#include <linux/ctype.h>
#include <linux/fs_context.h>
#include <linux/fs_parser.h>
#include <linux/fs.h>
#include <linux/mount.h>
#include <linux/parser.h>
#include <linux/utsname.h>
#include "cifsfs.h"
#include "cifsglob.h"
#include "cifsproto.h"
#include "cifs_unicode.h"
#include "cifs_debug.h"
#include "cifs_fs_sb.h"
#include "ntlmssp.h"
#include "nterr.h"
#include "rfc1002pdu.h"
#include "fs_context.h"
DEFINE_MUTEX(cifs_mount_mutex);
static const match_table_t cifs_smb_version_tokens = {
{ Smb_1, SMB1_VERSION_STRING },
{ Smb_20, SMB20_VERSION_STRING},
{ Smb_21, SMB21_VERSION_STRING },
{ Smb_30, SMB30_VERSION_STRING },
{ Smb_302, SMB302_VERSION_STRING },
{ Smb_302, ALT_SMB302_VERSION_STRING },
{ Smb_311, SMB311_VERSION_STRING },
{ Smb_311, ALT_SMB311_VERSION_STRING },
{ Smb_3any, SMB3ANY_VERSION_STRING },
{ Smb_default, SMBDEFAULT_VERSION_STRING },
{ Smb_version_err, NULL }
};
static const match_table_t cifs_secflavor_tokens = {
{ Opt_sec_krb5, "krb5" },
{ Opt_sec_krb5i, "krb5i" },
{ Opt_sec_krb5p, "krb5p" },
{ Opt_sec_ntlmsspi, "ntlmsspi" },
{ Opt_sec_ntlmssp, "ntlmssp" },
{ Opt_sec_ntlmv2, "nontlm" },
{ Opt_sec_ntlmv2, "ntlmv2" },
{ Opt_sec_ntlmv2i, "ntlmv2i" },
{ Opt_sec_none, "none" },
{ Opt_sec_err, NULL }
};
static const match_table_t cifs_upcall_target = {
{ Opt_upcall_target_mount, "mount" },
{ Opt_upcall_target_application, "app" },
{ Opt_upcall_target_err, NULL }
};
const struct fs_parameter_spec smb3_fs_parameters[] = {
fsparam_flag_no("user_xattr", Opt_user_xattr),
fsparam_flag_no("forceuid", Opt_forceuid),
fsparam_flag_no("multichannel", Opt_multichannel),
fsparam_flag_no("forcegid", Opt_forcegid),
fsparam_flag("noblocksend", Opt_noblocksend),
fsparam_flag("noautotune", Opt_noautotune),
fsparam_flag("nolease", Opt_nolease),
fsparam_flag_no("hard", Opt_hard),
fsparam_flag_no("soft", Opt_soft),
fsparam_flag_no("perm", Opt_perm),
fsparam_flag("nodelete", Opt_nodelete),
fsparam_flag_no("mapposix", Opt_mapposix),
fsparam_flag("mapchars", Opt_mapchars),
fsparam_flag("nomapchars", Opt_nomapchars),
fsparam_flag_no("sfu", Opt_sfu),
fsparam_flag("nodfs", Opt_nodfs),
fsparam_flag_no("posixpaths", Opt_posixpaths),
fsparam_flag_no("unix", Opt_unix),
fsparam_flag_no("linux", Opt_unix),
fsparam_flag_no("posix", Opt_unix),
fsparam_flag("nocase", Opt_nocase),
fsparam_flag("ignorecase", Opt_nocase),
fsparam_flag_no("brl", Opt_brl),
fsparam_flag_no("handlecache", Opt_handlecache),
fsparam_flag("forcemandatorylock", Opt_forcemandatorylock),
fsparam_flag("forcemand", Opt_forcemandatorylock),
fsparam_flag("setuidfromacl", Opt_setuidfromacl),
fsparam_flag("idsfromsid", Opt_setuidfromacl),
fsparam_flag_no("setuids", Opt_setuids),
fsparam_flag_no("dynperm", Opt_dynperm),
fsparam_flag_no("intr", Opt_intr),
fsparam_flag_no("strictsync", Opt_strictsync),
fsparam_flag_no("serverino", Opt_serverino),
fsparam_flag("rwpidforward", Opt_rwpidforward),
fsparam_flag("cifsacl", Opt_cifsacl),
fsparam_flag_no("acl", Opt_acl),
fsparam_flag("locallease", Opt_locallease),
fsparam_flag("sign", Opt_sign),
fsparam_flag("ignore_signature", Opt_ignore_signature),
fsparam_flag("signloosely", Opt_ignore_signature),
fsparam_flag("seal", Opt_seal),
fsparam_flag("noac", Opt_noac),
fsparam_flag("fsc", Opt_fsc),
fsparam_flag("mfsymlinks", Opt_mfsymlinks),
fsparam_flag("multiuser", Opt_multiuser),
fsparam_flag("sloppy", Opt_sloppy),
fsparam_flag("nosharesock", Opt_nosharesock),
fsparam_flag_no("persistenthandles", Opt_persistent),
fsparam_flag_no("resilienthandles", Opt_resilient),
fsparam_flag_no("tcpnodelay", Opt_tcp_nodelay),
fsparam_flag("nosparse", Opt_nosparse),
fsparam_flag("domainauto", Opt_domainauto),
fsparam_flag("rdma", Opt_rdma),
fsparam_flag("modesid", Opt_modesid),
fsparam_flag("modefromsid", Opt_modesid),
fsparam_flag("rootfs", Opt_rootfs),
fsparam_flag("compress", Opt_compress),
fsparam_flag("witness", Opt_witness),
fsparam_flag_no("nativesocket", Opt_nativesocket),
fsparam_flag_no("unicode", Opt_unicode),
fsparam_flag_no("nbsessinit", Opt_nbsessinit),
fsparam_uid("backupuid", Opt_backupuid),
fsparam_gid("backupgid", Opt_backupgid),
fsparam_uid("uid", Opt_uid),
fsparam_uid("cruid", Opt_cruid),
fsparam_gid("gid", Opt_gid),
fsparam_u32("file_mode", Opt_file_mode),
fsparam_u32("dirmode", Opt_dirmode),
fsparam_u32("dir_mode", Opt_dirmode),
fsparam_u32("port", Opt_port),
fsparam_u32("min_enc_offload", Opt_min_enc_offload),
fsparam_u32("retrans", Opt_retrans),
fsparam_u32("esize", Opt_min_enc_offload),
fsparam_u32("bsize", Opt_blocksize),
fsparam_u32("rasize", Opt_rasize),
fsparam_u32("rsize", Opt_rsize),
fsparam_u32("wsize", Opt_wsize),
fsparam_u32("actimeo", Opt_actimeo),
fsparam_u32("acdirmax", Opt_acdirmax),
fsparam_u32("acregmax", Opt_acregmax),
fsparam_u32("closetimeo", Opt_closetimeo),
fsparam_u32("echo_interval", Opt_echo_interval),
fsparam_u32("max_credits", Opt_max_credits),
fsparam_u32("max_cached_dirs", Opt_max_cached_dirs),
fsparam_u32("handletimeout", Opt_handletimeout),
fsparam_u64("snapshot", Opt_snapshot),
fsparam_u32("max_channels", Opt_max_channels),
fsparam_string("source", Opt_source),
fsparam_string("user", Opt_user),
fsparam_string("username", Opt_user),
fsparam_string("pass", Opt_pass),
fsparam_string("password", Opt_pass),
fsparam_string("pass2", Opt_pass2),
fsparam_string("password2", Opt_pass2),
fsparam_string("ip", Opt_ip),
fsparam_string("addr", Opt_ip),
fsparam_string("domain", Opt_domain),
fsparam_string("dom", Opt_domain),
fsparam_string("srcaddr", Opt_srcaddr),
fsparam_string("iocharset", Opt_iocharset),
fsparam_string("netbiosname", Opt_netbiosname),
fsparam_string("servern", Opt_servern),
fsparam_string("ver", Opt_ver),
fsparam_string("vers", Opt_vers),
fsparam_string("sec", Opt_sec),
fsparam_string("cache", Opt_cache),
fsparam_string("reparse", Opt_reparse),
fsparam_string("upcall_target", Opt_upcalltarget),
fsparam_string("symlink", Opt_symlink),
fsparam_string("symlinkroot", Opt_symlinkroot),
