]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - fs/nfs/super.c
NFSv4.1: Ensure that we free the lock stateid on the server
[mirror_ubuntu-bionic-kernel.git] / fs / nfs / super.c
CommitLineData
f7b422b1
DH
1/*
2 * linux/fs/nfs/super.c
3 *
4 * Copyright (C) 1992 Rick Sladkey
5 *
6 * nfs superblock handling functions
7 *
526719ba 8 * Modularised by Alan Cox <alan@lxorguk.ukuu.org.uk>, while hacking some
f7b422b1
DH
9 * experimental NFS changes. Modularisation taken straight from SYS5 fs.
10 *
11 * Change to nfs_read_super() to permit NFS mounts to multi-homed hosts.
12 * J.S.Peatfield@damtp.cam.ac.uk
13 *
14 * Split from inode.c by David Howells <dhowells@redhat.com>
15 *
54ceac45
DH
16 * - superblocks are indexed on server only - all inodes, dentries, etc. associated with a
17 * particular server are held in the same superblock
18 * - NFS superblocks can have several effective roots to the dentry tree
19 * - directory type roots are spliced into the tree when a path from one root reaches the root
20 * of another (see nfs_lookup())
f7b422b1
DH
21 */
22
f7b422b1
DH
23#include <linux/module.h>
24#include <linux/init.h>
25
26#include <linux/time.h>
27#include <linux/kernel.h>
28#include <linux/mm.h>
29#include <linux/string.h>
30#include <linux/stat.h>
31#include <linux/errno.h>
32#include <linux/unistd.h>
33#include <linux/sunrpc/clnt.h>
5976687a 34#include <linux/sunrpc/addr.h>
f7b422b1
DH
35#include <linux/sunrpc/stats.h>
36#include <linux/sunrpc/metrics.h>
0896a725 37#include <linux/sunrpc/xprtsock.h>
2cf7ff7a 38#include <linux/sunrpc/xprtrdma.h>
f7b422b1
DH
39#include <linux/nfs_fs.h>
40#include <linux/nfs_mount.h>
41#include <linux/nfs4_mount.h>
42#include <linux/lockd/bind.h>
f7b422b1
DH
43#include <linux/seq_file.h>
44#include <linux/mount.h>
c02d7adf 45#include <linux/namei.h>
f7b422b1
DH
46#include <linux/nfs_idmap.h>
47#include <linux/vfs.h>
48#include <linux/inet.h>
fd00a8ff 49#include <linux/in6.h>
5a0e3ad6 50#include <linux/slab.h>
fd00a8ff 51#include <net/ipv6.h>
d8e7748a 52#include <linux/netdevice.h>
f7b422b1 53#include <linux/nfs_xdr.h>
b5d5dfbd 54#include <linux/magic.h>
bf0fd768 55#include <linux/parser.h>
e50a7a1a 56#include <linux/nsproxy.h>
2446ab60 57#include <linux/rcupdate.h>
f7b422b1 58
f7b422b1
DH
59#include <asm/uaccess.h>
60
61#include "nfs4_fs.h"
62#include "callback.h"
63#include "delegation.h"
64#include "iostat.h"
65#include "internal.h"
08734048 66#include "fscache.h"
76e697ba 67#include "nfs4session.h"
ae50c0b5 68#include "pnfs.h"
ab7017a3 69#include "nfs.h"
f7b422b1
DH
70
71#define NFSDBG_FACILITY NFSDBG_VFS
b72e4f42 72#define NFS_TEXT_DATA 1
f7b422b1 73
1c606fb7 74#if IS_ENABLED(CONFIG_NFS_V3)
1e657bd5
PZ
75#define NFS_DEFAULT_VERSION 3
76#else
77#define NFS_DEFAULT_VERSION 2
78#endif
79
bf0fd768
CL
80enum {
81 /* Mount options that take no arguments */
82 Opt_soft, Opt_hard,
bf0fd768
CL
83 Opt_posix, Opt_noposix,
84 Opt_cto, Opt_nocto,
85 Opt_ac, Opt_noac,
86 Opt_lock, Opt_nolock,
2cf7ff7a 87 Opt_udp, Opt_tcp, Opt_rdma,
bf0fd768
CL
88 Opt_acl, Opt_noacl,
89 Opt_rdirplus, Opt_nordirplus,
75180df2 90 Opt_sharecache, Opt_nosharecache,
d740351b 91 Opt_resvport, Opt_noresvport,
b797cac7 92 Opt_fscache, Opt_nofscache,
89652617 93 Opt_migration, Opt_nomigration,
bf0fd768
CL
94
95 /* Mount options that take integer arguments */
96 Opt_port,
97 Opt_rsize, Opt_wsize, Opt_bsize,
98 Opt_timeo, Opt_retrans,
99 Opt_acregmin, Opt_acregmax,
100 Opt_acdirmin, Opt_acdirmax,
101 Opt_actimeo,
102 Opt_namelen,
103 Opt_mountport,
e887cbcf 104 Opt_mountvers,
3fd5be9e 105 Opt_minorversion,
bf0fd768
CL
106
107 /* Mount options that take string arguments */
0d71b058 108 Opt_nfsvers,
33832034 109 Opt_sec, Opt_proto, Opt_mountproto, Opt_mounthost,
0ac83779 110 Opt_addr, Opt_mountaddr, Opt_clientaddr,
7973c1f1 111 Opt_lookupcache,
b797cac7 112 Opt_fscache_uniq,
5eebde23 113 Opt_local_lock,
bf0fd768 114
f45663ce
CL
115 /* Special mount options */
116 Opt_userspace, Opt_deprecated, Opt_sloppy,
bf0fd768
CL
117
118 Opt_err
119};
120
a447c093 121static const match_table_t nfs_mount_option_tokens = {
bf0fd768
CL
122 { Opt_userspace, "bg" },
123 { Opt_userspace, "fg" },
ecbb3845
CL
124 { Opt_userspace, "retry=%s" },
125
f45663ce
CL
126 { Opt_sloppy, "sloppy" },
127
bf0fd768
CL
128 { Opt_soft, "soft" },
129 { Opt_hard, "hard" },
d33e4dfe
CL
130 { Opt_deprecated, "intr" },
131 { Opt_deprecated, "nointr" },
bf0fd768
CL
132 { Opt_posix, "posix" },
133 { Opt_noposix, "noposix" },
134 { Opt_cto, "cto" },
135 { Opt_nocto, "nocto" },
136 { Opt_ac, "ac" },
137 { Opt_noac, "noac" },
138 { Opt_lock, "lock" },
139 { Opt_nolock, "nolock" },
bf0fd768
CL
140 { Opt_udp, "udp" },
141 { Opt_tcp, "tcp" },
2cf7ff7a 142 { Opt_rdma, "rdma" },
bf0fd768
CL
143 { Opt_acl, "acl" },
144 { Opt_noacl, "noacl" },
145 { Opt_rdirplus, "rdirplus" },
146 { Opt_nordirplus, "nordirplus" },
75180df2
TM
147 { Opt_sharecache, "sharecache" },
148 { Opt_nosharecache, "nosharecache" },
d740351b
CL
149 { Opt_resvport, "resvport" },
150 { Opt_noresvport, "noresvport" },
b797cac7 151 { Opt_fscache, "fsc" },
b797cac7 152 { Opt_nofscache, "nofsc" },
89652617
CL
153 { Opt_migration, "migration" },
154 { Opt_nomigration, "nomigration" },
bf0fd768 155
a5a16bae
CL
156 { Opt_port, "port=%s" },
157 { Opt_rsize, "rsize=%s" },
158 { Opt_wsize, "wsize=%s" },
159 { Opt_bsize, "bsize=%s" },
160 { Opt_timeo, "timeo=%s" },
161 { Opt_retrans, "retrans=%s" },
162 { Opt_acregmin, "acregmin=%s" },
163 { Opt_acregmax, "acregmax=%s" },
164 { Opt_acdirmin, "acdirmin=%s" },
165 { Opt_acdirmax, "acdirmax=%s" },
166 { Opt_actimeo, "actimeo=%s" },
167 { Opt_namelen, "namlen=%s" },
168 { Opt_mountport, "mountport=%s" },
169 { Opt_mountvers, "mountvers=%s" },
0d71b058
TM
170 { Opt_minorversion, "minorversion=%s" },
171
a5a16bae
CL
172 { Opt_nfsvers, "nfsvers=%s" },
173 { Opt_nfsvers, "vers=%s" },
bf0fd768
CL
174
175 { Opt_sec, "sec=%s" },
176 { Opt_proto, "proto=%s" },
177 { Opt_mountproto, "mountproto=%s" },
178 { Opt_addr, "addr=%s" },
179 { Opt_clientaddr, "clientaddr=%s" },
33832034 180 { Opt_mounthost, "mounthost=%s" },
0ac83779 181 { Opt_mountaddr, "mountaddr=%s" },
bf0fd768 182
7973c1f1 183 { Opt_lookupcache, "lookupcache=%s" },
a6d5ff64 184 { Opt_fscache_uniq, "fsc=%s" },
5eebde23 185 { Opt_local_lock, "local_lock=%s" },
7973c1f1 186
3862279a
TM
187 /* The following needs to be listed after all other options */
188 { Opt_nfsvers, "v%s" },
189
bf0fd768
CL
190 { Opt_err, NULL }
191};
192
193enum {
ee671b01 194 Opt_xprt_udp, Opt_xprt_udp6, Opt_xprt_tcp, Opt_xprt_tcp6, Opt_xprt_rdma,
bf0fd768
CL
195
196 Opt_xprt_err
197};
198
a447c093 199static const match_table_t nfs_xprt_protocol_tokens = {
bf0fd768 200 { Opt_xprt_udp, "udp" },
ee671b01 201 { Opt_xprt_udp6, "udp6" },
bf0fd768 202 { Opt_xprt_tcp, "tcp" },
ee671b01 203 { Opt_xprt_tcp6, "tcp6" },
2cf7ff7a 204 { Opt_xprt_rdma, "rdma" },
bf0fd768
CL
205
206 { Opt_xprt_err, NULL }
207};
208
209enum {
210 Opt_sec_none, Opt_sec_sys,
211 Opt_sec_krb5, Opt_sec_krb5i, Opt_sec_krb5p,
212 Opt_sec_lkey, Opt_sec_lkeyi, Opt_sec_lkeyp,
213 Opt_sec_spkm, Opt_sec_spkmi, Opt_sec_spkmp,
214
215 Opt_sec_err
216};
217
a447c093 218static const match_table_t nfs_secflavor_tokens = {
bf0fd768
CL
219 { Opt_sec_none, "none" },
220 { Opt_sec_none, "null" },
221 { Opt_sec_sys, "sys" },
222
223 { Opt_sec_krb5, "krb5" },
224 { Opt_sec_krb5i, "krb5i" },
225 { Opt_sec_krb5p, "krb5p" },
226
227 { Opt_sec_lkey, "lkey" },
228 { Opt_sec_lkeyi, "lkeyi" },
229 { Opt_sec_lkeyp, "lkeyp" },
230
8d042218
OK
231 { Opt_sec_spkm, "spkm3" },
232 { Opt_sec_spkmi, "spkm3i" },
233 { Opt_sec_spkmp, "spkm3p" },
234
bf0fd768
CL
235 { Opt_sec_err, NULL }
236};
237
7973c1f1
TM
238enum {
239 Opt_lookupcache_all, Opt_lookupcache_positive,
240 Opt_lookupcache_none,
241
242 Opt_lookupcache_err
243};
244
245static match_table_t nfs_lookupcache_tokens = {
246 { Opt_lookupcache_all, "all" },
247 { Opt_lookupcache_positive, "pos" },
248 { Opt_lookupcache_positive, "positive" },
249 { Opt_lookupcache_none, "none" },
250
251 { Opt_lookupcache_err, NULL }
252};
253
5eebde23
SJ
254enum {
255 Opt_local_lock_all, Opt_local_lock_flock, Opt_local_lock_posix,
256 Opt_local_lock_none,
257
258 Opt_local_lock_err
259};
260
261static match_table_t nfs_local_lock_tokens = {
262 { Opt_local_lock_all, "all" },
263 { Opt_local_lock_flock, "flock" },
264 { Opt_local_lock_posix, "posix" },
265 { Opt_local_lock_none, "none" },
266
267 { Opt_local_lock_err, NULL }
268};
269
0d71b058
TM
270enum {
271 Opt_vers_2, Opt_vers_3, Opt_vers_4, Opt_vers_4_0,
272 Opt_vers_4_1,
273
274 Opt_vers_err
275};
276
277static match_table_t nfs_vers_tokens = {
278 { Opt_vers_2, "2" },
279 { Opt_vers_3, "3" },
280 { Opt_vers_4, "4" },
281 { Opt_vers_4_0, "4.0" },
282 { Opt_vers_4_1, "4.1" },
283
284 { Opt_vers_err, NULL }
285};
bf0fd768 286
31f43471
AV
287static struct dentry *nfs_xdev_mount(struct file_system_type *fs_type,
288 int flags, const char *dev_name, void *raw_data);
f7b422b1 289
ab7017a3 290struct file_system_type nfs_fs_type = {
f7b422b1
DH
291 .owner = THIS_MODULE,
292 .name = "nfs",
01194981 293 .mount = nfs_fs_mount,
f7b422b1 294 .kill_sb = nfs_kill_super,
ecf3d1f1 295 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
f7b422b1 296};
ddda8e0a 297EXPORT_SYMBOL_GPL(nfs_fs_type);
f7b422b1 298
54ceac45 299struct file_system_type nfs_xdev_fs_type = {
f7b422b1
DH
300 .owner = THIS_MODULE,
301 .name = "nfs",
31f43471 302 .mount = nfs_xdev_mount,
f7b422b1 303 .kill_sb = nfs_kill_super,
ecf3d1f1 304 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
f7b422b1
DH
305};
306
6a74490d 307const struct super_operations nfs_sops = {
f7b422b1
DH
308 .alloc_inode = nfs_alloc_inode,
309 .destroy_inode = nfs_destroy_inode,
310 .write_inode = nfs_write_inode,
eed99357 311 .drop_inode = nfs_drop_inode,
387c149b 312 .put_super = nfs_put_super,
f7b422b1 313 .statfs = nfs_statfs,
b57922d9 314 .evict_inode = nfs_evict_inode,
f7b422b1
DH
315 .umount_begin = nfs_umount_begin,
316 .show_options = nfs_show_options,
c7f404b4
AV
317 .show_devname = nfs_show_devname,
318 .show_path = nfs_show_path,
f7b422b1 319 .show_stats = nfs_show_stats,
48b605f8 320 .remount_fs = nfs_remount,
f7b422b1 321};
ddda8e0a 322EXPORT_SYMBOL_GPL(nfs_sops);
f7b422b1 323
89d77c8f 324#if IS_ENABLED(CONFIG_NFS_V4)
b72e4f42 325static void nfs4_validate_mount_flags(struct nfs_parsed_mount_data *);
d72c727c
BS
326static int nfs4_validate_mount_data(void *options,
327 struct nfs_parsed_mount_data *args, const char *dev_name);
1ae811ee 328
329struct file_system_type nfs4_fs_type = {
330 .owner = THIS_MODULE,
331 .name = "nfs4",
332 .mount = nfs_fs_mount,
333 .kill_sb = nfs_kill_super,
ecf3d1f1 334 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
1ae811ee 335};
336EXPORT_SYMBOL_GPL(nfs4_fs_type);
337
338static int __init register_nfs4_fs(void)
339{
340 return register_filesystem(&nfs4_fs_type);
341}
342
343static void unregister_nfs4_fs(void)
344{
345 unregister_filesystem(&nfs4_fs_type);
346}
347#else
348static int __init register_nfs4_fs(void)
349{
350 return 0;
351}
352
353static void unregister_nfs4_fs(void)
354{
355}
f7b422b1
DH
356#endif
357
8e1f936b
RR
358static struct shrinker acl_shrinker = {
359 .shrink = nfs_access_cache_shrinker,
360 .seeks = DEFAULT_SEEKS,
361};
979df72e 362
f7b422b1
DH
363/*
364 * Register the NFS filesystems
365 */
366int __init register_nfs_fs(void)
367{
368 int ret;
369
370 ret = register_filesystem(&nfs_fs_type);
371 if (ret < 0)
372 goto error_0;
373
1ae811ee 374 ret = register_nfs4_fs();
f7b422b1
DH
375 if (ret < 0)
376 goto error_1;
1ae811ee 377
378 ret = nfs_register_sysctl();
379 if (ret < 0)
380 goto error_2;
8e1f936b 381 register_shrinker(&acl_shrinker);
f7b422b1
DH
382 return 0;
383
1ae811ee 384error_2:
385 unregister_nfs4_fs();
f7b422b1
DH
386error_1:
387 unregister_filesystem(&nfs_fs_type);
f7b422b1
DH
388error_0:
389 return ret;
390}
391
392/*
393 * Unregister the NFS filesystems
394 */
395void __exit unregister_nfs_fs(void)
396{
8e1f936b 397 unregister_shrinker(&acl_shrinker);
49af7ee1 398 nfs_unregister_sysctl();
1ae811ee 399 unregister_nfs4_fs();
f7b422b1
DH
400 unregister_filesystem(&nfs_fs_type);
401}
402
1daef0a8 403void nfs_sb_active(struct super_block *sb)
ef818a28 404{
1daef0a8 405 struct nfs_server *server = NFS_SB(sb);
ef818a28 406
1daef0a8
TM
407 if (atomic_inc_return(&server->active) == 1)
408 atomic_inc(&sb->s_active);
ef818a28 409}
89d77c8f 410EXPORT_SYMBOL_GPL(nfs_sb_active);
ef818a28 411
1daef0a8 412void nfs_sb_deactive(struct super_block *sb)
ef818a28
SD
413{
414 struct nfs_server *server = NFS_SB(sb);
1daef0a8
TM
415
416 if (atomic_dec_and_test(&server->active))
417 deactivate_super(sb);
ef818a28 418}
89d77c8f 419EXPORT_SYMBOL_GPL(nfs_sb_deactive);
ef818a28 420
f7b422b1
DH
421/*
422 * Deliver file system statistics to userspace
423 */
fbdefd64 424int nfs_statfs(struct dentry *dentry, struct kstatfs *buf)
f7b422b1 425{
0c7d90cf 426 struct nfs_server *server = NFS_SB(dentry->d_sb);
f7b422b1
DH
427 unsigned char blockbits;
428 unsigned long blockres;
0c7d90cf 429 struct nfs_fh *fh = NFS_FH(dentry->d_inode);
ca7e9a0d
TM
430 struct nfs_fsstat res;
431 int error = -ENOMEM;
432
433 res.fattr = nfs_alloc_fattr();
434 if (res.fattr == NULL)
435 goto out_err;
f7b422b1 436
8fa5c000 437 error = server->nfs_client->rpc_ops->statfs(server, fh, &res);
fbf3fdd2
MZ
438 if (unlikely(error == -ESTALE)) {
439 struct dentry *pd_dentry;
440
441 pd_dentry = dget_parent(dentry);
442 if (pd_dentry != NULL) {
443 nfs_zap_caches(pd_dentry->d_inode);
444 dput(pd_dentry);
445 }
446 }
ca7e9a0d 447 nfs_free_fattr(res.fattr);
f7b422b1
DH
448 if (error < 0)
449 goto out_err;
ca7e9a0d 450
1a0ba9ae 451 buf->f_type = NFS_SUPER_MAGIC;
f7b422b1
DH
452
453 /*
454 * Current versions of glibc do not correctly handle the
455 * case where f_frsize != f_bsize. Eventually we want to
456 * report the value of wtmult in this field.
