blob: 68ad0b8bcabdf93f852c2001f4a976c184e9221d [file] [log] [blame]
Thomas Gleixner457c8992019-05-19 13:08:55 +01001// SPDX-License-Identifier: GPL-2.0-only
David Howellsf7b422b2006-06-09 09:34:33 -04002/*
3 * linux/fs/nfs/super.c
4 *
5 * Copyright (C) 1992 Rick Sladkey
6 *
7 * nfs superblock handling functions
8 *
Alan Cox526719b2008-10-27 15:19:48 +00009 * Modularised by Alan Cox <alan@lxorguk.ukuu.org.uk>, while hacking some
David Howellsf7b422b2006-06-09 09:34:33 -040010 * experimental NFS changes. Modularisation taken straight from SYS5 fs.
11 *
12 * Change to nfs_read_super() to permit NFS mounts to multi-homed hosts.
13 * J.S.Peatfield@damtp.cam.ac.uk
14 *
15 * Split from inode.c by David Howells <dhowells@redhat.com>
16 *
David Howells54ceac42006-08-22 20:06:13 -040017 * - superblocks are indexed on server only - all inodes, dentries, etc. associated with a
18 * particular server are held in the same superblock
19 * - NFS superblocks can have several effective roots to the dentry tree
20 * - directory type roots are spliced into the tree when a path from one root reaches the root
21 * of another (see nfs_lookup())
David Howellsf7b422b2006-06-09 09:34:33 -040022 */
23
David Howellsf7b422b2006-06-09 09:34:33 -040024#include <linux/module.h>
25#include <linux/init.h>
26
27#include <linux/time.h>
28#include <linux/kernel.h>
29#include <linux/mm.h>
30#include <linux/string.h>
31#include <linux/stat.h>
32#include <linux/errno.h>
33#include <linux/unistd.h>
34#include <linux/sunrpc/clnt.h>
Jeff Layton59766872013-02-04 12:50:00 -050035#include <linux/sunrpc/addr.h>
David Howellsf7b422b2006-06-09 09:34:33 -040036#include <linux/sunrpc/stats.h>
37#include <linux/sunrpc/metrics.h>
\"Talpey, Thomas\0896a722007-09-10 13:48:23 -040038#include <linux/sunrpc/xprtsock.h>
\"Talpey, Thomas\2cf7ff72007-09-10 13:49:41 -040039#include <linux/sunrpc/xprtrdma.h>
David Howellsf7b422b2006-06-09 09:34:33 -040040#include <linux/nfs_fs.h>
41#include <linux/nfs_mount.h>
42#include <linux/nfs4_mount.h>
43#include <linux/lockd/bind.h>
David Howellsf7b422b2006-06-09 09:34:33 -040044#include <linux/seq_file.h>
45#include <linux/mount.h>
Trond Myklebustc02d7ad2009-06-22 15:09:14 -040046#include <linux/namei.h>
David Howellsf7b422b2006-06-09 09:34:33 -040047#include <linux/vfs.h>
48#include <linux/inet.h>
Chuck Leverfd00a8f2007-12-10 14:57:38 -050049#include <linux/in6.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090050#include <linux/slab.h>
Chuck Leverfd00a8f2007-12-10 14:57:38 -050051#include <net/ipv6.h>
Chuck Leverd8e77482008-06-23 12:37:01 -040052#include <linux/netdevice.h>
David Howellsf7b422b2006-06-09 09:34:33 -040053#include <linux/nfs_xdr.h>
Adrian Bunkb5d5dfb2007-02-12 00:53:40 -080054#include <linux/magic.h>
Chuck Leverbf0fd762007-07-01 12:13:44 -040055#include <linux/parser.h>
Stanislav Kinsburskye50a7a12012-01-10 16:12:46 +040056#include <linux/nsproxy.h>
Trond Myklebust2446ab62012-03-01 17:00:56 -050057#include <linux/rcupdate.h>
David Howellsf7b422b2006-06-09 09:34:33 -040058
Linus Torvalds7c0f6ba2016-12-24 11:46:01 -080059#include <linux/uaccess.h>
David Howellsf7b422b2006-06-09 09:34:33 -040060
61#include "nfs4_fs.h"
62#include "callback.h"
63#include "delegation.h"
64#include "iostat.h"
65#include "internal.h"
David Howells08734042009-04-03 16:42:42 +010066#include "fscache.h"
Trond Myklebust76e697b2012-11-26 14:20:49 -050067#include "nfs4session.h"
J. Bruce Fieldsae50c0b2011-05-22 19:48:21 +030068#include "pnfs.h"
Bryan Schumakerab7017a2012-07-30 16:05:16 -040069#include "nfs.h"
David Howellsf7b422b2006-06-09 09:34:33 -040070
71#define NFSDBG_FACILITY NFSDBG_VFS
Bryan Schumakerb72e4f42012-05-10 15:07:40 -040072#define NFS_TEXT_DATA 1
David Howellsf7b422b2006-06-09 09:34:33 -040073
Bryan Schumaker1c606fb2012-07-30 16:05:24 -040074#if IS_ENABLED(CONFIG_NFS_V3)
Paulius Zaleckas1e657bd2010-10-31 18:21:05 +020075#define NFS_DEFAULT_VERSION 3
76#else
77#define NFS_DEFAULT_VERSION 2
78#endif
79
Trond Myklebust28cc5cd2017-04-26 23:30:48 -040080#define NFS_MAX_CONNECTIONS 16
81
Chuck Leverbf0fd762007-07-01 12:13:44 -040082enum {
83 /* Mount options that take no arguments */
Trond Myklebust91a575e2019-04-07 13:59:01 -040084 Opt_soft, Opt_softerr, Opt_hard,
Chuck Leverbf0fd762007-07-01 12:13:44 -040085 Opt_posix, Opt_noposix,
86 Opt_cto, Opt_nocto,
87 Opt_ac, Opt_noac,
88 Opt_lock, Opt_nolock,
\"Talpey, Thomas\2cf7ff72007-09-10 13:49:41 -040089 Opt_udp, Opt_tcp, Opt_rdma,
Chuck Leverbf0fd762007-07-01 12:13:44 -040090 Opt_acl, Opt_noacl,
91 Opt_rdirplus, Opt_nordirplus,
Trond Myklebust75180df2007-05-16 16:53:28 -040092 Opt_sharecache, Opt_nosharecache,
Chuck Leverd7403512008-12-23 15:21:37 -050093 Opt_resvport, Opt_noresvport,
David Howellsb797cac2009-04-03 16:42:48 +010094 Opt_fscache, Opt_nofscache,
Chuck Lever89652612012-09-14 17:24:11 -040095 Opt_migration, Opt_nomigration,
Chuck Leverbf0fd762007-07-01 12:13:44 -040096
97 /* Mount options that take integer arguments */
98 Opt_port,
99 Opt_rsize, Opt_wsize, Opt_bsize,
100 Opt_timeo, Opt_retrans,
101 Opt_acregmin, Opt_acregmax,
102 Opt_acdirmin, Opt_acdirmax,
103 Opt_actimeo,
104 Opt_namelen,
105 Opt_mountport,
Chuck Levere887cbc2007-10-26 13:32:29 -0400106 Opt_mountvers,
Mike Sager3fd5be92009-04-01 09:21:48 -0400107 Opt_minorversion,
Chuck Leverbf0fd762007-07-01 12:13:44 -0400108
109 /* Mount options that take string arguments */
Trond Myklebust0d71b052012-03-02 13:59:49 -0500110 Opt_nfsvers,
Chuck Lever33832032007-12-10 14:59:13 -0500111 Opt_sec, Opt_proto, Opt_mountproto, Opt_mounthost,
Chuck Lever0ac83772007-09-11 18:01:04 -0400112 Opt_addr, Opt_mountaddr, Opt_clientaddr,
Trond Myklebust28cc5cd2017-04-26 23:30:48 -0400113 Opt_nconnect,
Trond Myklebust7973c1f12008-07-15 17:58:14 -0400114 Opt_lookupcache,
David Howellsb797cac2009-04-03 16:42:48 +0100115 Opt_fscache_uniq,
Suresh Jayaraman5eebde22010-09-23 08:55:58 -0400116 Opt_local_lock,
Chuck Leverbf0fd762007-07-01 12:13:44 -0400117
Chuck Leverf45663c2008-06-24 19:28:02 -0400118 /* Special mount options */
119 Opt_userspace, Opt_deprecated, Opt_sloppy,
Chuck Leverbf0fd762007-07-01 12:13:44 -0400120
121 Opt_err
122};
123
Steven Whitehousea447c092008-10-13 10:46:57 +0100124static const match_table_t nfs_mount_option_tokens = {
Chuck Leverbf0fd762007-07-01 12:13:44 -0400125 { Opt_userspace, "bg" },
126 { Opt_userspace, "fg" },
Chuck Leverecbb3842008-06-12 12:37:33 -0400127 { Opt_userspace, "retry=%s" },
128
Chuck Leverf45663c2008-06-24 19:28:02 -0400129 { Opt_sloppy, "sloppy" },
130
Chuck Leverbf0fd762007-07-01 12:13:44 -0400131 { Opt_soft, "soft" },
Trond Myklebust91a575e2019-04-07 13:59:01 -0400132 { Opt_softerr, "softerr" },
Chuck Leverbf0fd762007-07-01 12:13:44 -0400133 { Opt_hard, "hard" },
Chuck Leverd33e4df2008-06-12 12:37:41 -0400134 { Opt_deprecated, "intr" },
135 { Opt_deprecated, "nointr" },
Chuck Leverbf0fd762007-07-01 12:13:44 -0400136 { Opt_posix, "posix" },
137 { Opt_noposix, "noposix" },
138 { Opt_cto, "cto" },
139 { Opt_nocto, "nocto" },
140 { Opt_ac, "ac" },
141 { Opt_noac, "noac" },
142 { Opt_lock, "lock" },
143 { Opt_nolock, "nolock" },
Chuck Leverbf0fd762007-07-01 12:13:44 -0400144 { Opt_udp, "udp" },
145 { Opt_tcp, "tcp" },
\"Talpey, Thomas\2cf7ff72007-09-10 13:49:41 -0400146 { Opt_rdma, "rdma" },
Chuck Leverbf0fd762007-07-01 12:13:44 -0400147 { Opt_acl, "acl" },
148 { Opt_noacl, "noacl" },
149 { Opt_rdirplus, "rdirplus" },
150 { Opt_nordirplus, "nordirplus" },
Trond Myklebust75180df2007-05-16 16:53:28 -0400151 { Opt_sharecache, "sharecache" },
152 { Opt_nosharecache, "nosharecache" },
Chuck Leverd7403512008-12-23 15:21:37 -0500153 { Opt_resvport, "resvport" },
154 { Opt_noresvport, "noresvport" },
David Howellsb797cac2009-04-03 16:42:48 +0100155 { Opt_fscache, "fsc" },
David Howellsb797cac2009-04-03 16:42:48 +0100156 { Opt_nofscache, "nofsc" },
Chuck Lever89652612012-09-14 17:24:11 -0400157 { Opt_migration, "migration" },
158 { Opt_nomigration, "nomigration" },
Chuck Leverbf0fd762007-07-01 12:13:44 -0400159
Chuck Levera5a16ba2009-06-17 18:02:14 -0700160 { Opt_port, "port=%s" },
161 { Opt_rsize, "rsize=%s" },
162 { Opt_wsize, "wsize=%s" },
163 { Opt_bsize, "bsize=%s" },
164 { Opt_timeo, "timeo=%s" },
165 { Opt_retrans, "retrans=%s" },
166 { Opt_acregmin, "acregmin=%s" },
167 { Opt_acregmax, "acregmax=%s" },
168 { Opt_acdirmin, "acdirmin=%s" },
169 { Opt_acdirmax, "acdirmax=%s" },
170 { Opt_actimeo, "actimeo=%s" },
171 { Opt_namelen, "namlen=%s" },
172 { Opt_mountport, "mountport=%s" },
173 { Opt_mountvers, "mountvers=%s" },
Trond Myklebust0d71b052012-03-02 13:59:49 -0500174 { Opt_minorversion, "minorversion=%s" },
175
Chuck Levera5a16ba2009-06-17 18:02:14 -0700176 { Opt_nfsvers, "nfsvers=%s" },
177 { Opt_nfsvers, "vers=%s" },
Chuck Leverbf0fd762007-07-01 12:13:44 -0400178
179 { Opt_sec, "sec=%s" },
180 { Opt_proto, "proto=%s" },
181 { Opt_mountproto, "mountproto=%s" },
182 { Opt_addr, "addr=%s" },
183 { Opt_clientaddr, "clientaddr=%s" },
Chuck Lever33832032007-12-10 14:59:13 -0500184 { Opt_mounthost, "mounthost=%s" },
Chuck Lever0ac83772007-09-11 18:01:04 -0400185 { Opt_mountaddr, "mountaddr=%s" },
Chuck Leverbf0fd762007-07-01 12:13:44 -0400186
Trond Myklebust28cc5cd2017-04-26 23:30:48 -0400187 { Opt_nconnect, "nconnect=%s" },
188
Trond Myklebust7973c1f12008-07-15 17:58:14 -0400189 { Opt_lookupcache, "lookupcache=%s" },
Chuck Levera6d5ff62010-05-07 13:33:58 -0400190 { Opt_fscache_uniq, "fsc=%s" },
Suresh Jayaraman5eebde22010-09-23 08:55:58 -0400191 { Opt_local_lock, "local_lock=%s" },
Trond Myklebust7973c1f12008-07-15 17:58:14 -0400192
Trond Myklebust38622792012-03-02 14:06:39 -0500193 /* The following needs to be listed after all other options */
194 { Opt_nfsvers, "v%s" },
195
Chuck Leverbf0fd762007-07-01 12:13:44 -0400196 { Opt_err, NULL }
197};
198
199enum {
Jeff Laytonee671b02009-12-03 15:58:56 -0500200 Opt_xprt_udp, Opt_xprt_udp6, Opt_xprt_tcp, Opt_xprt_tcp6, Opt_xprt_rdma,
Shirley Ma181342c2016-05-02 14:40:23 -0400201 Opt_xprt_rdma6,
Chuck Leverbf0fd762007-07-01 12:13:44 -0400202
203 Opt_xprt_err
204};
205
Steven Whitehousea447c092008-10-13 10:46:57 +0100206static const match_table_t nfs_xprt_protocol_tokens = {
Chuck Leverbf0fd762007-07-01 12:13:44 -0400207 { Opt_xprt_udp, "udp" },
Jeff Laytonee671b02009-12-03 15:58:56 -0500208 { Opt_xprt_udp6, "udp6" },
Chuck Leverbf0fd762007-07-01 12:13:44 -0400209 { Opt_xprt_tcp, "tcp" },
Jeff Laytonee671b02009-12-03 15:58:56 -0500210 { Opt_xprt_tcp6, "tcp6" },
\"Talpey, Thomas\2cf7ff72007-09-10 13:49:41 -0400211 { Opt_xprt_rdma, "rdma" },
Shirley Ma181342c2016-05-02 14:40:23 -0400212 { Opt_xprt_rdma6, "rdma6" },
Chuck Leverbf0fd762007-07-01 12:13:44 -0400213
214 { Opt_xprt_err, NULL }
215};
216
217enum {
218 Opt_sec_none, Opt_sec_sys,
219 Opt_sec_krb5, Opt_sec_krb5i, Opt_sec_krb5p,
220 Opt_sec_lkey, Opt_sec_lkeyi, Opt_sec_lkeyp,
221 Opt_sec_spkm, Opt_sec_spkmi, Opt_sec_spkmp,
222
223 Opt_sec_err
224};
225
Steven Whitehousea447c092008-10-13 10:46:57 +0100226static const match_table_t nfs_secflavor_tokens = {
Chuck Leverbf0fd762007-07-01 12:13:44 -0400227 { Opt_sec_none, "none" },
228 { Opt_sec_none, "null" },
229 { Opt_sec_sys, "sys" },
230
231 { Opt_sec_krb5, "krb5" },
232 { Opt_sec_krb5i, "krb5i" },
233 { Opt_sec_krb5p, "krb5p" },
234
235 { Opt_sec_lkey, "lkey" },
236 { Opt_sec_lkeyi, "lkeyi" },
237 { Opt_sec_lkeyp, "lkeyp" },
238
Olga Kornievskaia8d042212008-02-13 16:47:06 -0500239 { Opt_sec_spkm, "spkm3" },
240 { Opt_sec_spkmi, "spkm3i" },
241 { Opt_sec_spkmp, "spkm3p" },
242
Chuck Leverbf0fd762007-07-01 12:13:44 -0400243 { Opt_sec_err, NULL }
244};
245
Trond Myklebust7973c1f12008-07-15 17:58:14 -0400246enum {
247 Opt_lookupcache_all, Opt_lookupcache_positive,
248 Opt_lookupcache_none,
249
250 Opt_lookupcache_err
251};
252
253static match_table_t nfs_lookupcache_tokens = {
254 { Opt_lookupcache_all, "all" },
255 { Opt_lookupcache_positive, "pos" },
256 { Opt_lookupcache_positive, "positive" },
257 { Opt_lookupcache_none, "none" },
258
259 { Opt_lookupcache_err, NULL }
260};
261
Suresh Jayaraman5eebde22010-09-23 08:55:58 -0400262enum {
263 Opt_local_lock_all, Opt_local_lock_flock, Opt_local_lock_posix,
264 Opt_local_lock_none,
265
266 Opt_local_lock_err
267};
268
269static match_table_t nfs_local_lock_tokens = {
270 { Opt_local_lock_all, "all" },
271 { Opt_local_lock_flock, "flock" },
272 { Opt_local_lock_posix, "posix" },
273 { Opt_local_lock_none, "none" },
274
275 { Opt_local_lock_err, NULL }
276};
277
Trond Myklebust0d71b052012-03-02 13:59:49 -0500278enum {
279 Opt_vers_2, Opt_vers_3, Opt_vers_4, Opt_vers_4_0,
Steve Dickson42c2c422013-05-22 12:50:38 -0400280 Opt_vers_4_1, Opt_vers_4_2,
Trond Myklebust0d71b052012-03-02 13:59:49 -0500281
282 Opt_vers_err
283};
284
285static match_table_t nfs_vers_tokens = {
286 { Opt_vers_2, "2" },
287 { Opt_vers_3, "3" },
288 { Opt_vers_4, "4" },
289 { Opt_vers_4_0, "4.0" },
290 { Opt_vers_4_1, "4.1" },
Steve Dickson42c2c422013-05-22 12:50:38 -0400291 { Opt_vers_4_2, "4.2" },
Trond Myklebust0d71b052012-03-02 13:59:49 -0500292
293 { Opt_vers_err, NULL }
294};
Chuck Leverbf0fd762007-07-01 12:13:44 -0400295
Al Viro31f43472010-10-29 03:38:12 -0400296static struct dentry *nfs_xdev_mount(struct file_system_type *fs_type,
297 int flags, const char *dev_name, void *raw_data);
David Howellsf7b422b2006-06-09 09:34:33 -0400298
Bryan Schumakerab7017a2012-07-30 16:05:16 -0400299struct file_system_type nfs_fs_type = {
David Howellsf7b422b2006-06-09 09:34:33 -0400300 .owner = THIS_MODULE,
301 .name = "nfs",
Al Viro011949812011-03-16 07:25:36 -0400302 .mount = nfs_fs_mount,
David Howellsf7b422b2006-06-09 09:34:33 -0400303 .kill_sb = nfs_kill_super,
Jeff Laytonecf3d1f2013-02-20 11:19:05 -0500304 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
David Howellsf7b422b2006-06-09 09:34:33 -0400305};
Eric W. Biederman7f78e032013-03-02 19:39:14 -0800306MODULE_ALIAS_FS("nfs");
Bryan Schumakerddda8e02012-07-30 16:05:23 -0400307EXPORT_SYMBOL_GPL(nfs_fs_type);
David Howellsf7b422b2006-06-09 09:34:33 -0400308
David Howells54ceac42006-08-22 20:06:13 -0400309struct file_system_type nfs_xdev_fs_type = {
David Howellsf7b422b2006-06-09 09:34:33 -0400310 .owner = THIS_MODULE,
311 .name = "nfs",
Al Viro31f43472010-10-29 03:38:12 -0400312 .mount = nfs_xdev_mount,
David Howellsf7b422b2006-06-09 09:34:33 -0400313 .kill_sb = nfs_kill_super,
Jeff Laytonecf3d1f2013-02-20 11:19:05 -0500314 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
David Howellsf7b422b2006-06-09 09:34:33 -0400315};
316
Bryan Schumaker6a744902012-07-30 16:05:20 -0400317const struct super_operations nfs_sops = {
David Howellsf7b422b2006-06-09 09:34:33 -0400318 .alloc_inode = nfs_alloc_inode,
Al Viroca1a1992019-04-15 20:19:40 -0400319 .free_inode = nfs_free_inode,
David Howellsf7b422b2006-06-09 09:34:33 -0400320 .write_inode = nfs_write_inode,
Trond Myklebusteed99352012-12-14 14:36:36 -0500321 .drop_inode = nfs_drop_inode,
David Howellsf7b422b2006-06-09 09:34:33 -0400322 .statfs = nfs_statfs,
Al Virob57922d2010-06-07 14:34:48 -0400323 .evict_inode = nfs_evict_inode,
David Howellsf7b422b2006-06-09 09:34:33 -0400324 .umount_begin = nfs_umount_begin,
325 .show_options = nfs_show_options,
Al Viroc7f404b2011-03-16 06:59:40 -0400326 .show_devname = nfs_show_devname,
327 .show_path = nfs_show_path,
David Howellsf7b422b2006-06-09 09:34:33 -0400328 .show_stats = nfs_show_stats,
Jeff Layton48b605f2008-06-10 15:38:39 -0400329 .remount_fs = nfs_remount,
David Howellsf7b422b2006-06-09 09:34:33 -0400330};
Bryan Schumakerddda8e02012-07-30 16:05:23 -0400331EXPORT_SYMBOL_GPL(nfs_sops);
David Howellsf7b422b2006-06-09 09:34:33 -0400332
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400333#if IS_ENABLED(CONFIG_NFS_V4)
Bryan Schumakerb72e4f42012-05-10 15:07:40 -0400334static void nfs4_validate_mount_flags(struct nfs_parsed_mount_data *);
Bryan Schumakerd72c7272012-05-10 15:07:41 -0400335static int nfs4_validate_mount_data(void *options,
336 struct nfs_parsed_mount_data *args, const char *dev_name);
bjschuma@gmail.com1ae811e2012-08-08 13:57:06 -0400337
338struct file_system_type nfs4_fs_type = {
339 .owner = THIS_MODULE,
340 .name = "nfs4",
341 .mount = nfs_fs_mount,
342 .kill_sb = nfs_kill_super,
Jeff Laytonecf3d1f2013-02-20 11:19:05 -0500343 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
bjschuma@gmail.com1ae811e2012-08-08 13:57:06 -0400344};
Eric W. Biederman7f78e032013-03-02 19:39:14 -0800345MODULE_ALIAS_FS("nfs4");
Eric W. Biedermanfa7614dd2013-03-12 18:27:41 -0700346MODULE_ALIAS("nfs4");
bjschuma@gmail.com1ae811e2012-08-08 13:57:06 -0400347EXPORT_SYMBOL_GPL(nfs4_fs_type);
