2019-12-10 15:31:04 +03:00
// SPDX-License-Identifier: GPL-2.0-only
/*
* linux / fs / nfs / fs_context . c
*
* Copyright ( C ) 1992 Rick Sladkey
2019-12-10 15:31:13 +03:00
* Conversion to new mount api Copyright ( C ) David Howells
2019-12-10 15:31:04 +03:00
*
* NFS mount handling .
*
* Split from fs / nfs / super . c by David Howells < dhowells @ redhat . com >
*/
# include <linux/module.h>
# include <linux/fs.h>
2019-12-10 15:31:12 +03:00
# include <linux/fs_context.h>
# include <linux/fs_parser.h>
2019-12-10 15:31:04 +03:00
# include <linux/nfs_fs.h>
# include <linux/nfs_mount.h>
# include <linux/nfs4_mount.h>
# include "nfs.h"
# include "internal.h"
# define NFSDBG_FACILITY NFSDBG_MOUNT
# if IS_ENABLED(CONFIG_NFS_V3)
# define NFS_DEFAULT_VERSION 3
# else
# define NFS_DEFAULT_VERSION 2
# endif
# define NFS_MAX_CONNECTIONS 16
2019-12-10 15:31:12 +03:00
enum nfs_param {
Opt_ac ,
Opt_acdirmax ,
Opt_acdirmin ,
Opt_acl ,
Opt_acregmax ,
Opt_acregmin ,
2019-12-10 15:31:04 +03:00
Opt_actimeo ,
2019-12-10 15:31:12 +03:00
Opt_addr ,
Opt_bg ,
Opt_bsize ,
Opt_clientaddr ,
Opt_cto ,
Opt_fg ,
Opt_fscache ,
2019-12-18 04:03:59 +03:00
Opt_fscache_flag ,
2019-12-10 15:31:12 +03:00
Opt_hard ,
Opt_intr ,
Opt_local_lock ,
Opt_lock ,
Opt_lookupcache ,
Opt_migration ,
Opt_minorversion ,
Opt_mountaddr ,
Opt_mounthost ,
2019-12-10 15:31:04 +03:00
Opt_mountport ,
2019-12-10 15:31:12 +03:00
Opt_mountproto ,
2019-12-10 15:31:04 +03:00
Opt_mountvers ,
2019-12-10 15:31:12 +03:00
Opt_namelen ,
2019-12-10 15:31:04 +03:00
Opt_nconnect ,
2019-12-10 15:31:12 +03:00
Opt_port ,
Opt_posix ,
Opt_proto ,
Opt_rdirplus ,
Opt_rdma ,
Opt_resvport ,
Opt_retrans ,
Opt_retry ,
Opt_rsize ,
Opt_sec ,
Opt_sharecache ,
Opt_sloppy ,
Opt_soft ,
Opt_softerr ,
2020-01-06 23:39:37 +03:00
Opt_softreval ,
2019-12-10 15:31:12 +03:00
Opt_source ,
Opt_tcp ,
Opt_timeo ,
Opt_udp ,
Opt_v ,
Opt_vers ,
Opt_wsize ,
2021-02-13 00:49:49 +03:00
Opt_write ,
2019-12-10 15:31:04 +03:00
} ;
2019-09-07 05:12:08 +03:00
enum {
Opt_local_lock_all ,
Opt_local_lock_flock ,
Opt_local_lock_none ,
Opt_local_lock_posix ,
} ;
2019-12-16 21:33:32 +03:00
static const struct constant_table nfs_param_enums_local_lock [ ] = {
2019-09-07 05:12:08 +03:00
{ " all " , Opt_local_lock_all } ,
{ " flock " , Opt_local_lock_flock } ,
2020-10-10 17:03:12 +03:00
{ " posix " , Opt_local_lock_posix } ,
2019-09-07 05:12:08 +03:00
{ " none " , Opt_local_lock_none } ,
{ }
} ;
enum {
Opt_lookupcache_all ,
Opt_lookupcache_none ,
Opt_lookupcache_positive ,
} ;
2019-12-16 21:33:32 +03:00
static const struct constant_table nfs_param_enums_lookupcache [ ] = {
2019-09-07 05:12:08 +03:00
{ " all " , Opt_lookupcache_all } ,
{ " none " , Opt_lookupcache_none } ,
{ " pos " , Opt_lookupcache_positive } ,
{ " positive " , Opt_lookupcache_positive } ,
{ }
} ;
2021-02-13 00:49:49 +03:00
enum {
Opt_write_lazy ,
Opt_write_eager ,
Opt_write_wait ,
} ;
static const struct constant_table nfs_param_enums_write [ ] = {
{ " lazy " , Opt_write_lazy } ,
{ " eager " , Opt_write_eager } ,
{ " wait " , Opt_write_wait } ,
{ }
} ;
2019-09-07 14:23:15 +03:00
static const struct fs_parameter_spec nfs_fs_parameters [ ] = {
2019-12-10 15:31:12 +03:00
fsparam_flag_no ( " ac " , Opt_ac ) ,
fsparam_u32 ( " acdirmax " , Opt_acdirmax ) ,
fsparam_u32 ( " acdirmin " , Opt_acdirmin ) ,
fsparam_flag_no ( " acl " , Opt_acl ) ,
fsparam_u32 ( " acregmax " , Opt_acregmax ) ,
fsparam_u32 ( " acregmin " , Opt_acregmin ) ,
fsparam_u32 ( " actimeo " , Opt_actimeo ) ,
fsparam_string ( " addr " , Opt_addr ) ,
fsparam_flag ( " bg " , Opt_bg ) ,
fsparam_u32 ( " bsize " , Opt_bsize ) ,
fsparam_string ( " clientaddr " , Opt_clientaddr ) ,
fsparam_flag_no ( " cto " , Opt_cto ) ,
fsparam_flag ( " fg " , Opt_fg ) ,
2019-12-18 04:03:59 +03:00
fsparam_flag_no ( " fsc " , Opt_fscache_flag ) ,
fsparam_string ( " fsc " , Opt_fscache ) ,
2019-12-10 15:31:12 +03:00
fsparam_flag ( " hard " , Opt_hard ) ,
2019-12-18 08:02:31 +03:00
__fsparam ( NULL , " intr " , Opt_intr ,
2019-09-07 05:12:08 +03:00
fs_param_neg_with_no | fs_param_deprecated , NULL ) ,
fsparam_enum ( " local_lock " , Opt_local_lock , nfs_param_enums_local_lock ) ,
2019-12-10 15:31:12 +03:00
fsparam_flag_no ( " lock " , Opt_lock ) ,
2019-09-07 05:12:08 +03:00
fsparam_enum ( " lookupcache " , Opt_lookupcache , nfs_param_enums_lookupcache ) ,
2019-12-10 15:31:12 +03:00
fsparam_flag_no ( " migration " , Opt_migration ) ,
fsparam_u32 ( " minorversion " , Opt_minorversion ) ,
fsparam_string ( " mountaddr " , Opt_mountaddr ) ,
fsparam_string ( " mounthost " , Opt_mounthost ) ,
fsparam_u32 ( " mountport " , Opt_mountport ) ,
fsparam_string ( " mountproto " , Opt_mountproto ) ,
fsparam_u32 ( " mountvers " , Opt_mountvers ) ,
fsparam_u32 ( " namlen " , Opt_namelen ) ,
fsparam_u32 ( " nconnect " , Opt_nconnect ) ,
fsparam_string ( " nfsvers " , Opt_vers ) ,
fsparam_u32 ( " port " , Opt_port ) ,
fsparam_flag_no ( " posix " , Opt_posix ) ,
fsparam_string ( " proto " , Opt_proto ) ,
fsparam_flag_no ( " rdirplus " , Opt_rdirplus ) ,
fsparam_flag ( " rdma " , Opt_rdma ) ,
fsparam_flag_no ( " resvport " , Opt_resvport ) ,
fsparam_u32 ( " retrans " , Opt_retrans ) ,
fsparam_string ( " retry " , Opt_retry ) ,
fsparam_u32 ( " rsize " , Opt_rsize ) ,
fsparam_string ( " sec " , Opt_sec ) ,
fsparam_flag_no ( " sharecache " , Opt_sharecache ) ,
fsparam_flag ( " sloppy " , Opt_sloppy ) ,
fsparam_flag ( " soft " , Opt_soft ) ,
fsparam_flag ( " softerr " , Opt_softerr ) ,
2020-01-06 23:39:37 +03:00
fsparam_flag ( " softreval " , Opt_softreval ) ,
2019-12-10 15:31:12 +03:00
fsparam_string ( " source " , Opt_source ) ,
fsparam_flag ( " tcp " , Opt_tcp ) ,
fsparam_u32 ( " timeo " , Opt_timeo ) ,
fsparam_flag ( " udp " , Opt_udp ) ,
fsparam_flag ( " v2 " , Opt_v ) ,
fsparam_flag ( " v3 " , Opt_v ) ,
fsparam_flag ( " v4 " , Opt_v ) ,
fsparam_flag ( " v4.0 " , Opt_v ) ,
fsparam_flag ( " v4.1 " , Opt_v ) ,
fsparam_flag ( " v4.2 " , Opt_v ) ,
fsparam_string ( " vers " , Opt_vers ) ,
2021-02-13 00:49:49 +03:00
fsparam_enum ( " write " , Opt_write , nfs_param_enums_write ) ,
2019-12-10 15:31:12 +03:00
fsparam_u32 ( " wsize " , Opt_wsize ) ,
{ }
2019-12-10 15:31:04 +03:00
} ;
enum {
2019-12-10 15:31:12 +03:00
Opt_vers_2 ,
Opt_vers_3 ,
Opt_vers_4 ,
Opt_vers_4_0 ,
Opt_vers_4_1 ,
Opt_vers_4_2 ,
2019-12-10 15:31:04 +03:00
} ;
2019-12-10 15:31:12 +03:00
static const struct constant_table nfs_vers_tokens [ ] = {
{ " 2 " , Opt_vers_2 } ,
{ " 3 " , Opt_vers_3 } ,
{ " 4 " , Opt_vers_4 } ,
{ " 4.0 " , Opt_vers_4_0 } ,
{ " 4.1 " , Opt_vers_4_1 } ,
{ " 4.2 " , Opt_vers_4_2 } ,
2020-04-03 00:20:44 +03:00
{ }
2019-12-10 15:31:04 +03:00
} ;
enum {
2019-12-10 15:31:12 +03:00
Opt_xprt_rdma ,
Opt_xprt_rdma6 ,
Opt_xprt_tcp ,
Opt_xprt_tcp6 ,
Opt_xprt_udp ,
Opt_xprt_udp6 ,
nr__Opt_xprt
2019-12-10 15:31:04 +03:00
} ;
2020-04-03 00:20:44 +03:00
static const struct constant_table nfs_xprt_protocol_tokens [ ] = {
2019-12-10 15:31:12 +03:00
{ " rdma " , Opt_xprt_rdma } ,
{ " rdma6 " , Opt_xprt_rdma6 } ,
{ " tcp " , Opt_xprt_tcp } ,
{ " tcp6 " , Opt_xprt_tcp6 } ,
{ " udp " , Opt_xprt_udp } ,
{ " udp6 " , Opt_xprt_udp6 } ,
2020-04-03 00:20:44 +03:00
{ }
2019-12-10 15:31:04 +03:00
} ;
enum {
2019-12-10 15:31:12 +03:00
Opt_sec_krb5 ,
Opt_sec_krb5i ,
Opt_sec_krb5p ,
Opt_sec_lkey ,
Opt_sec_lkeyi ,
Opt_sec_lkeyp ,
Opt_sec_none ,
Opt_sec_spkm ,
Opt_sec_spkmi ,
Opt_sec_spkmp ,
Opt_sec_sys ,
nr__Opt_sec
2019-12-10 15:31:04 +03:00
} ;
2019-12-10 15:31:12 +03:00
static const struct constant_table nfs_secflavor_tokens [ ] = {
{ " krb5 " , Opt_sec_krb5 } ,
{ " krb5i " , Opt_sec_krb5i } ,
{ " krb5p " , Opt_sec_krb5p } ,
{ " lkey " , Opt_sec_lkey } ,
{ " lkeyi " , Opt_sec_lkeyi } ,
{ " lkeyp " , Opt_sec_lkeyp } ,
{ " none " , Opt_sec_none } ,
{ " null " , Opt_sec_none } ,
{ " spkm3 " , Opt_sec_spkm } ,
{ " spkm3i " , Opt_sec_spkmi } ,
{ " spkm3p " , Opt_sec_spkmp } ,
{ " sys " , Opt_sec_sys } ,
2020-04-03 00:20:44 +03:00
{ }
2019-12-10 15:31:04 +03:00
} ;
/*
* Sanity - check a server address provided by the mount command .
