xref: /openbmc/linux/fs/smb/client/fs_context.c (revision ad066c9b)
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3  *   Copyright (C) 2020, Microsoft Corporation.
4  *
5  *   Author(s): Steve French <stfrench@microsoft.com>
6  *              David Howells <dhowells@redhat.com>
7  */
8 
9 /*
10 #include <linux/module.h>
11 #include <linux/nsproxy.h>
12 #include <linux/slab.h>
13 #include <linux/magic.h>
14 #include <linux/security.h>
15 #include <net/net_namespace.h>
16 #ifdef CONFIG_CIFS_DFS_UPCALL
17 #include "dfs_cache.h"
18 #endif
19 */
20 
21 #include <linux/ctype.h>
22 #include <linux/fs_context.h>
23 #include <linux/fs_parser.h>
24 #include <linux/fs.h>
25 #include <linux/mount.h>
26 #include <linux/parser.h>
27 #include <linux/utsname.h>
28 #include "cifsfs.h"
29 #include "cifspdu.h"
30 #include "cifsglob.h"
31 #include "cifsproto.h"
32 #include "cifs_unicode.h"
33 #include "cifs_debug.h"
34 #include "cifs_fs_sb.h"
35 #include "ntlmssp.h"
36 #include "nterr.h"
37 #include "rfc1002pdu.h"
38 #include "fs_context.h"
39 
40 DEFINE_MUTEX(cifs_mount_mutex);
41 
42 static const match_table_t cifs_smb_version_tokens = {
43 	{ Smb_1, SMB1_VERSION_STRING },
44 	{ Smb_20, SMB20_VERSION_STRING},
45 	{ Smb_21, SMB21_VERSION_STRING },
46 	{ Smb_30, SMB30_VERSION_STRING },
47 	{ Smb_302, SMB302_VERSION_STRING },
48 	{ Smb_302, ALT_SMB302_VERSION_STRING },
49 	{ Smb_311, SMB311_VERSION_STRING },
50 	{ Smb_311, ALT_SMB311_VERSION_STRING },
51 	{ Smb_3any, SMB3ANY_VERSION_STRING },
52 	{ Smb_default, SMBDEFAULT_VERSION_STRING },
53 	{ Smb_version_err, NULL }
54 };
55 
56 static const match_table_t cifs_secflavor_tokens = {
57 	{ Opt_sec_krb5, "krb5" },
58 	{ Opt_sec_krb5i, "krb5i" },
59 	{ Opt_sec_krb5p, "krb5p" },
60 	{ Opt_sec_ntlmsspi, "ntlmsspi" },
61 	{ Opt_sec_ntlmssp, "ntlmssp" },
62 	{ Opt_sec_ntlmv2, "nontlm" },
63 	{ Opt_sec_ntlmv2, "ntlmv2" },
64 	{ Opt_sec_ntlmv2i, "ntlmv2i" },
65 	{ Opt_sec_none, "none" },
66 
67 	{ Opt_sec_err, NULL }
68 };
69 
70 const struct fs_parameter_spec smb3_fs_parameters[] = {
71 	/* Mount options that take no arguments */
72 	fsparam_flag_no("user_xattr", Opt_user_xattr),
73 	fsparam_flag_no("forceuid", Opt_forceuid),
74 	fsparam_flag_no("multichannel", Opt_multichannel),
75 	fsparam_flag_no("forcegid", Opt_forcegid),
76 	fsparam_flag("noblocksend", Opt_noblocksend),
77 	fsparam_flag("noautotune", Opt_noautotune),
78 	fsparam_flag("nolease", Opt_nolease),
79 	fsparam_flag_no("hard", Opt_hard),
80 	fsparam_flag_no("soft", Opt_soft),
81 	fsparam_flag_no("perm", Opt_perm),
82 	fsparam_flag("nodelete", Opt_nodelete),
83 	fsparam_flag_no("mapposix", Opt_mapposix),
84 	fsparam_flag("mapchars", Opt_mapchars),
85 	fsparam_flag("nomapchars", Opt_nomapchars),
86 	fsparam_flag_no("sfu", Opt_sfu),
87 	fsparam_flag("nodfs", Opt_nodfs),
88 	fsparam_flag_no("posixpaths", Opt_posixpaths),
89 	fsparam_flag_no("unix", Opt_unix),
90 	fsparam_flag_no("linux", Opt_unix),
91 	fsparam_flag_no("posix", Opt_unix),
92 	fsparam_flag("nocase", Opt_nocase),
93 	fsparam_flag("ignorecase", Opt_nocase),
94 	fsparam_flag_no("brl", Opt_brl),