348
349static int __init register_nfs4_fs(void)
350{
351 return register_filesystem(&nfs4_fs_type);
352}
353
354static void unregister_nfs4_fs(void)
355{
356 unregister_filesystem(&nfs4_fs_type);
357}
358#else
359static int __init register_nfs4_fs(void)
360{
361 return 0;
362}
363
364static void unregister_nfs4_fs(void)
365{
366}
David Howellsf7b422b2006-06-09 09:34:33 -0400367#endif
368
Rusty Russell8e1f9362007-07-17 04:03:17 -0700369static struct shrinker acl_shrinker = {
Dave Chinner1ab6c492013-08-28 10:18:09 +1000370 .count_objects = nfs_access_cache_count,
371 .scan_objects = nfs_access_cache_scan,
Rusty Russell8e1f9362007-07-17 04:03:17 -0700372 .seeks = DEFAULT_SEEKS,
373};
Trond Myklebust979df722006-07-25 11:28:19 -0400374
David Howellsf7b422b2006-06-09 09:34:33 -0400375/*
376 * Register the NFS filesystems
377 */
378int __init register_nfs_fs(void)
379{
380 int ret;
381
382 ret = register_filesystem(&nfs_fs_type);
383 if (ret < 0)
384 goto error_0;
385
bjschuma@gmail.com1ae811e2012-08-08 13:57:06 -0400386 ret = register_nfs4_fs();
David Howellsf7b422b2006-06-09 09:34:33 -0400387 if (ret < 0)
388 goto error_1;
bjschuma@gmail.com1ae811e2012-08-08 13:57:06 -0400389
390 ret = nfs_register_sysctl();
391 if (ret < 0)
392 goto error_2;
Kinglong Mee5ef8d792015-07-30 21:41:08 +0800393 ret = register_shrinker(&acl_shrinker);
394 if (ret < 0)
395 goto error_3;
David Howellsf7b422b2006-06-09 09:34:33 -0400396 return 0;
Kinglong Mee5ef8d792015-07-30 21:41:08 +0800397error_3:
398 nfs_unregister_sysctl();
bjschuma@gmail.com1ae811e2012-08-08 13:57:06 -0400399error_2:
400 unregister_nfs4_fs();
David Howellsf7b422b2006-06-09 09:34:33 -0400401error_1:
402 unregister_filesystem(&nfs_fs_type);
David Howellsf7b422b2006-06-09 09:34:33 -0400403error_0:
404 return ret;
405}
406
407/*
408 * Unregister the NFS filesystems
409 */
410void __exit unregister_nfs_fs(void)
411{
Rusty Russell8e1f9362007-07-17 04:03:17 -0700412 unregister_shrinker(&acl_shrinker);
Alexey Dobriyan49af7ee2007-09-18 22:46:40 -0700413 nfs_unregister_sysctl();
bjschuma@gmail.com1ae811e2012-08-08 13:57:06 -0400414 unregister_nfs4_fs();
David Howellsf7b422b2006-06-09 09:34:33 -0400415 unregister_filesystem(&nfs_fs_type);
416}
417
Trond Myklebustea7c38f2015-02-05 15:13:24 -0500418bool nfs_sb_active(struct super_block *sb)
Steve Dicksonef818a22007-11-08 04:05:04 -0500419{
420 struct nfs_server *server = NFS_SB(sb);
Trond Myklebust1daef0a2008-07-27 18:19:01 -0400421
Trond Myklebustea7c38f2015-02-05 15:13:24 -0500422 if (!atomic_inc_not_zero(&sb->s_active))
423 return false;
424 if (atomic_inc_return(&server->active) != 1)
425 atomic_dec(&sb->s_active);
426 return true;
Trond Myklebust1daef0a2008-07-27 18:19:01 -0400427}
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400428EXPORT_SYMBOL_GPL(nfs_sb_active);
Trond Myklebust1daef0a2008-07-27 18:19:01 -0400429
430void nfs_sb_deactive(struct super_block *sb)
431{
432 struct nfs_server *server = NFS_SB(sb);
433
434 if (atomic_dec_and_test(&server->active))
435 deactivate_super(sb);
Steve Dicksonef818a22007-11-08 04:05:04 -0500436}
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400437EXPORT_SYMBOL_GPL(nfs_sb_deactive);
Steve Dicksonef818a22007-11-08 04:05:04 -0500438
David Howellsf7b422b2006-06-09 09:34:33 -0400439/*
440 * Deliver file system statistics to userspace
441 */
Bryan Schumakerfbdefd62012-07-16 16:39:20 -0400442int nfs_statfs(struct dentry *dentry, struct kstatfs *buf)
David Howellsf7b422b2006-06-09 09:34:33 -0400443{
David Howells0c7d90c2006-08-22 20:06:10 -0400444 struct nfs_server *server = NFS_SB(dentry->d_sb);
David Howellsf7b422b2006-06-09 09:34:33 -0400445 unsigned char blockbits;
446 unsigned long blockres;
David Howells2b0143b2015-03-17 22:25:59 +0000447 struct nfs_fh *fh = NFS_FH(d_inode(dentry));
Trond Myklebustca7e9a02010-04-16 16:22:52 -0400448 struct nfs_fsstat res;
449 int error = -ENOMEM;
450
451 res.fattr = nfs_alloc_fattr();
452 if (res.fattr == NULL)
453 goto out_err;
David Howellsf7b422b2006-06-09 09:34:33 -0400454
David Howells8fa5c002006-08-22 20:06:12 -0400455 error = server->nfs_client->rpc_ops->statfs(server, fh, &res);
Menyhart Zoltanfbf3fdd2010-09-12 19:55:26 -0400456 if (unlikely(error == -ESTALE)) {
457 struct dentry *pd_dentry;
Trond Myklebustca7e9a02010-04-16 16:22:52 -0400458
Menyhart Zoltanfbf3fdd2010-09-12 19:55:26 -0400459 pd_dentry = dget_parent(dentry);
460 if (pd_dentry != NULL) {
David Howells2b0143b2015-03-17 22:25:59 +0000461 nfs_zap_caches(d_inode(pd_dentry));
Menyhart Zoltanfbf3fdd2010-09-12 19:55:26 -0400462 dput(pd_dentry);
463 }
464 }
Trond Myklebustca7e9a02010-04-16 16:22:52 -0400465 nfs_free_fattr(res.fattr);
David Howellsf7b422b2006-06-09 09:34:33 -0400466 if (error < 0)
467 goto out_err;
Trond Myklebustca7e9a02010-04-16 16:22:52 -0400468
Amnon Aaronsohn1a0ba9a2007-04-09 22:05:26 -0700469 buf->f_type = NFS_SUPER_MAGIC;
David Howellsf7b422b2006-06-09 09:34:33 -0400470
471 /*
472 * Current versions of glibc do not correctly handle the
473 * case where f_frsize != f_bsize. Eventually we want to
474 * report the value of wtmult in this field.
475 */
David Howells0c7d90c2006-08-22 20:06:10 -0400476 buf->f_frsize = dentry->d_sb->s_blocksize;
David Howellsf7b422b2006-06-09 09:34:33 -0400477
478 /*
479 * On most *nix systems, f_blocks, f_bfree, and f_bavail
480 * are reported in units of f_frsize. Linux hasn't had
481 * an f_frsize field in its statfs struct until recently,
482 * thus historically Linux's sys_statfs reports these
483 * fields in units of f_bsize.
484 */
David Howells0c7d90c2006-08-22 20:06:10 -0400485 buf->f_bsize = dentry->d_sb->s_blocksize;
486 blockbits = dentry->d_sb->s_blocksize_bits;
David Howellsf7b422b2006-06-09 09:34:33 -0400487 blockres = (1 << blockbits) - 1;
488 buf->f_blocks = (res.tbytes + blockres) >> blockbits;
489 buf->f_bfree = (res.fbytes + blockres) >> blockbits;
490 buf->f_bavail = (res.abytes + blockres) >> blockbits;
491
492 buf->f_files = res.tfiles;
493 buf->f_ffree = res.afiles;
494
495 buf->f_namelen = server->namelen;
Amnon Aaronsohn1a0ba9a2007-04-09 22:05:26 -0700496
David Howellsf7b422b2006-06-09 09:34:33 -0400497 return 0;
498
499 out_err:
Harvey Harrison3110ff82008-05-02 13:42:44 -0700500 dprintk("%s: statfs error = %d\n", __func__, -error);
Amnon Aaronsohn1a0ba9a2007-04-09 22:05:26 -0700501 return error;
David Howellsf7b422b2006-06-09 09:34:33 -0400502}
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400503EXPORT_SYMBOL_GPL(nfs_statfs);
David Howellsf7b422b2006-06-09 09:34:33 -0400504
David Howells7d4e2742006-08-22 20:06:07 -0400505/*
506 * Map the security flavour number to a name
507 */
Trond Myklebust81039f12006-06-09 09:34:34 -0400508static const char *nfs_pseudoflavour_to_name(rpc_authflavor_t flavour)
509{
David Howells7d4e2742006-08-22 20:06:07 -0400510 static const struct {
Trond Myklebust81039f12006-06-09 09:34:34 -0400511 rpc_authflavor_t flavour;
512 const char *str;
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -0400513 } sec_flavours[NFS_AUTH_INFO_MAX_FLAVORS] = {
514 /* update NFS_AUTH_INFO_MAX_FLAVORS when this list changes! */
Trond Myklebust81039f12006-06-09 09:34:34 -0400515 { RPC_AUTH_NULL, "null" },
516 { RPC_AUTH_UNIX, "sys" },
517 { RPC_AUTH_GSS_KRB5, "krb5" },
518 { RPC_AUTH_GSS_KRB5I, "krb5i" },
519 { RPC_AUTH_GSS_KRB5P, "krb5p" },
520 { RPC_AUTH_GSS_LKEY, "lkey" },
521 { RPC_AUTH_GSS_LKEYI, "lkeyi" },
522 { RPC_AUTH_GSS_LKEYP, "lkeyp" },
523 { RPC_AUTH_GSS_SPKM, "spkm" },
524 { RPC_AUTH_GSS_SPKMI, "spkmi" },
525 { RPC_AUTH_GSS_SPKMP, "spkmp" },
Chuck Lever4d81cd12007-07-01 12:12:40 -0400526 { UINT_MAX, "unknown" }
Trond Myklebust81039f12006-06-09 09:34:34 -0400527 };
528 int i;
529
Chuck Lever4d81cd12007-07-01 12:12:40 -0400530 for (i = 0; sec_flavours[i].flavour != UINT_MAX; i++) {
Trond Myklebust81039f12006-06-09 09:34:34 -0400531 if (sec_flavours[i].flavour == flavour)
532 break;
533 }
534 return sec_flavours[i].str;
535}
536
Jeff Laytonee671b02009-12-03 15:58:56 -0500537static void nfs_show_mountd_netid(struct seq_file *m, struct nfs_server *nfss,
538 int showdefaults)
539{
540 struct sockaddr *sap = (struct sockaddr *) &nfss->mountd_address;
NeilBrown6f6e3c02017-01-13 11:04:27 +1100541 char *proto = NULL;
Jeff Laytonee671b02009-12-03 15:58:56 -0500542
Jeff Laytonee671b02009-12-03 15:58:56 -0500543 switch (sap->sa_family) {
544 case AF_INET:
545 switch (nfss->mountd_protocol) {
546 case IPPROTO_UDP:
NeilBrown6f6e3c02017-01-13 11:04:27 +1100547 proto = RPCBIND_NETID_UDP;
Jeff Laytonee671b02009-12-03 15:58:56 -0500548 break;
549 case IPPROTO_TCP:
NeilBrown6f6e3c02017-01-13 11:04:27 +1100550 proto = RPCBIND_NETID_TCP;
Jeff Laytonee671b02009-12-03 15:58:56 -0500551 break;
Jeff Laytonee671b02009-12-03 15:58:56 -0500552 }
553 break;
554 case AF_INET6:
555 switch (nfss->mountd_protocol) {
556 case IPPROTO_UDP:
NeilBrown6f6e3c02017-01-13 11:04:27 +1100557 proto = RPCBIND_NETID_UDP6;
Jeff Laytonee671b02009-12-03 15:58:56 -0500558 break;
559 case IPPROTO_TCP:
NeilBrown6f6e3c02017-01-13 11:04:27 +1100560 proto = RPCBIND_NETID_TCP6;
Jeff Laytonee671b02009-12-03 15:58:56 -0500561 break;
Jeff Laytonee671b02009-12-03 15:58:56 -0500562 }
563 break;
Jeff Laytonee671b02009-12-03 15:58:56 -0500564 }
NeilBrown6f6e3c02017-01-13 11:04:27 +1100565 if (proto || showdefaults)
566 seq_printf(m, ",mountproto=%s", proto ?: "auto");
Jeff Laytonee671b02009-12-03 15:58:56 -0500567}
568
Chuck Lever82d101d2008-03-14 14:10:37 -0400569static void nfs_show_mountd_options(struct seq_file *m, struct nfs_server *nfss,
570 int showdefaults)
571{
572 struct sockaddr *sap = (struct sockaddr *)&nfss->mountd_address;
573
Bryan Schumakerd5eff1a2010-08-03 13:04:00 -0400574 if (nfss->flags & NFS_MOUNT_LEGACY_INTERFACE)
575 return;
576
Chuck Lever82d101d2008-03-14 14:10:37 -0400577 switch (sap->sa_family) {
578 case AF_INET: {
579 struct sockaddr_in *sin = (struct sockaddr_in *)sap;
Harvey Harrisonbe859402008-10-31 00:56:28 -0700580 seq_printf(m, ",mountaddr=%pI4", &sin->sin_addr.s_addr);
Chuck Lever82d101d2008-03-14 14:10:37 -0400581 break;
582 }
583 case AF_INET6: {
584 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap;
Chuck Leverd250e192009-12-03 15:58:56 -0500585 seq_printf(m, ",mountaddr=%pI6c", &sin6->sin6_addr);
Chuck Lever82d101d2008-03-14 14:10:37 -0400586 break;
587 }
588 default:
589 if (showdefaults)
590 seq_printf(m, ",mountaddr=unspecified");
591 }
592
593 if (nfss->mountd_version || showdefaults)
594 seq_printf(m, ",mountvers=%u", nfss->mountd_version);
Stanislav Kinsburskyaa699472010-12-08 12:40:13 +0300595 if ((nfss->mountd_port &&
596 nfss->mountd_port != (unsigned short)NFS_UNSPEC_PORT) ||
597 showdefaults)
Chuck Lever82d101d2008-03-14 14:10:37 -0400598 seq_printf(m, ",mountport=%u", nfss->mountd_port);
599
Jeff Laytonee671b02009-12-03 15:58:56 -0500600 nfs_show_mountd_netid(m, nfss, showdefaults);
Chuck Lever82d101d2008-03-14 14:10:37 -0400601}
602
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400603#if IS_ENABLED(CONFIG_NFS_V4)
Trond Myklebust0be81892010-06-18 12:23:58 -0400604static void nfs_show_nfsv4_options(struct seq_file *m, struct nfs_server *nfss,
605 int showdefaults)
606{
607 struct nfs_client *clp = nfss->nfs_client;
608
609 seq_printf(m, ",clientaddr=%s", clp->cl_ipaddr);
Trond Myklebust0be81892010-06-18 12:23:58 -0400610}
611#else
612static void nfs_show_nfsv4_options(struct seq_file *m, struct nfs_server *nfss,
613 int showdefaults)
614{
615}
616#endif
617
Trond Myklebust7bbceb62012-03-02 14:00:20 -0500618static void nfs_show_nfs_version(struct seq_file *m,
619 unsigned int version,
620 unsigned int minorversion)
621{
622 seq_printf(m, ",vers=%u", version);
623 if (version == 4)
624 seq_printf(m, ".%u", minorversion);
625}
626
David Howellsf7b422b2006-06-09 09:34:33 -0400627/*
628 * Describe the mount options in force on this server representation
629 */
Chuck Lever82d101d2008-03-14 14:10:37 -0400630static void nfs_show_mount_options(struct seq_file *m, struct nfs_server *nfss,
631 int showdefaults)
David Howellsf7b422b2006-06-09 09:34:33 -0400632{
David Howells509de812006-08-22 20:06:11 -0400633 static const struct proc_nfs_info {
David Howellsf7b422b2006-06-09 09:34:33 -0400634 int flag;
David Howells509de812006-08-22 20:06:11 -0400635 const char *str;
636 const char *nostr;
David Howellsf7b422b2006-06-09 09:34:33 -0400637 } nfs_info[] = {
Trond Myklebust91a575e2019-04-07 13:59:01 -0400638 { NFS_MOUNT_SOFT, ",soft", "" },
639 { NFS_MOUNT_SOFTERR, ",softerr", "" },
Chuck Lever82d101d2008-03-14 14:10:37 -0400640 { NFS_MOUNT_POSIX, ",posix", "" },
David Howellsf7b422b2006-06-09 09:34:33 -0400641 { NFS_MOUNT_NOCTO, ",nocto", "" },
642 { NFS_MOUNT_NOAC, ",noac", "" },
643 { NFS_MOUNT_NONLM, ",nolock", "" },
644 { NFS_MOUNT_NOACL, ",noacl", "" },
Steve Dickson74dd34e2007-04-14 17:01:15 -0400645 { NFS_MOUNT_NORDIRPLUS, ",nordirplus", "" },
Chuck Leverd7403512008-12-23 15:21:37 -0500646 { NFS_MOUNT_UNSHARED, ",nosharecache", "" },
647 { NFS_MOUNT_NORESVPORT, ",noresvport", "" },
David Howellsf7b422b2006-06-09 09:34:33 -0400648 { 0, NULL, NULL }
649 };
David Howells509de812006-08-22 20:06:11 -0400650 const struct proc_nfs_info *nfs_infop;
David Howells8fa5c002006-08-22 20:06:12 -0400651 struct nfs_client *clp = nfss->nfs_client;
Chuck Lever82d101d2008-03-14 14:10:37 -0400652 u32 version = clp->rpc_ops->version;
Suresh Jayaraman7c563cc2010-09-23 14:26:48 -0400653 int local_flock, local_fcntl;
David Howellsf7b422b2006-06-09 09:34:33 -0400654
Trond Myklebust7bbceb62012-03-02 14:00:20 -0500655 nfs_show_nfs_version(m, version, clp->cl_minorversion);
Chuck Lever2d767432008-03-14 14:10:08 -0400656 seq_printf(m, ",rsize=%u", nfss->rsize);
657 seq_printf(m, ",wsize=%u", nfss->wsize);
Chuck Lever82d101d2008-03-14 14:10:37 -0400658 if (nfss->bsize != 0)
659 seq_printf(m, ",bsize=%u", nfss->bsize);
660 seq_printf(m, ",namlen=%u", nfss->namelen);
Chuck Lever0e0cab72008-06-26 17:47:12 -0400661 if (nfss->acregmin != NFS_DEF_ACREGMIN*HZ || showdefaults)
Chuck Lever2d767432008-03-14 14:10:08 -0400662 seq_printf(m, ",acregmin=%u", nfss->acregmin/HZ);
Chuck Lever0e0cab72008-06-26 17:47:12 -0400663 if (nfss->acregmax != NFS_DEF_ACREGMAX*HZ || showdefaults)
Chuck Lever2d767432008-03-14 14:10:08 -0400664 seq_printf(m, ",acregmax=%u", nfss->acregmax/HZ);
Chuck Lever0e0cab72008-06-26 17:47:12 -0400665 if (nfss->acdirmin != NFS_DEF_ACDIRMIN*HZ || showdefaults)
Chuck Lever2d767432008-03-14 14:10:08 -0400666 seq_printf(m, ",acdirmin=%u", nfss->acdirmin/HZ);
Chuck Lever0e0cab72008-06-26 17:47:12 -0400667 if (nfss->acdirmax != NFS_DEF_ACDIRMAX*HZ || showdefaults)
Chuck Lever2d767432008-03-14 14:10:08 -0400668 seq_printf(m, ",acdirmax=%u", nfss->acdirmax/HZ);
Trond Myklebust91a575e2019-04-07 13:59:01 -0400669 if (!(nfss->flags & (NFS_MOUNT_SOFT|NFS_MOUNT_SOFTERR)))
670 seq_puts(m, ",hard");
David Howellsf7b422b2006-06-09 09:34:33 -0400671 for (nfs_infop = nfs_info; nfs_infop->flag; nfs_infop++) {
672 if (nfss->flags & nfs_infop->flag)
673 seq_puts(m, nfs_infop->str);
674 else
675 seq_puts(m, nfs_infop->nostr);
676 }
Trond Myklebust2446ab62012-03-01 17:00:56 -0500677 rcu_read_lock();
\"Talpey, Thomas\56928ed2007-09-10 13:48:47 -0400678 seq_printf(m, ",proto=%s",
Jeff Laytonee671b02009-12-03 15:58:56 -0500679 rpc_peeraddr2str(nfss->client, RPC_DISPLAY_NETID));
Trond Myklebust2446ab62012-03-01 17:00:56 -0500680 rcu_read_unlock();
Chuck Lever82d101d2008-03-14 14:10:37 -0400681 if (version == 4) {
682 if (nfss->port != NFS_PORT)
683 seq_printf(m, ",port=%u", nfss->port);
684 } else
685 if (nfss->port)
686 seq_printf(m, ",port=%u", nfss->port);
687
Trond Myklebust33170232007-12-20 16:03:59 -0500688 seq_printf(m, ",timeo=%lu", 10U * nfss->client->cl_timeout->to_initval / HZ);
689 seq_printf(m, ",retrans=%u", nfss->client->cl_timeout->to_retries);
Trond Myklebust81039f12006-06-09 09:34:34 -0400690 seq_printf(m, ",sec=%s", nfs_pseudoflavour_to_name(nfss->client->cl_auth->au_flavor));
Chuck Lever82d101d2008-03-14 14:10:37 -0400691
692 if (version != 4)
693 nfs_show_mountd_options(m, nfss, showdefaults);
Trond Myklebust0be81892010-06-18 12:23:58 -0400694 else
695 nfs_show_nfsv4_options(m, nfss, showdefaults);
Chuck Lever82d101d2008-03-14 14:10:37 -0400696
David Howellsb797cac2009-04-03 16:42:48 +0100697 if (nfss->options & NFS_OPTION_FSCACHE)
698 seq_printf(m, ",fsc");
Patrick J. LoPresti9b00c642010-08-10 17:28:01 -0400699
Chuck Lever89652612012-09-14 17:24:11 -0400700 if (nfss->options & NFS_OPTION_MIGRATION)