*
* Address family must be initialized , and address must not be
* the ANY address for that family .
*/
static int nfs_verify_server_address ( struct sockaddr * addr )
{
switch ( addr - > sa_family ) {
case AF_INET : {
struct sockaddr_in * sa = ( struct sockaddr_in * ) addr ;
return sa - > sin_addr . s_addr ! = htonl ( INADDR_ANY ) ;
}
case AF_INET6 : {
struct in6_addr * sa = & ( ( struct sockaddr_in6 * ) addr ) - > sin6_addr ;
return ! ipv6_addr_any ( sa ) ;
}
}
dfprintk ( MOUNT , " NFS: Invalid IP address specified \n " ) ;
return 0 ;
}
2021-03-30 16:01:50 +03:00
# ifdef CONFIG_NFS_DISABLE_UDP_SUPPORT
static bool nfs_server_transport_udp_invalid ( const struct nfs_fs_context * ctx )
{
return true ;
}
# else
static bool nfs_server_transport_udp_invalid ( const struct nfs_fs_context * ctx )
{
if ( ctx - > version = = 4 )
return true ;
return false ;
}
# endif
2019-12-10 15:31:04 +03:00
/*
* Sanity check the NFS transport protocol .
*/
2021-03-30 16:01:50 +03:00
static int nfs_validate_transport_protocol ( struct fs_context * fc ,
struct nfs_fs_context * ctx )
2019-12-10 15:31:04 +03:00
{
2019-12-10 15:31:06 +03:00
switch ( ctx - > nfs_server . protocol ) {
2019-12-10 15:31:04 +03:00
case XPRT_TRANSPORT_UDP :
2021-03-30 16:01:50 +03:00
if ( nfs_server_transport_udp_invalid ( ctx ) )
goto out_invalid_transport_udp ;
break ;
2019-12-10 15:31:04 +03:00
case XPRT_TRANSPORT_TCP :
case XPRT_TRANSPORT_RDMA :
break ;
default :
2019-12-10 15:31:06 +03:00
ctx - > nfs_server . protocol = XPRT_TRANSPORT_TCP ;
2019-12-10 15:31:04 +03:00
}
2021-03-30 16:01:50 +03:00
return 0 ;
out_invalid_transport_udp :
return nfs_invalf ( fc , " NFS: Unsupported transport protocol udp " ) ;
2019-12-10 15:31:04 +03:00
}
/*
* For text based NFSv2 / v3 mounts , the mount protocol transport default
* settings should depend upon the specified NFS transport .
*/
2019-12-10 15:31:06 +03:00
static void nfs_set_mount_transport_protocol ( struct nfs_fs_context * ctx )
2019-12-10 15:31:04 +03:00
{
2019-12-10 15:31:06 +03:00
if ( ctx - > mount_server . protocol = = XPRT_TRANSPORT_UDP | |
ctx - > mount_server . protocol = = XPRT_TRANSPORT_TCP )
2019-12-10 15:31:04 +03:00
return ;
2019-12-10 15:31:06 +03:00
switch ( ctx - > nfs_server . protocol ) {
2019-12-10 15:31:04 +03:00
case XPRT_TRANSPORT_UDP :
2019-12-10 15:31:06 +03:00
ctx - > mount_server . protocol = XPRT_TRANSPORT_UDP ;
2019-12-10 15:31:04 +03:00
break ;
case XPRT_TRANSPORT_TCP :
case XPRT_TRANSPORT_RDMA :
2019-12-10 15:31:06 +03:00
ctx - > mount_server . protocol = XPRT_TRANSPORT_TCP ;
2019-12-10 15:31:04 +03:00
}
}
/*
* Add ' flavor ' to ' auth_info ' if not already present .
* Returns true if ' flavor ' ends up in the list , false otherwise
*/
2019-12-10 15:31:14 +03:00
static int nfs_auth_info_add ( struct fs_context * fc ,
2019-12-10 15:31:10 +03:00
struct nfs_auth_info * auth_info ,
rpc_authflavor_t flavor )
2019-12-10 15:31:04 +03:00
{
unsigned int i ;
unsigned int max_flavor_len = ARRAY_SIZE ( auth_info - > flavors ) ;
/* make sure this flavor isn't already in the list */
for ( i = 0 ; i < auth_info - > flavor_len ; i + + ) {
if ( flavor = = auth_info - > flavors [ i ] )
2019-12-10 15:31:10 +03:00
return 0 ;
2019-12-10 15:31:04 +03:00
}
2019-12-10 15:31:15 +03:00
if ( auth_info - > flavor_len + 1 > = max_flavor_len )
return nfs_invalf ( fc , " NFS: too many sec= flavors " ) ;
2019-12-10 15:31:04 +03:00
auth_info - > flavors [ auth_info - > flavor_len + + ] = flavor ;
2019-12-10 15:31:10 +03:00
return 0 ;
2019-12-10 15:31:04 +03:00
}
/*
* Parse the value of the ' sec = ' option .
*/
2019-12-10 15:31:14 +03:00
static int nfs_parse_security_flavors ( struct fs_context * fc ,
2019-12-10 15:31:12 +03:00
struct fs_parameter * param )
2019-12-10 15:31:04 +03:00
{
2019-12-10 15:31:14 +03:00
struct nfs_fs_context * ctx = nfs_fc2context ( fc ) ;
2019-12-10 15:31:04 +03:00
rpc_authflavor_t pseudoflavor ;
2019-12-10 15:31:12 +03:00
char * string = param - > string , * p ;
2019-12-10 15:31:10 +03:00
int ret ;
2019-12-10 15:31:04 +03:00
2019-12-10 15:31:12 +03:00
dfprintk ( MOUNT , " NFS: parsing %s=%s option \n " , param - > key , param - > string ) ;
2019-12-10 15:31:04 +03:00
2019-12-10 15:31:12 +03:00
while ( ( p = strsep ( & string , " : " ) ) ! = NULL ) {
if ( ! * p )
continue ;
switch ( lookup_constant ( nfs_secflavor_tokens , p , - 1 ) ) {
2019-12-10 15:31:04 +03:00
case Opt_sec_none :
pseudoflavor = RPC_AUTH_NULL ;
break ;
case Opt_sec_sys :
pseudoflavor = RPC_AUTH_UNIX ;
break ;
case Opt_sec_krb5 :
pseudoflavor = RPC_AUTH_GSS_KRB5 ;
break ;
case Opt_sec_krb5i :
pseudoflavor = RPC_AUTH_GSS_KRB5I ;
break ;
case Opt_sec_krb5p :
pseudoflavor = RPC_AUTH_GSS_KRB5P ;
break ;
case Opt_sec_lkey :
pseudoflavor = RPC_AUTH_GSS_LKEY ;
break ;
case Opt_sec_lkeyi :
pseudoflavor = RPC_AUTH_GSS_LKEYI ;
break ;
case Opt_sec_lkeyp :
pseudoflavor = RPC_AUTH_GSS_LKEYP ;
break ;
case Opt_sec_spkm :
pseudoflavor = RPC_AUTH_GSS_SPKM ;
break ;
case Opt_sec_spkmi :
pseudoflavor = RPC_AUTH_GSS_SPKMI ;
break ;
case Opt_sec_spkmp :
pseudoflavor = RPC_AUTH_GSS_SPKMP ;
break ;
default :
2019-12-10 15:31:15 +03:00
return nfs_invalf ( fc , " NFS: sec=%s option not recognized " , p ) ;
2019-12-10 15:31:04 +03:00
}
2019-12-10 15:31:14 +03:00
ret = nfs_auth_info_add ( fc , & ctx - > auth_info , pseudoflavor ) ;
2019-12-10 15:31:10 +03:00
if ( ret < 0 )
return ret ;
2019-12-10 15:31:04 +03:00
}
2019-12-10 15:31:10 +03:00
return 0 ;
2019-12-10 15:31:04 +03:00
}
2019-12-10 15:31:14 +03:00
static int nfs_parse_version_string ( struct fs_context * fc ,
2019-12-10 15:31:12 +03:00
const char * string )
2019-12-10 15:31:04 +03:00
{
2019-12-10 15:31:14 +03:00
struct nfs_fs_context * ctx = nfs_fc2context ( fc ) ;
2019-12-10 15:31:06 +03:00
ctx - > flags & = ~ NFS_MOUNT_VER3 ;
2019-12-10 15:31:12 +03:00
switch ( lookup_constant ( nfs_vers_tokens , string , - 1 ) ) {
2019-12-10 15:31:04 +03:00
case Opt_vers_2 :
2019-12-10 15:31:06 +03:00
ctx - > version = 2 ;
2019-12-10 15:31:04 +03:00
break ;
case Opt_vers_3 :
2019-12-10 15:31:06 +03:00
ctx - > flags | = NFS_MOUNT_VER3 ;
ctx - > version = 3 ;
2019-12-10 15:31:04 +03:00
break ;
case Opt_vers_4 :
/* Backward compatibility option. In future,
* the mount program should always supply
* a NFSv4 minor version number .
