blob: 2137e0202f2560d39dc383a01ecf33fcfcf4958d [file] [log] [blame]
David Howellsf7b422b2006-06-09 09:34:33 -04001/*
2 * linux/fs/nfs/super.c
3 *
4 * Copyright (C) 1992 Rick Sladkey
5 *
6 * nfs superblock handling functions
7 *
Alan Cox526719b2008-10-27 15:19:48 +00008 * Modularised by Alan Cox <alan@lxorguk.ukuu.org.uk>, while hacking some
David Howellsf7b422b2006-06-09 09:34:33 -04009 * experimental NFS changes. Modularisation taken straight from SYS5 fs.
10 *
11 * Change to nfs_read_super() to permit NFS mounts to multi-homed hosts.
12 * J.S.Peatfield@damtp.cam.ac.uk
13 *
14 * Split from inode.c by David Howells <dhowells@redhat.com>
15 *
David Howells54ceac42006-08-22 20:06:13 -040016 * - superblocks are indexed on server only - all inodes, dentries, etc. associated with a
17 * particular server are held in the same superblock
18 * - NFS superblocks can have several effective roots to the dentry tree
19 * - directory type roots are spliced into the tree when a path from one root reaches the root
20 * of another (see nfs_lookup())
David Howellsf7b422b2006-06-09 09:34:33 -040021 */
22
David Howellsf7b422b2006-06-09 09:34:33 -040023#include <linux/module.h>
24#include <linux/init.h>
25
26#include <linux/time.h>
27#include <linux/kernel.h>
28#include <linux/mm.h>
29#include <linux/string.h>
30#include <linux/stat.h>
31#include <linux/errno.h>
32#include <linux/unistd.h>
33#include <linux/sunrpc/clnt.h>
Jeff Layton59766872013-02-04 12:50:00 -050034#include <linux/sunrpc/addr.h>
David Howellsf7b422b2006-06-09 09:34:33 -040035#include <linux/sunrpc/stats.h>
36#include <linux/sunrpc/metrics.h>
\"Talpey, Thomas\0896a722007-09-10 13:48:23 -040037#include <linux/sunrpc/xprtsock.h>
\"Talpey, Thomas\2cf7ff72007-09-10 13:49:41 -040038#include <linux/sunrpc/xprtrdma.h>
David Howellsf7b422b2006-06-09 09:34:33 -040039#include <linux/nfs_fs.h>
40#include <linux/nfs_mount.h>
41#include <linux/nfs4_mount.h>
42#include <linux/lockd/bind.h>
David Howellsf7b422b2006-06-09 09:34:33 -040043#include <linux/seq_file.h>
44#include <linux/mount.h>
Trond Myklebustc02d7ad2009-06-22 15:09:14 -040045#include <linux/namei.h>
David Howellsf7b422b2006-06-09 09:34:33 -040046#include <linux/vfs.h>
47#include <linux/inet.h>
Chuck Leverfd00a8f2007-12-10 14:57:38 -050048#include <linux/in6.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090049#include <linux/slab.h>
Chuck Leverfd00a8f2007-12-10 14:57:38 -050050#include <net/ipv6.h>
Chuck Leverd8e77482008-06-23 12:37:01 -040051#include <linux/netdevice.h>
David Howellsf7b422b2006-06-09 09:34:33 -040052#include <linux/nfs_xdr.h>
Adrian Bunkb5d5dfb2007-02-12 00:53:40 -080053#include <linux/magic.h>
Chuck Leverbf0fd762007-07-01 12:13:44 -040054#include <linux/parser.h>
Stanislav Kinsburskye50a7a12012-01-10 16:12:46 +040055#include <linux/nsproxy.h>
Trond Myklebust2446ab62012-03-01 17:00:56 -050056#include <linux/rcupdate.h>
David Howellsf7b422b2006-06-09 09:34:33 -040057
David Howellsf7b422b2006-06-09 09:34:33 -040058#include <asm/uaccess.h>
59
60#include "nfs4_fs.h"
61#include "callback.h"
62#include "delegation.h"
63#include "iostat.h"
64#include "internal.h"
David Howells08734042009-04-03 16:42:42 +010065#include "fscache.h"
Trond Myklebust76e697b2012-11-26 14:20:49 -050066#include "nfs4session.h"
J. Bruce Fieldsae50c0b2011-05-22 19:48:21 +030067#include "pnfs.h"
Bryan Schumakerab7017a2012-07-30 16:05:16 -040068#include "nfs.h"
David Howellsf7b422b2006-06-09 09:34:33 -040069
70#define NFSDBG_FACILITY NFSDBG_VFS
Bryan Schumakerb72e4f42012-05-10 15:07:40 -040071#define NFS_TEXT_DATA 1
David Howellsf7b422b2006-06-09 09:34:33 -040072
Bryan Schumaker1c606fb2012-07-30 16:05:24 -040073#if IS_ENABLED(CONFIG_NFS_V3)
Paulius Zaleckas1e657bd2010-10-31 18:21:05 +020074#define NFS_DEFAULT_VERSION 3
75#else
76#define NFS_DEFAULT_VERSION 2
77#endif
78
Chuck Leverbf0fd762007-07-01 12:13:44 -040079enum {
80 /* Mount options that take no arguments */
81 Opt_soft, Opt_hard,
Chuck Leverbf0fd762007-07-01 12:13:44 -040082 Opt_posix, Opt_noposix,
83 Opt_cto, Opt_nocto,
84 Opt_ac, Opt_noac,
85 Opt_lock, Opt_nolock,
\"Talpey, Thomas\2cf7ff72007-09-10 13:49:41 -040086 Opt_udp, Opt_tcp, Opt_rdma,
Chuck Leverbf0fd762007-07-01 12:13:44 -040087 Opt_acl, Opt_noacl,
88 Opt_rdirplus, Opt_nordirplus,
Trond Myklebust75180df2007-05-16 16:53:28 -040089 Opt_sharecache, Opt_nosharecache,
Chuck Leverd7403512008-12-23 15:21:37 -050090 Opt_resvport, Opt_noresvport,
David Howellsb797cac2009-04-03 16:42:48 +010091 Opt_fscache, Opt_nofscache,
Chuck Lever89652612012-09-14 17:24:11 -040092 Opt_migration, Opt_nomigration,
Chuck Leverbf0fd762007-07-01 12:13:44 -040093
94 /* Mount options that take integer arguments */
95 Opt_port,
96 Opt_rsize, Opt_wsize, Opt_bsize,
97 Opt_timeo, Opt_retrans,
98 Opt_acregmin, Opt_acregmax,
99 Opt_acdirmin, Opt_acdirmax,
100 Opt_actimeo,
101 Opt_namelen,
102 Opt_mountport,
Chuck Levere887cbc2007-10-26 13:32:29 -0400103 Opt_mountvers,
Mike Sager3fd5be92009-04-01 09:21:48 -0400104 Opt_minorversion,
Chuck Leverbf0fd762007-07-01 12:13:44 -0400105
106 /* Mount options that take string arguments */
Trond Myklebust0d71b052012-03-02 13:59:49 -0500107 Opt_nfsvers,
Chuck Lever33832032007-12-10 14:59:13 -0500108 Opt_sec, Opt_proto, Opt_mountproto, Opt_mounthost,
Chuck Lever0ac83772007-09-11 18:01:04 -0400109 Opt_addr, Opt_mountaddr, Opt_clientaddr,
Trond Myklebust7973c1f12008-07-15 17:58:14 -0400110 Opt_lookupcache,
David Howellsb797cac2009-04-03 16:42:48 +0100111 Opt_fscache_uniq,
Suresh Jayaraman5eebde22010-09-23 08:55:58 -0400112 Opt_local_lock,
Chuck Leverbf0fd762007-07-01 12:13:44 -0400113
Chuck Leverf45663c2008-06-24 19:28:02 -0400114 /* Special mount options */
115 Opt_userspace, Opt_deprecated, Opt_sloppy,
Chuck Leverbf0fd762007-07-01 12:13:44 -0400116
117 Opt_err
118};
119
Steven Whitehousea447c092008-10-13 10:46:57 +0100120static const match_table_t nfs_mount_option_tokens = {
Chuck Leverbf0fd762007-07-01 12:13:44 -0400121 { Opt_userspace, "bg" },
122 { Opt_userspace, "fg" },
Chuck Leverecbb3842008-06-12 12:37:33 -0400123 { Opt_userspace, "retry=%s" },
124
Chuck Leverf45663c2008-06-24 19:28:02 -0400125 { Opt_sloppy, "sloppy" },
126
Chuck Leverbf0fd762007-07-01 12:13:44 -0400127 { Opt_soft, "soft" },
128 { Opt_hard, "hard" },
Chuck Leverd33e4df2008-06-12 12:37:41 -0400129 { Opt_deprecated, "intr" },
130 { Opt_deprecated, "nointr" },
Chuck Leverbf0fd762007-07-01 12:13:44 -0400131 { Opt_posix, "posix" },
132 { Opt_noposix, "noposix" },
133 { Opt_cto, "cto" },
134 { Opt_nocto, "nocto" },
135 { Opt_ac, "ac" },
136 { Opt_noac, "noac" },
137 { Opt_lock, "lock" },
138 { Opt_nolock, "nolock" },
Chuck Leverbf0fd762007-07-01 12:13:44 -0400139 { Opt_udp, "udp" },
140 { Opt_tcp, "tcp" },
\"Talpey, Thomas\2cf7ff72007-09-10 13:49:41 -0400141 { Opt_rdma, "rdma" },
Chuck Leverbf0fd762007-07-01 12:13:44 -0400142 { Opt_acl, "acl" },
143 { Opt_noacl, "noacl" },
144 { Opt_rdirplus, "rdirplus" },
145 { Opt_nordirplus, "nordirplus" },
Trond Myklebust75180df2007-05-16 16:53:28 -0400146 { Opt_sharecache, "sharecache" },
147 { Opt_nosharecache, "nosharecache" },
Chuck Leverd7403512008-12-23 15:21:37 -0500148 { Opt_resvport, "resvport" },
149 { Opt_noresvport, "noresvport" },
David Howellsb797cac2009-04-03 16:42:48 +0100150 { Opt_fscache, "fsc" },
David Howellsb797cac2009-04-03 16:42:48 +0100151 { Opt_nofscache, "nofsc" },
Chuck Lever89652612012-09-14 17:24:11 -0400152 { Opt_migration, "migration" },
153 { Opt_nomigration, "nomigration" },
Chuck Leverbf0fd762007-07-01 12:13:44 -0400154
Chuck Levera5a16ba2009-06-17 18:02:14 -0700155 { Opt_port, "port=%s" },
156 { Opt_rsize, "rsize=%s" },
157 { Opt_wsize, "wsize=%s" },
158 { Opt_bsize, "bsize=%s" },
159 { Opt_timeo, "timeo=%s" },
160 { Opt_retrans, "retrans=%s" },
161 { Opt_acregmin, "acregmin=%s" },
162 { Opt_acregmax, "acregmax=%s" },
163 { Opt_acdirmin, "acdirmin=%s" },
164 { Opt_acdirmax, "acdirmax=%s" },
165 { Opt_actimeo, "actimeo=%s" },
166 { Opt_namelen, "namlen=%s" },
167 { Opt_mountport, "mountport=%s" },
168 { Opt_mountvers, "mountvers=%s" },
Trond Myklebust0d71b052012-03-02 13:59:49 -0500169 { Opt_minorversion, "minorversion=%s" },
170
Chuck Levera5a16ba2009-06-17 18:02:14 -0700171 { Opt_nfsvers, "nfsvers=%s" },
172 { Opt_nfsvers, "vers=%s" },
Chuck Leverbf0fd762007-07-01 12:13:44 -0400173
174 { Opt_sec, "sec=%s" },
175 { Opt_proto, "proto=%s" },
176 { Opt_mountproto, "mountproto=%s" },
177 { Opt_addr, "addr=%s" },
178 { Opt_clientaddr, "clientaddr=%s" },
Chuck Lever33832032007-12-10 14:59:13 -0500179 { Opt_mounthost, "mounthost=%s" },
Chuck Lever0ac83772007-09-11 18:01:04 -0400180 { Opt_mountaddr, "mountaddr=%s" },
Chuck Leverbf0fd762007-07-01 12:13:44 -0400181
Trond Myklebust7973c1f12008-07-15 17:58:14 -0400182 { Opt_lookupcache, "lookupcache=%s" },
Chuck Levera6d5ff62010-05-07 13:33:58 -0400183 { Opt_fscache_uniq, "fsc=%s" },
Suresh Jayaraman5eebde22010-09-23 08:55:58 -0400184 { Opt_local_lock, "local_lock=%s" },
Trond Myklebust7973c1f12008-07-15 17:58:14 -0400185
Trond Myklebust38622792012-03-02 14:06:39 -0500186 /* The following needs to be listed after all other options */
187 { Opt_nfsvers, "v%s" },
188
Chuck Leverbf0fd762007-07-01 12:13:44 -0400189 { Opt_err, NULL }
190};
191
192enum {
Jeff Laytonee671b02009-12-03 15:58:56 -0500193 Opt_xprt_udp, Opt_xprt_udp6, Opt_xprt_tcp, Opt_xprt_tcp6, Opt_xprt_rdma,
Shirley Ma181342c2016-05-02 14:40:23 -0400194 Opt_xprt_rdma6,
Chuck Leverbf0fd762007-07-01 12:13:44 -0400195
196 Opt_xprt_err
197};
198
Steven Whitehousea447c092008-10-13 10:46:57 +0100199static const match_table_t nfs_xprt_protocol_tokens = {
Chuck Leverbf0fd762007-07-01 12:13:44 -0400200 { Opt_xprt_udp, "udp" },
Jeff Laytonee671b02009-12-03 15:58:56 -0500201 { Opt_xprt_udp6, "udp6" },
Chuck Leverbf0fd762007-07-01 12:13:44 -0400202 { Opt_xprt_tcp, "tcp" },
Jeff Laytonee671b02009-12-03 15:58:56 -0500203 { Opt_xprt_tcp6, "tcp6" },
\"Talpey, Thomas\2cf7ff72007-09-10 13:49:41 -0400204 { Opt_xprt_rdma, "rdma" },
Shirley Ma181342c2016-05-02 14:40:23 -0400205 { Opt_xprt_rdma6, "rdma6" },
Chuck Leverbf0fd762007-07-01 12:13:44 -0400206
207 { Opt_xprt_err, NULL }
208};
209
210enum {
211 Opt_sec_none, Opt_sec_sys,
212 Opt_sec_krb5, Opt_sec_krb5i, Opt_sec_krb5p,
213 Opt_sec_lkey, Opt_sec_lkeyi, Opt_sec_lkeyp,
214 Opt_sec_spkm, Opt_sec_spkmi, Opt_sec_spkmp,
215
216 Opt_sec_err
217};
218
Steven Whitehousea447c092008-10-13 10:46:57 +0100219static const match_table_t nfs_secflavor_tokens = {
Chuck Leverbf0fd762007-07-01 12:13:44 -0400220 { Opt_sec_none, "none" },
221 { Opt_sec_none, "null" },
222 { Opt_sec_sys, "sys" },
223
224 { Opt_sec_krb5, "krb5" },
225 { Opt_sec_krb5i, "krb5i" },
226 { Opt_sec_krb5p, "krb5p" },
227
228 { Opt_sec_lkey, "lkey" },
229 { Opt_sec_lkeyi, "lkeyi" },
230 { Opt_sec_lkeyp, "lkeyp" },
231
Olga Kornievskaia8d042212008-02-13 16:47:06 -0500232 { Opt_sec_spkm, "spkm3" },
233 { Opt_sec_spkmi, "spkm3i" },
234 { Opt_sec_spkmp, "spkm3p" },
235
Chuck Leverbf0fd762007-07-01 12:13:44 -0400236 { Opt_sec_err, NULL }
237};
238
Trond Myklebust7973c1f12008-07-15 17:58:14 -0400239enum {
240 Opt_lookupcache_all, Opt_lookupcache_positive,
241 Opt_lookupcache_none,
242
243 Opt_lookupcache_err
244};
245
246static match_table_t nfs_lookupcache_tokens = {
247 { Opt_lookupcache_all, "all" },
248 { Opt_lookupcache_positive, "pos" },
249 { Opt_lookupcache_positive, "positive" },
250 { Opt_lookupcache_none, "none" },
251
252 { Opt_lookupcache_err, NULL }
253};
254
Suresh Jayaraman5eebde22010-09-23 08:55:58 -0400255enum {
256 Opt_local_lock_all, Opt_local_lock_flock, Opt_local_lock_posix,
257 Opt_local_lock_none,
258
259 Opt_local_lock_err
260};
261
262static match_table_t nfs_local_lock_tokens = {
263 { Opt_local_lock_all, "all" },
264 { Opt_local_lock_flock, "flock" },
265 { Opt_local_lock_posix, "posix" },
266 { Opt_local_lock_none, "none" },
267
268 { Opt_local_lock_err, NULL }
269};
270
Trond Myklebust0d71b052012-03-02 13:59:49 -0500271enum {
272 Opt_vers_2, Opt_vers_3, Opt_vers_4, Opt_vers_4_0,
Steve Dickson42c2c422013-05-22 12:50:38 -0400273 Opt_vers_4_1, Opt_vers_4_2,
Trond Myklebust0d71b052012-03-02 13:59:49 -0500274
275 Opt_vers_err
276};
277
278static match_table_t nfs_vers_tokens = {
279 { Opt_vers_2, "2" },
280 { Opt_vers_3, "3" },
281 { Opt_vers_4, "4" },
282 { Opt_vers_4_0, "4.0" },
283 { Opt_vers_4_1, "4.1" },
Steve Dickson42c2c422013-05-22 12:50:38 -0400284 { Opt_vers_4_2, "4.2" },
Trond Myklebust0d71b052012-03-02 13:59:49 -0500285
286 { Opt_vers_err, NULL }
287};
Chuck Leverbf0fd762007-07-01 12:13:44 -0400288
Al Viro31f43472010-10-29 03:38:12 -0400289static struct dentry *nfs_xdev_mount(struct file_system_type *fs_type,
290 int flags, const char *dev_name, void *raw_data);
David Howellsf7b422b2006-06-09 09:34:33 -0400291
Bryan Schumakerab7017a2012-07-30 16:05:16 -0400292struct file_system_type nfs_fs_type = {
David Howellsf7b422b2006-06-09 09:34:33 -0400293 .owner = THIS_MODULE,
294 .name = "nfs",
Al Viro01194982011-03-16 07:25:36 -0400295 .mount = nfs_fs_mount,
David Howellsf7b422b2006-06-09 09:34:33 -0400296 .kill_sb = nfs_kill_super,
Jeff Laytonecf3d1f2013-02-20 11:19:05 -0500297 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
David Howellsf7b422b2006-06-09 09:34:33 -0400298};
Eric W. Biederman7f78e032013-03-02 19:39:14 -0800299MODULE_ALIAS_FS("nfs");
Bryan Schumakerddda8e02012-07-30 16:05:23 -0400300EXPORT_SYMBOL_GPL(nfs_fs_type);
David Howellsf7b422b2006-06-09 09:34:33 -0400301
David Howells54ceac42006-08-22 20:06:13 -0400302struct file_system_type nfs_xdev_fs_type = {
David Howellsf7b422b2006-06-09 09:34:33 -0400303 .owner = THIS_MODULE,
304 .name = "nfs",
Al Viro31f43472010-10-29 03:38:12 -0400305 .mount = nfs_xdev_mount,
David Howellsf7b422b2006-06-09 09:34:33 -0400306 .kill_sb = nfs_kill_super,
Jeff Laytonecf3d1f2013-02-20 11:19:05 -0500307 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
David Howellsf7b422b2006-06-09 09:34:33 -0400308};
309
Bryan Schumaker6a744902012-07-30 16:05:20 -0400310const struct super_operations nfs_sops = {
David Howellsf7b422b2006-06-09 09:34:33 -0400311 .alloc_inode = nfs_alloc_inode,
312 .destroy_inode = nfs_destroy_inode,
313 .write_inode = nfs_write_inode,
Trond Myklebusteed99352012-12-14 14:36:36 -0500314 .drop_inode = nfs_drop_inode,
David Howellsf7b422b2006-06-09 09:34:33 -0400315 .statfs = nfs_statfs,
Al Virob57922d2010-06-07 14:34:48 -0400316 .evict_inode = nfs_evict_inode,
David Howellsf7b422b2006-06-09 09:34:33 -0400317 .umount_begin = nfs_umount_begin,
318 .show_options = nfs_show_options,
Al Viroc7f404b2011-03-16 06:59:40 -0400319 .show_devname = nfs_show_devname,
320 .show_path = nfs_show_path,
David Howellsf7b422b2006-06-09 09:34:33 -0400321 .show_stats = nfs_show_stats,
Jeff Layton48b605f2008-06-10 15:38:39 -0400322 .remount_fs = nfs_remount,
David Howellsf7b422b2006-06-09 09:34:33 -0400323};
Bryan Schumakerddda8e02012-07-30 16:05:23 -0400324EXPORT_SYMBOL_GPL(nfs_sops);
David Howellsf7b422b2006-06-09 09:34:33 -0400325
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400326#if IS_ENABLED(CONFIG_NFS_V4)
Bryan Schumakerb72e4f42012-05-10 15:07:40 -0400327static void nfs4_validate_mount_flags(struct nfs_parsed_mount_data *);
Bryan Schumakerd72c7272012-05-10 15:07:41 -0400328static int nfs4_validate_mount_data(void *options,
329 struct nfs_parsed_mount_data *args, const char *dev_name);
bjschuma@gmail.com1ae811e2012-08-08 13:57:06 -0400330
331struct file_system_type nfs4_fs_type = {
332 .owner = THIS_MODULE,
333 .name = "nfs4",
334 .mount = nfs_fs_mount,
