2019-12-10 12:31:04 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
|
|
|
/*
|
|
|
|
* linux/fs/nfs/fs_context.c
|
|
|
|
*
|
|
|
|
* Copyright (C) 1992 Rick Sladkey
|
|
|
|
*
|
|
|
|
* NFS mount handling.
|
|
|
|
*
|
|
|
|
* Split from fs/nfs/super.c by David Howells <dhowells@redhat.com>
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/fs.h>
|
|
|
|
#include <linux/parser.h>
|
|
|
|
#include <linux/nfs_fs.h>
|
|
|
|
#include <linux/nfs_mount.h>
|
|
|
|
#include <linux/nfs4_mount.h>
|
|
|
|
#include "nfs.h"
|
|
|
|
#include "internal.h"
|
|
|
|
|
|
|
|
#define NFSDBG_FACILITY NFSDBG_MOUNT
|
|
|
|
|
|
|
|
#if IS_ENABLED(CONFIG_NFS_V3)
|
|
|
|
#define NFS_DEFAULT_VERSION 3
|
|
|
|
#else
|
|
|
|
#define NFS_DEFAULT_VERSION 2
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#define NFS_MAX_CONNECTIONS 16
|
|
|
|
|
|
|
|
enum {
|
|
|
|
/* Mount options that take no arguments */
|
|
|
|
Opt_soft, Opt_softerr, Opt_hard,
|
|
|
|
Opt_posix, Opt_noposix,
|
|
|
|
Opt_cto, Opt_nocto,
|
|
|
|
Opt_ac, Opt_noac,
|
|
|
|
Opt_lock, Opt_nolock,
|
|
|
|
Opt_udp, Opt_tcp, Opt_rdma,
|
|
|
|
Opt_acl, Opt_noacl,
|
|
|
|
Opt_rdirplus, Opt_nordirplus,
|
|
|
|
Opt_sharecache, Opt_nosharecache,
|
|
|
|
Opt_resvport, Opt_noresvport,
|
|
|
|
Opt_fscache, Opt_nofscache,
|
|
|
|
Opt_migration, Opt_nomigration,
|
|
|
|
|
|
|
|
/* Mount options that take integer arguments */
|
|
|
|
Opt_port,
|
|
|
|
Opt_rsize, Opt_wsize, Opt_bsize,
|
|
|
|
Opt_timeo, Opt_retrans,
|
|
|
|
Opt_acregmin, Opt_acregmax,
|
|
|
|
Opt_acdirmin, Opt_acdirmax,
|
|
|
|
Opt_actimeo,
|
|
|
|
Opt_namelen,
|
|
|
|
Opt_mountport,
|
|
|
|
Opt_mountvers,
|
|
|
|
Opt_minorversion,
|
|
|
|
|
|
|
|
/* Mount options that take string arguments */
|
|
|
|
Opt_nfsvers,
|
|
|
|
Opt_sec, Opt_proto, Opt_mountproto, Opt_mounthost,
|
|
|
|
Opt_addr, Opt_mountaddr, Opt_clientaddr,
|
|
|
|
Opt_nconnect,
|
|
|
|
Opt_lookupcache,
|
|
|
|
Opt_fscache_uniq,
|
|
|
|
Opt_local_lock,
|
|
|
|
|
|
|
|
/* Special mount options */
|
|
|
|
Opt_userspace, Opt_deprecated, Opt_sloppy,
|
|
|
|
|
|
|
|
Opt_err
|
|
|
|
};
|
|
|
|
|
|
|
|
static const match_table_t nfs_mount_option_tokens = {
|
|
|
|
{ Opt_userspace, "bg" },
|
|
|
|
{ Opt_userspace, "fg" },
|
|
|
|
{ Opt_userspace, "retry=%s" },
|
|
|
|
|
|
|
|
{ Opt_sloppy, "sloppy" },
|
|
|
|
|
|
|
|
{ Opt_soft, "soft" },
|
|
|
|
{ Opt_softerr, "softerr" },
|
|
|
|
{ Opt_hard, "hard" },
|
|
|
|
{ Opt_deprecated, "intr" },
|
|
|
|
{ Opt_deprecated, "nointr" },
|
|
|
|
{ Opt_posix, "posix" },
|
|
|
|
{ Opt_noposix, "noposix" },
|
|
|
|
{ Opt_cto, "cto" },
|
|
|
|
{ Opt_nocto, "nocto" },
|
|
|
|
{ Opt_ac, "ac" },
|
|
|
|
{ Opt_noac, "noac" },
|
|
|
|
{ Opt_lock, "lock" },
|
|
|
|
{ Opt_nolock, "nolock" },
|
|
|
|
{ Opt_udp, "udp" },
|
|
|
|
{ Opt_tcp, "tcp" },
|
|
|
|
{ Opt_rdma, "rdma" },
|
|
|
|
{ Opt_acl, "acl" },
|
|
|
|
{ Opt_noacl, "noacl" },
|
|
|
|
{ Opt_rdirplus, "rdirplus" },
|
|
|
|
{ Opt_nordirplus, "nordirplus" },
|
|
|
|
{ Opt_sharecache, "sharecache" },
|
|
|
|
{ Opt_nosharecache, "nosharecache" },
|
|
|
|
{ Opt_resvport, "resvport" },
|
|
|
|
{ Opt_noresvport, "noresvport" },
|
|
|
|
{ Opt_fscache, "fsc" },
|
|
|
|
{ Opt_nofscache, "nofsc" },
|
|
|
|
{ Opt_migration, "migration" },
|
|
|
|
{ Opt_nomigration, "nomigration" },
|
|
|
|
|
|
|
|
{ Opt_port, "port=%s" },
|
|
|
|
{ Opt_rsize, "rsize=%s" },
|
|
|
|
{ Opt_wsize, "wsize=%s" },
|
|
|
|
{ Opt_bsize, "bsize=%s" },
|
|
|
|
{ Opt_timeo, "timeo=%s" },
|
|
|
|
{ Opt_retrans, "retrans=%s" },
|
|
|
|
{ Opt_acregmin, "acregmin=%s" },
|
|
|
|
{ Opt_acregmax, "acregmax=%s" },
|
|
|
|
{ Opt_acdirmin, "acdirmin=%s" },
|
|
|
|
{ Opt_acdirmax, "acdirmax=%s" },
|
|
|
|
{ Opt_actimeo, "actimeo=%s" },
|
|
|
|
{ Opt_namelen, "namlen=%s" },
|
|
|
|
{ Opt_mountport, "mountport=%s" },
|
|
|
|
{ Opt_mountvers, "mountvers=%s" },
|
|
|
|
{ Opt_minorversion, "minorversion=%s" },
|
|
|
|
|
|
|
|
{ Opt_nfsvers, "nfsvers=%s" },
|
|
|
|
{ Opt_nfsvers, "vers=%s" },
|
|
|
|
|
|
|
|
{ Opt_sec, "sec=%s" },
|
|
|
|
{ Opt_proto, "proto=%s" },
|
|
|
|
{ Opt_mountproto, "mountproto=%s" },
|
|
|
|
{ Opt_addr, "addr=%s" },
|
|
|
|
{ Opt_clientaddr, "clientaddr=%s" },
|
|
|
|
{ Opt_mounthost, "mounthost=%s" },
|
|
|
|
{ Opt_mountaddr, "mountaddr=%s" },
|
|
|
|
|
|
|
|
{ Opt_nconnect, "nconnect=%s" },
|
|
|
|
|
|
|
|
{ Opt_lookupcache, "lookupcache=%s" },
|
|
|
|
{ Opt_fscache_uniq, "fsc=%s" },
|
|
|
|
{ Opt_local_lock, "local_lock=%s" },
|
|
|
|
|
|
|
|
/* The following needs to be listed after all other options */
|
|
|
|
{ Opt_nfsvers, "v%s" },
|
|
|
|
|
|
|
|
{ Opt_err, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
enum {
|
|
|
|
Opt_xprt_udp, Opt_xprt_udp6, Opt_xprt_tcp, Opt_xprt_tcp6, Opt_xprt_rdma,
|
|
|
|
Opt_xprt_rdma6,
|
|
|
|
|
|
|
|
Opt_xprt_err
|
|
|
|
};
|
|
|
|
|
|
|
|
static const match_table_t nfs_xprt_protocol_tokens = {
|
|
|
|
{ Opt_xprt_udp, "udp" },
|
|
|
|
{ Opt_xprt_udp6, "udp6" },
|
|
|
|
{ Opt_xprt_tcp, "tcp" },
|
|
|
|
{ Opt_xprt_tcp6, "tcp6" },
|
|
|
|
{ Opt_xprt_rdma, "rdma" },
|
|
|
|
{ Opt_xprt_rdma6, "rdma6" },
|
|
|
|
|
|
|
|
{ Opt_xprt_err, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
enum {
|
|
|
|
Opt_sec_none, Opt_sec_sys,
|
|
|
|
Opt_sec_krb5, Opt_sec_krb5i, Opt_sec_krb5p,
|
|
|
|
Opt_sec_lkey, Opt_sec_lkeyi, Opt_sec_lkeyp,
|
|
|
|
Opt_sec_spkm, Opt_sec_spkmi, Opt_sec_spkmp,
|
|
|
|
|
|
|
|
Opt_sec_err
|
|
|
|
};
|
|
|
|
|
|
|
|
static const match_table_t nfs_secflavor_tokens = {
|
|
|
|
{ Opt_sec_none, "none" },
|
|
|
|
{ Opt_sec_none, "null" },
|
|
|
|
{ Opt_sec_sys, "sys" },
|
|
|
|
|
|
|
|
{ Opt_sec_krb5, "krb5" },
|
|
|
|
{ Opt_sec_krb5i, "krb5i" },
|
|
|
|
{ Opt_sec_krb5p, "krb5p" },
|
|
|
|
|
|
|
|
{ Opt_sec_lkey, "lkey" },
|
|
|
|
{ Opt_sec_lkeyi, "lkeyi" },
|
|
|
|
{ Opt_sec_lkeyp, "lkeyp" },
|
|
|
|
|
|
|
|
{ Opt_sec_spkm, "spkm3" },
|
|
|
|
{ Opt_sec_spkmi, "spkm3i" },
|
|
|
|
{ Opt_sec_spkmp, "spkm3p" },
|
|
|
|
|
|
|
|
{ Opt_sec_err, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
enum {
|
|
|
|
Opt_lookupcache_all, Opt_lookupcache_positive,
|
|
|
|
Opt_lookupcache_none,
|
|
|
|
|
|
|
|
Opt_lookupcache_err
|
|
|
|
};
|
|
|
|
|
2019-12-10 12:31:05 +00:00
|
|
|
static const match_table_t nfs_lookupcache_tokens = {
|
2019-12-10 12:31:04 +00:00
|
|
|
{ Opt_lookupcache_all, "all" },
|
|
|
|
{ Opt_lookupcache_positive, "pos" },
|
|
|
|