701 seq_printf(m, ",migration");
702
Patrick J. LoPresti9b00c642010-08-10 17:28:01 -0400703 if (nfss->flags & NFS_MOUNT_LOOKUP_CACHE_NONEG) {
704 if (nfss->flags & NFS_MOUNT_LOOKUP_CACHE_NONE)
705 seq_printf(m, ",lookupcache=none");
706 else
707 seq_printf(m, ",lookupcache=pos");
708 }
Suresh Jayaraman7c563cc2010-09-23 14:26:48 -0400709
710 local_flock = nfss->flags & NFS_MOUNT_LOCAL_FLOCK;
711 local_fcntl = nfss->flags & NFS_MOUNT_LOCAL_FCNTL;
712
713 if (!local_flock && !local_fcntl)
714 seq_printf(m, ",local_lock=none");
715 else if (local_flock && local_fcntl)
716 seq_printf(m, ",local_lock=all");
717 else if (local_flock)
718 seq_printf(m, ",local_lock=flock");
719 else
720 seq_printf(m, ",local_lock=posix");
David Howellsf7b422b2006-06-09 09:34:33 -0400721}
722
723/*
724 * Describe the mount options on this VFS mountpoint
725 */
Bryan Schumakerfbdefd62012-07-16 16:39:20 -0400726int nfs_show_options(struct seq_file *m, struct dentry *root)
David Howellsf7b422b2006-06-09 09:34:33 -0400727{
Al Viro34c80b12011-12-08 21:32:45 -0500728 struct nfs_server *nfss = NFS_SB(root->d_sb);
David Howellsf7b422b2006-06-09 09:34:33 -0400729
730 nfs_show_mount_options(m, nfss, 0);
731
Trond Myklebust2446ab62012-03-01 17:00:56 -0500732 rcu_read_lock();
Chuck Lever5d8515c2007-12-10 14:57:16 -0500733 seq_printf(m, ",addr=%s",
734 rpc_peeraddr2str(nfss->nfs_client->cl_rpcclient,
735 RPC_DISPLAY_ADDR));
Trond Myklebust2446ab62012-03-01 17:00:56 -0500736 rcu_read_unlock();
David Howellsf7b422b2006-06-09 09:34:33 -0400737
738 return 0;
739}
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400740EXPORT_SYMBOL_GPL(nfs_show_options);
H Hartley Sweeten45402c382011-09-02 14:39:12 -0700741
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400742#if IS_ENABLED(CONFIG_NFS_V4)
J. Bruce Fieldsae50c0b2011-05-22 19:48:21 +0300743#ifdef CONFIG_NFS_V4_1
H Hartley Sweeten45402c382011-09-02 14:39:12 -0700744static void show_sessions(struct seq_file *m, struct nfs_server *server)
J. Bruce Fieldsae50c0b2011-05-22 19:48:21 +0300745{
746 if (nfs4_has_session(server->nfs_client))
747 seq_printf(m, ",sessions");
748}
749#else
H Hartley Sweeten45402c382011-09-02 14:39:12 -0700750static void show_sessions(struct seq_file *m, struct nfs_server *server) {}
751#endif
J. Bruce Fieldsae50c0b2011-05-22 19:48:21 +0300752#endif
753
754#ifdef CONFIG_NFS_V4_1
H Hartley Sweeten45402c382011-09-02 14:39:12 -0700755static void show_pnfs(struct seq_file *m, struct nfs_server *server)
J. Bruce Fieldsae50c0b2011-05-22 19:48:21 +0300756{
757 seq_printf(m, ",pnfs=");
758 if (server->pnfs_curr_ld)
759 seq_printf(m, "%s", server->pnfs_curr_ld->name);
760 else
761 seq_printf(m, "not configured");
762}
Trond Myklebust7e03b7c2012-03-04 18:12:57 -0500763
764static void show_implementation_id(struct seq_file *m, struct nfs_server *nfss)
765{
Chuck Lever59155542012-05-21 22:44:41 -0400766 if (nfss->nfs_client && nfss->nfs_client->cl_implid) {
767 struct nfs41_impl_id *impl_id = nfss->nfs_client->cl_implid;
Trond Myklebust7e03b7c2012-03-04 18:12:57 -0500768 seq_printf(m, "\n\timpl_id:\tname='%s',domain='%s',"
769 "date='%llu,%u'",
770 impl_id->name, impl_id->domain,
771 impl_id->date.seconds, impl_id->date.nseconds);
772 }
773}
H Hartley Sweeten45402c382011-09-02 14:39:12 -0700774#else
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400775#if IS_ENABLED(CONFIG_NFS_V4)
Trond Myklebust7e03b7c2012-03-04 18:12:57 -0500776static void show_pnfs(struct seq_file *m, struct nfs_server *server)
777{
778}
H Hartley Sweeten45402c382011-09-02 14:39:12 -0700779#endif
Trond Myklebust7e03b7c2012-03-04 18:12:57 -0500780static void show_implementation_id(struct seq_file *m, struct nfs_server *nfss)
781{
782}
H Hartley Sweeten45402c382011-09-02 14:39:12 -0700783#endif
David Howellsf7b422b2006-06-09 09:34:33 -0400784
Bryan Schumakerfbdefd62012-07-16 16:39:20 -0400785int nfs_show_devname(struct seq_file *m, struct dentry *root)
Al Viroc7f404b2011-03-16 06:59:40 -0400786{
787 char *page = (char *) __get_free_page(GFP_KERNEL);
788 char *devname, *dummy;
789 int err = 0;
790 if (!page)
791 return -ENOMEM;
Ben Hutchings97a54862012-10-21 19:23:52 +0100792 devname = nfs_path(&dummy, root, page, PAGE_SIZE, 0);
Al Viroc7f404b2011-03-16 06:59:40 -0400793 if (IS_ERR(devname))
794 err = PTR_ERR(devname);
795 else
796 seq_escape(m, devname, " \t\n\\");
797 free_page((unsigned long)page);
798 return err;
799}
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400800EXPORT_SYMBOL_GPL(nfs_show_devname);
Al Viroc7f404b2011-03-16 06:59:40 -0400801
Bryan Schumakerfbdefd62012-07-16 16:39:20 -0400802int nfs_show_path(struct seq_file *m, struct dentry *dentry)
Al Viroc7f404b2011-03-16 06:59:40 -0400803{
804 seq_puts(m, "/");
805 return 0;
806}
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400807EXPORT_SYMBOL_GPL(nfs_show_path);
Al Viroc7f404b2011-03-16 06:59:40 -0400808
David Howellsf7b422b2006-06-09 09:34:33 -0400809/*
810 * Present statistical information for this VFS mountpoint
811 */
Bryan Schumakerfbdefd62012-07-16 16:39:20 -0400812int nfs_show_stats(struct seq_file *m, struct dentry *root)
David Howellsf7b422b2006-06-09 09:34:33 -0400813{
814 int i, cpu;
Al Viro64132372011-12-08 20:51:13 -0500815 struct nfs_server *nfss = NFS_SB(root->d_sb);
David Howellsf7b422b2006-06-09 09:34:33 -0400816 struct rpc_auth *auth = nfss->client->cl_auth;
817 struct nfs_iostats totals = { };
818
819 seq_printf(m, "statvers=%s", NFS_IOSTAT_VERS);
820
821 /*
822 * Display all mount option settings
823 */
824 seq_printf(m, "\n\topts:\t");
David Howellsbc98a422017-07-17 08:45:34 +0100825 seq_puts(m, sb_rdonly(root->d_sb) ? "ro" : "rw");
Linus Torvalds1751e8a2017-11-27 13:05:09 -0800826 seq_puts(m, root->d_sb->s_flags & SB_SYNCHRONOUS ? ",sync" : "");
827 seq_puts(m, root->d_sb->s_flags & SB_NOATIME ? ",noatime" : "");
828 seq_puts(m, root->d_sb->s_flags & SB_NODIRATIME ? ",nodiratime" : "");
David Howellsf7b422b2006-06-09 09:34:33 -0400829 nfs_show_mount_options(m, nfss, 1);
830
831 seq_printf(m, "\n\tage:\t%lu", (jiffies - nfss->mount_time) / HZ);
832
Trond Myklebust7e03b7c2012-03-04 18:12:57 -0500833 show_implementation_id(m, nfss);
Weston Andros Adamson7d2ed9a2012-02-17 15:20:26 -0500834
David Howellsf7b422b2006-06-09 09:34:33 -0400835 seq_printf(m, "\n\tcaps:\t");
836 seq_printf(m, "caps=0x%x", nfss->caps);
Chuck Lever2d767432008-03-14 14:10:08 -0400837 seq_printf(m, ",wtmult=%u", nfss->wtmult);
838 seq_printf(m, ",dtsize=%u", nfss->dtsize);
839 seq_printf(m, ",bsize=%u", nfss->bsize);
840 seq_printf(m, ",namlen=%u", nfss->namelen);
David Howellsf7b422b2006-06-09 09:34:33 -0400841
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400842#if IS_ENABLED(CONFIG_NFS_V4)
Trond Myklebust40c553192007-12-14 14:56:07 -0500843 if (nfss->nfs_client->rpc_ops->version == 4) {
David Howellsf7b422b2006-06-09 09:34:33 -0400844 seq_printf(m, "\n\tnfsv4:\t");
845 seq_printf(m, "bm0=0x%x", nfss->attr_bitmask[0]);
846 seq_printf(m, ",bm1=0x%x", nfss->attr_bitmask[1]);
David Quigleya09df2c2013-05-22 12:50:41 -0400847 seq_printf(m, ",bm2=0x%x", nfss->attr_bitmask[2]);
David Howellsf7b422b2006-06-09 09:34:33 -0400848 seq_printf(m, ",acl=0x%x", nfss->acl_bitmask);
J. Bruce Fieldsae50c0b2011-05-22 19:48:21 +0300849 show_sessions(m, nfss);
850 show_pnfs(m, nfss);
David Howellsf7b422b2006-06-09 09:34:33 -0400851 }
852#endif
853
854 /*
855 * Display security flavor in effect for this mount
856 */
Chuck Lever2d767432008-03-14 14:10:08 -0400857 seq_printf(m, "\n\tsec:\tflavor=%u", auth->au_ops->au_flavor);
David Howellsf7b422b2006-06-09 09:34:33 -0400858 if (auth->au_flavor)
Chuck Lever2d767432008-03-14 14:10:08 -0400859 seq_printf(m, ",pseudoflavor=%u", auth->au_flavor);
David Howellsf7b422b2006-06-09 09:34:33 -0400860
861 /*
862 * Display superblock I/O counters
863 */
864 for_each_possible_cpu(cpu) {
865 struct nfs_iostats *stats;
866
867 preempt_disable();
868 stats = per_cpu_ptr(nfss->io_stats, cpu);
869
870 for (i = 0; i < __NFSIOS_COUNTSMAX; i++)
871 totals.events[i] += stats->events[i];
872 for (i = 0; i < __NFSIOS_BYTESMAX; i++)
873 totals.bytes[i] += stats->bytes[i];
David Howells6a510912009-04-03 16:42:43 +0100874#ifdef CONFIG_NFS_FSCACHE
875 for (i = 0; i < __NFSIOS_FSCACHEMAX; i++)
876 totals.fscache[i] += stats->fscache[i];
877#endif
David Howellsf7b422b2006-06-09 09:34:33 -0400878
879 preempt_enable();
880 }
881
882 seq_printf(m, "\n\tevents:\t");
883 for (i = 0; i < __NFSIOS_COUNTSMAX; i++)
884 seq_printf(m, "%lu ", totals.events[i]);
885 seq_printf(m, "\n\tbytes:\t");
886 for (i = 0; i < __NFSIOS_BYTESMAX; i++)
887 seq_printf(m, "%Lu ", totals.bytes[i]);
David Howells6a510912009-04-03 16:42:43 +0100888#ifdef CONFIG_NFS_FSCACHE
889 if (nfss->options & NFS_OPTION_FSCACHE) {
890 seq_printf(m, "\n\tfsc:\t");
891 for (i = 0; i < __NFSIOS_FSCACHEMAX; i++)
Tuo Chen Pengce85bd22017-06-06 23:42:44 -0700892 seq_printf(m, "%Lu ", totals.fscache[i]);
David Howells6a510912009-04-03 16:42:43 +0100893 }
894#endif
David Howellsf7b422b2006-06-09 09:34:33 -0400895 seq_printf(m, "\n");
896
Dave Wysochanski016583d2018-07-31 10:10:51 -0400897 rpc_clnt_show_stats(m, nfss->client);
David Howellsf7b422b2006-06-09 09:34:33 -0400898
899 return 0;
900}
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400901EXPORT_SYMBOL_GPL(nfs_show_stats);
David Howellsf7b422b2006-06-09 09:34:33 -0400902
903/*
904 * Begin unmount by attempting to remove all automounted mountpoints we added
David Howells54ceac42006-08-22 20:06:13 -0400905 * in response to xdev traversals and referrals
David Howellsf7b422b2006-06-09 09:34:33 -0400906 */
Bryan Schumakerfbdefd62012-07-16 16:39:20 -0400907void nfs_umount_begin(struct super_block *sb)
David Howellsf7b422b2006-06-09 09:34:33 -0400908{
Alessio Igor Bogani67e55202009-04-24 09:06:53 +0200909 struct nfs_server *server;
Trond Myklebustfc6ae3c2007-06-05 19:13:47 -0400910 struct rpc_clnt *rpc;
911
Alessio Igor Bogani67e55202009-04-24 09:06:53 +0200912 server = NFS_SB(sb);
Trond Myklebustfc6ae3c2007-06-05 19:13:47 -0400913 /* -EIO all pending I/O */
914 rpc = server->client_acl;
915 if (!IS_ERR(rpc))
916 rpc_killall_tasks(rpc);
917 rpc = server->client;
918 if (!IS_ERR(rpc))
919 rpc_killall_tasks(rpc);
David Howellsf7b422b2006-06-09 09:34:33 -0400920}
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400921EXPORT_SYMBOL_GPL(nfs_umount_begin);
David Howellsf7b422b2006-06-09 09:34:33 -0400922
Bryan Schumakerdb833352012-05-10 15:07:38 -0400923static struct nfs_parsed_mount_data *nfs_alloc_parsed_mount_data(void)
Chuck Lever9423a082009-09-23 14:36:38 -0400924{
925 struct nfs_parsed_mount_data *data;
926
927 data = kzalloc(sizeof(*data), GFP_KERNEL);
928 if (data) {
Trond Myklebusta956bed2016-08-16 10:26:47 -0400929 data->timeo = NFS_UNSPEC_TIMEO;
930 data->retrans = NFS_UNSPEC_RETRANS;
Chuck Lever9423a082009-09-23 14:36:38 -0400931 data->acregmin = NFS_DEF_ACREGMIN;
932 data->acregmax = NFS_DEF_ACREGMAX;
933 data->acdirmin = NFS_DEF_ACDIRMIN;
934 data->acdirmax = NFS_DEF_ACDIRMAX;
Trond Myklebustc5811db2009-10-06 15:40:15 -0400935 data->mount_server.port = NFS_UNSPEC_PORT;
Chuck Lever9423a082009-09-23 14:36:38 -0400936 data->nfs_server.port = NFS_UNSPEC_PORT;
Trond Myklebustc5811db2009-10-06 15:40:15 -0400937 data->nfs_server.protocol = XPRT_TRANSPORT_TCP;
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -0400938 data->selected_flavor = RPC_AUTH_MAXFLAVOR;
Chuck Lever9423a082009-09-23 14:36:38 -0400939 data->minorversion = 0;
Bryan Schumakerb72e4f42012-05-10 15:07:40 -0400940 data->need_mount = true;
Trond Myklebust9937347a2012-02-19 08:44:07 +0100941 data->net = current->nsproxy->net_ns;
Al Viro204cc0c2018-12-13 13:41:47 -0500942 data->lsm_opts = NULL;
Chuck Lever9423a082009-09-23 14:36:38 -0400943 }
944 return data;
945}
946
Jeff Layton8a0d5512011-12-20 06:57:45 -0500947static void nfs_free_parsed_mount_data(struct nfs_parsed_mount_data *data)
948{
949 if (data) {
950 kfree(data->client_address);
951 kfree(data->mount_server.hostname);
952 kfree(data->nfs_server.export_path);
953 kfree(data->nfs_server.hostname);
954 kfree(data->fscache_uniq);
955 security_free_mnt_opts(&data->lsm_opts);
956 kfree(data);
957 }
958}
959
David Howellsf7b422b2006-06-09 09:34:33 -0400960/*
Chuck Levercdcd7f92007-12-10 14:57:45 -0500961 * Sanity-check a server address provided by the mount command.
962 *
963 * Address family must be initialized, and address must not be
964 * the ANY address for that family.
Chuck Leverfc50d582007-07-01 12:12:46 -0400965 */
966static int nfs_verify_server_address(struct sockaddr *addr)
967{
968 switch (addr->sa_family) {
969 case AF_INET: {
Chuck Levercdcd7f92007-12-10 14:57:45 -0500970 struct sockaddr_in *sa = (struct sockaddr_in *)addr;
Al Viroe6f1ceb2008-03-17 22:44:53 -0700971 return sa->sin_addr.s_addr != htonl(INADDR_ANY);
Chuck Levercdcd7f92007-12-10 14:57:45 -0500972 }
973 case AF_INET6: {
974 struct in6_addr *sa = &((struct sockaddr_in6 *)addr)->sin6_addr;
975 return !ipv6_addr_any(sa);
Chuck Leverfc50d582007-07-01 12:12:46 -0400976 }
977 }
978
Chuck Lever53a0b9c2009-08-09 15:09:36 -0400979 dfprintk(MOUNT, "NFS: Invalid IP address specified\n");
Chuck Leverfc50d582007-07-01 12:12:46 -0400980 return 0;
981}
982
Chuck Lever9412b922007-12-10 14:59:21 -0500983/*
Chuck Lever4cfd74f2009-09-08 19:49:47 -0400984 * Select between a default port value and a user-specified port value.
985 * If a zero value is set, then autobind will be used.
986 */
Trond Myklebustf5855fe2009-10-06 15:40:37 -0400987static void nfs_set_port(struct sockaddr *sap, int *port,
Chuck Lever4cfd74f2009-09-08 19:49:47 -0400988 const unsigned short default_port)
989{
Trond Myklebustf5855fe2009-10-06 15:40:37 -0400990 if (*port == NFS_UNSPEC_PORT)
991 *port = default_port;
Chuck Lever4cfd74f2009-09-08 19:49:47 -0400992
Trond Myklebustf5855fe2009-10-06 15:40:37 -0400993 rpc_set_port(sap, *port);
Chuck Lever4cfd74f2009-09-08 19:49:47 -0400994}
995
996/*
Trond Myklebust259875e2008-07-02 14:43:47 -0400997 * Sanity check the NFS transport protocol.
998 *
999 */
1000static void nfs_validate_transport_protocol(struct nfs_parsed_mount_data *mnt)
1001{
1002 switch (mnt->nfs_server.protocol) {
1003 case XPRT_TRANSPORT_UDP:
1004 case XPRT_TRANSPORT_TCP:
1005 case XPRT_TRANSPORT_RDMA:
1006 break;
1007 default:
1008 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
1009 }
1010}
1011
1012/*
1013 * For text based NFSv2/v3 mounts, the mount protocol transport default
1014 * settings should depend upon the specified NFS transport.
1015 */
1016static void nfs_set_mount_transport_protocol(struct nfs_parsed_mount_data *mnt)
1017{
1018 nfs_validate_transport_protocol(mnt);
1019
1020 if (mnt->mount_server.protocol == XPRT_TRANSPORT_UDP ||
1021 mnt->mount_server.protocol == XPRT_TRANSPORT_TCP)
1022 return;
1023 switch (mnt->nfs_server.protocol) {
1024 case XPRT_TRANSPORT_UDP:
1025 mnt->mount_server.protocol = XPRT_TRANSPORT_UDP;
1026 break;
1027 case XPRT_TRANSPORT_TCP:
1028 case XPRT_TRANSPORT_RDMA:
1029 mnt->mount_server.protocol = XPRT_TRANSPORT_TCP;
1030 }
1031}
1032
1033/*
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001034 * Add 'flavor' to 'auth_info' if not already present.
1035 * Returns true if 'flavor' ends up in the list, false otherwise
1036 */
1037static bool nfs_auth_info_add(struct nfs_auth_info *auth_info,
1038 rpc_authflavor_t flavor)
1039{
1040 unsigned int i;
Fabian Frederick00216022014-06-30 19:49:39 +02001041 unsigned int max_flavor_len = ARRAY_SIZE(auth_info->flavors);
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001042
1043 /* make sure this flavor isn't already in the list */
1044 for (i = 0; i < auth_info->flavor_len; i++) {
1045 if (flavor == auth_info->flavors[i])
1046 return true;
1047 }
1048
1049 if (auth_info->flavor_len + 1 >= max_flavor_len) {
1050 dfprintk(MOUNT, "NFS: too many sec= flavors\n");
1051 return false;
1052 }
1053
1054 auth_info->flavors[auth_info->flavor_len++] = flavor;
1055 return true;
1056}
1057
1058/*
1059 * Return true if 'match' is in auth_info or auth_info is empty.
1060 * Return false otherwise.
1061 */
1062bool nfs_auth_info_match(const struct nfs_auth_info *auth_info,
1063 rpc_authflavor_t match)
1064{
1065 int i;
1066
1067 if (!auth_info->flavor_len)
1068 return true;
1069
1070 for (i = 0; i < auth_info->flavor_len; i++) {
1071 if (auth_info->flavors[i] == match)
1072 return true;
1073 }
1074 return false;
1075}
1076EXPORT_SYMBOL_GPL(nfs_auth_info_match);
1077
1078/*
Chuck Lever01060c82008-06-24 16:33:38 -04001079 * Parse the value of the 'sec=' option.