335 .kill_sb = nfs_kill_super,
Jeff Laytonecf3d1f2013-02-20 11:19:05 -0500336 .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA,
bjschuma@gmail.com1ae811e2012-08-08 13:57:06 -0400337};
Eric W. Biederman7f78e032013-03-02 19:39:14 -0800338MODULE_ALIAS_FS("nfs4");
Eric W. Biedermanfa7614dd2013-03-12 18:27:41 -0700339MODULE_ALIAS("nfs4");
bjschuma@gmail.com1ae811e2012-08-08 13:57:06 -0400340EXPORT_SYMBOL_GPL(nfs4_fs_type);
341
342static int __init register_nfs4_fs(void)
343{
344 return register_filesystem(&nfs4_fs_type);
345}
346
347static void unregister_nfs4_fs(void)
348{
349 unregister_filesystem(&nfs4_fs_type);
350}
351#else
352static int __init register_nfs4_fs(void)
353{
354 return 0;
355}
356
357static void unregister_nfs4_fs(void)
358{
359}
David Howellsf7b422b2006-06-09 09:34:33 -0400360#endif
361
Rusty Russell8e1f9362007-07-17 04:03:17 -0700362static struct shrinker acl_shrinker = {
Dave Chinner1ab6c492013-08-28 10:18:09 +1000363 .count_objects = nfs_access_cache_count,
364 .scan_objects = nfs_access_cache_scan,
Rusty Russell8e1f9362007-07-17 04:03:17 -0700365 .seeks = DEFAULT_SEEKS,
366};
Trond Myklebust979df722006-07-25 11:28:19 -0400367
David Howellsf7b422b2006-06-09 09:34:33 -0400368/*
369 * Register the NFS filesystems
370 */
371int __init register_nfs_fs(void)
372{
373 int ret;
374
375 ret = register_filesystem(&nfs_fs_type);
376 if (ret < 0)
377 goto error_0;
378
bjschuma@gmail.com1ae811e2012-08-08 13:57:06 -0400379 ret = register_nfs4_fs();
David Howellsf7b422b2006-06-09 09:34:33 -0400380 if (ret < 0)
381 goto error_1;
bjschuma@gmail.com1ae811e2012-08-08 13:57:06 -0400382
383 ret = nfs_register_sysctl();
384 if (ret < 0)
385 goto error_2;
Kinglong Mee5ef8d792015-07-30 21:41:08 +0800386 ret = register_shrinker(&acl_shrinker);
387 if (ret < 0)
388 goto error_3;
David Howellsf7b422b2006-06-09 09:34:33 -0400389 return 0;
Kinglong Mee5ef8d792015-07-30 21:41:08 +0800390error_3:
391 nfs_unregister_sysctl();
bjschuma@gmail.com1ae811e2012-08-08 13:57:06 -0400392error_2:
393 unregister_nfs4_fs();
David Howellsf7b422b2006-06-09 09:34:33 -0400394error_1:
395 unregister_filesystem(&nfs_fs_type);
David Howellsf7b422b2006-06-09 09:34:33 -0400396error_0:
397 return ret;
398}
399
400/*
401 * Unregister the NFS filesystems
402 */
403void __exit unregister_nfs_fs(void)
404{
Rusty Russell8e1f9362007-07-17 04:03:17 -0700405 unregister_shrinker(&acl_shrinker);
Alexey Dobriyan49af7ee2007-09-18 22:46:40 -0700406 nfs_unregister_sysctl();
bjschuma@gmail.com1ae811e2012-08-08 13:57:06 -0400407 unregister_nfs4_fs();
David Howellsf7b422b2006-06-09 09:34:33 -0400408 unregister_filesystem(&nfs_fs_type);
409}
410
Trond Myklebustea7c38f2015-02-05 15:13:24 -0500411bool nfs_sb_active(struct super_block *sb)
Steve Dicksonef818a22007-11-08 04:05:04 -0500412{
413 struct nfs_server *server = NFS_SB(sb);
Trond Myklebust1daef0a2008-07-27 18:19:01 -0400414
Trond Myklebustea7c38f2015-02-05 15:13:24 -0500415 if (!atomic_inc_not_zero(&sb->s_active))
416 return false;
417 if (atomic_inc_return(&server->active) != 1)
418 atomic_dec(&sb->s_active);
419 return true;
Trond Myklebust1daef0a2008-07-27 18:19:01 -0400420}
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400421EXPORT_SYMBOL_GPL(nfs_sb_active);
Trond Myklebust1daef0a2008-07-27 18:19:01 -0400422
423void nfs_sb_deactive(struct super_block *sb)
424{
425 struct nfs_server *server = NFS_SB(sb);
426
427 if (atomic_dec_and_test(&server->active))
428 deactivate_super(sb);
Steve Dicksonef818a22007-11-08 04:05:04 -0500429}
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400430EXPORT_SYMBOL_GPL(nfs_sb_deactive);
Steve Dicksonef818a22007-11-08 04:05:04 -0500431
David Howellsf7b422b2006-06-09 09:34:33 -0400432/*
433 * Deliver file system statistics to userspace
434 */
Bryan Schumakerfbdefd62012-07-16 16:39:20 -0400435int nfs_statfs(struct dentry *dentry, struct kstatfs *buf)
David Howellsf7b422b2006-06-09 09:34:33 -0400436{
David Howells0c7d90c2006-08-22 20:06:10 -0400437 struct nfs_server *server = NFS_SB(dentry->d_sb);
David Howellsf7b422b2006-06-09 09:34:33 -0400438 unsigned char blockbits;
439 unsigned long blockres;
David Howells2b0143b2015-03-17 22:25:59 +0000440 struct nfs_fh *fh = NFS_FH(d_inode(dentry));
Trond Myklebustca7e9a02010-04-16 16:22:52 -0400441 struct nfs_fsstat res;
442 int error = -ENOMEM;
443
444 res.fattr = nfs_alloc_fattr();
445 if (res.fattr == NULL)
446 goto out_err;
David Howellsf7b422b2006-06-09 09:34:33 -0400447
David Howells8fa5c002006-08-22 20:06:12 -0400448 error = server->nfs_client->rpc_ops->statfs(server, fh, &res);
Menyhart Zoltanfbf3fdd2010-09-12 19:55:26 -0400449 if (unlikely(error == -ESTALE)) {
450 struct dentry *pd_dentry;
Trond Myklebustca7e9a02010-04-16 16:22:52 -0400451
Menyhart Zoltanfbf3fdd2010-09-12 19:55:26 -0400452 pd_dentry = dget_parent(dentry);
453 if (pd_dentry != NULL) {
David Howells2b0143b2015-03-17 22:25:59 +0000454 nfs_zap_caches(d_inode(pd_dentry));
Menyhart Zoltanfbf3fdd2010-09-12 19:55:26 -0400455 dput(pd_dentry);
456 }
457 }
Trond Myklebustca7e9a02010-04-16 16:22:52 -0400458 nfs_free_fattr(res.fattr);
David Howellsf7b422b2006-06-09 09:34:33 -0400459 if (error < 0)
460 goto out_err;
Trond Myklebustca7e9a02010-04-16 16:22:52 -0400461
Amnon Aaronsohn1a0ba9a2007-04-09 22:05:26 -0700462 buf->f_type = NFS_SUPER_MAGIC;
David Howellsf7b422b2006-06-09 09:34:33 -0400463
464 /*
465 * Current versions of glibc do not correctly handle the
466 * case where f_frsize != f_bsize. Eventually we want to
467 * report the value of wtmult in this field.
468 */
David Howells0c7d90c2006-08-22 20:06:10 -0400469 buf->f_frsize = dentry->d_sb->s_blocksize;
David Howellsf7b422b2006-06-09 09:34:33 -0400470
471 /*
472 * On most *nix systems, f_blocks, f_bfree, and f_bavail
473 * are reported in units of f_frsize. Linux hasn't had
474 * an f_frsize field in its statfs struct until recently,
475 * thus historically Linux's sys_statfs reports these
476 * fields in units of f_bsize.
477 */
David Howells0c7d90c2006-08-22 20:06:10 -0400478 buf->f_bsize = dentry->d_sb->s_blocksize;
479 blockbits = dentry->d_sb->s_blocksize_bits;
David Howellsf7b422b2006-06-09 09:34:33 -0400480 blockres = (1 << blockbits) - 1;
481 buf->f_blocks = (res.tbytes + blockres) >> blockbits;
482 buf->f_bfree = (res.fbytes + blockres) >> blockbits;
483 buf->f_bavail = (res.abytes + blockres) >> blockbits;
484
485 buf->f_files = res.tfiles;
486 buf->f_ffree = res.afiles;
487
488 buf->f_namelen = server->namelen;
Amnon Aaronsohn1a0ba9a2007-04-09 22:05:26 -0700489
David Howellsf7b422b2006-06-09 09:34:33 -0400490 return 0;
491
492 out_err:
Harvey Harrison3110ff82008-05-02 13:42:44 -0700493 dprintk("%s: statfs error = %d\n", __func__, -error);
Amnon Aaronsohn1a0ba9a2007-04-09 22:05:26 -0700494 return error;
David Howellsf7b422b2006-06-09 09:34:33 -0400495}
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400496EXPORT_SYMBOL_GPL(nfs_statfs);
David Howellsf7b422b2006-06-09 09:34:33 -0400497
David Howells7d4e2742006-08-22 20:06:07 -0400498/*
499 * Map the security flavour number to a name
500 */
Trond Myklebust81039f12006-06-09 09:34:34 -0400501static const char *nfs_pseudoflavour_to_name(rpc_authflavor_t flavour)
502{
David Howells7d4e2742006-08-22 20:06:07 -0400503 static const struct {
Trond Myklebust81039f12006-06-09 09:34:34 -0400504 rpc_authflavor_t flavour;
505 const char *str;
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -0400506 } sec_flavours[NFS_AUTH_INFO_MAX_FLAVORS] = {
507 /* update NFS_AUTH_INFO_MAX_FLAVORS when this list changes! */
Trond Myklebust81039f12006-06-09 09:34:34 -0400508 { RPC_AUTH_NULL, "null" },
509 { RPC_AUTH_UNIX, "sys" },
510 { RPC_AUTH_GSS_KRB5, "krb5" },
511 { RPC_AUTH_GSS_KRB5I, "krb5i" },
512 { RPC_AUTH_GSS_KRB5P, "krb5p" },
513 { RPC_AUTH_GSS_LKEY, "lkey" },
514 { RPC_AUTH_GSS_LKEYI, "lkeyi" },
515 { RPC_AUTH_GSS_LKEYP, "lkeyp" },
516 { RPC_AUTH_GSS_SPKM, "spkm" },
517 { RPC_AUTH_GSS_SPKMI, "spkmi" },
518 { RPC_AUTH_GSS_SPKMP, "spkmp" },
Chuck Lever4d81cd12007-07-01 12:12:40 -0400519 { UINT_MAX, "unknown" }
Trond Myklebust81039f12006-06-09 09:34:34 -0400520 };
521 int i;
522
Chuck Lever4d81cd12007-07-01 12:12:40 -0400523 for (i = 0; sec_flavours[i].flavour != UINT_MAX; i++) {
Trond Myklebust81039f12006-06-09 09:34:34 -0400524 if (sec_flavours[i].flavour == flavour)
525 break;
526 }
527 return sec_flavours[i].str;
528}
529
Jeff Laytonee671b02009-12-03 15:58:56 -0500530static void nfs_show_mountd_netid(struct seq_file *m, struct nfs_server *nfss,
531 int showdefaults)
532{
533 struct sockaddr *sap = (struct sockaddr *) &nfss->mountd_address;
534
535 seq_printf(m, ",mountproto=");
536 switch (sap->sa_family) {
537 case AF_INET:
538 switch (nfss->mountd_protocol) {
539 case IPPROTO_UDP:
540 seq_printf(m, RPCBIND_NETID_UDP);
541 break;
542 case IPPROTO_TCP:
543 seq_printf(m, RPCBIND_NETID_TCP);
544 break;
545 default:
546 if (showdefaults)
547 seq_printf(m, "auto");
548 }
549 break;
550 case AF_INET6:
551 switch (nfss->mountd_protocol) {
552 case IPPROTO_UDP:
553 seq_printf(m, RPCBIND_NETID_UDP6);
554 break;
555 case IPPROTO_TCP:
556 seq_printf(m, RPCBIND_NETID_TCP6);
557 break;
558 default:
559 if (showdefaults)
560 seq_printf(m, "auto");
561 }
562 break;
563 default:
564 if (showdefaults)
565 seq_printf(m, "auto");
566 }
567}
568
Chuck Lever82d101d2008-03-14 14:10:37 -0400569static void nfs_show_mountd_options(struct seq_file *m, struct nfs_server *nfss,
570 int showdefaults)
571{
572 struct sockaddr *sap = (struct sockaddr *)&nfss->mountd_address;
573
Bryan Schumakerd5eff1a2010-08-03 13:04:00 -0400574 if (nfss->flags & NFS_MOUNT_LEGACY_INTERFACE)
575 return;
576
Chuck Lever82d101d2008-03-14 14:10:37 -0400577 switch (sap->sa_family) {
578 case AF_INET: {
579 struct sockaddr_in *sin = (struct sockaddr_in *)sap;
Harvey Harrisonbe859402008-10-31 00:56:28 -0700580 seq_printf(m, ",mountaddr=%pI4", &sin->sin_addr.s_addr);
Chuck Lever82d101d2008-03-14 14:10:37 -0400581 break;
582 }
583 case AF_INET6: {
584 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap;
Chuck Leverd250e192009-12-03 15:58:56 -0500585 seq_printf(m, ",mountaddr=%pI6c", &sin6->sin6_addr);
Chuck Lever82d101d2008-03-14 14:10:37 -0400586 break;
587 }
588 default:
589 if (showdefaults)
590 seq_printf(m, ",mountaddr=unspecified");
591 }
592
593 if (nfss->mountd_version || showdefaults)
594 seq_printf(m, ",mountvers=%u", nfss->mountd_version);
Stanislav Kinsburskyaa699472010-12-08 12:40:13 +0300595 if ((nfss->mountd_port &&
596 nfss->mountd_port != (unsigned short)NFS_UNSPEC_PORT) ||
597 showdefaults)
Chuck Lever82d101d2008-03-14 14:10:37 -0400598 seq_printf(m, ",mountport=%u", nfss->mountd_port);
599
Jeff Laytonee671b02009-12-03 15:58:56 -0500600 nfs_show_mountd_netid(m, nfss, showdefaults);
Chuck Lever82d101d2008-03-14 14:10:37 -0400601}
602
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400603#if IS_ENABLED(CONFIG_NFS_V4)
Trond Myklebust0be81892010-06-18 12:23:58 -0400604static void nfs_show_nfsv4_options(struct seq_file *m, struct nfs_server *nfss,
605 int showdefaults)
606{
607 struct nfs_client *clp = nfss->nfs_client;
608
609 seq_printf(m, ",clientaddr=%s", clp->cl_ipaddr);
Trond Myklebust0be81892010-06-18 12:23:58 -0400610}
611#else
612static void nfs_show_nfsv4_options(struct seq_file *m, struct nfs_server *nfss,
613 int showdefaults)
614{
615}
616#endif
617
Trond Myklebust7bbceb62012-03-02 14:00:20 -0500618static void nfs_show_nfs_version(struct seq_file *m,
619 unsigned int version,
620 unsigned int minorversion)
621{
622 seq_printf(m, ",vers=%u", version);
623 if (version == 4)
624 seq_printf(m, ".%u", minorversion);
625}
626
David Howellsf7b422b2006-06-09 09:34:33 -0400627/*
628 * Describe the mount options in force on this server representation
629 */
Chuck Lever82d101d2008-03-14 14:10:37 -0400630static void nfs_show_mount_options(struct seq_file *m, struct nfs_server *nfss,
631 int showdefaults)
David Howellsf7b422b2006-06-09 09:34:33 -0400632{
David Howells509de812006-08-22 20:06:11 -0400633 static const struct proc_nfs_info {
David Howellsf7b422b2006-06-09 09:34:33 -0400634 int flag;
David Howells509de812006-08-22 20:06:11 -0400635 const char *str;
636 const char *nostr;
David Howellsf7b422b2006-06-09 09:34:33 -0400637 } nfs_info[] = {
638 { NFS_MOUNT_SOFT, ",soft", ",hard" },
Chuck Lever82d101d2008-03-14 14:10:37 -0400639 { NFS_MOUNT_POSIX, ",posix", "" },
David Howellsf7b422b2006-06-09 09:34:33 -0400640 { NFS_MOUNT_NOCTO, ",nocto", "" },
641 { NFS_MOUNT_NOAC, ",noac", "" },
642 { NFS_MOUNT_NONLM, ",nolock", "" },
643 { NFS_MOUNT_NOACL, ",noacl", "" },
Steve Dickson74dd34e2007-04-14 17:01:15 -0400644 { NFS_MOUNT_NORDIRPLUS, ",nordirplus", "" },
Chuck Leverd7403512008-12-23 15:21:37 -0500645 { NFS_MOUNT_UNSHARED, ",nosharecache", "" },
646 { NFS_MOUNT_NORESVPORT, ",noresvport", "" },
David Howellsf7b422b2006-06-09 09:34:33 -0400647 { 0, NULL, NULL }
648 };
David Howells509de812006-08-22 20:06:11 -0400649 const struct proc_nfs_info *nfs_infop;
David Howells8fa5c002006-08-22 20:06:12 -0400650 struct nfs_client *clp = nfss->nfs_client;
Chuck Lever82d101d2008-03-14 14:10:37 -0400651 u32 version = clp->rpc_ops->version;
Suresh Jayaraman7c563cc2010-09-23 14:26:48 -0400652 int local_flock, local_fcntl;
David Howellsf7b422b2006-06-09 09:34:33 -0400653
Trond Myklebust7bbceb62012-03-02 14:00:20 -0500654 nfs_show_nfs_version(m, version, clp->cl_minorversion);
Chuck Lever2d767432008-03-14 14:10:08 -0400655 seq_printf(m, ",rsize=%u", nfss->rsize);
656 seq_printf(m, ",wsize=%u", nfss->wsize);
Chuck Lever82d101d2008-03-14 14:10:37 -0400657 if (nfss->bsize != 0)
658 seq_printf(m, ",bsize=%u", nfss->bsize);
659 seq_printf(m, ",namlen=%u", nfss->namelen);
Chuck Lever0e0cab72008-06-26 17:47:12 -0400660 if (nfss->acregmin != NFS_DEF_ACREGMIN*HZ || showdefaults)
Chuck Lever2d767432008-03-14 14:10:08 -0400661 seq_printf(m, ",acregmin=%u", nfss->acregmin/HZ);
Chuck Lever0e0cab72008-06-26 17:47:12 -0400662 if (nfss->acregmax != NFS_DEF_ACREGMAX*HZ || showdefaults)
Chuck Lever2d767432008-03-14 14:10:08 -0400663 seq_printf(m, ",acregmax=%u", nfss->acregmax/HZ);
Chuck Lever0e0cab72008-06-26 17:47:12 -0400664 if (nfss->acdirmin != NFS_DEF_ACDIRMIN*HZ || showdefaults)
Chuck Lever2d767432008-03-14 14:10:08 -0400665 seq_printf(m, ",acdirmin=%u", nfss->acdirmin/HZ);
Chuck Lever0e0cab72008-06-26 17:47:12 -0400666 if (nfss->acdirmax != NFS_DEF_ACDIRMAX*HZ || showdefaults)
Chuck Lever2d767432008-03-14 14:10:08 -0400667 seq_printf(m, ",acdirmax=%u", nfss->acdirmax/HZ);
David Howellsf7b422b2006-06-09 09:34:33 -0400668 for (nfs_infop = nfs_info; nfs_infop->flag; nfs_infop++) {
669 if (nfss->flags & nfs_infop->flag)
670 seq_puts(m, nfs_infop->str);
671 else
672 seq_puts(m, nfs_infop->nostr);
673 }
Trond Myklebust2446ab62012-03-01 17:00:56 -0500674 rcu_read_lock();
\"Talpey, Thomas\56928ed2007-09-10 13:48:47 -0400675 seq_printf(m, ",proto=%s",
Jeff Laytonee671b02009-12-03 15:58:56 -0500676 rpc_peeraddr2str(nfss->client, RPC_DISPLAY_NETID));
Trond Myklebust2446ab62012-03-01 17:00:56 -0500677 rcu_read_unlock();
Chuck Lever82d101d2008-03-14 14:10:37 -0400678 if (version == 4) {
679 if (nfss->port != NFS_PORT)
680 seq_printf(m, ",port=%u", nfss->port);
681 } else
682 if (nfss->port)
683 seq_printf(m, ",port=%u", nfss->port);
684
Trond Myklebust33170232007-12-20 16:03:59 -0500685 seq_printf(m, ",timeo=%lu", 10U * nfss->client->cl_timeout->to_initval / HZ);
686 seq_printf(m, ",retrans=%u", nfss->client->cl_timeout->to_retries);