{ Opt_lookupcache_positive, "positive" },
|
|
|
|
{ Opt_lookupcache_none, "none" },
|
|
|
|
|
|
|
|
{ Opt_lookupcache_err, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
enum {
|
|
|
|
Opt_local_lock_all, Opt_local_lock_flock, Opt_local_lock_posix,
|
|
|
|
Opt_local_lock_none,
|
|
|
|
|
|
|
|
Opt_local_lock_err
|
|
|
|
};
|
|
|
|
|
2019-12-10 12:31:05 +00:00
|
|
|
static const match_table_t nfs_local_lock_tokens = {
|
2019-12-10 12:31:04 +00:00
|
|
|
{ Opt_local_lock_all, "all" },
|
|
|
|
{ Opt_local_lock_flock, "flock" },
|
|
|
|
{ Opt_local_lock_posix, "posix" },
|
|
|
|
{ Opt_local_lock_none, "none" },
|
|
|
|
|
|
|
|
{ Opt_local_lock_err, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
enum {
|
|
|
|
Opt_vers_2, Opt_vers_3, Opt_vers_4, Opt_vers_4_0,
|
|
|
|
Opt_vers_4_1, Opt_vers_4_2,
|
|
|
|
|
|
|
|
Opt_vers_err
|
|
|
|
};
|
|
|
|
|
2019-12-10 12:31:05 +00:00
|
|
|
static const match_table_t nfs_vers_tokens = {
|
2019-12-10 12:31:04 +00:00
|
|
|
{ Opt_vers_2, "2" },
|
|
|
|
{ Opt_vers_3, "3" },
|
|
|
|
{ Opt_vers_4, "4" },
|
|
|
|
{ Opt_vers_4_0, "4.0" },
|
|
|
|
{ Opt_vers_4_1, "4.1" },
|
|
|
|
{ Opt_vers_4_2, "4.2" },
|
|
|
|
|
|
|
|
{ Opt_vers_err, NULL }
|
|
|
|
};
|
|
|
|
|
2019-12-10 12:31:06 +00:00
|
|
|
struct nfs_fs_context *nfs_alloc_parsed_mount_data(void)
|
2019-12-10 12:31:04 +00:00
|
|
|
{
|
2019-12-10 12:31:06 +00:00
|
|
|
struct nfs_fs_context *ctx;
|
|
|
|
|
|
|
|
ctx = kzalloc(sizeof(*ctx), GFP_KERNEL);
|
|
|
|
if (ctx) {
|
|
|
|
ctx->timeo = NFS_UNSPEC_TIMEO;
|
|
|
|
ctx->retrans = NFS_UNSPEC_RETRANS;
|
|
|
|
ctx->acregmin = NFS_DEF_ACREGMIN;
|
|
|
|
ctx->acregmax = NFS_DEF_ACREGMAX;
|
|
|
|
ctx->acdirmin = NFS_DEF_ACDIRMIN;
|
|
|
|
ctx->acdirmax = NFS_DEF_ACDIRMAX;
|
|
|
|
ctx->mount_server.port = NFS_UNSPEC_PORT;
|
|
|
|
ctx->nfs_server.port = NFS_UNSPEC_PORT;
|
|
|
|
ctx->nfs_server.protocol = XPRT_TRANSPORT_TCP;
|
|
|
|
ctx->selected_flavor = RPC_AUTH_MAXFLAVOR;
|
|
|
|
ctx->minorversion = 0;
|
|
|
|
ctx->need_mount = true;
|
|
|
|
ctx->net = current->nsproxy->net_ns;
|
|
|
|
ctx->lsm_opts = NULL;
|
2019-12-10 12:31:04 +00:00
|
|
|
}
|
2019-12-10 12:31:06 +00:00
|
|
|
return ctx;
|
2019-12-10 12:31:04 +00:00
|
|
|
}
|
|
|
|
|
2019-12-10 12:31:06 +00:00
|
|
|
void nfs_free_parsed_mount_data(struct nfs_fs_context *ctx)
|
2019-12-10 12:31:04 +00:00
|
|
|
{
|
2019-12-10 12:31:06 +00:00
|
|
|
if (ctx) {
|
|
|
|
kfree(ctx->client_address);
|
|
|
|
kfree(ctx->mount_server.hostname);
|
|
|
|
kfree(ctx->nfs_server.export_path);
|
|
|
|
kfree(ctx->nfs_server.hostname);
|
|
|
|
kfree(ctx->fscache_uniq);
|
|
|
|
security_free_mnt_opts(&ctx->lsm_opts);
|
|
|
|
kfree(ctx);
|
2019-12-10 12:31:04 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Sanity-check a server address provided by the mount command.
|
|
|
|
*
|
|
|
|
* Address family must be initialized, and address must not be
|
|
|
|
* the ANY address for that family.
|
|
|
|
*/
|
|
|
|
static int nfs_verify_server_address(struct sockaddr *addr)
|
|
|
|
{
|
|
|
|
switch (addr->sa_family) {
|
|
|
|
case AF_INET: {
|
|
|
|
struct sockaddr_in *sa = (struct sockaddr_in *)addr;
|
|
|
|
return sa->sin_addr.s_addr != htonl(INADDR_ANY);
|
|
|
|
}
|
|
|
|
case AF_INET6: {
|
|
|
|
struct in6_addr *sa = &((struct sockaddr_in6 *)addr)->sin6_addr;
|
|
|
|
return !ipv6_addr_any(sa);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
dfprintk(MOUNT, "NFS: Invalid IP address specified\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Sanity check the NFS transport protocol.
|
|
|
|
*
|
|
|
|
*/
|
2019-12-10 12:31:06 +00:00
|
|
|
static void nfs_validate_transport_protocol(struct nfs_fs_context *ctx)
|
2019-12-10 12:31:04 +00:00
|
|
|
{
|
2019-12-10 12:31:06 +00:00
|
|
|
switch (ctx->nfs_server.protocol) {
|
2019-12-10 12:31:04 +00:00
|
|
|
case XPRT_TRANSPORT_UDP:
|
|
|
|
case XPRT_TRANSPORT_TCP:
|
|
|
|
case XPRT_TRANSPORT_RDMA:
|
|
|
|
break;
|
|
|
|
default:
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->nfs_server.protocol = XPRT_TRANSPORT_TCP;
|
2019-12-10 12:31:04 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* For text based NFSv2/v3 mounts, the mount protocol transport default
|
|
|
|
* settings should depend upon the specified NFS transport.
|
|
|
|
*/
|
2019-12-10 12:31:06 +00:00
|
|
|
static void nfs_set_mount_transport_protocol(struct nfs_fs_context *ctx)
|
2019-12-10 12:31:04 +00:00
|
|
|
{
|
2019-12-10 12:31:06 +00:00
|
|
|
nfs_validate_transport_protocol(ctx);
|
2019-12-10 12:31:04 +00:00
|
|
|
|
2019-12-10 12:31:06 +00:00
|
|
|
if (ctx->mount_server.protocol == XPRT_TRANSPORT_UDP ||
|
|
|
|
ctx->mount_server.protocol == XPRT_TRANSPORT_TCP)
|
2019-12-10 12:31:04 +00:00
|
|
|
return;
|
2019-12-10 12:31:06 +00:00
|
|
|
switch (ctx->nfs_server.protocol) {
|
2019-12-10 12:31:04 +00:00
|
|
|
case XPRT_TRANSPORT_UDP:
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->mount_server.protocol = XPRT_TRANSPORT_UDP;
|
2019-12-10 12:31:04 +00:00
|
|
|
break;
|
|
|
|
case XPRT_TRANSPORT_TCP:
|
|
|
|
case XPRT_TRANSPORT_RDMA:
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->mount_server.protocol = XPRT_TRANSPORT_TCP;
|
2019-12-10 12:31:04 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Add 'flavor' to 'auth_info' if not already present.
|
|
|
|
* Returns true if 'flavor' ends up in the list, false otherwise
|
|
|
|
*/
|
2019-12-10 12:31:10 +00:00
|
|
|
static int nfs_auth_info_add(struct nfs_fs_context *ctx,
|
|
|
|
struct nfs_auth_info *auth_info,
|
|
|
|
rpc_authflavor_t flavor)
|
2019-12-10 12:31:04 +00:00
|
|
|
{
|
|
|
|
unsigned int i;
|
|
|
|
unsigned int max_flavor_len = ARRAY_SIZE(auth_info->flavors);
|
|
|
|
|
|
|
|
/* make sure this flavor isn't already in the list */
|
|
|
|
for (i = 0; i < auth_info->flavor_len; i++) {
|
|
|
|
if (flavor == auth_info->flavors[i])
|
2019-12-10 12:31:10 +00:00
|
|
|
return 0;
|
2019-12-10 12:31:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (auth_info->flavor_len + 1 >= max_flavor_len) {
|
|
|
|
dfprintk(MOUNT, "NFS: too many sec= flavors\n");
|
2019-12-10 12:31:10 +00:00
|
|
|
return -EINVAL;
|
2019-12-10 12:31:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
auth_info->flavors[auth_info->flavor_len++] = flavor;
|
2019-12-10 12:31:10 +00:00
|
|
|
return 0;
|
2019-12-10 12:31:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Parse the value of the 'sec=' option.