Chuck Lever01060c82008-06-24 16:33:38 -04001080 */
1081static int nfs_parse_security_flavors(char *value,
1082 struct nfs_parsed_mount_data *mnt)
1083{
1084 substring_t args[MAX_OPT_ARGS];
Trond Myklebust19e7b8d2013-09-07 14:09:52 -04001085 rpc_authflavor_t pseudoflavor;
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001086 char *p;
Chuck Lever01060c82008-06-24 16:33:38 -04001087
1088 dfprintk(MOUNT, "NFS: parsing sec=%s option\n", value);
1089
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001090 while ((p = strsep(&value, ":")) != NULL) {
1091 switch (match_token(p, nfs_secflavor_tokens, args)) {
1092 case Opt_sec_none:
1093 pseudoflavor = RPC_AUTH_NULL;
1094 break;
1095 case Opt_sec_sys:
1096 pseudoflavor = RPC_AUTH_UNIX;
1097 break;
1098 case Opt_sec_krb5:
1099 pseudoflavor = RPC_AUTH_GSS_KRB5;
1100 break;
1101 case Opt_sec_krb5i:
1102 pseudoflavor = RPC_AUTH_GSS_KRB5I;
1103 break;
1104 case Opt_sec_krb5p:
1105 pseudoflavor = RPC_AUTH_GSS_KRB5P;
1106 break;
1107 case Opt_sec_lkey:
1108 pseudoflavor = RPC_AUTH_GSS_LKEY;
1109 break;
1110 case Opt_sec_lkeyi:
1111 pseudoflavor = RPC_AUTH_GSS_LKEYI;
1112 break;
1113 case Opt_sec_lkeyp:
1114 pseudoflavor = RPC_AUTH_GSS_LKEYP;
1115 break;
1116 case Opt_sec_spkm:
1117 pseudoflavor = RPC_AUTH_GSS_SPKM;
1118 break;
1119 case Opt_sec_spkmi:
1120 pseudoflavor = RPC_AUTH_GSS_SPKMI;
1121 break;
1122 case Opt_sec_spkmp:
1123 pseudoflavor = RPC_AUTH_GSS_SPKMP;
1124 break;
1125 default:
1126 dfprintk(MOUNT,
1127 "NFS: sec= option '%s' not recognized\n", p);
1128 return 0;
1129 }
1130
1131 if (!nfs_auth_info_add(&mnt->auth_info, pseudoflavor))
1132 return 0;
Chuck Lever01060c82008-06-24 16:33:38 -04001133 }
1134
1135 return 1;
1136}
1137
Trond Myklebust0d71b052012-03-02 13:59:49 -05001138static int nfs_parse_version_string(char *string,
1139 struct nfs_parsed_mount_data *mnt,
1140 substring_t *args)
1141{
1142 mnt->flags &= ~NFS_MOUNT_VER3;
1143 switch (match_token(string, nfs_vers_tokens, args)) {
1144 case Opt_vers_2:
1145 mnt->version = 2;
1146 break;
1147 case Opt_vers_3:
1148 mnt->flags |= NFS_MOUNT_VER3;
1149 mnt->version = 3;
1150 break;
1151 case Opt_vers_4:
1152 /* Backward compatibility option. In future,
1153 * the mount program should always supply
1154 * a NFSv4 minor version number.
1155 */
1156 mnt->version = 4;
1157 break;
1158 case Opt_vers_4_0:
1159 mnt->version = 4;
1160 mnt->minorversion = 0;
1161 break;
1162 case Opt_vers_4_1:
1163 mnt->version = 4;
1164 mnt->minorversion = 1;
1165 break;
Steve Dickson42c2c422013-05-22 12:50:38 -04001166 case Opt_vers_4_2:
1167 mnt->version = 4;
1168 mnt->minorversion = 2;
1169 break;
Trond Myklebust0d71b052012-03-02 13:59:49 -05001170 default:
1171 return 0;
1172 }
1173 return 1;
1174}
1175
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001176static int nfs_get_option_str(substring_t args[], char **option)
1177{
1178 kfree(*option);
1179 *option = match_strdup(args);
Xi Wange25fbe32013-01-04 03:22:57 -05001180 return !*option;
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001181}
1182
1183static int nfs_get_option_ul(substring_t args[], unsigned long *option)
1184{
1185 int rc;
1186 char *string;
1187
1188 string = match_strdup(args);
1189 if (string == NULL)
1190 return -ENOMEM;
Daniel Walter7297cb62012-09-26 21:51:46 +02001191 rc = kstrtoul(string, 10, option);
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001192 kfree(string);
1193
1194 return rc;
1195}
1196
Trond Myklebusta956bed2016-08-16 10:26:47 -04001197static int nfs_get_option_ul_bound(substring_t args[], unsigned long *option,
1198 unsigned long l_bound, unsigned long u_bound)
1199{
1200 int ret;
1201
1202 ret = nfs_get_option_ul(args, option);
1203 if (ret != 0)
1204 return ret;
1205 if (*option < l_bound || *option > u_bound)
1206 return -ERANGE;
1207 return 0;
1208}
1209
Chuck Lever01060c82008-06-24 16:33:38 -04001210/*
Chuck Leverbf0fd762007-07-01 12:13:44 -04001211 * Error-check and convert a string of mount options from user space into
Chuck Leverf45663c2008-06-24 19:28:02 -04001212 * a data structure. The whole mount string is processed; bad options are
1213 * skipped as they are encountered. If there were no errors, return 1;
1214 * otherwise return 0 (zero).
Chuck Leverbf0fd762007-07-01 12:13:44 -04001215 */
1216static int nfs_parse_mount_options(char *raw,
1217 struct nfs_parsed_mount_data *mnt)
1218{
Al Virof5c0c262018-11-17 12:09:18 -05001219 char *p, *string;
Chuck Leverd23c45f2009-06-17 18:02:13 -07001220 int rc, sloppy = 0, invalid_option = 0;
Jeff Laytonee671b02009-12-03 15:58:56 -05001221 unsigned short protofamily = AF_UNSPEC;
1222 unsigned short mountfamily = AF_UNSPEC;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001223
1224 if (!raw) {
1225 dfprintk(MOUNT, "NFS: mount options string was NULL.\n");
1226 return 1;
1227 }
1228 dfprintk(MOUNT, "NFS: nfs mount opts='%s'\n", raw);
1229
Al Virof5c0c262018-11-17 12:09:18 -05001230 rc = security_sb_eat_lsm_opts(raw, &mnt->lsm_opts);
Eric Parisf9c3a382008-03-05 14:20:18 -05001231 if (rc)
1232 goto out_security_failure;
1233
Chuck Leverbf0fd762007-07-01 12:13:44 -04001234 while ((p = strsep(&raw, ",")) != NULL) {
1235 substring_t args[MAX_OPT_ARGS];
Chuck Levera5a16ba2009-06-17 18:02:14 -07001236 unsigned long option;
1237 int token;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001238
1239 if (!*p)
1240 continue;
1241
1242 dfprintk(MOUNT, "NFS: parsing nfs mount option '%s'\n", p);
1243
1244 token = match_token(p, nfs_mount_option_tokens, args);
1245 switch (token) {
Chuck Leverf45663c2008-06-24 19:28:02 -04001246
1247 /*
1248 * boolean options: foo/nofoo
1249 */
Chuck Leverbf0fd762007-07-01 12:13:44 -04001250 case Opt_soft:
1251 mnt->flags |= NFS_MOUNT_SOFT;
Trond Myklebust91a575e2019-04-07 13:59:01 -04001252 mnt->flags &= ~NFS_MOUNT_SOFTERR;
1253 break;
1254 case Opt_softerr:
1255 mnt->flags |= NFS_MOUNT_SOFTERR;
1256 mnt->flags &= ~NFS_MOUNT_SOFT;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001257 break;
1258 case Opt_hard:
Trond Myklebust91a575e2019-04-07 13:59:01 -04001259 mnt->flags &= ~(NFS_MOUNT_SOFT|NFS_MOUNT_SOFTERR);
Chuck Leverbf0fd762007-07-01 12:13:44 -04001260 break;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001261 case Opt_posix:
1262 mnt->flags |= NFS_MOUNT_POSIX;
1263 break;
1264 case Opt_noposix:
1265 mnt->flags &= ~NFS_MOUNT_POSIX;
1266 break;
1267 case Opt_cto:
1268 mnt->flags &= ~NFS_MOUNT_NOCTO;
1269 break;
1270 case Opt_nocto:
1271 mnt->flags |= NFS_MOUNT_NOCTO;
1272 break;
1273 case Opt_ac:
1274 mnt->flags &= ~NFS_MOUNT_NOAC;
1275 break;
1276 case Opt_noac:
1277 mnt->flags |= NFS_MOUNT_NOAC;
1278 break;
1279 case Opt_lock:
1280 mnt->flags &= ~NFS_MOUNT_NONLM;
Suresh Jayaraman5eebde22010-09-23 08:55:58 -04001281 mnt->flags &= ~(NFS_MOUNT_LOCAL_FLOCK |
1282 NFS_MOUNT_LOCAL_FCNTL);
Chuck Leverbf0fd762007-07-01 12:13:44 -04001283 break;
1284 case Opt_nolock:
1285 mnt->flags |= NFS_MOUNT_NONLM;
Suresh Jayaraman5eebde22010-09-23 08:55:58 -04001286 mnt->flags |= (NFS_MOUNT_LOCAL_FLOCK |
1287 NFS_MOUNT_LOCAL_FCNTL);
Chuck Leverbf0fd762007-07-01 12:13:44 -04001288 break;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001289 case Opt_udp:
1290 mnt->flags &= ~NFS_MOUNT_TCP;
\"Talpey, Thomas\0896a722007-09-10 13:48:23 -04001291 mnt->nfs_server.protocol = XPRT_TRANSPORT_UDP;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001292 break;
1293 case Opt_tcp:
1294 mnt->flags |= NFS_MOUNT_TCP;
\"Talpey, Thomas\0896a722007-09-10 13:48:23 -04001295 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001296 break;
\"Talpey, Thomas\2cf7ff72007-09-10 13:49:41 -04001297 case Opt_rdma:
1298 mnt->flags |= NFS_MOUNT_TCP; /* for side protocols */
1299 mnt->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
Tom Talpeya67d18f2009-03-11 14:37:56 -04001300 xprt_load_transport(p);
\"Talpey, Thomas\2cf7ff72007-09-10 13:49:41 -04001301 break;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001302 case Opt_acl:
1303 mnt->flags &= ~NFS_MOUNT_NOACL;
1304 break;
1305 case Opt_noacl:
1306 mnt->flags |= NFS_MOUNT_NOACL;
1307 break;
1308 case Opt_rdirplus:
1309 mnt->flags &= ~NFS_MOUNT_NORDIRPLUS;
1310 break;
1311 case Opt_nordirplus:
1312 mnt->flags |= NFS_MOUNT_NORDIRPLUS;
1313 break;
Trond Myklebust75180df2007-05-16 16:53:28 -04001314 case Opt_sharecache:
1315 mnt->flags &= ~NFS_MOUNT_UNSHARED;
1316 break;
1317 case Opt_nosharecache:
1318 mnt->flags |= NFS_MOUNT_UNSHARED;
1319 break;
Chuck Leverd7403512008-12-23 15:21:37 -05001320 case Opt_resvport:
1321 mnt->flags &= ~NFS_MOUNT_NORESVPORT;
1322 break;
1323 case Opt_noresvport:
1324 mnt->flags |= NFS_MOUNT_NORESVPORT;
1325 break;
David Howellsb797cac2009-04-03 16:42:48 +01001326 case Opt_fscache:
1327 mnt->options |= NFS_OPTION_FSCACHE;
1328 kfree(mnt->fscache_uniq);
1329 mnt->fscache_uniq = NULL;
1330 break;
1331 case Opt_nofscache:
1332 mnt->options &= ~NFS_OPTION_FSCACHE;
1333 kfree(mnt->fscache_uniq);
1334 mnt->fscache_uniq = NULL;
1335 break;
Chuck Lever89652612012-09-14 17:24:11 -04001336 case Opt_migration:
1337 mnt->options |= NFS_OPTION_MIGRATION;
1338 break;
1339 case Opt_nomigration:
Joshua Wattf02fee22017-11-07 16:25:47 -06001340 mnt->options &= ~NFS_OPTION_MIGRATION;
Chuck Lever89652612012-09-14 17:24:11 -04001341 break;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001342
Chuck Leverf45663c2008-06-24 19:28:02 -04001343 /*
1344 * options that take numeric values
1345 */
Chuck Leverbf0fd762007-07-01 12:13:44 -04001346 case Opt_port:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001347 if (nfs_get_option_ul(args, &option) ||
1348 option > USHRT_MAX)
Chuck Leverd23c45f2009-06-17 18:02:13 -07001349 goto out_invalid_value;
1350 mnt->nfs_server.port = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001351 break;
1352 case Opt_rsize:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001353 if (nfs_get_option_ul(args, &option))
Chuck Leverd23c45f2009-06-17 18:02:13 -07001354 goto out_invalid_value;
1355 mnt->rsize = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001356 break;
1357 case Opt_wsize:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001358 if (nfs_get_option_ul(args, &option))
Chuck Leverd23c45f2009-06-17 18:02:13 -07001359 goto out_invalid_value;
1360 mnt->wsize = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001361 break;
1362 case Opt_bsize:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001363 if (nfs_get_option_ul(args, &option))
Chuck Leverd23c45f2009-06-17 18:02:13 -07001364 goto out_invalid_value;
1365 mnt->bsize = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001366 break;
1367 case Opt_timeo:
Trond Myklebusta956bed2016-08-16 10:26:47 -04001368 if (nfs_get_option_ul_bound(args, &option, 1, INT_MAX))
Chuck Leverd23c45f2009-06-17 18:02:13 -07001369 goto out_invalid_value;
1370 mnt->timeo = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001371 break;
1372 case Opt_retrans:
Trond Myklebusta956bed2016-08-16 10:26:47 -04001373 if (nfs_get_option_ul_bound(args, &option, 0, INT_MAX))
Chuck Leverd23c45f2009-06-17 18:02:13 -07001374 goto out_invalid_value;
1375 mnt->retrans = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001376 break;
1377 case Opt_acregmin:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001378 if (nfs_get_option_ul(args, &option))
Chuck Leverd23c45f2009-06-17 18:02:13 -07001379 goto out_invalid_value;
1380 mnt->acregmin = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001381 break;
1382 case Opt_acregmax:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001383 if (nfs_get_option_ul(args, &option))
Chuck Leverd23c45f2009-06-17 18:02:13 -07001384 goto out_invalid_value;
1385 mnt->acregmax = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001386 break;
1387 case Opt_acdirmin:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001388 if (nfs_get_option_ul(args, &option))
Chuck Leverd23c45f2009-06-17 18:02:13 -07001389 goto out_invalid_value;
1390 mnt->acdirmin = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001391 break;
1392 case Opt_acdirmax:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001393 if (nfs_get_option_ul(args, &option))
Chuck Leverd23c45f2009-06-17 18:02:13 -07001394 goto out_invalid_value;
1395 mnt->acdirmax = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001396 break;
1397 case Opt_actimeo:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001398 if (nfs_get_option_ul(args, &option))
Chuck Leverd23c45f2009-06-17 18:02:13 -07001399 goto out_invalid_value;
1400 mnt->acregmin = mnt->acregmax =
1401 mnt->acdirmin = mnt->acdirmax = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001402 break;
1403 case Opt_namelen:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001404 if (nfs_get_option_ul(args, &option))
Chuck Leverd23c45f2009-06-17 18:02:13 -07001405 goto out_invalid_value;
1406 mnt->namlen = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001407 break;
1408 case Opt_mountport:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001409 if (nfs_get_option_ul(args, &option) ||
1410 option > USHRT_MAX)
Chuck Leverd23c45f2009-06-17 18:02:13 -07001411 goto out_invalid_value;
1412 mnt->mount_server.port = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001413 break;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001414 case Opt_mountvers:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001415 if (nfs_get_option_ul(args, &option) ||
Chuck Leverf45663c2008-06-24 19:28:02 -04001416 option < NFS_MNT_VERSION ||
Chuck Leverd23c45f2009-06-17 18:02:13 -07001417 option > NFS_MNT3_VERSION)
1418 goto out_invalid_value;
1419 mnt->mount_server.version = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001420 break;
Mike Sager3fd5be92009-04-01 09:21:48 -04001421 case Opt_minorversion:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001422 if (nfs_get_option_ul(args, &option))
Chuck Leverf3f4f4e2009-08-09 15:09:29 -04001423 goto out_invalid_value;
1424 if (option > NFS4_MAX_MINOR_VERSION)
1425 goto out_invalid_value;
1426 mnt->minorversion = option;
Mike Sager3fd5be92009-04-01 09:21:48 -04001427 break;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001428
Chuck Leverf45663c2008-06-24 19:28:02 -04001429 /*
1430 * options that take text values
1431 */
Trond Myklebust0d71b052012-03-02 13:59:49 -05001432 case Opt_nfsvers:
1433 string = match_strdup(args);
1434 if (string == NULL)
1435 goto out_nomem;
1436 rc = nfs_parse_version_string(string, mnt, args);
1437 kfree(string);
1438 if (!rc)
1439 goto out_invalid_value;
1440 break;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001441 case Opt_sec:
1442 string = match_strdup(args);
1443 if (string == NULL)
1444 goto out_nomem;
Chuck Lever01060c82008-06-24 16:33:38 -04001445 rc = nfs_parse_security_flavors(string, mnt);
Chuck Leverbf0fd762007-07-01 12:13:44 -04001446 kfree(string);
Chuck Leverf45663c2008-06-24 19:28:02 -04001447 if (!rc) {
Chuck Leverf45663c2008-06-24 19:28:02 -04001448 dfprintk(MOUNT, "NFS: unrecognized "
1449 "security flavor\n");
Chuck Leverd23c45f2009-06-17 18:02:13 -07001450 return 0;
Chuck Leverf45663c2008-06-24 19:28:02 -04001451 }
Chuck Leverbf0fd762007-07-01 12:13:44 -04001452 break;
1453 case Opt_proto:
1454 string = match_strdup(args);
1455 if (string == NULL)
1456 goto out_nomem;
1457 token = match_token(string,
1458 nfs_xprt_protocol_tokens, args);
Chuck Leverbf0fd762007-07-01 12:13:44 -04001459
Jeff Laytonee671b02009-12-03 15:58:56 -05001460 protofamily = AF_INET;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001461 switch (token) {
Jeff Laytonee671b02009-12-03 15:58:56 -05001462 case Opt_xprt_udp6:
1463 protofamily = AF_INET6;
Gustavo A. R. Silvafd53dde2017-11-08 20:49:19 -06001464 /* fall through */
Chuck Leverfdb66ff2007-08-29 17:58:57 -04001465 case Opt_xprt_udp:
Chuck Leverbf0fd762007-07-01 12:13:44 -04001466 mnt->flags &= ~NFS_MOUNT_TCP;
\"Talpey, Thomas\0896a722007-09-10 13:48:23 -04001467 mnt->nfs_server.protocol = XPRT_TRANSPORT_UDP;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001468 break;
Jeff Laytonee671b02009-12-03 15:58:56 -05001469 case Opt_xprt_tcp6:
1470 protofamily = AF_INET6;
Gustavo A. R. Silvafd53dde2017-11-08 20:49:19 -06001471 /* fall through */
Chuck Leverfdb66ff2007-08-29 17:58:57 -04001472 case Opt_xprt_tcp:
Chuck Leverbf0fd762007-07-01 12:13:44 -04001473 mnt->flags |= NFS_MOUNT_TCP;
\"Talpey, Thomas\0896a722007-09-10 13:48:23 -04001474 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001475 break;
Shirley Ma181342c2016-05-02 14:40:23 -04001476 case Opt_xprt_rdma6:
1477 protofamily = AF_INET6;
Gustavo A. R. Silvafd53dde2017-11-08 20:49:19 -06001478 /* fall through */
\"Talpey, Thomas\2cf7ff72007-09-10 13:49:41 -04001479 case Opt_xprt_rdma:
1480 /* vector side protocols to TCP */
1481 mnt->flags |= NFS_MOUNT_TCP;
1482 mnt->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
Tom Talpeya67d18f2009-03-11 14:37:56 -04001483 xprt_load_transport(string);
\"Talpey, Thomas\2cf7ff72007-09-10 13:49:41 -04001484 break;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001485 default:
Chuck Leverf45663c2008-06-24 19:28:02 -04001486 dfprintk(MOUNT, "NFS: unrecognized "
1487 "transport protocol\n");
Yinghai Lu4223a4a2009-10-20 14:13:46 +09001488 kfree(string);
Chuck Leverd23c45f2009-06-17 18:02:13 -07001489 return 0;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001490 }
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001491 kfree(string);
Chuck Leverbf0fd762007-07-01 12:13:44 -04001492 break;
1493 case Opt_mountproto:
1494 string = match_strdup(args);
1495 if (string == NULL)
1496 goto out_nomem;
1497 token = match_token(string,
1498 nfs_xprt_protocol_tokens, args);
Trond Myklebustd508afb2009-04-06 16:41:35 -07001499 kfree(string);
Chuck Leverbf0fd762007-07-01 12:13:44 -04001500
Jeff Laytonee671b02009-12-03 15:58:56 -05001501 mountfamily = AF_INET;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001502 switch (token) {
Jeff Laytonee671b02009-12-03 15:58:56 -05001503 case Opt_xprt_udp6:
1504 mountfamily = AF_INET6;
Gustavo A. R. Silvafd53dde2017-11-08 20:49:19 -06001505 /* fall through */
Chuck Leverfdb66ff2007-08-29 17:58:57 -04001506 case Opt_xprt_udp:
\"Talpey, Thomas\0896a722007-09-10 13:48:23 -04001507 mnt->mount_server.protocol = XPRT_TRANSPORT_UDP;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001508 break;
Jeff Laytonee671b02009-12-03 15:58:56 -05001509 case Opt_xprt_tcp6:
1510 mountfamily = AF_INET6;
Gustavo A. R. Silvafd53dde2017-11-08 20:49:19 -06001511 /* fall through */
Chuck Leverfdb66ff2007-08-29 17:58:57 -04001512 case Opt_xprt_tcp:
\"Talpey, Thomas\0896a722007-09-10 13:48:23 -04001513 mnt->mount_server.protocol = XPRT_TRANSPORT_TCP;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001514 break;
\"Talpey, Thomas\2cf7ff72007-09-10 13:49:41 -04001515 case Opt_xprt_rdma: /* not used for side protocols */
Chuck Leverbf0fd762007-07-01 12:13:44 -04001516 default:
