]>
Commit | Line | Data |
---|---|---|
9954bf92 DH |
1 | // SPDX-License-Identifier: GPL-2.0-only |
2 | /* | |
3 | * linux/fs/nfs/fs_context.c | |
4 | * | |
5 | * Copyright (C) 1992 Rick Sladkey | |
f2aedb71 | 6 | * Conversion to new mount api Copyright (C) David Howells |
9954bf92 DH |
7 | * |
8 | * NFS mount handling. | |
9 | * | |
10 | * Split from fs/nfs/super.c by David Howells <dhowells@redhat.com> | |
11 | */ | |
12 | ||
13 | #include <linux/module.h> | |
14 | #include <linux/fs.h> | |
e38bb238 SM |
15 | #include <linux/fs_context.h> |
16 | #include <linux/fs_parser.h> | |
9954bf92 DH |
17 | #include <linux/nfs_fs.h> |
18 | #include <linux/nfs_mount.h> | |
19 | #include <linux/nfs4_mount.h> | |
20 | #include "nfs.h" | |
21 | #include "internal.h" | |
22 | ||
23 | #define NFSDBG_FACILITY NFSDBG_MOUNT | |
24 | ||
25 | #if IS_ENABLED(CONFIG_NFS_V3) | |
26 | #define NFS_DEFAULT_VERSION 3 | |
27 | #else | |
28 | #define NFS_DEFAULT_VERSION 2 | |
29 | #endif | |
30 | ||
31 | #define NFS_MAX_CONNECTIONS 16 | |
32 | ||
e38bb238 SM |
33 | enum nfs_param { |
34 | Opt_ac, | |
35 | Opt_acdirmax, | |
36 | Opt_acdirmin, | |
37 | Opt_acl, | |
38 | Opt_acregmax, | |
39 | Opt_acregmin, | |
9954bf92 | 40 | Opt_actimeo, |
e38bb238 SM |
41 | Opt_addr, |
42 | Opt_bg, | |
43 | Opt_bsize, | |
44 | Opt_clientaddr, | |
45 | Opt_cto, | |
46 | Opt_fg, | |
47 | Opt_fscache, | |
48 | Opt_hard, | |
49 | Opt_intr, | |
50 | Opt_local_lock, | |
51 | Opt_lock, | |
52 | Opt_lookupcache, | |
53 | Opt_migration, | |
54 | Opt_minorversion, | |
55 | Opt_mountaddr, | |
56 | Opt_mounthost, | |
9954bf92 | 57 | Opt_mountport, |
e38bb238 | 58 | Opt_mountproto, |
9954bf92 | 59 | Opt_mountvers, |
e38bb238 | 60 | Opt_namelen, |
9954bf92 | 61 | Opt_nconnect, |
e38bb238 SM |
62 | Opt_port, |
63 | Opt_posix, | |
64 | Opt_proto, | |
65 | Opt_rdirplus, | |
66 | Opt_rdma, | |
67 | Opt_resvport, | |
68 | Opt_retrans, | |
69 | Opt_retry, | |
70 | Opt_rsize, | |
71 | Opt_sec, | |
72 | Opt_sharecache, | |
73 | Opt_sloppy, | |
74 | Opt_soft, | |
75 | Opt_softerr, | |
c74dfe97 | 76 | Opt_softreval, |
e38bb238 SM |
77 | Opt_source, |
78 | Opt_tcp, | |
79 | Opt_timeo, | |
80 | Opt_udp, | |
81 | Opt_v, | |
82 | Opt_vers, | |
83 | Opt_wsize, | |
9954bf92 DH |
84 | }; |
85 | ||
2710c957 AV |
86 | enum { |
87 | Opt_local_lock_all, | |
88 | Opt_local_lock_flock, | |
89 | Opt_local_lock_none, | |
90 | Opt_local_lock_posix, | |
91 | }; | |
92 | ||
5eede625 | 93 | static const struct constant_table nfs_param_enums_local_lock[] = { |
2710c957 AV |
94 | { "all", Opt_local_lock_all }, |
95 | { "flock", Opt_local_lock_flock }, | |
96 | { "none", Opt_local_lock_none }, | |
97 | {} | |
98 | }; | |
99 | ||
100 | enum { | |
101 | Opt_lookupcache_all, | |
102 | Opt_lookupcache_none, | |
103 | Opt_lookupcache_positive, | |
104 | }; | |
105 | ||
5eede625 | 106 | static const struct constant_table nfs_param_enums_lookupcache[] = { |
2710c957 AV |
107 | { "all", Opt_lookupcache_all }, |
108 | { "none", Opt_lookupcache_none }, | |
109 | { "pos", Opt_lookupcache_positive }, | |
110 | { "positive", Opt_lookupcache_positive }, | |
111 | {} | |
112 | }; | |
113 | ||
d7167b14 | 114 | static const struct fs_parameter_spec nfs_fs_parameters[] = { |
e38bb238 SM |
115 | fsparam_flag_no("ac", Opt_ac), |
116 | fsparam_u32 ("acdirmax", Opt_acdirmax), | |
117 | fsparam_u32 ("acdirmin", Opt_acdirmin), | |
118 | fsparam_flag_no("acl", Opt_acl), | |
119 | fsparam_u32 ("acregmax", Opt_acregmax), | |
120 | fsparam_u32 ("acregmin", Opt_acregmin), | |
121 | fsparam_u32 ("actimeo", Opt_actimeo), | |
122 | fsparam_string("addr", Opt_addr), | |
123 | fsparam_flag ("bg", Opt_bg), | |
124 | fsparam_u32 ("bsize", Opt_bsize), | |
125 | fsparam_string("clientaddr", Opt_clientaddr), | |
126 | fsparam_flag_no("cto", Opt_cto), | |
127 | fsparam_flag ("fg", Opt_fg), | |
128 | __fsparam(fs_param_is_string, "fsc", Opt_fscache, | |
2710c957 | 129 | fs_param_neg_with_no|fs_param_v_optional, NULL), |
e38bb238 SM |
130 | fsparam_flag ("hard", Opt_hard), |
131 | __fsparam(fs_param_is_flag, "intr", Opt_intr, | |
2710c957 AV |
132 | fs_param_neg_with_no|fs_param_deprecated, NULL), |
133 | fsparam_enum ("local_lock", Opt_local_lock, nfs_param_enums_local_lock), | |
e38bb238 | 134 | fsparam_flag_no("lock", Opt_lock), |
2710c957 | 135 | fsparam_enum ("lookupcache", Opt_lookupcache, nfs_param_enums_lookupcache), |
e38bb238 SM |
136 | fsparam_flag_no("migration", Opt_migration), |
137 | fsparam_u32 ("minorversion", Opt_minorversion), | |
138 | fsparam_string("mountaddr", Opt_mountaddr), | |
139 | fsparam_string("mounthost", Opt_mounthost), | |
140 | fsparam_u32 ("mountport", Opt_mountport), | |
141 | fsparam_string("mountproto", Opt_mountproto), | |
142 | fsparam_u32 ("mountvers", Opt_mountvers), | |
143 | fsparam_u32 ("namlen", Opt_namelen), | |
144 | fsparam_u32 ("nconnect", Opt_nconnect), | |
145 | fsparam_string("nfsvers", Opt_vers), | |
146 | fsparam_u32 ("port", Opt_port), | |
147 | fsparam_flag_no("posix", Opt_posix), | |
148 | fsparam_string("proto", Opt_proto), | |
149 | fsparam_flag_no("rdirplus", Opt_rdirplus), | |
150 | fsparam_flag ("rdma", Opt_rdma), | |
151 | fsparam_flag_no("resvport", Opt_resvport), | |
152 | fsparam_u32 ("retrans", Opt_retrans), | |
153 | fsparam_string("retry", Opt_retry), | |
154 | fsparam_u32 ("rsize", Opt_rsize), | |
155 | fsparam_string("sec", Opt_sec), | |
156 | fsparam_flag_no("sharecache", Opt_sharecache), | |
157 | fsparam_flag ("sloppy", Opt_sloppy), | |
158 | fsparam_flag ("soft", Opt_soft), | |
159 | fsparam_flag ("softerr", Opt_softerr), | |
c74dfe97 | 160 | fsparam_flag ("softreval", Opt_softreval), |
e38bb238 SM |
161 | fsparam_string("source", Opt_source), |
162 | fsparam_flag ("tcp", Opt_tcp), | |
163 | fsparam_u32 ("timeo", Opt_timeo), | |
164 | fsparam_flag ("udp", Opt_udp), | |
165 | fsparam_flag ("v2", Opt_v), | |
166 | fsparam_flag ("v3", Opt_v), | |
167 | fsparam_flag ("v4", Opt_v), | |
168 | fsparam_flag ("v4.0", Opt_v), | |
169 | fsparam_flag ("v4.1", Opt_v), | |
170 | fsparam_flag ("v4.2", Opt_v), | |
171 | fsparam_string("vers", Opt_vers), | |
172 | fsparam_u32 ("wsize", Opt_wsize), | |
173 | {} | |
9954bf92 DH |
174 | }; |
175 | ||
9954bf92 | 176 | enum { |
e38bb238 SM |
177 | Opt_vers_2, |
178 | Opt_vers_3, | |
179 | Opt_vers_4, | |
180 | Opt_vers_4_0, | |
181 | Opt_vers_4_1, | |
182 | Opt_vers_4_2, | |
9954bf92 DH |
183 | }; |
184 | ||
e38bb238 SM |
185 | static const struct constant_table nfs_vers_tokens[] = { |
186 | { "2", Opt_vers_2 }, | |
187 | { "3", Opt_vers_3 }, | |
188 | { "4", Opt_vers_4 }, | |
189 | { "4.0", Opt_vers_4_0 }, | |
190 | { "4.1", Opt_vers_4_1 }, | |
191 | { "4.2", Opt_vers_4_2 }, | |
9954bf92 DH |
192 | }; |
193 | ||
194 | enum { | |
e38bb238 SM |
195 | Opt_xprt_rdma, |
196 | Opt_xprt_rdma6, | |