Trond Myklebust81039f12006-06-09 09:34:34 -0400687 seq_printf(m, ",sec=%s", nfs_pseudoflavour_to_name(nfss->client->cl_auth->au_flavor));
Chuck Lever82d101d2008-03-14 14:10:37 -0400688
689 if (version != 4)
690 nfs_show_mountd_options(m, nfss, showdefaults);
Trond Myklebust0be81892010-06-18 12:23:58 -0400691 else
692 nfs_show_nfsv4_options(m, nfss, showdefaults);
Chuck Lever82d101d2008-03-14 14:10:37 -0400693
David Howellsb797cac2009-04-03 16:42:48 +0100694 if (nfss->options & NFS_OPTION_FSCACHE)
695 seq_printf(m, ",fsc");
Patrick J. LoPresti9b00c642010-08-10 17:28:01 -0400696
Chuck Lever89652612012-09-14 17:24:11 -0400697 if (nfss->options & NFS_OPTION_MIGRATION)
698 seq_printf(m, ",migration");
699
Patrick J. LoPresti9b00c642010-08-10 17:28:01 -0400700 if (nfss->flags & NFS_MOUNT_LOOKUP_CACHE_NONEG) {
701 if (nfss->flags & NFS_MOUNT_LOOKUP_CACHE_NONE)
702 seq_printf(m, ",lookupcache=none");
703 else
704 seq_printf(m, ",lookupcache=pos");
705 }
Suresh Jayaraman7c563cc2010-09-23 14:26:48 -0400706
707 local_flock = nfss->flags & NFS_MOUNT_LOCAL_FLOCK;
708 local_fcntl = nfss->flags & NFS_MOUNT_LOCAL_FCNTL;
709
710 if (!local_flock && !local_fcntl)
711 seq_printf(m, ",local_lock=none");
712 else if (local_flock && local_fcntl)
713 seq_printf(m, ",local_lock=all");
714 else if (local_flock)
715 seq_printf(m, ",local_lock=flock");
716 else
717 seq_printf(m, ",local_lock=posix");
David Howellsf7b422b2006-06-09 09:34:33 -0400718}
719
720/*
721 * Describe the mount options on this VFS mountpoint
722 */
Bryan Schumakerfbdefd62012-07-16 16:39:20 -0400723int nfs_show_options(struct seq_file *m, struct dentry *root)
David Howellsf7b422b2006-06-09 09:34:33 -0400724{
Al Viro34c80b12011-12-08 21:32:45 -0500725 struct nfs_server *nfss = NFS_SB(root->d_sb);
David Howellsf7b422b2006-06-09 09:34:33 -0400726
727 nfs_show_mount_options(m, nfss, 0);
728
Trond Myklebust2446ab62012-03-01 17:00:56 -0500729 rcu_read_lock();
Chuck Lever5d8515c2007-12-10 14:57:16 -0500730 seq_printf(m, ",addr=%s",
731 rpc_peeraddr2str(nfss->nfs_client->cl_rpcclient,
732 RPC_DISPLAY_ADDR));
Trond Myklebust2446ab62012-03-01 17:00:56 -0500733 rcu_read_unlock();
David Howellsf7b422b2006-06-09 09:34:33 -0400734
735 return 0;
736}
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400737EXPORT_SYMBOL_GPL(nfs_show_options);
H Hartley Sweeten45402c382011-09-02 14:39:12 -0700738
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400739#if IS_ENABLED(CONFIG_NFS_V4)
J. Bruce Fieldsae50c0b2011-05-22 19:48:21 +0300740#ifdef CONFIG_NFS_V4_1
H Hartley Sweeten45402c382011-09-02 14:39:12 -0700741static void show_sessions(struct seq_file *m, struct nfs_server *server)
J. Bruce Fieldsae50c0b2011-05-22 19:48:21 +0300742{
743 if (nfs4_has_session(server->nfs_client))
744 seq_printf(m, ",sessions");
745}
746#else
H Hartley Sweeten45402c382011-09-02 14:39:12 -0700747static void show_sessions(struct seq_file *m, struct nfs_server *server) {}
748#endif
J. Bruce Fieldsae50c0b2011-05-22 19:48:21 +0300749#endif
750
751#ifdef CONFIG_NFS_V4_1
H Hartley Sweeten45402c382011-09-02 14:39:12 -0700752static void show_pnfs(struct seq_file *m, struct nfs_server *server)
J. Bruce Fieldsae50c0b2011-05-22 19:48:21 +0300753{
754 seq_printf(m, ",pnfs=");
755 if (server->pnfs_curr_ld)
756 seq_printf(m, "%s", server->pnfs_curr_ld->name);
757 else
758 seq_printf(m, "not configured");
759}
Trond Myklebust7e03b7c2012-03-04 18:12:57 -0500760
761static void show_implementation_id(struct seq_file *m, struct nfs_server *nfss)
762{
Chuck Lever59155542012-05-21 22:44:41 -0400763 if (nfss->nfs_client && nfss->nfs_client->cl_implid) {
764 struct nfs41_impl_id *impl_id = nfss->nfs_client->cl_implid;
Trond Myklebust7e03b7c2012-03-04 18:12:57 -0500765 seq_printf(m, "\n\timpl_id:\tname='%s',domain='%s',"
766 "date='%llu,%u'",
767 impl_id->name, impl_id->domain,
768 impl_id->date.seconds, impl_id->date.nseconds);
769 }
770}
H Hartley Sweeten45402c382011-09-02 14:39:12 -0700771#else
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400772#if IS_ENABLED(CONFIG_NFS_V4)
Trond Myklebust7e03b7c2012-03-04 18:12:57 -0500773static void show_pnfs(struct seq_file *m, struct nfs_server *server)
774{
775}
H Hartley Sweeten45402c382011-09-02 14:39:12 -0700776#endif
Trond Myklebust7e03b7c2012-03-04 18:12:57 -0500777static void show_implementation_id(struct seq_file *m, struct nfs_server *nfss)
778{
779}
H Hartley Sweeten45402c382011-09-02 14:39:12 -0700780#endif
David Howellsf7b422b2006-06-09 09:34:33 -0400781
Bryan Schumakerfbdefd62012-07-16 16:39:20 -0400782int nfs_show_devname(struct seq_file *m, struct dentry *root)
Al Viroc7f404b2011-03-16 06:59:40 -0400783{
784 char *page = (char *) __get_free_page(GFP_KERNEL);
785 char *devname, *dummy;
786 int err = 0;
787 if (!page)
788 return -ENOMEM;
Ben Hutchings97a54862012-10-21 19:23:52 +0100789 devname = nfs_path(&dummy, root, page, PAGE_SIZE, 0);
Al Viroc7f404b2011-03-16 06:59:40 -0400790 if (IS_ERR(devname))
791 err = PTR_ERR(devname);
792 else
793 seq_escape(m, devname, " \t\n\\");
794 free_page((unsigned long)page);
795 return err;
796}
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400797EXPORT_SYMBOL_GPL(nfs_show_devname);
Al Viroc7f404b2011-03-16 06:59:40 -0400798
Bryan Schumakerfbdefd62012-07-16 16:39:20 -0400799int nfs_show_path(struct seq_file *m, struct dentry *dentry)
Al Viroc7f404b2011-03-16 06:59:40 -0400800{
801 seq_puts(m, "/");
802 return 0;
803}
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400804EXPORT_SYMBOL_GPL(nfs_show_path);
Al Viroc7f404b2011-03-16 06:59:40 -0400805
David Howellsf7b422b2006-06-09 09:34:33 -0400806/*
807 * Present statistical information for this VFS mountpoint
808 */
Bryan Schumakerfbdefd62012-07-16 16:39:20 -0400809int nfs_show_stats(struct seq_file *m, struct dentry *root)
David Howellsf7b422b2006-06-09 09:34:33 -0400810{
811 int i, cpu;
Al Viro64132372011-12-08 20:51:13 -0500812 struct nfs_server *nfss = NFS_SB(root->d_sb);
David Howellsf7b422b2006-06-09 09:34:33 -0400813 struct rpc_auth *auth = nfss->client->cl_auth;
814 struct nfs_iostats totals = { };
815
816 seq_printf(m, "statvers=%s", NFS_IOSTAT_VERS);
817
818 /*
819 * Display all mount option settings
820 */
821 seq_printf(m, "\n\topts:\t");
Al Viro64132372011-12-08 20:51:13 -0500822 seq_puts(m, root->d_sb->s_flags & MS_RDONLY ? "ro" : "rw");
823 seq_puts(m, root->d_sb->s_flags & MS_SYNCHRONOUS ? ",sync" : "");
824 seq_puts(m, root->d_sb->s_flags & MS_NOATIME ? ",noatime" : "");
825 seq_puts(m, root->d_sb->s_flags & MS_NODIRATIME ? ",nodiratime" : "");
David Howellsf7b422b2006-06-09 09:34:33 -0400826 nfs_show_mount_options(m, nfss, 1);
827
828 seq_printf(m, "\n\tage:\t%lu", (jiffies - nfss->mount_time) / HZ);
829
Trond Myklebust7e03b7c2012-03-04 18:12:57 -0500830 show_implementation_id(m, nfss);
Weston Andros Adamson7d2ed9a2012-02-17 15:20:26 -0500831
David Howellsf7b422b2006-06-09 09:34:33 -0400832 seq_printf(m, "\n\tcaps:\t");
833 seq_printf(m, "caps=0x%x", nfss->caps);
Chuck Lever2d767432008-03-14 14:10:08 -0400834 seq_printf(m, ",wtmult=%u", nfss->wtmult);
835 seq_printf(m, ",dtsize=%u", nfss->dtsize);
836 seq_printf(m, ",bsize=%u", nfss->bsize);
837 seq_printf(m, ",namlen=%u", nfss->namelen);
David Howellsf7b422b2006-06-09 09:34:33 -0400838
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400839#if IS_ENABLED(CONFIG_NFS_V4)
Trond Myklebust40c553192007-12-14 14:56:07 -0500840 if (nfss->nfs_client->rpc_ops->version == 4) {
David Howellsf7b422b2006-06-09 09:34:33 -0400841 seq_printf(m, "\n\tnfsv4:\t");
842 seq_printf(m, "bm0=0x%x", nfss->attr_bitmask[0]);
843 seq_printf(m, ",bm1=0x%x", nfss->attr_bitmask[1]);
David Quigleya09df2c2013-05-22 12:50:41 -0400844 seq_printf(m, ",bm2=0x%x", nfss->attr_bitmask[2]);
David Howellsf7b422b2006-06-09 09:34:33 -0400845 seq_printf(m, ",acl=0x%x", nfss->acl_bitmask);
J. Bruce Fieldsae50c0b2011-05-22 19:48:21 +0300846 show_sessions(m, nfss);
847 show_pnfs(m, nfss);
David Howellsf7b422b2006-06-09 09:34:33 -0400848 }
849#endif
850
851 /*
852 * Display security flavor in effect for this mount
853 */
Chuck Lever2d767432008-03-14 14:10:08 -0400854 seq_printf(m, "\n\tsec:\tflavor=%u", auth->au_ops->au_flavor);
David Howellsf7b422b2006-06-09 09:34:33 -0400855 if (auth->au_flavor)
Chuck Lever2d767432008-03-14 14:10:08 -0400856 seq_printf(m, ",pseudoflavor=%u", auth->au_flavor);
David Howellsf7b422b2006-06-09 09:34:33 -0400857
858 /*
859 * Display superblock I/O counters
860 */
861 for_each_possible_cpu(cpu) {
862 struct nfs_iostats *stats;
863
864 preempt_disable();
865 stats = per_cpu_ptr(nfss->io_stats, cpu);
866
867 for (i = 0; i < __NFSIOS_COUNTSMAX; i++)
868 totals.events[i] += stats->events[i];
869 for (i = 0; i < __NFSIOS_BYTESMAX; i++)
870 totals.bytes[i] += stats->bytes[i];
David Howells6a510912009-04-03 16:42:43 +0100871#ifdef CONFIG_NFS_FSCACHE
872 for (i = 0; i < __NFSIOS_FSCACHEMAX; i++)
873 totals.fscache[i] += stats->fscache[i];
874#endif
David Howellsf7b422b2006-06-09 09:34:33 -0400875
876 preempt_enable();
877 }
878
879 seq_printf(m, "\n\tevents:\t");
880 for (i = 0; i < __NFSIOS_COUNTSMAX; i++)
881 seq_printf(m, "%lu ", totals.events[i]);
882 seq_printf(m, "\n\tbytes:\t");
883 for (i = 0; i < __NFSIOS_BYTESMAX; i++)
884 seq_printf(m, "%Lu ", totals.bytes[i]);
David Howells6a510912009-04-03 16:42:43 +0100885#ifdef CONFIG_NFS_FSCACHE
886 if (nfss->options & NFS_OPTION_FSCACHE) {
887 seq_printf(m, "\n\tfsc:\t");
888 for (i = 0; i < __NFSIOS_FSCACHEMAX; i++)
889 seq_printf(m, "%Lu ", totals.bytes[i]);
890 }
891#endif
David Howellsf7b422b2006-06-09 09:34:33 -0400892 seq_printf(m, "\n");
893
894 rpc_print_iostats(m, nfss->client);
895
896 return 0;
897}
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400898EXPORT_SYMBOL_GPL(nfs_show_stats);
David Howellsf7b422b2006-06-09 09:34:33 -0400899
900/*
901 * Begin unmount by attempting to remove all automounted mountpoints we added
David Howells54ceac42006-08-22 20:06:13 -0400902 * in response to xdev traversals and referrals
David Howellsf7b422b2006-06-09 09:34:33 -0400903 */
Bryan Schumakerfbdefd62012-07-16 16:39:20 -0400904void nfs_umount_begin(struct super_block *sb)
David Howellsf7b422b2006-06-09 09:34:33 -0400905{
Alessio Igor Bogani67e55202009-04-24 09:06:53 +0200906 struct nfs_server *server;
Trond Myklebustfc6ae3c2007-06-05 19:13:47 -0400907 struct rpc_clnt *rpc;
908
Alessio Igor Bogani67e55202009-04-24 09:06:53 +0200909 server = NFS_SB(sb);
Trond Myklebustfc6ae3c2007-06-05 19:13:47 -0400910 /* -EIO all pending I/O */
911 rpc = server->client_acl;
912 if (!IS_ERR(rpc))
913 rpc_killall_tasks(rpc);
914 rpc = server->client;
915 if (!IS_ERR(rpc))
916 rpc_killall_tasks(rpc);
David Howellsf7b422b2006-06-09 09:34:33 -0400917}
Bryan Schumaker89d77c82012-07-30 16:05:25 -0400918EXPORT_SYMBOL_GPL(nfs_umount_begin);
David Howellsf7b422b2006-06-09 09:34:33 -0400919
Bryan Schumakerdb833352012-05-10 15:07:38 -0400920static struct nfs_parsed_mount_data *nfs_alloc_parsed_mount_data(void)
Chuck Lever9423a082009-09-23 14:36:38 -0400921{
922 struct nfs_parsed_mount_data *data;
923
924 data = kzalloc(sizeof(*data), GFP_KERNEL);
925 if (data) {
Chuck Lever9423a082009-09-23 14:36:38 -0400926 data->acregmin = NFS_DEF_ACREGMIN;
927 data->acregmax = NFS_DEF_ACREGMAX;
928 data->acdirmin = NFS_DEF_ACDIRMIN;
929 data->acdirmax = NFS_DEF_ACDIRMAX;
Trond Myklebustc5811db2009-10-06 15:40:15 -0400930 data->mount_server.port = NFS_UNSPEC_PORT;
Chuck Lever9423a082009-09-23 14:36:38 -0400931 data->nfs_server.port = NFS_UNSPEC_PORT;
Trond Myklebustc5811db2009-10-06 15:40:15 -0400932 data->nfs_server.protocol = XPRT_TRANSPORT_TCP;
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -0400933 data->selected_flavor = RPC_AUTH_MAXFLAVOR;
Chuck Lever9423a082009-09-23 14:36:38 -0400934 data->minorversion = 0;
Bryan Schumakerb72e4f42012-05-10 15:07:40 -0400935 data->need_mount = true;
Trond Myklebust9937347a2012-02-19 08:44:07 +0100936 data->net = current->nsproxy->net_ns;
Jeff Layton8a0d5512011-12-20 06:57:45 -0500937 security_init_mnt_opts(&data->lsm_opts);
Chuck Lever9423a082009-09-23 14:36:38 -0400938 }
939 return data;
940}
941
Jeff Layton8a0d5512011-12-20 06:57:45 -0500942static void nfs_free_parsed_mount_data(struct nfs_parsed_mount_data *data)
943{
944 if (data) {
945 kfree(data->client_address);
946 kfree(data->mount_server.hostname);
947 kfree(data->nfs_server.export_path);
948 kfree(data->nfs_server.hostname);
949 kfree(data->fscache_uniq);
950 security_free_mnt_opts(&data->lsm_opts);
951 kfree(data);
952 }
953}
954
David Howellsf7b422b2006-06-09 09:34:33 -0400955/*
Chuck Levercdcd7f92007-12-10 14:57:45 -0500956 * Sanity-check a server address provided by the mount command.
957 *
958 * Address family must be initialized, and address must not be
959 * the ANY address for that family.
Chuck Leverfc50d582007-07-01 12:12:46 -0400960 */
961static int nfs_verify_server_address(struct sockaddr *addr)
962{
963 switch (addr->sa_family) {
964 case AF_INET: {
Chuck Levercdcd7f92007-12-10 14:57:45 -0500965 struct sockaddr_in *sa = (struct sockaddr_in *)addr;
Al Viroe6f1ceb2008-03-17 22:44:53 -0700966 return sa->sin_addr.s_addr != htonl(INADDR_ANY);
Chuck Levercdcd7f92007-12-10 14:57:45 -0500967 }
968 case AF_INET6: {
969 struct in6_addr *sa = &((struct sockaddr_in6 *)addr)->sin6_addr;
970 return !ipv6_addr_any(sa);
Chuck Leverfc50d582007-07-01 12:12:46 -0400971 }
972 }
973
Chuck Lever53a0b9c2009-08-09 15:09:36 -0400974 dfprintk(MOUNT, "NFS: Invalid IP address specified\n");
Chuck Leverfc50d582007-07-01 12:12:46 -0400975 return 0;
976}
977
Chuck Lever9412b922007-12-10 14:59:21 -0500978/*
Chuck Lever4cfd74f2009-09-08 19:49:47 -0400979 * Select between a default port value and a user-specified port value.
980 * If a zero value is set, then autobind will be used.
981 */
Trond Myklebustf5855fe2009-10-06 15:40:37 -0400982static void nfs_set_port(struct sockaddr *sap, int *port,
Chuck Lever4cfd74f2009-09-08 19:49:47 -0400983 const unsigned short default_port)
984{
Trond Myklebustf5855fe2009-10-06 15:40:37 -0400985 if (*port == NFS_UNSPEC_PORT)
986 *port = default_port;
Chuck Lever4cfd74f2009-09-08 19:49:47 -0400987
Trond Myklebustf5855fe2009-10-06 15:40:37 -0400988 rpc_set_port(sap, *port);
Chuck Lever4cfd74f2009-09-08 19:49:47 -0400989}
990
991/*
Trond Myklebust259875e2008-07-02 14:43:47 -0400992 * Sanity check the NFS transport protocol.
993 *
994 */
995static void nfs_validate_transport_protocol(struct nfs_parsed_mount_data *mnt)
996{
997 switch (mnt->nfs_server.protocol) {
998 case XPRT_TRANSPORT_UDP:
999 case XPRT_TRANSPORT_TCP:
1000 case XPRT_TRANSPORT_RDMA:
1001 break;
1002 default:
1003 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
1004 }
1005}
1006
1007/*
1008 * For text based NFSv2/v3 mounts, the mount protocol transport default
1009 * settings should depend upon the specified NFS transport.
1010 */
1011static void nfs_set_mount_transport_protocol(struct nfs_parsed_mount_data *mnt)
1012{
1013 nfs_validate_transport_protocol(mnt);
1014
1015 if (mnt->mount_server.protocol == XPRT_TRANSPORT_UDP ||
1016 mnt->mount_server.protocol == XPRT_TRANSPORT_TCP)
1017 return;
1018 switch (mnt->nfs_server.protocol) {
1019 case XPRT_TRANSPORT_UDP:
1020 mnt->mount_server.protocol = XPRT_TRANSPORT_UDP;
1021 break;
1022 case XPRT_TRANSPORT_TCP:
1023 case XPRT_TRANSPORT_RDMA:
1024 mnt->mount_server.protocol = XPRT_TRANSPORT_TCP;
1025 }
1026}
1027
1028/*
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001029 * Add 'flavor' to 'auth_info' if not already present.