|
|
|
|
*/
|
2019-12-10 12:31:10 +00:00
|
|
|
static int nfs_parse_security_flavors(struct nfs_fs_context *ctx, char *value)
|
2019-12-10 12:31:04 +00:00
|
|
|
{
|
|
|
|
substring_t args[MAX_OPT_ARGS];
|
|
|
|
rpc_authflavor_t pseudoflavor;
|
|
|
|
char *p;
|
2019-12-10 12:31:10 +00:00
|
|
|
int ret;
|
2019-12-10 12:31:04 +00:00
|
|
|
|
|
|
|
dfprintk(MOUNT, "NFS: parsing sec=%s option\n", value);
|
|
|
|
|
|
|
|
while ((p = strsep(&value, ":")) != NULL) {
|
|
|
|
switch (match_token(p, nfs_secflavor_tokens, args)) {
|
|
|
|
case Opt_sec_none:
|
|
|
|
pseudoflavor = RPC_AUTH_NULL;
|
|
|
|
break;
|
|
|
|
case Opt_sec_sys:
|
|
|
|
pseudoflavor = RPC_AUTH_UNIX;
|
|
|
|
break;
|
|
|
|
case Opt_sec_krb5:
|
|
|
|
pseudoflavor = RPC_AUTH_GSS_KRB5;
|
|
|
|
break;
|
|
|
|
case Opt_sec_krb5i:
|
|
|
|
pseudoflavor = RPC_AUTH_GSS_KRB5I;
|
|
|
|
break;
|
|
|
|
case Opt_sec_krb5p:
|
|
|
|
pseudoflavor = RPC_AUTH_GSS_KRB5P;
|
|
|
|
break;
|
|
|
|
case Opt_sec_lkey:
|
|
|
|
pseudoflavor = RPC_AUTH_GSS_LKEY;
|
|
|
|
break;
|
|
|
|
case Opt_sec_lkeyi:
|
|
|
|
pseudoflavor = RPC_AUTH_GSS_LKEYI;
|
|
|
|
break;
|
|
|
|
case Opt_sec_lkeyp:
|
|
|
|
pseudoflavor = RPC_AUTH_GSS_LKEYP;
|
|
|
|
break;
|
|
|
|
case Opt_sec_spkm:
|
|
|
|
pseudoflavor = RPC_AUTH_GSS_SPKM;
|
|
|
|
break;
|
|
|
|
case Opt_sec_spkmi:
|
|
|
|
pseudoflavor = RPC_AUTH_GSS_SPKMI;
|
|
|
|
break;
|
|
|
|
case Opt_sec_spkmp:
|
|
|
|
pseudoflavor = RPC_AUTH_GSS_SPKMP;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
dfprintk(MOUNT,
|
|
|
|
"NFS: sec= option '%s' not recognized\n", p);
|
2019-12-10 12:31:10 +00:00
|
|
|
return -EINVAL;
|
2019-12-10 12:31:04 +00:00
|
|
|
}
|
|
|
|
|
2019-12-10 12:31:10 +00:00
|
|
|
ret = nfs_auth_info_add(ctx, &ctx->auth_info, pseudoflavor);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
2019-12-10 12:31:04 +00:00
|
|
|
}
|
|
|
|
|
2019-12-10 12:31:10 +00:00
|
|
|
return 0;
|
2019-12-10 12:31:04 +00:00
|
|
|
}
|
|
|
|
|
2019-12-10 12:31:10 +00:00
|
|
|
static int nfs_parse_version_string(struct nfs_fs_context *ctx,
|
|
|
|
char *string,
|
|
|
|
substring_t *args)
|
2019-12-10 12:31:04 +00:00
|
|
|
{
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->flags &= ~NFS_MOUNT_VER3;
|
2019-12-10 12:31:04 +00:00
|
|
|
switch (match_token(string, nfs_vers_tokens, args)) {
|
|
|
|
case Opt_vers_2:
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->version = 2;
|
2019-12-10 12:31:04 +00:00
|
|
|
break;
|
|
|
|
case Opt_vers_3:
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->flags |= NFS_MOUNT_VER3;
|
|
|
|
ctx->version = 3;
|
2019-12-10 12:31:04 +00:00
|
|
|
break;
|
|
|
|
case Opt_vers_4:
|
|
|
|
/* Backward compatibility option. In future,
|
|
|
|
* the mount program should always supply
|
|
|
|
* a NFSv4 minor version number.
|
|
|
|
*/
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->version = 4;
|
2019-12-10 12:31:04 +00:00
|
|
|
break;
|
|
|
|
case Opt_vers_4_0:
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->version = 4;
|
|
|
|
ctx->minorversion = 0;
|
2019-12-10 12:31:04 +00:00
|
|
|
break;
|
|
|
|
case Opt_vers_4_1:
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->version = 4;
|
|
|
|
ctx->minorversion = 1;
|
2019-12-10 12:31:04 +00:00
|
|
|
break;
|
|
|
|
case Opt_vers_4_2:
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->version = 4;
|
|
|
|
ctx->minorversion = 2;
|
2019-12-10 12:31:04 +00:00
|
|
|
break;
|
|
|
|
default:
|
2019-12-10 12:31:10 +00:00
|
|
|
dfprintk(MOUNT, "NFS: Unsupported NFS version\n");
|
|
|
|
return -EINVAL;
|
2019-12-10 12:31:04 +00:00
|
|
|
}
|
2019-12-10 12:31:10 +00:00
|
|
|
return 0;
|
2019-12-10 12:31:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs_get_option_str(substring_t args[], char **option)
|
|
|
|
{
|
|
|
|
kfree(*option);
|
|
|
|
*option = match_strdup(args);
|
|
|
|
return !*option;
|
|
|
|
}
|
|
|
|
|
2019-12-10 12:31:09 +00:00
|
|
|
static int nfs_get_option_ui(struct nfs_fs_context *ctx,
|
|
|
|
substring_t args[], unsigned int *option)
|
2019-12-10 12:31:04 +00:00
|
|
|
{
|
2019-12-10 12:31:09 +00:00
|
|
|
match_strlcpy(ctx->buf, args, sizeof(ctx->buf));
|
|
|
|
return kstrtouint(ctx->buf, 10, option);
|
|
|
|
}
|
2019-12-10 12:31:04 +00:00
|
|
|
|
2019-12-10 12:31:09 +00:00
|
|
|
static int nfs_get_option_ui_bound(struct nfs_fs_context *ctx,
|
|
|
|
substring_t args[], unsigned int *option,
|
|
|
|
unsigned int l_bound, unsigned u_bound)
|
|
|
|
{
|
|
|
|
int ret;
|
2019-12-10 12:31:04 +00:00
|
|
|
|
2019-12-10 12:31:09 +00:00
|
|
|
match_strlcpy(ctx->buf, args, sizeof(ctx->buf));
|
|
|
|
ret = kstrtouint(ctx->buf, 10, option);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
if (*option < l_bound || *option > u_bound)
|
|
|
|
return -ERANGE;
|
|
|
|
return 0;
|
2019-12-10 12:31:04 +00:00
|
|
|
}
|
|
|
|
|
2019-12-10 12:31:09 +00:00
|
|
|
static int nfs_get_option_us_bound(struct nfs_fs_context *ctx,
|
|
|
|
substring_t args[], unsigned short *option,
|
|
|
|
unsigned short l_bound,
|
|
|
|
unsigned short u_bound)
|
2019-12-10 12:31:04 +00:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
2019-12-10 12:31:09 +00:00
|
|
|
match_strlcpy(ctx->buf, args, sizeof(ctx->buf));
|
|
|
|
ret = kstrtou16(ctx->buf, 10, option);
|
|
|
|
if (ret < 0)
|
2019-12-10 12:31:04 +00:00
|
|
|
return ret;
|
|
|
|
if (*option < l_bound || *option > u_bound)
|
|
|
|
return -ERANGE;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2019-12-10 12:31:07 +00:00
|
|
|
* Parse a single mount option in "key[=val]" form.