95 	fsparam_flag_no("handlecache", Opt_handlecache),
96 	fsparam_flag("forcemandatorylock", Opt_forcemandatorylock),
97 	fsparam_flag("forcemand", Opt_forcemandatorylock),
98 	fsparam_flag("setuidfromacl", Opt_setuidfromacl),
99 	fsparam_flag("idsfromsid", Opt_setuidfromacl),
100 	fsparam_flag_no("setuids", Opt_setuids),
101 	fsparam_flag_no("dynperm", Opt_dynperm),
102 	fsparam_flag_no("intr", Opt_intr),
103 	fsparam_flag_no("strictsync", Opt_strictsync),
104 	fsparam_flag_no("serverino", Opt_serverino),
105 	fsparam_flag("rwpidforward", Opt_rwpidforward),
106 	fsparam_flag("cifsacl", Opt_cifsacl),
107 	fsparam_flag_no("acl", Opt_acl),
108 	fsparam_flag("locallease", Opt_locallease),
109 	fsparam_flag("sign", Opt_sign),
110 	fsparam_flag("ignore_signature", Opt_ignore_signature),
111 	fsparam_flag("signloosely", Opt_ignore_signature),
112 	fsparam_flag("seal", Opt_seal),
113 	fsparam_flag("noac", Opt_noac),
114 	fsparam_flag("fsc", Opt_fsc),
115 	fsparam_flag("mfsymlinks", Opt_mfsymlinks),
116 	fsparam_flag("multiuser", Opt_multiuser),
117 	fsparam_flag("sloppy", Opt_sloppy),
118 	fsparam_flag("nosharesock", Opt_nosharesock),
119 	fsparam_flag_no("persistenthandles", Opt_persistent),
120 	fsparam_flag_no("resilienthandles", Opt_resilient),
121 	fsparam_flag_no("tcpnodelay", Opt_tcp_nodelay),
122 	fsparam_flag("nosparse", Opt_nosparse),
123 	fsparam_flag("domainauto", Opt_domainauto),
124 	fsparam_flag("rdma", Opt_rdma),
125 	fsparam_flag("modesid", Opt_modesid),
126 	fsparam_flag("modefromsid", Opt_modesid),
127 	fsparam_flag("rootfs", Opt_rootfs),
128 	fsparam_flag("compress", Opt_compress),
129 	fsparam_flag("witness", Opt_witness),
130 
131 	/* Mount options which take numeric value */
132 	fsparam_u32("backupuid", Opt_backupuid),
133 	fsparam_u32("backupgid", Opt_backupgid),
134 	fsparam_u32("uid", Opt_uid),
135 	fsparam_u32("cruid", Opt_cruid),
136 	fsparam_u32("gid", Opt_gid),
137 	fsparam_u32("file_mode", Opt_file_mode),
138 	fsparam_u32("dirmode", Opt_dirmode),
139 	fsparam_u32("dir_mode", Opt_dirmode),
140 	fsparam_u32("port", Opt_port),
141 	fsparam_u32("min_enc_offload", Opt_min_enc_offload),
142 	fsparam_u32("esize", Opt_min_enc_offload),
143 	fsparam_u32("bsize", Opt_blocksize),
144 	fsparam_u32("rasize", Opt_rasize),
145 	fsparam_u32("rsize", Opt_rsize),
146 	fsparam_u32("wsize", Opt_wsize),
147 	fsparam_u32("actimeo", Opt_actimeo),
148 	fsparam_u32("acdirmax", Opt_acdirmax),
149 	fsparam_u32("acregmax", Opt_acregmax),
150 	fsparam_u32("closetimeo", Opt_closetimeo),
151 	fsparam_u32("echo_interval", Opt_echo_interval),
152 	fsparam_u32("max_credits", Opt_max_credits),
153 	fsparam_u32("max_cached_dirs", Opt_max_cached_dirs),
154 	fsparam_u32("handletimeout", Opt_handletimeout),
155 	fsparam_u64("snapshot", Opt_snapshot),
156 	fsparam_u32("max_channels", Opt_max_channels),
157 
158 	/* Mount options which take string value */
159 	fsparam_string("source", Opt_source),
160 	fsparam_string("user", Opt_user),
161 	fsparam_string("username", Opt_user),
162 	fsparam_string("pass", Opt_pass),
163 	fsparam_string("password", Opt_pass),
164 	fsparam_string("password2", Opt_pass2),