fsparam_flag("guest", Opt_ignore),
fsparam_flag("noatime", Opt_ignore),
fsparam_flag("relatime", Opt_ignore),
fsparam_flag("_netdev", Opt_ignore),
fsparam_flag_no("suid", Opt_ignore),
fsparam_flag_no("exec", Opt_ignore),
fsparam_flag_no("dev", Opt_ignore),
fsparam_flag_no("mand", Opt_ignore),
fsparam_flag_no("auto", Opt_ignore),
fsparam_string("cred", Opt_ignore),
fsparam_string("credentials", Opt_ignore),
fsparam_string("unc", Opt_ignore),
fsparam_string("prefixpath", Opt_ignore),
{}
};
static int
cifs_parse_security_flavors(struct fs_context *fc, char *value, struct smb3_fs_context *ctx)
{
substring_t args[MAX_OPT_ARGS];
ctx->sectype = Unspecified;
ctx->sign = false;
switch (match_token(value, cifs_secflavor_tokens, args)) {
case Opt_sec_krb5p:
cifs_errorf(fc, "sec=krb5p is not supported. Use sec=krb5,seal instead\n");
return 1;
case Opt_sec_krb5i:
ctx->sign = true;
fallthrough;
case Opt_sec_krb5:
ctx->sectype = Kerberos;
break;
case Opt_sec_ntlmsspi:
ctx->sign = true;
fallthrough;
case Opt_sec_ntlmssp:
ctx->sectype = RawNTLMSSP;
break;
case Opt_sec_ntlmv2i:
ctx->sign = true;
fallthrough;
case Opt_sec_ntlmv2:
ctx->sectype = NTLMv2;
break;
case Opt_sec_none:
ctx->nullauth = 1;
kfree(ctx->username);
ctx->username = NULL;
break;
default:
cifs_errorf(fc, "bad security option: %s\n", value);
return 1;
}
return 0;
}
static int
cifs_parse_upcall_target(struct fs_context *fc, char *value, struct smb3_fs_context *ctx)
{
substring_t args[MAX_OPT_ARGS];
ctx->upcall_target = UPTARGET_UNSPECIFIED;
switch (match_token(value, cifs_upcall_target, args)) {
case Opt_upcall_target_mount:
ctx->upcall_target = UPTARGET_MOUNT;
break;
case Opt_upcall_target_application:
ctx->upcall_target = UPTARGET_APP;
break;
default:
cifs_errorf(fc, "bad upcall target: %s\n", value);
return 1;
}
return 0;
}
static const match_table_t cifs_cacheflavor_tokens = {
{ Opt_cache_loose, "loose" },
{ Opt_cache_strict, "strict" },
{ Opt_cache_none, "none" },
{ Opt_cache_ro, "ro" },
{ Opt_cache_rw, "singleclient" },
{ Opt_cache_err, NULL }
};
static int
cifs_parse_cache_flavor(struct fs_context *fc, char *value, struct smb3_fs_context *ctx)
{
substring_t args[MAX_OPT_ARGS];
switch (match_token(value, cifs_cacheflavor_tokens, args)) {
case Opt_cache_loose:
ctx->direct_io = false;
ctx->strict_io = false;
ctx->cache_ro = false;
ctx->cache_rw = false;
break;
case Opt_cache_strict:
ctx->direct_io = false;
ctx->strict_io = true;
ctx->cache_ro = false;
ctx->cache_rw = false;
break;
case Opt_cache_none:
ctx->direct_io = true;
ctx->strict_io = false;
ctx->cache_ro = false;
ctx->cache_rw = false;
break;
case Opt_cache_ro:
ctx->direct_io = false;
ctx->strict_io = false;
ctx->cache_ro = true;
ctx->cache_rw = false;
break;
case Opt_cache_rw:
ctx->direct_io = false;
ctx->strict_io = false;
ctx->cache_ro = false;
ctx->cache_rw = true;
break;
default:
cifs_errorf(fc, "bad cache= option: %s\n", value);
return 1;
}
return 0;
}
static const match_table_t reparse_flavor_tokens = {
{ Opt_reparse_default, "default" },
{ Opt_reparse_none, "none" },
{ Opt_reparse_nfs, "nfs" },
{ Opt_reparse_wsl, "wsl" },
{ Opt_reparse_err, NULL },
};
static int parse_reparse_flavor(struct fs_context *fc, char *value,
struct smb3_fs_context *ctx)
{
substring_t args[MAX_OPT_ARGS];
switch (match_token(value, reparse_flavor_tokens, args)) {
case Opt_reparse_default:
ctx->reparse_type = CIFS_REPARSE_TYPE_DEFAULT;
break;
case Opt_reparse_none:
ctx->reparse_type = CIFS_REPARSE_TYPE_NONE;
break;
case Opt_reparse_nfs:
ctx->reparse_type = CIFS_REPARSE_TYPE_NFS;
break;
case Opt_reparse_wsl:
ctx->reparse_type = CIFS_REPARSE_TYPE_WSL;
break;
default:
cifs_errorf(fc, "bad reparse= option: %s\n", value);
return 1;
}
return 0;
}
static const match_table_t symlink_flavor_tokens = {
{ Opt_symlink_default, "default" },
{ Opt_symlink_none, "none" },
{ Opt_symlink_native, "native" },
{ Opt_symlink_unix, "unix" },
{ Opt_symlink_mfsymlinks, "mfsymlinks" },
{ Opt_symlink_sfu, "sfu" },
{ Opt_symlink_nfs, "nfs" },
{ Opt_symlink_wsl, "wsl" },
{ Opt_symlink_err, NULL },
};
static int parse_symlink_flavor(struct fs_context *fc, char *value,
struct smb3_fs_context *ctx)
{
substring_t args[MAX_OPT_ARGS];
switch (match_token(value, symlink_flavor_tokens, args)) {
case Opt_symlink_default:
ctx->symlink_type = CIFS_SYMLINK_TYPE_DEFAULT;
break;
case Opt_symlink_none:
ctx->symlink_type = CIFS_SYMLINK_TYPE_NONE;
break;
case Opt_symlink_native:
ctx->symlink_type = CIFS_SYMLINK_TYPE_NATIVE;
break;
case Opt_symlink_unix:
ctx->symlink_type = CIFS_SYMLINK_TYPE_UNIX;
break;
case Opt_symlink_mfsymlinks:
ctx->symlink_type = CIFS_SYMLINK_TYPE_MFSYMLINKS;
break;
case Opt_symlink_sfu:
ctx->symlink_type = CIFS_SYMLINK_TYPE_SFU;
break;
case Opt_symlink_nfs:
ctx->symlink_type = CIFS_SYMLINK_TYPE_NFS;
break;
case Opt_symlink_wsl:
ctx->symlink_type = CIFS_SYMLINK_TYPE_WSL;
break;
default:
cifs_errorf(fc, "bad symlink= option: %s\n", value);
return 1;
}
return 0;
}
#define DUP_CTX_STR(field) \
do { \
if (ctx->field) { \
new_ctx->field = kstrdup(ctx->field, GFP_ATOMIC); \
if (new_ctx->field == NULL) { \
smb3_cleanup_fs_context_contents(new_ctx); \
return -ENOMEM; \
} \
} \
} while (0)
int
smb3_fs_context_dup(struct smb3_fs_context *new_ctx, struct smb3_fs_context *ctx)
{
memcpy(new_ctx, ctx, sizeof(*ctx));
new_ctx->prepath = NULL;
new_ctx->nodename = NULL;
new_ctx->username = NULL;
new_ctx->password = NULL;
new_ctx->password2 = NULL;
new_ctx->server_hostname = NULL;
new_ctx->domainname = NULL;
new_ctx->UNC = NULL;
new_ctx->source = NULL;
new_ctx->iocharset = NULL;
new_ctx->leaf_fullpath = NULL;
new_ctx->dns_dom = NULL;
new_ctx->symlinkroot = NULL;
DUP_CTX_STR(prepath);
DUP_CTX_STR(username);
DUP_CTX_STR(password);
DUP_CTX_STR(password2);
DUP_CTX_STR(server_hostname);
DUP_CTX_STR(UNC);
DUP_CTX_STR(source);
DUP_CTX_STR(domainname);
DUP_CTX_STR(nodename);
DUP_CTX_STR(iocharset);
DUP_CTX_STR(leaf_fullpath);