197 | Opt_xprt_tcp, | |
198 | Opt_xprt_tcp6, | |
199 | Opt_xprt_udp, | |
200 | Opt_xprt_udp6, | |
201 | nr__Opt_xprt | |
9954bf92 DH |
202 | }; |
203 | ||
e38bb238 SM |
204 | static const struct constant_table nfs_xprt_protocol_tokens[nr__Opt_xprt] = { |
205 | { "rdma", Opt_xprt_rdma }, | |
206 | { "rdma6", Opt_xprt_rdma6 }, | |
207 | { "tcp", Opt_xprt_tcp }, | |
208 | { "tcp6", Opt_xprt_tcp6 }, | |
209 | { "udp", Opt_xprt_udp }, | |
210 | { "udp6", Opt_xprt_udp6 }, | |
9954bf92 DH |
211 | }; |
212 | ||
213 | enum { | |
e38bb238 SM |
214 | Opt_sec_krb5, |
215 | Opt_sec_krb5i, | |
216 | Opt_sec_krb5p, | |
217 | Opt_sec_lkey, | |
218 | Opt_sec_lkeyi, | |
219 | Opt_sec_lkeyp, | |
220 | Opt_sec_none, | |
221 | Opt_sec_spkm, | |
222 | Opt_sec_spkmi, | |
223 | Opt_sec_spkmp, | |
224 | Opt_sec_sys, | |
225 | nr__Opt_sec | |
9954bf92 DH |
226 | }; |
227 | ||
e38bb238 SM |
228 | static const struct constant_table nfs_secflavor_tokens[] = { |
229 | { "krb5", Opt_sec_krb5 }, | |
230 | { "krb5i", Opt_sec_krb5i }, | |
231 | { "krb5p", Opt_sec_krb5p }, | |
232 | { "lkey", Opt_sec_lkey }, | |
233 | { "lkeyi", Opt_sec_lkeyi }, | |
234 | { "lkeyp", Opt_sec_lkeyp }, | |
235 | { "none", Opt_sec_none }, | |
236 | { "null", Opt_sec_none }, | |
237 | { "spkm3", Opt_sec_spkm }, | |
238 | { "spkm3i", Opt_sec_spkmi }, | |
239 | { "spkm3p", Opt_sec_spkmp }, | |
240 | { "sys", Opt_sec_sys }, | |
9954bf92 DH |
241 | }; |
242 | ||
9954bf92 DH |
243 | /* |
244 | * Sanity-check a server address provided by the mount command. | |
245 | * | |
246 | * Address family must be initialized, and address must not be | |
247 | * the ANY address for that family. | |
248 | */ | |
249 | static int nfs_verify_server_address(struct sockaddr *addr) | |
250 | { | |
251 | switch (addr->sa_family) { | |
252 | case AF_INET: { | |
253 | struct sockaddr_in *sa = (struct sockaddr_in *)addr; | |
254 | return sa->sin_addr.s_addr != htonl(INADDR_ANY); | |
255 | } | |
256 | case AF_INET6: { | |
257 | struct in6_addr *sa = &((struct sockaddr_in6 *)addr)->sin6_addr; | |
258 | return !ipv6_addr_any(sa); | |
259 | } | |
260 | } | |
261 | ||
262 | dfprintk(MOUNT, "NFS: Invalid IP address specified\n"); | |
263 | return 0; | |
264 | } | |
265 | ||
266 | /* | |
267 | * Sanity check the NFS transport protocol. | |
268 | * | |
269 | */ | |
5eb005ca | 270 | static void nfs_validate_transport_protocol(struct nfs_fs_context *ctx) |
9954bf92 | 271 | { |
5eb005ca | 272 | switch (ctx->nfs_server.protocol) { |
9954bf92 DH |
273 | case XPRT_TRANSPORT_UDP: |
274 | case XPRT_TRANSPORT_TCP: | |
275 | case XPRT_TRANSPORT_RDMA: | |
276 | break; | |
277 | default: | |
5eb005ca | 278 | ctx->nfs_server.protocol = XPRT_TRANSPORT_TCP; |
9954bf92 DH |
279 | } |
280 | } | |
281 | ||
282 | /* | |
283 | * For text based NFSv2/v3 mounts, the mount protocol transport default | |
284 | * settings should depend upon the specified NFS transport. | |
285 | */ | |
5eb005ca | 286 | static void nfs_set_mount_transport_protocol(struct nfs_fs_context *ctx) |
9954bf92 | 287 | { |
5eb005ca | 288 | nfs_validate_transport_protocol(ctx); |
9954bf92 | 289 | |
5eb005ca DH |
290 | if (ctx->mount_server.protocol == XPRT_TRANSPORT_UDP || |
291 | ctx->mount_server.protocol == XPRT_TRANSPORT_TCP) | |
9954bf92 | 292 | return; |
5eb005ca | 293 | switch (ctx->nfs_server.protocol) { |
9954bf92 | 294 | case XPRT_TRANSPORT_UDP: |
5eb005ca | 295 | ctx->mount_server.protocol = XPRT_TRANSPORT_UDP; |
9954bf92 DH |
296 | break; |
297 | case XPRT_TRANSPORT_TCP: | |
298 | case XPRT_TRANSPORT_RDMA: | |
5eb005ca | 299 | ctx->mount_server.protocol = XPRT_TRANSPORT_TCP; |
9954bf92 DH |
300 | } |
301 | } | |
302 | ||
303 | /* | |
304 | * Add 'flavor' to 'auth_info' if not already present. | |
305 | * Returns true if 'flavor' ends up in the list, false otherwise | |
306 | */ | |
62a55d08 | 307 | static int nfs_auth_info_add(struct fs_context *fc, |
e558100f DH |
308 | struct nfs_auth_info *auth_info, |
309 | rpc_authflavor_t flavor) | |
9954bf92 DH |
310 | { |
311 | unsigned int i; | |
312 | unsigned int max_flavor_len = ARRAY_SIZE(auth_info->flavors); | |
313 | ||
314 | /* make sure this flavor isn't already in the list */ | |
315 | for (i = 0; i < auth_info->flavor_len; i++) { | |
316 | if (flavor == auth_info->flavors[i]) | |
e558100f | 317 | return 0; |
9954bf92 DH |
318 | } |
319 | ||
ce8866f0 SM |
320 | if (auth_info->flavor_len + 1 >= max_flavor_len) |
321 | return nfs_invalf(fc, "NFS: too many sec= flavors"); | |
9954bf92 DH |
322 | |
323 | auth_info->flavors[auth_info->flavor_len++] = flavor; | |
e558100f | 324 | return 0; |
9954bf92 DH |
325 | } |
326 | ||
327 | /* | |
328 | * Parse the value of the 'sec=' option. | |
329 | */ | |
62a55d08 | 330 | static int nfs_parse_security_flavors(struct fs_context *fc, |
e38bb238 | 331 | struct fs_parameter *param) |
9954bf92 | 332 | { |
62a55d08 | 333 | struct nfs_fs_context *ctx = nfs_fc2context(fc); |
9954bf92 | 334 | rpc_authflavor_t pseudoflavor; |
e38bb238 | 335 | char *string = param->string, *p; |
e558100f | 336 | int ret; |
9954bf92 | 337 | |
e38bb238 | 338 | dfprintk(MOUNT, "NFS: parsing %s=%s option\n", param->key, param->string); |
9954bf92 | 339 | |
e38bb238 SM |
340 | while ((p = strsep(&string, ":")) != NULL) { |
341 | if (!*p) | |
342 | continue; | |
343 | switch (lookup_constant(nfs_secflavor_tokens, p, -1)) { | |
9954bf92 DH |
344 | case Opt_sec_none: |
345 | pseudoflavor = RPC_AUTH_NULL; | |
346 | break; | |
347 | case Opt_sec_sys: | |
348 | pseudoflavor = RPC_AUTH_UNIX; | |
349 | break; | |
350 | case Opt_sec_krb5: | |
351 | pseudoflavor = RPC_AUTH_GSS_KRB5; | |
352 | break; | |
353 | case Opt_sec_krb5i: | |
354 | pseudoflavor = RPC_AUTH_GSS_KRB5I; | |
355 | break; | |
356 | case Opt_sec_krb5p: | |
357 | pseudoflavor = RPC_AUTH_GSS_KRB5P; | |
358 | break; | |
359 | case Opt_sec_lkey: | |
360 | pseudoflavor = RPC_AUTH_GSS_LKEY; | |
361 | break; | |
362 | case Opt_sec_lkeyi: | |
363 | pseudoflavor = RPC_AUTH_GSS_LKEYI; | |
364 | break; | |
365 | case Opt_sec_lkeyp: | |
366 | pseudoflavor = RPC_AUTH_GSS_LKEYP; | |
367 | break; | |
368 | case Opt_sec_spkm: | |
369 | pseudoflavor = RPC_AUTH_GSS_SPKM; | |
370 | break; | |
371 | case Opt_sec_spkmi: | |
372 | pseudoflavor = RPC_AUTH_GSS_SPKMI; | |
373 | break; | |
374 | case Opt_sec_spkmp: | |
375 | pseudoflavor = RPC_AUTH_GSS_SPKMP; | |
376 | break; | |
377 | default: | |
ce8866f0 | 378 | return nfs_invalf(fc, "NFS: sec=%s option not recognized", p); |
9954bf92 DH |
379 | } |
380 | ||
62a55d08 | 381 | ret = nfs_auth_info_add(fc, &ctx->auth_info, pseudoflavor); |
e558100f DH |
382 | if (ret < 0) |
383 | return ret; | |
9954bf92 DH |
384 | } |
385 | ||
e558100f | 386 | return 0; |
9954bf92 DH |
387 | } |
388 | ||
62a55d08 | 389 | static int nfs_parse_version_string(struct fs_context *fc, |