165 	fsparam_string("ip", Opt_ip),
166 	fsparam_string("addr", Opt_ip),
167 	fsparam_string("domain", Opt_domain),
168 	fsparam_string("dom", Opt_domain),
169 	fsparam_string("srcaddr", Opt_srcaddr),
170 	fsparam_string("iocharset", Opt_iocharset),
171 	fsparam_string("netbiosname", Opt_netbiosname),
172 	fsparam_string("servern", Opt_servern),
173 	fsparam_string("ver", Opt_ver),
174 	fsparam_string("vers", Opt_vers),
175 	fsparam_string("sec", Opt_sec),
176 	fsparam_string("cache", Opt_cache),
177 
178 	/* Arguments that should be ignored */
179 	fsparam_flag("guest", Opt_ignore),
180 	fsparam_flag("noatime", Opt_ignore),
181 	fsparam_flag("relatime", Opt_ignore),
182 	fsparam_flag("_netdev", Opt_ignore),
183 	fsparam_flag_no("suid", Opt_ignore),
184 	fsparam_flag_no("exec", Opt_ignore),
185 	fsparam_flag_no("dev", Opt_ignore),
186 	fsparam_flag_no("mand", Opt_ignore),
187 	fsparam_flag_no("auto", Opt_ignore),
188 	fsparam_string("cred", Opt_ignore),
189 	fsparam_string("credentials", Opt_ignore),
190 	/*
191 	 * UNC and prefixpath is now extracted from Opt_source
192 	 * in the new mount API so we can just ignore them going forward.
193 	 */
194 	fsparam_string("unc", Opt_ignore),
195 	fsparam_string("prefixpath", Opt_ignore),
196 	{}
197 };
198 
199 static int
200 cifs_parse_security_flavors(struct fs_context *fc, char *value, struct smb3_fs_context *ctx)
201 {
202 
203 	substring_t args[MAX_OPT_ARGS];
204 
205 	/*
206 	 * With mount options, the last one should win. Reset any existing
207 	 * settings back to default.
208 	 */
209 	ctx->sectype = Unspecified;
210 	ctx->sign = false;
211 
212 	switch (match_token(value, cifs_secflavor_tokens, args)) {
213 	case Opt_sec_krb5p:
214 		cifs_errorf(fc, "sec=krb5p is not supported. Use sec=krb5,seal instead\n");
215 		return 1;
216 	case Opt_sec_krb5i:
217 		ctx->sign = true;
218 		fallthrough;
219 	case Opt_sec_krb5:
220 		ctx->sectype = Kerberos;
221 		break;
222 	case Opt_sec_ntlmsspi:
223 		ctx->sign = true;
224 		fallthrough;
225 	case Opt_sec_ntlmssp:
226 		ctx->sectype = RawNTLMSSP;
227 		break;
228 	case Opt_sec_ntlmv2i:
229 		ctx->sign = true;
230 		fallthrough;
231 	case Opt_sec_ntlmv2:
232 		ctx->sectype = NTLMv2;
233 		break;
234 	case Opt_sec_none:
235 		ctx->nullauth = 1;
236 		kfree(ctx->username);
237 		ctx->username = NULL;
238 		break;
239 	default:
240 		cifs_errorf(fc, "bad security option: %s\n", value);
241 		return 1;
242 	}
243 
244 	return 0;
245 }
246 
247 static const match_table_t cifs_cacheflavor_tokens = {
248 	{ Opt_cache_loose, "loose" },
249 	{ Opt_cache_strict, "strict" },
250 	{ Opt_cache_none, "none" },
251 	{ Opt_cache_ro, "ro" },
252 	{ Opt_cache_rw, "singleclient" },
253 	{ Opt_cache_err, NULL }
254 };
255 
256 static int
257 cifs_parse_cache_flavor(struct fs_context *fc, char *value, struct smb3_fs_context *ctx)
258 {
259 	substring_t args[MAX_OPT_ARGS];
260 
261 	switch (match_token(value, cifs_cacheflavor_tokens, args)) {
262 	case Opt_cache_loose:
263 		ctx->direct_io = false;
264 		ctx->strict_io = false;
265 		ctx->cache_ro = false;
266 		ctx->cache_rw = false;