|
2019-12-10 12:31:04 +00:00
|
|
|
*/
|
2019-12-10 12:31:07 +00:00
|
|
|
static int nfs_fs_context_parse_option(struct nfs_fs_context *ctx, char *p)
|
2019-12-10 12:31:04 +00:00
|
|
|
{
|
2019-12-10 12:31:08 +00:00
|
|
|
substring_t args[MAX_OPT_ARGS];
|
2019-12-10 12:31:07 +00:00
|
|
|
char *string;
|
2019-12-10 12:31:10 +00:00
|
|
|
int token, ret;
|
2019-12-10 12:31:04 +00:00
|
|
|
|
2019-12-10 12:31:08 +00:00
|
|
|
dfprintk(MOUNT, "NFS: parsing nfs mount option '%s'\n", p);
|
2019-12-10 12:31:04 +00:00
|
|
|
|
2019-12-10 12:31:08 +00:00
|
|
|
token = match_token(p, nfs_mount_option_tokens, args);
|
|
|
|
switch (token) {
|
2019-12-10 12:31:04 +00:00
|
|
|
/*
|
|
|
|
* boolean options: foo/nofoo
|
|
|
|
*/
|
2019-12-10 12:31:08 +00:00
|
|
|
case Opt_soft:
|
|
|
|
ctx->flags |= NFS_MOUNT_SOFT;
|
|
|
|
ctx->flags &= ~NFS_MOUNT_SOFTERR;
|
|
|
|
break;
|
|
|
|
case Opt_softerr:
|
|
|
|
ctx->flags |= NFS_MOUNT_SOFTERR;
|
|
|
|
ctx->flags &= ~NFS_MOUNT_SOFT;
|
|
|
|
break;
|
|
|
|
case Opt_hard:
|
|
|
|
ctx->flags &= ~(NFS_MOUNT_SOFT|NFS_MOUNT_SOFTERR);
|
|
|
|
break;
|
|
|
|
case Opt_posix:
|
|
|
|
ctx->flags |= NFS_MOUNT_POSIX;
|
|
|
|
break;
|
|
|
|
case Opt_noposix:
|
|
|
|
ctx->flags &= ~NFS_MOUNT_POSIX;
|
|
|
|
break;
|
|
|
|
case Opt_cto:
|
|
|
|
ctx->flags &= ~NFS_MOUNT_NOCTO;
|
|
|
|
break;
|
|
|
|
case Opt_nocto:
|
|
|
|
ctx->flags |= NFS_MOUNT_NOCTO;
|
|
|
|
break;
|
|
|
|
case Opt_ac:
|
|
|
|
ctx->flags &= ~NFS_MOUNT_NOAC;
|
|
|
|
break;
|
|
|
|
case Opt_noac:
|
|
|
|
ctx->flags |= NFS_MOUNT_NOAC;
|
|
|
|
break;
|
|
|
|
case Opt_lock:
|
|
|
|
ctx->flags &= ~NFS_MOUNT_NONLM;
|
2019-12-10 12:31:10 +00:00
|
|
|
ctx->flags &= ~(NFS_MOUNT_LOCAL_FLOCK | NFS_MOUNT_LOCAL_FCNTL);
|
2019-12-10 12:31:08 +00:00
|
|
|
break;
|
|
|
|
case Opt_nolock:
|
|
|
|
ctx->flags |= NFS_MOUNT_NONLM;
|
2019-12-10 12:31:10 +00:00
|
|
|
ctx->flags |= (NFS_MOUNT_LOCAL_FLOCK | NFS_MOUNT_LOCAL_FCNTL);
|
2019-12-10 12:31:08 +00:00
|
|
|
break;
|
|
|
|
case Opt_udp:
|
|
|
|
ctx->flags &= ~NFS_MOUNT_TCP;
|
|
|
|
ctx->nfs_server.protocol = XPRT_TRANSPORT_UDP;
|
|
|
|
break;
|
|
|
|
case Opt_tcp:
|
|
|
|
ctx->flags |= NFS_MOUNT_TCP;
|
|
|
|
ctx->nfs_server.protocol = XPRT_TRANSPORT_TCP;
|
|
|
|
break;
|
|
|
|
case Opt_rdma:
|
|
|
|
ctx->flags |= NFS_MOUNT_TCP; /* for side protocols */
|
|
|
|
ctx->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
|
|
|
|
xprt_load_transport(p);
|
|
|
|
break;
|
|
|
|
case Opt_acl:
|
|
|
|
ctx->flags &= ~NFS_MOUNT_NOACL;
|
|
|
|
break;
|
|
|
|
case Opt_noacl:
|
|
|
|
ctx->flags |= NFS_MOUNT_NOACL;
|
|
|
|
break;
|
|
|
|
case Opt_rdirplus:
|
|
|
|
ctx->flags &= ~NFS_MOUNT_NORDIRPLUS;
|
|
|
|
break;
|
|
|
|
case Opt_nordirplus:
|
|
|
|
ctx->flags |= NFS_MOUNT_NORDIRPLUS;
|
|
|
|
break;
|
|
|
|
case Opt_sharecache:
|
|
|
|
ctx->flags &= ~NFS_MOUNT_UNSHARED;
|
|
|
|
break;
|
|
|
|
case Opt_nosharecache:
|
|
|
|
ctx->flags |= NFS_MOUNT_UNSHARED;
|
|
|
|
break;
|
|
|
|
case Opt_resvport:
|
|
|
|
ctx->flags &= ~NFS_MOUNT_NORESVPORT;
|
|
|
|
break;
|
|
|
|
case Opt_noresvport:
|
|
|
|
ctx->flags |= NFS_MOUNT_NORESVPORT;
|
|
|
|
break;
|
|
|
|
case Opt_fscache:
|
|
|
|
ctx->options |= NFS_OPTION_FSCACHE;
|
|
|
|
kfree(ctx->fscache_uniq);
|
|
|
|
ctx->fscache_uniq = NULL;
|
|
|
|
break;
|
|
|
|
case Opt_nofscache:
|
|
|
|
ctx->options &= ~NFS_OPTION_FSCACHE;
|
|
|
|
kfree(ctx->fscache_uniq);
|
|
|
|
ctx->fscache_uniq = NULL;
|
|
|
|
break;
|
|
|
|
case Opt_migration:
|
|
|
|
ctx->options |= NFS_OPTION_MIGRATION;
|
|
|
|
break;
|
|
|
|
case Opt_nomigration:
|
|
|
|
ctx->options &= ~NFS_OPTION_MIGRATION;
|
|
|
|
break;
|
2019-12-10 12:31:04 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* options that take numeric values
|
|
|
|
*/
|
2019-12-10 12:31:08 +00:00
|
|
|
case Opt_port:
|
2019-12-10 12:31:09 +00:00
|
|
|
if (nfs_get_option_ui_bound(ctx, args, &ctx->nfs_server.port,
|
|
|
|
0, USHRT_MAX))
|
2019-12-10 12:31:08 +00:00
|
|
|
goto out_invalid_value;
|
|
|
|
break;
|
|
|
|
case Opt_rsize:
|
2019-12-10 12:31:09 +00:00
|
|
|
if (nfs_get_option_ui(ctx, args, &ctx->rsize))
|
2019-12-10 12:31:08 +00:00
|
|
|
goto out_invalid_value;
|
|
|
|
break;
|
|
|
|
case Opt_wsize:
|
2019-12-10 12:31:09 +00:00
|
|
|
if (nfs_get_option_ui(ctx, args, &ctx->wsize))
|
2019-12-10 12:31:08 +00:00
|
|
|
goto out_invalid_value;
|
|
|
|
break;
|
|
|
|
case Opt_bsize:
|
2019-12-10 12:31:09 +00:00
|
|
|
if (nfs_get_option_ui(ctx, args, &ctx->bsize))
|
2019-12-10 12:31:08 +00:00
|
|
|
goto out_invalid_value;
|
|
|
|
break;
|
|
|
|
case Opt_timeo:
|
2019-12-10 12:31:09 +00:00
|
|
|
if (nfs_get_option_ui_bound(ctx, args, &ctx->timeo, 1, INT_MAX))
|
2019-12-10 12:31:08 +00:00
|
|
|
goto out_invalid_value;
|
|
|
|
break;
|
|
|
|
case Opt_retrans:
|
2019-12-10 12:31:09 +00:00
|
|
|
if (nfs_get_option_ui_bound(ctx, args, &ctx->retrans, 0, INT_MAX))
|
2019-12-10 12:31:08 +00:00
|
|
|
goto out_invalid_value;
|
|
|
|
break;
|
|
|
|
case Opt_acregmin:
|
2019-12-10 12:31:09 +00:00
|
|
|
if (nfs_get_option_ui(ctx, args, &ctx->acregmin))
|
2019-12-10 12:31:08 +00:00
|
|
|
goto out_invalid_value;
|
|
|
|
break;
|
|
|
|
case Opt_acregmax:
|
2019-12-10 12:31:09 +00:00
|
|
|
if (nfs_get_option_ui(ctx, args, &ctx->acregmax))
|
2019-12-10 12:31:08 +00:00
|
|
|
goto out_invalid_value;
|
|
|
|
break;
|
|
|
|
case Opt_acdirmin:
|
2019-12-10 12:31:09 +00:00
|
|
|
if (nfs_get_option_ui(ctx, args, &ctx->acdirmin))
|
2019-12-10 12:31:08 +00:00
|
|
|
goto out_invalid_value;
|
|
|
|
break;
|
|
|
|
case Opt_acdirmax:
|
2019-12-10 12:31:09 +00:00
|
|
|
if (nfs_get_option_ui(ctx, args, &ctx->acdirmax))
|
2019-12-10 12:31:08 +00:00
|
|
|
goto out_invalid_value;
|
|
|
|
break;
|
|
|
|
case Opt_actimeo:
|
2019-12-10 12:31:09 +00:00
|
|
|
if (nfs_get_option_ui(ctx, args, &ctx->acdirmax))
|
2019-12-10 12:31:08 +00:00
|
|
|
goto out_invalid_value;
|
|
|
|
ctx->acregmin = ctx->acregmax =
|
2019-12-10 12:31:09 +00:00
|
|
|
ctx->acdirmin = ctx->acdirmax;
|
2019-12-10 12:31:08 +00:00
|
|
|
break;
|
|
|
|
case Opt_namelen:
|
2019-12-10 12:31:09 +00:00
|
|
|
if (nfs_get_option_ui(ctx, args, &ctx->namlen))
|
2019-12-10 12:31:08 +00:00
|
|
|
goto out_invalid_value;
|
|
|
|
break;
|
|
|
|
case Opt_mountport:
|
2019-12-10 12:31:09 +00:00
|
|
|
if (nfs_get_option_ui_bound(ctx, args, &ctx->mount_server.port,
|
|
|
|
0, USHRT_MAX))
|
2019-12-10 12:31:08 +00:00
|
|
|
goto out_invalid_value;
|
|
|
|
break;
|
|
|
|
case Opt_mountvers:
|
2019-12-10 12:31:09 +00:00
|
|
|
if (nfs_get_option_ui_bound(ctx, args, &ctx->mount_server.version,
|
|
|
|
NFS_MNT_VERSION, NFS_MNT3_VERSION))
|
2019-12-10 12:31:08 +00:00
|
|
|
goto out_invalid_value;
|
|
|
|
break;
|
|
|
|
case Opt_minorversion:
|
2019-12-10 12:31:09 +00:00
|
|
|
if (nfs_get_option_ui_bound(ctx, args, &ctx->minorversion,
|
|
|
|
0, NFS4_MAX_MINOR_VERSION))
|
2019-12-10 12:31:08 +00:00
|
|
|
goto out_invalid_value;
|
|
|
|
break;
|
2019-12-10 12:31:04 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* options that take text values
|
|
|
|
*/
|
2019-12-10 12:31:08 +00:00
|
|
|
case Opt_nfsvers:
|
|
|
|
string = match_strdup(args);
|
|
|
|
if (string == NULL)
|
|
|
|
goto out_nomem;
|
2019-12-10 12:31:10 +00:00
|
|
|
ret = nfs_parse_version_string(ctx, string, args);
|
2019-12-10 12:31:08 +00:00
|
|
|
kfree(string);
|
2019-12-10 12:31:10 +00:00
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
2019-12-10 12:31:08 +00:00
|
|
|
break;
|
|
|
|
case Opt_sec:
|
|
|
|
string = match_strdup(args);
|
|
|
|
if (string == NULL)
|
|
|
|
goto out_nomem;
|
2019-12-10 12:31:10 +00:00
|
|
|
ret = nfs_parse_security_flavors(ctx, string);
|
2019-12-10 12:31:08 +00:00
|
|
|
kfree(string);
|
2019-12-10 12:31:10 +00:00
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
2019-12-10 12:31:08 +00:00
|