*/
2019-12-10 15:31:06 +03:00
ctx - > version = 4 ;
2019-12-10 15:31:04 +03:00
break ;
case Opt_vers_4_0 :
2019-12-10 15:31:06 +03:00
ctx - > version = 4 ;
ctx - > minorversion = 0 ;
2019-12-10 15:31:04 +03:00
break ;
case Opt_vers_4_1 :
2019-12-10 15:31:06 +03:00
ctx - > version = 4 ;
ctx - > minorversion = 1 ;
2019-12-10 15:31:04 +03:00
break ;
case Opt_vers_4_2 :
2019-12-10 15:31:06 +03:00
ctx - > version = 4 ;
ctx - > minorversion = 2 ;
2019-12-10 15:31:04 +03:00
break ;
default :
2019-12-10 15:31:15 +03:00
return nfs_invalf ( fc , " NFS: Unsupported NFS version " ) ;
2019-12-10 15:31:04 +03:00
}
2019-12-10 15:31:10 +03:00
return 0 ;
2019-12-10 15:31:04 +03:00
}
/*
2019-12-10 15:31:12 +03:00
* Parse a single mount parameter .
2019-12-10 15:31:04 +03:00
*/
2019-12-10 15:31:13 +03:00
static int nfs_fs_context_parse_param ( struct fs_context * fc ,
2019-12-10 15:31:12 +03:00
struct fs_parameter * param )
2019-12-10 15:31:04 +03:00
{
2019-12-10 15:31:12 +03:00
struct fs_parse_result result ;
2019-12-10 15:31:13 +03:00
struct nfs_fs_context * ctx = nfs_fc2context ( fc ) ;
2019-12-10 15:31:12 +03:00
unsigned short protofamily , mountfamily ;
unsigned int len ;
int ret , opt ;
2019-12-10 15:31:04 +03:00
2019-12-10 15:31:12 +03:00
dfprintk ( MOUNT , " NFS: parsing nfs mount option '%s' \n " , param - > key ) ;
2019-12-10 15:31:04 +03:00
2019-09-07 14:23:15 +03:00
opt = fs_parse ( fc , nfs_fs_parameters , param , & result ) ;
2019-12-10 15:31:12 +03:00
if ( opt < 0 )
return ctx - > sloppy ? 1 : opt ;
2021-02-20 01:22:33 +03:00
if ( fc - > security )
ctx - > has_sec_mnt_opts = 1 ;
2019-12-10 15:31:12 +03:00
switch ( opt ) {
2019-12-10 15:31:13 +03:00
case Opt_source :
2019-12-10 15:31:15 +03:00
if ( fc - > source )
return nfs_invalf ( fc , " NFS: Multiple sources not supported " ) ;
2019-12-10 15:31:13 +03:00
fc - > source = param - > string ;
param - > string = NULL ;
break ;
2019-12-10 15:31:04 +03:00
/*
* boolean options : foo / nofoo
*/
2019-12-10 15:31:08 +03:00
case Opt_soft :
ctx - > flags | = NFS_MOUNT_SOFT ;
ctx - > flags & = ~ NFS_MOUNT_SOFTERR ;
break ;
case Opt_softerr :
2020-01-06 23:39:37 +03:00
ctx - > flags | = NFS_MOUNT_SOFTERR | NFS_MOUNT_SOFTREVAL ;
2019-12-10 15:31:08 +03:00
ctx - > flags & = ~ NFS_MOUNT_SOFT ;
break ;
case Opt_hard :
2020-01-06 23:39:37 +03:00
ctx - > flags & = ~ ( NFS_MOUNT_SOFT |
NFS_MOUNT_SOFTERR |
NFS_MOUNT_SOFTREVAL ) ;
break ;
case Opt_softreval :
if ( result . negated )
ctx - > flags & = ~ NFS_MOUNT_SOFTREVAL ;
else
ctx - > flags & = NFS_MOUNT_SOFTREVAL ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_posix :
2019-12-10 15:31:12 +03:00
if ( result . negated )
ctx - > flags & = ~ NFS_MOUNT_POSIX ;
else
ctx - > flags | = NFS_MOUNT_POSIX ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_cto :
2019-12-10 15:31:12 +03:00
if ( result . negated )
ctx - > flags | = NFS_MOUNT_NOCTO ;
else
ctx - > flags & = ~ NFS_MOUNT_NOCTO ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_ac :
2019-12-10 15:31:12 +03:00
if ( result . negated )
ctx - > flags | = NFS_MOUNT_NOAC ;
else
ctx - > flags & = ~ NFS_MOUNT_NOAC ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_lock :
2019-12-10 15:31:12 +03:00
if ( result . negated ) {
ctx - > flags | = NFS_MOUNT_NONLM ;
ctx - > flags | = ( NFS_MOUNT_LOCAL_FLOCK | NFS_MOUNT_LOCAL_FCNTL ) ;
} else {
ctx - > flags & = ~ NFS_MOUNT_NONLM ;
ctx - > flags & = ~ ( NFS_MOUNT_LOCAL_FLOCK | NFS_MOUNT_LOCAL_FCNTL ) ;
}
2019-12-10 15:31:08 +03:00
break ;
case Opt_udp :
ctx - > flags & = ~ NFS_MOUNT_TCP ;
ctx - > nfs_server . protocol = XPRT_TRANSPORT_UDP ;
break ;
case Opt_tcp :
case Opt_rdma :
ctx - > flags | = NFS_MOUNT_TCP ; /* for side protocols */
2020-11-10 18:30:35 +03:00
ret = xprt_find_transport_ident ( param - > key ) ;
if ( ret < 0 )
goto out_bad_transport ;
ctx - > nfs_server . protocol = ret ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_acl :
2019-12-10 15:31:12 +03:00
if ( result . negated )
ctx - > flags | = NFS_MOUNT_NOACL ;
else
ctx - > flags & = ~ NFS_MOUNT_NOACL ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_rdirplus :
2019-12-10 15:31:12 +03:00
if ( result . negated )
ctx - > flags | = NFS_MOUNT_NORDIRPLUS ;
else
ctx - > flags & = ~ NFS_MOUNT_NORDIRPLUS ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_sharecache :
2019-12-10 15:31:12 +03:00
if ( result . negated )
ctx - > flags | = NFS_MOUNT_UNSHARED ;
else
ctx - > flags & = ~ NFS_MOUNT_UNSHARED ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_resvport :
2019-12-10 15:31:12 +03:00
if ( result . negated )
ctx - > flags | = NFS_MOUNT_NORESVPORT ;
else
ctx - > flags & = ~ NFS_MOUNT_NORESVPORT ;
2019-12-10 15:31:08 +03:00
break ;
2019-12-18 04:03:59 +03:00
case Opt_fscache_flag :
2019-12-10 15:31:12 +03:00
if ( result . negated )
ctx - > options & = ~ NFS_OPTION_FSCACHE ;
else
ctx - > options | = NFS_OPTION_FSCACHE ;
2019-12-18 04:03:59 +03:00
kfree ( ctx - > fscache_uniq ) ;
ctx - > fscache_uniq = NULL ;
break ;
case Opt_fscache :
ctx - > options | = NFS_OPTION_FSCACHE ;
kfree ( ctx - > fscache_uniq ) ;
ctx - > fscache_uniq = param - > string ;
param - > string = NULL ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_migration :
2019-12-10 15:31:12 +03:00
if ( result . negated )
ctx - > options & = ~ NFS_OPTION_MIGRATION ;
else
ctx - > options | = NFS_OPTION_MIGRATION ;
2019-12-10 15:31:08 +03:00
break ;
2019-12-10 15:31:04 +03:00
/*
* options that take numeric values
*/
2019-12-10 15:31:08 +03:00
case Opt_port :
2019-12-10 15:31:12 +03:00
if ( result . uint_32 > USHRT_MAX )
goto out_of_bounds ;
ctx - > nfs_server . port = result . uint_32 ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_rsize :
2019-12-10 15:31:12 +03:00
ctx - > rsize = result . uint_32 ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_wsize :
2019-12-10 15:31:12 +03:00
ctx - > wsize = result . uint_32 ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_bsize :
2019-12-10 15:31:12 +03:00
ctx - > bsize = result . uint_32 ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_timeo :
2019-12-10 15:31:12 +03:00
if ( result . uint_32 < 1 | | result . uint_32 > INT_MAX )
goto out_of_bounds ;
ctx - > timeo = result . uint_32 ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_retrans :
2019-12-10 15:31:12 +03:00
if ( result . uint_32 > INT_MAX )
goto out_of_bounds ;
ctx - > retrans = result . uint_32 ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_acregmin :
2019-12-10 15:31:12 +03:00
ctx - > acregmin = result . uint_32 ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_acregmax :
2019-12-10 15:31:12 +03:00
ctx - > acregmax = result . uint_32 ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_acdirmin :
2019-12-10 15:31:12 +03:00
ctx - > acdirmin = result . uint_32 ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_acdirmax :
2019-12-10 15:31:12 +03:00
ctx - > acdirmax = result . uint_32 ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_actimeo :
2019-12-10 15:31:12 +03:00
ctx - > acregmin = result . uint_32 ;
ctx - > acregmax = result . uint_32 ;
ctx - > acdirmin = result . uint_32 ;
ctx - > acdirmax = result . uint_32 ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_namelen :
2019-12-10 15:31:12 +03:00
ctx - > namlen = result . uint_32 ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_mountport :
2019-12-10 15:31:12 +03:00
if ( result . uint_32 > USHRT_MAX )
goto out_of_bounds ;
ctx - > mount_server . port = result . uint_32 ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_mountvers :
2019-12-10 15:31:12 +03:00
if ( result . uint_32 < NFS_MNT_VERSION | |
result . uint_32 > NFS_MNT3_VERSION )
goto out_of_bounds ;