Chuck Leverf45663c2008-06-24 19:28:02 -04001517 dfprintk(MOUNT, "NFS: unrecognized "
1518 "transport protocol\n");
Chuck Leverd23c45f2009-06-17 18:02:13 -07001519 return 0;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001520 }
1521 break;
1522 case Opt_addr:
1523 string = match_strdup(args);
1524 if (string == NULL)
1525 goto out_nomem;
Chuck Lever53a0b9c2009-08-09 15:09:36 -04001526 mnt->nfs_server.addrlen =
Stanislav Kinsburskyb48e1272012-01-26 15:11:57 +04001527 rpc_pton(mnt->net, string, strlen(string),
Chuck Lever53a0b9c2009-08-09 15:09:36 -04001528 (struct sockaddr *)
1529 &mnt->nfs_server.address,
1530 sizeof(mnt->nfs_server.address));
Chuck Leverbf0fd762007-07-01 12:13:44 -04001531 kfree(string);
Chuck Lever53a0b9c2009-08-09 15:09:36 -04001532 if (mnt->nfs_server.addrlen == 0)
1533 goto out_invalid_address;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001534 break;
1535 case Opt_clientaddr:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001536 if (nfs_get_option_str(args, &mnt->client_address))
Chuck Leverbf0fd762007-07-01 12:13:44 -04001537 goto out_nomem;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001538 break;
Chuck Lever33832032007-12-10 14:59:13 -05001539 case Opt_mounthost:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001540 if (nfs_get_option_str(args,
1541 &mnt->mount_server.hostname))
Chuck Lever33832032007-12-10 14:59:13 -05001542 goto out_nomem;
Chuck Lever33832032007-12-10 14:59:13 -05001543 break;
Chuck Lever0ac83772007-09-11 18:01:04 -04001544 case Opt_mountaddr:
Chuck Leverbf0fd762007-07-01 12:13:44 -04001545 string = match_strdup(args);
1546 if (string == NULL)
1547 goto out_nomem;
Chuck Lever53a0b9c2009-08-09 15:09:36 -04001548 mnt->mount_server.addrlen =
Stanislav Kinsburskyb48e1272012-01-26 15:11:57 +04001549 rpc_pton(mnt->net, string, strlen(string),
Chuck Lever53a0b9c2009-08-09 15:09:36 -04001550 (struct sockaddr *)
1551 &mnt->mount_server.address,
1552 sizeof(mnt->mount_server.address));
Chuck Leverbf0fd762007-07-01 12:13:44 -04001553 kfree(string);
Chuck Lever53a0b9c2009-08-09 15:09:36 -04001554 if (mnt->mount_server.addrlen == 0)
1555 goto out_invalid_address;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001556 break;
Trond Myklebust28cc5cd2017-04-26 23:30:48 -04001557 case Opt_nconnect:
1558 if (nfs_get_option_ul_bound(args, &option, 1, NFS_MAX_CONNECTIONS))
1559 goto out_invalid_value;
1560 mnt->nfs_server.nconnect = option;
1561 break;
Trond Myklebust7973c1f12008-07-15 17:58:14 -04001562 case Opt_lookupcache:
1563 string = match_strdup(args);
1564 if (string == NULL)
1565 goto out_nomem;
1566 token = match_token(string,
1567 nfs_lookupcache_tokens, args);
1568 kfree(string);
1569 switch (token) {
1570 case Opt_lookupcache_all:
1571 mnt->flags &= ~(NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE);
1572 break;
1573 case Opt_lookupcache_positive:
1574 mnt->flags &= ~NFS_MOUNT_LOOKUP_CACHE_NONE;
1575 mnt->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG;
1576 break;
1577 case Opt_lookupcache_none:
1578 mnt->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE;
1579 break;
1580 default:
Trond Myklebust7973c1f12008-07-15 17:58:14 -04001581 dfprintk(MOUNT, "NFS: invalid "
1582 "lookupcache argument\n");
Chuck Leverd23c45f2009-06-17 18:02:13 -07001583 return 0;
Trond Myklebust7973c1f12008-07-15 17:58:14 -04001584 };
1585 break;
Chuck Levera6d5ff62010-05-07 13:33:58 -04001586 case Opt_fscache_uniq:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001587 if (nfs_get_option_str(args, &mnt->fscache_uniq))
Chuck Levera6d5ff62010-05-07 13:33:58 -04001588 goto out_nomem;
Chuck Levera6d5ff62010-05-07 13:33:58 -04001589 mnt->options |= NFS_OPTION_FSCACHE;
1590 break;
Suresh Jayaraman5eebde22010-09-23 08:55:58 -04001591 case Opt_local_lock:
1592 string = match_strdup(args);
1593 if (string == NULL)
1594 goto out_nomem;
1595 token = match_token(string, nfs_local_lock_tokens,
1596 args);
1597 kfree(string);
1598 switch (token) {
1599 case Opt_local_lock_all:
1600 mnt->flags |= (NFS_MOUNT_LOCAL_FLOCK |
1601 NFS_MOUNT_LOCAL_FCNTL);
1602 break;
1603 case Opt_local_lock_flock:
1604 mnt->flags |= NFS_MOUNT_LOCAL_FLOCK;
1605 break;
1606 case Opt_local_lock_posix:
1607 mnt->flags |= NFS_MOUNT_LOCAL_FCNTL;
1608 break;
1609 case Opt_local_lock_none:
1610 mnt->flags &= ~(NFS_MOUNT_LOCAL_FLOCK |
1611 NFS_MOUNT_LOCAL_FCNTL);
1612 break;
1613 default:
1614 dfprintk(MOUNT, "NFS: invalid "
1615 "local_lock argument\n");
1616 return 0;
1617 };
1618 break;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001619
Chuck Leverf45663c2008-06-24 19:28:02 -04001620 /*
1621 * Special options
1622 */
1623 case Opt_sloppy:
1624 sloppy = 1;
1625 dfprintk(MOUNT, "NFS: relaxing parsing rules\n");
1626 break;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001627 case Opt_userspace:
1628 case Opt_deprecated:
Chuck Leverd33e4df2008-06-12 12:37:41 -04001629 dfprintk(MOUNT, "NFS: ignoring mount option "
1630 "'%s'\n", p);
Chuck Leverbf0fd762007-07-01 12:13:44 -04001631 break;
1632
1633 default:
Chuck Leverd23c45f2009-06-17 18:02:13 -07001634 invalid_option = 1;
Chuck Leverf45663c2008-06-24 19:28:02 -04001635 dfprintk(MOUNT, "NFS: unrecognized mount option "
1636 "'%s'\n", p);
Chuck Leverbf0fd762007-07-01 12:13:44 -04001637 }
1638 }
1639
Chuck Leverd23c45f2009-06-17 18:02:13 -07001640 if (!sloppy && invalid_option)
1641 return 0;
1642
Weston Andros Adamson571b7552012-02-01 14:06:41 -05001643 if (mnt->minorversion && mnt->version != 4)
1644 goto out_minorversion_mismatch;
1645
Chuck Lever89652612012-09-14 17:24:11 -04001646 if (mnt->options & NFS_OPTION_MIGRATION &&
NeilBrown9e08ef12013-11-14 13:00:17 +11001647 (mnt->version != 4 || mnt->minorversion != 0))
Chuck Lever89652612012-09-14 17:24:11 -04001648 goto out_migration_misuse;
1649
Jeff Laytonee671b02009-12-03 15:58:56 -05001650 /*
1651 * verify that any proto=/mountproto= options match the address
Peter Meerwald1856b222012-08-18 17:38:54 +02001652 * families in the addr=/mountaddr= options.
Jeff Laytonee671b02009-12-03 15:58:56 -05001653 */
1654 if (protofamily != AF_UNSPEC &&
1655 protofamily != mnt->nfs_server.address.ss_family)
1656 goto out_proto_mismatch;
1657
1658 if (mountfamily != AF_UNSPEC) {
1659 if (mnt->mount_server.addrlen) {
1660 if (mountfamily != mnt->mount_server.address.ss_family)
1661 goto out_mountproto_mismatch;
1662 } else {
1663 if (mountfamily != mnt->nfs_server.address.ss_family)
1664 goto out_mountproto_mismatch;
1665 }
1666 }
1667
Chuck Leverbf0fd762007-07-01 12:13:44 -04001668 return 1;
1669
Jeff Laytonee671b02009-12-03 15:58:56 -05001670out_mountproto_mismatch:
1671 printk(KERN_INFO "NFS: mount server address does not match mountproto= "
1672 "option\n");
1673 return 0;
1674out_proto_mismatch:
1675 printk(KERN_INFO "NFS: server address does not match proto= option\n");
1676 return 0;
Chuck Lever53a0b9c2009-08-09 15:09:36 -04001677out_invalid_address:
1678 printk(KERN_INFO "NFS: bad IP address specified: %s\n", p);
1679 return 0;
Chuck Leverd23c45f2009-06-17 18:02:13 -07001680out_invalid_value:
Chuck Lever53a0b9c2009-08-09 15:09:36 -04001681 printk(KERN_INFO "NFS: bad mount option value specified: %s\n", p);
Chuck Leverd23c45f2009-06-17 18:02:13 -07001682 return 0;
Weston Andros Adamson571b7552012-02-01 14:06:41 -05001683out_minorversion_mismatch:
1684 printk(KERN_INFO "NFS: mount option vers=%u does not support "
1685 "minorversion=%u\n", mnt->version, mnt->minorversion);
1686 return 0;
Chuck Lever89652612012-09-14 17:24:11 -04001687out_migration_misuse:
1688 printk(KERN_INFO
1689 "NFS: 'migration' not supported for this NFS version\n");
1690 return 0;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001691out_nomem:
1692 printk(KERN_INFO "NFS: not enough memory to parse option\n");
1693 return 0;
Eric Parisf9c3a382008-03-05 14:20:18 -05001694out_security_failure:
Eric Parisf9c3a382008-03-05 14:20:18 -05001695 printk(KERN_INFO "NFS: security options invalid: %d\n", rc);
1696 return 0;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001697}
1698
1699/*
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001700 * Ensure that a specified authtype in args->auth_info is supported by
1701 * the server. Returns 0 and sets args->selected_flavor if it's ok, and
1702 * -EACCES if not.
Chuck Leverec88f282009-08-09 15:09:32 -04001703 */
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001704static int nfs_verify_authflavors(struct nfs_parsed_mount_data *args,
Jeff Layton9111c952013-06-27 15:54:41 -04001705 rpc_authflavor_t *server_authlist, unsigned int count)
Chuck Leverec88f282009-08-09 15:09:32 -04001706{
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001707 rpc_authflavor_t flavor = RPC_AUTH_MAXFLAVOR;
Chuck Lever53a75f22017-08-10 16:41:31 -04001708 bool found_auth_null = false;
Jeff Layton9111c952013-06-27 15:54:41 -04001709 unsigned int i;
Chuck Lever4580a922013-03-22 12:53:17 -04001710
Chuck Lever4580a922013-03-22 12:53:17 -04001711 /*
Weston Andros Adamsond497ab92013-05-06 17:12:13 -04001712 * If the sec= mount option is used, the specified flavor or AUTH_NULL
1713 * must be in the list returned by the server.
1714 *
1715 * AUTH_NULL has a special meaning when it's in the server list - it
1716 * means that the server will ignore the rpc creds, so any flavor
Steve Dicksone68fd7c2016-05-25 10:36:50 -04001717 * can be used but still use the sec= that was specified.
Chuck Lever53a75f22017-08-10 16:41:31 -04001718 *
1719 * Note also that the MNT procedure in MNTv1 does not return a list
1720 * of supported security flavors. In this case, nfs_mount() fabricates
1721 * a security flavor list containing just AUTH_NULL.
Weston Andros Adamsond497ab92013-05-06 17:12:13 -04001722 */
Chuck Lever4580a922013-03-22 12:53:17 -04001723 for (i = 0; i < count; i++) {
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001724 flavor = server_authlist[i];
1725
Steve Dicksone68fd7c2016-05-25 10:36:50 -04001726 if (nfs_auth_info_match(&args->auth_info, flavor))
Jeff Layton9111c952013-06-27 15:54:41 -04001727 goto out;
Steve Dicksone68fd7c2016-05-25 10:36:50 -04001728
1729 if (flavor == RPC_AUTH_NULL)
Chuck Lever53a75f22017-08-10 16:41:31 -04001730 found_auth_null = true;
Steve Dicksone68fd7c2016-05-25 10:36:50 -04001731 }
1732
Chuck Lever53a75f22017-08-10 16:41:31 -04001733 if (found_auth_null) {
1734 flavor = args->auth_info.flavors[0];
Steve Dicksone68fd7c2016-05-25 10:36:50 -04001735 goto out;
Chuck Lever4580a922013-03-22 12:53:17 -04001736 }
1737
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001738 dfprintk(MOUNT,
1739 "NFS: specified auth flavors not supported by server\n");
Weston Andros Adamsond497ab92013-05-06 17:12:13 -04001740 return -EACCES;
Jeff Layton9111c952013-06-27 15:54:41 -04001741
1742out:
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001743 args->selected_flavor = flavor;
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -04001744 dfprintk(MOUNT, "NFS: using auth flavor %u\n", args->selected_flavor);
Jeff Layton9111c952013-06-27 15:54:41 -04001745 return 0;
Chuck Leverec88f282009-08-09 15:09:32 -04001746}
1747
1748/*
Chuck Lever0076d7b2007-07-01 12:13:49 -04001749 * Use the remote server's MOUNT service to request the NFS file handle
1750 * corresponding to the provided path.
1751 */
Bryan Schumaker486aa692012-05-10 15:07:39 -04001752static int nfs_request_mount(struct nfs_parsed_mount_data *args,
Jeff Layton294ae812013-06-27 15:54:39 -04001753 struct nfs_fh *root_fh,
1754 rpc_authflavor_t *server_authlist,
1755 unsigned int *server_authlist_len)
Chuck Lever0076d7b2007-07-01 12:13:49 -04001756{
Chuck Leverc5d120f2008-12-23 15:21:35 -05001757 struct nfs_mount_request request = {
1758 .sap = (struct sockaddr *)
1759 &args->mount_server.address,
1760 .dirpath = args->nfs_server.export_path,
1761 .protocol = args->mount_server.protocol,
1762 .fh = root_fh,
Chuck Lever50a737f2008-12-23 15:21:37 -05001763 .noresvport = args->flags & NFS_MOUNT_NORESVPORT,
Jeff Layton294ae812013-06-27 15:54:39 -04001764 .auth_flav_len = server_authlist_len,
Chuck Leverec88f282009-08-09 15:09:32 -04001765 .auth_flavs = server_authlist,
Stanislav Kinsbursky6d59b8d2012-01-10 16:12:54 +04001766 .net = args->net,
Chuck Leverc5d120f2008-12-23 15:21:35 -05001767 };
Chuck Lever4c568012007-12-10 14:59:28 -05001768 int status;
Chuck Lever0076d7b2007-07-01 12:13:49 -04001769
1770 if (args->mount_server.version == 0) {
Trond Myklebust8a6e5de2009-09-23 14:36:37 -04001771 switch (args->version) {
1772 default:
1773 args->mount_server.version = NFS_MNT3_VERSION;
1774 break;
1775 case 2:
1776 args->mount_server.version = NFS_MNT_VERSION;
1777 }
Chuck Lever0076d7b2007-07-01 12:13:49 -04001778 }
Chuck Leverc5d120f2008-12-23 15:21:35 -05001779 request.version = args->mount_server.version;
Chuck Lever0076d7b2007-07-01 12:13:49 -04001780
Chuck Lever33832032007-12-10 14:59:13 -05001781 if (args->mount_server.hostname)
Chuck Leverc5d120f2008-12-23 15:21:35 -05001782 request.hostname = args->mount_server.hostname;
Chuck Lever33832032007-12-10 14:59:13 -05001783 else
Chuck Leverc5d120f2008-12-23 15:21:35 -05001784 request.hostname = args->nfs_server.hostname;
Chuck Lever33832032007-12-10 14:59:13 -05001785
Chuck Lever0076d7b2007-07-01 12:13:49 -04001786 /*
1787 * Construct the mount server's address.
1788 */
Chuck Lever4c568012007-12-10 14:59:28 -05001789 if (args->mount_server.address.ss_family == AF_UNSPEC) {
Chuck Leverc5d120f2008-12-23 15:21:35 -05001790 memcpy(request.sap, &args->nfs_server.address,
Chuck Lever4c568012007-12-10 14:59:28 -05001791 args->nfs_server.addrlen);
1792 args->mount_server.addrlen = args->nfs_server.addrlen;
1793 }
Chuck Leverc5d120f2008-12-23 15:21:35 -05001794 request.salen = args->mount_server.addrlen;
Trond Myklebustf5855fe2009-10-06 15:40:37 -04001795 nfs_set_port(request.sap, &args->mount_server.port, 0);
Chuck Lever0076d7b2007-07-01 12:13:49 -04001796
1797 /*
1798 * Now ask the mount server to map our export path
1799 * to a file handle.
1800 */
Chuck Leverc5d120f2008-12-23 15:21:35 -05001801 status = nfs_mount(&request);
Chuck Leverec88f282009-08-09 15:09:32 -04001802 if (status != 0) {
1803 dfprintk(MOUNT, "NFS: unable to mount server %s, error %d\n",
1804 request.hostname, status);
1805 return status;
1806 }
Chuck Lever0076d7b2007-07-01 12:13:49 -04001807
Jeff Layton9111c952013-06-27 15:54:41 -04001808 return 0;
Chuck Lever0076d7b2007-07-01 12:13:49 -04001809}
1810
Jeff Laytond17540c2013-06-27 15:54:38 -04001811static struct nfs_server *nfs_try_mount_request(struct nfs_mount_info *mount_info,
1812 struct nfs_subversion *nfs_mod)
1813{
1814 int status;
Jeff Layton9111c952013-06-27 15:54:41 -04001815 unsigned int i;
1816 bool tried_auth_unix = false;
1817 bool auth_null_in_list = false;
1818 struct nfs_server *server = ERR_PTR(-EACCES);
Jeff Layton294ae812013-06-27 15:54:39 -04001819 struct nfs_parsed_mount_data *args = mount_info->parsed;
1820 rpc_authflavor_t authlist[NFS_MAX_SECFLAVORS];
1821 unsigned int authlist_len = ARRAY_SIZE(authlist);
Jeff Laytond17540c2013-06-27 15:54:38 -04001822
Jeff Layton294ae812013-06-27 15:54:39 -04001823 status = nfs_request_mount(args, mount_info->mntfh, authlist,
1824 &authlist_len);
Jeff Laytond17540c2013-06-27 15:54:38 -04001825 if (status)
1826 return ERR_PTR(status);
1827
Jeff Layton9111c952013-06-27 15:54:41 -04001828 /*
1829 * Was a sec= authflavor specified in the options? First, verify
1830 * whether the server supports it, and then just try to use it if so.
1831 */
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -04001832 if (args->auth_info.flavor_len > 0) {
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001833 status = nfs_verify_authflavors(args, authlist, authlist_len);
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -04001834 dfprintk(MOUNT, "NFS: using auth flavor %u\n",
1835 args->selected_flavor);
Jeff Layton9111c952013-06-27 15:54:41 -04001836 if (status)
1837 return ERR_PTR(status);
1838 return nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1839 }
1840
1841 /*
1842 * No sec= option was provided. RFC 2623, section 2.7 suggests we
1843 * SHOULD prefer the flavor listed first. However, some servers list
1844 * AUTH_NULL first. Avoid ever choosing AUTH_NULL.
1845 */
1846 for (i = 0; i < authlist_len; ++i) {
1847 rpc_authflavor_t flavor;
1848 struct rpcsec_gss_info info;
1849
1850 flavor = authlist[i];
1851 switch (flavor) {
1852 case RPC_AUTH_UNIX:
1853 tried_auth_unix = true;
1854 break;
1855 case RPC_AUTH_NULL:
1856 auth_null_in_list = true;
1857 continue;
1858 default:
1859 if (rpcauth_get_gssinfo(flavor, &info) != 0)
1860 continue;
1861 /* Fallthrough */
1862 }
1863 dfprintk(MOUNT, "NFS: attempting to use auth flavor %u\n", flavor);
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -04001864 args->selected_flavor = flavor;
Jeff Layton9111c952013-06-27 15:54:41 -04001865 server = nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1866 if (!IS_ERR(server))
1867 return server;
1868 }
1869
1870 /*
1871 * Nothing we tried so far worked. At this point, give up if we've
1872 * already tried AUTH_UNIX or if the server's list doesn't contain
1873 * AUTH_NULL
1874 */
1875 if (tried_auth_unix || !auth_null_in_list)
1876 return server;
1877
1878 /* Last chance! Try AUTH_UNIX */
1879 dfprintk(MOUNT, "NFS: attempting to use auth flavor %u\n", RPC_AUTH_UNIX);
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -04001880 args->selected_flavor = RPC_AUTH_UNIX;
Jeff Laytond17540c2013-06-27 15:54:38 -04001881 return nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1882}
1883
Bryan Schumakerff9099f22012-07-30 16:05:18 -04001884struct dentry *nfs_try_mount(int flags, const char *dev_name,
1885 struct nfs_mount_info *mount_info,
1886 struct nfs_subversion *nfs_mod)
Bryan Schumaker486aa692012-05-10 15:07:39 -04001887{
Bryan Schumaker486aa692012-05-10 15:07:39 -04001888 struct nfs_server *server;
1889
Jeff Laytond17540c2013-06-27 15:54:38 -04001890 if (mount_info->parsed->need_mount)
1891 server = nfs_try_mount_request(mount_info, nfs_mod);
1892 else
1893 server = nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
Bryan Schumaker486aa692012-05-10 15:07:39 -04001894
Bryan Schumaker486aa692012-05-10 15:07:39 -04001895 if (IS_ERR(server))
1896 return ERR_CAST(server);
1897
Bryan Schumakerab7017a2012-07-30 16:05:16 -04001898 return nfs_fs_mount_common(server, flags, dev_name, mount_info, nfs_mod);
Bryan Schumaker486aa692012-05-10 15:07:39 -04001899}
Bryan Schumakerddda8e02012-07-30 16:05:23 -04001900EXPORT_SYMBOL_GPL(nfs_try_mount);
Bryan Schumaker486aa692012-05-10 15:07:39 -04001901
Rob Landleyc12bace2011-03-09 15:54:13 -06001902/*
1903 * Split "dev_name" into "hostname:export_path".
1904 *
1905 * The leftmost colon demarks the split between the server's hostname
1906 * and the export path. If the hostname starts with a left square
1907 * bracket, then it may contain colons.