457 */
0c7d90cf 458 buf->f_frsize = dentry->d_sb->s_blocksize;
f7b422b1
DH
459
460 /*
461 * On most *nix systems, f_blocks, f_bfree, and f_bavail
462 * are reported in units of f_frsize. Linux hasn't had
463 * an f_frsize field in its statfs struct until recently,
464 * thus historically Linux's sys_statfs reports these
465 * fields in units of f_bsize.
466 */
0c7d90cf
DH
467 buf->f_bsize = dentry->d_sb->s_blocksize;
468 blockbits = dentry->d_sb->s_blocksize_bits;
f7b422b1
DH
469 blockres = (1 << blockbits) - 1;
470 buf->f_blocks = (res.tbytes + blockres) >> blockbits;
471 buf->f_bfree = (res.fbytes + blockres) >> blockbits;
472 buf->f_bavail = (res.abytes + blockres) >> blockbits;
473
474 buf->f_files = res.tfiles;
475 buf->f_ffree = res.afiles;
476
477 buf->f_namelen = server->namelen;
1a0ba9ae 478
f7b422b1
DH
479 return 0;
480
481 out_err:
3110ff80 482 dprintk("%s: statfs error = %d\n", __func__, -error);
1a0ba9ae 483 return error;
f7b422b1 484}
89d77c8f 485EXPORT_SYMBOL_GPL(nfs_statfs);
f7b422b1 486
7d4e2747
DH
487/*
488 * Map the security flavour number to a name
489 */
81039f1f
TM
490static const char *nfs_pseudoflavour_to_name(rpc_authflavor_t flavour)
491{
7d4e2747 492 static const struct {
81039f1f
TM
493 rpc_authflavor_t flavour;
494 const char *str;
495 } sec_flavours[] = {
496 { RPC_AUTH_NULL, "null" },
497 { RPC_AUTH_UNIX, "sys" },
498 { RPC_AUTH_GSS_KRB5, "krb5" },
499 { RPC_AUTH_GSS_KRB5I, "krb5i" },
500 { RPC_AUTH_GSS_KRB5P, "krb5p" },
501 { RPC_AUTH_GSS_LKEY, "lkey" },
502 { RPC_AUTH_GSS_LKEYI, "lkeyi" },
503 { RPC_AUTH_GSS_LKEYP, "lkeyp" },
504 { RPC_AUTH_GSS_SPKM, "spkm" },
505 { RPC_AUTH_GSS_SPKMI, "spkmi" },
506 { RPC_AUTH_GSS_SPKMP, "spkmp" },
4d81cd16 507 { UINT_MAX, "unknown" }
81039f1f
TM
508 };
509 int i;
510
4d81cd16 511 for (i = 0; sec_flavours[i].flavour != UINT_MAX; i++) {
81039f1f
TM
512 if (sec_flavours[i].flavour == flavour)
513 break;
514 }
515 return sec_flavours[i].str;
516}
517
ee671b01
JL
518static void nfs_show_mountd_netid(struct seq_file *m, struct nfs_server *nfss,
519 int showdefaults)
520{
521 struct sockaddr *sap = (struct sockaddr *) &nfss->mountd_address;
522
523 seq_printf(m, ",mountproto=");
524 switch (sap->sa_family) {
525 case AF_INET:
526 switch (nfss->mountd_protocol) {
527 case IPPROTO_UDP:
528 seq_printf(m, RPCBIND_NETID_UDP);
529 break;
530 case IPPROTO_TCP:
531 seq_printf(m, RPCBIND_NETID_TCP);
532 break;
533 default:
534 if (showdefaults)
535 seq_printf(m, "auto");
536 }
537 break;
538 case AF_INET6:
539 switch (nfss->mountd_protocol) {
540 case IPPROTO_UDP:
541 seq_printf(m, RPCBIND_NETID_UDP6);
542 break;
543 case IPPROTO_TCP:
544 seq_printf(m, RPCBIND_NETID_TCP6);
545 break;
546 default:
547 if (showdefaults)
548 seq_printf(m, "auto");
549 }
550 break;
551 default:
552 if (showdefaults)
553 seq_printf(m, "auto");
554 }
555}
556
82d101d5
CL
557static void nfs_show_mountd_options(struct seq_file *m, struct nfs_server *nfss,
558 int showdefaults)
559{
560 struct sockaddr *sap = (struct sockaddr *)&nfss->mountd_address;
561
d5eff1a3
BS
562 if (nfss->flags & NFS_MOUNT_LEGACY_INTERFACE)
563 return;
564
82d101d5
CL
565 switch (sap->sa_family) {
566 case AF_INET: {
567 struct sockaddr_in *sin = (struct sockaddr_in *)sap;
be859405 568 seq_printf(m, ",mountaddr=%pI4", &sin->sin_addr.s_addr);
82d101d5
CL
569 break;
570 }
571 case AF_INET6: {
572 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap;
d250e190 573 seq_printf(m, ",mountaddr=%pI6c", &sin6->sin6_addr);
82d101d5
CL
574 break;
575 }
576 default:
577 if (showdefaults)
578 seq_printf(m, ",mountaddr=unspecified");
579 }
580
581 if (nfss->mountd_version || showdefaults)
582 seq_printf(m, ",mountvers=%u", nfss->mountd_version);
aa699473
SK
583 if ((nfss->mountd_port &&
584 nfss->mountd_port != (unsigned short)NFS_UNSPEC_PORT) ||
585 showdefaults)
82d101d5
CL
586 seq_printf(m, ",mountport=%u", nfss->mountd_port);
587
ee671b01 588 nfs_show_mountd_netid(m, nfss, showdefaults);
82d101d5
CL
589}
590
89d77c8f 591#if IS_ENABLED(CONFIG_NFS_V4)
0be8189f
TM
592static void nfs_show_nfsv4_options(struct seq_file *m, struct nfs_server *nfss,
593 int showdefaults)
594{
595 struct nfs_client *clp = nfss->nfs_client;
596
597 seq_printf(m, ",clientaddr=%s", clp->cl_ipaddr);
0be8189f
TM
598}
599#else
600static void nfs_show_nfsv4_options(struct seq_file *m, struct nfs_server *nfss,
601 int showdefaults)
602{
603}
604#endif
605
7bbceb6f
TM
606static void nfs_show_nfs_version(struct seq_file *m,
607 unsigned int version,
608 unsigned int minorversion)
609{
610 seq_printf(m, ",vers=%u", version);
611 if (version == 4)
612 seq_printf(m, ".%u", minorversion);
613}
614
f7b422b1
DH
615/*
616 * Describe the mount options in force on this server representation
617 */
82d101d5
CL
618static void nfs_show_mount_options(struct seq_file *m, struct nfs_server *nfss,
619 int showdefaults)
f7b422b1 620{
509de811 621 static const struct proc_nfs_info {
f7b422b1 622 int flag;
509de811
DH
623 const char *str;
624 const char *nostr;
f7b422b1
DH
625 } nfs_info[] = {
626 { NFS_MOUNT_SOFT, ",soft", ",hard" },
82d101d5 627 { NFS_MOUNT_POSIX, ",posix", "" },
f7b422b1
DH
628 { NFS_MOUNT_NOCTO, ",nocto", "" },
629 { NFS_MOUNT_NOAC, ",noac", "" },
630 { NFS_MOUNT_NONLM, ",nolock", "" },
631 { NFS_MOUNT_NOACL, ",noacl", "" },
74dd34e6 632 { NFS_MOUNT_NORDIRPLUS, ",nordirplus", "" },
d740351b
CL
633 { NFS_MOUNT_UNSHARED, ",nosharecache", "" },
634 { NFS_MOUNT_NORESVPORT, ",noresvport", "" },
f7b422b1
DH
635 { 0, NULL, NULL }
636 };
509de811 637 const struct proc_nfs_info *nfs_infop;
8fa5c000 638 struct nfs_client *clp = nfss->nfs_client;
82d101d5 639 u32 version = clp->rpc_ops->version;
7c563cc9 640 int local_flock, local_fcntl;
f7b422b1 641
7bbceb6f 642 nfs_show_nfs_version(m, version, clp->cl_minorversion);
2d767432
CL
643 seq_printf(m, ",rsize=%u", nfss->rsize);
644 seq_printf(m, ",wsize=%u", nfss->wsize);
82d101d5
CL
645 if (nfss->bsize != 0)
646 seq_printf(m, ",bsize=%u", nfss->bsize);
647 seq_printf(m, ",namlen=%u", nfss->namelen);
0e0cab74 648 if (nfss->acregmin != NFS_DEF_ACREGMIN*HZ || showdefaults)
2d767432 649 seq_printf(m, ",acregmin=%u", nfss->acregmin/HZ);
0e0cab74 650 if (nfss->acregmax != NFS_DEF_ACREGMAX*HZ || showdefaults)
2d767432 651 seq_printf(m, ",acregmax=%u", nfss->acregmax/HZ);
0e0cab74 652 if (nfss->acdirmin != NFS_DEF_ACDIRMIN*HZ || showdefaults)
2d767432 653 seq_printf(m, ",acdirmin=%u", nfss->acdirmin/HZ);
0e0cab74 654 if (nfss->acdirmax != NFS_DEF_ACDIRMAX*HZ || showdefaults)
2d767432 655 seq_printf(m, ",acdirmax=%u", nfss->acdirmax/HZ);
f7b422b1
DH
656 for (nfs_infop = nfs_info; nfs_infop->flag; nfs_infop++) {
657 if (nfss->flags & nfs_infop->flag)
658 seq_puts(m, nfs_infop->str);
659 else
660 seq_puts(m, nfs_infop->nostr);
661 }
2446ab60 662 rcu_read_lock();
56928edd 663 seq_printf(m, ",proto=%s",
ee671b01 664 rpc_peeraddr2str(nfss->client, RPC_DISPLAY_NETID));
2446ab60 665 rcu_read_unlock();
82d101d5
CL
666 if (version == 4) {
667 if (nfss->port != NFS_PORT)
668 seq_printf(m, ",port=%u", nfss->port);
669 } else
670 if (nfss->port)
671 seq_printf(m, ",port=%u", nfss->port);
672
33170233
TM
673 seq_printf(m, ",timeo=%lu", 10U * nfss->client->cl_timeout->to_initval / HZ);
674 seq_printf(m, ",retrans=%u", nfss->client->cl_timeout->to_retries);
81039f1f 675 seq_printf(m, ",sec=%s", nfs_pseudoflavour_to_name(nfss->client->cl_auth->au_flavor));
82d101d5
CL
676
677 if (version != 4)
678 nfs_show_mountd_options(m, nfss, showdefaults);
0be8189f
TM
679 else
680 nfs_show_nfsv4_options(m, nfss, showdefaults);
82d101d5 681
b797cac7
DH
682 if (nfss->options & NFS_OPTION_FSCACHE)
683 seq_printf(m, ",fsc");
9b00c643 684
89652617
CL
685 if (nfss->options & NFS_OPTION_MIGRATION)
686 seq_printf(m, ",migration");
687
9b00c643
PL
688 if (nfss->flags & NFS_MOUNT_LOOKUP_CACHE_NONEG) {
689 if (nfss->flags & NFS_MOUNT_LOOKUP_CACHE_NONE)
690 seq_printf(m, ",lookupcache=none");
691 else
692 seq_printf(m, ",lookupcache=pos");
693 }
7c563cc9
SJ
694
695 local_flock = nfss->flags & NFS_MOUNT_LOCAL_FLOCK;
696 local_fcntl = nfss->flags & NFS_MOUNT_LOCAL_FCNTL;
697
698 if (!local_flock && !local_fcntl)
699 seq_printf(m, ",local_lock=none");
700 else if (local_flock && local_fcntl)
701 seq_printf(m, ",local_lock=all");
702 else if (local_flock)
703 seq_printf(m, ",local_lock=flock");
704 else
705 seq_printf(m, ",local_lock=posix");
f7b422b1
DH
706}
707
708/*
709 * Describe the mount options on this VFS mountpoint
710 */
fbdefd64 711int nfs_show_options(struct seq_file *m, struct dentry *root)
f7b422b1 712{
34c80b1d 713 struct nfs_server *nfss = NFS_SB(root->d_sb);
f7b422b1
DH
714
715 nfs_show_mount_options(m, nfss, 0);
716
2446ab60 717 rcu_read_lock();
5d8515ca
CL
718 seq_printf(m, ",addr=%s",
719 rpc_peeraddr2str(nfss->nfs_client->cl_rpcclient,
720 RPC_DISPLAY_ADDR));
2446ab60 721 rcu_read_unlock();
f7b422b1
DH
722
723 return 0;
724}
89d77c8f 725EXPORT_SYMBOL_GPL(nfs_show_options);
45402c38 726
89d77c8f 727#if IS_ENABLED(CONFIG_NFS_V4)
ae50c0b5 728#ifdef CONFIG_NFS_V4_1
45402c38 729static void show_sessions(struct seq_file *m, struct nfs_server *server)
ae50c0b5
BF
730{
731 if (nfs4_has_session(server->nfs_client))
732 seq_printf(m, ",sessions");
733}