DUP_CTX_STR(dns_dom);
DUP_CTX_STR(symlinkroot);
return 0;
}
static int
cifs_parse_smb_version(struct fs_context *fc, char *value, struct smb3_fs_context *ctx, bool is_smb3)
{
substring_t args[MAX_OPT_ARGS];
switch (match_token(value, cifs_smb_version_tokens, args)) {
#ifdef CONFIG_CIFS_ALLOW_INSECURE_LEGACY
case Smb_1:
if (disable_legacy_dialects) {
cifs_errorf(fc, "mount with legacy dialect disabled\n");
return 1;
}
if (is_smb3) {
cifs_errorf(fc, "vers=1.0 (cifs) not permitted when mounting with smb3\n");
return 1;
}
cifs_errorf(fc, "Use of the less secure dialect vers=1.0 is not recommended unless required for access to very old servers\n");
ctx->ops = &smb1_operations;
ctx->vals = &smb1_values;
break;
case Smb_20:
if (disable_legacy_dialects) {
cifs_errorf(fc, "mount with legacy dialect disabled\n");
return 1;
}
if (is_smb3) {
cifs_errorf(fc, "vers=2.0 not permitted when mounting with smb3\n");
return 1;
}
ctx->ops = &smb20_operations;
ctx->vals = &smb20_values;
break;
#else
case Smb_1:
cifs_errorf(fc, "vers=1.0 (cifs) mount not permitted when legacy dialects disabled\n");
return 1;
case Smb_20:
cifs_errorf(fc, "vers=2.0 mount not permitted when legacy dialects disabled\n");
return 1;
#endif
case Smb_21:
ctx->ops = &smb21_operations;
ctx->vals = &smb21_values;
break;
case Smb_30:
ctx->ops = &smb30_operations;
ctx->vals = &smb30_values;
break;
case Smb_302:
ctx->ops = &smb30_operations;
ctx->vals = &smb302_values;
break;
case Smb_311:
ctx->ops = &smb311_operations;
ctx->vals = &smb311_values;
break;
case Smb_3any:
ctx->ops = &smb30_operations;
ctx->vals = &smb3any_values;
break;
case Smb_default:
ctx->ops = &smb30_operations;
ctx->vals = &smbdefault_values;
break;
default:
cifs_errorf(fc, "Unknown vers= option specified: %s\n", value);
return 1;
}
return 0;
}
int smb3_parse_opt(const char *options, const char *key, char **val)
{
int rc = -ENOENT;
char *opts, *orig, *p;
orig = opts = kstrdup(options, GFP_KERNEL);
if (!opts)
return -ENOMEM;
while ((p = strsep(&opts, ","))) {
char *nval;
if (!*p)
continue;
if (strncasecmp(p, key, strlen(key)))
continue;
nval = strchr(p, '=');
if (nval) {
if (nval == p)
continue;
*nval++ = 0;
*val = kstrdup(nval, GFP_KERNEL);
rc = !*val ? -ENOMEM : 0;
goto out;
}
}
out:
kfree(orig);
return rc;
}
#define IS_DELIM(c) ((c) == '/' || (c) == '\\')
char *cifs_sanitize_prepath(char *prepath, gfp_t gfp)
{
char *cursor1 = prepath, *cursor2 = prepath;
char *s;
while (IS_DELIM(*cursor1))
cursor1++;
if (!*cursor1)
return NULL;
*cursor2 = *cursor1;
while (*(cursor1++)) {
if (IS_DELIM(*cursor1) && IS_DELIM(*cursor2))
continue;
*(++cursor2) = *cursor1;
}
if (IS_DELIM(*(cursor2 - 1)))
cursor2--;
*cursor2 = '\0';
if (!*prepath)
return NULL;
s = kstrdup(prepath, gfp);
if (!s)
return ERR_PTR(-ENOMEM);
return s;
}
char *smb3_fs_context_fullpath(const struct smb3_fs_context *ctx, char dirsep)
{
size_t ulen, plen;
char *s;
ulen = strlen(ctx->UNC);
plen = ctx->prepath ? strlen(ctx->prepath) + 1 : 0;
s = kmalloc(ulen + plen + 1, GFP_KERNEL);
if (!s)
return ERR_PTR(-ENOMEM);
memcpy(s, ctx->UNC, ulen);
if (plen) {
s[ulen] = dirsep;
memcpy(s + ulen + 1, ctx->prepath, plen);
}
s[ulen + plen] = '\0';
convert_delimiter(s, dirsep);
return s;
}
int
smb3_parse_devname(const char *devname, struct smb3_fs_context *ctx)
{
char *pos;
const char *delims = "/\\";
size_t len;
int rc;
if (unlikely(!devname || !*devname)) {
cifs_dbg(VFS, "Device name not specified\n");
return -EINVAL;
}
len = strspn(devname, delims);
if (len != 2)
return -EINVAL;
pos = strpbrk(devname + 2, delims);
if (!pos)
return -EINVAL;
kfree(ctx->server_hostname);
ctx->server_hostname = kstrndup(devname + 2, pos - devname - 2, GFP_KERNEL);
if (!ctx->server_hostname)
return -ENOMEM;
++pos;
len = strcspn(pos, delims);
if (!len)
return -EINVAL;
pos += len;
kfree(ctx->UNC);
ctx->UNC = kstrndup(devname, pos - devname, GFP_KERNEL);
if (!ctx->UNC)
return -ENOMEM;
convert_delimiter(ctx->UNC, '\\');
if (*pos == '/' || *pos == '\\')
pos++;
kfree(ctx->prepath);
ctx->prepath = NULL;
if (!*pos)
return 0;
ctx->prepath = cifs_sanitize_prepath(pos, GFP_KERNEL);
if (IS_ERR(ctx->prepath)) {
rc = PTR_ERR(ctx->prepath);
ctx->prepath = NULL;
return rc;
}
return 0;
}
static int smb3_handle_conflicting_options(struct fs_context *fc)
{
struct smb3_fs_context *ctx = smb3_fc2context(fc);
if (ctx->multichannel_specified) {
if (ctx->multichannel) {
if (!ctx->max_channels_specified) {
ctx->max_channels = 2;
} else if (ctx->max_channels == 1) {
cifs_errorf(fc,
"max_channels must be greater than 1 when multichannel is enabled\n");
return -EINVAL;
}
} else {
if (!ctx->max_channels_specified) {
ctx->max_channels = 1;
} else if (ctx->max_channels > 1) {
cifs_errorf(fc,
"max_channels must be equal to 1 when multichannel is disabled\n");
return -EINVAL;
}
}
} else {
if (ctx->max_channels_specified) {
if (ctx->max_channels > 1)
ctx->multichannel = true;
else
ctx->multichannel = false;
} else {
ctx->multichannel = false;
ctx->max_channels = 1;
}
}
ctx->multichannel_specified = false;
ctx->max_channels_specified = false;
return 0;
}
static void smb3_fs_context_free(struct fs_context *fc);
static int smb3_fs_context_parse_param(struct fs_context *fc,
struct fs_parameter *param);
static int smb3_fs_context_parse_monolithic(struct fs_context *fc,
void *data);
static int smb3_get_tree(struct fs_context *fc);
static void smb3_sync_ses_chan_max(struct cifs_ses *ses, unsigned int max_channels);
static int smb3_reconfigure(struct fs_context *fc);
static const struct fs_context_operations smb3_fs_context_ops = {
.free = smb3_fs_context_free,
.parse_param = smb3_fs_context_parse_param,
.parse_monolithic = smb3_fs_context_parse_monolithic,
.get_tree = smb3_get_tree,
.reconfigure = smb3_reconfigure,
};
static int smb3_fs_context_parse_monolithic(struct fs_context *fc,
void *data)
{
char *options = data, *key;
int ret = 0;
if (!options)
return 0;