ctx - > mount_server . version = result . uint_32 ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_minorversion :
2019-12-10 15:31:12 +03:00
if ( result . uint_32 > NFS4_MAX_MINOR_VERSION )
goto out_of_bounds ;
ctx - > minorversion = result . uint_32 ;
2019-12-10 15:31:08 +03:00
break ;
2019-12-10 15:31:04 +03:00
/*
* options that take text values
*/
2019-12-10 15:31:12 +03:00
case Opt_v :
2019-12-10 15:31:14 +03:00
ret = nfs_parse_version_string ( fc , param - > key + 1 ) ;
2019-12-10 15:31:12 +03:00
if ( ret < 0 )
return ret ;
break ;
case Opt_vers :
2019-12-10 15:31:14 +03:00
ret = nfs_parse_version_string ( fc , param - > string ) ;
2019-12-10 15:31:10 +03:00
if ( ret < 0 )
return ret ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_sec :
2019-12-10 15:31:14 +03:00
ret = nfs_parse_security_flavors ( fc , param ) ;
2019-12-10 15:31:10 +03:00
if ( ret < 0 )
return ret ;
2019-12-10 15:31:08 +03:00
break ;
2019-12-10 15:31:12 +03:00
case Opt_proto :
protofamily = AF_INET ;
switch ( lookup_constant ( nfs_xprt_protocol_tokens , param - > string , - 1 ) ) {
2019-12-10 15:31:08 +03:00
case Opt_xprt_udp6 :
2019-12-10 15:31:12 +03:00
protofamily = AF_INET6 ;
2020-08-24 01:36:59 +03:00
fallthrough ;
2019-12-10 15:31:08 +03:00
case Opt_xprt_udp :
ctx - > flags & = ~ NFS_MOUNT_TCP ;
ctx - > nfs_server . protocol = XPRT_TRANSPORT_UDP ;
2019-12-10 15:31:04 +03:00
break ;
2019-12-10 15:31:08 +03:00
case Opt_xprt_tcp6 :
2019-12-10 15:31:12 +03:00
protofamily = AF_INET6 ;
2020-08-24 01:36:59 +03:00
fallthrough ;
2019-12-10 15:31:08 +03:00
case Opt_xprt_tcp :
ctx - > flags | = NFS_MOUNT_TCP ;
ctx - > nfs_server . protocol = XPRT_TRANSPORT_TCP ;
2019-12-10 15:31:04 +03:00
break ;
2019-12-10 15:31:08 +03:00
case Opt_xprt_rdma6 :
2019-12-10 15:31:12 +03:00
protofamily = AF_INET6 ;
2020-08-24 01:36:59 +03:00
fallthrough ;
2019-12-10 15:31:08 +03:00
case Opt_xprt_rdma :
/* vector side protocols to TCP */
ctx - > flags | = NFS_MOUNT_TCP ;
2020-11-10 18:30:35 +03:00
ret = xprt_find_transport_ident ( param - > string ) ;
if ( ret < 0 )
goto out_bad_transport ;
ctx - > nfs_server . protocol = ret ;
2019-12-10 15:31:04 +03:00
break ;
2019-12-10 15:31:08 +03:00
default :
2020-11-10 18:30:35 +03:00
goto out_bad_transport ;
2019-12-10 15:31:08 +03:00
}
2019-12-10 15:31:12 +03:00
ctx - > protofamily = protofamily ;
2019-12-10 15:31:08 +03:00
break ;
2019-12-10 15:31:12 +03:00
2019-12-10 15:31:08 +03:00
case Opt_mountproto :
2019-12-10 15:31:12 +03:00
mountfamily = AF_INET ;
switch ( lookup_constant ( nfs_xprt_protocol_tokens , param - > string , - 1 ) ) {
2019-12-10 15:31:08 +03:00
case Opt_xprt_udp6 :
2019-12-10 15:31:12 +03:00
mountfamily = AF_INET6 ;
2020-08-24 01:36:59 +03:00
fallthrough ;
2019-12-10 15:31:08 +03:00
case Opt_xprt_udp :
ctx - > mount_server . protocol = XPRT_TRANSPORT_UDP ;
break ;
case Opt_xprt_tcp6 :
2019-12-10 15:31:12 +03:00
mountfamily = AF_INET6 ;
2020-08-24 01:36:59 +03:00
fallthrough ;
2019-12-10 15:31:08 +03:00
case Opt_xprt_tcp :
ctx - > mount_server . protocol = XPRT_TRANSPORT_TCP ;
break ;
case Opt_xprt_rdma : /* not used for side protocols */
default :
2020-11-10 18:30:35 +03:00
goto out_bad_transport ;
2019-12-10 15:31:08 +03:00
}
2019-12-10 15:31:12 +03:00
ctx - > mountfamily = mountfamily ;
2019-12-10 15:31:08 +03:00
break ;
2019-12-10 15:31:12 +03:00
2019-12-10 15:31:08 +03:00
case Opt_addr :
2019-12-10 15:31:14 +03:00
len = rpc_pton ( fc - > net_ns , param - > string , param - > size ,
2019-12-10 15:31:12 +03:00
& ctx - > nfs_server . address ,
sizeof ( ctx - > nfs_server . _address ) ) ;
if ( len = = 0 )
2019-12-10 15:31:08 +03:00
goto out_invalid_address ;
2019-12-10 15:31:12 +03:00
ctx - > nfs_server . addrlen = len ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_clientaddr :
2019-12-10 15:31:12 +03:00
kfree ( ctx - > client_address ) ;
ctx - > client_address = param - > string ;
param - > string = NULL ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_mounthost :
2019-12-10 15:31:12 +03:00
kfree ( ctx - > mount_server . hostname ) ;
ctx - > mount_server . hostname = param - > string ;
param - > string = NULL ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_mountaddr :
2019-12-10 15:31:14 +03:00
len = rpc_pton ( fc - > net_ns , param - > string , param - > size ,
2019-12-10 15:31:12 +03:00
& ctx - > mount_server . address ,
sizeof ( ctx - > mount_server . _address ) ) ;
if ( len = = 0 )
2019-12-10 15:31:08 +03:00
goto out_invalid_address ;
2019-12-10 15:31:12 +03:00
ctx - > mount_server . addrlen = len ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_nconnect :
2019-12-10 15:31:12 +03:00
if ( result . uint_32 < 1 | | result . uint_32 > NFS_MAX_CONNECTIONS )
goto out_of_bounds ;
ctx - > nfs_server . nconnect = result . uint_32 ;
2019-12-10 15:31:08 +03:00
break ;
case Opt_lookupcache :
2019-12-10 15:31:12 +03:00
switch ( result . uint_32 ) {
2019-12-10 15:31:08 +03:00
case Opt_lookupcache_all :
ctx - > flags & = ~ ( NFS_MOUNT_LOOKUP_CACHE_NONEG | NFS_MOUNT_LOOKUP_CACHE_NONE ) ;
2019-12-10 15:31:04 +03:00
break ;
2019-12-10 15:31:08 +03:00
case Opt_lookupcache_positive :
ctx - > flags & = ~ NFS_MOUNT_LOOKUP_CACHE_NONE ;
ctx - > flags | = NFS_MOUNT_LOOKUP_CACHE_NONEG ;
2019-12-10 15:31:04 +03:00
break ;
2019-12-10 15:31:08 +03:00
case Opt_lookupcache_none :
ctx - > flags | = NFS_MOUNT_LOOKUP_CACHE_NONEG | NFS_MOUNT_LOOKUP_CACHE_NONE ;
2019-12-10 15:31:04 +03:00
break ;
2019-12-10 15:31:08 +03:00
default :
2019-12-10 15:31:12 +03:00
goto out_invalid_value ;
2019-12-10 15:31:08 +03:00
}
break ;
case Opt_local_lock :
2019-12-10 15:31:12 +03:00
switch ( result . uint_32 ) {
2019-12-10 15:31:08 +03:00
case Opt_local_lock_all :
ctx - > flags | = ( NFS_MOUNT_LOCAL_FLOCK |
NFS_MOUNT_LOCAL_FCNTL ) ;
2019-12-10 15:31:04 +03:00
break ;
2019-12-10 15:31:08 +03:00
case Opt_local_lock_flock :
ctx - > flags | = NFS_MOUNT_LOCAL_FLOCK ;
2019-12-10 15:31:04 +03:00
break ;
2019-12-10 15:31:08 +03:00
case Opt_local_lock_posix :
ctx - > flags | = NFS_MOUNT_LOCAL_FCNTL ;
2019-12-10 15:31:04 +03:00
break ;
2019-12-10 15:31:08 +03:00
case Opt_local_lock_none :
ctx - > flags & = ~ ( NFS_MOUNT_LOCAL_FLOCK |
NFS_MOUNT_LOCAL_FCNTL ) ;
2019-12-10 15:31:04 +03:00
break ;
2019-12-10 15:31:08 +03:00
default :
2019-12-10 15:31:12 +03:00
goto out_invalid_value ;
2019-12-10 15:31:08 +03:00
}
break ;
2021-02-13 00:49:49 +03:00
case Opt_write :
switch ( result . uint_32 ) {
case Opt_write_lazy :
ctx - > flags & =
~ ( NFS_MOUNT_WRITE_EAGER | NFS_MOUNT_WRITE_WAIT ) ;
break ;
case Opt_write_eager :
ctx - > flags | = NFS_MOUNT_WRITE_EAGER ;
ctx - > flags & = ~ NFS_MOUNT_WRITE_WAIT ;
break ;
case Opt_write_wait :
ctx - > flags | =
NFS_MOUNT_WRITE_EAGER | NFS_MOUNT_WRITE_WAIT ;
break ;
default :
goto out_invalid_value ;
}
break ;
2019-12-10 15:31:04 +03:00
/*
* Special options
*/
2019-12-10 15:31:08 +03:00
case Opt_sloppy :
2019-12-10 15:31:12 +03:00
ctx - > sloppy = true ;
2019-12-10 15:31:08 +03:00
dfprintk ( MOUNT , " NFS: relaxing parsing rules \n " ) ;
break ;
2019-12-10 15:31:04 +03:00
}
2019-12-10 15:31:07 +03:00
return 0 ;
out_invalid_value :
2019-12-10 15:31:15 +03:00
return nfs_invalf ( fc , " NFS: Bad mount option value specified " ) ;
2019-12-10 15:31:12 +03:00
out_invalid_address :
2019-12-10 15:31:15 +03:00
return nfs_invalf ( fc , " NFS: Bad IP address specified " ) ;
2019-12-10 15:31:12 +03:00
out_of_bounds :
2020-01-17 18:55:09 +03:00
return nfs_invalf ( fc , " NFS: Value for '%s' out of range " , param - > key ) ;
2020-11-10 18:30:35 +03:00
out_bad_transport :
return nfs_invalf ( fc , " NFS: Unrecognized transport protocol " ) ;
2019-12-10 15:31:12 +03:00
}
2019-12-10 15:31:04 +03:00
/*
2019-12-10 15:31:14 +03:00
* Split fc - > source into " hostname:export_path " .