267 		break;
268 	case Opt_cache_strict:
269 		ctx->direct_io = false;
270 		ctx->strict_io = true;
271 		ctx->cache_ro = false;
272 		ctx->cache_rw = false;
273 		break;
274 	case Opt_cache_none:
275 		ctx->direct_io = true;
276 		ctx->strict_io = false;
277 		ctx->cache_ro = false;
278 		ctx->cache_rw = false;
279 		break;
280 	case Opt_cache_ro:
281 		ctx->direct_io = false;
282 		ctx->strict_io = false;
283 		ctx->cache_ro = true;
284 		ctx->cache_rw = false;
285 		break;
286 	case Opt_cache_rw:
287 		ctx->direct_io = false;
288 		ctx->strict_io = false;
289 		ctx->cache_ro = false;
290 		ctx->cache_rw = true;
291 		break;
292 	default:
293 		cifs_errorf(fc, "bad cache= option: %s\n", value);
294 		return 1;
295 	}
296 	return 0;
297 }
298 
299 #define DUP_CTX_STR(field)						\
300 do {									\
301 	if (ctx->field) {						\
302 		new_ctx->field = kstrdup(ctx->field, GFP_ATOMIC);	\
303 		if (new_ctx->field == NULL) {				\
304 			smb3_cleanup_fs_context_contents(new_ctx);	\
305 			return -ENOMEM;					\
306 		}							\
307 	}								\
308 } while (0)
309 
310 int
311 smb3_fs_context_dup(struct smb3_fs_context *new_ctx, struct smb3_fs_context *ctx)
312 {
313 	memcpy(new_ctx, ctx, sizeof(*ctx));
314 	new_ctx->prepath = NULL;
315 	new_ctx->nodename = NULL;
316 	new_ctx->username = NULL;
317 	new_ctx->password = NULL;
318 	new_ctx->password2 = NULL;
319 	new_ctx->server_hostname = NULL;
320 	new_ctx->domainname = NULL;
321 	new_ctx->UNC = NULL;
322 	new_ctx->source = NULL;
323 	new_ctx->iocharset = NULL;
324 	new_ctx->leaf_fullpath = NULL;
325 	/*
326 	 * Make sure to stay in sync with smb3_cleanup_fs_context_contents()
327 	 */
328 	DUP_CTX_STR(prepath);
329 	DUP_CTX_STR(username);
330 	DUP_CTX_STR(password);
331 	DUP_CTX_STR(password2);
332 	DUP_CTX_STR(server_hostname);
333 	DUP_CTX_STR(UNC);
334 	DUP_CTX_STR(source);
335 	DUP_CTX_STR(domainname);
336 	DUP_CTX_STR(nodename);
337 	DUP_CTX_STR(iocharset);
338 	DUP_CTX_STR(leaf_fullpath);
339 
340 	return 0;
341 }
342 
343 static int
344 cifs_parse_smb_version(struct fs_context *fc, char *value, struct smb3_fs_context *ctx, bool is_smb3)
345 {
346 	substring_t args[MAX_OPT_ARGS];
347 
348 	switch (match_token(value, cifs_smb_version_tokens, args)) {
349 #ifdef CONFIG_CIFS_ALLOW_INSECURE_LEGACY
350 	case Smb_1:
351 		if (disable_legacy_dialects) {
352 			cifs_errorf(fc, "mount with legacy dialect disabled\n");
353 			return 1;
354 		}
355 		if (is_smb3) {
356 			cifs_errorf(fc, "vers=1.0 (cifs) not permitted when mounting with smb3\n");
357 			return 1;
358 		}
359 		cifs_errorf(fc, "Use of the less secure dialect vers=1.0 is not recommended unless required for access to very old servers\n");
360 		ctx->ops = &smb1_operations;
361 		ctx->vals = &smb1_values;
362 		break;
363 	case Smb_20:
364 		if (disable_legacy_dialects) {
365 			cifs_errorf(fc, "mount with legacy dialect disabled\n");
366 			return 1;
367 		}
368 		if (is_smb3) {
369 			cifs_errorf(fc, "vers=2.0 not permitted when mounting with smb3\n");
370 			return 1;
371 		}
372 		ctx->ops = &smb20_operations;
373 		ctx->vals = &smb20_values;
374 		break;