ret = security_sb_eat_lsm_opts(options, &fc->security);
if (ret)
return ret;
while ((key = strsep(&options, ",")) != NULL) {
size_t len;
char *value;
if (*key == 0)
break;
while (options && options[0] == ',') {
len = strlen(key);
strcpy(key + len, options);
options = strchr(options, ',');
if (options)
*options++ = 0;
}
value = strchr(key, '=');
if (value) {
if (value == key)
continue;
*value++ = 0;
}
ret = vfs_parse_fs_string(fc, key, value);
if (ret < 0)
break;
}
return ret ?: smb3_handle_conflicting_options(fc);
}
static int smb3_fs_context_validate(struct fs_context *fc)
{
struct smb3_fs_context *ctx = smb3_fc2context(fc);
if (ctx->rdma && ctx->vals->protocol_id < SMB30_PROT_ID) {
cifs_errorf(fc, "SMB Direct requires Version >=3.0\n");
return -EOPNOTSUPP;
}
#ifndef CONFIG_KEYS
if (ctx->multiuser) {
cifs_errorf(fc, "Multiuser mounts require kernels with CONFIG_KEYS enabled\n");
return -1;
}
#endif
if (ctx->got_version == false)
pr_warn_once("No dialect specified on mount. Default has changed to a more secure dialect, SMB2.1 or later (e.g. SMB3.1.1), from CIFS (SMB1). To use the less secure SMB1 dialect to access old servers which do not support SMB3.1.1 (or even SMB3 or SMB2.1) specify vers=1.0 on mount.\n");
if (!ctx->UNC) {
cifs_errorf(fc, "CIFS mount error: No usable UNC path provided in device string!\n");
return -1;
}
if (strlen(ctx->UNC) < 3 || !strchr(ctx->UNC + 3, '\\')) {
cifs_errorf(fc, "Malformed UNC. Unable to find share name.\n");
return -ENOENT;
}
if (!ctx->got_ip) {
int len;
const char *slash;
slash = strchr(&ctx->UNC[2], '\\');
len = slash - &ctx->UNC[2];
if (!cifs_convert_address((struct sockaddr *)&ctx->dstaddr,
&ctx->UNC[2], len)) {
pr_err("Unable to determine destination address\n");
return -EHOSTUNREACH;
}
}
cifs_set_port((struct sockaddr *)&ctx->dstaddr, ctx->port);
if (ctx->uid_specified && !ctx->forceuid_specified) {
ctx->override_uid = 1;
pr_notice("enabling forceuid mount option implicitly because uid= option is specified\n");
}
if (ctx->gid_specified && !ctx->forcegid_specified) {
ctx->override_gid = 1;
pr_notice("enabling forcegid mount option implicitly because gid= option is specified\n");
}
if (ctx->override_uid && !ctx->uid_specified) {
ctx->override_uid = 0;
pr_notice("ignoring forceuid mount option specified with no uid= option\n");
}
if (ctx->override_gid && !ctx->gid_specified) {
ctx->override_gid = 0;
pr_notice("ignoring forcegid mount option specified with no gid= option\n");
}
return 0;
}
static int smb3_get_tree_common(struct fs_context *fc)
{
struct smb3_fs_context *ctx = smb3_fc2context(fc);
struct dentry *root;
int rc = 0;
root = cifs_smb3_do_mount(fc->fs_type, 0, ctx);
if (IS_ERR(root))
return PTR_ERR(root);
fc->root = root;
return rc;
}
static int smb3_get_tree(struct fs_context *fc)
{
int err = smb3_fs_context_validate(fc);
int ret;
if (err)
return err;
cifs_mount_lock();
ret = smb3_get_tree_common(fc);
cifs_mount_unlock();
return ret;
}
static void smb3_fs_context_free(struct fs_context *fc)
{
struct smb3_fs_context *ctx = smb3_fc2context(fc);
smb3_cleanup_fs_context(ctx);
}
static int smb3_verify_reconfigure_ctx(struct fs_context *fc,
struct smb3_fs_context *new_ctx,
struct smb3_fs_context *old_ctx, bool need_recon)
{
if (new_ctx->posix_paths != old_ctx->posix_paths) {
cifs_errorf(fc, "can not change posixpaths during remount\n");
return -EINVAL;
}
if (new_ctx->sectype != old_ctx->sectype) {
cifs_errorf(fc, "can not change sec during remount\n");
return -EINVAL;
}
if (new_ctx->multiuser != old_ctx->multiuser) {
cifs_errorf(fc, "can not change multiuser during remount\n");
return -EINVAL;
}
if (new_ctx->UNC &&
(!old_ctx->UNC || strcmp(new_ctx->UNC, old_ctx->UNC))) {
cifs_errorf(fc, "can not change UNC during remount\n");
return -EINVAL;
}
if (new_ctx->username &&
(!old_ctx->username || strcmp(new_ctx->username, old_ctx->username))) {
cifs_errorf(fc, "can not change username during remount\n");
return -EINVAL;
}
if (new_ctx->password &&
(!old_ctx->password || strcmp(new_ctx->password, old_ctx->password))) {
if (need_recon == false) {
cifs_errorf(fc,
"can not change password of active session during remount\n");
return -EINVAL;
} else if (old_ctx->sectype == Kerberos) {
cifs_errorf(fc,
"can not change password for Kerberos via remount\n");
return -EINVAL;
}
}
if (new_ctx->domainname &&
(!old_ctx->domainname || strcmp(new_ctx->domainname, old_ctx->domainname))) {
cifs_errorf(fc, "can not change domainname during remount\n");
return -EINVAL;
}
if (strcmp(new_ctx->workstation_name, old_ctx->workstation_name)) {
cifs_errorf(fc, "can not change workstation_name during remount\n");
return -EINVAL;
}
if (new_ctx->nodename &&
(!old_ctx->nodename || strcmp(new_ctx->nodename, old_ctx->nodename))) {
cifs_errorf(fc, "can not change nodename during remount\n");
return -EINVAL;
}
if (new_ctx->iocharset &&
(!old_ctx->iocharset || strcmp(new_ctx->iocharset, old_ctx->iocharset))) {
cifs_errorf(fc, "can not change iocharset during remount\n");
return -EINVAL;
}
if (new_ctx->unicode != old_ctx->unicode) {
cifs_errorf(fc, "can not change unicode during remount\n");
return -EINVAL;
}
if (new_ctx->rfc1001_sessinit != old_ctx->rfc1001_sessinit) {
cifs_errorf(fc, "can not change nbsessinit during remount\n");
return -EINVAL;
}
return 0;
}
#define STEAL_STRING(cifs_sb, ctx, field) \
do { \
kfree(ctx->field); \
ctx->field = cifs_sb->ctx->field; \
cifs_sb->ctx->field = NULL; \
} while (0)
#define STEAL_STRING_SENSITIVE(cifs_sb, ctx, field) \
do { \
kfree_sensitive(ctx->field); \
ctx->field = cifs_sb->ctx->field; \
cifs_sb->ctx->field = NULL; \
} while (0)
int smb3_sync_session_ctx_passwords(struct cifs_sb_info *cifs_sb, struct cifs_ses *ses)
{
if (ses->password &&
cifs_sb->ctx->password &&
strcmp(ses->password, cifs_sb->ctx->password)) {
kfree_sensitive(cifs_sb->ctx->password);
cifs_sb->ctx->password = kstrdup(ses->password, GFP_KERNEL);
if (!cifs_sb->ctx->password)
return -ENOMEM;
}