2019-12-10 15:31:04 +03:00
*
* The leftmost colon demarks the split between the server ' s hostname
* and the export path . If the hostname starts with a left square
* bracket , then it may contain colons .
*
* Note : caller frees hostname and export path , even on error .
*/
2019-12-10 15:31:14 +03:00
static int nfs_parse_source ( struct fs_context * fc ,
size_t maxnamlen , size_t maxpathlen )
2019-12-10 15:31:04 +03:00
{
2019-12-10 15:31:14 +03:00
struct nfs_fs_context * ctx = nfs_fc2context ( fc ) ;
const char * dev_name = fc - > source ;
2019-12-10 15:31:04 +03:00
size_t len ;
2019-12-10 15:31:14 +03:00
const char * end ;
2019-12-10 15:31:04 +03:00
if ( unlikely ( ! dev_name | | ! * dev_name ) ) {
dfprintk ( MOUNT , " NFS: device name not specified \n " ) ;
return - EINVAL ;
}
/* Is the host name protected with square brakcets? */
if ( * dev_name = = ' [ ' ) {
end = strchr ( + + dev_name , ' ] ' ) ;
if ( end = = NULL | | end [ 1 ] ! = ' : ' )
goto out_bad_devname ;
len = end - dev_name ;
end + + ;
} else {
2019-12-10 15:31:14 +03:00
const char * comma ;
2019-12-10 15:31:04 +03:00
end = strchr ( dev_name , ' : ' ) ;
if ( end = = NULL )
goto out_bad_devname ;
len = end - dev_name ;
/* kill possible hostname list: not supported */
2019-12-10 15:31:14 +03:00
comma = memchr ( dev_name , ' , ' , len ) ;
if ( comma )
2019-12-10 15:31:04 +03:00
len = comma - dev_name ;
}
if ( len > maxnamlen )
goto out_hostname ;
2020-02-25 19:05:22 +03:00
kfree ( ctx - > nfs_server . hostname ) ;
2019-12-10 15:31:04 +03:00
/* N.B. caller will free nfs_server.hostname in all cases */
2019-12-10 15:31:10 +03:00
ctx - > nfs_server . hostname = kmemdup_nul ( dev_name , len , GFP_KERNEL ) ;
if ( ! ctx - > nfs_server . hostname )
2019-12-10 15:31:04 +03:00
goto out_nomem ;
len = strlen ( + + end ) ;
if ( len > maxpathlen )
goto out_path ;
2019-12-10 15:31:10 +03:00
ctx - > nfs_server . export_path = kmemdup_nul ( end , len , GFP_KERNEL ) ;
if ( ! ctx - > nfs_server . export_path )
2019-12-10 15:31:04 +03:00
goto out_nomem ;
2019-12-10 15:31:10 +03:00
dfprintk ( MOUNT , " NFS: MNTPATH: '%s' \n " , ctx - > nfs_server . export_path ) ;
2019-12-10 15:31:04 +03:00
return 0 ;
out_bad_devname :
2019-12-10 15:31:15 +03:00
return nfs_invalf ( fc , " NFS: device name not in host:path format " ) ;
2019-12-10 15:31:04 +03:00
out_nomem :
2019-12-10 15:31:15 +03:00
nfs_errorf ( fc , " NFS: not enough memory to parse device name " ) ;
2019-12-10 15:31:04 +03:00
return - ENOMEM ;
out_hostname :
2019-12-10 15:31:15 +03:00
nfs_errorf ( fc , " NFS: server hostname too long " ) ;
2019-12-10 15:31:04 +03:00
return - ENAMETOOLONG ;
out_path :
2019-12-10 15:31:15 +03:00
nfs_errorf ( fc , " NFS: export pathname too long " ) ;
2019-12-10 15:31:04 +03:00
return - ENAMETOOLONG ;
}
2019-12-10 15:31:13 +03:00
static inline bool is_remount_fc ( struct fs_context * fc )
{
return fc - > root ! = NULL ;
}
2019-12-10 15:31:04 +03:00
/*
2019-12-10 15:31:10 +03:00
* Parse monolithic NFS2 / NFS3 mount data
2019-12-10 15:31:04 +03:00
* - fills in the mount root filehandle
*
* For option strings , user space handles the following behaviors :
*
* + DNS : mapping server host name to IP address ( " addr= " option )
*
* + failure mode : how to behave if a mount request can ' t be handled
* immediately ( " fg/bg " option )
*
* + retry : how often to retry a mount request ( " retry= " option )
*
* + breaking back : trying proto = udp after proto = tcp , v2 after v3 ,
* mountproto = tcp after mountproto = udp , and so on
*/
2019-12-10 15:31:13 +03:00
static int nfs23_parse_monolithic ( struct fs_context * fc ,
struct nfs_mount_data * data )
2019-12-10 15:31:04 +03:00
{
2019-12-10 15:31:13 +03:00
struct nfs_fs_context * ctx = nfs_fc2context ( fc ) ;
2019-12-10 15:31:14 +03:00
struct nfs_fh * mntfh = ctx - > mntfh ;
2019-12-10 15:31:06 +03:00
struct sockaddr * sap = ( struct sockaddr * ) & ctx - > nfs_server . address ;
2019-12-10 15:31:04 +03:00
int extra_flags = NFS_MOUNT_LEGACY_INTERFACE ;
2021-03-30 16:01:50 +03:00
int ret ;
2019-12-10 15:31:04 +03:00
if ( data = = NULL )
goto out_no_data ;
2019-12-10 15:31:06 +03:00
ctx - > version = NFS_DEFAULT_VERSION ;
2019-12-10 15:31:04 +03:00
switch ( data - > version ) {
case 1 :
2020-08-24 01:36:59 +03:00
data - > namlen = 0 ;
fallthrough ;
2019-12-10 15:31:04 +03:00
case 2 :
2020-08-24 01:36:59 +03:00
data - > bsize = 0 ;
fallthrough ;
2019-12-10 15:31:04 +03:00
case 3 :
if ( data - > flags & NFS_MOUNT_VER3 )
goto out_no_v3 ;
data - > root . size = NFS2_FHSIZE ;
memcpy ( data - > root . data , data - > old_root . data , NFS2_FHSIZE ) ;
/* Turn off security negotiation */
extra_flags | = NFS_MOUNT_SECFLAVOUR ;
2020-08-24 01:36:59 +03:00
fallthrough ;
2019-12-10 15:31:04 +03:00
case 4 :
if ( data - > flags & NFS_MOUNT_SECFLAVOUR )
goto out_no_sec ;
2020-08-24 01:36:59 +03:00
fallthrough ;
2019-12-10 15:31:04 +03:00
case 5 :
memset ( data - > context , 0 , sizeof ( data - > context ) ) ;
2020-08-24 01:36:59 +03:00
fallthrough ;
2019-12-10 15:31:04 +03:00
case 6 :
if ( data - > flags & NFS_MOUNT_VER3 ) {
if ( data - > root . size > NFS3_FHSIZE | | data - > root . size = = 0 )
goto out_invalid_fh ;
mntfh - > size = data - > root . size ;
2019-12-10 15:31:06 +03:00
ctx - > version = 3 ;
2019-12-10 15:31:04 +03:00
} else {
mntfh - > size = NFS2_FHSIZE ;
2019-12-10 15:31:06 +03:00
ctx - > version = 2 ;
2019-12-10 15:31:04 +03:00
}
memcpy ( mntfh - > data , data - > root . data , mntfh - > size ) ;
if ( mntfh - > size < sizeof ( mntfh - > data ) )
memset ( mntfh - > data + mntfh - > size , 0 ,
sizeof ( mntfh - > data ) - mntfh - > size ) ;
2021-03-02 03:19:30 +03:00
/*
* for proto = = XPRT_TRANSPORT_UDP , which is what uses
* to_exponential , implying shift : limit the shift value
* to BITS_PER_LONG ( majortimeo is unsigned long )
*/
if ( ! ( data - > flags & NFS_MOUNT_TCP ) ) /* this will be UDP */
if ( data - > retrans > = 64 ) /* shift value is too large */
goto out_invalid_data ;
2019-12-10 15:31:04 +03:00
/*
2019-12-10 15:31:06 +03:00
* Translate to nfs_fs_context , which nfs_fill_super
2019-12-10 15:31:04 +03:00
* can deal with .