e38bb238 | 390 | const char *string) |
9954bf92 | 391 | { |
62a55d08 SM |
392 | struct nfs_fs_context *ctx = nfs_fc2context(fc); |
393 | ||
5eb005ca | 394 | ctx->flags &= ~NFS_MOUNT_VER3; |
e38bb238 | 395 | switch (lookup_constant(nfs_vers_tokens, string, -1)) { |
9954bf92 | 396 | case Opt_vers_2: |
5eb005ca | 397 | ctx->version = 2; |
9954bf92 DH |
398 | break; |
399 | case Opt_vers_3: | |
5eb005ca DH |
400 | ctx->flags |= NFS_MOUNT_VER3; |
401 | ctx->version = 3; | |
9954bf92 DH |
402 | break; |
403 | case Opt_vers_4: | |
404 | /* Backward compatibility option. In future, | |
405 | * the mount program should always supply | |
406 | * a NFSv4 minor version number. | |
407 | */ | |
5eb005ca | 408 | ctx->version = 4; |
9954bf92 DH |
409 | break; |
410 | case Opt_vers_4_0: | |
5eb005ca DH |
411 | ctx->version = 4; |
412 | ctx->minorversion = 0; | |
9954bf92 DH |
413 | break; |
414 | case Opt_vers_4_1: | |
5eb005ca DH |
415 | ctx->version = 4; |
416 | ctx->minorversion = 1; | |
9954bf92 DH |
417 | break; |
418 | case Opt_vers_4_2: | |
5eb005ca DH |
419 | ctx->version = 4; |
420 | ctx->minorversion = 2; | |
9954bf92 DH |
421 | break; |
422 | default: | |
ce8866f0 | 423 | return nfs_invalf(fc, "NFS: Unsupported NFS version"); |
9954bf92 | 424 | } |
e558100f | 425 | return 0; |
9954bf92 DH |
426 | } |
427 | ||
9954bf92 | 428 | /* |
e38bb238 | 429 | * Parse a single mount parameter. |
9954bf92 | 430 | */ |
f2aedb71 | 431 | static int nfs_fs_context_parse_param(struct fs_context *fc, |
e38bb238 | 432 | struct fs_parameter *param) |
9954bf92 | 433 | { |
e38bb238 | 434 | struct fs_parse_result result; |
f2aedb71 | 435 | struct nfs_fs_context *ctx = nfs_fc2context(fc); |
e38bb238 SM |
436 | unsigned short protofamily, mountfamily; |
437 | unsigned int len; | |
438 | int ret, opt; | |
9954bf92 | 439 | |
e38bb238 | 440 | dfprintk(MOUNT, "NFS: parsing nfs mount option '%s'\n", param->key); |
9954bf92 | 441 | |
d7167b14 | 442 | opt = fs_parse(fc, nfs_fs_parameters, param, &result); |
e38bb238 SM |
443 | if (opt < 0) |
444 | return ctx->sloppy ? 1 : opt; | |
445 | ||
446 | switch (opt) { | |
f2aedb71 | 447 | case Opt_source: |
ce8866f0 SM |
448 | if (fc->source) |
449 | return nfs_invalf(fc, "NFS: Multiple sources not supported"); | |
f2aedb71 DH |
450 | fc->source = param->string; |
451 | param->string = NULL; | |
452 | break; | |
453 | ||
9954bf92 DH |
454 | /* |
455 | * boolean options: foo/nofoo | |
456 | */ | |
cbd071b5 DH |
457 | case Opt_soft: |
458 | ctx->flags |= NFS_MOUNT_SOFT; | |
459 | ctx->flags &= ~NFS_MOUNT_SOFTERR; | |
460 | break; | |
461 | case Opt_softerr: | |
c74dfe97 | 462 | ctx->flags |= NFS_MOUNT_SOFTERR | NFS_MOUNT_SOFTREVAL; |
cbd071b5 DH |
463 | ctx->flags &= ~NFS_MOUNT_SOFT; |
464 | break; | |
465 | case Opt_hard: | |
c74dfe97 TM |
466 | ctx->flags &= ~(NFS_MOUNT_SOFT | |
467 | NFS_MOUNT_SOFTERR | | |
468 | NFS_MOUNT_SOFTREVAL); | |
469 | break; | |
470 | case Opt_softreval: | |
471 | if (result.negated) | |
472 | ctx->flags &= ~NFS_MOUNT_SOFTREVAL; | |
473 | else | |
474 | ctx->flags &= NFS_MOUNT_SOFTREVAL; | |
cbd071b5 DH |
475 | break; |
476 | case Opt_posix: | |
e38bb238 SM |
477 | if (result.negated) |
478 | ctx->flags &= ~NFS_MOUNT_POSIX; | |
479 | else | |
480 | ctx->flags |= NFS_MOUNT_POSIX; | |
cbd071b5 DH |
481 | break; |
482 | case Opt_cto: | |
e38bb238 SM |
483 | if (result.negated) |
484 | ctx->flags |= NFS_MOUNT_NOCTO; | |
485 | else | |
486 | ctx->flags &= ~NFS_MOUNT_NOCTO; | |
cbd071b5 DH |
487 | break; |
488 | case Opt_ac: | |
e38bb238 SM |
489 | if (result.negated) |
490 | ctx->flags |= NFS_MOUNT_NOAC; | |
491 | else | |
492 | ctx->flags &= ~NFS_MOUNT_NOAC; | |
cbd071b5 DH |
493 | break; |
494 | case Opt_lock: | |
e38bb238 SM |
495 | if (result.negated) { |
496 | ctx->flags |= NFS_MOUNT_NONLM; | |
497 | ctx->flags |= (NFS_MOUNT_LOCAL_FLOCK | NFS_MOUNT_LOCAL_FCNTL); | |
498 | } else { | |
499 | ctx->flags &= ~NFS_MOUNT_NONLM; | |
500 | ctx->flags &= ~(NFS_MOUNT_LOCAL_FLOCK | NFS_MOUNT_LOCAL_FCNTL); | |
501 | } | |
cbd071b5 DH |
502 | break; |
503 | case Opt_udp: | |
504 | ctx->flags &= ~NFS_MOUNT_TCP; | |
505 | ctx->nfs_server.protocol = XPRT_TRANSPORT_UDP; | |
506 | break; | |
507 | case Opt_tcp: | |
508 | ctx->flags |= NFS_MOUNT_TCP; | |
509 | ctx->nfs_server.protocol = XPRT_TRANSPORT_TCP; | |
510 | break; | |
511 | case Opt_rdma: | |
512 | ctx->flags |= NFS_MOUNT_TCP; /* for side protocols */ | |
513 | ctx->nfs_server.protocol = XPRT_TRANSPORT_RDMA; | |
e38bb238 | 514 | xprt_load_transport(param->key); |
cbd071b5 DH |
515 | break; |
516 | case Opt_acl: | |
e38bb238 SM |
517 | if (result.negated) |
518 | ctx->flags |= NFS_MOUNT_NOACL; | |
519 | else | |
520 | ctx->flags &= ~NFS_MOUNT_NOACL; | |
cbd071b5 DH |
521 | break; |
522 | case Opt_rdirplus: | |
e38bb238 SM |
523 | if (result.negated) |
524 | ctx->flags |= NFS_MOUNT_NORDIRPLUS; | |
525 | else | |
526 | ctx->flags &= ~NFS_MOUNT_NORDIRPLUS; | |
cbd071b5 DH |
527 | break; |
528 | case Opt_sharecache: | |
e38bb238 SM |
529 | if (result.negated) |
530 | ctx->flags |= NFS_MOUNT_UNSHARED; | |
531 | else | |
532 | ctx->flags &= ~NFS_MOUNT_UNSHARED; | |
cbd071b5 DH |
533 | break; |
534 | case Opt_resvport: | |
e38bb238 SM |
535 | if (result.negated) |
536 | ctx->flags |= NFS_MOUNT_NORESVPORT; | |
537 | else | |
538 | ctx->flags &= ~NFS_MOUNT_NORESVPORT; | |
cbd071b5 DH |
539 | break; |
540 | case Opt_fscache: | |
cbd071b5 | 541 | kfree(ctx->fscache_uniq); |
e38bb238 SM |
542 | ctx->fscache_uniq = param->string; |
543 | param->string = NULL; | |
544 | if (result.negated) | |
545 | ctx->options &= ~NFS_OPTION_FSCACHE; | |
546 | else | |
547 | ctx->options |= NFS_OPTION_FSCACHE; | |
cbd071b5 DH |
548 | break; |
549 | case Opt_migration: | |
e38bb238 SM |
550 | if (result.negated) |
551 | ctx->options &= ~NFS_OPTION_MIGRATION; | |
552 | else | |
553 | ctx->options |= NFS_OPTION_MIGRATION; | |
cbd071b5 | 554 | break; |
9954bf92 DH |
555 | |
556 | /* | |
557 | * options that take numeric values | |
558 | */ | |
cbd071b5 | 559 | case Opt_port: |
e38bb238 SM |
560 | if (result.uint_32 > USHRT_MAX) |
561 | goto out_of_bounds; | |
562 | ctx->nfs_server.port = result.uint_32; | |
cbd071b5 DH |
563 | break; |
564 | case Opt_rsize: | |
e38bb238 | 565 | ctx->rsize = result.uint_32; |
cbd071b5 DH |
566 | break; |
567 | case Opt_wsize: | |
e38bb238 | 568 | ctx->wsize = result.uint_32; |
cbd071b5 DH |
569 | break; |
570 | case Opt_bsize: | |
e38bb238 | 571 | ctx->bsize = result.uint_32; |
cbd071b5 DH |
572 | break; |
573 | case Opt_timeo: | |
e38bb238 SM |
574 | if (result.uint_32 < 1 || result.uint_32 > INT_MAX) |
575 | goto out_of_bounds; | |
576 | ctx->timeo = result.uint_32; | |
cbd071b5 DH |
577 | break; |
578 | case Opt_retrans: | |
e38bb238 SM |
579 | if (result.uint_32 > INT_MAX) |