|
|
break;
|
|
|
|
case Opt_proto:
|
|
|
|
string = match_strdup(args);
|
|
|
|
if (string == NULL)
|
|
|
|
goto out_nomem;
|
2019-12-10 12:31:10 +00:00
|
|
|
token = match_token(string, nfs_xprt_protocol_tokens, args);
|
2019-12-10 12:31:08 +00:00
|
|
|
|
|
|
|
ctx->protofamily = AF_INET;
|
|
|
|
switch (token) {
|
|
|
|
case Opt_xprt_udp6:
|
|
|
|
ctx->protofamily = AF_INET6;
|
|
|
|
/* fall through */
|
|
|
|
case Opt_xprt_udp:
|
|
|
|
ctx->flags &= ~NFS_MOUNT_TCP;
|
|
|
|
ctx->nfs_server.protocol = XPRT_TRANSPORT_UDP;
|
2019-12-10 12:31:04 +00:00
|
|
|
break;
|
2019-12-10 12:31:08 +00:00
|
|
|
case Opt_xprt_tcp6:
|
|
|
|
ctx->protofamily = AF_INET6;
|
|
|
|
/* fall through */
|
|
|
|
case Opt_xprt_tcp:
|
|
|
|
ctx->flags |= NFS_MOUNT_TCP;
|
|
|
|
ctx->nfs_server.protocol = XPRT_TRANSPORT_TCP;
|
2019-12-10 12:31:04 +00:00
|
|
|
break;
|
2019-12-10 12:31:08 +00:00
|
|
|
case Opt_xprt_rdma6:
|
|
|
|
ctx->protofamily = AF_INET6;
|
|
|
|
/* fall through */
|
|
|
|
case Opt_xprt_rdma:
|
|
|
|
/* vector side protocols to TCP */
|
|
|
|
ctx->flags |= NFS_MOUNT_TCP;
|
|
|
|
ctx->nfs_server.protocol = XPRT_TRANSPORT_RDMA;
|
|
|
|
xprt_load_transport(string);
|
2019-12-10 12:31:04 +00:00
|
|
|
break;
|
2019-12-10 12:31:08 +00:00
|
|
|
default:
|
2019-12-10 12:31:04 +00:00
|
|
|
kfree(string);
|
2019-12-10 12:31:10 +00:00
|
|
|
dfprintk(MOUNT, "NFS: unrecognized transport protocol\n");
|
2019-12-10 12:31:08 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
kfree(string);
|
|
|
|
break;
|
|
|
|
case Opt_mountproto:
|
|
|
|
string = match_strdup(args);
|
|
|
|
if (string == NULL)
|
|
|
|
goto out_nomem;
|
2019-12-10 12:31:10 +00:00
|
|
|
token = match_token(string, nfs_xprt_protocol_tokens, args);
|
2019-12-10 12:31:08 +00:00
|
|
|
kfree(string);
|
|
|
|
|
|
|
|
ctx->mountfamily = AF_INET;
|
|
|
|
switch (token) {
|
|
|
|
case Opt_xprt_udp6:
|
|
|
|
ctx->mountfamily = AF_INET6;
|
|
|
|
/* fall through */
|
|
|
|
case Opt_xprt_udp:
|
|
|
|
ctx->mount_server.protocol = XPRT_TRANSPORT_UDP;
|
|
|
|
break;
|
|
|
|
case Opt_xprt_tcp6:
|
|
|
|
ctx->mountfamily = AF_INET6;
|
|
|
|
/* fall through */
|
|
|
|
case Opt_xprt_tcp:
|
|
|
|
ctx->mount_server.protocol = XPRT_TRANSPORT_TCP;
|
|
|
|
break;
|
|
|
|
case Opt_xprt_rdma: /* not used for side protocols */
|
|
|
|
default:
|
2019-12-10 12:31:10 +00:00
|
|
|
dfprintk(MOUNT, "NFS: unrecognized transport protocol\n");
|
2019-12-10 12:31:08 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case Opt_addr:
|
|
|
|
string = match_strdup(args);
|
|
|
|
if (string == NULL)
|
|
|
|
goto out_nomem;
|
|
|
|
ctx->nfs_server.addrlen =
|
|
|
|
rpc_pton(ctx->net, string, strlen(string),
|
|
|
|
&ctx->nfs_server.address,
|
2019-12-10 12:31:10 +00:00
|
|
|
sizeof(ctx->nfs_server._address));
|
2019-12-10 12:31:08 +00:00
|
|
|
kfree(string);
|
|
|
|
if (ctx->nfs_server.addrlen == 0)
|
|
|
|
goto out_invalid_address;
|
|
|
|
break;
|
|
|
|
case Opt_clientaddr:
|
|
|
|
if (nfs_get_option_str(args, &ctx->client_address))
|
|
|
|
goto out_nomem;
|
|
|
|
break;
|
|
|
|
case Opt_mounthost:
|
2019-12-10 12:31:10 +00:00
|
|
|
if (nfs_get_option_str(args, &ctx->mount_server.hostname))
|
2019-12-10 12:31:08 +00:00
|
|
|
goto out_nomem;
|
|
|
|
break;
|
|
|
|
case Opt_mountaddr:
|
|
|
|
string = match_strdup(args);
|
|
|
|
if (string == NULL)
|
|
|
|
goto out_nomem;
|
|
|
|
ctx->mount_server.addrlen =
|
|
|
|
rpc_pton(ctx->net, string, strlen(string),
|
|
|
|
&ctx->mount_server.address,
|
2019-12-10 12:31:10 +00:00
|
|
|
sizeof(ctx->mount_server._address));
|
2019-12-10 12:31:08 +00:00
|
|
|
kfree(string);
|
|
|
|
if (ctx->mount_server.addrlen == 0)
|
|
|
|
goto out_invalid_address;
|
|
|
|
break;
|
|
|
|
case Opt_nconnect:
|
2019-12-10 12:31:09 +00:00
|
|
|
if (nfs_get_option_us_bound(ctx, args, &ctx->nfs_server.nconnect,
|
|
|
|
1, NFS_MAX_CONNECTIONS))
|
2019-12-10 12:31:08 +00:00
|
|
|
goto out_invalid_value;
|
|
|
|
break;
|
|
|
|
case Opt_lookupcache:
|
|
|
|
string = match_strdup(args);
|
|
|
|
if (string == NULL)
|
|
|
|
goto out_nomem;
|
2019-12-10 12:31:10 +00:00
|
|
|
token = match_token(string, nfs_lookupcache_tokens, args);
|
2019-12-10 12:31:08 +00:00
|
|
|
kfree(string);
|
|
|
|
switch (token) {
|
|
|
|
case Opt_lookupcache_all:
|
|
|
|
ctx->flags &= ~(NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE);
|
2019-12-10 12:31:04 +00:00
|
|
|
break;
|
2019-12-10 12:31:08 +00:00
|
|
|
case Opt_lookupcache_positive:
|
|
|
|
ctx->flags &= ~NFS_MOUNT_LOOKUP_CACHE_NONE;
|
|
|
|
ctx->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG;
|
2019-12-10 12:31:04 +00:00
|
|
|
break;
|
2019-12-10 12:31:08 +00:00
|
|
|
case Opt_lookupcache_none:
|
|
|
|
ctx->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE;
|
2019-12-10 12:31:04 +00:00
|
|
|
break;
|
2019-12-10 12:31:08 +00:00
|
|
|
default:
|
2019-12-10 12:31:10 +00:00
|
|
|
dfprintk(MOUNT, "NFS: invalid lookupcache argument\n");
|
2019-12-10 12:31:08 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case Opt_fscache_uniq:
|
|
|
|
if (nfs_get_option_str(args, &ctx->fscache_uniq))
|
|
|
|
goto out_nomem;
|
|
|
|
ctx->options |= NFS_OPTION_FSCACHE;
|
|
|
|
break;
|
|
|
|
case Opt_local_lock:
|
|
|
|
string = match_strdup(args);
|
|
|
|
if (string == NULL)
|
|
|
|
goto out_nomem;
|
2019-12-10 12:31:10 +00:00
|
|
|
token = match_token(string, nfs_local_lock_tokens, args);
|
2019-12-10 12:31:08 +00:00
|
|
|
kfree(string);
|
|
|
|
switch (token) {
|
|
|
|
case Opt_local_lock_all:
|
|
|
|
ctx->flags |= (NFS_MOUNT_LOCAL_FLOCK |
|
|
|
|
NFS_MOUNT_LOCAL_FCNTL);
|
2019-12-10 12:31:04 +00:00
|
|
|
break;
|
2019-12-10 12:31:08 +00:00
|
|
|
case Opt_local_lock_flock:
|
|
|
|
ctx->flags |= NFS_MOUNT_LOCAL_FLOCK;
|
2019-12-10 12:31:04 +00:00
|
|
|
break;
|
2019-12-10 12:31:08 +00:00
|
|
|
case Opt_local_lock_posix:
|
|
|
|
ctx->flags |= NFS_MOUNT_LOCAL_FCNTL;
|
2019-12-10 12:31:04 +00:00
|
|
|
break;
|
2019-12-10 12:31:08 +00:00
|
|
|
case Opt_local_lock_none:
|
|
|
|
ctx->flags &= ~(NFS_MOUNT_LOCAL_FLOCK |
|
|
|
|
NFS_MOUNT_LOCAL_FCNTL);
|
2019-12-10 12:31:04 +00:00
|
|
|
break;
|
2019-12-10 12:31:08 +00:00
|
|
|
default:
|
2019-12-10 12:31:10 +00:00
|
|
|
dfprintk(MOUNT, "NFS: invalid local_lock argument\n");
|
2019-12-10 12:31:08 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
break;
|
2019-12-10 12:31:04 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Special options
|
|
|
|
*/
|
2019-12-10 12:31:08 +00:00
|
|
|
case Opt_sloppy:
|
|
|
|
ctx->sloppy = 1;
|
|
|
|
dfprintk(MOUNT, "NFS: relaxing parsing rules\n");
|
|
|
|
break;
|
|
|
|
case Opt_userspace:
|
|
|
|
case Opt_deprecated:
|
2019-12-10 12:31:10 +00:00
|
|
|
dfprintk(MOUNT, "NFS: ignoring mount option '%s'\n", p);
|
2019-12-10 12:31:08 +00:00
|
|
|
break;
|
2019-12-10 12:31:04 +00:00
|
|
|
|
2019-12-10 12:31:08 +00:00
|
|
|
default:
|
2019-12-10 12:31:10 +00:00
|
|
|
dfprintk(MOUNT, "NFS: unrecognized mount option '%s'\n", p);
|
2019-12-10 12:31:08 +00:00
|
|
|
return -EINVAL;
|
2019-12-10 12:31:04 +00:00
|
|
|
}
|
|
|
|
|
2019-12-10 12:31:07 +00:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
out_invalid_address:
|
|
|
|
printk(KERN_INFO "NFS: bad IP address specified: %s\n", p);
|
|
|
|
return -EINVAL;
|
|
|
|
out_invalid_value:
|
|
|
|
printk(KERN_INFO "NFS: bad mount option value specified: %s\n", p);
|
|
|
|
return -EINVAL;
|
|
|
|
out_nomem:
|
|
|
|
printk(KERN_INFO "NFS: not enough memory to parse option\n");
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Error-check and convert a string of mount options from user space into
|
|
|
|
* a data structure. The whole mount string is processed; bad options are
|
|
|
|
* skipped as they are encountered. If there were no errors, return 1;
|
|
|
|
* otherwise return 0 (zero).