*/
2019-12-10 15:31:06 +03:00
ctx - > flags = data - > flags & NFS_MOUNT_FLAGMASK ;
ctx - > flags | = extra_flags ;
ctx - > rsize = data - > rsize ;
ctx - > wsize = data - > wsize ;
ctx - > timeo = data - > timeo ;
ctx - > retrans = data - > retrans ;
ctx - > acregmin = data - > acregmin ;
ctx - > acregmax = data - > acregmax ;
ctx - > acdirmin = data - > acdirmin ;
ctx - > acdirmax = data - > acdirmax ;
ctx - > need_mount = false ;
2019-12-10 15:31:04 +03:00
memcpy ( sap , & data - > addr , sizeof ( data - > addr ) ) ;
2019-12-10 15:31:06 +03:00
ctx - > nfs_server . addrlen = sizeof ( data - > addr ) ;
ctx - > nfs_server . port = ntohs ( data - > addr . sin_port ) ;
2019-12-10 15:31:04 +03:00
if ( sap - > sa_family ! = AF_INET | |
! nfs_verify_server_address ( sap ) )
goto out_no_address ;
if ( ! ( data - > flags & NFS_MOUNT_TCP ) )
2019-12-10 15:31:06 +03:00
ctx - > nfs_server . protocol = XPRT_TRANSPORT_UDP ;
2019-12-10 15:31:04 +03:00
/* N.B. caller will free nfs_server.hostname in all cases */
2019-12-10 15:31:06 +03:00
ctx - > nfs_server . hostname = kstrdup ( data - > hostname , GFP_KERNEL ) ;
2019-12-10 15:31:13 +03:00
if ( ! ctx - > nfs_server . hostname )
goto out_nomem ;
2019-12-10 15:31:06 +03:00
ctx - > namlen = data - > namlen ;
ctx - > bsize = data - > bsize ;
2019-12-10 15:31:04 +03:00
if ( data - > flags & NFS_MOUNT_SECFLAVOUR )
2019-12-10 15:31:06 +03:00
ctx - > selected_flavor = data - > pseudoflavor ;
2019-12-10 15:31:04 +03:00
else
2019-12-10 15:31:06 +03:00
ctx - > selected_flavor = RPC_AUTH_UNIX ;
2019-12-10 15:31:04 +03:00
if ( ! ( data - > flags & NFS_MOUNT_NONLM ) )
2019-12-10 15:31:06 +03:00
ctx - > flags & = ~ ( NFS_MOUNT_LOCAL_FLOCK |
2019-12-10 15:31:04 +03:00
NFS_MOUNT_LOCAL_FCNTL ) ;
else
2019-12-10 15:31:06 +03:00
ctx - > flags | = ( NFS_MOUNT_LOCAL_FLOCK |
2019-12-10 15:31:04 +03:00
NFS_MOUNT_LOCAL_FCNTL ) ;
2019-12-10 15:31:14 +03:00
2019-12-10 15:31:04 +03:00
/*
* The legacy version 6 binary mount data from userspace has a
* field used only to transport selinux information into the
2020-08-11 05:18:35 +03:00
* kernel . To continue to support that functionality we
2019-12-10 15:31:04 +03:00
* have a touch of selinux knowledge here in the NFS code . The
* userspace code converted context = blah to just blah so we are
* converting back to the full string selinux understands .
*/
if ( data - > context [ 0 ] ) {
# ifdef CONFIG_SECURITY_SELINUX
2019-12-10 15:31:13 +03:00
int ret ;
2019-12-10 15:31:04 +03:00
data - > context [ NFS_MAX_CONTEXT_LEN ] = ' \0 ' ;
2019-12-10 15:31:13 +03:00
ret = vfs_parse_fs_string ( fc , " context " ,
data - > context , strlen ( data - > context ) ) ;
if ( ret < 0 )
return ret ;
2019-12-10 15:31:04 +03:00
# else
return - EINVAL ;
# endif
}
break ;
default :
2019-12-10 15:31:13 +03:00
goto generic ;
2019-12-10 15:31:04 +03:00
}
2021-03-30 16:01:50 +03:00
ret = nfs_validate_transport_protocol ( fc , ctx ) ;
if ( ret )
return ret ;
2019-12-10 15:31:13 +03:00
ctx - > skip_reconfig_option_check = true ;
2019-12-10 15:31:04 +03:00
return 0 ;
2019-12-10 15:31:13 +03:00
generic :
return generic_parse_monolithic ( fc , data ) ;
2019-12-10 15:31:04 +03:00
out_no_data :
2019-12-10 15:31:13 +03:00
if ( is_remount_fc ( fc ) ) {
ctx - > skip_reconfig_option_check = true ;
return 0 ;
}
2019-12-10 15:31:15 +03:00
return nfs_invalf ( fc , " NFS: mount program didn't pass any mount data " ) ;
2019-12-10 15:31:04 +03:00
out_no_v3 :
2019-12-10 15:31:15 +03:00
return nfs_invalf ( fc , " NFS: nfs_mount_data version does not support v3 " ) ;
2019-12-10 15:31:04 +03:00
out_no_sec :
2019-12-10 15:31:15 +03:00
return nfs_invalf ( fc , " NFS: nfs_mount_data version supports only AUTH_SYS " ) ;
2019-12-10 15:31:04 +03:00
out_nomem :
2019-12-10 15:31:15 +03:00
dfprintk ( MOUNT , " NFS: not enough memory to handle mount options " ) ;
2019-12-10 15:31:04 +03:00
return - ENOMEM ;
out_no_address :
2019-12-10 15:31:15 +03:00
return nfs_invalf ( fc , " NFS: mount program didn't pass remote address " ) ;
2019-12-10 15:31:04 +03:00
out_invalid_fh :
2019-12-10 15:31:15 +03:00
return nfs_invalf ( fc , " NFS: invalid root filehandle " ) ;
2021-03-02 03:19:30 +03:00
out_invalid_data :
return nfs_invalf ( fc , " NFS: invalid binary mount data " ) ;
2019-12-10 15:31:04 +03:00
}
# if IS_ENABLED(CONFIG_NFS_V4)
2020-09-17 11:22:33 +03:00
struct compat_nfs_string {
compat_uint_t len ;
compat_uptr_t data ;
} ;
static inline void compat_nfs_string ( struct nfs_string * dst ,
struct compat_nfs_string * src )
{
dst - > data = compat_ptr ( src - > data ) ;
dst - > len = src - > len ;
}
struct compat_nfs4_mount_data_v1 {
compat_int_t version ;
compat_int_t flags ;
compat_int_t rsize ;
compat_int_t wsize ;
compat_int_t timeo ;
compat_int_t retrans ;
compat_int_t acregmin ;
compat_int_t acregmax ;
compat_int_t acdirmin ;
compat_int_t acdirmax ;
struct compat_nfs_string client_addr ;
struct compat_nfs_string mnt_path ;
struct compat_nfs_string hostname ;
compat_uint_t host_addrlen ;
compat_uptr_t host_addr ;
compat_int_t proto ;
compat_int_t auth_flavourlen ;
compat_uptr_t auth_flavours ;
} ;
static void nfs4_compat_mount_data_conv ( struct nfs4_mount_data * data )
{
struct compat_nfs4_mount_data_v1 * compat =
( struct compat_nfs4_mount_data_v1 * ) data ;
/* copy the fields backwards */
data - > auth_flavours = compat_ptr ( compat - > auth_flavours ) ;
data - > auth_flavourlen = compat - > auth_flavourlen ;
data - > proto = compat - > proto ;
data - > host_addr = compat_ptr ( compat - > host_addr ) ;
data - > host_addrlen = compat - > host_addrlen ;
compat_nfs_string ( & data - > hostname , & compat - > hostname ) ;
compat_nfs_string ( & data - > mnt_path , & compat - > mnt_path ) ;
compat_nfs_string ( & data - > client_addr , & compat - > client_addr ) ;
data - > acdirmax = compat - > acdirmax ;
data - > acdirmin = compat - > acdirmin ;
data - > acregmax = compat - > acregmax ;
data - > acregmin = compat - > acregmin ;
data - > retrans = compat - > retrans ;
data - > timeo = compat - > timeo ;
data - > wsize = compat - > wsize ;
data - > rsize = compat - > rsize ;
data - > flags = compat - > flags ;
data - > version = compat - > version ;
}
2019-12-10 15:31:04 +03:00
/*
* Validate NFSv4 mount options
*/
2019-12-10 15:31:13 +03:00
static int nfs4_parse_monolithic ( struct fs_context * fc ,
struct nfs4_mount_data * data )
2019-12-10 15:31:04 +03:00
{
2019-12-10 15:31:13 +03:00
struct nfs_fs_context * ctx = nfs_fc2context ( fc ) ;
2019-12-10 15:31:06 +03:00
struct sockaddr * sap = ( struct sockaddr * ) & ctx - > nfs_server . address ;
2021-03-30 16:01:50 +03:00
int ret ;
2019-12-10 15:31:04 +03:00
char * c ;
2020-09-17 11:22:32 +03:00
if ( ! data ) {
if ( is_remount_fc ( fc ) )
goto done ;
return nfs_invalf ( fc ,
" NFS4: mount program didn't pass any mount data " ) ;
}
2019-12-10 15:31:04 +03:00
2019-12-10 15:31:06 +03:00
ctx - > version = 4 ;
2019-12-10 15:31:04 +03:00
2020-09-17 11:22:32 +03:00
if ( data - > version ! = 1 )
return generic_parse_monolithic ( fc , data ) ;
2020-09-17 11:22:33 +03:00
if ( in_compat_syscall ( ) )
nfs4_compat_mount_data_conv ( data ) ;
2020-09-17 11:22:32 +03:00
if ( data - > host_addrlen > sizeof ( ctx - > nfs_server . address ) )
goto out_no_address ;
if ( data - > host_addrlen = = 0 )
goto out_no_address ;
ctx - > nfs_server . addrlen = data - > host_addrlen ;
if ( copy_from_user ( sap , data - > host_addr , data - > host_addrlen ) )
return - EFAULT ;
if ( ! nfs_verify_server_address ( sap ) )
goto out_no_address ;
ctx - > nfs_server . port = ntohs ( ( ( struct sockaddr_in * ) sap ) - > sin_port ) ;
if ( data - > auth_flavourlen ) {
rpc_authflavor_t pseudoflavor ;
if ( data - > auth_flavourlen > 1 )
goto out_inval_auth ;
if ( copy_from_user ( & pseudoflavor , data - > auth_flavours ,
sizeof ( pseudoflavor ) ) )
2019-12-10 15:31:04 +03:00
return - EFAULT ;
2020-09-17 11:22:32 +03:00
ctx - > selected_flavor = pseudoflavor ;
} else {
ctx - > selected_flavor = RPC_AUTH_UNIX ;
2019-12-10 15:31:04 +03:00
}
2020-09-17 11:22:32 +03:00
c = strndup_user ( data - > hostname . data , NFS4_MAXNAMLEN ) ;
if ( IS_ERR ( c ) )
return PTR_ERR ( c ) ;
ctx - > nfs_server . hostname = c ;
c = strndup_user ( data - > mnt_path . data , NFS4_MAXPATHLEN ) ;
if ( IS_ERR ( c ) )
return PTR_ERR ( c ) ;
ctx - > nfs_server . export_path = c ;
dfprintk ( MOUNT , " NFS: MNTPATH: '%s' \n " , c ) ;
c = strndup_user ( data - > client_addr . data , 16 ) ;
if ( IS_ERR ( c ) )
return PTR_ERR ( c ) ;
ctx - > client_address = c ;
/*
* Translate to nfs_fs_context , which nfs_fill_super
* can deal with .