1030 * Returns true if 'flavor' ends up in the list, false otherwise
1031 */
1032static bool nfs_auth_info_add(struct nfs_auth_info *auth_info,
1033 rpc_authflavor_t flavor)
1034{
1035 unsigned int i;
Fabian Frederick00216022014-06-30 19:49:39 +02001036 unsigned int max_flavor_len = ARRAY_SIZE(auth_info->flavors);
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001037
1038 /* make sure this flavor isn't already in the list */
1039 for (i = 0; i < auth_info->flavor_len; i++) {
1040 if (flavor == auth_info->flavors[i])
1041 return true;
1042 }
1043
1044 if (auth_info->flavor_len + 1 >= max_flavor_len) {
1045 dfprintk(MOUNT, "NFS: too many sec= flavors\n");
1046 return false;
1047 }
1048
1049 auth_info->flavors[auth_info->flavor_len++] = flavor;
1050 return true;
1051}
1052
1053/*
1054 * Return true if 'match' is in auth_info or auth_info is empty.
1055 * Return false otherwise.
1056 */
1057bool nfs_auth_info_match(const struct nfs_auth_info *auth_info,
1058 rpc_authflavor_t match)
1059{
1060 int i;
1061
1062 if (!auth_info->flavor_len)
1063 return true;
1064
1065 for (i = 0; i < auth_info->flavor_len; i++) {
1066 if (auth_info->flavors[i] == match)
1067 return true;
1068 }
1069 return false;
1070}
1071EXPORT_SYMBOL_GPL(nfs_auth_info_match);
1072
1073/*
Chuck Lever01060c82008-06-24 16:33:38 -04001074 * Parse the value of the 'sec=' option.
Chuck Lever01060c82008-06-24 16:33:38 -04001075 */
1076static int nfs_parse_security_flavors(char *value,
1077 struct nfs_parsed_mount_data *mnt)
1078{
1079 substring_t args[MAX_OPT_ARGS];
Trond Myklebust19e7b8d2013-09-07 14:09:52 -04001080 rpc_authflavor_t pseudoflavor;
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001081 char *p;
Chuck Lever01060c82008-06-24 16:33:38 -04001082
1083 dfprintk(MOUNT, "NFS: parsing sec=%s option\n", value);
1084
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001085 while ((p = strsep(&value, ":")) != NULL) {
1086 switch (match_token(p, nfs_secflavor_tokens, args)) {
1087 case Opt_sec_none:
1088 pseudoflavor = RPC_AUTH_NULL;
1089 break;
1090 case Opt_sec_sys:
1091 pseudoflavor = RPC_AUTH_UNIX;
1092 break;
1093 case Opt_sec_krb5:
1094 pseudoflavor = RPC_AUTH_GSS_KRB5;
1095 break;
1096 case Opt_sec_krb5i:
1097 pseudoflavor = RPC_AUTH_GSS_KRB5I;
1098 break;
1099 case Opt_sec_krb5p:
1100 pseudoflavor = RPC_AUTH_GSS_KRB5P;
1101 break;
1102 case Opt_sec_lkey:
1103 pseudoflavor = RPC_AUTH_GSS_LKEY;
1104 break;
1105 case Opt_sec_lkeyi:
1106 pseudoflavor = RPC_AUTH_GSS_LKEYI;
1107 break;
1108 case Opt_sec_lkeyp:
1109 pseudoflavor = RPC_AUTH_GSS_LKEYP;
1110 break;
1111 case Opt_sec_spkm:
1112 pseudoflavor = RPC_AUTH_GSS_SPKM;
1113 break;
1114 case Opt_sec_spkmi:
1115 pseudoflavor = RPC_AUTH_GSS_SPKMI;
1116 break;
1117 case Opt_sec_spkmp:
1118 pseudoflavor = RPC_AUTH_GSS_SPKMP;
1119 break;
1120 default:
1121 dfprintk(MOUNT,
1122 "NFS: sec= option '%s' not recognized\n", p);
1123 return 0;
1124 }
1125
1126 if (!nfs_auth_info_add(&mnt->auth_info, pseudoflavor))
1127 return 0;
Chuck Lever01060c82008-06-24 16:33:38 -04001128 }
1129
1130 return 1;
1131}
1132
Trond Myklebust0d71b052012-03-02 13:59:49 -05001133static int nfs_parse_version_string(char *string,
1134 struct nfs_parsed_mount_data *mnt,
1135 substring_t *args)
1136{
1137 mnt->flags &= ~NFS_MOUNT_VER3;
1138 switch (match_token(string, nfs_vers_tokens, args)) {
1139 case Opt_vers_2:
1140 mnt->version = 2;
1141 break;
1142 case Opt_vers_3:
1143 mnt->flags |= NFS_MOUNT_VER3;
1144 mnt->version = 3;
1145 break;
1146 case Opt_vers_4:
1147 /* Backward compatibility option. In future,
1148 * the mount program should always supply
1149 * a NFSv4 minor version number.
1150 */
1151 mnt->version = 4;
1152 break;
1153 case Opt_vers_4_0:
1154 mnt->version = 4;
1155 mnt->minorversion = 0;
1156 break;
1157 case Opt_vers_4_1:
1158 mnt->version = 4;
1159 mnt->minorversion = 1;
1160 break;
Steve Dickson42c2c422013-05-22 12:50:38 -04001161 case Opt_vers_4_2:
1162 mnt->version = 4;
1163 mnt->minorversion = 2;
1164 break;
Trond Myklebust0d71b052012-03-02 13:59:49 -05001165 default:
1166 return 0;
1167 }
1168 return 1;
1169}
1170
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001171static int nfs_get_option_str(substring_t args[], char **option)
1172{
1173 kfree(*option);
1174 *option = match_strdup(args);
Xi Wange25fbe32013-01-04 03:22:57 -05001175 return !*option;
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001176}
1177
1178static int nfs_get_option_ul(substring_t args[], unsigned long *option)
1179{
1180 int rc;
1181 char *string;
1182
1183 string = match_strdup(args);
1184 if (string == NULL)
1185 return -ENOMEM;
Daniel Walter7297cb62012-09-26 21:51:46 +02001186 rc = kstrtoul(string, 10, option);
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001187 kfree(string);
1188
1189 return rc;
1190}
1191
Chuck Lever01060c82008-06-24 16:33:38 -04001192/*
Chuck Leverbf0fd762007-07-01 12:13:44 -04001193 * Error-check and convert a string of mount options from user space into
Chuck Leverf45663c2008-06-24 19:28:02 -04001194 * a data structure. The whole mount string is processed; bad options are
1195 * skipped as they are encountered. If there were no errors, return 1;
1196 * otherwise return 0 (zero).
Chuck Leverbf0fd762007-07-01 12:13:44 -04001197 */
1198static int nfs_parse_mount_options(char *raw,
1199 struct nfs_parsed_mount_data *mnt)
1200{
Eric Parisf9c3a382008-03-05 14:20:18 -05001201 char *p, *string, *secdata;
Chuck Leverd23c45f2009-06-17 18:02:13 -07001202 int rc, sloppy = 0, invalid_option = 0;
Jeff Laytonee671b02009-12-03 15:58:56 -05001203 unsigned short protofamily = AF_UNSPEC;
1204 unsigned short mountfamily = AF_UNSPEC;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001205
1206 if (!raw) {
1207 dfprintk(MOUNT, "NFS: mount options string was NULL.\n");
1208 return 1;
1209 }
1210 dfprintk(MOUNT, "NFS: nfs mount opts='%s'\n", raw);
1211
Eric Parisf9c3a382008-03-05 14:20:18 -05001212 secdata = alloc_secdata();
1213 if (!secdata)
1214 goto out_nomem;
1215
1216 rc = security_sb_copy_data(raw, secdata);
1217 if (rc)
1218 goto out_security_failure;
1219
1220 rc = security_sb_parse_opts_str(secdata, &mnt->lsm_opts);
1221 if (rc)
1222 goto out_security_failure;
1223
1224 free_secdata(secdata);
1225
Chuck Leverbf0fd762007-07-01 12:13:44 -04001226 while ((p = strsep(&raw, ",")) != NULL) {
1227 substring_t args[MAX_OPT_ARGS];
Chuck Levera5a16ba2009-06-17 18:02:14 -07001228 unsigned long option;
1229 int token;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001230
1231 if (!*p)
1232 continue;
1233
1234 dfprintk(MOUNT, "NFS: parsing nfs mount option '%s'\n", p);
1235
1236 token = match_token(p, nfs_mount_option_tokens, args);
1237 switch (token) {
Chuck Leverf45663c2008-06-24 19:28:02 -04001238
1239 /*
1240 * boolean options: foo/nofoo
1241 */
Chuck Leverbf0fd762007-07-01 12:13:44 -04001242 case Opt_soft:
1243 mnt->flags |= NFS_MOUNT_SOFT;
1244 break;
1245 case Opt_hard:
1246 mnt->flags &= ~NFS_MOUNT_SOFT;
1247 break;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001248 case Opt_posix:
1249 mnt->flags |= NFS_MOUNT_POSIX;
1250 break;
1251 case Opt_noposix:
1252 mnt->flags &= ~NFS_MOUNT_POSIX;
1253 break;
1254 case Opt_cto:
1255 mnt->flags &= ~NFS_MOUNT_NOCTO;
1256 break;
1257 case Opt_nocto:
1258 mnt->flags |= NFS_MOUNT_NOCTO;
1259 break;
1260 case Opt_ac:
1261 mnt->flags &= ~NFS_MOUNT_NOAC;
1262 break;
1263 case Opt_noac:
1264 mnt->flags |= NFS_MOUNT_NOAC;
1265 break;
1266 case Opt_lock:
1267 mnt->flags &= ~NFS_MOUNT_NONLM;
Suresh Jayaraman5eebde22010-09-23 08:55:58 -04001268 mnt->flags &= ~(NFS_MOUNT_LOCAL_FLOCK |
1269 NFS_MOUNT_LOCAL_FCNTL);
Chuck Leverbf0fd762007-07-01 12:13:44 -04001270 break;
1271 case Opt_nolock:
1272 mnt->flags |= NFS_MOUNT_NONLM;
Suresh Jayaraman5eebde22010-09-23 08:55:58 -04001273 mnt->flags |= (NFS_MOUNT_LOCAL_FLOCK |
1274 NFS_MOUNT_LOCAL_FCNTL);
Chuck Leverbf0fd762007-07-01 12:13:44 -04001275 break;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001276 case Opt_udp:
1277 mnt->flags &= ~NFS_MOUNT_TCP;
\"Talpey, Thomas\0896a722007-09-10 13:48:23 -04001278 mnt->nfs_server.protocol = XPRT_TRANSPORT_UDP;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001279 break;
1280 case Opt_tcp:
1281 mnt->flags |= NFS_MOUNT_TCP;
\"Talpey, Thomas\0896a722007-09-10 13:48:23 -04001282 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001283 break;
\"Talpey, Thomas\2cf7ff72007-09-10 13:49:41 -04001284 case Opt_rdma:
1285 mnt->flags |= NFS_MOUNT_TCP; /* for side protocols */
1286 mnt->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
Tom Talpeya67d18f2009-03-11 14:37:56 -04001287 xprt_load_transport(p);
\"Talpey, Thomas\2cf7ff72007-09-10 13:49:41 -04001288 break;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001289 case Opt_acl:
1290 mnt->flags &= ~NFS_MOUNT_NOACL;
1291 break;
1292 case Opt_noacl:
1293 mnt->flags |= NFS_MOUNT_NOACL;
1294 break;
1295 case Opt_rdirplus:
1296 mnt->flags &= ~NFS_MOUNT_NORDIRPLUS;
1297 break;
1298 case Opt_nordirplus:
1299 mnt->flags |= NFS_MOUNT_NORDIRPLUS;
1300 break;
Trond Myklebust75180df2007-05-16 16:53:28 -04001301 case Opt_sharecache:
1302 mnt->flags &= ~NFS_MOUNT_UNSHARED;
1303 break;
1304 case Opt_nosharecache:
1305 mnt->flags |= NFS_MOUNT_UNSHARED;
1306 break;
Chuck Leverd7403512008-12-23 15:21:37 -05001307 case Opt_resvport:
1308 mnt->flags &= ~NFS_MOUNT_NORESVPORT;
1309 break;
1310 case Opt_noresvport:
1311 mnt->flags |= NFS_MOUNT_NORESVPORT;
1312 break;
David Howellsb797cac2009-04-03 16:42:48 +01001313 case Opt_fscache:
1314 mnt->options |= NFS_OPTION_FSCACHE;
1315 kfree(mnt->fscache_uniq);
1316 mnt->fscache_uniq = NULL;
1317 break;
1318 case Opt_nofscache:
1319 mnt->options &= ~NFS_OPTION_FSCACHE;
1320 kfree(mnt->fscache_uniq);
1321 mnt->fscache_uniq = NULL;
1322 break;
Chuck Lever89652612012-09-14 17:24:11 -04001323 case Opt_migration:
1324 mnt->options |= NFS_OPTION_MIGRATION;
1325 break;
1326 case Opt_nomigration:
1327 mnt->options &= NFS_OPTION_MIGRATION;
1328 break;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001329
Chuck Leverf45663c2008-06-24 19:28:02 -04001330 /*
1331 * options that take numeric values
1332 */
Chuck Leverbf0fd762007-07-01 12:13:44 -04001333 case Opt_port:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001334 if (nfs_get_option_ul(args, &option) ||
1335 option > USHRT_MAX)
Chuck Leverd23c45f2009-06-17 18:02:13 -07001336 goto out_invalid_value;
1337 mnt->nfs_server.port = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001338 break;
1339 case Opt_rsize:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001340 if (nfs_get_option_ul(args, &option))
Chuck Leverd23c45f2009-06-17 18:02:13 -07001341 goto out_invalid_value;
1342 mnt->rsize = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001343 break;
1344 case Opt_wsize:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001345 if (nfs_get_option_ul(args, &option))
Chuck Leverd23c45f2009-06-17 18:02:13 -07001346 goto out_invalid_value;
1347 mnt->wsize = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001348 break;
1349 case Opt_bsize:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001350 if (nfs_get_option_ul(args, &option))
Chuck Leverd23c45f2009-06-17 18:02:13 -07001351 goto out_invalid_value;
1352 mnt->bsize = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001353 break;
1354 case Opt_timeo:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001355 if (nfs_get_option_ul(args, &option) || option == 0)
Chuck Leverd23c45f2009-06-17 18:02:13 -07001356 goto out_invalid_value;
1357 mnt->timeo = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001358 break;
1359 case Opt_retrans:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001360 if (nfs_get_option_ul(args, &option) || option == 0)
Chuck Leverd23c45f2009-06-17 18:02:13 -07001361 goto out_invalid_value;
1362 mnt->retrans = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001363 break;
1364 case Opt_acregmin:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001365 if (nfs_get_option_ul(args, &option))
Chuck Leverd23c45f2009-06-17 18:02:13 -07001366 goto out_invalid_value;
1367 mnt->acregmin = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001368 break;
1369 case Opt_acregmax:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001370 if (nfs_get_option_ul(args, &option))
Chuck Leverd23c45f2009-06-17 18:02:13 -07001371 goto out_invalid_value;
1372 mnt->acregmax = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001373 break;
1374 case Opt_acdirmin:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001375 if (nfs_get_option_ul(args, &option))
Chuck Leverd23c45f2009-06-17 18:02:13 -07001376 goto out_invalid_value;
1377 mnt->acdirmin = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001378 break;
1379 case Opt_acdirmax:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001380 if (nfs_get_option_ul(args, &option))
Chuck Leverd23c45f2009-06-17 18:02:13 -07001381 goto out_invalid_value;
1382 mnt->acdirmax = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001383 break;
1384 case Opt_actimeo:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001385 if (nfs_get_option_ul(args, &option))
Chuck Leverd23c45f2009-06-17 18:02:13 -07001386 goto out_invalid_value;
1387 mnt->acregmin = mnt->acregmax =
1388 mnt->acdirmin = mnt->acdirmax = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001389 break;
1390 case Opt_namelen:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001391 if (nfs_get_option_ul(args, &option))
Chuck Leverd23c45f2009-06-17 18:02:13 -07001392 goto out_invalid_value;
1393 mnt->namlen = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001394 break;
1395 case Opt_mountport:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001396 if (nfs_get_option_ul(args, &option) ||
1397 option > USHRT_MAX)
Chuck Leverd23c45f2009-06-17 18:02:13 -07001398 goto out_invalid_value;
1399 mnt->mount_server.port = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001400 break;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001401 case Opt_mountvers:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001402 if (nfs_get_option_ul(args, &option) ||
Chuck Leverf45663c2008-06-24 19:28:02 -04001403 option < NFS_MNT_VERSION ||
Chuck Leverd23c45f2009-06-17 18:02:13 -07001404 option > NFS_MNT3_VERSION)
1405 goto out_invalid_value;
1406 mnt->mount_server.version = option;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001407 break;
Mike Sager3fd5be92009-04-01 09:21:48 -04001408 case Opt_minorversion:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001409 if (nfs_get_option_ul(args, &option))
Chuck Leverf3f4f4e2009-08-09 15:09:29 -04001410 goto out_invalid_value;
1411 if (option > NFS4_MAX_MINOR_VERSION)
1412 goto out_invalid_value;
1413 mnt->minorversion = option;
Mike Sager3fd5be92009-04-01 09:21:48 -04001414 break;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001415
Chuck Leverf45663c2008-06-24 19:28:02 -04001416 /*
1417 * options that take text values
1418 */
Trond Myklebust0d71b052012-03-02 13:59:49 -05001419 case Opt_nfsvers:
1420 string = match_strdup(args);
1421 if (string == NULL)
1422 goto out_nomem;
1423 rc = nfs_parse_version_string(string, mnt, args);
1424 kfree(string);
1425 if (!rc)
1426 goto out_invalid_value;
1427 break;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001428 case Opt_sec:
1429 string = match_strdup(args);
1430 if (string == NULL)
1431 goto out_nomem;
Chuck Lever01060c82008-06-24 16:33:38 -04001432 rc = nfs_parse_security_flavors(string, mnt);
Chuck Leverbf0fd762007-07-01 12:13:44 -04001433 kfree(string);
Chuck Leverf45663c2008-06-24 19:28:02 -04001434 if (!rc) {
Chuck Leverf45663c2008-06-24 19:28:02 -04001435 dfprintk(MOUNT, "NFS: unrecognized "
1436 "security flavor\n");
Chuck Leverd23c45f2009-06-17 18:02:13 -07001437 return 0;
Chuck Leverf45663c2008-06-24 19:28:02 -04001438 }
Chuck Leverbf0fd762007-07-01 12:13:44 -04001439 break;
1440 case Opt_proto:
1441 string = match_strdup(args);
1442 if (string == NULL)
1443 goto out_nomem;
1444 token = match_token(string,
1445 nfs_xprt_protocol_tokens, args);
Chuck Leverbf0fd762007-07-01 12:13:44 -04001446
Jeff Laytonee671b02009-12-03 15:58:56 -05001447 protofamily = AF_INET;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001448 switch (token) {
Jeff Laytonee671b02009-12-03 15:58:56 -05001449 case Opt_xprt_udp6:
1450 protofamily = AF_INET6;
Chuck Leverfdb66ff2007-08-29 17:58:57 -04001451 case Opt_xprt_udp:
Chuck Leverbf0fd762007-07-01 12:13:44 -04001452 mnt->flags &= ~NFS_MOUNT_TCP;
\"Talpey, Thomas\0896a722007-09-10 13:48:23 -04001453 mnt->nfs_server.protocol = XPRT_TRANSPORT_UDP;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001454 break;
Jeff Laytonee671b02009-12-03 15:58:56 -05001455 case Opt_xprt_tcp6:
1456 protofamily = AF_INET6;
Chuck Leverfdb66ff2007-08-29 17:58:57 -04001457 case Opt_xprt_tcp:
Chuck Leverbf0fd762007-07-01 12:13:44 -04001458 mnt->flags |= NFS_MOUNT_TCP;
\"Talpey, Thomas\0896a722007-09-10 13:48:23 -04001459 mnt->nfs_server.protocol = XPRT_TRANSPORT_TCP;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001460 break;
Shirley Ma181342c2016-05-02 14:40:23 -04001461 case Opt_xprt_rdma6:
1462 protofamily = AF_INET6;
\"Talpey, Thomas\2cf7ff72007-09-10 13:49:41 -04001463 case Opt_xprt_rdma:
1464 /* vector side protocols to TCP */
1465 mnt->flags |= NFS_MOUNT_TCP;
1466 mnt->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
Tom Talpeya67d18f2009-03-11 14:37:56 -04001467 xprt_load_transport(string);
\"Talpey, Thomas\2cf7ff72007-09-10 13:49:41 -04001468 break;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001469 default:
Chuck Leverf45663c2008-06-24 19:28:02 -04001470 dfprintk(MOUNT, "NFS: unrecognized "
1471 "transport protocol\n");
Yinghai Lu4223a4a2009-10-20 14:13:46 +09001472 kfree(string);
Chuck Leverd23c45f2009-06-17 18:02:13 -07001473 return 0;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001474 }
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001475 kfree(string);
Chuck Leverbf0fd762007-07-01 12:13:44 -04001476 break;
1477 case Opt_mountproto:
1478 string = match_strdup(args);
1479 if (string == NULL)
1480 goto out_nomem;
1481 token = match_token(string,
1482 nfs_xprt_protocol_tokens, args);
Trond Myklebustd508afb2009-04-06 16:41:35 -07001483 kfree(string);
Chuck Leverbf0fd762007-07-01 12:13:44 -04001484
Jeff Laytonee671b02009-12-03 15:58:56 -05001485 mountfamily = AF_INET;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001486 switch (token) {