|
|
|
|
*/
|
|
|
|
int nfs_parse_mount_options(char *raw, struct nfs_fs_context *ctx)
|
|
|
|
{
|
|
|
|
char *p;
|
|
|
|
int rc, sloppy = 0, invalid_option = 0;
|
|
|
|
|
|
|
|
if (!raw) {
|
|
|
|
dfprintk(MOUNT, "NFS: mount options string was NULL.\n");
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
dfprintk(MOUNT, "NFS: nfs mount opts='%s'\n", raw);
|
|
|
|
|
|
|
|
rc = security_sb_eat_lsm_opts(raw, &ctx->lsm_opts);
|
|
|
|
if (rc)
|
|
|
|
goto out_security_failure;
|
|
|
|
|
|
|
|
while ((p = strsep(&raw, ",")) != NULL) {
|
|
|
|
if (!*p)
|
|
|
|
continue;
|
|
|
|
if (nfs_fs_context_parse_option(ctx, p) < 0)
|
|
|
|
invalid_option = true;
|
|
|
|
}
|
|
|
|
|
2019-12-10 12:31:04 +00:00
|
|
|
if (!sloppy && invalid_option)
|
|
|
|
return 0;
|
|
|
|
|
2019-12-10 12:31:06 +00:00
|
|
|
if (ctx->minorversion && ctx->version != 4)
|
2019-12-10 12:31:04 +00:00
|
|
|
goto out_minorversion_mismatch;
|
|
|
|
|
2019-12-10 12:31:06 +00:00
|
|
|
if (ctx->options & NFS_OPTION_MIGRATION &&
|
|
|
|
(ctx->version != 4 || ctx->minorversion != 0))
|
2019-12-10 12:31:04 +00:00
|
|
|
goto out_migration_misuse;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* verify that any proto=/mountproto= options match the address
|
|
|
|
* families in the addr=/mountaddr= options.
|
|
|
|
*/
|
2019-12-10 12:31:07 +00:00
|
|
|
if (ctx->protofamily != AF_UNSPEC &&
|
2019-12-10 12:31:10 +00:00
|
|
|
ctx->protofamily != ctx->nfs_server.address.sa_family)
|
2019-12-10 12:31:04 +00:00
|
|
|
goto out_proto_mismatch;
|
|
|
|
|
2019-12-10 12:31:07 +00:00
|
|
|
if (ctx->mountfamily != AF_UNSPEC) {
|
2019-12-10 12:31:06 +00:00
|
|
|
if (ctx->mount_server.addrlen) {
|
2019-12-10 12:31:10 +00:00
|
|
|
if (ctx->mountfamily != ctx->mount_server.address.sa_family)
|
2019-12-10 12:31:04 +00:00
|
|
|
goto out_mountproto_mismatch;
|
|
|
|
} else {
|
2019-12-10 12:31:10 +00:00
|
|
|
if (ctx->mountfamily != ctx->nfs_server.address.sa_family)
|
2019-12-10 12:31:04 +00:00
|
|
|
goto out_mountproto_mismatch;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
2019-12-10 12:31:07 +00:00
|
|
|
out_minorversion_mismatch:
|
|
|
|
printk(KERN_INFO "NFS: mount option vers=%u does not support "
|
|
|
|
"minorversion=%u\n", ctx->version, ctx->minorversion);
|
|
|
|
return 0;
|
2019-12-10 12:31:04 +00:00
|
|
|
out_mountproto_mismatch:
|
|
|
|
printk(KERN_INFO "NFS: mount server address does not match mountproto= "
|
|
|
|
"option\n");
|
|
|
|
return 0;
|
|
|
|
out_proto_mismatch:
|
|
|
|
printk(KERN_INFO "NFS: server address does not match proto= option\n");
|
|
|
|
return 0;
|
|
|
|
out_migration_misuse:
|
|
|
|
printk(KERN_INFO
|
|
|
|
"NFS: 'migration' not supported for this NFS version\n");
|
2019-12-10 12:31:07 +00:00
|
|
|
return -EINVAL;
|
2019-12-10 12:31:04 +00:00
|
|
|
out_security_failure:
|
|
|
|
printk(KERN_INFO "NFS: security options invalid: %d\n", rc);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Split "dev_name" into "hostname:export_path".
|
|
|
|
*
|
|
|
|
* The leftmost colon demarks the split between the server's hostname
|
|
|
|
* and the export path. If the hostname starts with a left square
|
|
|
|
* bracket, then it may contain colons.
|
|
|
|
*
|
|
|
|
* Note: caller frees hostname and export path, even on error.