*/
ctx - > flags = data - > flags & NFS4_MOUNT_FLAGMASK ;
ctx - > rsize = data - > rsize ;
ctx - > wsize = data - > wsize ;
ctx - > timeo = data - > timeo ;
ctx - > retrans = data - > retrans ;
ctx - > acregmin = data - > acregmin ;
ctx - > acregmax = data - > acregmax ;
ctx - > acdirmin = data - > acdirmin ;
ctx - > acdirmax = data - > acdirmax ;
ctx - > nfs_server . protocol = data - > proto ;
2021-03-30 16:01:50 +03:00
ret = nfs_validate_transport_protocol ( fc , ctx ) ;
if ( ret )
return ret ;
2020-09-17 11:22:32 +03:00
done :
2019-12-10 15:31:13 +03:00
ctx - > skip_reconfig_option_check = true ;
2019-12-10 15:31:04 +03:00
return 0 ;
out_inval_auth :
2019-12-10 15:31:15 +03:00
return nfs_invalf ( fc , " NFS4: Invalid number of RPC auth flavours %d " ,
data - > auth_flavourlen ) ;
2019-12-10 15:31:04 +03:00
out_no_address :
2019-12-10 15:31:15 +03:00
return nfs_invalf ( fc , " NFS4: mount program didn't pass remote address " ) ;
2019-12-10 15:31:04 +03:00
}
2019-12-10 15:31:13 +03:00
# endif
2019-12-10 15:31:04 +03:00
2019-12-10 15:31:13 +03:00
/*
* Parse a monolithic block of data from sys_mount ( ) .
*/
static int nfs_fs_context_parse_monolithic ( struct fs_context * fc ,
void * data )
2019-12-10 15:31:04 +03:00
{
2019-12-10 15:31:13 +03:00
if ( fc - > fs_type = = & nfs_fs_type )
return nfs23_parse_monolithic ( fc , data ) ;
# if IS_ENABLED(CONFIG_NFS_V4)
if ( fc - > fs_type = = & nfs4_fs_type )
return nfs4_parse_monolithic ( fc , data ) ;
2019-12-10 15:31:04 +03:00
# endif
2019-12-10 15:31:15 +03:00
return nfs_invalf ( fc , " NFS: Unsupported monolithic data version " ) ;
2019-12-10 15:31:13 +03:00
}
/*
* Validate the preparsed information in the config .
*/
static int nfs_fs_context_validate ( struct fs_context * fc )
2019-12-10 15:31:04 +03:00
{
2019-12-10 15:31:13 +03:00
struct nfs_fs_context * ctx = nfs_fc2context ( fc ) ;
struct nfs_subversion * nfs_mod ;
struct sockaddr * sap = ( struct sockaddr * ) & ctx - > nfs_server . address ;
2019-12-10 15:31:04 +03:00
int max_namelen = PAGE_SIZE ;
int max_pathlen = NFS_MAXPATHLEN ;
2019-12-10 15:31:13 +03:00
int port = 0 ;
int ret ;
2019-12-10 15:31:04 +03:00
2019-12-10 15:31:13 +03:00
if ( ! fc - > source )
goto out_no_device_name ;
/* Check for sanity first. */
if ( ctx - > minorversion & & ctx - > version ! = 4 )
goto out_minorversion_mismatch ;
if ( ctx - > options & NFS_OPTION_MIGRATION & &
( ctx - > version ! = 4 | | ctx - > minorversion ! = 0 ) )
goto out_migration_misuse ;
/* Verify that any proto=/mountproto= options match the address
* families in the addr = / mountaddr = options .
*/
if ( ctx - > protofamily ! = AF_UNSPEC & &
ctx - > protofamily ! = ctx - > nfs_server . address . sa_family )
goto out_proto_mismatch ;
if ( ctx - > mountfamily ! = AF_UNSPEC ) {
if ( ctx - > mount_server . addrlen ) {
if ( ctx - > mountfamily ! = ctx - > mount_server . address . sa_family )
goto out_mountproto_mismatch ;
} else {
if ( ctx - > mountfamily ! = ctx - > nfs_server . address . sa_family )
goto out_mountproto_mismatch ;
}
}
2019-12-10 15:31:04 +03:00
if ( ! nfs_verify_server_address ( sap ) )
goto out_no_address ;
2021-03-30 16:01:50 +03:00
ret = nfs_validate_transport_protocol ( fc , ctx ) ;
if ( ret )
return ret ;
2019-12-10 15:31:06 +03:00
if ( ctx - > version = = 4 ) {
2019-12-10 15:31:14 +03:00
if ( IS_ENABLED ( CONFIG_NFS_V4 ) ) {
if ( ctx - > nfs_server . protocol = = XPRT_TRANSPORT_RDMA )
port = NFS_RDMA_PORT ;
else
port = NFS_PORT ;
max_namelen = NFS4_MAXNAMLEN ;
max_pathlen = NFS4_MAXPATHLEN ;
ctx - > flags & = ~ ( NFS_MOUNT_NONLM | NFS_MOUNT_NOACL |
NFS_MOUNT_VER3 | NFS_MOUNT_LOCAL_FLOCK |
NFS_MOUNT_LOCAL_FCNTL ) ;
} else {
goto out_v4_not_compiled ;
}
2019-12-10 15:31:04 +03:00
} else {
2019-12-10 15:31:06 +03:00
nfs_set_mount_transport_protocol ( ctx ) ;
if ( ctx - > nfs_server . protocol = = XPRT_TRANSPORT_RDMA )
2019-12-10 15:31:04 +03:00
port = NFS_RDMA_PORT ;
}
2019-12-10 15:31:06 +03:00
nfs_set_port ( sap , & ctx - > nfs_server . port , port ) ;
2019-12-10 15:31:04 +03:00
2019-12-10 15:31:14 +03:00
ret = nfs_parse_source ( fc , max_namelen , max_pathlen ) ;
2019-12-10 15:31:13 +03:00
if ( ret < 0 )
return ret ;
/* Load the NFS protocol module if we haven't done so yet */
2019-12-10 15:31:14 +03:00
if ( ! ctx - > nfs_mod ) {
2019-12-10 15:31:13 +03:00
nfs_mod = get_nfs_version ( ctx - > version ) ;
if ( IS_ERR ( nfs_mod ) ) {
ret = PTR_ERR ( nfs_mod ) ;
goto out_version_unavailable ;
}
2019-12-10 15:31:14 +03:00
ctx - > nfs_mod = nfs_mod ;
2019-12-10 15:31:13 +03:00
}
2020-02-21 23:21:38 +03:00
/* Ensure the filesystem context has the correct fs_type */
if ( fc - > fs_type ! = ctx - > nfs_mod - > nfs_fs ) {
module_put ( fc - > fs_type - > owner ) ;
__module_get ( ctx - > nfs_mod - > nfs_fs - > owner ) ;
fc - > fs_type = ctx - > nfs_mod - > nfs_fs ;
}
2019-12-10 15:31:13 +03:00
return 0 ;
2019-12-10 15:31:04 +03:00
2019-12-10 15:31:13 +03:00
out_no_device_name :
2019-12-10 15:31:15 +03:00
return nfs_invalf ( fc , " NFS: Device name not specified " ) ;
2019-12-10 15:31:04 +03:00
out_v4_not_compiled :
2019-12-10 15:31:15 +03:00
nfs_errorf ( fc , " NFS: NFSv4 is not compiled into kernel " ) ;
2019-12-10 15:31:04 +03:00
return - EPROTONOSUPPORT ;
out_no_address :
2019-12-10 15:31:15 +03:00
return nfs_invalf ( fc , " NFS: mount program didn't pass remote address " ) ;
2019-12-10 15:31:13 +03:00
out_mountproto_mismatch :
2019-12-10 15:31:15 +03:00
return nfs_invalf ( fc , " NFS: Mount server address does not match mountproto= option " ) ;
2019-12-10 15:31:13 +03:00
out_proto_mismatch :
2019-12-10 15:31:15 +03:00
return nfs_invalf ( fc , " NFS: Server address does not match proto= option " ) ;
2019-12-10 15:31:13 +03:00
out_minorversion_mismatch :
2019-12-10 15:31:15 +03:00
return nfs_invalf ( fc , " NFS: Mount option vers=%u does not support minorversion=%u " ,
2019-12-10 15:31:13 +03:00
ctx - > version , ctx - > minorversion ) ;
out_migration_misuse :
2019-12-10 15:31:15 +03:00
return nfs_invalf ( fc , " NFS: 'Migration' not supported for this NFS version " ) ;
2019-12-10 15:31:13 +03:00
out_version_unavailable :
2019-12-10 15:31:15 +03:00
nfs_errorf ( fc , " NFS: Version unavailable " ) ;
2019-12-10 15:31:13 +03:00
return ret ;
}
/*
* Create an NFS superblock by the appropriate method .