1908 *
1909 * Note: caller frees hostname and export path, even on error.
1910 */
1911static int nfs_parse_devname(const char *dev_name,
1912 char **hostname, size_t maxnamlen,
1913 char **export_path, size_t maxpathlen)
Chuck Leverdc045892008-06-23 12:36:37 -04001914{
1915 size_t len;
Rob Landleyc12bace2011-03-09 15:54:13 -06001916 char *end;
Chuck Leverdc045892008-06-23 12:36:37 -04001917
Yao Liu80ff0012019-01-28 19:44:14 +08001918 if (unlikely(!dev_name || !*dev_name)) {
1919 dfprintk(MOUNT, "NFS: device name not specified\n");
1920 return -EINVAL;
1921 }
1922
Rob Landleyc12bace2011-03-09 15:54:13 -06001923 /* Is the host name protected with square brakcets? */
1924 if (*dev_name == '[') {
1925 end = strchr(++dev_name, ']');
1926 if (end == NULL || end[1] != ':')
1927 goto out_bad_devname;
Chuck Leverdc045892008-06-23 12:36:37 -04001928
Rob Landleyc12bace2011-03-09 15:54:13 -06001929 len = end - dev_name;
1930 end++;
1931 } else {
1932 char *comma;
1933
1934 end = strchr(dev_name, ':');
1935 if (end == NULL)
1936 goto out_bad_devname;
1937 len = end - dev_name;
1938
1939 /* kill possible hostname list: not supported */
1940 comma = strchr(dev_name, ',');
1941 if (comma != NULL && comma < end)
Eric W. Biederman40cc3942019-01-30 07:58:38 -06001942 len = comma - dev_name;
Rob Landleyc12bace2011-03-09 15:54:13 -06001943 }
1944
Chuck Leverdc045892008-06-23 12:36:37 -04001945 if (len > maxnamlen)
1946 goto out_hostname;
1947
1948 /* N.B. caller will free nfs_server.hostname in all cases */
1949 *hostname = kstrndup(dev_name, len, GFP_KERNEL);
Rob Landleyc12bace2011-03-09 15:54:13 -06001950 if (*hostname == NULL)
Chuck Leverdc045892008-06-23 12:36:37 -04001951 goto out_nomem;
Rob Landleyc12bace2011-03-09 15:54:13 -06001952 len = strlen(++end);
Chuck Leverdc045892008-06-23 12:36:37 -04001953 if (len > maxpathlen)
1954 goto out_path;
Rob Landleyc12bace2011-03-09 15:54:13 -06001955 *export_path = kstrndup(end, len, GFP_KERNEL);
Chuck Leverdc045892008-06-23 12:36:37 -04001956 if (!*export_path)
1957 goto out_nomem;
1958
1959 dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", *export_path);
1960 return 0;
1961
1962out_bad_devname:
1963 dfprintk(MOUNT, "NFS: device name not in host:path format\n");
1964 return -EINVAL;
1965
1966out_nomem:
1967 dfprintk(MOUNT, "NFS: not enough memory to parse device name\n");
1968 return -ENOMEM;
1969
1970out_hostname:
1971 dfprintk(MOUNT, "NFS: server hostname too long\n");
1972 return -ENAMETOOLONG;
1973
1974out_path:
1975 dfprintk(MOUNT, "NFS: export pathname too long\n");
1976 return -ENAMETOOLONG;
1977}
1978
1979/*
David Howells54ceac42006-08-22 20:06:13 -04001980 * Validate the NFS2/NFS3 mount data
1981 * - fills in the mount root filehandle
Chuck Lever136d5582007-07-01 12:13:54 -04001982 *
1983 * For option strings, user space handles the following behaviors:
1984 *
1985 * + DNS: mapping server host name to IP address ("addr=" option)
1986 *
1987 * + failure mode: how to behave if a mount request can't be handled
1988 * immediately ("fg/bg" option)
1989 *
1990 * + retry: how often to retry a mount request ("retry=" option)
1991 *
1992 * + breaking back: trying proto=udp after proto=tcp, v2 after v3,
1993 * mountproto=tcp after mountproto=udp, and so on
David Howellsf7b422b2006-06-09 09:34:33 -04001994 */
Bryan Schumakerd72c7272012-05-10 15:07:41 -04001995static int nfs23_validate_mount_data(void *options,
1996 struct nfs_parsed_mount_data *args,
1997 struct nfs_fh *mntfh,
1998 const char *dev_name)
David Howellsf7b422b2006-06-09 09:34:33 -04001999{
\"Talpey, Thomas\2283f8d2007-09-10 13:43:56 -04002000 struct nfs_mount_data *data = (struct nfs_mount_data *)options;
Chuck Lever4cfd74f2009-09-08 19:49:47 -04002001 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
Trond Myklebust74c98812013-09-07 13:26:57 -04002002 int extra_flags = NFS_MOUNT_LEGACY_INTERFACE;
Chuck Lever136d5582007-07-01 12:13:54 -04002003
Chuck Lever5df36e72007-07-01 12:12:56 -04002004 if (data == NULL)
2005 goto out_no_data;
David Howells54ceac42006-08-22 20:06:13 -04002006
Bryan Schumakerc5afc8d2012-06-08 11:32:56 -04002007 args->version = NFS_DEFAULT_VERSION;
David Howellsf7b422b2006-06-09 09:34:33 -04002008 switch (data->version) {
Chuck Lever5df36e72007-07-01 12:12:56 -04002009 case 1:
Gustavo A. R. Silvafd53dde2017-11-08 20:49:19 -06002010 data->namlen = 0; /* fall through */
Chuck Lever5df36e72007-07-01 12:12:56 -04002011 case 2:
Gustavo A. R. Silvafd53dde2017-11-08 20:49:19 -06002012 data->bsize = 0; /* fall through */
Chuck Lever5df36e72007-07-01 12:12:56 -04002013 case 3:
2014 if (data->flags & NFS_MOUNT_VER3)
2015 goto out_no_v3;
2016 data->root.size = NFS2_FHSIZE;
2017 memcpy(data->root.data, data->old_root.data, NFS2_FHSIZE);
Trond Myklebust74c98812013-09-07 13:26:57 -04002018 /* Turn off security negotiation */
2019 extra_flags |= NFS_MOUNT_SECFLAVOUR;
Gustavo A. R. Silvafd53dde2017-11-08 20:49:19 -06002020 /* fall through */
Chuck Lever5df36e72007-07-01 12:12:56 -04002021 case 4:
2022 if (data->flags & NFS_MOUNT_SECFLAVOUR)
2023 goto out_no_sec;
Gustavo A. R. Silvafd53dde2017-11-08 20:49:19 -06002024 /* fall through */
Chuck Lever5df36e72007-07-01 12:12:56 -04002025 case 5:
2026 memset(data->context, 0, sizeof(data->context));
Gustavo A. R. Silvafd53dde2017-11-08 20:49:19 -06002027 /* fall through */
Chuck Lever5df36e72007-07-01 12:12:56 -04002028 case 6:
Trond Myklebustb7e24452008-06-19 15:21:11 -04002029 if (data->flags & NFS_MOUNT_VER3) {
2030 if (data->root.size > NFS3_FHSIZE || data->root.size == 0)
2031 goto out_invalid_fh;
Chuck Lever5df36e72007-07-01 12:12:56 -04002032 mntfh->size = data->root.size;
Chuck Lever764302c2009-09-08 19:50:03 -04002033 args->version = 3;
2034 } else {
Chuck Lever5df36e72007-07-01 12:12:56 -04002035 mntfh->size = NFS2_FHSIZE;
Chuck Lever764302c2009-09-08 19:50:03 -04002036 args->version = 2;
2037 }
Chuck Lever5df36e72007-07-01 12:12:56 -04002038
Chuck Lever5df36e72007-07-01 12:12:56 -04002039
2040 memcpy(mntfh->data, data->root.data, mntfh->size);
2041 if (mntfh->size < sizeof(mntfh->data))
2042 memset(mntfh->data + mntfh->size, 0,
2043 sizeof(mntfh->data) - mntfh->size);
Chuck Lever6e88e062007-09-24 15:39:50 -04002044
\"Talpey, Thomas\2283f8d2007-09-10 13:43:56 -04002045 /*
2046 * Translate to nfs_parsed_mount_data, which nfs_fill_super
2047 * can deal with.
2048 */
Trond Myklebustff3525a2008-08-15 16:59:14 -04002049 args->flags = data->flags & NFS_MOUNT_FLAGMASK;
Trond Myklebust74c98812013-09-07 13:26:57 -04002050 args->flags |= extra_flags;
\"Talpey, Thomas\2283f8d2007-09-10 13:43:56 -04002051 args->rsize = data->rsize;
2052 args->wsize = data->wsize;
\"Talpey, Thomas\2283f8d2007-09-10 13:43:56 -04002053 args->timeo = data->timeo;
2054 args->retrans = data->retrans;
2055 args->acregmin = data->acregmin;
2056 args->acregmax = data->acregmax;
2057 args->acdirmin = data->acdirmin;
2058 args->acdirmax = data->acdirmax;
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002059 args->need_mount = false;
Chuck Lever4c568012007-12-10 14:59:28 -05002060
Chuck Lever4cfd74f2009-09-08 19:49:47 -04002061 memcpy(sap, &data->addr, sizeof(data->addr));
Chuck Lever4c568012007-12-10 14:59:28 -05002062 args->nfs_server.addrlen = sizeof(data->addr);
Trond Myklebust872ece82012-09-04 11:05:07 -04002063 args->nfs_server.port = ntohs(data->addr.sin_port);
Tetsuo Handa7c2bd9a2019-03-30 10:21:07 +09002064 if (sap->sa_family != AF_INET ||
2065 !nfs_verify_server_address(sap))
Chuck Lever4c568012007-12-10 14:59:28 -05002066 goto out_no_address;
2067
\"Talpey, Thomas\2283f8d2007-09-10 13:43:56 -04002068 if (!(data->flags & NFS_MOUNT_TCP))
\"Talpey, Thomas\0896a722007-09-10 13:48:23 -04002069 args->nfs_server.protocol = XPRT_TRANSPORT_UDP;
\"Talpey, Thomas\2283f8d2007-09-10 13:43:56 -04002070 /* N.B. caller will free nfs_server.hostname in all cases */
2071 args->nfs_server.hostname = kstrdup(data->hostname, GFP_KERNEL);
2072 args->namlen = data->namlen;
2073 args->bsize = data->bsize;
Chuck Leverdd07c942008-06-24 16:33:46 -04002074
2075 if (data->flags & NFS_MOUNT_SECFLAVOUR)
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -04002076 args->selected_flavor = data->pseudoflavor;
Trond Myklebust74c98812013-09-07 13:26:57 -04002077 else
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -04002078 args->selected_flavor = RPC_AUTH_UNIX;
Cyrill Gorcunov63649bd2008-04-17 20:42:09 +04002079 if (!args->nfs_server.hostname)
2080 goto out_nomem;
Eric Parisf9c3a382008-03-05 14:20:18 -05002081
Suresh Jayaraman5eebde22010-09-23 08:55:58 -04002082 if (!(data->flags & NFS_MOUNT_NONLM))
2083 args->flags &= ~(NFS_MOUNT_LOCAL_FLOCK|
2084 NFS_MOUNT_LOCAL_FCNTL);
2085 else
2086 args->flags |= (NFS_MOUNT_LOCAL_FLOCK|
2087 NFS_MOUNT_LOCAL_FCNTL);
Eric Parisf9c3a382008-03-05 14:20:18 -05002088 /*
2089 * The legacy version 6 binary mount data from userspace has a
2090 * field used only to transport selinux information into the
2091 * the kernel. To continue to support that functionality we
2092 * have a touch of selinux knowledge here in the NFS code. The
2093 * userspace code converted context=blah to just blah so we are
2094 * converting back to the full string selinux understands.
2095 */
2096 if (data->context[0]){
2097#ifdef CONFIG_SECURITY_SELINUX
2098 int rc;
Eric Parisf9c3a382008-03-05 14:20:18 -05002099 data->context[NFS_MAX_CONTEXT_LEN] = '\0';
Al Viro757cbe52018-12-14 23:42:21 -05002100 rc = security_add_mnt_opt("context", data->context,
2101 strlen(data->context), &args->lsm_opts);
Eric Parisf9c3a382008-03-05 14:20:18 -05002102 if (rc)
2103 return rc;
2104#else
2105 return -EINVAL;
2106#endif
2107 }
2108
Chuck Lever5df36e72007-07-01 12:12:56 -04002109 break;
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002110 default:
2111 return NFS_TEXT_DATA;
David Howellsf7b422b2006-06-09 09:34:33 -04002112 }
David Howells54ceac42006-08-22 20:06:13 -04002113
David Howells54ceac42006-08-22 20:06:13 -04002114 return 0;
Chuck Lever5df36e72007-07-01 12:12:56 -04002115
2116out_no_data:
2117 dfprintk(MOUNT, "NFS: mount program didn't pass any mount data\n");
2118 return -EINVAL;
2119
2120out_no_v3:
2121 dfprintk(MOUNT, "NFS: nfs_mount_data version %d does not support v3\n",
2122 data->version);
2123 return -EINVAL;
2124
2125out_no_sec:
2126 dfprintk(MOUNT, "NFS: nfs_mount_data version supports only AUTH_SYS\n");
2127 return -EINVAL;
2128
Cyrill Gorcunov63649bd2008-04-17 20:42:09 +04002129out_nomem:
2130 dfprintk(MOUNT, "NFS: not enough memory to handle mount options\n");
2131 return -ENOMEM;
2132
Chuck Lever5df36e72007-07-01 12:12:56 -04002133out_no_address:
2134 dfprintk(MOUNT, "NFS: mount program didn't pass remote address\n");
2135 return -EINVAL;
2136
2137out_invalid_fh:
2138 dfprintk(MOUNT, "NFS: invalid root filehandle\n");
2139 return -EINVAL;
David Howells54ceac42006-08-22 20:06:13 -04002140}
2141
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002142#if IS_ENABLED(CONFIG_NFS_V4)
Bryan Schumakerd72c7272012-05-10 15:07:41 -04002143static int nfs_validate_mount_data(struct file_system_type *fs_type,
2144 void *options,
2145 struct nfs_parsed_mount_data *args,
2146 struct nfs_fh *mntfh,
2147 const char *dev_name)
2148{
2149 if (fs_type == &nfs_fs_type)
2150 return nfs23_validate_mount_data(options, args, mntfh, dev_name);
2151 return nfs4_validate_mount_data(options, args, dev_name);
2152}
2153#else
2154static int nfs_validate_mount_data(struct file_system_type *fs_type,
2155 void *options,
2156 struct nfs_parsed_mount_data *args,
2157 struct nfs_fh *mntfh,
2158 const char *dev_name)
2159{
2160 return nfs23_validate_mount_data(options, args, mntfh, dev_name);
2161}
2162#endif
2163
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002164static int nfs_validate_text_mount_data(void *options,
2165 struct nfs_parsed_mount_data *args,
2166 const char *dev_name)
2167{
2168 int port = 0;
2169 int max_namelen = PAGE_SIZE;
2170 int max_pathlen = NFS_MAXPATHLEN;
2171 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
2172
2173 if (nfs_parse_mount_options((char *)options, args) == 0)
2174 return -EINVAL;
2175
2176 if (!nfs_verify_server_address(sap))
2177 goto out_no_address;
2178
2179 if (args->version == 4) {
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002180#if IS_ENABLED(CONFIG_NFS_V4)
Chuck Lever0dfbb5f2018-12-19 10:59:12 -05002181 if (args->nfs_server.protocol == XPRT_TRANSPORT_RDMA)
2182 port = NFS_RDMA_PORT;
2183 else
2184 port = NFS_PORT;
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002185 max_namelen = NFS4_MAXNAMLEN;
2186 max_pathlen = NFS4_MAXPATHLEN;
2187 nfs_validate_transport_protocol(args);
Trond Myklebust6da1a032013-08-07 12:30:52 -04002188 if (args->nfs_server.protocol == XPRT_TRANSPORT_UDP)
2189 goto out_invalid_transport_udp;
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002190 nfs4_validate_mount_flags(args);
2191#else
2192 goto out_v4_not_compiled;
2193#endif /* CONFIG_NFS_V4 */
Chuck Lever0dfbb5f2018-12-19 10:59:12 -05002194 } else {
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002195 nfs_set_mount_transport_protocol(args);
Chuck Lever0dfbb5f2018-12-19 10:59:12 -05002196 if (args->nfs_server.protocol == XPRT_TRANSPORT_RDMA)
2197 port = NFS_RDMA_PORT;
2198 }
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002199
2200 nfs_set_port(sap, &args->nfs_server.port, port);
2201
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002202 return nfs_parse_devname(dev_name,
2203 &args->nfs_server.hostname,
2204 max_namelen,
2205 &args->nfs_server.export_path,
2206 max_pathlen);
2207
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002208#if !IS_ENABLED(CONFIG_NFS_V4)
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002209out_v4_not_compiled:
2210 dfprintk(MOUNT, "NFS: NFSv4 is not compiled into kernel\n");
2211 return -EPROTONOSUPPORT;
Trond Myklebust6da1a032013-08-07 12:30:52 -04002212#else
2213out_invalid_transport_udp:
2214 dfprintk(MOUNT, "NFSv4: Unsupported transport protocol udp\n");
2215 return -EINVAL;
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002216#endif /* !CONFIG_NFS_V4 */
2217
2218out_no_address:
2219 dfprintk(MOUNT, "NFS: mount program didn't pass remote address\n");
2220 return -EINVAL;
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002221}
2222
Scott Mayhew71a6ec82014-08-04 17:37:27 -04002223#define NFS_REMOUNT_CMP_FLAGMASK ~(NFS_MOUNT_INTR \
Scott Mayhewc8e47022014-05-29 16:41:22 -04002224 | NFS_MOUNT_SECURE \
2225 | NFS_MOUNT_TCP \
2226 | NFS_MOUNT_VER3 \
2227 | NFS_MOUNT_KERBEROS \
2228 | NFS_MOUNT_NONLM \
2229 | NFS_MOUNT_BROKEN_SUID \
2230 | NFS_MOUNT_STRICTLOCK \
Scott Mayhewc8e47022014-05-29 16:41:22 -04002231 | NFS_MOUNT_LEGACY_INTERFACE)
2232
Scott Mayhew71a6ec82014-08-04 17:37:27 -04002233#define NFS_MOUNT_CMP_FLAGMASK (NFS_REMOUNT_CMP_FLAGMASK & \
2234 ~(NFS_MOUNT_UNSHARED | NFS_MOUNT_NORESVPORT))
2235
Jeff Layton48b605f2008-06-10 15:38:39 -04002236static int
2237nfs_compare_remount_data(struct nfs_server *nfss,
2238 struct nfs_parsed_mount_data *data)
2239{
Scott Mayhew71a6ec82014-08-04 17:37:27 -04002240 if ((data->flags ^ nfss->flags) & NFS_REMOUNT_CMP_FLAGMASK ||
Jeff Layton48b605f2008-06-10 15:38:39 -04002241 data->rsize != nfss->rsize ||
2242 data->wsize != nfss->wsize ||
Jeff Layton57acc402013-10-18 10:03:37 -04002243 data->version != nfss->nfs_client->rpc_ops->version ||
2244 data->minorversion != nfss->nfs_client->cl_minorversion ||
Jeff Layton48b605f2008-06-10 15:38:39 -04002245 data->retrans != nfss->client->cl_timeout->to_retries ||
Benjamin Coddington09a330f2014-12-05 21:52:49 -05002246 !nfs_auth_info_match(&data->auth_info, nfss->client->cl_auth->au_flavor) ||
Jeff Layton48b605f2008-06-10 15:38:39 -04002247 data->acregmin != nfss->acregmin / HZ ||
2248 data->acregmax != nfss->acregmax / HZ ||
2249 data->acdirmin != nfss->acdirmin / HZ ||
2250 data->acdirmax != nfss->acdirmax / HZ ||
2251 data->timeo != (10U * nfss->client->cl_timeout->to_initval / HZ) ||
Trond Myklebustbcd2ea12009-10-06 15:41:22 -04002252 data->nfs_server.port != nfss->port ||
Jeff Layton48b605f2008-06-10 15:38:39 -04002253 data->nfs_server.addrlen != nfss->nfs_client->cl_addrlen ||
Stefan Richtera1be9ee2009-10-12 11:26:12 -04002254 !rpc_cmp_addr((struct sockaddr *)&data->nfs_server.address,
2255 (struct sockaddr *)&nfss->nfs_client->cl_addr))
Jeff Layton48b605f2008-06-10 15:38:39 -04002256 return -EINVAL;
2257
2258 return 0;
2259}
2260
Bryan Schumakerfbdefd62012-07-16 16:39:20 -04002261int
Jeff Layton48b605f2008-06-10 15:38:39 -04002262nfs_remount(struct super_block *sb, int *flags, char *raw_data)
2263{
2264 int error;
2265 struct nfs_server *nfss = sb->s_fs_info;
2266 struct nfs_parsed_mount_data *data;
2267 struct nfs_mount_data *options = (struct nfs_mount_data *)raw_data;
2268 struct nfs4_mount_data *options4 = (struct nfs4_mount_data *)raw_data;
Trond Myklebustcd100722008-06-17 16:12:00 -04002269 u32 nfsvers = nfss->nfs_client->rpc_ops->version;
Jeff Layton48b605f2008-06-10 15:38:39 -04002270
Theodore Ts'o02b99842014-03-13 10:14:33 -04002271 sync_filesystem(sb);
2272
Jeff Layton48b605f2008-06-10 15:38:39 -04002273 /*
2274 * Userspace mount programs that send binary options generally send
2275 * them populated with default values. We have no way to know which
2276 * ones were explicitly specified. Fall back to legacy behavior and
2277 * just return success.