if (ses->password2 &&
cifs_sb->ctx->password2 &&
strcmp(ses->password2, cifs_sb->ctx->password2)) {
kfree_sensitive(cifs_sb->ctx->password2);
cifs_sb->ctx->password2 = kstrdup(ses->password2, GFP_KERNEL);
if (!cifs_sb->ctx->password2) {
kfree_sensitive(cifs_sb->ctx->password);
cifs_sb->ctx->password = NULL;
return -ENOMEM;
}
}
return 0;
}
static void smb3_sync_ses_chan_max(struct cifs_ses *ses, unsigned int max_channels)
{
spin_lock(&ses->chan_lock);
ses->chan_max = max_channels;
spin_unlock(&ses->chan_lock);
}
static int smb3_reconfigure(struct fs_context *fc)
{
struct smb3_fs_context *ctx = smb3_fc2context(fc);
struct dentry *root = fc->root;
struct cifs_sb_info *cifs_sb = CIFS_SB(root->d_sb);
struct cifs_ses *ses = cifs_sb_master_tcon(cifs_sb)->ses;
unsigned int rsize = ctx->rsize, wsize = ctx->wsize;
char *new_password = NULL, *new_password2 = NULL;
bool need_recon = false;
int rc;
if (ses->expired_pwd)
need_recon = true;
rc = smb3_verify_reconfigure_ctx(fc, ctx, cifs_sb->ctx, need_recon);
if (rc)
return rc;
STEAL_STRING(cifs_sb, ctx, UNC);
STEAL_STRING(cifs_sb, ctx, source);
STEAL_STRING(cifs_sb, ctx, username);
if (need_recon == false)
STEAL_STRING_SENSITIVE(cifs_sb, ctx, password);
else {
if (ctx->password) {
new_password = kstrdup(ctx->password, GFP_KERNEL);
if (!new_password)
return -ENOMEM;
} else
STEAL_STRING_SENSITIVE(cifs_sb, ctx, password);
}
if (ctx->password2) {
new_password2 = kstrdup(ctx->password2, GFP_KERNEL);
if (!new_password2) {
kfree_sensitive(new_password);
return -ENOMEM;
}
} else
STEAL_STRING_SENSITIVE(cifs_sb, ctx, password2);
mutex_lock(&ses->session_mutex);
rc = smb3_sync_session_ctx_passwords(cifs_sb, ses);
if (rc) {
mutex_unlock(&ses->session_mutex);
kfree_sensitive(new_password);
kfree_sensitive(new_password2);
return rc;
}
if (new_password) {
kfree_sensitive(ses->password);
ses->password = new_password;
}
if (new_password2) {
kfree_sensitive(ses->password2);
ses->password2 = new_password2;
}
if ((ctx->multichannel != cifs_sb->ctx->multichannel) ||
(ctx->max_channels != cifs_sb->ctx->max_channels)) {
smb3_sync_ses_chan_max(ses, ctx->max_channels);
spin_lock(&ses->ses_lock);
if (ses->flags & CIFS_SES_FLAG_SCALE_CHANNELS) {
spin_unlock(&ses->ses_lock);
mutex_unlock(&ses->session_mutex);
return -EINVAL;
}
ses->flags |= CIFS_SES_FLAG_SCALE_CHANNELS;
spin_unlock(&ses->ses_lock);
mutex_unlock(&ses->session_mutex);
rc = smb3_update_ses_channels(ses, ses->server,
false ,
false );
spin_lock(&ses->ses_lock);
ses->flags &= ~CIFS_SES_FLAG_SCALE_CHANNELS;
spin_unlock(&ses->ses_lock);
} else {
mutex_unlock(&ses->session_mutex);
}
STEAL_STRING(cifs_sb, ctx, domainname);
STEAL_STRING(cifs_sb, ctx, nodename);
STEAL_STRING(cifs_sb, ctx, iocharset);
ctx->rsize = rsize ? CIFS_ALIGN_RSIZE(fc, rsize) : cifs_sb->ctx->rsize;
ctx->wsize = wsize ? CIFS_ALIGN_WSIZE(fc, wsize) : cifs_sb->ctx->wsize;
smb3_cleanup_fs_context_contents(cifs_sb->ctx);
rc = smb3_fs_context_dup(cifs_sb->ctx, ctx);
smb3_update_mnt_flags(cifs_sb);
#ifdef CONFIG_CIFS_DFS_UPCALL
if (!rc)
rc = dfs_cache_remount_fs(cifs_sb);
#endif
return rc;
}
static int smb3_fs_context_parse_param(struct fs_context *fc,
struct fs_parameter *param)
{
struct fs_parse_result result;
struct smb3_fs_context *ctx = smb3_fc2context(fc);
int i, opt;
bool is_smb3 = !strcmp(fc->fs_type->name, "smb3");
bool skip_parsing = false;
char *hostname;
cifs_dbg(FYI, "CIFS: parsing cifs mount option '%s'\n", param->key);
if (param->type == fs_value_is_string && param->string[0] == 0) {
if (!strcmp("pass", param->key) || !strcmp("password", param->key)) {
skip_parsing = true;
opt = Opt_pass;
} else if (!strcmp("user", param->key) || !strcmp("username", param->key)) {
skip_parsing = true;
opt = Opt_user;
} else if (!strcmp("pass2", param->key) || !strcmp("password2", param->key)) {
skip_parsing = true;
opt = Opt_pass2;
}
}
if (!skip_parsing) {
opt = fs_parse(fc, smb3_fs_parameters, param, &result);
if (opt < 0)
return ctx->sloppy ? 1 : opt;
}
switch (opt) {
case Opt_compress:
if (!IS_ENABLED(CONFIG_CIFS_COMPRESSION)) {
cifs_errorf(fc, "CONFIG_CIFS_COMPRESSION kernel config option is unset\n");
goto cifs_parse_mount_err;
}
ctx->compress = true;
cifs_dbg(VFS, "SMB3 compression support is experimental\n");
break;
case Opt_nodfs:
ctx->nodfs = 1;
break;
case Opt_hard:
if (result.negated) {
if (ctx->retry == 1)
cifs_dbg(VFS, "conflicting hard vs. soft mount options\n");
ctx->retry = 0;
} else
ctx->retry = 1;
break;
case Opt_soft:
if (result.negated)
ctx->retry = 1;
else {
if (ctx->retry == 1)
cifs_dbg(VFS, "conflicting hard vs soft mount options\n");
ctx->retry = 0;
}
break;
case Opt_mapposix:
if (result.negated)
ctx->remap = false;
else {
ctx->remap = true;
ctx->sfu_remap = false;
}
break;
case Opt_mapchars:
if (result.negated)
ctx->sfu_remap = false;
else {
ctx->sfu_remap = true;
ctx->remap = false;
}
break;
case Opt_user_xattr:
if (result.negated)
ctx->no_xattr = 1;
else
ctx->no_xattr = 0;
break;
case Opt_forceuid:
if (result.negated)
ctx->override_uid = 0;
else
ctx->override_uid = 1;
ctx->forceuid_specified = true;
break;
case Opt_forcegid:
if (result.negated)
ctx->override_gid = 0;
else
ctx->override_gid = 1;
ctx->forcegid_specified = true;
break;
case Opt_perm:
if (result.negated)
ctx->noperm = 1;
else
ctx->noperm = 0;
break;
case Opt_dynperm:
if (result.negated)
ctx->dynperm = 0;
else
ctx->dynperm = 1;
break;
case Opt_sfu:
if (result.negated)
ctx->sfu_emul = 0;
else
ctx->sfu_emul = 1;
break;
case Opt_noblocksend:
ctx->noblocksnd = 1;
break;
case Opt_noautotune:
ctx->noautotune = 1;
break;
case Opt_nolease:
ctx->no_lease = 1;
break;
case Opt_nosparse:
ctx->no_sparse = 1;
break;
case Opt_nodelete:
ctx->nodelete = 1;
break;
case Opt_multichannel:
ctx->multichannel_specified = true;
if (result.negated)
ctx->multichannel = false;
else
ctx->multichannel = true;
break;
case Opt_uid:
ctx->linux_uid = result.uid;
ctx->uid_specified = true;
break;