|
|
|
|
*/
|
2019-12-10 12:31:10 +00:00
|
|
|
static int nfs_parse_devname(struct nfs_fs_context *ctx,
|
|
|
|
const char *dev_name,
|
|
|
|
size_t maxnamlen, size_t maxpathlen)
|
2019-12-10 12:31:04 +00:00
|
|
|
{
|
|
|
|
size_t len;
|
|
|
|
char *end;
|
|
|
|
|
|
|
|
if (unlikely(!dev_name || !*dev_name)) {
|
|
|
|
dfprintk(MOUNT, "NFS: device name not specified\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Is the host name protected with square brakcets? */
|
|
|
|
if (*dev_name == '[') {
|
|
|
|
end = strchr(++dev_name, ']');
|
|
|
|
if (end == NULL || end[1] != ':')
|
|
|
|
goto out_bad_devname;
|
|
|
|
|
|
|
|
len = end - dev_name;
|
|
|
|
end++;
|
|
|
|
} else {
|
|
|
|
char *comma;
|
|
|
|
|
|
|
|
end = strchr(dev_name, ':');
|
|
|
|
if (end == NULL)
|
|
|
|
goto out_bad_devname;
|
|
|
|
len = end - dev_name;
|
|
|
|
|
|
|
|
/* kill possible hostname list: not supported */
|
|
|
|
comma = strchr(dev_name, ',');
|
|
|
|
if (comma != NULL && comma < end)
|
|
|
|
len = comma - dev_name;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (len > maxnamlen)
|
|
|
|
goto out_hostname;
|
|
|
|
|
|
|
|
/* N.B. caller will free nfs_server.hostname in all cases */
|
2019-12-10 12:31:10 +00:00
|
|
|
ctx->nfs_server.hostname = kmemdup_nul(dev_name, len, GFP_KERNEL);
|
|
|
|
if (!ctx->nfs_server.hostname)
|
2019-12-10 12:31:04 +00:00
|
|
|
goto out_nomem;
|
|
|
|
len = strlen(++end);
|
|
|
|
if (len > maxpathlen)
|
|
|
|
goto out_path;
|
2019-12-10 12:31:10 +00:00
|
|
|
ctx->nfs_server.export_path = kmemdup_nul(end, len, GFP_KERNEL);
|
|
|
|
if (!ctx->nfs_server.export_path)
|
2019-12-10 12:31:04 +00:00
|
|
|
goto out_nomem;
|
|
|
|
|
2019-12-10 12:31:10 +00:00
|
|
|
dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", ctx->nfs_server.export_path);
|
2019-12-10 12:31:04 +00:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
out_bad_devname:
|
|
|
|
dfprintk(MOUNT, "NFS: device name not in host:path format\n");
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
out_nomem:
|
|
|
|
dfprintk(MOUNT, "NFS: not enough memory to parse device name\n");
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
out_hostname:
|
|
|
|
dfprintk(MOUNT, "NFS: server hostname too long\n");
|
|
|
|
return -ENAMETOOLONG;
|
|
|
|
|
|
|
|
out_path:
|
|
|
|
dfprintk(MOUNT, "NFS: export pathname too long\n");
|
|
|
|
return -ENAMETOOLONG;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2019-12-10 12:31:10 +00:00
|
|
|
* Parse monolithic NFS2/NFS3 mount data
|
2019-12-10 12:31:04 +00:00
|
|
|
* - fills in the mount root filehandle
|
|
|
|
*
|
|
|
|
* For option strings, user space handles the following behaviors:
|
|
|
|
*
|
|
|
|
* + DNS: mapping server host name to IP address ("addr=" option)
|
|
|
|
*
|
|
|
|
* + failure mode: how to behave if a mount request can't be handled
|
|
|
|
* immediately ("fg/bg" option)
|
|
|
|
*
|
|
|
|
* + retry: how often to retry a mount request ("retry=" option)
|
|
|
|
*
|
|
|
|
* + breaking back: trying proto=udp after proto=tcp, v2 after v3,
|
|
|
|
* mountproto=tcp after mountproto=udp, and so on
|
|
|
|
*/
|
|
|
|
static int nfs23_validate_mount_data(void *options,
|
2019-12-10 12:31:06 +00:00
|
|
|
struct nfs_fs_context *ctx,
|
2019-12-10 12:31:04 +00:00
|
|
|
struct nfs_fh *mntfh,
|
|
|
|
const char *dev_name)
|
|
|
|
{
|
|
|
|
struct nfs_mount_data *data = (struct nfs_mount_data *)options;
|
2019-12-10 12:31:06 +00:00
|
|
|
struct sockaddr *sap = (struct sockaddr *)&ctx->nfs_server.address;
|
2019-12-10 12:31:04 +00:00
|
|
|
int extra_flags = NFS_MOUNT_LEGACY_INTERFACE;
|
|
|
|
|
|
|
|
if (data == NULL)
|
|
|
|
goto out_no_data;
|
|
|
|
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->version = NFS_DEFAULT_VERSION;
|
2019-12-10 12:31:04 +00:00
|
|
|
switch (data->version) {
|
|
|
|
case 1:
|
|
|
|
data->namlen = 0; /* fall through */
|
|
|
|
case 2:
|
|
|
|
data->bsize = 0; /* fall through */
|
|
|
|
case 3:
|
|
|
|
if (data->flags & NFS_MOUNT_VER3)
|
|
|
|
goto out_no_v3;
|
|
|
|
data->root.size = NFS2_FHSIZE;
|
|
|
|
memcpy(data->root.data, data->old_root.data, NFS2_FHSIZE);
|
|
|
|
/* Turn off security negotiation */
|
|
|
|
extra_flags |= NFS_MOUNT_SECFLAVOUR;
|
|
|
|
/* fall through */
|
|
|
|
case 4:
|
|
|
|
if (data->flags & NFS_MOUNT_SECFLAVOUR)
|
|
|
|
goto out_no_sec;
|
|
|
|
/* fall through */
|
|
|
|
case 5:
|
|
|
|
memset(data->context, 0, sizeof(data->context));
|
|
|
|
/* fall through */
|
|
|
|
case 6:
|
|
|
|
if (data->flags & NFS_MOUNT_VER3) {
|
|
|
|
if (data->root.size > NFS3_FHSIZE || data->root.size == 0)
|
|
|
|
goto out_invalid_fh;
|
|
|
|
mntfh->size = data->root.size;
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->version = 3;
|
2019-12-10 12:31:04 +00:00
|
|
|
} else {
|
|
|
|
mntfh->size = NFS2_FHSIZE;
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->version = 2;
|
2019-12-10 12:31:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
memcpy(mntfh->data, data->root.data, mntfh->size);
|
|
|
|
if (mntfh->size < sizeof(mntfh->data))
|
|
|
|
memset(mntfh->data + mntfh->size, 0,
|
|
|
|
sizeof(mntfh->data) - mntfh->size);
|
|
|
|
|
|
|
|
/*
|
2019-12-10 12:31:06 +00:00
|
|
|
* Translate to nfs_fs_context, which nfs_fill_super
|
2019-12-10 12:31:04 +00:00
|
|
|
* can deal with.
|
|
|
|
*/
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->flags = data->flags & NFS_MOUNT_FLAGMASK;
|
|
|
|
ctx->flags |= extra_flags;
|
|
|
|
ctx->rsize = data->rsize;
|
|
|
|
ctx->wsize = data->wsize;
|
|
|
|
ctx->timeo = data->timeo;
|
|
|
|
ctx->retrans = data->retrans;
|
|
|
|
ctx->acregmin = data->acregmin;
|
|
|
|
ctx->acregmax = data->acregmax;
|
|
|
|
ctx->acdirmin = data->acdirmin;
|
|
|
|
ctx->acdirmax = data->acdirmax;
|
|
|
|
ctx->need_mount = false;
|
2019-12-10 12:31:04 +00:00
|
|
|
|
|
|
|
memcpy(sap, &data->addr, sizeof(data->addr));
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->nfs_server.addrlen = sizeof(data->addr);
|
|
|
|
ctx->nfs_server.port = ntohs(data->addr.sin_port);
|
2019-12-10 12:31:04 +00:00
|
|
|
if (sap->sa_family != AF_INET ||
|
|
|
|
!nfs_verify_server_address(sap))
|
|
|
|
goto out_no_address;
|
|
|
|
|
|
|
|
if (!(data->flags & NFS_MOUNT_TCP))
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->nfs_server.protocol = XPRT_TRANSPORT_UDP;
|
2019-12-10 12:31:04 +00:00
|
|
|
/* N.B. caller will free nfs_server.hostname in all cases */
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->nfs_server.hostname = kstrdup(data->hostname, GFP_KERNEL);
|
|
|
|
ctx->namlen = data->namlen;
|
|
|
|
ctx->bsize = data->bsize;
|
2019-12-10 12:31:04 +00:00
|
|
|
|
|
|
|
if (data->flags & NFS_MOUNT_SECFLAVOUR)
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->selected_flavor = data->pseudoflavor;
|
2019-12-10 12:31:04 +00:00
|
|
|
else
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->selected_flavor = RPC_AUTH_UNIX;
|
|
|
|
if (!ctx->nfs_server.hostname)
|
2019-12-10 12:31:04 +00:00
|
|
|
goto out_nomem;
|
|
|
|
|
|
|
|
if (!(data->flags & NFS_MOUNT_NONLM))
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->flags &= ~(NFS_MOUNT_LOCAL_FLOCK|
|
2019-12-10 12:31:04 +00:00
|
|
|
NFS_MOUNT_LOCAL_FCNTL);
|
|
|
|
else
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->flags |= (NFS_MOUNT_LOCAL_FLOCK|
|
2019-12-10 12:31:04 +00:00
|
|
|
NFS_MOUNT_LOCAL_FCNTL);
|
|
|
|
/*
|
|
|
|
* The legacy version 6 binary mount data from userspace has a
|
|
|
|
* field used only to transport selinux information into the
|
|
|
|
* the kernel. To continue to support that functionality we
|
|
|
|
* have a touch of selinux knowledge here in the NFS code. The
|
|
|
|
* userspace code converted context=blah to just blah so we are
|
|
|
|
* converting back to the full string selinux understands.