375 #else
376 	case Smb_1:
377 		cifs_errorf(fc, "vers=1.0 (cifs) mount not permitted when legacy dialects disabled\n");
378 		return 1;
379 	case Smb_20:
380 		cifs_errorf(fc, "vers=2.0 mount not permitted when legacy dialects disabled\n");
381 		return 1;
382 #endif /* CIFS_ALLOW_INSECURE_LEGACY */
383 	case Smb_21:
384 		ctx->ops = &smb21_operations;
385 		ctx->vals = &smb21_values;
386 		break;
387 	case Smb_30:
388 		ctx->ops = &smb30_operations;
389 		ctx->vals = &smb30_values;
390 		break;
391 	case Smb_302:
392 		ctx->ops = &smb30_operations; /* currently identical with 3.0 */
393 		ctx->vals = &smb302_values;
394 		break;
395 	case Smb_311:
396 		ctx->ops = &smb311_operations;
397 		ctx->vals = &smb311_values;
398 		break;
399 	case Smb_3any:
400 		ctx->ops = &smb30_operations; /* currently identical with 3.0 */
401 		ctx->vals = &smb3any_values;
402 		break;
403 	case Smb_default:
404 		ctx->ops = &smb30_operations;
405 		ctx->vals = &smbdefault_values;
406 		break;
407 	default:
408 		cifs_errorf(fc, "Unknown vers= option specified: %s\n", value);
409 		return 1;
410 	}
411 	return 0;
412 }
413 
414 int smb3_parse_opt(const char *options, const char *key, char **val)
415 {
416 	int rc = -ENOENT;
417 	char *opts, *orig, *p;
418 
419 	orig = opts = kstrdup(options, GFP_KERNEL);
420 	if (!opts)
421 		return -ENOMEM;
422 
423 	while ((p = strsep(&opts, ","))) {
424 		char *nval;
425 
426 		if (!*p)
427 			continue;
428 		if (strncasecmp(p, key, strlen(key)))
429 			continue;
430 		nval = strchr(p, '=');
431 		if (nval) {
432 			if (nval == p)
433 				continue;
434 			*nval++ = 0;
435 			*val = kstrdup(nval, GFP_KERNEL);
436 			rc = !*val ? -ENOMEM : 0;
437 			goto out;
438 		}
439 	}
440 out:
441 	kfree(orig);
442 	return rc;
443 }
444 
445 /*
446  * Remove duplicate path delimiters. Windows is supposed to do that
447  * but there are some bugs that prevent rename from working if there are
448  * multiple delimiters.
449  *
450  * Return a sanitized duplicate of @path or NULL for empty prefix paths.
451  * Otherwise, return ERR_PTR.
452  *
453  * @gfp indicates the GFP_* flags for kstrdup.
454  * The caller is responsible for freeing the original.
455  */
456 #define IS_DELIM(c) ((c) == '/' || (c) == '\\')
457 char *cifs_sanitize_prepath(char *prepath, gfp_t gfp)
458 {
459 	char *cursor1 = prepath, *cursor2 = prepath;
460 	char *s;
461 
462 	/* skip all prepended delimiters */
463 	while (IS_DELIM(*cursor1))
464 		cursor1++;
465 
466 	/* copy the first letter */
467 	*cursor2 = *cursor1;
468 
469 	/* copy the remainder... */
470 	while (*(cursor1++)) {
471 		/* ... skipping all duplicated delimiters */
472 		if (IS_DELIM(*cursor1) && IS_DELIM(*cursor2))
473 			continue;
474 		*(++cursor2) = *cursor1;
475 	}
476 
477 	/* if the last character is a delimiter, skip it */
478 	if (IS_DELIM(*(cursor2 - 1)))
479 		cursor2--;
480 
481 	*cursor2 = '\0';
482 	if (!*prepath)
483 		return NULL;
484 	s = kstrdup(prepath, gfp);
485 	if (!s)
486 		return ERR_PTR(-ENOMEM);
487 	return s;
488 }
489 
490 /*
491  * Return full path based on the values of @ctx->{UNC,prepath}.