case Opt_cruid:
ctx->cred_uid = result.uid;
ctx->cruid_specified = true;
break;
case Opt_backupuid:
ctx->backupuid = result.uid;
ctx->backupuid_specified = true;
break;
case Opt_backupgid:
ctx->backupgid = result.gid;
ctx->backupgid_specified = true;
break;
case Opt_gid:
ctx->linux_gid = result.gid;
ctx->gid_specified = true;
break;
case Opt_port:
ctx->port = result.uint_32;
break;
case Opt_file_mode:
ctx->file_mode = result.uint_32;
break;
case Opt_dirmode:
ctx->dir_mode = result.uint_32;
break;
case Opt_min_enc_offload:
ctx->min_offload = result.uint_32;
break;
case Opt_retrans:
ctx->retrans = result.uint_32;
break;
case Opt_blocksize:
if ((result.uint_32 < CIFS_MAX_MSGSIZE) ||
(result.uint_32 > (4 * SMB3_DEFAULT_IOSIZE))) {
cifs_errorf(fc, "%s: Invalid blocksize\n",
__func__);
goto cifs_parse_mount_err;
}
ctx->bsize = CIFS_ALIGN_BSIZE(fc, result.uint_32);
ctx->got_bsize = true;
break;
case Opt_rasize:
if ((result.uint_32 > (8 * SMB3_DEFAULT_IOSIZE)) ||
(result.uint_32 < CIFS_DEFAULT_IOSIZE)) {
cifs_errorf(fc, "%s: Invalid rasize %d vs. %d\n",
__func__, result.uint_32, SMB3_DEFAULT_IOSIZE);
goto cifs_parse_mount_err;
}
ctx->rasize = result.uint_32;
break;
case Opt_rsize:
ctx->rsize = CIFS_ALIGN_RSIZE(fc, result.uint_32);
ctx->got_rsize = true;
ctx->vol_rsize = ctx->rsize;
break;
case Opt_wsize:
ctx->wsize = CIFS_ALIGN_WSIZE(fc, result.uint_32);
ctx->got_wsize = true;
ctx->vol_wsize = ctx->wsize;
break;
case Opt_acregmax:
if (result.uint_32 > CIFS_MAX_ACTIMEO / HZ) {
cifs_errorf(fc, "acregmax too large\n");
goto cifs_parse_mount_err;
}
ctx->acregmax = HZ * result.uint_32;
break;
case Opt_acdirmax:
if (result.uint_32 > CIFS_MAX_ACTIMEO / HZ) {
cifs_errorf(fc, "acdirmax too large\n");
goto cifs_parse_mount_err;
}
ctx->acdirmax = HZ * result.uint_32;
break;
case Opt_actimeo:
if (result.uint_32 > CIFS_MAX_ACTIMEO / HZ) {
cifs_errorf(fc, "timeout too large\n");
goto cifs_parse_mount_err;
}
if ((ctx->acdirmax != CIFS_DEF_ACTIMEO) ||
(ctx->acregmax != CIFS_DEF_ACTIMEO)) {
cifs_errorf(fc, "actimeo ignored since acregmax or acdirmax specified\n");
break;
}
ctx->acdirmax = ctx->acregmax = HZ * result.uint_32;
break;
case Opt_closetimeo:
if (result.uint_32 > SMB3_MAX_DCLOSETIMEO / HZ) {
cifs_errorf(fc, "closetimeo too large\n");
goto cifs_parse_mount_err;
}
ctx->closetimeo = HZ * result.uint_32;
break;
case Opt_echo_interval:
if (result.uint_32 < SMB_ECHO_INTERVAL_MIN ||
result.uint_32 > SMB_ECHO_INTERVAL_MAX) {
cifs_errorf(fc, "echo interval is out of bounds\n");
goto cifs_parse_mount_err;
}
ctx->echo_interval = result.uint_32;
break;
case Opt_snapshot:
ctx->snapshot_time = result.uint_64;
break;
case Opt_max_credits:
if (result.uint_32 < 20 || result.uint_32 > 60000) {
cifs_errorf(fc, "%s: Invalid max_credits value\n",
__func__);
goto cifs_parse_mount_err;
}
ctx->max_credits = result.uint_32;
break;
case Opt_max_channels:
ctx->max_channels_specified = true;
if (result.uint_32 < 1 || result.uint_32 > CIFS_MAX_CHANNELS) {
cifs_errorf(fc, "%s: Invalid max_channels value, needs to be 1-%d\n",
__func__, CIFS_MAX_CHANNELS);
goto cifs_parse_mount_err;
}
ctx->max_channels = result.uint_32;
break;
case Opt_max_cached_dirs:
if (result.uint_32 < 1) {
cifs_errorf(fc, "%s: Invalid max_cached_dirs, needs to be 1 or more\n",
__func__);
goto cifs_parse_mount_err;
}
ctx->max_cached_dirs = result.uint_32;
break;
case Opt_handletimeout:
ctx->handle_timeout = result.uint_32;
if (ctx->handle_timeout > SMB3_MAX_HANDLE_TIMEOUT) {
cifs_errorf(fc, "Invalid handle cache timeout, longer than 16 minutes\n");
goto cifs_parse_mount_err;
}
break;
case Opt_source:
kfree(ctx->UNC);
ctx->UNC = NULL;
switch (smb3_parse_devname(param->string, ctx)) {
case 0:
break;
case -ENOMEM:
cifs_errorf(fc, "Unable to allocate memory for devname\n");
goto cifs_parse_mount_err;
case -EINVAL:
cifs_errorf(fc, "Malformed UNC in devname\n");
goto cifs_parse_mount_err;
default:
cifs_errorf(fc, "Unknown error parsing devname\n");
goto cifs_parse_mount_err;
}
kfree(ctx->source);
ctx->source = smb3_fs_context_fullpath(ctx, '/');
if (IS_ERR(ctx->source)) {
ctx->source = NULL;
cifs_errorf(fc, "OOM when copying UNC string\n");
goto cifs_parse_mount_err;
}
kfree(fc->source);
fc->source = kstrdup(ctx->source, GFP_KERNEL);
if (fc->source == NULL) {
cifs_errorf(fc, "OOM when copying UNC string\n");
goto cifs_parse_mount_err;
}
hostname = extract_hostname(ctx->UNC);
if (IS_ERR(hostname)) {
cifs_errorf(fc, "Cannot extract hostname from UNC string\n");
goto cifs_parse_mount_err;
}
memset(ctx->target_rfc1001_name, 0x20, RFC1001_NAME_LEN_WITH_NULL);
for (i = 0; i < RFC1001_NAME_LEN && hostname[i] != 0; i++)
ctx->target_rfc1001_name[i] = toupper(hostname[i]);
kfree(hostname);
break;
case Opt_user:
kfree(ctx->username);
ctx->username = NULL;
if (ctx->nullauth)
break;
if (strlen(param->string) == 0) {
ctx->nullauth = 1;
break;
}
if (strnlen(param->string, CIFS_MAX_USERNAME_LEN) ==
CIFS_MAX_USERNAME_LEN) {
pr_warn("username too long\n");
goto cifs_parse_mount_err;
}
ctx->username = no_free_ptr(param->string);
break;
case Opt_pass:
kfree_sensitive(ctx->password);
ctx->password = NULL;
if (strlen(param->string) == 0)
break;
ctx->password = no_free_ptr(param->string);
break;
case Opt_pass2:
kfree_sensitive(ctx->password2);
ctx->password2 = NULL;
if (strlen(param->string) == 0)
break;
ctx->password2 = no_free_ptr(param->string);
break;
case Opt_ip:
if (strlen(param->string) == 0) {
ctx->got_ip = false;
break;
}
if (!cifs_convert_address((struct sockaddr *)&ctx->dstaddr,
param->string,
strlen(param->string))) {
pr_err("bad ip= option (%s)\n", param->string);
goto cifs_parse_mount_err;
}
ctx->got_ip = true;
break;
case Opt_domain:
if (strnlen(param->string, CIFS_MAX_DOMAINNAME_LEN)
== CIFS_MAX_DOMAINNAME_LEN) {
pr_warn("domain name too long\n");
goto cifs_parse_mount_err;
}
kfree(ctx->domainname);
ctx->domainname = no_free_ptr(param->string);
cifs_dbg(FYI, "Domain name set\n");