*/
static int nfs_get_tree ( struct fs_context * fc )
{
struct nfs_fs_context * ctx = nfs_fc2context ( fc ) ;
int err = nfs_fs_context_validate ( fc ) ;
if ( err )
return err ;
if ( ! ctx - > internal )
2019-12-10 15:31:14 +03:00
return ctx - > nfs_mod - > rpc_ops - > try_get_tree ( fc ) ;
2019-12-10 15:31:13 +03:00
else
return nfs_get_tree_common ( fc ) ;
2019-12-10 15:31:04 +03:00
}
2019-12-10 15:31:13 +03:00
/*
* Handle duplication of a configuration . The caller copied * src into * sc , but
* it can ' t deal with resource pointers in the filesystem context , so we have
* to do that . We need to clear pointers , copy data or get extra refs as
* appropriate .
*/
static int nfs_fs_context_dup ( struct fs_context * fc , struct fs_context * src_fc )
{
struct nfs_fs_context * src = nfs_fc2context ( src_fc ) , * ctx ;
ctx = kmemdup ( src , sizeof ( struct nfs_fs_context ) , GFP_KERNEL ) ;
if ( ! ctx )
return - ENOMEM ;
2019-12-10 15:31:14 +03:00
ctx - > mntfh = nfs_alloc_fhandle ( ) ;
if ( ! ctx - > mntfh ) {
2019-12-10 15:31:13 +03:00
kfree ( ctx ) ;
return - ENOMEM ;
}
2019-12-10 15:31:14 +03:00
nfs_copy_fh ( ctx - > mntfh , src - > mntfh ) ;
2019-12-10 15:31:13 +03:00
2019-12-10 15:31:14 +03:00
__module_get ( ctx - > nfs_mod - > owner ) ;
2019-12-10 15:31:13 +03:00
ctx - > client_address = NULL ;
ctx - > mount_server . hostname = NULL ;
ctx - > nfs_server . export_path = NULL ;
ctx - > nfs_server . hostname = NULL ;
ctx - > fscache_uniq = NULL ;
ctx - > clone_data . fattr = NULL ;
fc - > fs_private = ctx ;
return 0 ;
}
static void nfs_fs_context_free ( struct fs_context * fc )
{
struct nfs_fs_context * ctx = nfs_fc2context ( fc ) ;
if ( ctx ) {
2019-12-10 15:31:14 +03:00
if ( ctx - > server )
nfs_free_server ( ctx - > server ) ;
if ( ctx - > nfs_mod )
put_nfs_version ( ctx - > nfs_mod ) ;
2019-12-10 15:31:13 +03:00
kfree ( ctx - > client_address ) ;
kfree ( ctx - > mount_server . hostname ) ;
kfree ( ctx - > nfs_server . export_path ) ;
kfree ( ctx - > nfs_server . hostname ) ;
kfree ( ctx - > fscache_uniq ) ;
2019-12-10 15:31:14 +03:00
nfs_free_fhandle ( ctx - > mntfh ) ;
2019-12-10 15:31:13 +03:00
nfs_free_fattr ( ctx - > clone_data . fattr ) ;
kfree ( ctx ) ;
}
}
static const struct fs_context_operations nfs_fs_context_ops = {
. free = nfs_fs_context_free ,
. dup = nfs_fs_context_dup ,
. parse_param = nfs_fs_context_parse_param ,
. parse_monolithic = nfs_fs_context_parse_monolithic ,
. get_tree = nfs_get_tree ,
. reconfigure = nfs_reconfigure ,
} ;
/*
* Prepare superblock configuration . We use the namespaces attached to the
* context . This may be the current process ' s namespaces , or it may be a
* container ' s namespaces .
*/
static int nfs_init_fs_context ( struct fs_context * fc )
{
struct nfs_fs_context * ctx ;
ctx = kzalloc ( sizeof ( struct nfs_fs_context ) , GFP_KERNEL ) ;
if ( unlikely ( ! ctx ) )
return - ENOMEM ;
2019-12-10 15:31:14 +03:00
ctx - > mntfh = nfs_alloc_fhandle ( ) ;
if ( unlikely ( ! ctx - > mntfh ) ) {
2019-12-10 15:31:13 +03:00
kfree ( ctx ) ;
return - ENOMEM ;
}
ctx - > protofamily = AF_UNSPEC ;
ctx - > mountfamily = AF_UNSPEC ;
ctx - > mount_server . port = NFS_UNSPEC_PORT ;
if ( fc - > root ) {
/* reconfigure, start with the current config */
struct nfs_server * nfss = fc - > root - > d_sb - > s_fs_info ;
struct net * net = nfss - > nfs_client - > cl_net ;
ctx - > flags = nfss - > flags ;
ctx - > rsize = nfss - > rsize ;
ctx - > wsize = nfss - > wsize ;
ctx - > retrans = nfss - > client - > cl_timeout - > to_retries ;
ctx - > selected_flavor = nfss - > client - > cl_auth - > au_flavor ;
ctx - > acregmin = nfss - > acregmin / HZ ;
ctx - > acregmax = nfss - > acregmax / HZ ;
ctx - > acdirmin = nfss - > acdirmin / HZ ;
ctx - > acdirmax = nfss - > acdirmax / HZ ;
ctx - > timeo = 10U * nfss - > client - > cl_timeout - > to_initval / HZ ;
ctx - > nfs_server . port = nfss - > port ;
ctx - > nfs_server . addrlen = nfss - > nfs_client - > cl_addrlen ;
ctx - > version = nfss - > nfs_client - > rpc_ops - > version ;
ctx - > minorversion = nfss - > nfs_client - > cl_minorversion ;
memcpy ( & ctx - > nfs_server . address , & nfss - > nfs_client - > cl_addr ,
ctx - > nfs_server . addrlen ) ;
if ( fc - > net_ns ! = net ) {
put_net ( fc - > net_ns ) ;
fc - > net_ns = get_net ( net ) ;
}
2019-12-10 15:31:14 +03:00
ctx - > nfs_mod = nfss - > nfs_client - > cl_nfs_mod ;
__module_get ( ctx - > nfs_mod - > owner ) ;
2019-12-10 15:31:13 +03:00
} else {
/* defaults */
ctx - > timeo = NFS_UNSPEC_TIMEO ;
ctx - > retrans = NFS_UNSPEC_RETRANS ;
ctx - > acregmin = NFS_DEF_ACREGMIN ;
ctx - > acregmax = NFS_DEF_ACREGMAX ;
ctx - > acdirmin = NFS_DEF_ACDIRMIN ;
ctx - > acdirmax = NFS_DEF_ACDIRMAX ;
ctx - > nfs_server . port = NFS_UNSPEC_PORT ;
ctx - > nfs_server . protocol = XPRT_TRANSPORT_TCP ;
ctx - > selected_flavor = RPC_AUTH_MAXFLAVOR ;
ctx - > minorversion = 0 ;
ctx - > need_mount = true ;
2021-02-13 00:41:19 +03:00
fc - > s_iflags | = SB_I_STABLE_WRITES ;
2019-12-10 15:31:13 +03:00
}
fc - > fs_private = ctx ;
fc - > ops = & nfs_fs_context_ops ;
return 0 ;
}
struct file_system_type nfs_fs_type = {
. owner = THIS_MODULE ,
. name = " nfs " ,
. init_fs_context = nfs_init_fs_context ,
2019-09-07 14:23:15 +03:00
. parameters = nfs_fs_parameters ,
2019-12-10 15:31:13 +03:00
. kill_sb = nfs_kill_super ,
. fs_flags = FS_RENAME_DOES_D_MOVE | FS_BINARY_MOUNTDATA ,
} ;
MODULE_ALIAS_FS ( " nfs " ) ;
EXPORT_SYMBOL_GPL ( nfs_fs_type ) ;
# if IS_ENABLED(CONFIG_NFS_V4)
struct file_system_type nfs4_fs_type = {
. owner = THIS_MODULE ,
. name = " nfs4 " ,
. init_fs_context = nfs_init_fs_context ,
2019-09-07 14:23:15 +03:00
. parameters = nfs_fs_parameters ,
2019-12-10 15:31:13 +03:00
. kill_sb = nfs_kill_super ,
. fs_flags = FS_RENAME_DOES_D_MOVE | FS_BINARY_MOUNTDATA ,
} ;
MODULE_ALIAS_FS ( " nfs4 " ) ;
MODULE_ALIAS ( " nfs4 " ) ;
EXPORT_SYMBOL_GPL ( nfs4_fs_type ) ;
# endif /* CONFIG_NFS_V4 */