Jeff Laytonee671b02009-12-03 15:58:56 -05001487 case Opt_xprt_udp6:
1488 mountfamily = AF_INET6;
Chuck Leverfdb66ff2007-08-29 17:58:57 -04001489 case Opt_xprt_udp:
\"Talpey, Thomas\0896a722007-09-10 13:48:23 -04001490 mnt->mount_server.protocol = XPRT_TRANSPORT_UDP;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001491 break;
Jeff Laytonee671b02009-12-03 15:58:56 -05001492 case Opt_xprt_tcp6:
1493 mountfamily = AF_INET6;
Chuck Leverfdb66ff2007-08-29 17:58:57 -04001494 case Opt_xprt_tcp:
\"Talpey, Thomas\0896a722007-09-10 13:48:23 -04001495 mnt->mount_server.protocol = XPRT_TRANSPORT_TCP;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001496 break;
\"Talpey, Thomas\2cf7ff72007-09-10 13:49:41 -04001497 case Opt_xprt_rdma: /* not used for side protocols */
Chuck Leverbf0fd762007-07-01 12:13:44 -04001498 default:
Chuck Leverf45663c2008-06-24 19:28:02 -04001499 dfprintk(MOUNT, "NFS: unrecognized "
1500 "transport protocol\n");
Chuck Leverd23c45f2009-06-17 18:02:13 -07001501 return 0;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001502 }
1503 break;
1504 case Opt_addr:
1505 string = match_strdup(args);
1506 if (string == NULL)
1507 goto out_nomem;
Chuck Lever53a0b9c2009-08-09 15:09:36 -04001508 mnt->nfs_server.addrlen =
Stanislav Kinsburskyb48e1272012-01-26 15:11:57 +04001509 rpc_pton(mnt->net, string, strlen(string),
Chuck Lever53a0b9c2009-08-09 15:09:36 -04001510 (struct sockaddr *)
1511 &mnt->nfs_server.address,
1512 sizeof(mnt->nfs_server.address));
Chuck Leverbf0fd762007-07-01 12:13:44 -04001513 kfree(string);
Chuck Lever53a0b9c2009-08-09 15:09:36 -04001514 if (mnt->nfs_server.addrlen == 0)
1515 goto out_invalid_address;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001516 break;
1517 case Opt_clientaddr:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001518 if (nfs_get_option_str(args, &mnt->client_address))
Chuck Leverbf0fd762007-07-01 12:13:44 -04001519 goto out_nomem;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001520 break;
Chuck Lever33832032007-12-10 14:59:13 -05001521 case Opt_mounthost:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001522 if (nfs_get_option_str(args,
1523 &mnt->mount_server.hostname))
Chuck Lever33832032007-12-10 14:59:13 -05001524 goto out_nomem;
Chuck Lever33832032007-12-10 14:59:13 -05001525 break;
Chuck Lever0ac83772007-09-11 18:01:04 -04001526 case Opt_mountaddr:
Chuck Leverbf0fd762007-07-01 12:13:44 -04001527 string = match_strdup(args);
1528 if (string == NULL)
1529 goto out_nomem;
Chuck Lever53a0b9c2009-08-09 15:09:36 -04001530 mnt->mount_server.addrlen =
Stanislav Kinsburskyb48e1272012-01-26 15:11:57 +04001531 rpc_pton(mnt->net, string, strlen(string),
Chuck Lever53a0b9c2009-08-09 15:09:36 -04001532 (struct sockaddr *)
1533 &mnt->mount_server.address,
1534 sizeof(mnt->mount_server.address));
Chuck Leverbf0fd762007-07-01 12:13:44 -04001535 kfree(string);
Chuck Lever53a0b9c2009-08-09 15:09:36 -04001536 if (mnt->mount_server.addrlen == 0)
1537 goto out_invalid_address;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001538 break;
Trond Myklebust7973c1f12008-07-15 17:58:14 -04001539 case Opt_lookupcache:
1540 string = match_strdup(args);
1541 if (string == NULL)
1542 goto out_nomem;
1543 token = match_token(string,
1544 nfs_lookupcache_tokens, args);
1545 kfree(string);
1546 switch (token) {
1547 case Opt_lookupcache_all:
1548 mnt->flags &= ~(NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE);
1549 break;
1550 case Opt_lookupcache_positive:
1551 mnt->flags &= ~NFS_MOUNT_LOOKUP_CACHE_NONE;
1552 mnt->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG;
1553 break;
1554 case Opt_lookupcache_none:
1555 mnt->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE;
1556 break;
1557 default:
Trond Myklebust7973c1f12008-07-15 17:58:14 -04001558 dfprintk(MOUNT, "NFS: invalid "
1559 "lookupcache argument\n");
Chuck Leverd23c45f2009-06-17 18:02:13 -07001560 return 0;
Trond Myklebust7973c1f12008-07-15 17:58:14 -04001561 };
1562 break;
Chuck Levera6d5ff62010-05-07 13:33:58 -04001563 case Opt_fscache_uniq:
Rob Landleyc5cb09b2011-03-09 16:02:37 -06001564 if (nfs_get_option_str(args, &mnt->fscache_uniq))
Chuck Levera6d5ff62010-05-07 13:33:58 -04001565 goto out_nomem;
Chuck Levera6d5ff62010-05-07 13:33:58 -04001566 mnt->options |= NFS_OPTION_FSCACHE;
1567 break;
Suresh Jayaraman5eebde22010-09-23 08:55:58 -04001568 case Opt_local_lock:
1569 string = match_strdup(args);
1570 if (string == NULL)
1571 goto out_nomem;
1572 token = match_token(string, nfs_local_lock_tokens,
1573 args);
1574 kfree(string);
1575 switch (token) {
1576 case Opt_local_lock_all:
1577 mnt->flags |= (NFS_MOUNT_LOCAL_FLOCK |
1578 NFS_MOUNT_LOCAL_FCNTL);
1579 break;
1580 case Opt_local_lock_flock:
1581 mnt->flags |= NFS_MOUNT_LOCAL_FLOCK;
1582 break;
1583 case Opt_local_lock_posix:
1584 mnt->flags |= NFS_MOUNT_LOCAL_FCNTL;
1585 break;
1586 case Opt_local_lock_none:
1587 mnt->flags &= ~(NFS_MOUNT_LOCAL_FLOCK |
1588 NFS_MOUNT_LOCAL_FCNTL);
1589 break;
1590 default:
1591 dfprintk(MOUNT, "NFS: invalid "
1592 "local_lock argument\n");
1593 return 0;
1594 };
1595 break;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001596
Chuck Leverf45663c2008-06-24 19:28:02 -04001597 /*
1598 * Special options
1599 */
1600 case Opt_sloppy:
1601 sloppy = 1;
1602 dfprintk(MOUNT, "NFS: relaxing parsing rules\n");
1603 break;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001604 case Opt_userspace:
1605 case Opt_deprecated:
Chuck Leverd33e4df2008-06-12 12:37:41 -04001606 dfprintk(MOUNT, "NFS: ignoring mount option "
1607 "'%s'\n", p);
Chuck Leverbf0fd762007-07-01 12:13:44 -04001608 break;
1609
1610 default:
Chuck Leverd23c45f2009-06-17 18:02:13 -07001611 invalid_option = 1;
Chuck Leverf45663c2008-06-24 19:28:02 -04001612 dfprintk(MOUNT, "NFS: unrecognized mount option "
1613 "'%s'\n", p);
Chuck Leverbf0fd762007-07-01 12:13:44 -04001614 }
1615 }
1616
Chuck Leverd23c45f2009-06-17 18:02:13 -07001617 if (!sloppy && invalid_option)
1618 return 0;
1619
Weston Andros Adamson571b7552012-02-01 14:06:41 -05001620 if (mnt->minorversion && mnt->version != 4)
1621 goto out_minorversion_mismatch;
1622
Chuck Lever89652612012-09-14 17:24:11 -04001623 if (mnt->options & NFS_OPTION_MIGRATION &&
NeilBrown9e08ef12013-11-14 13:00:17 +11001624 (mnt->version != 4 || mnt->minorversion != 0))
Chuck Lever89652612012-09-14 17:24:11 -04001625 goto out_migration_misuse;
1626
Jeff Laytonee671b02009-12-03 15:58:56 -05001627 /*
1628 * verify that any proto=/mountproto= options match the address
Peter Meerwald1856b222012-08-18 17:38:54 +02001629 * families in the addr=/mountaddr= options.
Jeff Laytonee671b02009-12-03 15:58:56 -05001630 */
1631 if (protofamily != AF_UNSPEC &&
1632 protofamily != mnt->nfs_server.address.ss_family)
1633 goto out_proto_mismatch;
1634
1635 if (mountfamily != AF_UNSPEC) {
1636 if (mnt->mount_server.addrlen) {
1637 if (mountfamily != mnt->mount_server.address.ss_family)
1638 goto out_mountproto_mismatch;
1639 } else {
1640 if (mountfamily != mnt->nfs_server.address.ss_family)
1641 goto out_mountproto_mismatch;
1642 }
1643 }
1644
Chuck Leverbf0fd762007-07-01 12:13:44 -04001645 return 1;
1646
Jeff Laytonee671b02009-12-03 15:58:56 -05001647out_mountproto_mismatch:
1648 printk(KERN_INFO "NFS: mount server address does not match mountproto= "
1649 "option\n");
1650 return 0;
1651out_proto_mismatch:
1652 printk(KERN_INFO "NFS: server address does not match proto= option\n");
1653 return 0;
Chuck Lever53a0b9c2009-08-09 15:09:36 -04001654out_invalid_address:
1655 printk(KERN_INFO "NFS: bad IP address specified: %s\n", p);
1656 return 0;
Chuck Leverd23c45f2009-06-17 18:02:13 -07001657out_invalid_value:
Chuck Lever53a0b9c2009-08-09 15:09:36 -04001658 printk(KERN_INFO "NFS: bad mount option value specified: %s\n", p);
Chuck Leverd23c45f2009-06-17 18:02:13 -07001659 return 0;
Weston Andros Adamson571b7552012-02-01 14:06:41 -05001660out_minorversion_mismatch:
1661 printk(KERN_INFO "NFS: mount option vers=%u does not support "
1662 "minorversion=%u\n", mnt->version, mnt->minorversion);
1663 return 0;
Chuck Lever89652612012-09-14 17:24:11 -04001664out_migration_misuse:
1665 printk(KERN_INFO
1666 "NFS: 'migration' not supported for this NFS version\n");
1667 return 0;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001668out_nomem:
1669 printk(KERN_INFO "NFS: not enough memory to parse option\n");
1670 return 0;
Eric Parisf9c3a382008-03-05 14:20:18 -05001671out_security_failure:
1672 free_secdata(secdata);
1673 printk(KERN_INFO "NFS: security options invalid: %d\n", rc);
1674 return 0;
Chuck Leverbf0fd762007-07-01 12:13:44 -04001675}
1676
1677/*
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001678 * Ensure that a specified authtype in args->auth_info is supported by
1679 * the server. Returns 0 and sets args->selected_flavor if it's ok, and
1680 * -EACCES if not.
Chuck Leverec88f282009-08-09 15:09:32 -04001681 */
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001682static int nfs_verify_authflavors(struct nfs_parsed_mount_data *args,
Jeff Layton9111c952013-06-27 15:54:41 -04001683 rpc_authflavor_t *server_authlist, unsigned int count)
Chuck Leverec88f282009-08-09 15:09:32 -04001684{
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001685 rpc_authflavor_t flavor = RPC_AUTH_MAXFLAVOR;
Jeff Layton9111c952013-06-27 15:54:41 -04001686 unsigned int i;
Chuck Lever4580a922013-03-22 12:53:17 -04001687
Chuck Lever4580a922013-03-22 12:53:17 -04001688 /*
Weston Andros Adamsond497ab92013-05-06 17:12:13 -04001689 * If the sec= mount option is used, the specified flavor or AUTH_NULL
1690 * must be in the list returned by the server.
1691 *
1692 * AUTH_NULL has a special meaning when it's in the server list - it
1693 * means that the server will ignore the rpc creds, so any flavor
1694 * can be used.
1695 */
Chuck Lever4580a922013-03-22 12:53:17 -04001696 for (i = 0; i < count; i++) {
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001697 flavor = server_authlist[i];
1698
1699 if (nfs_auth_info_match(&args->auth_info, flavor) ||
1700 flavor == RPC_AUTH_NULL)
Jeff Layton9111c952013-06-27 15:54:41 -04001701 goto out;
Chuck Lever4580a922013-03-22 12:53:17 -04001702 }
1703
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001704 dfprintk(MOUNT,
1705 "NFS: specified auth flavors not supported by server\n");
Weston Andros Adamsond497ab92013-05-06 17:12:13 -04001706 return -EACCES;
Jeff Layton9111c952013-06-27 15:54:41 -04001707
1708out:
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001709 args->selected_flavor = flavor;
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -04001710 dfprintk(MOUNT, "NFS: using auth flavor %u\n", args->selected_flavor);
Jeff Layton9111c952013-06-27 15:54:41 -04001711 return 0;
Chuck Leverec88f282009-08-09 15:09:32 -04001712}
1713
1714/*
Chuck Lever0076d7b2007-07-01 12:13:49 -04001715 * Use the remote server's MOUNT service to request the NFS file handle
1716 * corresponding to the provided path.
1717 */
Bryan Schumaker486aa692012-05-10 15:07:39 -04001718static int nfs_request_mount(struct nfs_parsed_mount_data *args,
Jeff Layton294ae812013-06-27 15:54:39 -04001719 struct nfs_fh *root_fh,
1720 rpc_authflavor_t *server_authlist,
1721 unsigned int *server_authlist_len)
Chuck Lever0076d7b2007-07-01 12:13:49 -04001722{
Chuck Leverc5d120f2008-12-23 15:21:35 -05001723 struct nfs_mount_request request = {
1724 .sap = (struct sockaddr *)
1725 &args->mount_server.address,
1726 .dirpath = args->nfs_server.export_path,
1727 .protocol = args->mount_server.protocol,
1728 .fh = root_fh,
Chuck Lever50a737f2008-12-23 15:21:37 -05001729 .noresvport = args->flags & NFS_MOUNT_NORESVPORT,
Jeff Layton294ae812013-06-27 15:54:39 -04001730 .auth_flav_len = server_authlist_len,
Chuck Leverec88f282009-08-09 15:09:32 -04001731 .auth_flavs = server_authlist,
Stanislav Kinsbursky6d59b8d2012-01-10 16:12:54 +04001732 .net = args->net,
Chuck Leverc5d120f2008-12-23 15:21:35 -05001733 };
Chuck Lever4c568012007-12-10 14:59:28 -05001734 int status;
Chuck Lever0076d7b2007-07-01 12:13:49 -04001735
1736 if (args->mount_server.version == 0) {
Trond Myklebust8a6e5de2009-09-23 14:36:37 -04001737 switch (args->version) {
1738 default:
1739 args->mount_server.version = NFS_MNT3_VERSION;
1740 break;
1741 case 2:
1742 args->mount_server.version = NFS_MNT_VERSION;
1743 }
Chuck Lever0076d7b2007-07-01 12:13:49 -04001744 }
Chuck Leverc5d120f2008-12-23 15:21:35 -05001745 request.version = args->mount_server.version;
Chuck Lever0076d7b2007-07-01 12:13:49 -04001746
Chuck Lever33832032007-12-10 14:59:13 -05001747 if (args->mount_server.hostname)
Chuck Leverc5d120f2008-12-23 15:21:35 -05001748 request.hostname = args->mount_server.hostname;
Chuck Lever33832032007-12-10 14:59:13 -05001749 else
Chuck Leverc5d120f2008-12-23 15:21:35 -05001750 request.hostname = args->nfs_server.hostname;
Chuck Lever33832032007-12-10 14:59:13 -05001751
Chuck Lever0076d7b2007-07-01 12:13:49 -04001752 /*
1753 * Construct the mount server's address.
1754 */
Chuck Lever4c568012007-12-10 14:59:28 -05001755 if (args->mount_server.address.ss_family == AF_UNSPEC) {
Chuck Leverc5d120f2008-12-23 15:21:35 -05001756 memcpy(request.sap, &args->nfs_server.address,
Chuck Lever4c568012007-12-10 14:59:28 -05001757 args->nfs_server.addrlen);
1758 args->mount_server.addrlen = args->nfs_server.addrlen;
1759 }
Chuck Leverc5d120f2008-12-23 15:21:35 -05001760 request.salen = args->mount_server.addrlen;
Trond Myklebustf5855fe2009-10-06 15:40:37 -04001761 nfs_set_port(request.sap, &args->mount_server.port, 0);
Chuck Lever0076d7b2007-07-01 12:13:49 -04001762
1763 /*
1764 * Now ask the mount server to map our export path
1765 * to a file handle.
1766 */
Chuck Leverc5d120f2008-12-23 15:21:35 -05001767 status = nfs_mount(&request);
Chuck Leverec88f282009-08-09 15:09:32 -04001768 if (status != 0) {
1769 dfprintk(MOUNT, "NFS: unable to mount server %s, error %d\n",
1770 request.hostname, status);
1771 return status;
1772 }
Chuck Lever0076d7b2007-07-01 12:13:49 -04001773
Jeff Layton9111c952013-06-27 15:54:41 -04001774 return 0;
Chuck Lever0076d7b2007-07-01 12:13:49 -04001775}
1776
Jeff Laytond17540c2013-06-27 15:54:38 -04001777static struct nfs_server *nfs_try_mount_request(struct nfs_mount_info *mount_info,
1778 struct nfs_subversion *nfs_mod)
1779{
1780 int status;
Jeff Layton9111c952013-06-27 15:54:41 -04001781 unsigned int i;
1782 bool tried_auth_unix = false;
1783 bool auth_null_in_list = false;
1784 struct nfs_server *server = ERR_PTR(-EACCES);
Jeff Layton294ae812013-06-27 15:54:39 -04001785 struct nfs_parsed_mount_data *args = mount_info->parsed;
1786 rpc_authflavor_t authlist[NFS_MAX_SECFLAVORS];
1787 unsigned int authlist_len = ARRAY_SIZE(authlist);
Jeff Laytond17540c2013-06-27 15:54:38 -04001788
Jeff Layton294ae812013-06-27 15:54:39 -04001789 status = nfs_request_mount(args, mount_info->mntfh, authlist,
1790 &authlist_len);
Jeff Laytond17540c2013-06-27 15:54:38 -04001791 if (status)
1792 return ERR_PTR(status);
1793
Jeff Layton9111c952013-06-27 15:54:41 -04001794 /*
1795 * Was a sec= authflavor specified in the options? First, verify
1796 * whether the server supports it, and then just try to use it if so.
1797 */
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -04001798 if (args->auth_info.flavor_len > 0) {
Weston Andros Adamson4d4b69d2013-10-18 15:15:19 -04001799 status = nfs_verify_authflavors(args, authlist, authlist_len);
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -04001800 dfprintk(MOUNT, "NFS: using auth flavor %u\n",
1801 args->selected_flavor);
Jeff Layton9111c952013-06-27 15:54:41 -04001802 if (status)
1803 return ERR_PTR(status);
1804 return nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1805 }
1806
1807 /*
1808 * No sec= option was provided. RFC 2623, section 2.7 suggests we
1809 * SHOULD prefer the flavor listed first. However, some servers list
1810 * AUTH_NULL first. Avoid ever choosing AUTH_NULL.
1811 */
1812 for (i = 0; i < authlist_len; ++i) {
1813 rpc_authflavor_t flavor;
1814 struct rpcsec_gss_info info;
1815
1816 flavor = authlist[i];
1817 switch (flavor) {
1818 case RPC_AUTH_UNIX:
1819 tried_auth_unix = true;
1820 break;
1821 case RPC_AUTH_NULL:
1822 auth_null_in_list = true;
1823 continue;
1824 default:
1825 if (rpcauth_get_gssinfo(flavor, &info) != 0)
1826 continue;
1827 /* Fallthrough */
1828 }
1829 dfprintk(MOUNT, "NFS: attempting to use auth flavor %u\n", flavor);
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -04001830 args->selected_flavor = flavor;
Jeff Layton9111c952013-06-27 15:54:41 -04001831 server = nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1832 if (!IS_ERR(server))
1833 return server;
1834 }
1835
1836 /*
1837 * Nothing we tried so far worked. At this point, give up if we've
1838 * already tried AUTH_UNIX or if the server's list doesn't contain
1839 * AUTH_NULL
1840 */
1841 if (tried_auth_unix || !auth_null_in_list)
1842 return server;
1843
1844 /* Last chance! Try AUTH_UNIX */
1845 dfprintk(MOUNT, "NFS: attempting to use auth flavor %u\n", RPC_AUTH_UNIX);
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -04001846 args->selected_flavor = RPC_AUTH_UNIX;
Jeff Laytond17540c2013-06-27 15:54:38 -04001847 return nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
1848}
1849
Bryan Schumakerff9099f22012-07-30 16:05:18 -04001850struct dentry *nfs_try_mount(int flags, const char *dev_name,
1851 struct nfs_mount_info *mount_info,
1852 struct nfs_subversion *nfs_mod)
Bryan Schumaker486aa692012-05-10 15:07:39 -04001853{
Bryan Schumaker486aa692012-05-10 15:07:39 -04001854 struct nfs_server *server;
1855
Jeff Laytond17540c2013-06-27 15:54:38 -04001856 if (mount_info->parsed->need_mount)
1857 server = nfs_try_mount_request(mount_info, nfs_mod);
1858 else
1859 server = nfs_mod->rpc_ops->create_server(mount_info, nfs_mod);
Bryan Schumaker486aa692012-05-10 15:07:39 -04001860
Bryan Schumaker486aa692012-05-10 15:07:39 -04001861 if (IS_ERR(server))
1862 return ERR_CAST(server);
1863
Bryan Schumakerab7017a2012-07-30 16:05:16 -04001864 return nfs_fs_mount_common(server, flags, dev_name, mount_info, nfs_mod);
Bryan Schumaker486aa692012-05-10 15:07:39 -04001865}
Bryan Schumakerddda8e02012-07-30 16:05:23 -04001866EXPORT_SYMBOL_GPL(nfs_try_mount);
Bryan Schumaker486aa692012-05-10 15:07:39 -04001867
Rob Landleyc12bace2011-03-09 15:54:13 -06001868/*
1869 * Split "dev_name" into "hostname:export_path".