break;
case Opt_srcaddr:
if (!cifs_convert_address(
(struct sockaddr *)&ctx->srcaddr,
param->string, strlen(param->string))) {
pr_warn("Could not parse srcaddr: %s\n",
param->string);
goto cifs_parse_mount_err;
}
break;
case Opt_iocharset:
if (strnlen(param->string, 1024) >= 65) {
pr_warn("iocharset name too long\n");
goto cifs_parse_mount_err;
}
if (strncasecmp(param->string, "default", 7) != 0) {
kfree(ctx->iocharset);
ctx->iocharset = no_free_ptr(param->string);
}
cifs_dbg(FYI, "iocharset set to %s\n", ctx->iocharset);
break;
case Opt_netbiosname:
memset(ctx->source_rfc1001_name, 0x20,
RFC1001_NAME_LEN);
for (i = 0; i < RFC1001_NAME_LEN; i++) {
if (param->string[i] == 0)
break;
ctx->source_rfc1001_name[i] = param->string[i];
}
if (i == RFC1001_NAME_LEN && param->string[i] != 0)
pr_warn("netbiosname longer than 15 truncated\n");
break;
case Opt_servern:
memset(ctx->target_rfc1001_name, 0x20,
RFC1001_NAME_LEN_WITH_NULL);
for (i = 0; i < 15; i++) {
if (param->string[i] == 0)
break;
ctx->target_rfc1001_name[i] = param->string[i];
}
if (i == RFC1001_NAME_LEN && param->string[i] != 0)
pr_warn("server netbiosname longer than 15 truncated\n");
break;
case Opt_nbsessinit:
ctx->rfc1001_sessinit = !result.negated;
cifs_dbg(FYI, "rfc1001_sessinit set to %d\n", ctx->rfc1001_sessinit);
break;
case Opt_ver:
if (strncasecmp(param->string, "1", 1) == 0) {
if (strlen(param->string) > 1) {
pr_warn("Bad mount helper ver=%s. Did you want SMB1 (CIFS) dialect and mean to type vers=1.0 instead?\n",
param->string);
goto cifs_parse_mount_err;
}
break;
}
pr_warn("Invalid mount helper version specified\n");
goto cifs_parse_mount_err;
case Opt_vers:
if (cifs_parse_smb_version(fc, param->string, ctx, is_smb3) != 0)
goto cifs_parse_mount_err;
ctx->got_version = true;
break;
case Opt_sec:
if (cifs_parse_security_flavors(fc, param->string, ctx) != 0)
goto cifs_parse_mount_err;
break;
case Opt_upcalltarget:
if (cifs_parse_upcall_target(fc, param->string, ctx) != 0)
goto cifs_parse_mount_err;
break;
case Opt_cache:
if (cifs_parse_cache_flavor(fc, param->string, ctx) != 0)
goto cifs_parse_mount_err;
break;
case Opt_witness:
#ifndef CONFIG_CIFS_SWN_UPCALL
cifs_errorf(fc, "Witness support needs CONFIG_CIFS_SWN_UPCALL config option\n");
goto cifs_parse_mount_err;
#endif
ctx->witness = true;
pr_warn_once("Witness protocol support is experimental\n");
break;
case Opt_unicode:
ctx->unicode = !result.negated;
cifs_dbg(FYI, "unicode set to %d\n", ctx->unicode);
break;
case Opt_rootfs:
#ifndef CONFIG_CIFS_ROOT
cifs_dbg(VFS, "rootfs support requires CONFIG_CIFS_ROOT config option\n");
goto cifs_parse_mount_err;
#endif
ctx->rootfs = true;
break;
case Opt_posixpaths:
if (result.negated)
ctx->posix_paths = 0;
else
ctx->posix_paths = 1;
break;
case Opt_unix:
if (result.negated) {
if (ctx->linux_ext == 1)
pr_warn_once("conflicting posix mount options specified\n");
ctx->linux_ext = 0;
ctx->no_linux_ext = 1;
} else {
if (ctx->no_linux_ext == 1)
pr_warn_once("conflicting posix mount options specified\n");
ctx->linux_ext = 1;
ctx->no_linux_ext = 0;
ctx->nonativesocket = 1;
}
break;
case Opt_nocase:
ctx->nocase = 1;
break;
case Opt_brl:
if (result.negated) {
if (ctx->file_mode ==
(S_IALLUGO & ~(S_ISUID | S_IXGRP)))
ctx->file_mode = S_IALLUGO;
ctx->nobrl = 1;
} else
ctx->nobrl = 0;
break;
case Opt_handlecache:
if (result.negated)
ctx->nohandlecache = 1;
else
ctx->nohandlecache = 0;
break;
case Opt_forcemandatorylock:
ctx->mand_lock = 1;
break;
case Opt_setuids:
ctx->setuids = result.negated;
break;
case Opt_intr:
ctx->intr = !result.negated;
break;
case Opt_setuidfromacl:
ctx->setuidfromacl = 1;
break;
case Opt_strictsync:
ctx->nostrictsync = result.negated;
break;
case Opt_serverino:
ctx->server_ino = !result.negated;
break;
case Opt_rwpidforward:
ctx->rwpidforward = 1;
break;
case Opt_modesid:
ctx->mode_ace = 1;
break;
case Opt_cifsacl:
ctx->cifs_acl = !result.negated;
break;
case Opt_acl:
ctx->no_psx_acl = result.negated;
break;
case Opt_locallease:
ctx->local_lease = 1;
break;
case Opt_sign:
ctx->sign = true;
break;
case Opt_ignore_signature:
ctx->sign = true;
ctx->ignore_signature = true;
break;
case Opt_seal:
ctx->seal = 1;
break;
case Opt_noac:
pr_warn("Mount option noac not supported. Instead set /proc/fs/cifs/LookupCacheEnabled to 0\n");
break;
case Opt_fsc:
#ifndef CONFIG_CIFS_FSCACHE
cifs_errorf(fc, "FS-Cache support needs CONFIG_CIFS_FSCACHE kernel config option set\n");
goto cifs_parse_mount_err;
#endif
ctx->fsc = true;
break;
case Opt_mfsymlinks:
ctx->mfsymlinks = true;
break;
case Opt_multiuser:
ctx->multiuser = true;
break;
case Opt_sloppy:
ctx->sloppy = true;
break;
case Opt_nosharesock:
ctx->nosharesock = true;
break;
case Opt_persistent:
if (result.negated) {
ctx->nopersistent = true;
if (ctx->persistent) {
cifs_errorf(fc, "persistenthandles mount options conflict\n");
goto cifs_parse_mount_err;
}
} else {
ctx->persistent = true;
if ((ctx->nopersistent) || (ctx->resilient)) {
cifs_errorf(fc, "persistenthandles mount options conflict\n");
goto cifs_parse_mount_err;
}
}
break;
case Opt_resilient:
if (result.negated) {
ctx->resilient = false;
} else {
ctx->resilient = true;
if (ctx->persistent) {
cifs_errorf(fc, "persistenthandles mount options conflict\n");
goto cifs_parse_mount_err;
}
}
break;
case Opt_tcp_nodelay:
if (result.negated)
ctx->sockopt_tcp_nodelay = false;
else
ctx->sockopt_tcp_nodelay = true;
break;
case Opt_domainauto:
ctx->domainauto = true;
break;
case Opt_rdma:
ctx->rdma = true;
break;
case Opt_reparse:
if (parse_reparse_flavor(fc, param->string, ctx))
goto cifs_parse_mount_err;
break;
case Opt_nativesocket:
ctx->nonativesocket = result.negated;
break;
case Opt_symlink:
if (parse_symlink_flavor(fc, param->string, ctx))
goto cifs_parse_mount_err;
break;
case Opt_symlinkroot:
if (param->string[0] != '/') {
cifs_errorf(fc, "symlinkroot mount options must be absolute path\n");
goto cifs_parse_mount_err;