580 | goto out_of_bounds; | |
581 | ctx->retrans = result.uint_32; | |
cbd071b5 DH |
582 | break; |
583 | case Opt_acregmin: | |
e38bb238 | 584 | ctx->acregmin = result.uint_32; |
cbd071b5 DH |
585 | break; |
586 | case Opt_acregmax: | |
e38bb238 | 587 | ctx->acregmax = result.uint_32; |
cbd071b5 DH |
588 | break; |
589 | case Opt_acdirmin: | |
e38bb238 | 590 | ctx->acdirmin = result.uint_32; |
cbd071b5 DH |
591 | break; |
592 | case Opt_acdirmax: | |
e38bb238 | 593 | ctx->acdirmax = result.uint_32; |
cbd071b5 DH |
594 | break; |
595 | case Opt_actimeo: | |
e38bb238 SM |
596 | ctx->acregmin = result.uint_32; |
597 | ctx->acregmax = result.uint_32; | |
598 | ctx->acdirmin = result.uint_32; | |
599 | ctx->acdirmax = result.uint_32; | |
cbd071b5 DH |
600 | break; |
601 | case Opt_namelen: | |
e38bb238 | 602 | ctx->namlen = result.uint_32; |
cbd071b5 DH |
603 | break; |
604 | case Opt_mountport: | |
e38bb238 SM |
605 | if (result.uint_32 > USHRT_MAX) |
606 | goto out_of_bounds; | |
607 | ctx->mount_server.port = result.uint_32; | |
cbd071b5 DH |
608 | break; |
609 | case Opt_mountvers: | |
e38bb238 SM |
610 | if (result.uint_32 < NFS_MNT_VERSION || |
611 | result.uint_32 > NFS_MNT3_VERSION) | |
612 | goto out_of_bounds; | |
613 | ctx->mount_server.version = result.uint_32; | |
cbd071b5 DH |
614 | break; |
615 | case Opt_minorversion: | |
e38bb238 SM |
616 | if (result.uint_32 > NFS4_MAX_MINOR_VERSION) |
617 | goto out_of_bounds; | |
618 | ctx->minorversion = result.uint_32; | |
cbd071b5 | 619 | break; |
9954bf92 DH |
620 | |
621 | /* | |
622 | * options that take text values | |
623 | */ | |
e38bb238 | 624 | case Opt_v: |
62a55d08 | 625 | ret = nfs_parse_version_string(fc, param->key + 1); |
e38bb238 SM |
626 | if (ret < 0) |
627 | return ret; | |
628 | break; | |
629 | case Opt_vers: | |
62a55d08 | 630 | ret = nfs_parse_version_string(fc, param->string); |
e558100f DH |
631 | if (ret < 0) |
632 | return ret; | |
cbd071b5 DH |
633 | break; |
634 | case Opt_sec: | |
62a55d08 | 635 | ret = nfs_parse_security_flavors(fc, param); |
e558100f DH |
636 | if (ret < 0) |
637 | return ret; | |
cbd071b5 | 638 | break; |
cbd071b5 | 639 | |
e38bb238 SM |
640 | case Opt_proto: |
641 | protofamily = AF_INET; | |
642 | switch (lookup_constant(nfs_xprt_protocol_tokens, param->string, -1)) { | |
cbd071b5 | 643 | case Opt_xprt_udp6: |
e38bb238 | 644 | protofamily = AF_INET6; |
cbd071b5 DH |
645 | /* fall through */ |
646 | case Opt_xprt_udp: | |
647 | ctx->flags &= ~NFS_MOUNT_TCP; | |
648 | ctx->nfs_server.protocol = XPRT_TRANSPORT_UDP; | |
9954bf92 | 649 | break; |
cbd071b5 | 650 | case Opt_xprt_tcp6: |
e38bb238 | 651 | protofamily = AF_INET6; |
cbd071b5 DH |
652 | /* fall through */ |
653 | case Opt_xprt_tcp: | |
654 | ctx->flags |= NFS_MOUNT_TCP; | |
655 | ctx->nfs_server.protocol = XPRT_TRANSPORT_TCP; | |
9954bf92 | 656 | break; |
cbd071b5 | 657 | case Opt_xprt_rdma6: |
e38bb238 | 658 | protofamily = AF_INET6; |
cbd071b5 DH |
659 | /* fall through */ |
660 | case Opt_xprt_rdma: | |
661 | /* vector side protocols to TCP */ | |
662 | ctx->flags |= NFS_MOUNT_TCP; | |
663 | ctx->nfs_server.protocol = XPRT_TRANSPORT_RDMA; | |
e38bb238 | 664 | xprt_load_transport(param->string); |
9954bf92 | 665 | break; |
cbd071b5 | 666 | default: |
ce8866f0 | 667 | return nfs_invalf(fc, "NFS: Unrecognized transport protocol"); |
cbd071b5 | 668 | } |
e38bb238 SM |
669 | |
670 | ctx->protofamily = protofamily; | |
cbd071b5 | 671 | break; |
e38bb238 | 672 | |
cbd071b5 | 673 | case Opt_mountproto: |
e38bb238 SM |
674 | mountfamily = AF_INET; |
675 | switch (lookup_constant(nfs_xprt_protocol_tokens, param->string, -1)) { | |
cbd071b5 | 676 | case Opt_xprt_udp6: |
e38bb238 | 677 | mountfamily = AF_INET6; |
cbd071b5 DH |
678 | /* fall through */ |
679 | case Opt_xprt_udp: | |
680 | ctx->mount_server.protocol = XPRT_TRANSPORT_UDP; | |
681 | break; | |
682 | case Opt_xprt_tcp6: | |
e38bb238 | 683 | mountfamily = AF_INET6; |
cbd071b5 DH |
684 | /* fall through */ |
685 | case Opt_xprt_tcp: | |
686 | ctx->mount_server.protocol = XPRT_TRANSPORT_TCP; | |
687 | break; | |
688 | case Opt_xprt_rdma: /* not used for side protocols */ | |
689 | default: | |
ce8866f0 | 690 | return nfs_invalf(fc, "NFS: Unrecognized transport protocol"); |
cbd071b5 | 691 | } |
e38bb238 | 692 | ctx->mountfamily = mountfamily; |
cbd071b5 | 693 | break; |
e38bb238 | 694 | |
cbd071b5 | 695 | case Opt_addr: |
62a55d08 | 696 | len = rpc_pton(fc->net_ns, param->string, param->size, |
e38bb238 SM |
697 | &ctx->nfs_server.address, |
698 | sizeof(ctx->nfs_server._address)); | |
699 | if (len == 0) | |
cbd071b5 | 700 | goto out_invalid_address; |
e38bb238 | 701 | ctx->nfs_server.addrlen = len; |
cbd071b5 DH |
702 | break; |
703 | case Opt_clientaddr: | |
e38bb238 SM |
704 | kfree(ctx->client_address); |
705 | ctx->client_address = param->string; | |
706 | param->string = NULL; | |
cbd071b5 DH |
707 | break; |
708 | case Opt_mounthost: | |
e38bb238 SM |
709 | kfree(ctx->mount_server.hostname); |
710 | ctx->mount_server.hostname = param->string; | |
711 | param->string = NULL; | |
cbd071b5 DH |
712 | break; |
713 | case Opt_mountaddr: | |
62a55d08 | 714 | len = rpc_pton(fc->net_ns, param->string, param->size, |
e38bb238 SM |
715 | &ctx->mount_server.address, |
716 | sizeof(ctx->mount_server._address)); | |
717 | if (len == 0) | |
cbd071b5 | 718 | goto out_invalid_address; |
e38bb238 | 719 | ctx->mount_server.addrlen = len; |
cbd071b5 DH |
720 | break; |
721 | case Opt_nconnect: | |
e38bb238 SM |
722 | if (result.uint_32 < 1 || result.uint_32 > NFS_MAX_CONNECTIONS) |
723 | goto out_of_bounds; | |
724 | ctx->nfs_server.nconnect = result.uint_32; | |
cbd071b5 DH |
725 | break; |
726 | case Opt_lookupcache: | |
e38bb238 | 727 | switch (result.uint_32) { |
cbd071b5 DH |
728 | case Opt_lookupcache_all: |
729 | ctx->flags &= ~(NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE); | |
9954bf92 | 730 | break; |
cbd071b5 DH |
731 | case Opt_lookupcache_positive: |
732 | ctx->flags &= ~NFS_MOUNT_LOOKUP_CACHE_NONE; | |
733 | ctx->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG; | |
9954bf92 | 734 | break; |
cbd071b5 DH |
735 | case Opt_lookupcache_none: |
736 | ctx->flags |= NFS_MOUNT_LOOKUP_CACHE_NONEG|NFS_MOUNT_LOOKUP_CACHE_NONE; | |
9954bf92 | 737 | break; |
cbd071b5 | 738 | default: |
e38bb238 | 739 | goto out_invalid_value; |
cbd071b5 DH |
740 | } |
741 | break; | |
cbd071b5 | 742 | case Opt_local_lock: |
e38bb238 | 743 | switch (result.uint_32) { |
cbd071b5 DH |
744 | case Opt_local_lock_all: |
745 | ctx->flags |= (NFS_MOUNT_LOCAL_FLOCK | | |
746 | NFS_MOUNT_LOCAL_FCNTL); | |
9954bf92 | 747 | break; |
cbd071b5 DH |
748 | case Opt_local_lock_flock: |
749 | ctx->flags |= NFS_MOUNT_LOCAL_FLOCK; | |
9954bf92 | 750 | break; |
cbd071b5 DH |
