * Translate to nfs_parsed_mount_data, which nfs4_fill_super
2720 * can deal with.
2721 */
2722
2723 args->flags = data->flags & NFS4_MOUNT_FLAGMASK;
2724 args->rsize = data->rsize;
2725 args->wsize = data->wsize;
2726 args->timeo = data->timeo;
2727 args->retrans = data->retrans;
2728 args->acregmin = data->acregmin;
2729 args->acregmax = data->acregmax;
2730 args->acdirmin = data->acdirmin;
2731 args->acdirmax = data->acdirmax;
2732 args->nfs_server.protocol = data->proto;
259875ef 2733 nfs_validate_transport_protocol(args);
6da1a034
TM
2734 if (args->nfs_server.protocol == XPRT_TRANSPORT_UDP)
2735 goto out_invalid_transport_udp;
f0768ebd
CL
2736
2737 break;
7630c852 2738 default:
b72e4f42 2739 return NFS_TEXT_DATA;
f0768ebd
CL
2740 }
2741
2742 return 0;
2743
2744out_no_data:
2745 dfprintk(MOUNT, "NFS4: mount program didn't pass any mount data\n");
2746 return -EINVAL;
2747
2748out_inval_auth:
2749 dfprintk(MOUNT, "NFS4: Invalid number of RPC auth flavours %d\n",
2750 data->auth_flavourlen);
2751 return -EINVAL;
2752
2753out_no_address:
2754 dfprintk(MOUNT, "NFS4: mount program didn't pass remote address\n");
2755 return -EINVAL;
6da1a034
TM
2756
2757out_invalid_transport_udp:
2758 dfprintk(MOUNT, "NFSv4: Unsupported transport protocol udp\n");
2759 return -EINVAL;
f0768ebd
CL
2760}
2761
fac1e8e4
BS
2762/*
2763 * NFS v4 module parameters need to stay in the
2764 * NFS client for backwards compatibility
2765 */
2766unsigned int nfs_callback_set_tcpport;
2767unsigned short nfs_callback_tcpport;
2768/* Default cache timeout is 10 minutes */
2769unsigned int nfs_idmap_cache_timeout = 600;
2770/* Turn off NFSv4 uid/gid mapping when using AUTH_SYS */
2771bool nfs4_disable_idmapping = true;
2772unsigned short max_session_slots = NFS4_DEF_SLOT_TABLE_SIZE;
2773unsigned short send_implementation_id = 1;
6f2ea7f2 2774char nfs4_client_id_uniquifier[NFS4_CLIENT_ID_UNIQ_LEN] = "";
f6de7a39 2775bool recover_lost_locks = false;
fac1e8e4 2776
89d77c8f
BS
2777EXPORT_SYMBOL_GPL(nfs_callback_set_tcpport);
2778EXPORT_SYMBOL_GPL(nfs_callback_tcpport);
2779EXPORT_SYMBOL_GPL(nfs_idmap_cache_timeout);
2780EXPORT_SYMBOL_GPL(nfs4_disable_idmapping);
2781EXPORT_SYMBOL_GPL(max_session_slots);
2782EXPORT_SYMBOL_GPL(send_implementation_id);
6f2ea7f2 2783EXPORT_SYMBOL_GPL(nfs4_client_id_uniquifier);
f6de7a39 2784EXPORT_SYMBOL_GPL(recover_lost_locks);
89d77c8f 2785
fac1e8e4
BS
2786#define NFS_CALLBACK_MAXPORTNR (65535U)
2787
2788static int param_set_portnr(const char *val, const struct kernel_param *kp)
2789{
2790 unsigned long num;
2791 int ret;
2792
2793 if (!val)
2794 return -EINVAL;
7297cb68 2795 ret = kstrtoul(val, 0, &num);
fac1e8e4
BS
2796 if (ret == -EINVAL || num > NFS_CALLBACK_MAXPORTNR)
2797 return -EINVAL;
2798 *((unsigned int *)kp->arg) = num;
2799 return 0;
2800}
2801static struct kernel_param_ops param_ops_portnr = {
2802 .set = param_set_portnr,
2803 .get = param_get_uint,
2804};
2805#define param_check_portnr(name, p) __param_check(name, p, unsigned int);
2806
2807module_param_named(callback_tcpport, nfs_callback_set_tcpport, portnr, 0644);
2808module_param(nfs_idmap_cache_timeout, int, 0644);
2809module_param(nfs4_disable_idmapping, bool, 0644);
6f2ea7f2
CL
2810module_param_string(nfs4_unique_id, nfs4_client_id_uniquifier,
2811 NFS4_CLIENT_ID_UNIQ_LEN, 0600);
fac1e8e4
BS
2812MODULE_PARM_DESC(nfs4_disable_idmapping,
2813 "Turn off NFSv4 idmapping when using 'sec=sys'");
2814module_param(max_session_slots, ushort, 0644);
2815MODULE_PARM_DESC(max_session_slots, "Maximum number of outstanding NFSv4.1 "
2816 "requests the client will negotiate");
2817module_param(send_implementation_id, ushort, 0644);
2818MODULE_PARM_DESC(send_implementation_id,
2819 "Send implementation ID with NFSv4.1 exchange_id");
6f2ea7f2 2820MODULE_PARM_DESC(nfs4_unique_id, "nfs_client_id4 uniquifier string");
425e776d 2821
f6de7a39
TM
2822module_param(recover_lost_locks, bool, 0644);
2823MODULE_PARM_DESC(recover_lost_locks,
2824 "If the server reports that a lock might be lost, "
2825 "try to recover it risking data corruption.");
2826
2827
54ceac45 2828#endif /* CONFIG_NFS_V4 */