734#else
45402c38
HS
735static void show_sessions(struct seq_file *m, struct nfs_server *server) {}
736#endif
ae50c0b5
BF
737#endif
738
739#ifdef CONFIG_NFS_V4_1
45402c38 740static void show_pnfs(struct seq_file *m, struct nfs_server *server)
ae50c0b5
BF
741{
742 seq_printf(m, ",pnfs=");
743 if (server->pnfs_curr_ld)
744 seq_printf(m, "%s", server->pnfs_curr_ld->name);
745 else
746 seq_printf(m, "not configured");
747}
7e03b7cc
TM
748
749static void show_implementation_id(struct seq_file *m, struct nfs_server *nfss)
750{
59155546
CL
751 if (nfss->nfs_client && nfss->nfs_client->cl_implid) {
752 struct nfs41_impl_id *impl_id = nfss->nfs_client->cl_implid;
7e03b7cc
TM
753 seq_printf(m, "\n\timpl_id:\tname='%s',domain='%s',"
754 "date='%llu,%u'",
755 impl_id->name, impl_id->domain,
756 impl_id->date.seconds, impl_id->date.nseconds);
757 }
758}
45402c38 759#else
89d77c8f 760#if IS_ENABLED(CONFIG_NFS_V4)
7e03b7cc
TM
761static void show_pnfs(struct seq_file *m, struct nfs_server *server)
762{
763}
45402c38 764#endif
7e03b7cc
TM
765static void show_implementation_id(struct seq_file *m, struct nfs_server *nfss)
766{
767}
45402c38 768#endif
f7b422b1 769
fbdefd64 770int nfs_show_devname(struct seq_file *m, struct dentry *root)
c7f404b4
AV
771{
772 char *page = (char *) __get_free_page(GFP_KERNEL);
773 char *devname, *dummy;
774 int err = 0;
775 if (!page)
776 return -ENOMEM;
97a54868 777 devname = nfs_path(&dummy, root, page, PAGE_SIZE, 0);
c7f404b4
AV
778 if (IS_ERR(devname))
779 err = PTR_ERR(devname);
780 else
781 seq_escape(m, devname, " \t\n\\");
782 free_page((unsigned long)page);
783 return err;
784}
89d77c8f 785EXPORT_SYMBOL_GPL(nfs_show_devname);
c7f404b4 786
fbdefd64 787int nfs_show_path(struct seq_file *m, struct dentry *dentry)
c7f404b4
AV
788{
789 seq_puts(m, "/");
790 return 0;
791}
89d77c8f 792EXPORT_SYMBOL_GPL(nfs_show_path);
c7f404b4 793
f7b422b1
DH
794/*
795 * Present statistical information for this VFS mountpoint
796 */
fbdefd64 797int nfs_show_stats(struct seq_file *m, struct dentry *root)
f7b422b1
DH
798{
799 int i, cpu;
64132379 800 struct nfs_server *nfss = NFS_SB(root->d_sb);
f7b422b1
DH
801 struct rpc_auth *auth = nfss->client->cl_auth;
802 struct nfs_iostats totals = { };
803
804 seq_printf(m, "statvers=%s", NFS_IOSTAT_VERS);
805
806 /*
807 * Display all mount option settings
808 */
809 seq_printf(m, "\n\topts:\t");
64132379
AV
810 seq_puts(m, root->d_sb->s_flags & MS_RDONLY ? "ro" : "rw");
811 seq_puts(m, root->d_sb->s_flags & MS_SYNCHRONOUS ? ",sync" : "");
812 seq_puts(m, root->d_sb->s_flags & MS_NOATIME ? ",noatime" : "");
813 seq_puts(m, root->d_sb->s_flags & MS_NODIRATIME ? ",nodiratime" : "");
f7b422b1
DH
814 nfs_show_mount_options(m, nfss, 1);
815
816 seq_printf(m, "\n\tage:\t%lu", (jiffies - nfss->mount_time) / HZ);
817
7e03b7cc 818 show_implementation_id(m, nfss);
7d2ed9ac 819
f7b422b1
DH
820 seq_printf(m, "\n\tcaps:\t");
821 seq_printf(m, "caps=0x%x", nfss->caps);
2d767432
CL
822 seq_printf(m, ",wtmult=%u", nfss->wtmult);
823 seq_printf(m, ",dtsize=%u", nfss->dtsize);
824 seq_printf(m, ",bsize=%u", nfss->bsize);
825 seq_printf(m, ",namlen=%u", nfss->namelen);
f7b422b1 826
89d77c8f 827#if IS_ENABLED(CONFIG_NFS_V4)
40c55319 828 if (nfss->nfs_client->rpc_ops->version == 4) {
f7b422b1
DH
829 seq_printf(m, "\n\tnfsv4:\t");
830 seq_printf(m, "bm0=0x%x", nfss->attr_bitmask[0]);
831 seq_printf(m, ",bm1=0x%x", nfss->attr_bitmask[1]);
832 seq_printf(m, ",acl=0x%x", nfss->acl_bitmask);
ae50c0b5
BF
833 show_sessions(m, nfss);
834 show_pnfs(m, nfss);
f7b422b1
DH
835 }
836#endif
837
838 /*
839 * Display security flavor in effect for this mount
840 */
2d767432 841 seq_printf(m, "\n\tsec:\tflavor=%u", auth->au_ops->au_flavor);
f7b422b1 842 if (auth->au_flavor)
2d767432 843 seq_printf(m, ",pseudoflavor=%u", auth->au_flavor);
f7b422b1
DH
844
845 /*
846 * Display superblock I/O counters
847 */
848 for_each_possible_cpu(cpu) {
849 struct nfs_iostats *stats;
850
851 preempt_disable();
852 stats = per_cpu_ptr(nfss->io_stats, cpu);
853
854 for (i = 0; i < __NFSIOS_COUNTSMAX; i++)
855 totals.events[i] += stats->events[i];
856 for (i = 0; i < __NFSIOS_BYTESMAX; i++)
857 totals.bytes[i] += stats->bytes[i];
6a51091d
DH
858#ifdef CONFIG_NFS_FSCACHE
859 for (i = 0; i < __NFSIOS_FSCACHEMAX; i++)
860 totals.fscache[i] += stats->fscache[i];
861#endif
f7b422b1
DH
862
863 preempt_enable();
864 }
865
866 seq_printf(m, "\n\tevents:\t");
867 for (i = 0; i < __NFSIOS_COUNTSMAX; i++)
868 seq_printf(m, "%lu ", totals.events[i]);
869 seq_printf(m, "\n\tbytes:\t");
870 for (i = 0; i < __NFSIOS_BYTESMAX; i++)
871 seq_printf(m, "%Lu ", totals.bytes[i]);
6a51091d
DH
872#ifdef CONFIG_NFS_FSCACHE
873 if (nfss->options & NFS_OPTION_FSCACHE) {
874 seq_printf(m, "\n\tfsc:\t");
875 for (i = 0; i < __NFSIOS_FSCACHEMAX; i++)
876 seq_printf(m, "%Lu ", totals.bytes[i]);
877 }
878#endif
f7b422b1
DH
879 seq_printf(m, "\n");
880
881 rpc_print_iostats(m, nfss->client);
882
883 return 0;
884}
89d77c8f 885EXPORT_SYMBOL_GPL(nfs_show_stats);
f7b422b1
DH
886
887/*
888 * Begin unmount by attempting to remove all automounted mountpoints we added
54ceac45 889 * in response to xdev traversals and referrals
f7b422b1 890 */
fbdefd64 891void nfs_umount_begin(struct super_block *sb)
f7b422b1 892{
67e55205 893 struct nfs_server *server;
fc6ae3cf
TM
894 struct rpc_clnt *rpc;
895
67e55205 896 server = NFS_SB(sb);
fc6ae3cf
TM
897 /* -EIO all pending I/O */
898 rpc = server->client_acl;
899 if (!IS_ERR(rpc))
900 rpc_killall_tasks(rpc);
901 rpc = server->client;
902 if (!IS_ERR(rpc))
903 rpc_killall_tasks(rpc);
f7b422b1 904}
89d77c8f 905EXPORT_SYMBOL_GPL(nfs_umount_begin);
f7b422b1 906
db833351 907static struct nfs_parsed_mount_data *nfs_alloc_parsed_mount_data(void)
9423a08a
CL
908{
909 struct nfs_parsed_mount_data *data;
910
911 data = kzalloc(sizeof(*data), GFP_KERNEL);
912 if (data) {
9423a08a
CL
913 data->acregmin = NFS_DEF_ACREGMIN;
914 data->acregmax = NFS_DEF_ACREGMAX;
915 data->acdirmin = NFS_DEF_ACDIRMIN;
916 data->acdirmax = NFS_DEF_ACDIRMAX;
c5811dbd 917 data->mount_server.port = NFS_UNSPEC_PORT;
9423a08a 918 data->nfs_server.port = NFS_UNSPEC_PORT;
c5811dbd 919 data->nfs_server.protocol = XPRT_TRANSPORT_TCP;
4580a92d 920 data->auth_flavors[0] = RPC_AUTH_MAXFLAVOR;
9423a08a
CL
921 data->auth_flavor_len = 1;
922 data->minorversion = 0;
b72e4f42 923 data->need_mount = true;
9937347a 924 data->net = current->nsproxy->net_ns;
8a0d551a 925 security_init_mnt_opts(&data->lsm_opts);
9423a08a
CL
926 }
927 return data;
928}
929
8a0d551a
JL
930static void nfs_free_parsed_mount_data(struct nfs_parsed_mount_data *data)
931{
932 if (data) {
933 kfree(data->client_address);
934 kfree(data->mount_server.hostname);
935 kfree(data->nfs_server.export_path);
936 kfree(data->nfs_server.hostname);
937 kfree(data->fscache_uniq);
938 security_free_mnt_opts(&data->lsm_opts);
939 kfree(data);
940 }
941}
942
fc50d58f 943/*
cdcd7f9a
CL
944 * Sanity-check a server address provided by the mount command.
945 *
946 * Address family must be initialized, and address must not be
947 * the ANY address for that family.
fc50d58f
CL
948 */
949static int nfs_verify_server_address(struct sockaddr *addr)
950{
951 switch (addr->sa_family) {
952 case AF_INET: {
cdcd7f9a 953 struct sockaddr_in *sa = (struct sockaddr_in *)addr;
e6f1cebf 954 return sa->sin_addr.s_addr != htonl(INADDR_ANY);
cdcd7f9a
CL
955 }
956 case AF_INET6: {
957 struct in6_addr *sa = &((struct sockaddr_in6 *)addr)->sin6_addr;
958 return !ipv6_addr_any(sa);
fc50d58f
CL
959 }
960 }
961
53a0b9c4 962 dfprintk(MOUNT, "NFS: Invalid IP address specified\n");
fc50d58f
CL
963 return 0;
964}
965
4cfd74fc
CL
966/*
967 * Select between a default port value and a user-specified port value.
968 * If a zero value is set, then autobind will be used.
969 */
f5855fec 970static void nfs_set_port(struct sockaddr *sap, int *port,
4cfd74fc
CL
971 const unsigned short default_port)
972{
f5855fec
TM
973 if (*port == NFS_UNSPEC_PORT)
974 *port = default_port;
4cfd74fc 975
f5855fec 976 rpc_set_port(sap, *port);
4cfd74fc
CL
977}
978
259875ef
TM
979/*
980 * Sanity check the NFS transport protocol.
981 *
982 */
983static void nfs_validate_transport_protocol(struct nfs_parsed_mount_data *mnt)
984{
985 switch (mnt->nfs_server.protocol) {
986 case XPRT_TRANSPORT_UDP:
987 case XPRT_TRANSPORT_TCP:
988 case XPRT_TRANSPORT_RDMA:
989 break;
990 default:
991 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
992 }
993}
994
995/*
996 * For text based NFSv2/v3 mounts, the mount protocol transport default
997 * settings should depend upon the specified NFS transport.
998 */
999static void nfs_set_mount_transport_protocol(struct nfs_parsed_mount_data *mnt)
1000{
1001 nfs_validate_transport_protocol(mnt);
1002
1003 if (mnt->mount_server.protocol == XPRT_TRANSPORT_UDP ||
1004 mnt->mount_server.protocol == XPRT_TRANSPORT_TCP)
1005 return;
1006 switch (mnt->nfs_server.protocol) {
1007 case XPRT_TRANSPORT_UDP:
1008 mnt->mount_server.protocol = XPRT_TRANSPORT_UDP;
1009 break;
1010 case XPRT_TRANSPORT_TCP:
1011 case XPRT_TRANSPORT_RDMA:
1012 mnt->mount_server.protocol = XPRT_TRANSPORT_TCP;
1013 }
1014}
1015
01060c89
CL
1016/*
1017 * Parse the value of the 'sec=' option.