751 | case Opt_local_lock_posix: |
752 | ctx->flags |= NFS_MOUNT_LOCAL_FCNTL; | |
9954bf92 | 753 | break; |
cbd071b5 DH |
754 | case Opt_local_lock_none: |
755 | ctx->flags &= ~(NFS_MOUNT_LOCAL_FLOCK | | |
756 | NFS_MOUNT_LOCAL_FCNTL); | |
9954bf92 | 757 | break; |
cbd071b5 | 758 | default: |
e38bb238 | 759 | goto out_invalid_value; |
cbd071b5 DH |
760 | } |
761 | break; | |
9954bf92 DH |
762 | |
763 | /* | |
764 | * Special options | |
765 | */ | |
cbd071b5 | 766 | case Opt_sloppy: |
e38bb238 | 767 | ctx->sloppy = true; |
cbd071b5 DH |
768 | dfprintk(MOUNT, "NFS: relaxing parsing rules\n"); |
769 | break; | |
9954bf92 DH |
770 | } |
771 | ||
f8ee01e3 DH |
772 | return 0; |
773 | ||
f8ee01e3 | 774 | out_invalid_value: |
ce8866f0 | 775 | return nfs_invalf(fc, "NFS: Bad mount option value specified"); |
e38bb238 | 776 | out_invalid_address: |
ce8866f0 | 777 | return nfs_invalf(fc, "NFS: Bad IP address specified"); |
e38bb238 | 778 | out_of_bounds: |
3a21409a | 779 | return nfs_invalf(fc, "NFS: Value for '%s' out of range", param->key); |
e38bb238 SM |
780 | } |
781 | ||
9954bf92 | 782 | /* |
62a55d08 | 783 | * Split fc->source into "hostname:export_path". |
9954bf92 DH |
784 | * |
785 | * The leftmost colon demarks the split between the server's hostname | |
786 | * and the export path. If the hostname starts with a left square | |
787 | * bracket, then it may contain colons. | |
788 | * | |
789 | * Note: caller frees hostname and export path, even on error. | |
790 | */ | |
62a55d08 SM |
791 | static int nfs_parse_source(struct fs_context *fc, |
792 | size_t maxnamlen, size_t maxpathlen) | |
9954bf92 | 793 | { |
62a55d08 SM |
794 | struct nfs_fs_context *ctx = nfs_fc2context(fc); |
795 | const char *dev_name = fc->source; | |
9954bf92 | 796 | size_t len; |
62a55d08 | 797 | const char *end; |
9954bf92 DH |
798 | |
799 | if (unlikely(!dev_name || !*dev_name)) { | |
800 | dfprintk(MOUNT, "NFS: device name not specified\n"); | |
801 | return -EINVAL; | |
802 | } | |
803 | ||
804 | /* Is the host name protected with square brakcets? */ | |
805 | if (*dev_name == '[') { | |
806 | end = strchr(++dev_name, ']'); | |
807 | if (end == NULL || end[1] != ':') | |
808 | goto out_bad_devname; | |
809 | ||
810 | len = end - dev_name; | |
811 | end++; | |
812 | } else { | |
62a55d08 | 813 | const char *comma; |
9954bf92 DH |
814 | |
815 | end = strchr(dev_name, ':'); | |
816 | if (end == NULL) | |
817 | goto out_bad_devname; | |
818 | len = end - dev_name; | |
819 | ||
820 | /* kill possible hostname list: not supported */ | |
62a55d08 SM |
821 | comma = memchr(dev_name, ',', len); |
822 | if (comma) | |
9954bf92 DH |
823 | len = comma - dev_name; |
824 | } | |
825 | ||
826 | if (len > maxnamlen) | |
827 | goto out_hostname; | |
828 | ||
829 | /* N.B. caller will free nfs_server.hostname in all cases */ | |
e558100f DH |
830 | ctx->nfs_server.hostname = kmemdup_nul(dev_name, len, GFP_KERNEL); |
831 | if (!ctx->nfs_server.hostname) | |
9954bf92 DH |
832 | goto out_nomem; |
833 | len = strlen(++end); | |
834 | if (len > maxpathlen) | |
835 | goto out_path; | |
e558100f DH |
836 | ctx->nfs_server.export_path = kmemdup_nul(end, len, GFP_KERNEL); |
837 | if (!ctx->nfs_server.export_path) | |
9954bf92 DH |
838 | goto out_nomem; |
839 | ||
e558100f | 840 | dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", ctx->nfs_server.export_path); |
9954bf92 DH |
841 | return 0; |
842 | ||
843 | out_bad_devname: | |
ce8866f0 | 844 | return nfs_invalf(fc, "NFS: device name not in host:path format"); |
9954bf92 | 845 | out_nomem: |
ce8866f0 | 846 | nfs_errorf(fc, "NFS: not enough memory to parse device name"); |
9954bf92 | 847 | return -ENOMEM; |
9954bf92 | 848 | out_hostname: |
ce8866f0 | 849 | nfs_errorf(fc, "NFS: server hostname too long"); |
9954bf92 | 850 | return -ENAMETOOLONG; |
9954bf92 | 851 | out_path: |
ce8866f0 | 852 | nfs_errorf(fc, "NFS: export pathname too long"); |
9954bf92 DH |
853 | return -ENAMETOOLONG; |
854 | } | |
855 | ||
f2aedb71 DH |
856 | static inline bool is_remount_fc(struct fs_context *fc) |
857 | { | |
858 | return fc->root != NULL; | |
859 | } | |
860 | ||
9954bf92 | 861 | /* |
e558100f | 862 | * Parse monolithic NFS2/NFS3 mount data |
9954bf92 DH |
863 | * - fills in the mount root filehandle |
864 | * | |
865 | * For option strings, user space handles the following behaviors: | |
866 | * | |
867 | * + DNS: mapping server host name to IP address ("addr=" option) | |
868 | * | |
869 | * + failure mode: how to behave if a mount request can't be handled | |
870 | * immediately ("fg/bg" option) | |
871 | * | |
872 | * + retry: how often to retry a mount request ("retry=" option) | |
873 | * | |
874 | * + breaking back: trying proto=udp after proto=tcp, v2 after v3, | |
875 | * mountproto=tcp after mountproto=udp, and so on | |
876 | */ | |
f2aedb71 DH |
877 | static int nfs23_parse_monolithic(struct fs_context *fc, |
878 | struct nfs_mount_data *data) | |
9954bf92 | 879 | { |
f2aedb71 | 880 | struct nfs_fs_context *ctx = nfs_fc2context(fc); |
62a55d08 | 881 | struct nfs_fh *mntfh = ctx->mntfh; |
5eb005ca | 882 | struct sockaddr *sap = (struct sockaddr *)&ctx->nfs_server.address; |
9954bf92 DH |
883 | int extra_flags = NFS_MOUNT_LEGACY_INTERFACE; |
884 | ||
885 | if (data == NULL) | |
886 | goto out_no_data; | |
887 | ||
5eb005ca | 888 | ctx->version = NFS_DEFAULT_VERSION; |
9954bf92 DH |
889 | switch (data->version) { |
890 | case 1: | |
891 | data->namlen = 0; /* fall through */ | |
892 | case 2: | |
893 | data->bsize = 0; /* fall through */ | |
894 | case 3: | |
895 | if (data->flags & NFS_MOUNT_VER3) | |
896 | goto out_no_v3; | |
897 | data->root.size = NFS2_FHSIZE; | |
898 | memcpy(data->root.data, data->old_root.data, NFS2_FHSIZE); | |
899 | /* Turn off security negotiation */ | |
900 | extra_flags |= NFS_MOUNT_SECFLAVOUR; | |
901 | /* fall through */ | |
902 | case 4: | |
903 | if (data->flags & NFS_MOUNT_SECFLAVOUR) | |
904 | goto out_no_sec; | |
905 | /* fall through */ | |
906 | case 5: | |
907 | memset(data->context, 0, sizeof(data->context)); | |
908 | /* fall through */ | |
909 | case 6: | |
910 | if (data->flags & NFS_MOUNT_VER3) { | |
911 | if (data->root.size > NFS3_FHSIZE || data->root.size == 0) | |
912 | goto out_invalid_fh; | |
913 | mntfh->size = data->root.size; | |
5eb005ca | 914 | ctx->version = 3; |
9954bf92 DH |
915 | } else { |
916 | mntfh->size = NFS2_FHSIZE; | |
5eb005ca | 917 | ctx->version = 2; |
9954bf92 DH |
918 | } |
919 | ||
920 | ||
921 | memcpy(mntfh->data, data->root.data, mntfh->size); | |
922 | if (mntfh->size < sizeof(mntfh->data)) | |
923 | memset(mntfh->data + mntfh->size, 0, | |
924 | sizeof(mntfh->data) - mntfh->size); | |
925 | ||
926 | /* | |
5eb005ca | 927 | * Translate to nfs_fs_context, which nfs_fill_super |
9954bf92 DH |