1870 *
1871 * The leftmost colon demarks the split between the server's hostname
1872 * and the export path. If the hostname starts with a left square
1873 * bracket, then it may contain colons.
1874 *
1875 * Note: caller frees hostname and export path, even on error.
1876 */
1877static int nfs_parse_devname(const char *dev_name,
1878 char **hostname, size_t maxnamlen,
1879 char **export_path, size_t maxpathlen)
Chuck Leverdc045892008-06-23 12:36:37 -04001880{
1881 size_t len;
Rob Landleyc12bace2011-03-09 15:54:13 -06001882 char *end;
Chuck Leverdc045892008-06-23 12:36:37 -04001883
Rob Landleyc12bace2011-03-09 15:54:13 -06001884 /* Is the host name protected with square brakcets? */
1885 if (*dev_name == '[') {
1886 end = strchr(++dev_name, ']');
1887 if (end == NULL || end[1] != ':')
1888 goto out_bad_devname;
Chuck Leverdc045892008-06-23 12:36:37 -04001889
Rob Landleyc12bace2011-03-09 15:54:13 -06001890 len = end - dev_name;
1891 end++;
1892 } else {
1893 char *comma;
1894
1895 end = strchr(dev_name, ':');
1896 if (end == NULL)
1897 goto out_bad_devname;
1898 len = end - dev_name;
1899
1900 /* kill possible hostname list: not supported */
1901 comma = strchr(dev_name, ',');
1902 if (comma != NULL && comma < end)
1903 *comma = 0;
1904 }
1905
Chuck Leverdc045892008-06-23 12:36:37 -04001906 if (len > maxnamlen)
1907 goto out_hostname;
1908
1909 /* N.B. caller will free nfs_server.hostname in all cases */
1910 *hostname = kstrndup(dev_name, len, GFP_KERNEL);
Rob Landleyc12bace2011-03-09 15:54:13 -06001911 if (*hostname == NULL)
Chuck Leverdc045892008-06-23 12:36:37 -04001912 goto out_nomem;
Rob Landleyc12bace2011-03-09 15:54:13 -06001913 len = strlen(++end);
Chuck Leverdc045892008-06-23 12:36:37 -04001914 if (len > maxpathlen)
1915 goto out_path;
Rob Landleyc12bace2011-03-09 15:54:13 -06001916 *export_path = kstrndup(end, len, GFP_KERNEL);
Chuck Leverdc045892008-06-23 12:36:37 -04001917 if (!*export_path)
1918 goto out_nomem;
1919
1920 dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", *export_path);
1921 return 0;
1922
1923out_bad_devname:
1924 dfprintk(MOUNT, "NFS: device name not in host:path format\n");
1925 return -EINVAL;
1926
1927out_nomem:
1928 dfprintk(MOUNT, "NFS: not enough memory to parse device name\n");
1929 return -ENOMEM;
1930
1931out_hostname:
1932 dfprintk(MOUNT, "NFS: server hostname too long\n");
1933 return -ENAMETOOLONG;
1934
1935out_path:
1936 dfprintk(MOUNT, "NFS: export pathname too long\n");
1937 return -ENAMETOOLONG;
1938}
1939
1940/*
David Howells54ceac42006-08-22 20:06:13 -04001941 * Validate the NFS2/NFS3 mount data
1942 * - fills in the mount root filehandle
Chuck Lever136d5582007-07-01 12:13:54 -04001943 *
1944 * For option strings, user space handles the following behaviors:
1945 *
1946 * + DNS: mapping server host name to IP address ("addr=" option)
1947 *
1948 * + failure mode: how to behave if a mount request can't be handled
1949 * immediately ("fg/bg" option)
1950 *
1951 * + retry: how often to retry a mount request ("retry=" option)
1952 *
1953 * + breaking back: trying proto=udp after proto=tcp, v2 after v3,
1954 * mountproto=tcp after mountproto=udp, and so on
David Howellsf7b422b2006-06-09 09:34:33 -04001955 */
Bryan Schumakerd72c7272012-05-10 15:07:41 -04001956static int nfs23_validate_mount_data(void *options,
1957 struct nfs_parsed_mount_data *args,
1958 struct nfs_fh *mntfh,
1959 const char *dev_name)
David Howellsf7b422b2006-06-09 09:34:33 -04001960{
\"Talpey, Thomas\2283f8d2007-09-10 13:43:56 -04001961 struct nfs_mount_data *data = (struct nfs_mount_data *)options;
Chuck Lever4cfd74f2009-09-08 19:49:47 -04001962 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
Trond Myklebust74c98812013-09-07 13:26:57 -04001963 int extra_flags = NFS_MOUNT_LEGACY_INTERFACE;
Chuck Lever136d5582007-07-01 12:13:54 -04001964
Chuck Lever5df36e72007-07-01 12:12:56 -04001965 if (data == NULL)
1966 goto out_no_data;
David Howells54ceac42006-08-22 20:06:13 -04001967
Bryan Schumakerc5afc8d2012-06-08 11:32:56 -04001968 args->version = NFS_DEFAULT_VERSION;
David Howellsf7b422b2006-06-09 09:34:33 -04001969 switch (data->version) {
Chuck Lever5df36e72007-07-01 12:12:56 -04001970 case 1:
1971 data->namlen = 0;
1972 case 2:
1973 data->bsize = 0;
1974 case 3:
1975 if (data->flags & NFS_MOUNT_VER3)
1976 goto out_no_v3;
1977 data->root.size = NFS2_FHSIZE;
1978 memcpy(data->root.data, data->old_root.data, NFS2_FHSIZE);
Trond Myklebust74c98812013-09-07 13:26:57 -04001979 /* Turn off security negotiation */
1980 extra_flags |= NFS_MOUNT_SECFLAVOUR;
Chuck Lever5df36e72007-07-01 12:12:56 -04001981 case 4:
1982 if (data->flags & NFS_MOUNT_SECFLAVOUR)
1983 goto out_no_sec;
1984 case 5:
1985 memset(data->context, 0, sizeof(data->context));
1986 case 6:
Trond Myklebustb7e24452008-06-19 15:21:11 -04001987 if (data->flags & NFS_MOUNT_VER3) {
1988 if (data->root.size > NFS3_FHSIZE || data->root.size == 0)
1989 goto out_invalid_fh;
Chuck Lever5df36e72007-07-01 12:12:56 -04001990 mntfh->size = data->root.size;
Chuck Lever764302c2009-09-08 19:50:03 -04001991 args->version = 3;
1992 } else {
Chuck Lever5df36e72007-07-01 12:12:56 -04001993 mntfh->size = NFS2_FHSIZE;
Chuck Lever764302c2009-09-08 19:50:03 -04001994 args->version = 2;
1995 }
Chuck Lever5df36e72007-07-01 12:12:56 -04001996
Chuck Lever5df36e72007-07-01 12:12:56 -04001997
1998 memcpy(mntfh->data, data->root.data, mntfh->size);
1999 if (mntfh->size < sizeof(mntfh->data))
2000 memset(mntfh->data + mntfh->size, 0,
2001 sizeof(mntfh->data) - mntfh->size);
Chuck Lever6e88e062007-09-24 15:39:50 -04002002
\"Talpey, Thomas\2283f8d2007-09-10 13:43:56 -04002003 /*
2004 * Translate to nfs_parsed_mount_data, which nfs_fill_super
2005 * can deal with.
2006 */
Trond Myklebustff3525a2008-08-15 16:59:14 -04002007 args->flags = data->flags & NFS_MOUNT_FLAGMASK;
Trond Myklebust74c98812013-09-07 13:26:57 -04002008 args->flags |= extra_flags;
\"Talpey, Thomas\2283f8d2007-09-10 13:43:56 -04002009 args->rsize = data->rsize;
2010 args->wsize = data->wsize;
\"Talpey, Thomas\2283f8d2007-09-10 13:43:56 -04002011 args->timeo = data->timeo;
2012 args->retrans = data->retrans;
2013 args->acregmin = data->acregmin;
2014 args->acregmax = data->acregmax;
2015 args->acdirmin = data->acdirmin;
2016 args->acdirmax = data->acdirmax;
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002017 args->need_mount = false;
Chuck Lever4c568012007-12-10 14:59:28 -05002018
Chuck Lever4cfd74f2009-09-08 19:49:47 -04002019 memcpy(sap, &data->addr, sizeof(data->addr));
Chuck Lever4c568012007-12-10 14:59:28 -05002020 args->nfs_server.addrlen = sizeof(data->addr);
Trond Myklebust872ece82012-09-04 11:05:07 -04002021 args->nfs_server.port = ntohs(data->addr.sin_port);
Chuck Lever4cfd74f2009-09-08 19:49:47 -04002022 if (!nfs_verify_server_address(sap))
Chuck Lever4c568012007-12-10 14:59:28 -05002023 goto out_no_address;
2024
\"Talpey, Thomas\2283f8d2007-09-10 13:43:56 -04002025 if (!(data->flags & NFS_MOUNT_TCP))
\"Talpey, Thomas\0896a722007-09-10 13:48:23 -04002026 args->nfs_server.protocol = XPRT_TRANSPORT_UDP;
\"Talpey, Thomas\2283f8d2007-09-10 13:43:56 -04002027 /* N.B. caller will free nfs_server.hostname in all cases */
2028 args->nfs_server.hostname = kstrdup(data->hostname, GFP_KERNEL);
2029 args->namlen = data->namlen;
2030 args->bsize = data->bsize;
Chuck Leverdd07c942008-06-24 16:33:46 -04002031
2032 if (data->flags & NFS_MOUNT_SECFLAVOUR)
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -04002033 args->selected_flavor = data->pseudoflavor;
Trond Myklebust74c98812013-09-07 13:26:57 -04002034 else
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -04002035 args->selected_flavor = RPC_AUTH_UNIX;
Cyrill Gorcunov63649bd2008-04-17 20:42:09 +04002036 if (!args->nfs_server.hostname)
2037 goto out_nomem;
Eric Parisf9c3a382008-03-05 14:20:18 -05002038
Suresh Jayaraman5eebde22010-09-23 08:55:58 -04002039 if (!(data->flags & NFS_MOUNT_NONLM))
2040 args->flags &= ~(NFS_MOUNT_LOCAL_FLOCK|
2041 NFS_MOUNT_LOCAL_FCNTL);
2042 else
2043 args->flags |= (NFS_MOUNT_LOCAL_FLOCK|
2044 NFS_MOUNT_LOCAL_FCNTL);
Eric Parisf9c3a382008-03-05 14:20:18 -05002045 /*
2046 * The legacy version 6 binary mount data from userspace has a
2047 * field used only to transport selinux information into the
2048 * the kernel. To continue to support that functionality we
2049 * have a touch of selinux knowledge here in the NFS code. The
2050 * userspace code converted context=blah to just blah so we are
2051 * converting back to the full string selinux understands.
2052 */
2053 if (data->context[0]){
2054#ifdef CONFIG_SECURITY_SELINUX
2055 int rc;
2056 char *opts_str = kmalloc(sizeof(data->context) + 8, GFP_KERNEL);
2057 if (!opts_str)
2058 return -ENOMEM;
2059 strcpy(opts_str, "context=");
2060 data->context[NFS_MAX_CONTEXT_LEN] = '\0';
2061 strcat(opts_str, &data->context[0]);
2062 rc = security_sb_parse_opts_str(opts_str, &args->lsm_opts);
2063 kfree(opts_str);
2064 if (rc)
2065 return rc;
2066#else
2067 return -EINVAL;
2068#endif
2069 }
2070
Chuck Lever5df36e72007-07-01 12:12:56 -04002071 break;
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002072 default:
2073 return NFS_TEXT_DATA;
David Howellsf7b422b2006-06-09 09:34:33 -04002074 }
David Howells54ceac42006-08-22 20:06:13 -04002075
David Howells54ceac42006-08-22 20:06:13 -04002076 return 0;
Chuck Lever5df36e72007-07-01 12:12:56 -04002077
2078out_no_data:
2079 dfprintk(MOUNT, "NFS: mount program didn't pass any mount data\n");
2080 return -EINVAL;
2081
2082out_no_v3:
2083 dfprintk(MOUNT, "NFS: nfs_mount_data version %d does not support v3\n",
2084 data->version);
2085 return -EINVAL;
2086
2087out_no_sec:
2088 dfprintk(MOUNT, "NFS: nfs_mount_data version supports only AUTH_SYS\n");
2089 return -EINVAL;
2090
Cyrill Gorcunov63649bd2008-04-17 20:42:09 +04002091out_nomem:
2092 dfprintk(MOUNT, "NFS: not enough memory to handle mount options\n");
2093 return -ENOMEM;
2094
Chuck Lever5df36e72007-07-01 12:12:56 -04002095out_no_address:
2096 dfprintk(MOUNT, "NFS: mount program didn't pass remote address\n");
2097 return -EINVAL;
2098
2099out_invalid_fh:
2100 dfprintk(MOUNT, "NFS: invalid root filehandle\n");
2101 return -EINVAL;
David Howells54ceac42006-08-22 20:06:13 -04002102}
2103
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002104#if IS_ENABLED(CONFIG_NFS_V4)
Bryan Schumakerd72c7272012-05-10 15:07:41 -04002105static int nfs_validate_mount_data(struct file_system_type *fs_type,
2106 void *options,
2107 struct nfs_parsed_mount_data *args,
2108 struct nfs_fh *mntfh,
2109 const char *dev_name)
2110{
2111 if (fs_type == &nfs_fs_type)
2112 return nfs23_validate_mount_data(options, args, mntfh, dev_name);
2113 return nfs4_validate_mount_data(options, args, dev_name);
2114}
2115#else
2116static int nfs_validate_mount_data(struct file_system_type *fs_type,
2117 void *options,
2118 struct nfs_parsed_mount_data *args,
2119 struct nfs_fh *mntfh,
2120 const char *dev_name)
2121{
2122 return nfs23_validate_mount_data(options, args, mntfh, dev_name);
2123}
2124#endif
2125
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002126static int nfs_validate_text_mount_data(void *options,
2127 struct nfs_parsed_mount_data *args,
2128 const char *dev_name)
2129{
2130 int port = 0;
2131 int max_namelen = PAGE_SIZE;
2132 int max_pathlen = NFS_MAXPATHLEN;
2133 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
2134
2135 if (nfs_parse_mount_options((char *)options, args) == 0)
2136 return -EINVAL;
2137
2138 if (!nfs_verify_server_address(sap))
2139 goto out_no_address;
2140
2141 if (args->version == 4) {
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002142#if IS_ENABLED(CONFIG_NFS_V4)
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002143 port = NFS_PORT;
2144 max_namelen = NFS4_MAXNAMLEN;
2145 max_pathlen = NFS4_MAXPATHLEN;
2146 nfs_validate_transport_protocol(args);
Trond Myklebust6da1a032013-08-07 12:30:52 -04002147 if (args->nfs_server.protocol == XPRT_TRANSPORT_UDP)
2148 goto out_invalid_transport_udp;
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002149 nfs4_validate_mount_flags(args);
2150#else
2151 goto out_v4_not_compiled;
2152#endif /* CONFIG_NFS_V4 */
2153 } else
2154 nfs_set_mount_transport_protocol(args);
2155
2156 nfs_set_port(sap, &args->nfs_server.port, port);
2157
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002158 return nfs_parse_devname(dev_name,
2159 &args->nfs_server.hostname,
2160 max_namelen,
2161 &args->nfs_server.export_path,
2162 max_pathlen);
2163
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002164#if !IS_ENABLED(CONFIG_NFS_V4)
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002165out_v4_not_compiled:
2166 dfprintk(MOUNT, "NFS: NFSv4 is not compiled into kernel\n");
2167 return -EPROTONOSUPPORT;
Trond Myklebust6da1a032013-08-07 12:30:52 -04002168#else
2169out_invalid_transport_udp:
2170 dfprintk(MOUNT, "NFSv4: Unsupported transport protocol udp\n");
2171 return -EINVAL;
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002172#endif /* !CONFIG_NFS_V4 */
2173
2174out_no_address:
2175 dfprintk(MOUNT, "NFS: mount program didn't pass remote address\n");
2176 return -EINVAL;
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002177}
2178
Scott Mayhew71a6ec82014-08-04 17:37:27 -04002179#define NFS_REMOUNT_CMP_FLAGMASK ~(NFS_MOUNT_INTR \
Scott Mayhewc8e47022014-05-29 16:41:22 -04002180 | NFS_MOUNT_SECURE \
2181 | NFS_MOUNT_TCP \
2182 | NFS_MOUNT_VER3 \
2183 | NFS_MOUNT_KERBEROS \
2184 | NFS_MOUNT_NONLM \
2185 | NFS_MOUNT_BROKEN_SUID \
2186 | NFS_MOUNT_STRICTLOCK \
Scott Mayhewc8e47022014-05-29 16:41:22 -04002187 | NFS_MOUNT_LEGACY_INTERFACE)
2188
Scott Mayhew71a6ec82014-08-04 17:37:27 -04002189#define NFS_MOUNT_CMP_FLAGMASK (NFS_REMOUNT_CMP_FLAGMASK & \
2190 ~(NFS_MOUNT_UNSHARED | NFS_MOUNT_NORESVPORT))
2191
Jeff Layton48b605f2008-06-10 15:38:39 -04002192static int
2193nfs_compare_remount_data(struct nfs_server *nfss,
2194 struct nfs_parsed_mount_data *data)
2195{
Scott Mayhew71a6ec82014-08-04 17:37:27 -04002196 if ((data->flags ^ nfss->flags) & NFS_REMOUNT_CMP_FLAGMASK ||
Jeff Layton48b605f2008-06-10 15:38:39 -04002197 data->rsize != nfss->rsize ||
2198 data->wsize != nfss->wsize ||
Jeff Layton57acc402013-10-18 10:03:37 -04002199 data->version != nfss->nfs_client->rpc_ops->version ||
2200 data->minorversion != nfss->nfs_client->cl_minorversion ||
Jeff Layton48b605f2008-06-10 15:38:39 -04002201 data->retrans != nfss->client->cl_timeout->to_retries ||
Benjamin Coddington09a330f2014-12-05 21:52:49 -05002202 !nfs_auth_info_match(&data->auth_info, nfss->client->cl_auth->au_flavor) ||
Jeff Layton48b605f2008-06-10 15:38:39 -04002203 data->acregmin != nfss->acregmin / HZ ||
2204 data->acregmax != nfss->acregmax / HZ ||
2205 data->acdirmin != nfss->acdirmin / HZ ||
2206 data->acdirmax != nfss->acdirmax / HZ ||
2207 data->timeo != (10U * nfss->client->cl_timeout->to_initval / HZ) ||
Trond Myklebustbcd2ea12009-10-06 15:41:22 -04002208 data->nfs_server.port != nfss->port ||
Jeff Layton48b605f2008-06-10 15:38:39 -04002209 data->nfs_server.addrlen != nfss->nfs_client->cl_addrlen ||
Stefan Richtera1be9ee2009-10-12 11:26:12 -04002210 !rpc_cmp_addr((struct sockaddr *)&data->nfs_server.address,
2211 (struct sockaddr *)&nfss->nfs_client->cl_addr))
Jeff Layton48b605f2008-06-10 15:38:39 -04002212 return -EINVAL;
2213
2214 return 0;
2215}
2216
Bryan Schumakerfbdefd62012-07-16 16:39:20 -04002217int
Jeff Layton48b605f2008-06-10 15:38:39 -04002218nfs_remount(struct super_block *sb, int *flags, char *raw_data)
2219{
2220 int error;
2221 struct nfs_server *nfss = sb->s_fs_info;
2222 struct nfs_parsed_mount_data *data;
2223 struct nfs_mount_data *options = (struct nfs_mount_data *)raw_data;
2224 struct nfs4_mount_data *options4 = (struct nfs4_mount_data *)raw_data;
Trond Myklebustcd100722008-06-17 16:12:00 -04002225 u32 nfsvers = nfss->nfs_client->rpc_ops->version;
Jeff Layton48b605f2008-06-10 15:38:39 -04002226
Theodore Ts'o02b99842014-03-13 10:14:33 -04002227 sync_filesystem(sb);
2228
Jeff Layton48b605f2008-06-10 15:38:39 -04002229 /*
2230 * Userspace mount programs that send binary options generally send
2231 * them populated with default values. We have no way to know which
2232 * ones were explicitly specified. Fall back to legacy behavior and
2233 * just return success.