492  *
493  * It is assumed that both values were already parsed by smb3_parse_devname().
494  */
495 char *smb3_fs_context_fullpath(const struct smb3_fs_context *ctx, char dirsep)
496 {
497 	size_t ulen, plen;
498 	char *s;
499 
500 	ulen = strlen(ctx->UNC);
501 	plen = ctx->prepath ? strlen(ctx->prepath) + 1 : 0;
502 
503 	s = kmalloc(ulen + plen + 1, GFP_KERNEL);
504 	if (!s)
505 		return ERR_PTR(-ENOMEM);
506 	memcpy(s, ctx->UNC, ulen);
507 	if (plen) {
508 		s[ulen] = dirsep;
509 		memcpy(s + ulen + 1, ctx->prepath, plen);
510 	}
511 	s[ulen + plen] = '\0';
512 	convert_delimiter(s, dirsep);
513 	return s;
514 }
515 
516 /*
517  * Parse a devname into substrings and populate the ctx->UNC and ctx->prepath
518  * fields with the result. Returns 0 on success and an error otherwise
519  * (e.g. ENOMEM or EINVAL)
520  */
521 int
522 smb3_parse_devname(const char *devname, struct smb3_fs_context *ctx)
523 {
524 	char *pos;
525 	const char *delims = "/\\";
526 	size_t len;
527 	int rc;
528 
529 	if (unlikely(!devname || !*devname)) {
530 		cifs_dbg(VFS, "Device name not specified\n");
531 		return -EINVAL;
532 	}
533 
534 	/* make sure we have a valid UNC double delimiter prefix */
535 	len = strspn(devname, delims);
536 	if (len != 2)
537 		return -EINVAL;
538 
539 	/* find delimiter between host and sharename */
540 	pos = strpbrk(devname + 2, delims);
541 	if (!pos)
542 		return -EINVAL;
543 
544 	/* record the server hostname */
545 	kfree(ctx->server_hostname);
546 	ctx->server_hostname = kstrndup(devname + 2, pos - devname - 2, GFP_KERNEL);
547 	if (!ctx->server_hostname)
548 		return -ENOMEM;
549 
550 	/* skip past delimiter */
551 	++pos;
552 
553 	/* now go until next delimiter or end of string */
554 	len = strcspn(pos, delims);
555 	if (!len)
556 		return -EINVAL;
557 
558 	/* move "pos" up to delimiter or NULL */
559 	pos += len;
560 	kfree(ctx->UNC);
561 	ctx->UNC = kstrndup(devname, pos - devname, GFP_KERNEL);
562 	if (!ctx->UNC)
563 		return -ENOMEM;
564 
565 	convert_delimiter(ctx->UNC, '\\');
566 
567 	/* skip any delimiter */
568 	if (*pos == '/' || *pos == '\\')
569 		pos++;
570 
571 	kfree(ctx->prepath);
572 	ctx->prepath = NULL;
573 
574 	/* If pos is NULL then no prepath */
575 	if (!*pos)
576 		return 0;
577 
578 	ctx->prepath = cifs_sanitize_prepath(pos, GFP_KERNEL);
579 	if (IS_ERR(ctx->prepath)) {
580 		rc = PTR_ERR(ctx->prepath);
581 		ctx->prepath = NULL;
582 		return rc;
583 	}
584 
585 	return 0;
586 }
587 
588 static void smb3_fs_context_free(struct fs_context *fc);
589 static int smb3_fs_context_parse_param(struct fs_context *fc,
590 				       struct fs_parameter *param);
591 static int smb3_fs_context_parse_monolithic(struct fs_context *fc,
592 					    void *data);
593 static int smb3_get_tree(struct fs_context *fc);
594 static int smb3_reconfigure(struct fs_context *fc);
595 
596 static const struct fs_context_operations smb3_fs_context_ops = {
597 	.free			= smb3_fs_context_free,
598 	.parse_param		= smb3_fs_context_parse_param,
599 	.parse_monolithic	= smb3_fs_context_parse_monolithic,
600 	.get_tree		= smb3_get_tree,
601 	.reconfigure		= smb3_reconfigure,
602 };
603 
604 /*
605  * Parse a monolithic block of data from sys_mount().