928 | * can deal with. |
929 | */ | |
5eb005ca DH |
930 | ctx->flags = data->flags & NFS_MOUNT_FLAGMASK; |
931 | ctx->flags |= extra_flags; | |
932 | ctx->rsize = data->rsize; | |
933 | ctx->wsize = data->wsize; | |
934 | ctx->timeo = data->timeo; | |
935 | ctx->retrans = data->retrans; | |
936 | ctx->acregmin = data->acregmin; | |
937 | ctx->acregmax = data->acregmax; | |
938 | ctx->acdirmin = data->acdirmin; | |
939 | ctx->acdirmax = data->acdirmax; | |
940 | ctx->need_mount = false; | |
9954bf92 DH |
941 | |
942 | memcpy(sap, &data->addr, sizeof(data->addr)); | |
5eb005ca DH |
943 | ctx->nfs_server.addrlen = sizeof(data->addr); |
944 | ctx->nfs_server.port = ntohs(data->addr.sin_port); | |
9954bf92 DH |
945 | if (sap->sa_family != AF_INET || |
946 | !nfs_verify_server_address(sap)) | |
947 | goto out_no_address; | |
948 | ||
949 | if (!(data->flags & NFS_MOUNT_TCP)) | |
5eb005ca | 950 | ctx->nfs_server.protocol = XPRT_TRANSPORT_UDP; |
9954bf92 | 951 | /* N.B. caller will free nfs_server.hostname in all cases */ |
5eb005ca | 952 | ctx->nfs_server.hostname = kstrdup(data->hostname, GFP_KERNEL); |
f2aedb71 DH |
953 | if (!ctx->nfs_server.hostname) |
954 | goto out_nomem; | |
955 | ||
5eb005ca DH |
956 | ctx->namlen = data->namlen; |
957 | ctx->bsize = data->bsize; | |
9954bf92 DH |
958 | |
959 | if (data->flags & NFS_MOUNT_SECFLAVOUR) | |
5eb005ca | 960 | ctx->selected_flavor = data->pseudoflavor; |
9954bf92 | 961 | else |
5eb005ca | 962 | ctx->selected_flavor = RPC_AUTH_UNIX; |
9954bf92 DH |
963 | |
964 | if (!(data->flags & NFS_MOUNT_NONLM)) | |
5eb005ca | 965 | ctx->flags &= ~(NFS_MOUNT_LOCAL_FLOCK| |
9954bf92 DH |
966 | NFS_MOUNT_LOCAL_FCNTL); |
967 | else | |
5eb005ca | 968 | ctx->flags |= (NFS_MOUNT_LOCAL_FLOCK| |
9954bf92 | 969 | NFS_MOUNT_LOCAL_FCNTL); |
62a55d08 | 970 | |
9954bf92 DH |
971 | /* |
972 | * The legacy version 6 binary mount data from userspace has a | |
973 | * field used only to transport selinux information into the | |
974 | * the kernel. To continue to support that functionality we | |
975 | * have a touch of selinux knowledge here in the NFS code. The | |
976 | * userspace code converted context=blah to just blah so we are | |
977 | * converting back to the full string selinux understands. | |
978 | */ | |
979 | if (data->context[0]){ | |
980 | #ifdef CONFIG_SECURITY_SELINUX | |
f2aedb71 DH |
981 | int ret; |
982 | ||
9954bf92 | 983 | data->context[NFS_MAX_CONTEXT_LEN] = '\0'; |
f2aedb71 DH |
984 | ret = vfs_parse_fs_string(fc, "context", |
985 | data->context, strlen(data->context)); | |
986 | if (ret < 0) | |
987 | return ret; | |
9954bf92 DH |
988 | #else |
989 | return -EINVAL; | |
990 | #endif | |
991 | } | |
992 | ||
993 | break; | |
994 | default: | |
f2aedb71 | 995 | goto generic; |
9954bf92 DH |
996 | } |
997 | ||
f2aedb71 | 998 | ctx->skip_reconfig_option_check = true; |
9954bf92 DH |
999 | return 0; |
1000 | ||
f2aedb71 DH |
1001 | generic: |
1002 | return generic_parse_monolithic(fc, data); | |
1003 | ||
9954bf92 | 1004 | out_no_data: |
f2aedb71 DH |
1005 | if (is_remount_fc(fc)) { |
1006 | ctx->skip_reconfig_option_check = true; | |
1007 | return 0; | |
1008 | } | |
ce8866f0 | 1009 | return nfs_invalf(fc, "NFS: mount program didn't pass any mount data"); |
9954bf92 DH |
1010 | |
1011 | out_no_v3: | |
ce8866f0 | 1012 | return nfs_invalf(fc, "NFS: nfs_mount_data version does not support v3"); |
9954bf92 DH |
1013 | |
1014 | out_no_sec: | |
ce8866f0 | 1015 | return nfs_invalf(fc, "NFS: nfs_mount_data version supports only AUTH_SYS"); |
9954bf92 DH |
1016 | |
1017 | out_nomem: | |
ce8866f0 | 1018 | dfprintk(MOUNT, "NFS: not enough memory to handle mount options"); |
9954bf92 DH |
1019 | return -ENOMEM; |
1020 | ||
1021 | out_no_address: | |
ce8866f0 | 1022 | return nfs_invalf(fc, "NFS: mount program didn't pass remote address"); |
9954bf92 DH |
1023 | |
1024 | out_invalid_fh: | |
ce8866f0 | 1025 | return nfs_invalf(fc, "NFS: invalid root filehandle"); |
9954bf92 DH |
1026 | } |
1027 | ||
1028 | #if IS_ENABLED(CONFIG_NFS_V4) | |
9954bf92 DH |
1029 | /* |
1030 | * Validate NFSv4 mount options | |
1031 | */ | |
f2aedb71 DH |
1032 | static int nfs4_parse_monolithic(struct fs_context *fc, |
1033 | struct nfs4_mount_data *data) | |
9954bf92 | 1034 | { |
f2aedb71 | 1035 | struct nfs_fs_context *ctx = nfs_fc2context(fc); |
5eb005ca | 1036 | struct sockaddr *sap = (struct sockaddr *)&ctx->nfs_server.address; |
9954bf92 DH |
1037 | char *c; |
1038 | ||
1039 | if (data == NULL) | |
1040 | goto out_no_data; | |
1041 | ||
5eb005ca | 1042 | ctx->version = 4; |
9954bf92 DH |
1043 | |
1044 | switch (data->version) { | |
1045 | case 1: | |
5eb005ca | 1046 | if (data->host_addrlen > sizeof(ctx->nfs_server.address)) |
9954bf92 DH |
1047 | goto out_no_address; |
1048 | if (data->host_addrlen == 0) | |
1049 | goto out_no_address; | |
5eb005ca | 1050 | ctx->nfs_server.addrlen = data->host_addrlen; |
9954bf92 DH |
1051 | if (copy_from_user(sap, data->host_addr, data->host_addrlen)) |
1052 | return -EFAULT; | |
1053 | if (!nfs_verify_server_address(sap)) | |
1054 | goto out_no_address; | |
5eb005ca | 1055 | ctx->nfs_server.port = ntohs(((struct sockaddr_in *)sap)->sin_port); |
9954bf92 DH |
1056 | |
1057 | if (data->auth_flavourlen) { | |
1058 | rpc_authflavor_t pseudoflavor; | |
1059 | if (data->auth_flavourlen > 1) | |
1060 | goto out_inval_auth; | |
1061 | if (copy_from_user(&pseudoflavor, | |
1062 | data->auth_flavours, | |
1063 | sizeof(pseudoflavor))) | |
1064 | return -EFAULT; | |
5eb005ca | 1065 | ctx->selected_flavor = pseudoflavor; |
9954bf92 | 1066 | } else |
5eb005ca | 1067 | ctx->selected_flavor = RPC_AUTH_UNIX; |
9954bf92 DH |
1068 | |
1069 | c = strndup_user(data->hostname.data, NFS4_MAXNAMLEN); | |
1070 | if (IS_ERR(c)) | |
1071 | return PTR_ERR(c); | |
5eb005ca | 1072 | ctx->nfs_server.hostname = c; |
9954bf92 DH |
1073 | |
1074 | c = strndup_user(data->mnt_path.data, NFS4_MAXPATHLEN); | |
1075 | if (IS_ERR(c)) | |
1076 | return PTR_ERR(c); | |
5eb005ca | 1077 | ctx->nfs_server.export_path = c; |
9954bf92 DH |
1078 | dfprintk(MOUNT, "NFS: MNTPATH: '%s'\n", c); |
1079 | ||
1080 | c = strndup_user(data->client_addr.data, 16); | |
1081 | if (IS_ERR(c)) | |
1082 | return PTR_ERR(c); | |
5eb005ca | 1083 | ctx->client_address = c; |
9954bf92 DH |
1084 | |
1085 | /* | |
f2aedb71 | 1086 | * Translate to nfs_fs_context, which nfs_fill_super |
9954bf92 DH |
1087 | * can deal with. |
1088 | */ | |
1089 | ||
5eb005ca DH |
1090 | ctx->flags = data->flags & NFS4_MOUNT_FLAGMASK; |
1091 | ctx->rsize = data->rsize; | |
1092 | ctx->wsize = data->wsize; | |
1093 | ctx->timeo = data->timeo; | |
1094 | ctx->retrans = data->retrans; | |
1095 | ctx->acregmin = data->acregmin; | |
1096 | ctx->acregmax = data->acregmax; | |
1097 | ctx->acdirmin = data->acdirmin; | |