01060c89
CL
1018 */
1019static int nfs_parse_security_flavors(char *value,
1020 struct nfs_parsed_mount_data *mnt)
1021{
1022 substring_t args[MAX_OPT_ARGS];
1023
1024 dfprintk(MOUNT, "NFS: parsing sec=%s option\n", value);
1025
1026 switch (match_token(value, nfs_secflavor_tokens, args)) {
1027 case Opt_sec_none:
01060c89
CL
1028 mnt->auth_flavors[0] = RPC_AUTH_NULL;
1029 break;
1030 case Opt_sec_sys:
01060c89
CL
1031 mnt->auth_flavors[0] = RPC_AUTH_UNIX;
1032 break;
1033 case Opt_sec_krb5:
01060c89
CL
1034 mnt->auth_flavors[0] = RPC_AUTH_GSS_KRB5;
1035 break;
1036 case Opt_sec_krb5i:
01060c89
CL
1037 mnt->auth_flavors[0] = RPC_AUTH_GSS_KRB5I;
1038 break;
1039 case Opt_sec_krb5p:
01060c89
CL
1040 mnt->auth_flavors[0] = RPC_AUTH_GSS_KRB5P;
1041 break;
1042 case Opt_sec_lkey:
01060c89
CL
1043 mnt->auth_flavors[0] = RPC_AUTH_GSS_LKEY;
1044 break;
1045 case Opt_sec_lkeyi:
01060c89
CL
1046 mnt->auth_flavors[0] = RPC_AUTH_GSS_LKEYI;
1047 break;
1048 case Opt_sec_lkeyp:
01060c89
CL
1049 mnt->auth_flavors[0] = RPC_AUTH_GSS_LKEYP;
1050 break;
1051 case Opt_sec_spkm:
01060c89
CL
1052 mnt->auth_flavors[0] = RPC_AUTH_GSS_SPKM;
1053 break;
1054 case Opt_sec_spkmi:
01060c89
CL
1055 mnt->auth_flavors[0] = RPC_AUTH_GSS_SPKMI;
1056 break;
1057 case Opt_sec_spkmp:
01060c89
CL
1058 mnt->auth_flavors[0] = RPC_AUTH_GSS_SPKMP;
1059 break;
1060 default:
1061 return 0;
1062 }
1063
9b7160c5 1064 mnt->flags |= NFS_MOUNT_SECFLAVOUR;
059f90b3 1065 mnt->auth_flavor_len = 1;
01060c89
CL
1066 return 1;
1067}
1068
0d71b058
TM
1069static int nfs_parse_version_string(char *string,
1070 struct nfs_parsed_mount_data *mnt,
1071 substring_t *args)
1072{
1073 mnt->flags &= ~NFS_MOUNT_VER3;
1074 switch (match_token(string, nfs_vers_tokens, args)) {
1075 case Opt_vers_2:
1076 mnt->version = 2;
1077 break;
1078 case Opt_vers_3:
1079 mnt->flags |= NFS_MOUNT_VER3;
1080 mnt->version = 3;
1081 break;
1082 case Opt_vers_4:
1083 /* Backward compatibility option. In future,
1084 * the mount program should always supply
1085 * a NFSv4 minor version number.
1086 */
1087 mnt->version = 4;
1088 break;
1089 case Opt_vers_4_0:
1090 mnt->version = 4;
1091 mnt->minorversion = 0;
1092 break;
1093 case Opt_vers_4_1:
1094 mnt->version = 4;
1095 mnt->minorversion = 1;
1096 break;
1097 default:
1098 return 0;
1099 }
1100 return 1;
1101}
1102
c5cb09b6
RL
1103static int nfs_get_option_str(substring_t args[], char **option)
1104{
1105 kfree(*option);
1106 *option = match_strdup(args);
e25fbe38 1107 return !*option;
c5cb09b6
RL
1108}
1109
1110static int nfs_get_option_ul(substring_t args[], unsigned long *option)
1111{
1112 int rc;
1113 char *string;
1114
1115 string = match_strdup(args);
1116 if (string == NULL)
1117 return -ENOMEM;
7297cb68 1118 rc = kstrtoul(string, 10, option);
c5cb09b6
RL
1119 kfree(string);
1120
1121 return rc;
1122}
1123
bf0fd768
CL
1124/*
1125 * Error-check and convert a string of mount options from user space into
f45663ce
CL
1126 * a data structure. The whole mount string is processed; bad options are
1127 * skipped as they are encountered. If there were no errors, return 1;
1128 * otherwise return 0 (zero).
bf0fd768
CL
1129 */
1130static int nfs_parse_mount_options(char *raw,
1131 struct nfs_parsed_mount_data *mnt)
1132{
f9c3a380 1133 char *p, *string, *secdata;
d23c45fd 1134 int rc, sloppy = 0, invalid_option = 0;
ee671b01
JL
1135 unsigned short protofamily = AF_UNSPEC;
1136 unsigned short mountfamily = AF_UNSPEC;
bf0fd768
CL
1137
1138 if (!raw) {
1139 dfprintk(MOUNT, "NFS: mount options string was NULL.\n");
1140 return 1;
1141 }
1142 dfprintk(MOUNT, "NFS: nfs mount opts='%s'\n", raw);
1143
f9c3a380
EP
1144 secdata = alloc_secdata();
1145 if (!secdata)
1146 goto out_nomem;
1147
1148 rc = security_sb_copy_data(raw, secdata);
1149 if (rc)
1150 goto out_security_failure;
1151
1152 rc = security_sb_parse_opts_str(secdata, &mnt->lsm_opts);
1153 if (rc)
1154 goto out_security_failure;
1155
1156 free_secdata(secdata);
1157
bf0fd768
CL
1158 while ((p = strsep(&raw, ",")) != NULL) {
1159 substring_t args[MAX_OPT_ARGS];
a5a16bae
CL
1160 unsigned long option;
1161 int token;
bf0fd768
CL
1162
1163 if (!*p)
1164 continue;
1165
1166 dfprintk(MOUNT, "NFS: parsing nfs mount option '%s'\n", p);
1167
1168 token = match_token(p, nfs_mount_option_tokens, args);
1169 switch (token) {
f45663ce
CL
1170
1171 /*
1172 * boolean options: foo/nofoo
1173 */
bf0fd768
CL
1174 case Opt_soft:
1175 mnt->flags |= NFS_MOUNT_SOFT;
1176 break;
1177 case Opt_hard:
1178 mnt->flags &= ~NFS_MOUNT_SOFT;
1179 break;
bf0fd768
CL
1180 case Opt_posix:
1181 mnt->flags |= NFS_MOUNT_POSIX;
1182 break;
1183 case Opt_noposix:
1184 mnt->flags &= ~NFS_MOUNT_POSIX;
1185 break;
1186 case Opt_cto:
1187 mnt->flags &= ~NFS_MOUNT_NOCTO;
1188 break;
1189 case Opt_nocto:
1190 mnt->flags |= NFS_MOUNT_NOCTO;
1191 break;
1192 case Opt_ac:
1193 mnt->flags &= ~NFS_MOUNT_NOAC;
1194 break;
1195 case Opt_noac:
1196 mnt->flags |= NFS_MOUNT_NOAC;
1197 break;
1198 case Opt_lock:
1199 mnt->flags &= ~NFS_MOUNT_NONLM;
5eebde23
SJ
1200 mnt->flags &= ~(NFS_MOUNT_LOCAL_FLOCK |
1201 NFS_MOUNT_LOCAL_FCNTL);
bf0fd768
CL
1202 break;
1203 case Opt_nolock:
1204 mnt->flags |= NFS_MOUNT_NONLM;
5eebde23
SJ
1205 mnt->flags |= (NFS_MOUNT_LOCAL_FLOCK |
1206 NFS_MOUNT_LOCAL_FCNTL);
bf0fd768 1207 break;
bf0fd768
CL
1208 case Opt_udp:
1209 mnt->flags &= ~NFS_MOUNT_TCP;
0896a725 1210 mnt->nfs_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768
CL
1211 break;
1212 case Opt_tcp:
1213 mnt->flags |= NFS_MOUNT_TCP;
0896a725 1214 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1215 break;
2cf7ff7a
TT
1216 case Opt_rdma:
1217 mnt->flags |= NFS_MOUNT_TCP; /* for side protocols */
1218 mnt->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
a67d18f8 1219 xprt_load_transport(p);
2cf7ff7a 1220 break;
bf0fd768
CL
1221 case Opt_acl:
1222 mnt->flags &= ~NFS_MOUNT_NOACL;
1223 break;
1224 case Opt_noacl:
1225 mnt->flags |= NFS_MOUNT_NOACL;
1226 break;
1227 case Opt_rdirplus:
1228 mnt->flags &= ~NFS_MOUNT_NORDIRPLUS;
1229 break;
1230 case Opt_nordirplus:
1231 mnt->flags |= NFS_MOUNT_NORDIRPLUS;
1232 break;
75180df2
TM
1233 case Opt_sharecache:
1234 mnt->flags &= ~NFS_MOUNT_UNSHARED;
1235 break;
1236 case Opt_nosharecache:
1237 mnt->flags |= NFS_MOUNT_UNSHARED;
1238 break;
d740351b
CL
1239 case Opt_resvport:
1240 mnt->flags &= ~NFS_MOUNT_NORESVPORT;
1241 break;
1242 case Opt_noresvport:
1243 mnt->flags |= NFS_MOUNT_NORESVPORT;
1244 break;
b797cac7
DH
1245 case Opt_fscache:
1246 mnt->options |= NFS_OPTION_FSCACHE;
1247 kfree(mnt->fscache_uniq);
1248 mnt->fscache_uniq = NULL;
1249 break;
1250 case Opt_nofscache:
1251 mnt->options &= ~NFS_OPTION_FSCACHE;
1252 kfree(mnt->fscache_uniq);
1253 mnt->fscache_uniq = NULL;
1254 break;
89652617
CL
1255 case Opt_migration:
1256 mnt->options |= NFS_OPTION_MIGRATION;
1257 break;
1258 case Opt_nomigration:
1259 mnt->options &= NFS_OPTION_MIGRATION;
1260 break;
bf0fd768 1261
f45663ce
CL
1262 /*
1263 * options that take numeric values
1264 */
bf0fd768 1265 case Opt_port:
c5cb09b6
RL
1266 if (nfs_get_option_ul(args, &option) ||
1267 option > USHRT_MAX)
d23c45fd
CL
1268 goto out_invalid_value;
1269 mnt->nfs_server.port = option;
bf0fd768
CL
1270 break;
1271 case Opt_rsize:
c5cb09b6 1272 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1273 goto out_invalid_value;
1274 mnt->rsize = option;
bf0fd768
CL
1275 break;
1276 case Opt_wsize:
c5cb09b6 1277 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1278 goto out_invalid_value;
1279 mnt->wsize = option;
bf0fd768
CL
1280 break;
1281 case Opt_bsize:
c5cb09b6 1282 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1283 goto out_invalid_value;
1284 mnt->bsize = option;
bf0fd768
CL
1285 break;
1286 case Opt_timeo:
c5cb09b6 1287 if (nfs_get_option_ul(args, &option) || option == 0)
d23c45fd
CL
1288 goto out_invalid_value;
1289 mnt->timeo = option;
bf0fd768
CL
1290 break;
1291 case Opt_retrans:
c5cb09b6 1292 if (nfs_get_option_ul(args, &option) || option == 0)
d23c45fd
CL
1293 goto out_invalid_value;
1294 mnt->retrans = option;
bf0fd768
CL
1295 break;
1296 case Opt_acregmin:
c5cb09b6 1297 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1298 goto out_invalid_value;
1299 mnt->acregmin = option;
bf0fd768
CL
1300 break;
1301 case Opt_acregmax:
c5cb09b6 1302 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1303 goto out_invalid_value;
1304 mnt->acregmax = option;
bf0fd768
CL
1305 break;
1306 case Opt_acdirmin:
c5cb09b6 1307 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1308 goto out_invalid_value;
1309 mnt->acdirmin = option;
bf0fd768
CL
1310 break;
1311 case Opt_acdirmax:
c5cb09b6 1312 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1313 goto out_invalid_value;
1314 mnt->acdirmax = option;
bf0fd768
CL
1315 break;
1316 case Opt_actimeo:
c5cb09b6 1317 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1318 goto out_invalid_value;
1319 mnt->acregmin = mnt->acregmax =
1320 mnt->acdirmin = mnt->acdirmax = option;
bf0fd768
CL
1321 break;
1322 case Opt_namelen:
c5cb09b6 1323 if (nfs_get_option_ul(args, &option))
d23c45fd
CL
1324 goto out_invalid_value;
1325 mnt->namlen = option;
bf0fd768
CL
1326 break;
1327 case Opt_mountport:
c5cb09b6
RL
1328 if (nfs_get_option_ul(args, &option) ||
1329 option > USHRT_MAX)
d23c45fd
CL
1330 goto out_invalid_value;
1331 mnt->mount_server.port = option;
bf0fd768 1332 break;
bf0fd768 1333 case Opt_mountvers:
c5cb09b6 1334 if (nfs_get_option_ul(args, &option) ||
f45663ce 1335 option < NFS_MNT_VERSION ||
d23c45fd
CL
1336 option > NFS_MNT3_VERSION)
1337 goto out_invalid_value;
1338 mnt->mount_server.version = option;
bf0fd768 1339 break;
3fd5be9e 1340 case Opt_minorversion:
c5cb09b6 1341 if (nfs_get_option_ul(args, &option))
f3f4f4ed
CL
1342 goto out_invalid_value;
1343 if (option > NFS4_MAX_MINOR_VERSION)
1344 goto out_invalid_value;
1345 mnt->minorversion = option;
3fd5be9e 1346 break;
bf0fd768 1347
f45663ce
CL
1348 /*
1349 * options that take text values
1350 */
0d71b058
TM
1351 case Opt_nfsvers:
1352 string = match_strdup(args);
1353 if (string == NULL)
1354 goto out_nomem;
1355 rc = nfs_parse_version_string(string, mnt, args);
1356 kfree(string);
1357 if (!rc)
1358 goto out_invalid_value;
1359 break;
bf0fd768
CL
1360 case Opt_sec:
1361 string = match_strdup(args);
1362 if (string == NULL)
1363 goto out_nomem;
01060c89 1364 rc = nfs_parse_security_flavors(string, mnt);
bf0fd768 1365 kfree(string);
f45663ce 1366 if (!rc) {
f45663ce
CL
1367 dfprintk(MOUNT, "NFS: unrecognized "
1368 "security flavor\n");
d23c45fd 1369 return 0;
f45663ce 1370 }
bf0fd768
CL
1371 break;
1372 case Opt_proto:
1373 string = match_strdup(args);
1374 if (string == NULL)
1375 goto out_nomem;
1376 token = match_token(string,
1377 nfs_xprt_protocol_tokens, args);
bf0fd768 1378
ee671b01 1379 protofamily = AF_INET;
bf0fd768 1380 switch (token) {
ee671b01
JL
1381 case Opt_xprt_udp6:
1382 protofamily = AF_INET6;
fdb66ff4 1383 case Opt_xprt_udp:
bf0fd768 1384 mnt->flags &= ~NFS_MOUNT_TCP;
0896a725 1385 mnt->nfs_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768 1386 break;
ee671b01
JL
1387 case Opt_xprt_tcp6:
1388 protofamily = AF_INET6;
fdb66ff4 1389 case Opt_xprt_tcp:
bf0fd768 1390 mnt->flags |= NFS_MOUNT_TCP;
0896a725 1391 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1392 break;
2cf7ff7a
TT
1393 case Opt_xprt_rdma:
1394 /* vector side protocols to TCP */
1395 mnt->flags |= NFS_MOUNT_TCP;
1396 mnt->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