2234 */
Marc Zyngier31c94462008-07-17 13:21:55 +02002235 if ((nfsvers == 4 && (!options4 || options4->version == 1)) ||
2236 (nfsvers <= 3 && (!options || (options->version >= 1 &&
2237 options->version <= 6))))
Jeff Layton48b605f2008-06-10 15:38:39 -04002238 return 0;
2239
2240 data = kzalloc(sizeof(*data), GFP_KERNEL);
2241 if (data == NULL)
2242 return -ENOMEM;
2243
2244 /* fill out struct with values from existing mount */
2245 data->flags = nfss->flags;
2246 data->rsize = nfss->rsize;
2247 data->wsize = nfss->wsize;
2248 data->retrans = nfss->client->cl_timeout->to_retries;
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -04002249 data->selected_flavor = nfss->client->cl_auth->au_flavor;
Jeff Layton48b605f2008-06-10 15:38:39 -04002250 data->acregmin = nfss->acregmin / HZ;
2251 data->acregmax = nfss->acregmax / HZ;
2252 data->acdirmin = nfss->acdirmin / HZ;
2253 data->acdirmax = nfss->acdirmax / HZ;
2254 data->timeo = 10U * nfss->client->cl_timeout->to_initval / HZ;
Trond Myklebustbcd2ea12009-10-06 15:41:22 -04002255 data->nfs_server.port = nfss->port;
Jeff Layton48b605f2008-06-10 15:38:39 -04002256 data->nfs_server.addrlen = nfss->nfs_client->cl_addrlen;
Jeff Layton57acc402013-10-18 10:03:37 -04002257 data->version = nfsvers;
2258 data->minorversion = nfss->nfs_client->cl_minorversion;
Mateusz Guzika9147222014-06-10 12:44:12 +02002259 data->net = current->nsproxy->net_ns;
Jeff Layton48b605f2008-06-10 15:38:39 -04002260 memcpy(&data->nfs_server.address, &nfss->nfs_client->cl_addr,
2261 data->nfs_server.addrlen);
2262
2263 /* overwrite those values with any that were specified */
Jeff Layton19669032013-10-21 09:52:19 -04002264 error = -EINVAL;
2265 if (!nfs_parse_mount_options((char *)options, data))
Jeff Layton48b605f2008-06-10 15:38:39 -04002266 goto out;
2267
Jeff Layton26c4c172011-04-27 11:49:09 -04002268 /*
2269 * noac is a special case. It implies -o sync, but that's not
2270 * necessarily reflected in the mtab options. do_remount_sb
2271 * will clear MS_SYNCHRONOUS if -o sync wasn't specified in the
2272 * remount options, so we have to explicitly reset it.
2273 */
2274 if (data->flags & NFS_MOUNT_NOAC)
2275 *flags |= MS_SYNCHRONOUS;
2276
Jeff Layton48b605f2008-06-10 15:38:39 -04002277 /* compare new mount options with old ones */
2278 error = nfs_compare_remount_data(nfss, data);
2279out:
2280 kfree(data);
2281 return error;
2282}
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002283EXPORT_SYMBOL_GPL(nfs_remount);
Jeff Layton48b605f2008-06-10 15:38:39 -04002284
David Howells54ceac42006-08-22 20:06:13 -04002285/*
2286 * Initialise the common bits of the superblock
2287 */
Bryan Schumakerfbdefd62012-07-16 16:39:20 -04002288inline void nfs_initialise_sb(struct super_block *sb)
David Howells54ceac42006-08-22 20:06:13 -04002289{
2290 struct nfs_server *server = NFS_SB(sb);
2291
2292 sb->s_magic = NFS_SUPER_MAGIC;
2293
2294 /* We probably want something more informative here */
2295 snprintf(sb->s_id, sizeof(sb->s_id),
Vivek Trivedi5a7c9ee2012-03-15 23:58:52 +05302296 "%u:%u", MAJOR(sb->s_dev), MINOR(sb->s_dev));
David Howells54ceac42006-08-22 20:06:13 -04002297
2298 if (sb->s_blocksize == 0)
2299 sb->s_blocksize = nfs_block_bits(server->wsize,
2300 &sb->s_blocksize_bits);
2301
Jens Axboe32a88aa2009-09-16 15:02:33 +02002302 sb->s_bdi = &server->backing_dev_info;
2303
David Howells54ceac42006-08-22 20:06:13 -04002304 nfs_super_set_maxbytes(sb, server->maxfilesize);
2305}
2306
2307/*
2308 * Finish setting up an NFS2/3 superblock
2309 */
Bryan Schumakerfbdefd62012-07-16 16:39:20 -04002310void nfs_fill_super(struct super_block *sb, struct nfs_mount_info *mount_info)
David Howells54ceac42006-08-22 20:06:13 -04002311{
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002312 struct nfs_parsed_mount_data *data = mount_info->parsed;
David Howells54ceac42006-08-22 20:06:13 -04002313 struct nfs_server *server = NFS_SB(sb);
2314
2315 sb->s_blocksize_bits = 0;
2316 sb->s_blocksize = 0;
Bryan Schumaker6a744902012-07-30 16:05:20 -04002317 sb->s_xattr = server->nfs_client->cl_nfs_mod->xattr;
2318 sb->s_op = server->nfs_client->cl_nfs_mod->sops;
2319 if (data && data->bsize)
David Howells54ceac42006-08-22 20:06:13 -04002320 sb->s_blocksize = nfs_block_size(data->bsize, &sb->s_blocksize_bits);
2321
Bryan Schumaker6a744902012-07-30 16:05:20 -04002322 if (server->nfs_client->rpc_ops->version != 2) {
David Howells54ceac42006-08-22 20:06:13 -04002323 /* The VFS shouldn't apply the umask to mode bits. We will do
2324 * so ourselves when necessary.
2325 */
2326 sb->s_flags |= MS_POSIXACL;
2327 sb->s_time_gran = 1;
2328 }
2329
David Howells54ceac42006-08-22 20:06:13 -04002330 nfs_initialise_sb(sb);
2331}
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002332EXPORT_SYMBOL_GPL(nfs_fill_super);
David Howells54ceac42006-08-22 20:06:13 -04002333
2334/*
Bryan Schumaker3cadf4b2012-07-16 16:39:19 -04002335 * Finish setting up a cloned NFS2/3/4 superblock
David Howells54ceac42006-08-22 20:06:13 -04002336 */
Bryan Schumakerfbdefd62012-07-16 16:39:20 -04002337void nfs_clone_super(struct super_block *sb, struct nfs_mount_info *mount_info)
David Howells54ceac42006-08-22 20:06:13 -04002338{
Bryan Schumaker8c958e02012-05-10 15:07:35 -04002339 const struct super_block *old_sb = mount_info->cloned->sb;
David Howells54ceac42006-08-22 20:06:13 -04002340 struct nfs_server *server = NFS_SB(sb);
2341
2342 sb->s_blocksize_bits = old_sb->s_blocksize_bits;
2343 sb->s_blocksize = old_sb->s_blocksize;
2344 sb->s_maxbytes = old_sb->s_maxbytes;
Bryan Schumaker3cadf4b2012-07-16 16:39:19 -04002345 sb->s_xattr = old_sb->s_xattr;
2346 sb->s_op = old_sb->s_op;
2347 sb->s_time_gran = 1;
David Howells54ceac42006-08-22 20:06:13 -04002348
Bryan Schumaker3cadf4b2012-07-16 16:39:19 -04002349 if (server->nfs_client->rpc_ops->version != 2) {
David Howells54ceac42006-08-22 20:06:13 -04002350 /* The VFS shouldn't apply the umask to mode bits. We will do
2351 * so ourselves when necessary.
2352 */
2353 sb->s_flags |= MS_POSIXACL;
David Howells54ceac42006-08-22 20:06:13 -04002354 }
2355
David Howells54ceac42006-08-22 20:06:13 -04002356 nfs_initialise_sb(sb);
2357}
2358
Trond Myklebust275a5d22007-05-16 16:53:28 -04002359static int nfs_compare_mount_options(const struct super_block *s, const struct nfs_server *b, int flags)
2360{
2361 const struct nfs_server *a = s->s_fs_info;
2362 const struct rpc_clnt *clnt_a = a->client;
2363 const struct rpc_clnt *clnt_b = b->client;
2364
2365 if ((s->s_flags & NFS_MS_MASK) != (flags & NFS_MS_MASK))
2366 goto Ebusy;
2367 if (a->nfs_client != b->nfs_client)
2368 goto Ebusy;
Trond Myklebust0aea92b2013-09-07 18:28:10 -04002369 if ((a->flags ^ b->flags) & NFS_MOUNT_CMP_FLAGMASK)
Trond Myklebust275a5d22007-05-16 16:53:28 -04002370 goto Ebusy;
2371 if (a->wsize != b->wsize)
2372 goto Ebusy;
2373 if (a->rsize != b->rsize)
2374 goto Ebusy;
2375 if (a->acregmin != b->acregmin)
2376 goto Ebusy;
2377 if (a->acregmax != b->acregmax)
2378 goto Ebusy;
2379 if (a->acdirmin != b->acdirmin)
2380 goto Ebusy;
2381 if (a->acdirmax != b->acdirmax)
2382 goto Ebusy;
Weston Andros Adamson5837f6d2013-10-18 15:15:18 -04002383 if (b->auth_info.flavor_len > 0 &&
Trond Myklebust0aea92b2013-09-07 18:28:10 -04002384 clnt_a->cl_auth->au_flavor != clnt_b->cl_auth->au_flavor)
Trond Myklebust275a5d22007-05-16 16:53:28 -04002385 goto Ebusy;
Trond Myklebuste89a5a42007-08-31 10:45:17 -04002386 return 1;
Trond Myklebust275a5d22007-05-16 16:53:28 -04002387Ebusy:
Trond Myklebuste89a5a42007-08-31 10:45:17 -04002388 return 0;
2389}
2390
2391struct nfs_sb_mountdata {
2392 struct nfs_server *server;
2393 int mntflags;
2394};
2395
2396static int nfs_set_super(struct super_block *s, void *data)
2397{
2398 struct nfs_sb_mountdata *sb_mntdata = data;
2399 struct nfs_server *server = sb_mntdata->server;
2400 int ret;
2401
2402 s->s_flags = sb_mntdata->mntflags;
2403 s->s_fs_info = server;
Al Viro8b244ff2010-12-18 11:29:39 -05002404 s->s_d_op = server->nfs_client->rpc_ops->dentry_ops;
Trond Myklebuste89a5a42007-08-31 10:45:17 -04002405 ret = set_anon_super(s, server);
2406 if (ret == 0)
2407 server->s_dev = s->s_dev;
2408 return ret;
2409}
2410
Chuck Leverfd00a8f2007-12-10 14:57:38 -05002411static int nfs_compare_super_address(struct nfs_server *server1,
2412 struct nfs_server *server2)
2413{
2414 struct sockaddr *sap1, *sap2;
J. Bruce Fields7e3fcf62016-05-03 15:16:02 -04002415 struct rpc_xprt *xprt1 = server1->client->cl_xprt;
2416 struct rpc_xprt *xprt2 = server2->client->cl_xprt;
2417
2418 if (!net_eq(xprt1->xprt_net, xprt2->xprt_net))
2419 return 0;
Chuck Leverfd00a8f2007-12-10 14:57:38 -05002420
2421 sap1 = (struct sockaddr *)&server1->nfs_client->cl_addr;
2422 sap2 = (struct sockaddr *)&server2->nfs_client->cl_addr;
2423
2424 if (sap1->sa_family != sap2->sa_family)
2425 return 0;
2426
2427 switch (sap1->sa_family) {
2428 case AF_INET: {
2429 struct sockaddr_in *sin1 = (struct sockaddr_in *)sap1;
2430 struct sockaddr_in *sin2 = (struct sockaddr_in *)sap2;
2431 if (sin1->sin_addr.s_addr != sin2->sin_addr.s_addr)
2432 return 0;
2433 if (sin1->sin_port != sin2->sin_port)
2434 return 0;
2435 break;
2436 }
2437 case AF_INET6: {
2438 struct sockaddr_in6 *sin1 = (struct sockaddr_in6 *)sap1;
2439 struct sockaddr_in6 *sin2 = (struct sockaddr_in6 *)sap2;
2440 if (!ipv6_addr_equal(&sin1->sin6_addr, &sin2->sin6_addr))
2441 return 0;
2442 if (sin1->sin6_port != sin2->sin6_port)
2443 return 0;
2444 break;
2445 }
2446 default:
2447 return 0;
2448 }
2449
2450 return 1;
2451}
2452
Trond Myklebuste89a5a42007-08-31 10:45:17 -04002453static int nfs_compare_super(struct super_block *sb, void *data)
2454{
2455 struct nfs_sb_mountdata *sb_mntdata = data;
2456 struct nfs_server *server = sb_mntdata->server, *old = NFS_SB(sb);
2457 int mntflags = sb_mntdata->mntflags;
2458
Chuck Leverfd00a8f2007-12-10 14:57:38 -05002459 if (!nfs_compare_super_address(old, server))
Trond Myklebuste89a5a42007-08-31 10:45:17 -04002460 return 0;
2461 /* Note: NFS_MOUNT_UNSHARED == NFS4_MOUNT_UNSHARED */
2462 if (old->flags & NFS_MOUNT_UNSHARED)
2463 return 0;
2464 if (memcmp(&old->fsid, &server->fsid, sizeof(old->fsid)) != 0)
2465 return 0;
2466 return nfs_compare_mount_options(sb, server, mntflags);
Trond Myklebust275a5d22007-05-16 16:53:28 -04002467}
2468
Trond Myklebust39ffb922012-05-16 10:21:30 -07002469#ifdef CONFIG_NFS_FSCACHE
Bryan Schumaker2311b942012-05-10 15:07:32 -04002470static void nfs_get_cache_cookie(struct super_block *sb,
2471 struct nfs_parsed_mount_data *parsed,
2472 struct nfs_clone_mount *cloned)
2473{
Trond Myklebustc4271c62012-12-21 11:02:32 -05002474 struct nfs_server *nfss = NFS_SB(sb);
Bryan Schumaker2311b942012-05-10 15:07:32 -04002475 char *uniq = NULL;
2476 int ulen = 0;
2477
Trond Myklebustc4271c62012-12-21 11:02:32 -05002478 nfss->fscache_key = NULL;
2479 nfss->fscache = NULL;
2480
2481 if (parsed) {
2482 if (!(parsed->options & NFS_OPTION_FSCACHE))
2483 return;
2484 if (parsed->fscache_uniq) {
2485 uniq = parsed->fscache_uniq;
2486 ulen = strlen(parsed->fscache_uniq);
2487 }
Bryan Schumaker2311b942012-05-10 15:07:32 -04002488 } else if (cloned) {
2489 struct nfs_server *mnt_s = NFS_SB(cloned->sb);
Trond Myklebustc4271c62012-12-21 11:02:32 -05002490 if (!(mnt_s->options & NFS_OPTION_FSCACHE))
2491 return;
Bryan Schumaker2311b942012-05-10 15:07:32 -04002492 if (mnt_s->fscache_key) {
2493 uniq = mnt_s->fscache_key->key.uniquifier;
2494 ulen = mnt_s->fscache_key->key.uniq_len;
2495 };
Trond Myklebustc4271c62012-12-21 11:02:32 -05002496 } else
2497 return;
Bryan Schumaker2311b942012-05-10 15:07:32 -04002498
2499 nfs_fscache_get_super_cookie(sb, uniq, ulen);
2500}
Trond Myklebust39ffb922012-05-16 10:21:30 -07002501#else
2502static void nfs_get_cache_cookie(struct super_block *sb,
2503 struct nfs_parsed_mount_data *parsed,
2504 struct nfs_clone_mount *cloned)
2505{
2506}
2507#endif
Bryan Schumaker2311b942012-05-10 15:07:32 -04002508
Miklos Szeredifa799752008-04-30 00:54:33 -07002509static int nfs_bdi_register(struct nfs_server *server)
2510{
2511 return bdi_register_dev(&server->backing_dev_info, server->s_dev);
2512}
2513
Bryan Schumakerfbdefd62012-07-16 16:39:20 -04002514int nfs_set_sb_security(struct super_block *s, struct dentry *mntroot,
2515 struct nfs_mount_info *mount_info)
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002516{
David Quigleyaa9c2662013-05-22 12:50:44 -04002517 int error;
2518 unsigned long kflags = 0, kflags_out = 0;
2519 if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL)
2520 kflags |= SECURITY_LSM_NATIVE_LABELS;
2521
2522 error = security_sb_set_mnt_opts(s, &mount_info->parsed->lsm_opts,
2523 kflags, &kflags_out);
2524 if (error)
2525 goto err;
2526
2527 if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL &&
2528 !(kflags_out & SECURITY_LSM_NATIVE_LABELS))
2529 NFS_SB(s)->caps &= ~NFS_CAP_SECURITY_LABEL;
2530err:
2531 return error;
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002532}
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002533EXPORT_SYMBOL_GPL(nfs_set_sb_security);
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002534
Bryan Schumakerfbdefd62012-07-16 16:39:20 -04002535int nfs_clone_sb_security(struct super_block *s, struct dentry *mntroot,
2536 struct nfs_mount_info *mount_info)
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002537{
2538 /* clone any lsm security options from the parent to the new sb */
David Howells2b0143b2015-03-17 22:25:59 +00002539 if (d_inode(mntroot)->i_op != NFS_SB(s)->nfs_client->rpc_ops->dir_inode_ops)
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002540 return -ESTALE;
Jeff Layton094f7b62013-04-01 08:14:24 -04002541 return security_sb_clone_mnt_opts(mount_info->cloned->sb, s);
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002542}
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002543EXPORT_SYMBOL_GPL(nfs_clone_sb_security);
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002544
Bryan Schumakerab7017a2012-07-30 16:05:16 -04002545struct dentry *nfs_fs_mount_common(struct nfs_server *server,
Bryan Schumakerfbdefd62012-07-16 16:39:20 -04002546 int flags, const char *dev_name,
Bryan Schumakerab7017a2012-07-30 16:05:16 -04002547 struct nfs_mount_info *mount_info,
2548 struct nfs_subversion *nfs_mod)
David Howells54ceac42006-08-22 20:06:13 -04002549{
David Howells54ceac42006-08-22 20:06:13 -04002550 struct super_block *s;
Al Viro01194982011-03-16 07:25:36 -04002551 struct dentry *mntroot = ERR_PTR(-ENOMEM);
Trond Myklebust75180df2007-05-16 16:53:28 -04002552 int (*compare_super)(struct super_block *, void *) = nfs_compare_super;
Trond Myklebuste89a5a42007-08-31 10:45:17 -04002553 struct nfs_sb_mountdata sb_mntdata = {
2554 .mntflags = flags,
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002555 .server = server,
Trond Myklebuste89a5a42007-08-31 10:45:17 -04002556 };
Al Viro01194982011-03-16 07:25:36 -04002557 int error;
David Howells54ceac42006-08-22 20:06:13 -04002558
Trond Myklebust75180df2007-05-16 16:53:28 -04002559 if (server->flags & NFS_MOUNT_UNSHARED)
2560 compare_super = NULL;
2561
Sachin Prabhufb2088c2011-08-01 12:10:12 +01002562 /* -o noac implies -o sync */
2563 if (server->flags & NFS_MOUNT_NOAC)
2564 sb_mntdata.mntflags |= MS_SYNCHRONOUS;
2565
Scott Mayhewe890db02013-07-31 10:01:41 -04002566 if (mount_info->cloned != NULL && mount_info->cloned->sb != NULL)
2567 if (mount_info->cloned->sb->s_flags & MS_SYNCHRONOUS)
2568 sb_mntdata.mntflags |= MS_SYNCHRONOUS;
2569
David Howells54ceac42006-08-22 20:06:13 -04002570 /* Get a superblock - note that we may end up sharing one that already exists */
Bryan Schumakerab7017a2012-07-30 16:05:16 -04002571 s = sget(nfs_mod->nfs_fs, compare_super, nfs_set_super, flags, &sb_mntdata);
Trond Myklebust816724e2006-06-24 08:41:41 -04002572 if (IS_ERR(s)) {
Al Viro01194982011-03-16 07:25:36 -04002573 mntroot = ERR_CAST(s);
David Howells54ceac42006-08-22 20:06:13 -04002574 goto out_err_nosb;
Trond Myklebust816724e2006-06-24 08:41:41 -04002575 }
2576
David Howells54ceac42006-08-22 20:06:13 -04002577 if (s->s_fs_info != server) {
2578 nfs_free_server(server);
2579 server = NULL;
Miklos Szeredifa799752008-04-30 00:54:33 -07002580 } else {
2581 error = nfs_bdi_register(server);
Al Viro01194982011-03-16 07:25:36 -04002582 if (error) {
2583 mntroot = ERR_PTR(error);
Christoph Hellwig7b14a212015-01-14 10:42:39 +01002584 goto error_splat_super;
Al Viro01194982011-03-16 07:25:36 -04002585 }
Chuck Leverce6cda12013-10-17 14:12:56 -04002586 server->super = s;
David Howellsf7b422b2006-06-09 09:34:33 -04002587 }