1098 | ctx->acdirmax = data->acdirmax; | |
1099 | ctx->nfs_server.protocol = data->proto; | |
1100 | nfs_validate_transport_protocol(ctx); | |
1101 | if (ctx->nfs_server.protocol == XPRT_TRANSPORT_UDP) | |
9954bf92 DH |
1102 | goto out_invalid_transport_udp; |
1103 | ||
1104 | break; | |
1105 | default: | |
f2aedb71 | 1106 | goto generic; |
9954bf92 DH |
1107 | } |
1108 | ||
f2aedb71 | 1109 | ctx->skip_reconfig_option_check = true; |
9954bf92 DH |
1110 | return 0; |
1111 | ||
f2aedb71 DH |
1112 | generic: |
1113 | return generic_parse_monolithic(fc, data); | |
1114 | ||
9954bf92 | 1115 | out_no_data: |
f2aedb71 DH |
1116 | if (is_remount_fc(fc)) { |
1117 | ctx->skip_reconfig_option_check = true; | |
1118 | return 0; | |
1119 | } | |
ce8866f0 | 1120 | return nfs_invalf(fc, "NFS4: mount program didn't pass any mount data"); |
9954bf92 DH |
1121 | |
1122 | out_inval_auth: | |
ce8866f0 SM |
1123 | return nfs_invalf(fc, "NFS4: Invalid number of RPC auth flavours %d", |
1124 | data->auth_flavourlen); | |
9954bf92 DH |
1125 | |
1126 | out_no_address: | |
ce8866f0 | 1127 | return nfs_invalf(fc, "NFS4: mount program didn't pass remote address"); |
9954bf92 DH |
1128 | |
1129 | out_invalid_transport_udp: | |
ce8866f0 | 1130 | return nfs_invalf(fc, "NFSv4: Unsupported transport protocol udp"); |
9954bf92 | 1131 | } |
f2aedb71 | 1132 | #endif |
9954bf92 | 1133 | |
f2aedb71 DH |
1134 | /* |
1135 | * Parse a monolithic block of data from sys_mount(). | |
1136 | */ | |
1137 | static int nfs_fs_context_parse_monolithic(struct fs_context *fc, | |
1138 | void *data) | |
9954bf92 | 1139 | { |
f2aedb71 DH |
1140 | if (fc->fs_type == &nfs_fs_type) |
1141 | return nfs23_parse_monolithic(fc, data); | |
1142 | ||
1143 | #if IS_ENABLED(CONFIG_NFS_V4) | |
1144 | if (fc->fs_type == &nfs4_fs_type) | |
1145 | return nfs4_parse_monolithic(fc, data); | |
9954bf92 DH |
1146 | #endif |
1147 | ||
ce8866f0 | 1148 | return nfs_invalf(fc, "NFS: Unsupported monolithic data version"); |
f2aedb71 DH |
1149 | } |
1150 | ||
1151 | /* | |
1152 | * Validate the preparsed information in the config. | |
1153 | */ | |
1154 | static int nfs_fs_context_validate(struct fs_context *fc) | |
9954bf92 | 1155 | { |
f2aedb71 DH |
1156 | struct nfs_fs_context *ctx = nfs_fc2context(fc); |
1157 | struct nfs_subversion *nfs_mod; | |
1158 | struct sockaddr *sap = (struct sockaddr *)&ctx->nfs_server.address; | |
9954bf92 DH |
1159 | int max_namelen = PAGE_SIZE; |
1160 | int max_pathlen = NFS_MAXPATHLEN; | |
f2aedb71 DH |
1161 | int port = 0; |
1162 | int ret; | |
9954bf92 | 1163 | |
f2aedb71 DH |
1164 | if (!fc->source) |
1165 | goto out_no_device_name; | |
1166 | ||
1167 | /* Check for sanity first. */ | |
1168 | if (ctx->minorversion && ctx->version != 4) | |
1169 | goto out_minorversion_mismatch; | |
1170 | ||
1171 | if (ctx->options & NFS_OPTION_MIGRATION && | |
1172 | (ctx->version != 4 || ctx->minorversion != 0)) | |
1173 | goto out_migration_misuse; | |
1174 | ||
1175 | /* Verify that any proto=/mountproto= options match the address | |
1176 | * families in the addr=/mountaddr= options. | |
1177 | */ | |
1178 | if (ctx->protofamily != AF_UNSPEC && | |
1179 | ctx->protofamily != ctx->nfs_server.address.sa_family) | |
1180 | goto out_proto_mismatch; | |
1181 | ||
1182 | if (ctx->mountfamily != AF_UNSPEC) { | |
1183 | if (ctx->mount_server.addrlen) { | |
1184 | if (ctx->mountfamily != ctx->mount_server.address.sa_family) | |
1185 | goto out_mountproto_mismatch; | |
1186 | } else { | |
1187 | if (ctx->mountfamily != ctx->nfs_server.address.sa_family) | |
1188 | goto out_mountproto_mismatch; | |
1189 | } | |
1190 | } | |
9954bf92 DH |
1191 | |
1192 | if (!nfs_verify_server_address(sap)) | |
1193 | goto out_no_address; | |
1194 | ||
5eb005ca | 1195 | if (ctx->version == 4) { |
62a55d08 SM |
1196 | if (IS_ENABLED(CONFIG_NFS_V4)) { |
1197 | if (ctx->nfs_server.protocol == XPRT_TRANSPORT_RDMA) | |
1198 | port = NFS_RDMA_PORT; | |
1199 | else | |
1200 | port = NFS_PORT; | |
1201 | max_namelen = NFS4_MAXNAMLEN; | |
1202 | max_pathlen = NFS4_MAXPATHLEN; | |
1203 | nfs_validate_transport_protocol(ctx); | |
1204 | if (ctx->nfs_server.protocol == XPRT_TRANSPORT_UDP) | |
1205 | goto out_invalid_transport_udp; | |
1206 | ctx->flags &= ~(NFS_MOUNT_NONLM | NFS_MOUNT_NOACL | | |
1207 | NFS_MOUNT_VER3 | NFS_MOUNT_LOCAL_FLOCK | | |
1208 | NFS_MOUNT_LOCAL_FCNTL); | |
1209 | } else { | |
1210 | goto out_v4_not_compiled; | |
1211 | } | |
9954bf92 | 1212 | } else { |
5eb005ca | 1213 | nfs_set_mount_transport_protocol(ctx); |
b24ee6c6 OK |
1214 | #ifdef CONFIG_NFS_DISABLE_UDP_SUPPORT |
1215 | if (ctx->nfs_server.protocol == XPRT_TRANSPORT_UDP) | |
1216 | goto out_invalid_transport_udp; | |
1217 | #endif | |
5eb005ca | 1218 | if (ctx->nfs_server.protocol == XPRT_TRANSPORT_RDMA) |
9954bf92 DH |
1219 | port = NFS_RDMA_PORT; |
1220 | } | |
1221 | ||
5eb005ca | 1222 | nfs_set_port(sap, &ctx->nfs_server.port, port); |
9954bf92 | 1223 | |
62a55d08 | 1224 | ret = nfs_parse_source(fc, max_namelen, max_pathlen); |
f2aedb71 DH |
1225 | if (ret < 0) |
1226 | return ret; | |
1227 | ||
1228 | /* Load the NFS protocol module if we haven't done so yet */ | |
62a55d08 | 1229 | if (!ctx->nfs_mod) { |
f2aedb71 DH |
1230 | nfs_mod = get_nfs_version(ctx->version); |
1231 | if (IS_ERR(nfs_mod)) { | |
1232 | ret = PTR_ERR(nfs_mod); | |
1233 | goto out_version_unavailable; | |
1234 | } | |
62a55d08 | 1235 | ctx->nfs_mod = nfs_mod; |
f2aedb71 DH |
1236 | } |
1237 | return 0; | |
9954bf92 | 1238 | |
f2aedb71 | 1239 | out_no_device_name: |
ce8866f0 | 1240 | return nfs_invalf(fc, "NFS: Device name not specified"); |
9954bf92 | 1241 | out_v4_not_compiled: |
ce8866f0 | 1242 | nfs_errorf(fc, "NFS: NFSv4 is not compiled into kernel"); |
9954bf92 | 1243 | return -EPROTONOSUPPORT; |
9954bf92 | 1244 | out_invalid_transport_udp: |
ce8866f0 | 1245 | return nfs_invalf(fc, "NFSv4: Unsupported transport protocol udp"); |
9954bf92 | 1246 | out_no_address: |
ce8866f0 | 1247 | return nfs_invalf(fc, "NFS: mount program didn't pass remote address"); |
f2aedb71 | 1248 | out_mountproto_mismatch: |
ce8866f0 | 1249 | return nfs_invalf(fc, "NFS: Mount server address does not match mountproto= option"); |
f2aedb71 | 1250 | out_proto_mismatch: |
ce8866f0 | 1251 | return nfs_invalf(fc, "NFS: Server address does not match proto= option"); |
f2aedb71 | 1252 | out_minorversion_mismatch: |
ce8866f0 | 1253 | return nfs_invalf(fc, "NFS: Mount option vers=%u does not support minorversion=%u", |
f2aedb71 | 1254 | ctx->version, ctx->minorversion); |
f2aedb71 | 1255 | out_migration_misuse: |
ce8866f0 | 1256 | return nfs_invalf(fc, "NFS: 'Migration' not supported for this NFS version"); |
f2aedb71 | 1257 | out_version_unavailable: |
ce8866f0 | 1258 | nfs_errorf(fc, "NFS: Version unavailable"); |
f2aedb71 DH |