a67d18f8 1397 xprt_load_transport(string);
2cf7ff7a 1398 break;
bf0fd768 1399 default:
f45663ce
CL
1400 dfprintk(MOUNT, "NFS: unrecognized "
1401 "transport protocol\n");
4223a4a1 1402 kfree(string);
d23c45fd 1403 return 0;
bf0fd768 1404 }
c5cb09b6 1405 kfree(string);
bf0fd768
CL
1406 break;
1407 case Opt_mountproto:
1408 string = match_strdup(args);
1409 if (string == NULL)
1410 goto out_nomem;
1411 token = match_token(string,
1412 nfs_xprt_protocol_tokens, args);
d508afb4 1413 kfree(string);
bf0fd768 1414
ee671b01 1415 mountfamily = AF_INET;
bf0fd768 1416 switch (token) {
ee671b01
JL
1417 case Opt_xprt_udp6:
1418 mountfamily = AF_INET6;
fdb66ff4 1419 case Opt_xprt_udp:
0896a725 1420 mnt->mount_server.protocol = XPRT_TRANSPORT_UDP;
bf0fd768 1421 break;
ee671b01
JL
1422 case Opt_xprt_tcp6:
1423 mountfamily = AF_INET6;
fdb66ff4 1424 case Opt_xprt_tcp:
0896a725 1425 mnt->mount_server.protocol = XPRT_TRANSPORT_TCP;
bf0fd768 1426 break;
2cf7ff7a 1427 case Opt_xprt_rdma: /* not used for side protocols */
bf0fd768 1428 default:
f45663ce
CL
1429 dfprintk(MOUNT, "NFS: unrecognized "
1430 "transport protocol\n");
d23c45fd 1431 return 0;
bf0fd768
CL
1432 }
1433 break;
1434 case Opt_addr:
1435 string = match_strdup(args);
1436 if (string == NULL)
1437 goto out_nomem;
53a0b9c4 1438 mnt->nfs_server.addrlen =
b48e1278 1439 rpc_pton(mnt->net, string, strlen(string),
53a0b9c4
CL
1440 (struct sockaddr *)
1441 &mnt->nfs_server.address,
1442 sizeof(mnt->nfs_server.address));
bf0fd768 1443 kfree(string);
53a0b9c4
CL
1444 if (mnt->nfs_server.addrlen == 0)
1445 goto out_invalid_address;
bf0fd768
CL
1446 break;
1447 case Opt_clientaddr:
c5cb09b6 1448 if (nfs_get_option_str(args, &mnt->client_address))
bf0fd768 1449 goto out_nomem;
bf0fd768 1450 break;
33832034 1451 case Opt_mounthost:
c5cb09b6
RL
1452 if (nfs_get_option_str(args,
1453 &mnt->mount_server.hostname))
33832034 1454 goto out_nomem;
33832034 1455 break;
0ac83779 1456 case Opt_mountaddr:
bf0fd768
CL
1457 string = match_strdup(args);
1458 if (string == NULL)
1459 goto out_nomem;
53a0b9c4 1460 mnt->mount_server.addrlen =
b48e1278 1461 rpc_pton(mnt->net, string, strlen(string),
53a0b9c4
CL
1462 (struct sockaddr *)
1463 &mnt->mount_server.address,
1464 sizeof(mnt->mount_server.address));
bf0fd768 1465 kfree(string);
53a0b9c4
CL
1466 if (mnt->mount_server.addrlen == 0)
1467 goto out_invalid_address;
bf0fd768 1468 break;
7973c1f1
TM
1469 case Opt_lookupcache:
1470 string = match_strdup(args);
1471 if (string == NULL)
1472 goto out_nomem;
1473 token = match_token(string,
1474 nfs_lookupcache_tokens, args);
1475 kfree(string);
1476 switch (token) {
1477 case Opt_lookupcache_all:
1478 mnt->flags &= ~(NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE);
1479 break;
1480 case Opt_lookupcache_positive:
1481 mnt->flags &= ~NFS_MOUNT_LOOKUP_CACHE_NONE;
1482 mnt->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG;
1483 break;
1484 case Opt_lookupcache_none:
1485 mnt->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE;
1486 break;
1487 default:
7973c1f1
TM
1488 dfprintk(MOUNT, "NFS: invalid "
1489 "lookupcache argument\n");
d23c45fd 1490 return 0;
7973c1f1
TM
1491 };
1492 break;
a6d5ff64 1493 case Opt_fscache_uniq:
c5cb09b6 1494 if (nfs_get_option_str(args, &mnt->fscache_uniq))
a6d5ff64 1495 goto out_nomem;
a6d5ff64
CL
1496 mnt->options |= NFS_OPTION_FSCACHE;
1497 break;
5eebde23
SJ
1498 case Opt_local_lock:
1499 string = match_strdup(args);
1500 if (string == NULL)
1501 goto out_nomem;
1502 token = match_token(string, nfs_local_lock_tokens,
1503 args);
1504 kfree(string);
1505 switch (token) {
1506 case Opt_local_lock_all:
1507 mnt->flags |= (NFS_MOUNT_LOCAL_FLOCK |
1508 NFS_MOUNT_LOCAL_FCNTL);
1509 break;
1510 case Opt_local_lock_flock:
1511 mnt->flags |= NFS_MOUNT_LOCAL_FLOCK;
1512 break;
1513 case Opt_local_lock_posix:
1514 mnt->flags |= NFS_MOUNT_LOCAL_FCNTL;
1515 break;
1516 case Opt_local_lock_none:
1517 mnt->flags &= ~(NFS_MOUNT_LOCAL_FLOCK |
1518 NFS_MOUNT_LOCAL_FCNTL);
1519 break;
1520 default:
1521 dfprintk(MOUNT, "NFS: invalid "
1522 "local_lock argument\n");
1523 return 0;
1524 };
1525 break;
bf0fd768 1526
f45663ce
CL
1527 /*
1528 * Special options
1529 */
1530 case Opt_sloppy:
1531 sloppy = 1;
1532 dfprintk(MOUNT, "NFS: relaxing parsing rules\n");
1533 break;
bf0fd768
CL
1534 case Opt_userspace:
1535 case Opt_deprecated:
d33e4dfe
CL
1536 dfprintk(MOUNT, "NFS: ignoring mount option "
1537 "'%s'\n", p);
bf0fd768
CL
1538 break;
1539
1540 default:
d23c45fd 1541 invalid_option = 1;
f45663ce
CL
1542 dfprintk(MOUNT, "NFS: unrecognized mount option "
1543 "'%s'\n", p);
bf0fd768
CL
1544 }
1545 }
1546
d23c45fd
CL
1547 if (!sloppy && invalid_option)
1548 return 0;
1549
571b7554
WAA
1550 if (mnt->minorversion && mnt->version != 4)
1551 goto out_minorversion_mismatch;
1552
89652617
CL
1553 if (mnt->options & NFS_OPTION_MIGRATION &&
1554 mnt->version != 4 && mnt->minorversion != 0)
1555 goto out_migration_misuse;
1556
ee671b01
JL
1557 /*
1558 * verify that any proto=/mountproto= options match the address
1856b225 1559 * families in the addr=/mountaddr= options.
ee671b01
JL
1560 */
1561 if (protofamily != AF_UNSPEC &&
1562 protofamily != mnt->nfs_server.address.ss_family)
1563 goto out_proto_mismatch;
1564
1565 if (mountfamily != AF_UNSPEC) {
1566 if (mnt->mount_server.addrlen) {
1567 if (mountfamily != mnt->mount_server.address.ss_family)
1568 goto out_mountproto_mismatch;
1569 } else {
1570 if (mountfamily != mnt->nfs_server.address.ss_family)
1571 goto out_mountproto_mismatch;
1572 }
1573 }
1574
bf0fd768
CL
1575 return 1;
1576
ee671b01
JL
1577out_mountproto_mismatch:
1578 printk(KERN_INFO "NFS: mount server address does not match mountproto= "
1579 "option\n");
1580 return 0;
1581out_proto_mismatch:
1582 printk(KERN_INFO "NFS: server address does not match proto= option\n");
1583 return 0;
53a0b9c4
CL
1584out_invalid_address:
1585 printk(KERN_INFO "NFS: bad IP address specified: %s\n", p);
1586 return 0;
d23c45fd 1587out_invalid_value:
53a0b9c4 1588 printk(KERN_INFO "NFS: bad mount option value specified: %s\n", p);
d23c45fd 1589 return 0;
571b7554
WAA
1590out_minorversion_mismatch:
1591 printk(KERN_INFO "NFS: mount option vers=%u does not support "
1592 "minorversion=%u\n", mnt->version, mnt->minorversion);
1593 return 0;
89652617
CL
1594out_migration_misuse:
1595 printk(KERN_INFO
1596 "NFS: 'migration' not supported for this NFS version\n");
1597 return 0;
bf0fd768
CL
1598out_nomem:
1599 printk(KERN_INFO "NFS: not enough memory to parse option\n");
1600 return 0;
f9c3a380
EP
1601out_security_failure:
1602 free_secdata(secdata);
1603 printk(KERN_INFO "NFS: security options invalid: %d\n", rc);
1604 return 0;
bf0fd768
CL
1605}
1606
ec88f28d 1607/*
4580a92d
CL
1608 * Select a security flavor for this mount. The selected flavor
1609 * is planted in args->auth_flavors[0].
ec88f28d 1610 */
4580a92d
CL
1611static void nfs_select_flavor(struct nfs_parsed_mount_data *args,
1612 struct nfs_mount_request *request)
ec88f28d 1613{
4580a92d
CL
1614 unsigned int i, count = *(request->auth_flav_len);
1615 rpc_authflavor_t flavor;
1616
1617 if (args->auth_flavors[0] != RPC_AUTH_MAXFLAVOR)
1618 goto out;
1619
1620 /*
1621 * The NFSv2 MNT operation does not return a flavor list.
1622 */
1623 if (args->mount_server.version != NFS_MNT3_VERSION)
1624 goto out_default;
ec88f28d 1625
5eecfde6
CL
1626 /*
1627 * Certain releases of Linux's mountd return an empty
4580a92d 1628 * flavor list in some cases.
5eecfde6 1629 */
4580a92d
CL
1630 if (count == 0)
1631 goto out_default;
5eecfde6 1632
ec88f28d 1633 /*
ec88f28d
CL
1634 * RFC 2623, section 2.7 suggests we SHOULD prefer the
1635 * flavor listed first. However, some servers list
4580a92d 1636 * AUTH_NULL first. Avoid ever choosing AUTH_NULL.
ec88f28d 1637 */
4580a92d
CL
1638 for (i = 0; i < count; i++) {
1639 struct rpcsec_gss_info info;
1640
1641 flavor = request->auth_flavs[i];
1642 switch (flavor) {
1643 case RPC_AUTH_UNIX:
1644 goto out_set;
1645 case RPC_AUTH_NULL:
1646 continue;
1647 default:
1648 if (rpcauth_get_gssinfo(flavor, &info) == 0)
1649 goto out_set;
1650 }
1651 }
ec88f28d 1652
4580a92d
CL
1653out_default:
1654 flavor = RPC_AUTH_UNIX;
1655out_set:
1656 args->auth_flavors[0] = flavor;
1657out:
1658 dfprintk(MOUNT, "NFS: using auth flavor %d\n", args->auth_flavors[0]);
ec88f28d
CL
1659}
1660
0076d7b7
CL
1661/*
1662 * Use the remote server's MOUNT service to request the NFS file handle
1663 * corresponding to the provided path.
1664 */
486aa699
BS
1665static int nfs_request_mount(struct nfs_parsed_mount_data *args,
1666 struct nfs_fh *root_fh)
0076d7b7 1667{
ec88f28d
CL
1668 rpc_authflavor_t server_authlist[NFS_MAX_SECFLAVORS];
1669 unsigned int server_authlist_len = ARRAY_SIZE(server_authlist);
c5d120f8
CL
1670 struct nfs_mount_request request = {
1671 .sap = (struct sockaddr *)
1672 &args->mount_server.address,
1673 .dirpath = args->nfs_server.export_path,
1674 .protocol = args->mount_server.protocol,
1675 .fh = root_fh,
50a737f8 1676 .noresvport = args->flags & NFS_MOUNT_NORESVPORT,
ec88f28d
CL
1677 .auth_flav_len = &server_authlist_len,
1678 .auth_flavs = server_authlist,
6d59b8d5 1679 .net = args->net,
c5d120f8 1680 };
4c568017 1681 int status;
0076d7b7
CL
1682
1683 if (args->mount_server.version == 0) {
8a6e5deb
TM
1684 switch (args->version) {
1685 default:
1686 args->mount_server.version = NFS_MNT3_VERSION;
1687 break;
1688 case 2:
1689 args->mount_server.version = NFS_MNT_VERSION;
1690 }
0076d7b7 1691 }
c5d120f8 1692 request.version = args->mount_server.version;
0076d7b7 1693
33832034 1694 if (args->mount_server.hostname)
c5d120f8 1695 request.hostname = args->mount_server.hostname;
33832034 1696 else
c5d120f8 1697 request.hostname = args->nfs_server.hostname;
33832034 1698
0076d7b7
CL
1699 /*
1700 * Construct the mount server's address.
1701 */
4c568017 1702 if (args->mount_server.address.ss_family == AF_UNSPEC) {
c5d120f8 1703 memcpy(request.sap, &args->nfs_server.address,
4c568017
CL
1704 args->nfs_server.addrlen);
1705 args->mount_server.addrlen = args->nfs_server.addrlen;
1706 }
c5d120f8 1707 request.salen = args->mount_server.addrlen;
f5855fec 1708 nfs_set_port(request.sap, &args->mount_server.port, 0);
0076d7b7
CL
1709
1710 /*
1711 * Now ask the mount server to map our export path
1712 * to a file handle.
1713 */
c5d120f8 1714 status = nfs_mount(&request);
ec88f28d
CL
1715 if (status != 0) {
1716 dfprintk(MOUNT, "NFS: unable to mount server %s, error %d\n",
1717 request.hostname, status);
1718 return status;
1719 }
0076d7b7 1720
4580a92d
CL
1721 nfs_select_flavor(args, &request);
1722 return 0;
0076d7b7
CL
1723}
1724
ff9099f2
BS
1725struct dentry *nfs_try_mount(int flags, const char *dev_name,
1726 struct nfs_mount_info *mount_info,
1727 struct nfs_subversion *nfs_mod)
486aa699
BS
1728{
1729 int status;
1730 struct nfs_server *server;
1731
b72e4f42 1732 if (mount_info->parsed->need_mount) {
87c7083d 1733 status = nfs_request_mount(mount_info->parsed, mount_info->mntfh);
b72e4f42
BS
1734 if (status)
1735 return ERR_PTR(status);
1736 }
486aa699
BS
1737
1738 /* Get a volume representation */
1179acc6 1739 server = nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
486aa699
BS
1740 if (IS_ERR(server))
1741 return ERR_CAST(server);
1742
ab7017a3 1743 return nfs_fs_mount_common(server, flags, dev_name, mount_info, nfs_mod);
486aa699 1744}
ddda8e0a 1745EXPORT_SYMBOL_GPL(nfs_try_mount);
486aa699 1746
c12bacec
RL
1747/*
1748 * Split "dev_name" into "hostname:export_path".