}
if (strnlen(param->string, PATH_MAX) == PATH_MAX) {
cifs_errorf(fc, "symlinkroot path too long (max path length: %u)\n",
PATH_MAX - 1);
goto cifs_parse_mount_err;
}
kfree(ctx->symlinkroot);
ctx->symlinkroot = param->string;
param->string = NULL;
break;
}
if (ctx->multiuser && ctx->upcall_target == UPTARGET_MOUNT) {
cifs_errorf(fc, "multiuser mount option not supported with upcalltarget set as 'mount'\n");
goto cifs_parse_mount_err;
}
return 0;
cifs_parse_mount_err:
kfree_sensitive(ctx->password);
ctx->password = NULL;
kfree_sensitive(ctx->password2);
ctx->password2 = NULL;
kfree(ctx->source);
ctx->source = NULL;
kfree(fc->source);
fc->source = NULL;
return -EINVAL;
}
int smb3_init_fs_context(struct fs_context *fc)
{
struct smb3_fs_context *ctx;
char *nodename = utsname()->nodename;
int i;
ctx = kzalloc_obj(struct smb3_fs_context);
if (unlikely(!ctx))
return -ENOMEM;
strscpy(ctx->workstation_name, nodename, sizeof(ctx->workstation_name));
memset(ctx->source_rfc1001_name, 0x20, RFC1001_NAME_LEN);
for (i = 0; i < strnlen(nodename, RFC1001_NAME_LEN); i++)
ctx->source_rfc1001_name[i] = toupper(nodename[i]);
ctx->source_rfc1001_name[RFC1001_NAME_LEN] = 0;
ctx->target_rfc1001_name[0] = 0;
ctx->rfc1001_sessinit = -1;
ctx->cred_uid = current_uid();
ctx->linux_uid = current_uid();
ctx->linux_gid = current_gid();
ctx->bsize = CIFS_DEFAULT_IOSIZE;
ctx->rasize = 0;
ctx->remap = true;
ctx->dir_mode = ctx->file_mode = S_IRUGO | S_IXUGO | S_IWUSR;
ctx->posix_paths = 1;
ctx->server_ino = 1;
ctx->strict_io = true;
ctx->acregmax = CIFS_DEF_ACTIMEO;
ctx->acdirmax = CIFS_DEF_ACTIMEO;
ctx->closetimeo = SMB3_DEF_DCLOSETIMEO;
ctx->max_cached_dirs = MAX_CACHED_FIDS;
ctx->handle_timeout = 0;
ctx->ops = &smb30_operations;
ctx->vals = &smbdefault_values;
ctx->echo_interval = SMB_ECHO_INTERVAL_DEFAULT;
ctx->multichannel = false;
ctx->multichannel_specified = false;
ctx->max_channels_specified = false;
ctx->max_channels = 1;
ctx->backupuid_specified = false;
ctx->backupgid_specified = false;
ctx->retrans = 0;
ctx->reparse_type = CIFS_REPARSE_TYPE_DEFAULT;
ctx->symlink_type = CIFS_SYMLINK_TYPE_DEFAULT;
ctx->nonativesocket = 0;
ctx->unicode = -1;
fc->fs_private = ctx;
fc->ops = &smb3_fs_context_ops;
return 0;
}
void
smb3_cleanup_fs_context_contents(struct smb3_fs_context *ctx)
{
if (ctx == NULL)
return;
kfree(ctx->username);
ctx->username = NULL;
kfree_sensitive(ctx->password);
ctx->password = NULL;
kfree_sensitive(ctx->password2);
ctx->password2 = NULL;
kfree(ctx->server_hostname);
ctx->server_hostname = NULL;
kfree(ctx->UNC);
ctx->UNC = NULL;
kfree(ctx->source);
ctx->source = NULL;
kfree(ctx->domainname);
ctx->domainname = NULL;
kfree(ctx->nodename);
ctx->nodename = NULL;
kfree(ctx->iocharset);
ctx->iocharset = NULL;
kfree(ctx->prepath);
ctx->prepath = NULL;
kfree(ctx->leaf_fullpath);
ctx->leaf_fullpath = NULL;
kfree(ctx->dns_dom);
ctx->dns_dom = NULL;
kfree(ctx->symlinkroot);
ctx->symlinkroot = NULL;
}
void
smb3_cleanup_fs_context(struct smb3_fs_context *ctx)
{
if (!ctx)
return;
smb3_cleanup_fs_context_contents(ctx);
kfree(ctx);
}
unsigned int smb3_update_mnt_flags(struct cifs_sb_info *cifs_sb)
{
unsigned int sbflags = cifs_sb_flags(cifs_sb);
struct smb3_fs_context *ctx = cifs_sb->ctx;
if (ctx->nodfs)
sbflags |= CIFS_MOUNT_NO_DFS;
else
sbflags &= ~CIFS_MOUNT_NO_DFS;
if (ctx->noperm)
sbflags |= CIFS_MOUNT_NO_PERM;
else
sbflags &= ~CIFS_MOUNT_NO_PERM;
if (ctx->setuids)
sbflags |= CIFS_MOUNT_SET_UID;
else
sbflags &= ~CIFS_MOUNT_SET_UID;
if (ctx->setuidfromacl)
sbflags |= CIFS_MOUNT_UID_FROM_ACL;
else
sbflags &= ~CIFS_MOUNT_UID_FROM_ACL;
if (ctx->server_ino)
sbflags |= CIFS_MOUNT_SERVER_INUM;
else
sbflags &= ~CIFS_MOUNT_SERVER_INUM;
if (ctx->remap)
sbflags |= CIFS_MOUNT_MAP_SFM_CHR;
else
sbflags &= ~CIFS_MOUNT_MAP_SFM_CHR;
if (ctx->sfu_remap)
sbflags |= CIFS_MOUNT_MAP_SPECIAL_CHR;
else
sbflags &= ~CIFS_MOUNT_MAP_SPECIAL_CHR;
if (ctx->no_xattr)
sbflags |= CIFS_MOUNT_NO_XATTR;
else
sbflags &= ~CIFS_MOUNT_NO_XATTR;
if (ctx->sfu_emul)
sbflags |= CIFS_MOUNT_UNX_EMUL;
else
sbflags &= ~CIFS_MOUNT_UNX_EMUL;
if (ctx->nobrl)
sbflags |= CIFS_MOUNT_NO_BRL;
else
sbflags &= ~CIFS_MOUNT_NO_BRL;
if (ctx->nohandlecache)
sbflags |= CIFS_MOUNT_NO_HANDLE_CACHE;
else
sbflags &= ~CIFS_MOUNT_NO_HANDLE_CACHE;
if (ctx->nostrictsync)
sbflags |= CIFS_MOUNT_NOSSYNC;
else
sbflags &= ~CIFS_MOUNT_NOSSYNC;
if (ctx->mand_lock)
sbflags |= CIFS_MOUNT_NOPOSIXBRL;
else
sbflags &= ~CIFS_MOUNT_NOPOSIXBRL;
if (ctx->rwpidforward)
sbflags |= CIFS_MOUNT_RWPIDFORWARD;
else
sbflags &= ~CIFS_MOUNT_RWPIDFORWARD;
if (ctx->mode_ace)
sbflags |= CIFS_MOUNT_MODE_FROM_SID;
else
sbflags &= ~CIFS_MOUNT_MODE_FROM_SID;
if (ctx->cifs_acl)
sbflags |= CIFS_MOUNT_CIFS_ACL;
else
sbflags &= ~CIFS_MOUNT_CIFS_ACL;
if (ctx->backupuid_specified)
sbflags |= CIFS_MOUNT_CIFS_BACKUPUID;
else
sbflags &= ~CIFS_MOUNT_CIFS_BACKUPUID;
if (ctx->backupgid_specified)
sbflags |= CIFS_MOUNT_CIFS_BACKUPGID;
else
sbflags &= ~CIFS_MOUNT_CIFS_BACKUPGID;
if (ctx->override_uid)
sbflags |= CIFS_MOUNT_OVERR_UID;
else
sbflags &= ~CIFS_MOUNT_OVERR_UID;
if (ctx->override_gid)
sbflags |= CIFS_MOUNT_OVERR_GID;
else
sbflags &= ~CIFS_MOUNT_OVERR_GID;
if (ctx->dynperm)
sbflags |= CIFS_MOUNT_DYNPERM;
else
sbflags &= ~CIFS_MOUNT_DYNPERM;
if (ctx->fsc)
sbflags |= CIFS_MOUNT_FSCACHE;
else
sbflags &= ~CIFS_MOUNT_FSCACHE;
if (ctx->multiuser)
sbflags |= CIFS_MOUNT_MULTIUSER | CIFS_MOUNT_NO_PERM;
else
sbflags &= ~CIFS_MOUNT_MULTIUSER;
if (ctx->strict_io)
sbflags |= CIFS_MOUNT_STRICT_IO;
else
sbflags &= ~CIFS_MOUNT_STRICT_IO;
if (ctx->direct_io)
sbflags |= CIFS_MOUNT_DIRECT_IO;
else
sbflags &= ~CIFS_MOUNT_DIRECT_IO;
if (ctx->mfsymlinks)
sbflags |= CIFS_MOUNT_MF_SYMLINKS;
else
sbflags &= ~CIFS_MOUNT_MF_SYMLINKS;
if (ctx->mfsymlinks && ctx->sfu_emul) {
cifs_dbg(VFS, "mount options mfsymlinks and sfu both enabled\n");
}
sbflags &= ~CIFS_MOUNT_SHUTDOWN;
atomic_set(&cifs_sb->mnt_cifs_flags, sbflags);
return sbflags;
}