2278 */
Marc Zyngier31c94462008-07-17 13:21:55 +02002279 if ((nfsvers == 4 && (!options4 || options4->version == 1)) ||
2280 (nfsvers <= 3 && (!options || (options->version >= 1 &&
2281 options->version <= 6))))
Jeff Layton48b605f2008-06-10 15:38:39 -04002282 return 0;
2283
Al Viro6a0440e2018-12-10 17:30:41 -05002284 data = nfs_alloc_parsed_mount_data();
Jeff Layton48b605f2008-06-10 15:38:39 -04002285 if (data == NULL)
2286 return -ENOMEM;
2287
2288 /* fill out struct with values from existing mount */
2289 data->flags = nfss->flags;
2290 data->rsize = nfss->rsize;
2291 data->wsize = nfss->wsize;
2292 data->retrans = nfss->client->cl_timeout->to_retries;
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -04002293 data->selected_flavor = nfss->client->cl_auth->au_flavor;
Jeff Layton48b605f2008-06-10 15:38:39 -04002294 data->acregmin = nfss->acregmin / HZ;
2295 data->acregmax = nfss->acregmax / HZ;
2296 data->acdirmin = nfss->acdirmin / HZ;
2297 data->acdirmax = nfss->acdirmax / HZ;
2298 data->timeo = 10U * nfss->client->cl_timeout->to_initval / HZ;
Trond Myklebustbcd2ea12009-10-06 15:41:22 -04002299 data->nfs_server.port = nfss->port;
Jeff Layton48b605f2008-06-10 15:38:39 -04002300 data->nfs_server.addrlen = nfss->nfs_client->cl_addrlen;
Jeff Layton57acc402013-10-18 10:03:37 -04002301 data->version = nfsvers;
2302 data->minorversion = nfss->nfs_client->cl_minorversion;
Mateusz Guzika9147222014-06-10 12:44:12 +02002303 data->net = current->nsproxy->net_ns;
Jeff Layton48b605f2008-06-10 15:38:39 -04002304 memcpy(&data->nfs_server.address, &nfss->nfs_client->cl_addr,
2305 data->nfs_server.addrlen);
2306
2307 /* overwrite those values with any that were specified */
Jeff Layton19669032013-10-21 09:52:19 -04002308 error = -EINVAL;
2309 if (!nfs_parse_mount_options((char *)options, data))
Jeff Layton48b605f2008-06-10 15:38:39 -04002310 goto out;
2311
Jeff Layton26c4c172011-04-27 11:49:09 -04002312 /*
2313 * noac is a special case. It implies -o sync, but that's not
2314 * necessarily reflected in the mtab options. do_remount_sb
Linus Torvalds1751e8a2017-11-27 13:05:09 -08002315 * will clear SB_SYNCHRONOUS if -o sync wasn't specified in the
Jeff Layton26c4c172011-04-27 11:49:09 -04002316 * remount options, so we have to explicitly reset it.
2317 */
2318 if (data->flags & NFS_MOUNT_NOAC)
Linus Torvalds1751e8a2017-11-27 13:05:09 -08002319 *flags |= SB_SYNCHRONOUS;
Jeff Layton26c4c172011-04-27 11:49:09 -04002320
Jeff Layton48b605f2008-06-10 15:38:39 -04002321 /* compare new mount options with old ones */
2322 error = nfs_compare_remount_data(nfss, data);
Al Viro6a0440e2018-12-10 17:30:41 -05002323 if (!error)
Al Viro204cc0c2018-12-13 13:41:47 -05002324 error = security_sb_remount(sb, data->lsm_opts);
Jeff Layton48b605f2008-06-10 15:38:39 -04002325out:
Al Viro6a0440e2018-12-10 17:30:41 -05002326 nfs_free_parsed_mount_data(data);
Jeff Layton48b605f2008-06-10 15:38:39 -04002327 return error;
2328}
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002329EXPORT_SYMBOL_GPL(nfs_remount);
Jeff Layton48b605f2008-06-10 15:38:39 -04002330
David Howells54ceac42006-08-22 20:06:13 -04002331/*
2332 * Initialise the common bits of the superblock
2333 */
Jan Kara4f253e12017-05-16 12:18:11 +02002334static void nfs_initialise_sb(struct super_block *sb)
David Howells54ceac42006-08-22 20:06:13 -04002335{
2336 struct nfs_server *server = NFS_SB(sb);
2337
2338 sb->s_magic = NFS_SUPER_MAGIC;
2339
2340 /* We probably want something more informative here */
2341 snprintf(sb->s_id, sizeof(sb->s_id),
Vivek Trivedi5a7c9ee2012-03-15 23:58:52 +05302342 "%u:%u", MAJOR(sb->s_dev), MINOR(sb->s_dev));
David Howells54ceac42006-08-22 20:06:13 -04002343
2344 if (sb->s_blocksize == 0)
2345 sb->s_blocksize = nfs_block_bits(server->wsize,
2346 &sb->s_blocksize_bits);
2347
David Howells54ceac42006-08-22 20:06:13 -04002348 nfs_super_set_maxbytes(sb, server->maxfilesize);
2349}
2350
2351/*
2352 * Finish setting up an NFS2/3 superblock
2353 */
Jan Kara9052c7c2017-05-04 09:02:42 +02002354void nfs_fill_super(struct super_block *sb, struct nfs_mount_info *mount_info)
David Howells54ceac42006-08-22 20:06:13 -04002355{
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002356 struct nfs_parsed_mount_data *data = mount_info->parsed;
David Howells54ceac42006-08-22 20:06:13 -04002357 struct nfs_server *server = NFS_SB(sb);
2358
2359 sb->s_blocksize_bits = 0;
2360 sb->s_blocksize = 0;
Bryan Schumaker6a744902012-07-30 16:05:20 -04002361 sb->s_xattr = server->nfs_client->cl_nfs_mod->xattr;
2362 sb->s_op = server->nfs_client->cl_nfs_mod->sops;
2363 if (data && data->bsize)
David Howells54ceac42006-08-22 20:06:13 -04002364 sb->s_blocksize = nfs_block_size(data->bsize, &sb->s_blocksize_bits);
2365
Bryan Schumaker6a744902012-07-30 16:05:20 -04002366 if (server->nfs_client->rpc_ops->version != 2) {
David Howells54ceac42006-08-22 20:06:13 -04002367 /* The VFS shouldn't apply the umask to mode bits. We will do
2368 * so ourselves when necessary.
2369 */
Linus Torvalds1751e8a2017-11-27 13:05:09 -08002370 sb->s_flags |= SB_POSIXACL;
David Howells54ceac42006-08-22 20:06:13 -04002371 sb->s_time_gran = 1;
Peng Tao20fa1902017-06-29 06:34:53 -07002372 sb->s_export_op = &nfs_export_ops;
David Howells54ceac42006-08-22 20:06:13 -04002373 }
2374
David Howells54ceac42006-08-22 20:06:13 -04002375 nfs_initialise_sb(sb);
2376}
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002377EXPORT_SYMBOL_GPL(nfs_fill_super);
David Howells54ceac42006-08-22 20:06:13 -04002378
2379/*
Bryan Schumaker3cadf4b2012-07-16 16:39:19 -04002380 * Finish setting up a cloned NFS2/3/4 superblock
David Howells54ceac42006-08-22 20:06:13 -04002381 */
Jan Kara4f253e12017-05-16 12:18:11 +02002382static void nfs_clone_super(struct super_block *sb,
2383 struct nfs_mount_info *mount_info)
David Howells54ceac42006-08-22 20:06:13 -04002384{
Bryan Schumaker8c958e02012-05-10 15:07:35 -04002385 const struct super_block *old_sb = mount_info->cloned->sb;
David Howells54ceac42006-08-22 20:06:13 -04002386 struct nfs_server *server = NFS_SB(sb);
2387
2388 sb->s_blocksize_bits = old_sb->s_blocksize_bits;
2389 sb->s_blocksize = old_sb->s_blocksize;
2390 sb->s_maxbytes = old_sb->s_maxbytes;
Bryan Schumaker3cadf4b2012-07-16 16:39:19 -04002391 sb->s_xattr = old_sb->s_xattr;
2392 sb->s_op = old_sb->s_op;
2393 sb->s_time_gran = 1;
Peng Tao20fa1902017-06-29 06:34:53 -07002394 sb->s_export_op = old_sb->s_export_op;
David Howells54ceac42006-08-22 20:06:13 -04002395
Bryan Schumaker3cadf4b2012-07-16 16:39:19 -04002396 if (server->nfs_client->rpc_ops->version != 2) {
David Howells54ceac42006-08-22 20:06:13 -04002397 /* The VFS shouldn't apply the umask to mode bits. We will do
2398 * so ourselves when necessary.
2399 */
Linus Torvalds1751e8a2017-11-27 13:05:09 -08002400 sb->s_flags |= SB_POSIXACL;
David Howells54ceac42006-08-22 20:06:13 -04002401 }
2402
David Howells54ceac42006-08-22 20:06:13 -04002403 nfs_initialise_sb(sb);
2404}
2405
Trond Myklebust275a5d22007-05-16 16:53:28 -04002406static int nfs_compare_mount_options(const struct super_block *s, const struct nfs_server *b, int flags)
2407{
2408 const struct nfs_server *a = s->s_fs_info;
2409 const struct rpc_clnt *clnt_a = a->client;
2410 const struct rpc_clnt *clnt_b = b->client;
2411
2412 if ((s->s_flags & NFS_MS_MASK) != (flags & NFS_MS_MASK))
2413 goto Ebusy;
2414 if (a->nfs_client != b->nfs_client)
2415 goto Ebusy;
Trond Myklebust0aea92bf2013-09-07 18:28:10 -04002416 if ((a->flags ^ b->flags) & NFS_MOUNT_CMP_FLAGMASK)
Trond Myklebust275a5d22007-05-16 16:53:28 -04002417 goto Ebusy;
2418 if (a->wsize != b->wsize)
2419 goto Ebusy;
2420 if (a->rsize != b->rsize)
2421 goto Ebusy;
2422 if (a->acregmin != b->acregmin)
2423 goto Ebusy;
2424 if (a->acregmax != b->acregmax)
2425 goto Ebusy;
2426 if (a->acdirmin != b->acdirmin)
2427 goto Ebusy;
2428 if (a->acdirmax != b->acdirmax)
2429 goto Ebusy;
Chris Perl594d1642018-12-17 10:56:38 -05002430 if (clnt_a->cl_auth->au_flavor != clnt_b->cl_auth->au_flavor)
Trond Myklebust275a5d22007-05-16 16:53:28 -04002431 goto Ebusy;
Trond Myklebuste89a5a42007-08-31 10:45:17 -04002432 return 1;
Trond Myklebust275a5d22007-05-16 16:53:28 -04002433Ebusy:
Trond Myklebuste89a5a42007-08-31 10:45:17 -04002434 return 0;
2435}
2436
2437struct nfs_sb_mountdata {
2438 struct nfs_server *server;
2439 int mntflags;
2440};
2441
2442static int nfs_set_super(struct super_block *s, void *data)
2443{
2444 struct nfs_sb_mountdata *sb_mntdata = data;
2445 struct nfs_server *server = sb_mntdata->server;
2446 int ret;
2447
2448 s->s_flags = sb_mntdata->mntflags;
2449 s->s_fs_info = server;
Al Viro8b244ff2010-12-18 11:29:39 -05002450 s->s_d_op = server->nfs_client->rpc_ops->dentry_ops;
Trond Myklebuste89a5a42007-08-31 10:45:17 -04002451 ret = set_anon_super(s, server);
2452 if (ret == 0)
2453 server->s_dev = s->s_dev;
2454 return ret;
2455}
2456
Chuck Leverfd00a8f2007-12-10 14:57:38 -05002457static int nfs_compare_super_address(struct nfs_server *server1,
2458 struct nfs_server *server2)
2459{
2460 struct sockaddr *sap1, *sap2;
J. Bruce Fields7e3fcf62016-05-03 15:16:02 -04002461 struct rpc_xprt *xprt1 = server1->client->cl_xprt;
2462 struct rpc_xprt *xprt2 = server2->client->cl_xprt;
2463
2464 if (!net_eq(xprt1->xprt_net, xprt2->xprt_net))
2465 return 0;
Chuck Leverfd00a8f2007-12-10 14:57:38 -05002466
2467 sap1 = (struct sockaddr *)&server1->nfs_client->cl_addr;
2468 sap2 = (struct sockaddr *)&server2->nfs_client->cl_addr;
2469
2470 if (sap1->sa_family != sap2->sa_family)
2471 return 0;
2472
2473 switch (sap1->sa_family) {
2474 case AF_INET: {
2475 struct sockaddr_in *sin1 = (struct sockaddr_in *)sap1;
2476 struct sockaddr_in *sin2 = (struct sockaddr_in *)sap2;
2477 if (sin1->sin_addr.s_addr != sin2->sin_addr.s_addr)
2478 return 0;
2479 if (sin1->sin_port != sin2->sin_port)
2480 return 0;
2481 break;
2482 }
2483 case AF_INET6: {
2484 struct sockaddr_in6 *sin1 = (struct sockaddr_in6 *)sap1;
2485 struct sockaddr_in6 *sin2 = (struct sockaddr_in6 *)sap2;
2486 if (!ipv6_addr_equal(&sin1->sin6_addr, &sin2->sin6_addr))
2487 return 0;
2488 if (sin1->sin6_port != sin2->sin6_port)
2489 return 0;
2490 break;
2491 }
2492 default:
2493 return 0;
2494 }
2495
2496 return 1;
2497}
2498
Trond Myklebust3b7eb5e2019-04-24 17:46:49 -04002499static int nfs_compare_userns(const struct nfs_server *old,
2500 const struct nfs_server *new)
2501{
2502 const struct user_namespace *oldns = &init_user_ns;
2503 const struct user_namespace *newns = &init_user_ns;
2504
2505 if (old->client && old->client->cl_cred)
2506 oldns = old->client->cl_cred->user_ns;
2507 if (new->client && new->client->cl_cred)
2508 newns = new->client->cl_cred->user_ns;
2509 if (oldns != newns)
2510 return 0;
2511 return 1;
2512}
2513
Trond Myklebuste89a5a42007-08-31 10:45:17 -04002514static int nfs_compare_super(struct super_block *sb, void *data)
2515{
2516 struct nfs_sb_mountdata *sb_mntdata = data;
2517 struct nfs_server *server = sb_mntdata->server, *old = NFS_SB(sb);
2518 int mntflags = sb_mntdata->mntflags;
2519
Chuck Leverfd00a8f2007-12-10 14:57:38 -05002520 if (!nfs_compare_super_address(old, server))
Trond Myklebuste89a5a42007-08-31 10:45:17 -04002521 return 0;
2522 /* Note: NFS_MOUNT_UNSHARED == NFS4_MOUNT_UNSHARED */
2523 if (old->flags & NFS_MOUNT_UNSHARED)
2524 return 0;
2525 if (memcmp(&old->fsid, &server->fsid, sizeof(old->fsid)) != 0)
2526 return 0;
Trond Myklebust3b7eb5e2019-04-24 17:46:49 -04002527 if (!nfs_compare_userns(old, server))
2528 return 0;
Trond Myklebuste89a5a42007-08-31 10:45:17 -04002529 return nfs_compare_mount_options(sb, server, mntflags);
Trond Myklebust275a5d22007-05-16 16:53:28 -04002530}
2531
Trond Myklebust39ffb922012-05-16 10:21:30 -07002532#ifdef CONFIG_NFS_FSCACHE
Bryan Schumaker2311b942012-05-10 15:07:32 -04002533static void nfs_get_cache_cookie(struct super_block *sb,
2534 struct nfs_parsed_mount_data *parsed,
2535 struct nfs_clone_mount *cloned)
2536{
Trond Myklebustc4271c62012-12-21 11:02:32 -05002537 struct nfs_server *nfss = NFS_SB(sb);
Bryan Schumaker2311b942012-05-10 15:07:32 -04002538 char *uniq = NULL;
2539 int ulen = 0;
2540
Trond Myklebustc4271c62012-12-21 11:02:32 -05002541 nfss->fscache_key = NULL;
2542 nfss->fscache = NULL;
2543
2544 if (parsed) {
2545 if (!(parsed->options & NFS_OPTION_FSCACHE))
2546 return;
2547 if (parsed->fscache_uniq) {
2548 uniq = parsed->fscache_uniq;
2549 ulen = strlen(parsed->fscache_uniq);
2550 }
Bryan Schumaker2311b942012-05-10 15:07:32 -04002551 } else if (cloned) {
2552 struct nfs_server *mnt_s = NFS_SB(cloned->sb);
Trond Myklebustc4271c62012-12-21 11:02:32 -05002553 if (!(mnt_s->options & NFS_OPTION_FSCACHE))
2554 return;
Bryan Schumaker2311b942012-05-10 15:07:32 -04002555 if (mnt_s->fscache_key) {
2556 uniq = mnt_s->fscache_key->key.uniquifier;
2557 ulen = mnt_s->fscache_key->key.uniq_len;
2558 };
Trond Myklebustc4271c62012-12-21 11:02:32 -05002559 } else
2560 return;
Bryan Schumaker2311b942012-05-10 15:07:32 -04002561
2562 nfs_fscache_get_super_cookie(sb, uniq, ulen);
2563}
Trond Myklebust39ffb922012-05-16 10:21:30 -07002564#else
2565static void nfs_get_cache_cookie(struct super_block *sb,
2566 struct nfs_parsed_mount_data *parsed,
2567 struct nfs_clone_mount *cloned)
2568{
2569}
2570#endif
Bryan Schumaker2311b942012-05-10 15:07:32 -04002571
Bryan Schumakerfbdefd62012-07-16 16:39:20 -04002572int nfs_set_sb_security(struct super_block *s, struct dentry *mntroot,
2573 struct nfs_mount_info *mount_info)
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002574{
David Quigleyaa9c2662013-05-22 12:50:44 -04002575 int error;
2576 unsigned long kflags = 0, kflags_out = 0;
2577 if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL)
2578 kflags |= SECURITY_LSM_NATIVE_LABELS;
2579
Al Viro204cc0c2018-12-13 13:41:47 -05002580 error = security_sb_set_mnt_opts(s, mount_info->parsed->lsm_opts,
David Quigleyaa9c2662013-05-22 12:50:44 -04002581 kflags, &kflags_out);
2582 if (error)
2583 goto err;
2584
2585 if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL &&
2586 !(kflags_out & SECURITY_LSM_NATIVE_LABELS))
2587 NFS_SB(s)->caps &= ~NFS_CAP_SECURITY_LABEL;
2588err:
2589 return error;
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002590}
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002591EXPORT_SYMBOL_GPL(nfs_set_sb_security);
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002592
Bryan Schumakerfbdefd62012-07-16 16:39:20 -04002593int nfs_clone_sb_security(struct super_block *s, struct dentry *mntroot,
2594 struct nfs_mount_info *mount_info)
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002595{
Scott Mayhew0b4d3452017-06-05 11:45:04 -04002596 int error;
2597 unsigned long kflags = 0, kflags_out = 0;
2598
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002599 /* clone any lsm security options from the parent to the new sb */
David Howells2b0143b2015-03-17 22:25:59 +00002600 if (d_inode(mntroot)->i_op != NFS_SB(s)->nfs_client->rpc_ops->dir_inode_ops)
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002601 return -ESTALE;
Scott Mayhew0b4d3452017-06-05 11:45:04 -04002602
2603 if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL)
2604 kflags |= SECURITY_LSM_NATIVE_LABELS;
2605
2606 error = security_sb_clone_mnt_opts(mount_info->cloned->sb, s, kflags,
2607 &kflags_out);
2608 if (error)
2609 return error;
2610
2611 if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL &&
2612 !(kflags_out & SECURITY_LSM_NATIVE_LABELS))
2613 NFS_SB(s)->caps &= ~NFS_CAP_SECURITY_LABEL;
2614 return 0;
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002615}
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002616EXPORT_SYMBOL_GPL(nfs_clone_sb_security);
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002617
Bryan Schumakerab7017a2012-07-30 16:05:16 -04002618struct dentry *nfs_fs_mount_common(struct nfs_server *server,
Bryan Schumakerfbdefd62012-07-16 16:39:20 -04002619 int flags, const char *dev_name,
Bryan Schumakerab7017a2012-07-30 16:05:16 -04002620 struct nfs_mount_info *mount_info,
2621 struct nfs_subversion *nfs_mod)
David Howells54ceac42006-08-22 20:06:13 -04002622{
David Howells54ceac42006-08-22 20:06:13 -04002623 struct super_block *s;
Al Viro011949812011-03-16 07:25:36 -04002624 struct dentry *mntroot = ERR_PTR(-ENOMEM);
Trond Myklebust75180df2007-05-16 16:53:28 -04002625 int (*compare_super)(struct super_block *, void *) = nfs_compare_super;
Trond Myklebuste89a5a42007-08-31 10:45:17 -04002626 struct nfs_sb_mountdata sb_mntdata = {
2627 .mntflags = flags,
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002628 .server = server,
Trond Myklebuste89a5a42007-08-31 10:45:17 -04002629 };
Al Viro011949812011-03-16 07:25:36 -04002630 int error;
David Howells54ceac42006-08-22 20:06:13 -04002631
Trond Myklebust75180df2007-05-16 16:53:28 -04002632 if (server->flags & NFS_MOUNT_UNSHARED)
2633 compare_super = NULL;
2634
Sachin Prabhufb2088c2011-08-01 12:10:12 +01002635 /* -o noac implies -o sync */
2636 if (server->flags & NFS_MOUNT_NOAC)
Linus Torvalds1751e8a2017-11-27 13:05:09 -08002637 sb_mntdata.mntflags |= SB_SYNCHRONOUS;
Sachin Prabhufb2088c2011-08-01 12:10:12 +01002638
Scott Mayhewe890db02013-07-31 10:01:41 -04002639 if (mount_info->cloned != NULL && mount_info->cloned->sb != NULL)
Linus Torvalds1751e8a2017-11-27 13:05:09 -08002640 if (mount_info->cloned->sb->s_flags & SB_SYNCHRONOUS)
2641 sb_mntdata.mntflags |= SB_SYNCHRONOUS;
Scott Mayhewe890db02013-07-31 10:01:41 -04002642
David Howells54ceac42006-08-22 20:06:13 -04002643 /* Get a superblock - note that we may end up sharing one that already exists */
Bryan Schumakerab7017a2012-07-30 16:05:16 -04002644 s = sget(nfs_mod->nfs_fs, compare_super, nfs_set_super, flags, &sb_mntdata);
Trond Myklebust816724e2006-06-24 08:41:41 -04002645 if (IS_ERR(s)) {
Al Viro011949812011-03-16 07:25:36 -04002646 mntroot = ERR_CAST(s);
David Howells54ceac42006-08-22 20:06:13 -04002647 goto out_err_nosb;
Trond Myklebust816724e2006-06-24 08:41:41 -04002648 }
2649
David Howells54ceac42006-08-22 20:06:13 -04002650 if (s->s_fs_info != server) {
2651 nfs_free_server(server);
2652 server = NULL;
Miklos Szeredifa799752008-04-30 00:54:33 -07002653 } else {
Jan Kara9052c7c2017-05-04 09:02:42 +02002654 error = super_setup_bdi_name(s, "%u:%u", MAJOR(server->s_dev),