|
|
|
|
*/
|
|
|
|
if (data->context[0]){
|
|
|
|
#ifdef CONFIG_SECURITY_SELINUX
|
|
|
|
int rc;
|
|
|
|
data->context[NFS_MAX_CONTEXT_LEN] = '\0';
|
|
|
|
rc = security_add_mnt_opt("context", data->context,
|
2019-12-10 12:31:06 +00:00
|
|
|
strlen(data->context), ctx->lsm_opts);
|
2019-12-10 12:31:04 +00:00
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
#else
|
|
|
|
return -EINVAL;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return NFS_TEXT_DATA;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
out_no_data:
|
|
|
|
dfprintk(MOUNT, "NFS: mount program didn't pass any mount data\n");
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
out_no_v3:
|
|
|
|
dfprintk(MOUNT, "NFS: nfs_mount_data version %d does not support v3\n",
|
|
|
|
data->version);
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
out_no_sec:
|
|
|
|
dfprintk(MOUNT, "NFS: nfs_mount_data version supports only AUTH_SYS\n");
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
out_nomem:
|
|
|
|
dfprintk(MOUNT, "NFS: not enough memory to handle mount options\n");
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
out_no_address:
|
|
|
|
dfprintk(MOUNT, "NFS: mount program didn't pass remote address\n");
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
out_invalid_fh:
|
|
|
|
dfprintk(MOUNT, "NFS: invalid root filehandle\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
#if IS_ENABLED(CONFIG_NFS_V4)
|
2019-12-10 12:31:06 +00:00
|
|
|
static void nfs4_validate_mount_flags(struct nfs_fs_context *ctx)
|
2019-12-10 12:31:04 +00:00
|
|
|
{
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->flags &= ~(NFS_MOUNT_NONLM|NFS_MOUNT_NOACL|NFS_MOUNT_VER3|
|
2019-12-10 12:31:04 +00:00
|
|
|
NFS_MOUNT_LOCAL_FLOCK|NFS_MOUNT_LOCAL_FCNTL);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Validate NFSv4 mount options
|
|
|
|
*/
|
|
|
|
static int nfs4_validate_mount_data(void *options,
|
2019-12-10 12:31:06 +00:00
|
|
|
struct nfs_fs_context *ctx,
|
2019-12-10 12:31:04 +00:00
|
|
|
const char *dev_name)
|
|
|
|
{
|
2019-12-10 12:31:06 +00:00
|
|
|
struct sockaddr *sap = (struct sockaddr *)&ctx->nfs_server.address;
|
2019-12-10 12:31:04 +00:00
|
|
|
struct nfs4_mount_data *data = (struct nfs4_mount_data *)options;
|
|
|
|
char *c;
|
|
|
|
|
|
|
|
if (data == NULL)
|
|
|
|
goto out_no_data;
|
|
|
|
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->version = 4;
|
2019-12-10 12:31:04 +00:00
|
|
|
|
|
|
|
switch (data->version) {
|
|
|
|
case 1:
|
2019-12-10 12:31:06 +00:00
|
|
|
if (data->host_addrlen > sizeof(ctx->nfs_server.address))
|
2019-12-10 12:31:04 +00:00
|
|
|
goto out_no_address;
|
|
|
|
if (data->host_addrlen == 0)
|
|
|
|
goto out_no_address;
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->nfs_server.addrlen = data->host_addrlen;
|
2019-12-10 12:31:04 +00:00
|
|
|
if (copy_from_user(sap, data->host_addr, data->host_addrlen))
|
|
|
|
return -EFAULT;
|
|
|
|
if (!nfs_verify_server_address(sap))
|
|
|
|
goto out_no_address;
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->nfs_server.port = ntohs(((struct sockaddr_in *)sap)->sin_port);
|
2019-12-10 12:31:04 +00:00
|
|
|
|
|
|
|
if (data->auth_flavourlen) {
|
|
|
|
rpc_authflavor_t pseudoflavor;
|
|
|
|
if (data->auth_flavourlen > 1)
|
|
|
|
goto out_inval_auth;
|
|
|
|
if (copy_from_user(&pseudoflavor,
|
|
|
|
data->auth_flavours,
|
|
|
|
sizeof(pseudoflavor)))
|
|
|
|
return -EFAULT;
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->selected_flavor = pseudoflavor;
|
2019-12-10 12:31:04 +00:00
|
|
|
} else
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->selected_flavor = RPC_AUTH_UNIX;
|
2019-12-10 12:31:04 +00:00
|
|
|
|
|
|
|
c = strndup_user(data->hostname.data, NFS4_MAXNAMLEN);
|
|
|
|
if (IS_ERR(c))
|
|
|
|
return PTR_ERR(c);
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->nfs_server.hostname = c;
|
2019-12-10 12:31:04 +00:00
|
|
|
|
|
|
|
c = strndup_user(data->mnt_path.data, NFS4_MAXPATHLEN);
|
|
|
|
if (IS_ERR(c))
|
|
|
|
return PTR_ERR(c);
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->nfs_server.export_path = c;
|
2019-12-10 12:31:04 +00:00
|
|
|
dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", c);
|
|
|
|
|
|
|
|
c = strndup_user(data->client_addr.data, 16);
|
|
|
|
if (IS_ERR(c))
|
|
|
|
return PTR_ERR(c);
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->client_address = c;
|
2019-12-10 12:31:04 +00:00
|
|
|
|
|
|
|
/*
|
2019-12-10 12:31:06 +00:00
|
|
|
* Translate to nfs_fs_context, which nfs4_fill_super
|
2019-12-10 12:31:04 +00:00
|
|
|
* can deal with.
|
|
|
|
*/
|
|
|
|
|
2019-12-10 12:31:06 +00:00
|
|
|
ctx->flags = data->flags & NFS4_MOUNT_FLAGMASK;
|
|
|
|
ctx->rsize = data->rsize;
|
|
|
|
ctx->wsize = data->wsize;
|
|
|
|
ctx->timeo = data->timeo;
|
|
|
|
ctx->retrans = data->retrans;
|
|
|
|
ctx->acregmin = data->acregmin;
|
|
|
|
ctx->acregmax = data->acregmax;
|
|
|
|
ctx->acdirmin = data->acdirmin;
|
|
|
|
ctx->acdirmax = data->acdirmax;
|
|
|
|
ctx->nfs_server.protocol = data->proto;
|
|
|
|
nfs_validate_transport_protocol(ctx);
|
|
|
|
if (ctx->nfs_server.protocol == XPRT_TRANSPORT_UDP)
|
2019-12-10 12:31:04 +00:00
|
|
|
goto out_invalid_transport_udp;
|
|
|
|
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return NFS_TEXT_DATA;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
out_no_data:
|
|
|
|
dfprintk(MOUNT, "NFS4: mount program didn't pass any mount data\n");
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
out_inval_auth:
|
|
|
|
dfprintk(MOUNT, "NFS4: Invalid number of RPC auth flavours %d\n",
|
|
|
|
data->auth_flavourlen);
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
out_no_address:
|
|
|
|
dfprintk(MOUNT, "NFS4: mount program didn't pass remote address\n");
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
out_invalid_transport_udp:
|
|
|
|
dfprintk(MOUNT, "NFSv4: Unsupported transport protocol udp\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
int nfs_validate_mount_data(struct file_system_type *fs_type,
|
|
|
|
void *options,
|
2019-12-10 12:31:06 +00:00
|
|
|
struct nfs_fs_context *ctx,
|
2019-12-10 12:31:04 +00:00
|
|
|
struct nfs_fh *mntfh,
|
|
|
|
const char *dev_name)
|
|
|
|
{
|
|
|
|
if (fs_type == &nfs_fs_type)
|
2019-12-10 12:31:06 +00:00
|
|
|
return nfs23_validate_mount_data(options, ctx, mntfh, dev_name);
|
|
|
|
return nfs4_validate_mount_data(options, ctx, dev_name);
|
2019-12-10 12:31:04 +00:00
|
|
|
}
|
|
|
|
#else
|
|
|
|
int nfs_validate_mount_data(struct file_system_type *fs_type,
|
|
|
|
void *options,
|
2019-12-10 12:31:06 +00:00
|
|
|
struct nfs_fs_context *ctx,
|
2019-12-10 12:31:04 +00:00
|
|
|
struct nfs_fh *mntfh,
|
|
|
|
const char *dev_name)
|
|
|
|
{
|
2019-12-10 12:31:06 +00:00
|
|
|
return nfs23_validate_mount_data(options, ctx, mntfh, dev_name);
|
2019-12-10 12:31:04 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
int nfs_validate_text_mount_data(void *options,
|
2019-12-10 12:31:06 +00:00
|
|
|
struct nfs_fs_context *ctx,
|
2019-12-10 12:31:04 +00:00
|
|
|
const char *dev_name)
|
|
|
|
{
|
|
|
|
int port = 0;
|
|
|
|
int max_namelen = PAGE_SIZE;
|
|
|
|
int max_pathlen = NFS_MAXPATHLEN;
|
2019-12-10 12:31:06 +00:00
|
|
|
struct sockaddr *sap = (struct sockaddr *)&ctx->nfs_server.address;
|
2019-12-10 12:31:04 +00:00
|
|
|
|
2019-12-10 12:31:06 +00:00
|
|
|
if (nfs_parse_mount_options((char *)options, ctx) == 0)
|
2019-12-10 12:31:04 +00:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (!nfs_verify_server_address(sap))
|
|
|
|
goto out_no_address;
|
|
|
|
|
2019-12-10 12:31:06 +00:00
|
|
|
if (ctx->version == 4) {
|
2019-12-10 12:31:04 +00:00
|
|
|
#if IS_ENABLED(CONFIG_NFS_V4)
|
2019-12-10 12:31:06 +00:00
|
|
|
if (ctx->nfs_server.protocol == XPRT_TRANSPORT_RDMA)
|
2019-12-10 12:31:04 +00:00
|
|
|
port = NFS_RDMA_PORT;
|
|
|
|
else
|
|
|
|
port = NFS_PORT;
|
|
|
|
max_namelen = NFS4_MAXNAMLEN;
|
|
|
|
max_pathlen = NFS4_MAXPATHLEN;
|
2019-12-10 12:31:06 +00:00
|
|
|
nfs_validate_transport_protocol(ctx);
|
|
|
|
if (ctx->nfs_server.protocol == XPRT_TRANSPORT_UDP)
|
2019-12-10 12:31:04 +00:00
|
|
|
goto out_invalid_transport_udp;
|
2019-12-10 12:31:06 +00:00
|
|
|
nfs4_validate_mount_flags(ctx);
|
2019-12-10 12:31:04 +00:00
|
|
|
#else
|
|
|
|
goto out_v4_not_compiled;
|
|
|
|
#endif /* CONFIG_NFS_V4 */
|
|
|
|
} else {
|
2019-12-10 12:31:06 +00:00
|
|
|
nfs_set_mount_transport_protocol(ctx);
|
|
|
|
if (ctx->nfs_server.protocol == XPRT_TRANSPORT_RDMA)
|
2019-12-10 12:31:04 +00:00
|
|
|
port = NFS_RDMA_PORT;
|
|
|
|
}
|
|
|
|
|
2019-12-10 12:31:06 +00:00
|
|
|
nfs_set_port(sap, &ctx->nfs_server.port, port);
|
2019-12-10 12:31:04 +00:00
|
|
|
|
2019-12-10 12:31:10 +00:00
|
|
|
return nfs_parse_devname(ctx, dev_name, max_namelen, max_pathlen);
|
2019-12-10 12:31:04 +00:00
|
|
|
|
|
|
|
#if !IS_ENABLED(CONFIG_NFS_V4)
|
|
|
|
out_v4_not_compiled:
|
|
|
|
dfprintk(MOUNT, "NFS: NFSv4 is not compiled into kernel\n");
|
|
|
|
return -EPROTONOSUPPORT;
|
|
|
|
#else
|
|
|
|
out_invalid_transport_udp:
|
|
|
|
dfprintk(MOUNT, "NFSv4: Unsupported transport protocol udp\n");
|
|
|
|
return -EINVAL;
|
|
|
|
#endif /* !CONFIG_NFS_V4 */
|
|
|
|
|
|
|
|
out_no_address:
|
|
|
|
dfprintk(MOUNT, "NFS: mount program didn't pass remote address\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|