David Howells54ceac42006-08-22 20:06:13 -04002588
2589 if (!s->s_root) {
2590 /* initial superblock/root creation */
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002591 mount_info->fill_super(s, mount_info);
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002592 nfs_get_cache_cookie(s, mount_info->parsed, mount_info->cloned);
David Howells54ceac42006-08-22 20:06:13 -04002593 }
2594
Bryan Schumaker87c70832012-05-10 15:07:43 -04002595 mntroot = nfs_get_root(s, mount_info->mntfh, dev_name);
Al Viro01194982011-03-16 07:25:36 -04002596 if (IS_ERR(mntroot))
David Howells54ceac42006-08-22 20:06:13 -04002597 goto error_splat_super;
David Howells54ceac42006-08-22 20:06:13 -04002598
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002599 error = mount_info->set_security(s, mntroot, mount_info);
Eric Parisf9c3a382008-03-05 14:20:18 -05002600 if (error)
2601 goto error_splat_root;
2602
David Howellsf7b422b2006-06-09 09:34:33 -04002603 s->s_flags |= MS_ACTIVE;
Chuck Lever06559602007-07-01 12:12:35 -04002604
2605out:
Al Viro01194982011-03-16 07:25:36 -04002606 return mntroot;
Trond Myklebust816724e2006-06-24 08:41:41 -04002607
David Howells54ceac42006-08-22 20:06:13 -04002608out_err_nosb:
2609 nfs_free_server(server);
Chuck Lever06559602007-07-01 12:12:35 -04002610 goto out;
David Howells54ceac42006-08-22 20:06:13 -04002611
Eric Parisf9c3a382008-03-05 14:20:18 -05002612error_splat_root:
2613 dput(mntroot);
Al Viro01194982011-03-16 07:25:36 -04002614 mntroot = ERR_PTR(error);
David Howells54ceac42006-08-22 20:06:13 -04002615error_splat_super:
Al Viro6f5bbff2009-05-06 01:34:22 -04002616 deactivate_locked_super(s);
Chuck Lever06559602007-07-01 12:12:35 -04002617 goto out;
David Howellsf7b422b2006-06-09 09:34:33 -04002618}
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002619EXPORT_SYMBOL_GPL(nfs_fs_mount_common);
David Howellsf7b422b2006-06-09 09:34:33 -04002620
Bryan Schumakerfbdefd62012-07-16 16:39:20 -04002621struct dentry *nfs_fs_mount(struct file_system_type *fs_type,
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002622 int flags, const char *dev_name, void *raw_data)
2623{
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002624 struct nfs_mount_info mount_info = {
2625 .fill_super = nfs_fill_super,
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002626 .set_security = nfs_set_sb_security,
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002627 };
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002628 struct dentry *mntroot = ERR_PTR(-ENOMEM);
Bryan Schumakerab7017a2012-07-30 16:05:16 -04002629 struct nfs_subversion *nfs_mod;
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002630 int error;
2631
Bryan Schumaker46058d42012-05-10 15:07:42 -04002632 mount_info.parsed = nfs_alloc_parsed_mount_data();
Bryan Schumaker87c70832012-05-10 15:07:43 -04002633 mount_info.mntfh = nfs_alloc_fhandle();
2634 if (mount_info.parsed == NULL || mount_info.mntfh == NULL)
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002635 goto out;
2636
2637 /* Validate the mount data */
Bryan Schumaker87c70832012-05-10 15:07:43 -04002638 error = nfs_validate_mount_data(fs_type, raw_data, mount_info.parsed, mount_info.mntfh, dev_name);
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002639 if (error == NFS_TEXT_DATA)
Bryan Schumaker46058d42012-05-10 15:07:42 -04002640 error = nfs_validate_text_mount_data(raw_data, mount_info.parsed, dev_name);
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002641 if (error < 0) {
2642 mntroot = ERR_PTR(error);
2643 goto out;
2644 }
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002645
Bryan Schumakerab7017a2012-07-30 16:05:16 -04002646 nfs_mod = get_nfs_version(mount_info.parsed->version);
2647 if (IS_ERR(nfs_mod)) {
2648 mntroot = ERR_CAST(nfs_mod);
2649 goto out;
2650 }
2651
Bryan Schumakerff9099f22012-07-30 16:05:18 -04002652 mntroot = nfs_mod->rpc_ops->try_mount(flags, dev_name, &mount_info, nfs_mod);
Bryan Schumakerab7017a2012-07-30 16:05:16 -04002653
2654 put_nfs_version(nfs_mod);
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002655out:
Bryan Schumaker46058d42012-05-10 15:07:42 -04002656 nfs_free_parsed_mount_data(mount_info.parsed);
Bryan Schumaker87c70832012-05-10 15:07:43 -04002657 nfs_free_fhandle(mount_info.mntfh);
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002658 return mntroot;
2659}
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002660EXPORT_SYMBOL_GPL(nfs_fs_mount);
Bryan Schumakerc40f8d12012-05-10 15:07:34 -04002661
David Howells54ceac42006-08-22 20:06:13 -04002662/*
2663 * Destroy an NFS2/3 superblock
2664 */
Bryan Schumakerfbdefd62012-07-16 16:39:20 -04002665void nfs_kill_super(struct super_block *s)
David Howellsf7b422b2006-06-09 09:34:33 -04002666{
2667 struct nfs_server *server = NFS_SB(s);
Christoph Hellwig7b14a212015-01-14 10:42:39 +01002668 dev_t dev = s->s_dev;
David Howellsf7b422b2006-06-09 09:34:33 -04002669
Christoph Hellwig7b14a212015-01-14 10:42:39 +01002670 generic_shutdown_super(s);
2671
David Howells08734042009-04-03 16:42:42 +01002672 nfs_fscache_release_super_cookie(s);
Christoph Hellwig7b14a212015-01-14 10:42:39 +01002673
David Howells54ceac42006-08-22 20:06:13 -04002674 nfs_free_server(server);
Christoph Hellwig7b14a212015-01-14 10:42:39 +01002675 free_anon_bdev(dev);
David Howellsf7b422b2006-06-09 09:34:33 -04002676}
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002677EXPORT_SYMBOL_GPL(nfs_kill_super);
David Howellsf7b422b2006-06-09 09:34:33 -04002678
David Howells54ceac42006-08-22 20:06:13 -04002679/*
Bryan Schumaker8c958e02012-05-10 15:07:35 -04002680 * Clone an NFS2/3/4 server record on xdev traversal (FSID-change)
David Howells54ceac42006-08-22 20:06:13 -04002681 */
Stanislav Kinsbursky3dd4f8ef2012-10-02 14:19:04 +04002682static struct dentry *
Bryan Schumakere8f25e62012-07-30 16:05:17 -04002683nfs_xdev_mount(struct file_system_type *fs_type, int flags,
2684 const char *dev_name, void *raw_data)
David Howellsf7b422b2006-06-09 09:34:33 -04002685{
Bryan Schumakere8f25e62012-07-30 16:05:17 -04002686 struct nfs_clone_mount *data = raw_data;
2687 struct nfs_mount_info mount_info = {
2688 .fill_super = nfs_clone_super,
2689 .set_security = nfs_clone_sb_security,
2690 .cloned = data,
2691 };
David Howells54ceac42006-08-22 20:06:13 -04002692 struct nfs_server *server;
Bryan Schumaker3d176e32012-05-10 15:07:36 -04002693 struct dentry *mntroot = ERR_PTR(-ENOMEM);
Bryan Schumakerab7017a2012-07-30 16:05:16 -04002694 struct nfs_subversion *nfs_mod = NFS_SB(data->sb)->nfs_client->cl_nfs_mod;
David Howells54ceac42006-08-22 20:06:13 -04002695
Trond Myklebustdee972b2013-01-16 15:05:44 -05002696 dprintk("--> nfs_xdev_mount()\n");
David Howells54ceac42006-08-22 20:06:13 -04002697
Bryan Schumakere8f25e62012-07-30 16:05:17 -04002698 mount_info.mntfh = mount_info.cloned->fh;
Bryan Schumaker87c70832012-05-10 15:07:43 -04002699
David Howells54ceac42006-08-22 20:06:13 -04002700 /* create a new volume representation */
Bryan Schumaker1179acc2012-07-30 16:05:19 -04002701 server = nfs_mod->rpc_ops->clone_server(NFS_SB(data->sb), data->fh, data->fattr, data->authflavor);
David Howells54ceac42006-08-22 20:06:13 -04002702
Trond Myklebustdee972b2013-01-16 15:05:44 -05002703 if (IS_ERR(server))
2704 mntroot = ERR_CAST(server);
2705 else
2706 mntroot = nfs_fs_mount_common(server, flags,
2707 dev_name, &mount_info, nfs_mod);
2708
2709 dprintk("<-- nfs_xdev_mount() = %ld\n",
2710 IS_ERR(mntroot) ? PTR_ERR(mntroot) : 0L);
Al Viro31f43472010-10-29 03:38:12 -04002711 return mntroot;
David Howellsf7b422b2006-06-09 09:34:33 -04002712}
2713
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002714#if IS_ENABLED(CONFIG_NFS_V4)
David Howells54ceac42006-08-22 20:06:13 -04002715
Trond Myklebust01c3f052009-06-17 13:22:58 -07002716static void nfs4_validate_mount_flags(struct nfs_parsed_mount_data *args)
2717{
Suresh Jayaraman5eebde22010-09-23 08:55:58 -04002718 args->flags &= ~(NFS_MOUNT_NONLM|NFS_MOUNT_NOACL|NFS_MOUNT_VER3|
2719 NFS_MOUNT_LOCAL_FLOCK|NFS_MOUNT_LOCAL_FCNTL);
Trond Myklebust01c3f052009-06-17 13:22:58 -07002720}
2721
David Howells54ceac42006-08-22 20:06:13 -04002722/*
Chuck Leverf0768eb2007-07-01 12:13:01 -04002723 * Validate NFSv4 mount options
2724 */
\"Talpey, Thomas\91ea40b2007-09-10 13:44:33 -04002725static int nfs4_validate_mount_data(void *options,
2726 struct nfs_parsed_mount_data *args,
2727 const char *dev_name)
Chuck Leverf0768eb2007-07-01 12:13:01 -04002728{
Chuck Lever4cfd74f2009-09-08 19:49:47 -04002729 struct sockaddr *sap = (struct sockaddr *)&args->nfs_server.address;
\"Talpey, Thomas\91ea40b2007-09-10 13:44:33 -04002730 struct nfs4_mount_data *data = (struct nfs4_mount_data *)options;
Chuck Leverf0768eb2007-07-01 12:13:01 -04002731 char *c;
2732
2733 if (data == NULL)
2734 goto out_no_data;
2735
Bryan Schumakercdf66442012-06-05 14:59:54 -04002736 args->version = 4;
2737
Chuck Leverf0768eb2007-07-01 12:13:01 -04002738 switch (data->version) {
2739 case 1:
Chuck Lever4c568012007-12-10 14:59:28 -05002740 if (data->host_addrlen > sizeof(args->nfs_server.address))
Chuck Leverf0768eb2007-07-01 12:13:01 -04002741 goto out_no_address;
Chuck Lever4c568012007-12-10 14:59:28 -05002742 if (data->host_addrlen == 0)
2743 goto out_no_address;
2744 args->nfs_server.addrlen = data->host_addrlen;
Chuck Lever4cfd74f2009-09-08 19:49:47 -04002745 if (copy_from_user(sap, data->host_addr, data->host_addrlen))
Chuck Leverf0768eb2007-07-01 12:13:01 -04002746 return -EFAULT;
Chuck Lever4cfd74f2009-09-08 19:49:47 -04002747 if (!nfs_verify_server_address(sap))
Chuck Leverf0768eb2007-07-01 12:13:01 -04002748 goto out_no_address;
Trond Myklebust872ece82012-09-04 11:05:07 -04002749 args->nfs_server.port = ntohs(((struct sockaddr_in *)sap)->sin_port);
Chuck Leverf0768eb2007-07-01 12:13:01 -04002750
Chuck Lever6738b252008-06-24 16:33:54 -04002751 if (data->auth_flavourlen) {
Trond Myklebust74c98812013-09-07 13:26:57 -04002752 rpc_authflavor_t pseudoflavor;
Chuck Lever6738b252008-06-24 16:33:54 -04002753 if (data->auth_flavourlen > 1)
2754 goto out_inval_auth;
Trond Myklebust74c98812013-09-07 13:26:57 -04002755 if (copy_from_user(&pseudoflavor,
\"Talpey, Thomas\91ea40b2007-09-10 13:44:33 -04002756 data->auth_flavours,
Trond Myklebust74c98812013-09-07 13:26:57 -04002757 sizeof(pseudoflavor)))
Chuck Leverf0768eb2007-07-01 12:13:01 -04002758 return -EFAULT;
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -04002759 args->selected_flavor = pseudoflavor;
Trond Myklebust74c98812013-09-07 13:26:57 -04002760 } else
Weston Andros Adamsona3f73c22013-10-18 15:15:16 -04002761 args->selected_flavor = RPC_AUTH_UNIX;
Chuck Leverf0768eb2007-07-01 12:13:01 -04002762
2763 c = strndup_user(data->hostname.data, NFS4_MAXNAMLEN);
2764 if (IS_ERR(c))
2765 return PTR_ERR(c);
\"Talpey, Thomas\91ea40b2007-09-10 13:44:33 -04002766 args->nfs_server.hostname = c;
Chuck Leverf0768eb2007-07-01 12:13:01 -04002767
2768 c = strndup_user(data->mnt_path.data, NFS4_MAXPATHLEN);
2769 if (IS_ERR(c))
2770 return PTR_ERR(c);
\"Talpey, Thomas\91ea40b2007-09-10 13:44:33 -04002771 args->nfs_server.export_path = c;
2772 dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", c);
Chuck Leverf0768eb2007-07-01 12:13:01 -04002773
2774 c = strndup_user(data->client_addr.data, 16);
2775 if (IS_ERR(c))
2776 return PTR_ERR(c);
\"Talpey, Thomas\91ea40b2007-09-10 13:44:33 -04002777 args->client_address = c;
2778
2779 /*
2780 * Translate to nfs_parsed_mount_data, which nfs4_fill_super
2781 * can deal with.
2782 */
2783
2784 args->flags = data->flags & NFS4_MOUNT_FLAGMASK;
2785 args->rsize = data->rsize;
2786 args->wsize = data->wsize;
2787 args->timeo = data->timeo;
2788 args->retrans = data->retrans;
2789 args->acregmin = data->acregmin;
2790 args->acregmax = data->acregmax;
2791 args->acdirmin = data->acdirmin;
2792 args->acdirmax = data->acdirmax;
2793 args->nfs_server.protocol = data->proto;
Trond Myklebust259875e2008-07-02 14:43:47 -04002794 nfs_validate_transport_protocol(args);
Trond Myklebust6da1a032013-08-07 12:30:52 -04002795 if (args->nfs_server.protocol == XPRT_TRANSPORT_UDP)
2796 goto out_invalid_transport_udp;
Chuck Leverf0768eb2007-07-01 12:13:01 -04002797
2798 break;
Chuck Lever7630c852009-09-08 19:49:57 -04002799 default:
Bryan Schumakerb72e4f42012-05-10 15:07:40 -04002800 return NFS_TEXT_DATA;
Chuck Leverf0768eb2007-07-01 12:13:01 -04002801 }
2802
2803 return 0;
2804
2805out_no_data:
2806 dfprintk(MOUNT, "NFS4: mount program didn't pass any mount data\n");
2807 return -EINVAL;
2808
2809out_inval_auth:
2810 dfprintk(MOUNT, "NFS4: Invalid number of RPC auth flavours %d\n",
2811 data->auth_flavourlen);
2812 return -EINVAL;
2813
2814out_no_address:
2815 dfprintk(MOUNT, "NFS4: mount program didn't pass remote address\n");
2816 return -EINVAL;
Trond Myklebust6da1a032013-08-07 12:30:52 -04002817
2818out_invalid_transport_udp:
2819 dfprintk(MOUNT, "NFSv4: Unsupported transport protocol udp\n");
2820 return -EINVAL;
Chuck Leverf0768eb2007-07-01 12:13:01 -04002821}
2822
Bryan Schumakerfac1e8e2012-07-30 16:05:22 -04002823/*
2824 * NFS v4 module parameters need to stay in the
2825 * NFS client for backwards compatibility
2826 */
2827unsigned int nfs_callback_set_tcpport;
Bryan Schumakerfac1e8e2012-07-30 16:05:22 -04002828/* Default cache timeout is 10 minutes */
2829unsigned int nfs_idmap_cache_timeout = 600;
2830/* Turn off NFSv4 uid/gid mapping when using AUTH_SYS */
2831bool nfs4_disable_idmapping = true;
2832unsigned short max_session_slots = NFS4_DEF_SLOT_TABLE_SIZE;
2833unsigned short send_implementation_id = 1;
Chuck Lever6f2ea7f2012-09-14 17:24:41 -04002834char nfs4_client_id_uniquifier[NFS4_CLIENT_ID_UNIQ_LEN] = "";
Trond Myklebustf6de7a32013-09-04 10:08:54 -04002835bool recover_lost_locks = false;
Bryan Schumakerfac1e8e2012-07-30 16:05:22 -04002836
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002837EXPORT_SYMBOL_GPL(nfs_callback_set_tcpport);
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002838EXPORT_SYMBOL_GPL(nfs_idmap_cache_timeout);
2839EXPORT_SYMBOL_GPL(nfs4_disable_idmapping);
2840EXPORT_SYMBOL_GPL(max_session_slots);
2841EXPORT_SYMBOL_GPL(send_implementation_id);
Chuck Lever6f2ea7f2012-09-14 17:24:41 -04002842EXPORT_SYMBOL_GPL(nfs4_client_id_uniquifier);
Trond Myklebustf6de7a32013-09-04 10:08:54 -04002843EXPORT_SYMBOL_GPL(recover_lost_locks);
Bryan Schumaker89d77c82012-07-30 16:05:25 -04002844
Bryan Schumakerfac1e8e2012-07-30 16:05:22 -04002845#define NFS_CALLBACK_MAXPORTNR (65535U)
2846
2847static int param_set_portnr(const char *val, const struct kernel_param *kp)
2848{
2849 unsigned long num;
2850 int ret;
2851
2852 if (!val)
2853 return -EINVAL;
Daniel Walter7297cb62012-09-26 21:51:46 +02002854 ret = kstrtoul(val, 0, &num);
Bryan Schumakerfac1e8e2012-07-30 16:05:22 -04002855 if (ret == -EINVAL || num > NFS_CALLBACK_MAXPORTNR)
2856 return -EINVAL;
2857 *((unsigned int *)kp->arg) = num;
2858 return 0;
2859}
Luis R. Rodriguez9c278472015-05-27 11:09:38 +09302860static const struct kernel_param_ops param_ops_portnr = {
Bryan Schumakerfac1e8e2012-07-30 16:05:22 -04002861 .set = param_set_portnr,
2862 .get = param_get_uint,
2863};
2864#define param_check_portnr(name, p) __param_check(name, p, unsigned int);
2865
2866module_param_named(callback_tcpport, nfs_callback_set_tcpport, portnr, 0644);
2867module_param(nfs_idmap_cache_timeout, int, 0644);
2868module_param(nfs4_disable_idmapping, bool, 0644);
Chuck Lever6f2ea7f2012-09-14 17:24:41 -04002869module_param_string(nfs4_unique_id, nfs4_client_id_uniquifier,
2870 NFS4_CLIENT_ID_UNIQ_LEN, 0600);
Bryan Schumakerfac1e8e2012-07-30 16:05:22 -04002871MODULE_PARM_DESC(nfs4_disable_idmapping,
2872 "Turn off NFSv4 idmapping when using 'sec=sys'");
2873module_param(max_session_slots, ushort, 0644);
2874MODULE_PARM_DESC(max_session_slots, "Maximum number of outstanding NFSv4.1 "
2875 "requests the client will negotiate");
2876module_param(send_implementation_id, ushort, 0644);
2877MODULE_PARM_DESC(send_implementation_id,
2878 "Send implementation ID with NFSv4.1 exchange_id");
Chuck Lever6f2ea7f2012-09-14 17:24:41 -04002879MODULE_PARM_DESC(nfs4_unique_id, "nfs_client_id4 uniquifier string");
bjschuma@gmail.com425e7762012-08-08 13:57:10 -04002880
Trond Myklebustf6de7a32013-09-04 10:08:54 -04002881module_param(recover_lost_locks, bool, 0644);
2882MODULE_PARM_DESC(recover_lost_locks,
2883 "If the server reports that a lock might be lost, "
2884 "try to recover it risking data corruption.");
2885
2886
David Howells54ceac42006-08-22 20:06:13 -04002887#endif /* CONFIG_NFS_V4 */