606  * smb3_fs_context_parse_monolithic - Parse key[=val][,key[=val]]* mount data
607  * @ctx: The superblock configuration to fill in.
608  * @data: The data to parse
609  *
610  * Parse a blob of data that's in key[=val][,key[=val]]* form.  This can be
611  * called from the ->monolithic_mount_data() fs_context operation.
612  *
613  * Returns 0 on success or the error returned by the ->parse_option() fs_context
614  * operation on failure.
615  */
616 static int smb3_fs_context_parse_monolithic(struct fs_context *fc,
617 					   void *data)
618 {
619 	char *options = data, *key;
620 	int ret = 0;
621 
622 	if (!options)
623 		return 0;
624 
625 	ret = security_sb_eat_lsm_opts(options, &fc->security);
626 	if (ret)
627 		return ret;
628 
629 	/* BB Need to add support for sep= here TBD */
630 	while ((key = strsep(&options, ",")) != NULL) {
631 		size_t len;
632 		char *value;
633 
634 		if (*key == 0)
635 			break;
636 
637 		/* Check if following character is the deliminator If yes,
638 		 * we have encountered a double deliminator reset the NULL
639 		 * character to the deliminator
640 		 */
641 		while (options && options[0] == ',') {
642 			len = strlen(key);
643 			strcpy(key + len, options);
644 			options = strchr(options, ',');
645 			if (options)
646 				*options++ = 0;
647 		}
648 
649 
650 		len = 0;
651 		value = strchr(key, '=');
652 		if (value) {
653 			if (value == key)
654 				continue;
655 			*value++ = 0;
656 			len = strlen(value);
657 		}
658 
659 		ret = vfs_parse_fs_string(fc, key, value, len);
660 		if (ret < 0)
661 			break;
662 	}
663 
664 	return ret;
665 }
666 
667 /*
668  * Validate the preparsed information in the config.
669  */
670 static int smb3_fs_context_validate(struct fs_context *fc)
671 {
672 	struct smb3_fs_context *ctx = smb3_fc2context(fc);
673 
674 	if (ctx->rdma && ctx->vals->protocol_id < SMB30_PROT_ID) {
675 		cifs_errorf(fc, "SMB Direct requires Version >=3.0\n");
676 		return -EOPNOTSUPP;
677 	}
678 
679 #ifndef CONFIG_KEYS
680 	/* Muliuser mounts require CONFIG_KEYS support */
681 	if (ctx->multiuser) {
682 		cifs_errorf(fc, "Multiuser mounts require kernels with CONFIG_KEYS enabled\n");
683 		return -1;
684 	}
685 #endif
686 
687 	if (ctx->got_version == false)
688 		pr_warn_once("No dialect specified on mount. Default has changed to a more secure dialect, SMB2.1 or later (e.g. SMB3.1.1), from CIFS (SMB1). To use the less secure SMB1 dialect to access old servers which do not support SMB3.1.1 (or even SMB3 or SMB2.1) specify vers=1.0 on mount.\n");
689 
690 
691 	if (!ctx->UNC) {
692 		cifs_errorf(fc, "CIFS mount error: No usable UNC path provided in device string!\n");
693 		return -1;
694 	}
695 
696 	/* make sure UNC has a share name */
697 	if (strlen(ctx->UNC) < 3 || !strchr(ctx->UNC + 3, '\\')) {
698 		cifs_errorf(fc, "Malformed UNC. Unable to find share name.\n");
699 		return -ENOENT;
700 	}
701 
702 	if (!ctx->got_ip) {
703 		int len;
704 		const char *slash;
705 
706 		/* No ip= option specified? Try to get it from UNC */
707 		/* Use the address part of the UNC. */
708 		slash = strchr(&ctx->UNC[2], '\\');
709 		len = slash - &ctx->UNC[2];
710 		if (!cifs_convert_address((struct sockaddr *)&ctx->dstaddr,