2655 MINOR(server->s_dev));
2656 if (error) {
2657 mntroot = ERR_PTR(error);
2658 goto error_splat_super;
2659 }
2660 s->s_bdi->ra_pages = server->rpages * NFS_MAX_READAHEAD;
Chuck Leverce6cda12013-10-17 14:12:56 -04002661 server->super = s;
David Howellsf7b422b2006-06-09 09:34:33 -04002662 }
David Howells54ceac42006-08-22 20:06:13 -04002663
2664 if (!s->s_root) {
2665 /* initial superblock/root creation */
Jan Kara9052c7c2017-05-04 09:02:42 +02002666 mount_info->fill_super(s, mount_info);
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002667 nfs_get_cache_cookie(s, mount_info->parsed, mount_info->cloned);
Eric W. Biederman95dd7752018-03-14 18:20:29 -05002668 if (!(server->flags & NFS_MOUNT_UNSHARED))
2669 s->s_iflags |= SB_I_MULTIROOT;
David Howells54ceac42006-08-22 20:06:13 -04002670 }
2671
Bryan Schumaker87c70832012-05-10 15:07:43 -04002672 mntroot = nfs_get_root(s, mount_info->mntfh, dev_name);
Al Viro011949812011-03-16 07:25:36 -04002673 if (IS_ERR(mntroot))
David Howells54ceac42006-08-22 20:06:13 -04002674 goto error_splat_super;
David Howells54ceac42006-08-22 20:06:13 -04002675
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002676 error = mount_info->set_security(s, mntroot, mount_info);
Eric Parisf9c3a382008-03-05 14:20:18 -05002677 if (error)
2678 goto error_splat_root;
2679
Linus Torvalds1751e8a2017-11-27 13:05:09 -08002680 s->s_flags |= SB_ACTIVE;
Chuck Lever06559602007-07-01 12:12:35 -04002681
2682out:
Al Viro011949812011-03-16 07:25:36 -04002683 return mntroot;
Trond Myklebust816724e2006-06-24 08:41:41 -04002684
David Howells54ceac42006-08-22 20:06:13 -04002685out_err_nosb:
2686 nfs_free_server(server);
Chuck Lever06559602007-07-01 12:12:35 -04002687 goto out;
David Howells54ceac42006-08-22 20:06:13 -04002688
Eric Parisf9c3a382008-03-05 14:20:18 -05002689error_splat_root:
2690 dput(mntroot);
Al Viro011949812011-03-16 07:25:36 -04002691 mntroot = ERR_PTR(error);
David Howells54ceac42006-08-22 20:06:13 -04002692error_splat_super:
Al Viro6f5bbff2009-05-06 01:34:22 -04002693 deactivate_locked_super(s);
Chuck Lever06559602007-07-01 12:12:35 -04002694 goto out;
David Howellsf7b422b2006-06-09 09:34:33 -04002695}
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002696EXPORT_SYMBOL_GPL(nfs_fs_mount_common);
David Howellsf7b422b2006-06-09 09:34:33 -04002697
Bryan Schumakerfbdefd62012-07-16 16:39:20 -04002698struct dentry *nfs_fs_mount(struct file_system_type *fs_type,
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002699 int flags, const char *dev_name, void *raw_data)
2700{
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002701 struct nfs_mount_info mount_info = {
2702 .fill_super = nfs_fill_super,
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002703 .set_security = nfs_set_sb_security,
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002704 };
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002705 struct dentry *mntroot = ERR_PTR(-ENOMEM);
Bryan Schumakerab7017a2012-07-30 16:05:16 -04002706 struct nfs_subversion *nfs_mod;
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002707 int error;
2708
Bryan Schumaker46058d42012-05-10 15:07:42 -04002709 mount_info.parsed = nfs_alloc_parsed_mount_data();
Bryan Schumaker87c70832012-05-10 15:07:43 -04002710 mount_info.mntfh = nfs_alloc_fhandle();
2711 if (mount_info.parsed == NULL || mount_info.mntfh == NULL)
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002712 goto out;
2713
2714 /* Validate the mount data */
Bryan Schumaker87c70832012-05-10 15:07:43 -04002715 error = nfs_validate_mount_data(fs_type, raw_data, mount_info.parsed, mount_info.mntfh, dev_name);
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002716 if (error == NFS_TEXT_DATA)
Bryan Schumaker46058d42012-05-10 15:07:42 -04002717 error = nfs_validate_text_mount_data(raw_data, mount_info.parsed, dev_name);
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002718 if (error < 0) {
2719 mntroot = ERR_PTR(error);
2720 goto out;
2721 }
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002722
Bryan Schumakerab7017a2012-07-30 16:05:16 -04002723 nfs_mod = get_nfs_version(mount_info.parsed->version);
2724 if (IS_ERR(nfs_mod)) {
2725 mntroot = ERR_CAST(nfs_mod);
2726 goto out;
2727 }
2728
Bryan Schumakerff9099f22012-07-30 16:05:18 -04002729 mntroot = nfs_mod->rpc_ops->try_mount(flags, dev_name, &mount_info, nfs_mod);
Bryan Schumakerab7017a2012-07-30 16:05:16 -04002730
2731 put_nfs_version(nfs_mod);
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002732out:
Bryan Schumaker46058d42012-05-10 15:07:42 -04002733 nfs_free_parsed_mount_data(mount_info.parsed);
Bryan Schumaker87c70832012-05-10 15:07:43 -04002734 nfs_free_fhandle(mount_info.mntfh);
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002735 return mntroot;
2736}
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002737EXPORT_SYMBOL_GPL(nfs_fs_mount);
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002738
David Howells54ceac42006-08-22 20:06:13 -04002739/*
2740 * Destroy an NFS2/3 superblock
2741 */
Bryan Schumakerfbdefd62012-07-16 16:39:20 -04002742void nfs_kill_super(struct super_block *s)
David Howellsf7b422b2006-06-09 09:34:33 -04002743{
2744 struct nfs_server *server = NFS_SB(s);
Christoph Hellwig7b14a212015-01-14 10:42:39 +01002745 dev_t dev = s->s_dev;
David Howellsf7b422b2006-06-09 09:34:33 -04002746
Christoph Hellwig7b14a212015-01-14 10:42:39 +01002747 generic_shutdown_super(s);
2748
David Howells08734042009-04-03 16:42:42 +01002749 nfs_fscache_release_super_cookie(s);
Christoph Hellwig7b14a212015-01-14 10:42:39 +01002750
David Howells54ceac42006-08-22 20:06:13 -04002751 nfs_free_server(server);
Christoph Hellwig7b14a212015-01-14 10:42:39 +01002752 free_anon_bdev(dev);
David Howellsf7b422b2006-06-09 09:34:33 -04002753}
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002754EXPORT_SYMBOL_GPL(nfs_kill_super);
David Howellsf7b422b2006-06-09 09:34:33 -04002755
David Howells54ceac42006-08-22 20:06:13 -04002756/*
Bryan Schumaker8c958e02012-05-10 15:07:35 -04002757 * Clone an NFS2/3/4 server record on xdev traversal (FSID-change)
David Howells54ceac42006-08-22 20:06:13 -04002758 */
Stanislav Kinsbursky3dd4f8ef2012-10-02 14:19:04 +04002759static struct dentry *
Bryan Schumakere8f25e62012-07-30 16:05:17 -04002760nfs_xdev_mount(struct file_system_type *fs_type, int flags,
2761 const char *dev_name, void *raw_data)
David Howellsf7b422b2006-06-09 09:34:33 -04002762{
Bryan Schumakere8f25e62012-07-30 16:05:17 -04002763 struct nfs_clone_mount *data = raw_data;
2764 struct nfs_mount_info mount_info = {
2765 .fill_super = nfs_clone_super,
2766 .set_security = nfs_clone_sb_security,
2767 .cloned = data,
2768 };
David Howells54ceac42006-08-22 20:06:13 -04002769 struct nfs_server *server;
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002770 struct dentry *mntroot = ERR_PTR(-ENOMEM);
Bryan Schumakerab7017a2012-07-30 16:05:16 -04002771 struct nfs_subversion *nfs_mod = NFS_SB(data->sb)->nfs_client->cl_nfs_mod;
David Howells54ceac42006-08-22 20:06:13 -04002772
Trond Myklebustdee972b2013-01-16 15:05:44 -05002773 dprintk("--> nfs_xdev_mount()\n");
David Howells54ceac42006-08-22 20:06:13 -04002774
Bryan Schumakere8f25e62012-07-30 16:05:17 -04002775 mount_info.mntfh = mount_info.cloned->fh;
Bryan Schumaker87c70832012-05-10 15:07:43 -04002776
David Howells54ceac42006-08-22 20:06:13 -04002777 /* create a new volume representation */
Bryan Schumaker1179acc2012-07-30 16:05:19 -04002778 server = nfs_mod->rpc_ops->clone_server(NFS_SB(data->sb), data->fh, data->fattr, data->authflavor);
David Howells54ceac42006-08-22 20:06:13 -04002779
Trond Myklebustdee972b2013-01-16 15:05:44 -05002780 if (IS_ERR(server))
2781 mntroot = ERR_CAST(server);
2782 else
2783 mntroot = nfs_fs_mount_common(server, flags,
2784 dev_name, &mount_info, nfs_mod);
2785
2786 dprintk("<-- nfs_xdev_mount() = %ld\n",
2787 IS_ERR(mntroot) ? PTR_ERR(mntroot) : 0L);
Al Viro31f43472010-10-29 03:38:12 -04002788 return mntroot;
David Howellsf7b422b2006-06-09 09:34:33 -04002789}
2790
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002791#if IS_ENABLED(CONFIG_NFS_V4)
David Howells54ceac42006-08-22 20:06:13 -04002792
Trond Myklebust01c3f052009-06-17 13:22:58 -07002793static void nfs4_validate_mount_flags(struct nfs_parsed_mount_data *args)
2794{
Suresh Jayaraman5eebde22010-09-23 08:55:58 -04002795 args->flags &= ~(NFS_MOUNT_NONLM|NFS_MOUNT_NOACL|NFS_MOUNT_VER3|
2796 NFS_MOUNT_LOCAL_FLOCK|NFS_MOUNT_LOCAL_FCNTL);
Trond Myklebust01c3f052009-06-17 13:22:58 -07002797}
2798
David Howells54ceac42006-08-22 20:06:13 -04002799/*
Chuck Leverf0768eb2007-07-01 12:13:01 -04002800 * Validate NFSv4 mount options
2801 */
\"Talpey, Thomas\91ea40b2007-09-10 13:44:33 -04002802static int nfs4_validate_mount_data(void *options,
2803 struct nfs_parsed_mount_data *args,
2804 const char *dev_name)
Chuck Leverf0768eb2007-07-01 12:13:01 -04002805{
Chuck Lever4cfd74f2009-09-08 19:49:47 -04002806 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
\"Talpey, Thomas\91ea40b2007-09-10 13:44:33 -04002807 struct nfs4_mount_data *data = (struct nfs4_mount_data *)options;
Chuck Leverf0768eb2007-07-01 12:13:01 -04002808 char *c;
2809
2810 if (data == NULL)
2811 goto out_no_data;
2812
Bryan Schumakercdf66442012-06-05 14:59:54 -04002813 args->version = 4;
2814
Chuck Leverf0768eb2007-07-01 12:13:01 -04002815 switch (data->version) {
2816 case 1:
Chuck Lever4c568012007-12-10 14:59:28 -05002817 if (data->host_addrlen > sizeof(args->nfs_server.address))
Chuck Leverf0768eb2007-07-01 12:13:01 -04002818 goto out_no_address;
Chuck Lever4c568012007-12-10 14:59:28 -05002819 if (data->host_addrlen == 0)
2820 goto out_no_address;
2821 args->nfs_server.addrlen = data->host_addrlen;
Chuck Lever4cfd74f2009-09-08 19:49:47 -04002822 if (copy_from_user(sap, data->host_addr, data->host_addrlen))
Chuck Leverf0768eb2007-07-01 12:13:01 -04002823 return -EFAULT;
Chuck Lever4cfd74f2009-09-08 19:49:47 -04002824 if (!nfs_verify_server_address(sap))
Chuck Leverf0768eb2007-07-01 12:13:01 -04002825 goto out_no_address;
Trond Myklebust872ece82012-09-04 11:05:07 -04002826 args->nfs_server.port = ntohs(((struct sockaddr_in *)sap)->sin_port);
Chuck Leverf0768eb2007-07-01 12:13:01 -04002827
Chuck Lever6738b252008-06-24 16:33:54 -04002828 if (data->auth_flavourlen) {
Trond Myklebust74c98812013-09-07 13:26:57 -04002829 rpc_authflavor_t pseudoflavor;
Chuck Lever6738b252008-06-24 16:33:54 -04002830 if (data->auth_flavourlen > 1)
2831 goto out_inval_auth;
Trond Myklebust74c98812013-09-07 13:26:57 -04002832 if (copy_from_user(&pseudoflavor,
\"Talpey, Thomas\91ea40b2007-09-10 13:44:33 -04002833 data->auth_flavours,
Trond Myklebust74c98812013-09-07 13:26:57 -04002834 sizeof(pseudoflavor)))
Chuck Leverf0768eb2007-07-01 12:13:01 -04002835 return -EFAULT;
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -04002836 args->selected_flavor = pseudoflavor;
Trond Myklebust74c98812013-09-07 13:26:57 -04002837 } else
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -04002838 args->selected_flavor = RPC_AUTH_UNIX;
Chuck Leverf0768eb2007-07-01 12:13:01 -04002839
2840 c = strndup_user(data->hostname.data, NFS4_MAXNAMLEN);
2841 if (IS_ERR(c))
2842 return PTR_ERR(c);
\"Talpey, Thomas\91ea40b2007-09-10 13:44:33 -04002843 args->nfs_server.hostname = c;
Chuck Leverf0768eb2007-07-01 12:13:01 -04002844
2845 c = strndup_user(data->mnt_path.data, NFS4_MAXPATHLEN);
2846 if (IS_ERR(c))
2847 return PTR_ERR(c);
\"Talpey, Thomas\91ea40b2007-09-10 13:44:33 -04002848 args->nfs_server.export_path = c;
2849 dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", c);
Chuck Leverf0768eb2007-07-01 12:13:01 -04002850
2851 c = strndup_user(data->client_addr.data, 16);
2852 if (IS_ERR(c))
2853 return PTR_ERR(c);
\"Talpey, Thomas\91ea40b2007-09-10 13:44:33 -04002854 args->client_address = c;
2855
2856 /*
2857 * Translate to nfs_parsed_mount_data, which nfs4_fill_super
2858 * can deal with.
2859 */
2860
2861 args->flags = data->flags & NFS4_MOUNT_FLAGMASK;
2862 args->rsize = data->rsize;
2863 args->wsize = data->wsize;
2864 args->timeo = data->timeo;
2865 args->retrans = data->retrans;
2866 args->acregmin = data->acregmin;
2867 args->acregmax = data->acregmax;
2868 args->acdirmin = data->acdirmin;
2869 args->acdirmax = data->acdirmax;
2870 args->nfs_server.protocol = data->proto;
Trond Myklebust259875e2008-07-02 14:43:47 -04002871 nfs_validate_transport_protocol(args);
Trond Myklebust6da1a032013-08-07 12:30:52 -04002872 if (args->nfs_server.protocol == XPRT_TRANSPORT_UDP)
2873 goto out_invalid_transport_udp;
Chuck Leverf0768eb2007-07-01 12:13:01 -04002874
2875 break;
Chuck Lever7630c852009-09-08 19:49:57 -04002876 default:
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002877 return NFS_TEXT_DATA;
Chuck Leverf0768eb2007-07-01 12:13:01 -04002878 }
2879
2880 return 0;
2881
2882out_no_data:
2883 dfprintk(MOUNT, "NFS4: mount program didn't pass any mount data\n");
2884 return -EINVAL;
2885
2886out_inval_auth:
2887 dfprintk(MOUNT, "NFS4: Invalid number of RPC auth flavours %d\n",
2888 data->auth_flavourlen);
2889 return -EINVAL;
2890
2891out_no_address:
2892 dfprintk(MOUNT, "NFS4: mount program didn't pass remote address\n");
2893 return -EINVAL;
Trond Myklebust6da1a032013-08-07 12:30:52 -04002894
2895out_invalid_transport_udp:
2896 dfprintk(MOUNT, "NFSv4: Unsupported transport protocol udp\n");
2897 return -EINVAL;
Chuck Leverf0768eb2007-07-01 12:13:01 -04002898}
2899
Bryan Schumakerfac1e8e2012-07-30 16:05:22 -04002900/*
2901 * NFS v4 module parameters need to stay in the
2902 * NFS client for backwards compatibility
2903 */
2904unsigned int nfs_callback_set_tcpport;
Trond Myklebust5405fc42016-08-29 20:03:52 -04002905unsigned short nfs_callback_nr_threads;
Bryan Schumakerfac1e8e2012-07-30 16:05:22 -04002906/* Default cache timeout is 10 minutes */
2907unsigned int nfs_idmap_cache_timeout = 600;
2908/* Turn off NFSv4 uid/gid mapping when using AUTH_SYS */
2909bool nfs4_disable_idmapping = true;
2910unsigned short max_session_slots = NFS4_DEF_SLOT_TABLE_SIZE;
Trond Myklebust5405fc42016-08-29 20:03:52 -04002911unsigned short max_session_cb_slots = NFS4_DEF_CB_SLOT_TABLE_SIZE;
Bryan Schumakerfac1e8e2012-07-30 16:05:22 -04002912unsigned short send_implementation_id = 1;
Chuck Lever6f2ea7f2012-09-14 17:24:41 -04002913char nfs4_client_id_uniquifier[NFS4_CLIENT_ID_UNIQ_LEN] = "";
Trond Myklebustf6de7a32013-09-04 10:08:54 -04002914bool recover_lost_locks = false;
Bryan Schumakerfac1e8e2012-07-30 16:05:22 -04002915
Trond Myklebust5405fc42016-08-29 20:03:52 -04002916EXPORT_SYMBOL_GPL(nfs_callback_nr_threads);
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002917EXPORT_SYMBOL_GPL(nfs_callback_set_tcpport);
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002918EXPORT_SYMBOL_GPL(nfs_idmap_cache_timeout);
2919EXPORT_SYMBOL_GPL(nfs4_disable_idmapping);
2920EXPORT_SYMBOL_GPL(max_session_slots);
Trond Myklebust5405fc42016-08-29 20:03:52 -04002921EXPORT_SYMBOL_GPL(max_session_cb_slots);
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002922EXPORT_SYMBOL_GPL(send_implementation_id);
Chuck Lever6f2ea7f2012-09-14 17:24:41 -04002923EXPORT_SYMBOL_GPL(nfs4_client_id_uniquifier);
Trond Myklebustf6de7a32013-09-04 10:08:54 -04002924EXPORT_SYMBOL_GPL(recover_lost_locks);
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002925
Bryan Schumakerfac1e8e2012-07-30 16:05:22 -04002926#define NFS_CALLBACK_MAXPORTNR (65535U)
2927
2928static int param_set_portnr(const char *val, const struct kernel_param *kp)
2929{
2930 unsigned long num;
2931 int ret;
2932
2933 if (!val)
2934 return -EINVAL;
Daniel Walter7297cb62012-09-26 21:51:46 +02002935 ret = kstrtoul(val, 0, &num);
Dan Carpenter379ebf02018-07-12 15:29:29 +03002936 if (ret || num > NFS_CALLBACK_MAXPORTNR)
Bryan Schumakerfac1e8e2012-07-30 16:05:22 -04002937 return -EINVAL;
2938 *((unsigned int *)kp->arg) = num;
2939 return 0;
2940}
Luis R. Rodriguez9c278472015-05-27 11:09:38 +09302941static const struct kernel_param_ops param_ops_portnr = {
Bryan Schumakerfac1e8e2012-07-30 16:05:22 -04002942 .set = param_set_portnr,
2943 .get = param_get_uint,
2944};
2945#define param_check_portnr(name, p) __param_check(name, p, unsigned int);
2946
2947module_param_named(callback_tcpport, nfs_callback_set_tcpport, portnr, 0644);
Trond Myklebust5405fc42016-08-29 20:03:52 -04002948module_param_named(callback_nr_threads, nfs_callback_nr_threads, ushort, 0644);
2949MODULE_PARM_DESC(callback_nr_threads, "Number of threads that will be "
2950 "assigned to the NFSv4 callback channels.");
Bryan Schumakerfac1e8e2012-07-30 16:05:22 -04002951module_param(nfs_idmap_cache_timeout, int, 0644);
2952module_param(nfs4_disable_idmapping, bool, 0644);
Chuck Lever6f2ea7f2012-09-14 17:24:41 -04002953module_param_string(nfs4_unique_id, nfs4_client_id_uniquifier,
2954 NFS4_CLIENT_ID_UNIQ_LEN, 0600);
Bryan Schumakerfac1e8e2012-07-30 16:05:22 -04002955MODULE_PARM_DESC(nfs4_disable_idmapping,
2956 "Turn off NFSv4 idmapping when using 'sec=sys'");
2957module_param(max_session_slots, ushort, 0644);
2958MODULE_PARM_DESC(max_session_slots, "Maximum number of outstanding NFSv4.1 "
2959 "requests the client will negotiate");
Trond Myklebust5405fc42016-08-29 20:03:52 -04002960module_param(max_session_cb_slots, ushort, 0644);
Wei Yongjunf36ab162016-10-28 14:37:02 +00002961MODULE_PARM_DESC(max_session_cb_slots, "Maximum number of parallel NFSv4.1 "
Trond Myklebust5405fc42016-08-29 20:03:52 -04002962 "callbacks the client will process for a given server");
Bryan Schumakerfac1e8e2012-07-30 16:05:22 -04002963module_param(send_implementation_id, ushort, 0644);
2964MODULE_PARM_DESC(send_implementation_id,
2965 "Send implementation ID with NFSv4.1 exchange_id");
Chuck Lever6f2ea7f2012-09-14 17:24:41 -04002966MODULE_PARM_DESC(nfs4_unique_id, "nfs_client_id4 uniquifier string");
bjschuma@gmail.com425e7762012-08-08 13:57:10 -04002967
Trond Myklebustf6de7a32013-09-04 10:08:54 -04002968module_param(recover_lost_locks, bool, 0644);
2969MODULE_PARM_DESC(recover_lost_locks,
2970 "If the server reports that a lock might be lost, "
2971 "try to recover it risking data corruption.");
2972
2973
David Howells54ceac42006-08-22 20:06:13 -04002974#endif /* CONFIG_NFS_V4 */