1259 | return ret; |
1260 | } | |
1261 | ||
1262 | /* | |
1263 | * Create an NFS superblock by the appropriate method. | |
1264 | */ | |
1265 | static int nfs_get_tree(struct fs_context *fc) | |
1266 | { | |
1267 | struct nfs_fs_context *ctx = nfs_fc2context(fc); | |
1268 | int err = nfs_fs_context_validate(fc); | |
1269 | ||
1270 | if (err) | |
1271 | return err; | |
1272 | if (!ctx->internal) | |
62a55d08 | 1273 | return ctx->nfs_mod->rpc_ops->try_get_tree(fc); |
f2aedb71 DH |
1274 | else |
1275 | return nfs_get_tree_common(fc); | |
9954bf92 | 1276 | } |
f2aedb71 DH |
1277 | |
1278 | /* | |
1279 | * Handle duplication of a configuration. The caller copied *src into *sc, but | |
1280 | * it can't deal with resource pointers in the filesystem context, so we have | |
1281 | * to do that. We need to clear pointers, copy data or get extra refs as | |
1282 | * appropriate. | |
1283 | */ | |
1284 | static int nfs_fs_context_dup(struct fs_context *fc, struct fs_context *src_fc) | |
1285 | { | |
1286 | struct nfs_fs_context *src = nfs_fc2context(src_fc), *ctx; | |
1287 | ||
1288 | ctx = kmemdup(src, sizeof(struct nfs_fs_context), GFP_KERNEL); | |
1289 | if (!ctx) | |
1290 | return -ENOMEM; | |
1291 | ||
62a55d08 SM |
1292 | ctx->mntfh = nfs_alloc_fhandle(); |
1293 | if (!ctx->mntfh) { | |
f2aedb71 DH |
1294 | kfree(ctx); |
1295 | return -ENOMEM; | |
1296 | } | |
62a55d08 | 1297 | nfs_copy_fh(ctx->mntfh, src->mntfh); |
f2aedb71 | 1298 | |
62a55d08 | 1299 | __module_get(ctx->nfs_mod->owner); |
f2aedb71 DH |
1300 | ctx->client_address = NULL; |
1301 | ctx->mount_server.hostname = NULL; | |
1302 | ctx->nfs_server.export_path = NULL; | |
1303 | ctx->nfs_server.hostname = NULL; | |
1304 | ctx->fscache_uniq = NULL; | |
f2aedb71 DH |
1305 | ctx->clone_data.fattr = NULL; |
1306 | fc->fs_private = ctx; | |
1307 | return 0; | |
1308 | } | |
1309 | ||
1310 | static void nfs_fs_context_free(struct fs_context *fc) | |
1311 | { | |
1312 | struct nfs_fs_context *ctx = nfs_fc2context(fc); | |
1313 | ||
1314 | if (ctx) { | |
62a55d08 SM |
1315 | if (ctx->server) |
1316 | nfs_free_server(ctx->server); | |
1317 | if (ctx->nfs_mod) | |
1318 | put_nfs_version(ctx->nfs_mod); | |
f2aedb71 DH |
1319 | kfree(ctx->client_address); |
1320 | kfree(ctx->mount_server.hostname); | |
1321 | kfree(ctx->nfs_server.export_path); | |
1322 | kfree(ctx->nfs_server.hostname); | |
1323 | kfree(ctx->fscache_uniq); | |
62a55d08 | 1324 | nfs_free_fhandle(ctx->mntfh); |
f2aedb71 DH |
1325 | nfs_free_fattr(ctx->clone_data.fattr); |
1326 | kfree(ctx); | |
1327 | } | |
1328 | } | |
1329 | ||
1330 | static const struct fs_context_operations nfs_fs_context_ops = { | |
1331 | .free = nfs_fs_context_free, | |
1332 | .dup = nfs_fs_context_dup, | |
1333 | .parse_param = nfs_fs_context_parse_param, | |
1334 | .parse_monolithic = nfs_fs_context_parse_monolithic, | |
1335 | .get_tree = nfs_get_tree, | |
1336 | .reconfigure = nfs_reconfigure, | |
1337 | }; | |
1338 | ||
1339 | /* | |
1340 | * Prepare superblock configuration. We use the namespaces attached to the | |
1341 | * context. This may be the current process's namespaces, or it may be a | |
1342 | * container's namespaces. | |
1343 | */ | |
1344 | static int nfs_init_fs_context(struct fs_context *fc) | |
1345 | { | |
1346 | struct nfs_fs_context *ctx; | |
1347 | ||
1348 | ctx = kzalloc(sizeof(struct nfs_fs_context), GFP_KERNEL); | |
1349 | if (unlikely(!ctx)) | |
1350 | return -ENOMEM; | |
1351 | ||
62a55d08 SM |
1352 | ctx->mntfh = nfs_alloc_fhandle(); |
1353 | if (unlikely(!ctx->mntfh)) { | |
f2aedb71 DH |
1354 | kfree(ctx); |
1355 | return -ENOMEM; | |
1356 | } | |
1357 | ||
1358 | ctx->protofamily = AF_UNSPEC; | |
1359 | ctx->mountfamily = AF_UNSPEC; | |
1360 | ctx->mount_server.port = NFS_UNSPEC_PORT; | |
1361 | ||
1362 | if (fc->root) { | |
1363 | /* reconfigure, start with the current config */ | |
1364 | struct nfs_server *nfss = fc->root->d_sb->s_fs_info; | |
1365 | struct net *net = nfss->nfs_client->cl_net; | |
1366 | ||
1367 | ctx->flags = nfss->flags; | |
1368 | ctx->rsize = nfss->rsize; | |
1369 | ctx->wsize = nfss->wsize; | |
1370 | ctx->retrans = nfss->client->cl_timeout->to_retries; | |
1371 | ctx->selected_flavor = nfss->client->cl_auth->au_flavor; | |
1372 | ctx->acregmin = nfss->acregmin / HZ; | |
1373 | ctx->acregmax = nfss->acregmax / HZ; | |
1374 | ctx->acdirmin = nfss->acdirmin / HZ; | |
1375 | ctx->acdirmax = nfss->acdirmax / HZ; | |
1376 | ctx->timeo = 10U * nfss->client->cl_timeout->to_initval / HZ; | |
1377 | ctx->nfs_server.port = nfss->port; | |
1378 | ctx->nfs_server.addrlen = nfss->nfs_client->cl_addrlen; | |
1379 | ctx->version = nfss->nfs_client->rpc_ops->version; | |
1380 | ctx->minorversion = nfss->nfs_client->cl_minorversion; | |
1381 | ||
1382 | memcpy(&ctx->nfs_server.address, &nfss->nfs_client->cl_addr, | |
1383 | ctx->nfs_server.addrlen); | |
1384 | ||
1385 | if (fc->net_ns != net) { | |
1386 | put_net(fc->net_ns); | |
1387 | fc->net_ns = get_net(net); | |
1388 | } | |
1389 | ||
62a55d08 SM |
1390 | ctx->nfs_mod = nfss->nfs_client->cl_nfs_mod; |
1391 | __module_get(ctx->nfs_mod->owner); | |
f2aedb71 DH |
1392 | } else { |
1393 | /* defaults */ | |
1394 | ctx->timeo = NFS_UNSPEC_TIMEO; | |
1395 | ctx->retrans = NFS_UNSPEC_RETRANS; | |
1396 | ctx->acregmin = NFS_DEF_ACREGMIN; | |
1397 | ctx->acregmax = NFS_DEF_ACREGMAX; | |
1398 | ctx->acdirmin = NFS_DEF_ACDIRMIN; | |
1399 | ctx->acdirmax = NFS_DEF_ACDIRMAX; | |
1400 | ctx->nfs_server.port = NFS_UNSPEC_PORT; | |
1401 | ctx->nfs_server.protocol = XPRT_TRANSPORT_TCP; | |
1402 | ctx->selected_flavor = RPC_AUTH_MAXFLAVOR; | |
1403 | ctx->minorversion = 0; | |
1404 | ctx->need_mount = true; | |
1405 | } | |
f2aedb71 DH |
1406 | fc->fs_private = ctx; |
1407 | fc->ops = &nfs_fs_context_ops; | |
1408 | return 0; | |
1409 | } | |
1410 | ||
1411 | struct file_system_type nfs_fs_type = { | |
1412 | .owner = THIS_MODULE, | |
1413 | .name = "nfs", | |
1414 | .init_fs_context = nfs_init_fs_context, | |
d7167b14 | 1415 | .parameters = nfs_fs_parameters, |
f2aedb71 DH |
1416 | .kill_sb = nfs_kill_super, |
1417 | .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA, | |
1418 | }; | |
1419 | MODULE_ALIAS_FS("nfs"); | |
1420 | EXPORT_SYMBOL_GPL(nfs_fs_type); | |
1421 | ||
1422 | #if IS_ENABLED(CONFIG_NFS_V4) | |
1423 | struct file_system_type nfs4_fs_type = { | |
1424 | .owner = THIS_MODULE, | |
1425 | .name = "nfs4", | |
1426 | .init_fs_context = nfs_init_fs_context, | |
d7167b14 | 1427 | .parameters = nfs_fs_parameters, |
f2aedb71 DH |
1428 | .kill_sb = nfs_kill_super, |
1429 | .fs_flags = FS_RENAME_DOES_D_MOVE|FS_BINARY_MOUNTDATA, | |
1430 | }; | |
1431 | MODULE_ALIAS_FS("nfs4"); | |
1432 | MODULE_ALIAS("nfs4"); | |
1433 | EXPORT_SYMBOL_GPL(nfs4_fs_type); | |
1434 | #endif /* CONFIG_NFS_V4 */ |