1749 *
1750 * The leftmost colon demarks the split between the server's hostname
1751 * and the export path. If the hostname starts with a left square
1752 * bracket, then it may contain colons.
1753 *
1754 * Note: caller frees hostname and export path, even on error.
1755 */
1756static int nfs_parse_devname(const char *dev_name,
1757 char **hostname, size_t maxnamlen,
1758 char **export_path, size_t maxpathlen)
dc045898
CL
1759{
1760 size_t len;
c12bacec 1761 char *end;
dc045898 1762
c12bacec
RL
1763 /* Is the host name protected with square brakcets? */
1764 if (*dev_name == '[') {
1765 end = strchr(++dev_name, ']');
1766 if (end == NULL || end[1] != ':')
dc045898 1767 goto out_bad_devname;
dc045898 1768
c12bacec
RL
1769 len = end - dev_name;
1770 end++;
1771 } else {
1772 char *comma;
dc045898 1773
c12bacec
RL
1774 end = strchr(dev_name, ':');
1775 if (end == NULL)
1776 goto out_bad_devname;
1777 len = end - dev_name;
d1aa0825 1778
c12bacec
RL
1779 /* kill possible hostname list: not supported */
1780 comma = strchr(dev_name, ',');
1781 if (comma != NULL && comma < end)
1782 *comma = 0;
1783 }
d1aa0825 1784
d1aa0825
CL
1785 if (len > maxnamlen)
1786 goto out_hostname;
1787
1788 /* N.B. caller will free nfs_server.hostname in all cases */
c12bacec 1789 *hostname = kstrndup(dev_name, len, GFP_KERNEL);
d1aa0825
CL
1790 if (*hostname == NULL)
1791 goto out_nomem;
c12bacec 1792 len = strlen(++end);
d1aa0825
CL
1793 if (len > maxpathlen)
1794 goto out_path;
1795 *export_path = kstrndup(end, len, GFP_KERNEL);
1796 if (!*export_path)
1797 goto out_nomem;
1798
c12bacec 1799 dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", *export_path);
d1aa0825
CL
1800 return 0;
1801
1802out_bad_devname:
1803 dfprintk(MOUNT, "NFS: device name not in host:path format\n");
1804 return -EINVAL;
1805
1806out_nomem:
1807 dfprintk(MOUNT, "NFS: not enough memory to parse device name\n");
1808 return -ENOMEM;
1809
1810out_hostname:
1811 dfprintk(MOUNT, "NFS: server hostname too long\n");
1812 return -ENAMETOOLONG;
1813
1814out_path:
1815 dfprintk(MOUNT, "NFS: export pathname too long\n");
1816 return -ENAMETOOLONG;
1817}
1818
f7b422b1 1819/*
54ceac45
DH
1820 * Validate the NFS2/NFS3 mount data
1821 * - fills in the mount root filehandle
136d558c
CL
1822 *
1823 * For option strings, user space handles the following behaviors:
1824 *
1825 * + DNS: mapping server host name to IP address ("addr=" option)
1826 *
1827 * + failure mode: how to behave if a mount request can't be handled
1828 * immediately ("fg/bg" option)
1829 *
1830 * + retry: how often to retry a mount request ("retry=" option)
1831 *
1832 * + breaking back: trying proto=udp after proto=tcp, v2 after v3,
1833 * mountproto=tcp after mountproto=udp, and so on
f7b422b1 1834 */
d72c727c
BS
1835static int nfs23_validate_mount_data(void *options,
1836 struct nfs_parsed_mount_data *args,
1837 struct nfs_fh *mntfh,
1838 const char *dev_name)
f7b422b1 1839{
2283f8d6 1840 struct nfs_mount_data *data = (struct nfs_mount_data *)options;
4cfd74fc 1841 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
136d558c 1842
5df36e78
CL
1843 if (data == NULL)
1844 goto out_no_data;
f7b422b1 1845
c5afc8da 1846 args->version = NFS_DEFAULT_VERSION;
54ceac45 1847 switch (data->version) {
5df36e78
CL
1848 case 1:
1849 data->namlen = 0;
1850 case 2:
1851 data->bsize = 0;
1852 case 3:
1853 if (data->flags & NFS_MOUNT_VER3)
1854 goto out_no_v3;
1855 data->root.size = NFS2_FHSIZE;
1856 memcpy(data->root.data, data->old_root.data, NFS2_FHSIZE);
1857 case 4:
1858 if (data->flags & NFS_MOUNT_SECFLAVOUR)
1859 goto out_no_sec;
1860 case 5:
1861 memset(data->context, 0, sizeof(data->context));
1862 case 6:
b7e24457
TM
1863 if (data->flags & NFS_MOUNT_VER3) {
1864 if (data->root.size > NFS3_FHSIZE || data->root.size == 0)
1865 goto out_invalid_fh;
5df36e78 1866 mntfh->size = data->root.size;
764302cc
CL
1867 args->version = 3;
1868 } else {
5df36e78 1869 mntfh->size = NFS2_FHSIZE;
764302cc
CL
1870 args->version = 2;
1871 }
5df36e78 1872
5df36e78
CL
1873
1874 memcpy(mntfh->data, data->root.data, mntfh->size);
1875 if (mntfh->size < sizeof(mntfh->data))
1876 memset(mntfh->data + mntfh->size, 0,
1877 sizeof(mntfh->data) - mntfh->size);
6e88e061 1878
2283f8d6
TT
1879 /*
1880 * Translate to nfs_parsed_mount_data, which nfs_fill_super
1881 * can deal with.
1882 */
ff3525a5 1883 args->flags = data->flags & NFS_MOUNT_FLAGMASK;
d5eff1a3 1884 args->flags |= NFS_MOUNT_LEGACY_INTERFACE;
2283f8d6
TT
1885 args->rsize = data->rsize;
1886 args->wsize = data->wsize;
2283f8d6
TT
1887 args->timeo = data->timeo;
1888 args->retrans = data->retrans;
1889 args->acregmin = data->acregmin;
1890 args->acregmax = data->acregmax;
1891 args->acdirmin = data->acdirmin;
1892 args->acdirmax = data->acdirmax;
b72e4f42 1893 args->need_mount = false;
4c568017 1894
4cfd74fc 1895 memcpy(sap, &data->addr, sizeof(data->addr));
4c568017 1896 args->nfs_server.addrlen = sizeof(data->addr);
872ece86 1897 args->nfs_server.port = ntohs(data->addr.sin_port);
4cfd74fc 1898 if (!nfs_verify_server_address(sap))
4c568017
CL
1899 goto out_no_address;
1900
2283f8d6 1901 if (!(data->flags & NFS_MOUNT_TCP))
0896a725 1902 args->nfs_server.protocol = XPRT_TRANSPORT_UDP;
2283f8d6
TT
1903 /* N.B. caller will free nfs_server.hostname in all cases */
1904 args->nfs_server.hostname = kstrdup(data->hostname, GFP_KERNEL);
1905 args->namlen = data->namlen;
1906 args->bsize = data->bsize;
dd07c947
CL
1907
1908 if (data->flags & NFS_MOUNT_SECFLAVOUR)
1909 args->auth_flavors[0] = data->pseudoflavor;
63649bd7
CG
1910 if (!args->nfs_server.hostname)
1911 goto out_nomem;
f9c3a380 1912
5eebde23
SJ
1913 if (!(data->flags & NFS_MOUNT_NONLM))
1914 args->flags &= ~(NFS_MOUNT_LOCAL_FLOCK|
1915 NFS_MOUNT_LOCAL_FCNTL);
1916 else
1917 args->flags |= (NFS_MOUNT_LOCAL_FLOCK|
1918 NFS_MOUNT_LOCAL_FCNTL);
f9c3a380
EP
1919 /*
1920 * The legacy version 6 binary mount data from userspace has a
1921 * field used only to transport selinux information into the
1922 * the kernel. To continue to support that functionality we
1923 * have a touch of selinux knowledge here in the NFS code. The
1924 * userspace code converted context=blah to just blah so we are
1925 * converting back to the full string selinux understands.
1926 */
1927 if (data->context[0]){
1928#ifdef CONFIG_SECURITY_SELINUX
1929 int rc;
1930 char *opts_str = kmalloc(sizeof(data->context) + 8, GFP_KERNEL);
1931 if (!opts_str)
1932 return -ENOMEM;
1933 strcpy(opts_str, "context=");
1934 data->context[NFS_MAX_CONTEXT_LEN] = '\0';
1935 strcat(opts_str, &data->context[0]);
1936 rc = security_sb_parse_opts_str(opts_str, &args->lsm_opts);
1937 kfree(opts_str);
1938 if (rc)
1939 return rc;
1940#else
1941 return -EINVAL;
1942#endif
1943 }
1944
5df36e78 1945 break;
b72e4f42
BS
1946 default:
1947 return NFS_TEXT_DATA;
f7b422b1 1948 }
54ceac45 1949
1c606fb7 1950#if !IS_ENABLED(CONFIG_NFS_V3)
8a6e5deb 1951 if (args->version == 3)
5df36e78
CL
1952 goto out_v3_not_compiled;
1953#endif /* !CONFIG_NFS_V3 */
f7b422b1 1954
5df36e78 1955 return 0;
f7b422b1 1956
5df36e78
CL
1957out_no_data:
1958 dfprintk(MOUNT, "NFS: mount program didn't pass any mount data\n");
1959 return -EINVAL;
54ceac45 1960
5df36e78
CL
1961out_no_v3:
1962 dfprintk(MOUNT, "NFS: nfs_mount_data version %d does not support v3\n",
1963 data->version);
1964 return -EINVAL;
f7b422b1 1965
5df36e78
CL
1966out_no_sec:
1967 dfprintk(MOUNT, "NFS: nfs_mount_data version supports only AUTH_SYS\n");
1968 return -EINVAL;
1969
1c606fb7 1970#if !IS_ENABLED(CONFIG_NFS_V3)
5df36e78
CL
1971out_v3_not_compiled:
1972 dfprintk(MOUNT, "NFS: NFSv3 is not compiled into kernel\n");
1973 return -EPROTONOSUPPORT;
1974#endif /* !CONFIG_NFS_V3 */
1975
63649bd7
CG
1976out_nomem:
1977 dfprintk(MOUNT, "NFS: not enough memory to handle mount options\n");
1978 return -ENOMEM;
1979
5df36e78
CL
1980out_no_address:
1981 dfprintk(MOUNT, "NFS: mount program didn't pass remote address\n");
1982 return -EINVAL;
1983
1984out_invalid_fh:
1985 dfprintk(MOUNT, "NFS: invalid root filehandle\n");
1986 return -EINVAL;
f7b422b1
DH
1987}
1988
89d77c8f 1989#if IS_ENABLED(CONFIG_NFS_V4)
d72c727c
BS
1990static int nfs_validate_mount_data(struct file_system_type *fs_type,
1991 void *options,
1992 struct nfs_parsed_mount_data *args,
1993 struct nfs_fh *mntfh,
1994 const char *dev_name)
1995{
1996 if (fs_type == &nfs_fs_type)
1997 return nfs23_validate_mount_data(options, args, mntfh, dev_name);
1998 return nfs4_validate_mount_data(options, args, dev_name);
1999}
2000#else
2001static int nfs_validate_mount_data(struct file_system_type *fs_type,
2002 void *options,
2003 struct nfs_parsed_mount_data *args,
2004 struct nfs_fh *mntfh,
2005 const char *dev_name)
2006{
2007 return nfs23_validate_mount_data(options, args, mntfh, dev_name);
2008}
2009#endif
2010
b72e4f42
BS
2011static int nfs_validate_text_mount_data(void *options,
2012 struct nfs_parsed_mount_data *args,
2013 const char *dev_name)
2014{
2015 int port = 0;
2016 int max_namelen = PAGE_SIZE;
2017 int max_pathlen = NFS_MAXPATHLEN;
2018 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
2019
2020 if (nfs_parse_mount_options((char *)options, args) == 0)
2021 return -EINVAL;
2022
2023 if (!nfs_verify_server_address(sap))
2024 goto out_no_address;
2025
2026 if (args->version == 4) {
89d77c8f 2027#if IS_ENABLED(CONFIG_NFS_V4)
b72e4f42
BS
2028 port = NFS_PORT;
2029 max_namelen = NFS4_MAXNAMLEN;
2030 max_pathlen = NFS4_MAXPATHLEN;
2031 nfs_validate_transport_protocol(args);
2032 nfs4_validate_mount_flags(args);
2033#else
2034 goto out_v4_not_compiled;
2035#endif /* CONFIG_NFS_V4 */
2036 } else
2037 nfs_set_mount_transport_protocol(args);
2038
2039 nfs_set_port(sap, &args->nfs_server.port, port);
2040
2041 if (args->auth_flavor_len > 1)
2042 goto out_bad_auth;
2043
2044 return nfs_parse_devname(dev_name,
2045 &args->nfs_server.hostname,
2046 max_namelen,
2047 &args->nfs_server.export_path,
2048 max_pathlen);
2049
89d77c8f 2050#if !IS_ENABLED(CONFIG_NFS_V4)
b72e4f42
BS
2051out_v4_not_compiled:
2052 dfprintk(MOUNT, "NFS: NFSv4 is not compiled into kernel\n");
2053 return -EPROTONOSUPPORT;
2054#endif /* !CONFIG_NFS_V4 */
2055
2056out_no_address:
2057 dfprintk(MOUNT, "NFS: mount program didn't pass remote address\n");
2058 return -EINVAL;
2059
2060out_bad_auth:
2061 dfprintk(MOUNT, "NFS: Too many RPC auth flavours specified\n");
2062 return -EINVAL;
2063}
2064
48b605f8
JL
2065static int
2066nfs_compare_remount_data(struct nfs_server *nfss,
2067 struct nfs_parsed_mount_data *data)
2068{
2069 if (data->flags != nfss->flags ||
2070 data->rsize != nfss->rsize ||
2071 data->wsize != nfss->wsize ||
2072 data->retrans != nfss->client->cl_timeout->to_retries ||
2073 data->auth_flavors[0] != nfss->client->cl_auth->au_flavor ||
2074 data->acregmin != nfss->acregmin / HZ ||
2075 data->acregmax != nfss->acregmax / HZ ||
2076 data->acdirmin != nfss->acdirmin / HZ ||
2077 data->acdirmax != nfss->acdirmax / HZ ||
2078 data->timeo != (10U * nfss->client->cl_timeout->to_initval / HZ) ||
bcd2ea17 2079 data->nfs_server.port != nfss->port ||
48b605f8 2080 data->nfs_server.addrlen != nfss->nfs_client->cl_addrlen ||
a1be9eee
SR
2081 !rpc_cmp_addr((struct sockaddr *)&data->nfs_server.address,
2082 (struct sockaddr *)&nfss->nfs_client->cl_addr))
48b605f8
JL
2083 return -EINVAL;
2084
2085 return 0;
2086}
2087
fbdefd64 2088int
48b605f8
JL
2089nfs_remount(struct super_block *sb, int *flags, char *raw_data)
2090{
2091 int error;
2092 struct nfs_server *nfss = sb->s_fs_info;
2093 struct nfs_parsed_mount_data *data;
2094 struct nfs_mount_data *options = (struct nfs_mount_data *)raw_data;
2095 struct nfs4_mount_data *options4 = (struct nfs4_mount_data *)raw_data;
cd100725 2096 u32 nfsvers = nfss->nfs_client->rpc_ops->version;
48b605f8
JL
2097
2098 /*
2099 * Userspace mount programs that send binary options generally send
2100 * them populated with default values. We have no way to know which
2101 * ones were explicitly specified. Fall back to legacy behavior and
2102 * just return success.
2103 */
31c94469
MZ
2104 if ((nfsvers == 4 && (!options4 || options4->version == 1)) ||
2105 (nfsvers <= 3 && (!options || (options->version >= 1 &&
2106 options->version <= 6))))
48b605f8
JL
2107 return 0;
2108
2109 data = kzalloc(sizeof(*data), GFP_KERNEL);
2110 if (data == NULL)
2111 return -ENOMEM;
2112
2113 /* fill out struct with values from existing mount */
2114 data->flags = nfss->flags;
2115 data->rsize = nfss->rsize;
2116 data->wsize = nfss->wsize;
2117 data->retrans = nfss->client->cl_timeout->to_retries;
2118 data->auth_flavors[0] = nfss->client->cl_auth->au_flavor;
2119 data->acregmin = nfss->acregmin / HZ;
2120 data->acregmax = nfss->acregmax / HZ;
2121 data->acdirmin = nfss->acdirmin / HZ;
2122 data->acdirmax = nfss->acdirmax / HZ;
2123 data->timeo = 10U * nfss->client->cl_timeout->to_initval / HZ;
bcd2ea17 2124 data->nfs_server.port = nfss->port;
48b605f8
JL
2125 data->nfs_server.addrlen = nfss->nfs_client->cl_addrlen;
2126 memcpy(&data->nfs_server.address, &nfss->nfs_client->cl_addr,
2127 data->nfs_server.addrlen);
2128
2129 /* overwrite those values with any that were specified */
2130 error = nfs_parse_mount_options((char *)options, data);
2131 if (error < 0)
2132 goto out;
2133
26c4c170
JL
2134 /*
2135 * noac is a special case. It implies -o sync, but that's not
2136 * necessarily reflected in the mtab options. do_remount_sb
2137 * will clear MS_SYNCHRONOUS if -o sync wasn't specified in the
2138 * remount options, so we have to explicitly reset it.
2139 */
2140 if (data->flags & NFS_MOUNT_NOAC)
2141 *flags |= MS_SYNCHRONOUS;
2142
48b605f8
JL
2143 /* compare new mount options with old ones */
2144 error = nfs_compare_remount_data(nfss, data);
2145out:
2146 kfree(data);
2147 return error;
2148}
89d77c8f 2149EXPORT_SYMBOL_GPL(nfs_remount);
48b605f8 2150
f7b422b1 2151/*
54ceac45 2152 * Initialise the common bits of the superblock
f7b422b1 2153 */
fbdefd64 2154inline void nfs_initialise_sb(struct super_block *sb)
f7b422b1 2155{
54ceac45 2156 struct nfs_server *server = NFS_SB(sb);
5006a76c 2157
54ceac45 2158 sb->s_magic = NFS_SUPER_MAGIC;
f7b422b1 2159
54ceac45
DH
2160 /* We probably want something more informative here */
2161 snprintf(sb->s_id, sizeof(sb->s_id),
5a7c9eec 2162 "%u:%u", MAJOR(sb->s_dev), MINOR(sb->s_dev));
5006a76c 2163
54ceac45
DH
2164 if (sb->s_blocksize == 0)
2165 sb->s_blocksize = nfs_block_bits(server->wsize,
2166 &sb->s_blocksize_bits);
f7b422b1 2167
32a88aa1
JA
2168 sb->s_bdi = &server->backing_dev_info;
2169
54ceac45 2170 nfs_super_set_maxbytes(sb, server->maxfilesize);
f7b422b1
DH
2171}
2172
2173/*
54ceac45 2174 * Finish setting up an NFS2/3 superblock
f7b422b1 2175 */
fbdefd64 2176void nfs_fill_super(struct super_block *sb, struct nfs_mount_info *mount_info)
f7b422b1 2177{
c40f8d1d 2178 struct nfs_parsed_mount_data *data = mount_info->parsed;
f7b422b1 2179 struct nfs_server *server = NFS_SB(sb);
5006a76c 2180
54ceac45
DH
2181 sb->s_blocksize_bits = 0;
2182 sb->s_blocksize = 0;
6a74490d
BS
2183 sb->s_xattr = server->nfs_client->cl_nfs_mod->xattr;
2184 sb->s_op = server->nfs_client->cl_nfs_mod->sops;
2185 if (data && data->bsize)
54ceac45 2186 sb->s_blocksize = nfs_block_size(data->bsize, &sb->s_blocksize_bits);
f7b422b1 2187
6a74490d 2188 if (server->nfs_client->rpc_ops->version != 2) {
54ceac45
DH
2189 /* The VFS shouldn't apply the umask to mode bits. We will do
2190 * so ourselves when necessary.
2191 */
2192 sb->s_flags |= MS_POSIXACL;
2193 sb->s_time_gran = 1;
816724e6 2194 }
54ceac45 2195
54ceac45 2196 nfs_initialise_sb(sb);
f7b422b1 2197}
89d77c8f 2198EXPORT_SYMBOL_GPL(nfs_fill_super);
f7b422b1
DH
2199
2200/*
3cadf4b8 2201 * Finish setting up a cloned NFS2/3/4 superblock
f7b422b1 2202 */
fbdefd64 2203void nfs_clone_super(struct super_block *sb, struct nfs_mount_info *mount_info)
f7b422b1 2204{
8c958e0c 2205 const struct super_block *old_sb = mount_info->cloned->sb;
54ceac45
DH
2206 struct nfs_server *server = NFS_SB(sb);
2207
2208 sb->s_blocksize_bits = old_sb->s_blocksize_bits;
2209 sb->s_blocksize = old_sb->s_blocksize;
2210 sb->s_maxbytes = old_sb->s_maxbytes;
3cadf4b8
BS
2211 sb->s_xattr = old_sb->s_xattr;
2212 sb->s_op = old_sb->s_op;
2213 sb->s_time_gran = 1;
f7b422b1 2214
3cadf4b8 2215 if (server->nfs_client->rpc_ops->version != 2) {
54ceac45
DH
2216 /* The VFS shouldn't apply the umask to mode bits. We will do
2217 * so ourselves when necessary.
f7b422b1
DH
2218 */
2219 sb->s_flags |= MS_POSIXACL;
f7b422b1
DH
2220 }
2221
54ceac45 2222 nfs_initialise_sb(sb);
f7b422b1
DH
2223}
2224
275a5d24
TM
2225static int nfs_compare_mount_options(const struct super_block *s, const struct nfs_server *b, int flags)
2226{
2227 const struct nfs_server *a = s->s_fs_info;
2228 const struct rpc_clnt *clnt_a = a->client;
2229 const struct rpc_clnt *clnt_b = b->client;
2230
2231 if ((s->s_flags & NFS_MS_MASK) != (flags & NFS_MS_MASK))
2232 goto Ebusy;
2233 if (a->nfs_client != b->nfs_client)
2234 goto Ebusy;
2235 if (a->flags != b->flags)
2236 goto Ebusy;
2237 if (a->wsize != b->wsize)
2238 goto Ebusy;
2239 if (a->rsize != b->rsize)
2240 goto Ebusy;
2241 if (a->acregmin != b->acregmin)
2242 goto Ebusy;
2243 if (a->acregmax != b->acregmax)
2244 goto Ebusy;
2245 if (a->acdirmin != b->acdirmin)
2246 goto Ebusy;
2247 if (a->acdirmax != b->acdirmax)
2248 goto Ebusy;
2249 if (clnt_a->cl_auth->au_flavor != clnt_b->cl_auth->au_flavor)
2250 goto Ebusy;
e89a5a43 2251 return 1;
275a5d24 2252Ebusy:
e89a5a43
TM
2253 return 0;
2254}
2255
2256struct nfs_sb_mountdata {
2257 struct nfs_server *server;
2258 int mntflags;
2259};
2260
2261static int nfs_set_super(struct super_block *s, void *data)
2262{
2263 struct nfs_sb_mountdata *sb_mntdata = data;
2264 struct nfs_server *server = sb_mntdata->server;
2265 int ret;
2266
2267 s->s_flags = sb_mntdata->mntflags;
2268 s->s_fs_info = server;
8b244ff2 2269 s->s_d_op = server->nfs_client->rpc_ops->dentry_ops;
e89a5a43
TM
2270 ret = set_anon_super(s, server);
2271 if (ret == 0)
2272 server->s_dev = s->s_dev;
2273 return ret;
2274}
2275
fd00a8ff
CL
2276static int nfs_compare_super_address(struct nfs_server *server1,
2277 struct nfs_server *server2)
2278{
2279 struct sockaddr *sap1, *sap2;
2280
2281 sap1 = (struct sockaddr *)&server1->nfs_client->cl_addr;
2282 sap2 = (struct sockaddr *)&server2->nfs_client->cl_addr;
2283
2284 if (sap1->sa_family != sap2->sa_family)
2285 return 0;
2286
2287 switch (sap1->sa_family) {
2288 case AF_INET: {
2289 struct sockaddr_in *sin1 = (struct sockaddr_in *)sap1;
2290 struct sockaddr_in *sin2 = (struct sockaddr_in *)sap2;
2291 if (sin1->sin_addr.s_addr != sin2->sin_addr.s_addr)
2292 return 0;
2293 if (sin1->sin_port != sin2->sin_port)
2294 return 0;
2295 break;
2296 }
2297 case AF_INET6: {
2298 struct sockaddr_in6 *sin1 = (struct sockaddr_in6 *)sap1;
2299 struct sockaddr_in6 *sin2 = (struct sockaddr_in6 *)sap2;
2300 if (!ipv6_addr_equal(&sin1->sin6_addr, &sin2->sin6_addr))
2301 return 0;
2302 if (sin1->sin6_port != sin2->sin6_port)
2303 return 0;
2304 break;
2305 }
2306 default:
2307 return 0;
2308 }
2309
2310 return 1;
2311}
2312
e89a5a43
TM
2313static int nfs_compare_super(struct super_block *sb, void *data)
2314{
2315 struct nfs_sb_mountdata *sb_mntdata = data;
2316 struct nfs_server *server = sb_mntdata->server, *old = NFS_SB(sb);
2317 int mntflags = sb_mntdata->mntflags;
2318
fd00a8ff 2319 if (!nfs_compare_super_address(old, server))
e89a5a43
TM
2320 return 0;
2321 /* Note: NFS_MOUNT_UNSHARED == NFS4_MOUNT_UNSHARED */
2322 if (old->flags & NFS_MOUNT_UNSHARED)
2323 return 0;
2324 if (memcmp(&old->fsid, &server->fsid, sizeof(old->fsid)) != 0)
2325 return 0;
2326 return nfs_compare_mount_options(sb, server, mntflags);
275a5d24
TM
2327}
2328
39ffb921 2329#ifdef CONFIG_NFS_FSCACHE
2311b943
BS
2330static void nfs_get_cache_cookie(struct super_block *sb,
2331 struct nfs_parsed_mount_data *parsed,
2332 struct nfs_clone_mount *cloned)
2333{
c4271c6e 2334 struct nfs_server *nfss = NFS_SB(sb);
2311b943
BS
2335 char *uniq = NULL;
2336 int ulen = 0;
2337
c4271c6e
TM
2338 nfss->fscache_key = NULL;
2339 nfss->fscache = NULL;
2340
2341 if (parsed) {
2342 if (!(parsed->options & NFS_OPTION_FSCACHE))
2343 return;
2344 if (parsed->fscache_uniq) {
2345 uniq = parsed->fscache_uniq;
2346 ulen = strlen(parsed->fscache_uniq);
2347 }
2311b943
BS
2348 } else if (cloned) {
2349 struct nfs_server *mnt_s = NFS_SB(cloned->sb);
c4271c6e
TM
2350 if (!(mnt_s->options & NFS_OPTION_FSCACHE))
2351 return;
2311b943
BS
2352 if (mnt_s->fscache_key) {
2353 uniq = mnt_s->fscache_key->key.uniquifier;
2354 ulen = mnt_s->fscache_key->key.uniq_len;
2355 };
c4271c6e
TM
2356 } else
2357 return;
2311b943
BS
2358
2359 nfs_fscache_get_super_cookie(sb, uniq, ulen);
2360}
39ffb921
TM
2361#else
2362static void nfs_get_cache_cookie(struct super_block *sb,
2363 struct nfs_parsed_mount_data *parsed,
2364 struct nfs_clone_mount *cloned)
2365{
2366}
2367#endif
2311b943 2368
fa799759
MS
2369static int nfs_bdi_register(struct nfs_server *server)
2370{
2371 return bdi_register_dev(&server->backing_dev_info, server->s_dev);
2372}
2373
fbdefd64
BS
2374int nfs_set_sb_security(struct super_block *s, struct dentry *mntroot,
2375 struct nfs_mount_info *mount_info)
3d176e3f
BS
2376{
2377 return security_sb_set_mnt_opts(s, &mount_info->parsed->lsm_opts);
2378}
89d77c8f 2379EXPORT_SYMBOL_GPL(nfs_set_sb_security);
3d176e3f 2380
fbdefd64
BS
2381int nfs_clone_sb_security(struct super_block *s, struct dentry *mntroot,
2382 struct nfs_mount_info *mount_info)
3d176e3f
BS
2383{
2384 /* clone any lsm security options from the parent to the new sb */
2385 security_sb_clone_mnt_opts(mount_info->cloned->sb, s);
2386 if (mntroot->d_inode->i_op != NFS_SB(s)->nfs_client->rpc_ops->dir_inode_ops)
2387 return -ESTALE;
2388 return 0;
2389}
89d77c8f 2390EXPORT_SYMBOL_GPL(nfs_clone_sb_security);
3d176e3f 2391
ab7017a3 2392struct dentry *nfs_fs_mount_common(struct nfs_server *server,
fbdefd64 2393 int flags, const char *dev_name,
ab7017a3
BS
2394 struct nfs_mount_info *mount_info,
2395 struct nfs_subversion *nfs_mod)
f7b422b1 2396{
f7b422b1 2397 struct super_block *s;
01194981 2398 struct dentry *mntroot = ERR_PTR(-ENOMEM);
75180df2 2399 int (*compare_super)(struct super_block *, void *) = nfs_compare_super;
e89a5a43
TM
2400 struct nfs_sb_mountdata sb_mntdata = {
2401 .mntflags = flags,
c40f8d1d 2402 .server = server,
e89a5a43 2403 };
01194981 2404 int error;
33852a1f 2405
75180df2
TM
2406 if (server->flags & NFS_MOUNT_UNSHARED)
2407 compare_super = NULL;
2408
fb2088cc
SP
2409 /* -o noac implies -o sync */
2410 if (server->flags & NFS_MOUNT_NOAC)
2411 sb_mntdata.mntflags |= MS_SYNCHRONOUS;
2412
54ceac45 2413 /* Get a superblock - note that we may end up sharing one that already exists */
ab7017a3 2414 s = sget(nfs_mod->nfs_fs, compare_super, nfs_set_super, flags, &sb_mntdata);
816724e6 2415 if (IS_ERR(s)) {
01194981 2416 mntroot = ERR_CAST(s);
54ceac45 2417 goto out_err_nosb;
816724e6
TM
2418 }
2419
54ceac45
DH
2420 if (s->s_fs_info != server) {
2421 nfs_free_server(server);
2422 server = NULL;
fa799759
MS
2423 } else {
2424 error = nfs_bdi_register(server);
01194981
AV
2425 if (error) {
2426 mntroot = ERR_PTR(error);
cfbc0683 2427 goto error_splat_bdi;
01194981 2428 }
54ceac45 2429 }
f7b422b1 2430
54ceac45
DH
2431 if (!s->s_root) {
2432 /* initial superblock/root creation */
c40f8d1d 2433 mount_info->fill_super(s, mount_info);
3d176e3f 2434 nfs_get_cache_cookie(s, mount_info->parsed, mount_info->cloned);
54ceac45 2435 }
f7b422b1 2436
87c7083d 2437 mntroot = nfs_get_root(s, mount_info->mntfh, dev_name);
01194981 2438 if (IS_ERR(mntroot))
54ceac45 2439 goto error_splat_super;
816724e6 2440
3d176e3f 2441 error = mount_info->set_security(s, mntroot, mount_info);
f9c3a380
EP
2442 if (error)
2443 goto error_splat_root;
2444
54ceac45 2445 s->s_flags |= MS_ACTIVE;
0655960f
CL
2446
2447out:
01194981 2448 return mntroot;
816724e6 2449
54ceac45
DH
2450out_err_nosb:
2451 nfs_free_server(server);
0655960f 2452 goto out;
54ceac45 2453
f9c3a380
EP
2454error_splat_root:
2455 dput(mntroot);
01194981 2456 mntroot = ERR_PTR(error);
54ceac45 2457error_splat_super:
cfbc0683
N
2458 if (server && !s->s_root)
2459 bdi_unregister(&server->backing_dev_info);
2460error_splat_bdi:
6f5bbff9 2461 deactivate_locked_super(s);
0655960f 2462 goto out;
f7b422b1 2463}
89d77c8f 2464EXPORT_SYMBOL_GPL(nfs_fs_mount_common);
f7b422b1 2465
fbdefd64 2466struct dentry *nfs_fs_mount(struct file_system_type *fs_type,
c40f8d1d
BS
2467 int flags, const char *dev_name, void *raw_data)
2468{
c40f8d1d
BS
2469 struct nfs_mount_info mount_info = {
2470 .fill_super = nfs_fill_super,
3d176e3f 2471 .set_security = nfs_set_sb_security,
c40f8d1d 2472 };
c40f8d1d 2473 struct dentry *mntroot = ERR_PTR(-ENOMEM);
ab7017a3 2474 struct nfs_subversion *nfs_mod;
c40f8d1d
BS
2475 int error;
2476
46058d46 2477 mount_info.parsed = nfs_alloc_parsed_mount_data();
87c7083d
BS
2478 mount_info.mntfh = nfs_alloc_fhandle();
2479 if (mount_info.parsed == NULL || mount_info.mntfh == NULL)
c40f8d1d
BS
2480 goto out;
2481
2482 /* Validate the mount data */
87c7083d 2483 error = nfs_validate_mount_data(fs_type, raw_data, mount_info.parsed, mount_info.mntfh, dev_name);
b72e4f42 2484 if (error == NFS_TEXT_DATA)
46058d46 2485 error = nfs_validate_text_mount_data(raw_data, mount_info.parsed, dev_name);
c40f8d1d
BS
2486 if (error < 0) {
2487 mntroot = ERR_PTR(error);
2488 goto out;
2489 }
c40f8d1d 2490
ab7017a3
BS
2491 nfs_mod = get_nfs_version(mount_info.parsed->version);
2492 if (IS_ERR(nfs_mod)) {
2493 mntroot = ERR_CAST(nfs_mod);
2494 goto out;
2495 }
2496
ff9099f2 2497 mntroot = nfs_mod->rpc_ops->try_mount(flags, dev_name, &mount_info, nfs_mod);
ab7017a3
BS
2498
2499 put_nfs_version(nfs_mod);
c40f8d1d 2500out:
46058d46 2501 nfs_free_parsed_mount_data(mount_info.parsed);
87c7083d 2502 nfs_free_fhandle(mount_info.mntfh);
c40f8d1d
BS
2503 return mntroot;
2504}
89d77c8f 2505EXPORT_SYMBOL_GPL(nfs_fs_mount);
c40f8d1d 2506
387c149b
TM
2507/*
2508 * Ensure that we unregister the bdi before kill_anon_super
2509 * releases the device name
2510 */
fbdefd64 2511void nfs_put_super(struct super_block *s)
387c149b
TM
2512{
2513 struct nfs_server *server = NFS_SB(s);
2514
2515 bdi_unregister(&server->backing_dev_info);
2516}
89d77c8f 2517EXPORT_SYMBOL_GPL(nfs_put_super);
387c149b 2518
54ceac45
DH
2519/*
2520 * Destroy an NFS2/3 superblock
2521 */
fbdefd64 2522void nfs_kill_super(struct super_block *s)
f7b422b1
DH
2523{
2524 struct nfs_server *server = NFS_SB(s);
2525
2526 kill_anon_super(s);
08734048 2527 nfs_fscache_release_super_cookie(s);
54ceac45 2528 nfs_free_server(server);
f7b422b1 2529}
89d77c8f 2530EXPORT_SYMBOL_GPL(nfs_kill_super);
f7b422b1 2531
54ceac45 2532/*
8c958e0c 2533 * Clone an NFS2/3/4 server record on xdev traversal (FSID-change)
54ceac45 2534 */
3dd4f8ef 2535static struct dentry *
e8f25e6d
BS
2536nfs_xdev_mount(struct file_system_type *fs_type, int flags,
2537 const char *dev_name, void *raw_data)
f7b422b1 2538{
e8f25e6d
BS
2539 struct nfs_clone_mount *data = raw_data;
2540 struct nfs_mount_info mount_info = {
2541 .fill_super = nfs_clone_super,
2542 .set_security = nfs_clone_sb_security,
2543 .cloned = data,
2544 };
54ceac45 2545 struct nfs_server *server;
3d176e3f 2546 struct dentry *mntroot = ERR_PTR(-ENOMEM);
ab7017a3 2547 struct nfs_subversion *nfs_mod = NFS_SB(data->sb)->nfs_client->cl_nfs_mod;
f7b422b1 2548
dee972b9 2549 dprintk("--> nfs_xdev_mount()\n");
f7b422b1 2550
e8f25e6d 2551 mount_info.mntfh = mount_info.cloned->fh;
87c7083d 2552
54ceac45 2553 /* create a new volume representation */
1179acc6 2554 server = nfs_mod->rpc_ops->clone_server(NFS_SB(data->sb), data->fh, data->fattr, data->authflavor);
f7b422b1 2555
dee972b9
TM
2556 if (IS_ERR(server))
2557 mntroot = ERR_CAST(server);
2558 else
2559 mntroot = nfs_fs_mount_common(server, flags,
2560 dev_name, &mount_info, nfs_mod);
24c8dbbb 2561
dee972b9
TM
2562 dprintk("<-- nfs_xdev_mount() = %ld\n",
2563 IS_ERR(mntroot) ? PTR_ERR(mntroot) : 0L);
2564 return mntroot;
f7b422b1
DH
2565}
2566
89d77c8f 2567#if IS_ENABLED(CONFIG_NFS_V4)
54ceac45 2568
01c3f052
TM
2569static void nfs4_validate_mount_flags(struct nfs_parsed_mount_data *args)
2570{
5eebde23
SJ
2571 args->flags &= ~(NFS_MOUNT_NONLM|NFS_MOUNT_NOACL|NFS_MOUNT_VER3|
2572 NFS_MOUNT_LOCAL_FLOCK|NFS_MOUNT_LOCAL_FCNTL);
01c3f052
TM
2573}
2574
f0768ebd
CL
2575/*
2576 * Validate NFSv4 mount options
2577 */
91ea40b9
TT
2578static int nfs4_validate_mount_data(void *options,
2579 struct nfs_parsed_mount_data *args,
2580 const char *dev_name)
f0768ebd 2581{
4cfd74fc 2582 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
91ea40b9 2583 struct nfs4_mount_data *data = (struct nfs4_mount_data *)options;
f0768ebd
CL
2584 char *c;
2585
2586 if (data == NULL)
2587 goto out_no_data;
2588
cdf66442
BS
2589 args->version = 4;
2590
f0768ebd
CL
2591 switch (data->version) {
2592 case 1:
4c568017
CL
2593 if (data->host_addrlen > sizeof(args->nfs_server.address))
2594 goto out_no_address;
2595 if (data->host_addrlen == 0)
f0768ebd 2596 goto out_no_address;
4c568017 2597 args->nfs_server.addrlen = data->host_addrlen;
4cfd74fc 2598 if (copy_from_user(sap, data->host_addr, data->host_addrlen))
f0768ebd 2599 return -EFAULT;
4cfd74fc 2600 if (!nfs_verify_server_address(sap))
f0768ebd 2601 goto out_no_address;
872ece86 2602 args->nfs_server.port = ntohs(((struct sockaddr_in *)sap)->sin_port);
f0768ebd 2603
6738b251
CL
2604 if (data->auth_flavourlen) {
2605 if (data->auth_flavourlen > 1)
2606 goto out_inval_auth;
20c71f5e 2607 if (copy_from_user(&args->auth_flavors[0],
91ea40b9 2608 data->auth_flavours,
20c71f5e 2609 sizeof(args->auth_flavors[0])))
f0768ebd 2610 return -EFAULT;
f0768ebd
CL
2611 }
2612
2613 c = strndup_user(data->hostname.data, NFS4_MAXNAMLEN);
2614 if (IS_ERR(c))
2615 return PTR_ERR(c);
91ea40b9 2616 args->nfs_server.hostname = c;
f0768ebd
CL
2617
2618 c = strndup_user(data->mnt_path.data, NFS4_MAXPATHLEN);
2619 if (IS_ERR(c))
2620 return PTR_ERR(c);
91ea40b9
TT
2621 args->nfs_server.export_path = c;
2622 dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", c);
f0768ebd
CL
2623
2624 c = strndup_user(data->client_addr.data, 16);
2625 if (IS_ERR(c))
2626 return PTR_ERR(c);
91ea40b9
TT
2627 args->client_address = c;
2628
2629 /*
2630 * Translate to nfs_parsed_mount_data, which nfs4_fill_super
2631 * can deal with.
2632 */
2633
2634 args->flags = data->flags & NFS4_MOUNT_FLAGMASK;
2635 args->rsize = data->rsize;
2636 args->wsize = data->wsize;
2637 args->timeo = data->timeo;
2638 args->retrans = data->retrans;
2639 args->acregmin = data->acregmin;
2640 args->acregmax = data->acregmax;
2641 args->acdirmin = data->acdirmin;
2642 args->acdirmax = data->acdirmax;
2643 args->nfs_server.protocol = data->proto;
259875ef 2644 nfs_validate_transport_protocol(args);
f0768ebd
CL
2645
2646 break;
7630c852 2647 default:
b72e4f42 2648 return NFS_TEXT_DATA;
f0768ebd
CL
2649 }
2650
2651 return 0;
2652
2653out_no_data:
2654 dfprintk(MOUNT, "NFS4: mount program didn't pass any mount data\n");
2655 return -EINVAL;
2656
2657out_inval_auth:
2658 dfprintk(MOUNT, "NFS4: Invalid number of RPC auth flavours %d\n",
2659 data->auth_flavourlen);
2660 return -EINVAL;
2661
2662out_no_address:
2663 dfprintk(MOUNT, "NFS4: mount program didn't pass remote address\n");
2664 return -EINVAL;
f0768ebd
CL
2665}
2666
fac1e8e4
BS
2667/*
2668 * NFS v4 module parameters need to stay in the
2669 * NFS client for backwards compatibility
2670 */
2671unsigned int nfs_callback_set_tcpport;
2672unsigned short nfs_callback_tcpport;
2673/* Default cache timeout is 10 minutes */
2674unsigned int nfs_idmap_cache_timeout = 600;
2675/* Turn off NFSv4 uid/gid mapping when using AUTH_SYS */
2676bool nfs4_disable_idmapping = true;
2677unsigned short max_session_slots = NFS4_DEF_SLOT_TABLE_SIZE;
2678unsigned short send_implementation_id = 1;
6f2ea7f2 2679char nfs4_client_id_uniquifier[NFS4_CLIENT_ID_UNIQ_LEN] = "";
fac1e8e4 2680
89d77c8f
BS
2681EXPORT_SYMBOL_GPL(nfs_callback_set_tcpport);
2682EXPORT_SYMBOL_GPL(nfs_callback_tcpport);
2683EXPORT_SYMBOL_GPL(nfs_idmap_cache_timeout);
2684EXPORT_SYMBOL_GPL(nfs4_disable_idmapping);
2685EXPORT_SYMBOL_GPL(max_session_slots);
2686EXPORT_SYMBOL_GPL(send_implementation_id);
6f2ea7f2 2687EXPORT_SYMBOL_GPL(nfs4_client_id_uniquifier);
89d77c8f 2688
fac1e8e4
BS
2689#define NFS_CALLBACK_MAXPORTNR (65535U)
2690
2691static int param_set_portnr(const char *val, const struct kernel_param *kp)
2692{
2693 unsigned long num;
2694 int ret;
2695
2696 if (!val)
2697 return -EINVAL;
7297cb68 2698 ret = kstrtoul(val, 0, &num);
fac1e8e4
BS
2699 if (ret == -EINVAL || num > NFS_CALLBACK_MAXPORTNR)
2700 return -EINVAL;
2701 *((unsigned int *)kp->arg) = num;
2702 return 0;
2703}
2704static struct kernel_param_ops param_ops_portnr = {
2705 .set = param_set_portnr,
2706 .get = param_get_uint,
2707};
2708#define param_check_portnr(name, p) __param_check(name, p, unsigned int);
2709
2710module_param_named(callback_tcpport, nfs_callback_set_tcpport, portnr, 0644);
2711module_param(nfs_idmap_cache_timeout, int, 0644);
2712module_param(nfs4_disable_idmapping, bool, 0644);
6f2ea7f2
CL
2713module_param_string(nfs4_unique_id, nfs4_client_id_uniquifier,
2714 NFS4_CLIENT_ID_UNIQ_LEN, 0600);
fac1e8e4
BS
2715MODULE_PARM_DESC(nfs4_disable_idmapping,
2716 "Turn off NFSv4 idmapping when using 'sec=sys'");
2717module_param(max_session_slots, ushort, 0644);
2718MODULE_PARM_DESC(max_session_slots, "Maximum number of outstanding NFSv4.1 "
2719 "requests the client will negotiate");
2720module_param(send_implementation_id, ushort, 0644);
2721MODULE_PARM_DESC(send_implementation_id,
2722 "Send implementation ID with NFSv4.1 exchange_id");
6f2ea7f2 2723MODULE_PARM_DESC(nfs4_unique_id, "nfs_client_id4 uniquifier string");
425e776d 2724MODULE_ALIAS("nfs4");
2725
54ceac45 2726#endif /* CONFIG_NFS_V4 */