711 					  &ctx->UNC[2], len)) {
712 			pr_err("Unable to determine destination address\n");
713 			return -EHOSTUNREACH;
714 		}
715 	}
716 
717 	/* set the port that we got earlier */
718 	cifs_set_port((struct sockaddr *)&ctx->dstaddr, ctx->port);
719 
720 	if (ctx->uid_specified && !ctx->forceuid_specified) {
721 		ctx->override_uid = 1;
722 		pr_notice("enabling forceuid mount option implicitly because uid= option is specified\n");
723 	}
724 
725 	if (ctx->gid_specified && !ctx->forcegid_specified) {
726 		ctx->override_gid = 1;
727 		pr_notice("enabling forcegid mount option implicitly because gid= option is specified\n");
728 	}
729 
730 	if (ctx->override_uid && !ctx->uid_specified) {
731 		ctx->override_uid = 0;
732 		pr_notice("ignoring forceuid mount option specified with no uid= option\n");
733 	}
734 
735 	if (ctx->override_gid && !ctx->gid_specified) {
736 		ctx->override_gid = 0;
737 		pr_notice("ignoring forcegid mount option specified with no gid= option\n");
738 	}
739 
740 	return 0;
741 }
742 
743 static int smb3_get_tree_common(struct fs_context *fc)
744 {
745 	struct smb3_fs_context *ctx = smb3_fc2context(fc);
746 	struct dentry *root;
747 	int rc = 0;
748 
749 	root = cifs_smb3_do_mount(fc->fs_type, 0, ctx);
750 	if (IS_ERR(root))
751 		return PTR_ERR(root);
752 
753 	fc->root = root;
754 
755 	return rc;
756 }
757 
758 /*
759  * Create an SMB3 superblock from the parameters passed.
760  */
761 static int smb3_get_tree(struct fs_context *fc)
762 {
763 	int err = smb3_fs_context_validate(fc);
764 	int ret;
765 
766 	if (err)
767 		return err;
768 	cifs_mount_lock();
769 	ret = smb3_get_tree_common(fc);
770 	cifs_mount_unlock();
771 	return ret;
772 }
773 
774 static void smb3_fs_context_free(struct fs_context *fc)
775 {
776 	struct smb3_fs_context *ctx = smb3_fc2context(fc);
777 
778 	smb3_cleanup_fs_context(ctx);
779 }
780 
781 /*
782  * Compare the old and new proposed context during reconfigure
783  * and check if the changes are compatible.
784  */
785 static int smb3_verify_reconfigure_ctx(struct fs_context *fc,
786 				       struct smb3_fs_context *new_ctx,
787 				       struct smb3_fs_context *old_ctx, bool need_recon)
788 {
789 	if (new_ctx->posix_paths != old_ctx->posix_paths) {
790 		cifs_errorf(fc, "can not change posixpaths during remount\n");
791 		return -EINVAL;
792 	}
793 	if (new_ctx->sectype != old_ctx->sectype) {
794 		cifs_errorf(fc, "can not change sec during remount\n");
795 		return -EINVAL;
796 	}
797 	if (new_ctx->multiuser != old_ctx->multiuser) {
798 		cifs_errorf(fc, "can not change multiuser during remount\n");
799 		return -EINVAL;
800 	}
801 	if (new_ctx->UNC &&
802 	    (!old_ctx->UNC || strcmp(new_ctx->UNC, old_ctx->UNC))) {
803 		cifs_errorf(fc, "can not change UNC during remount\n");
804 		return -EINVAL;
805 	}
806 	if (new_ctx->username &&
807 	    (!old_ctx->username || strcmp(new_ctx->username, old_ctx->username))) {
808 		cifs_errorf(fc, "can not change username during remount\n");
809 		return -EINVAL;
810 	}
811 	if (new_ctx->password &&
812 	    (!old_ctx->password || strcmp(new_ctx->password, old_ctx->password))) {
813 		if (need_recon == false) {
814 			cifs_errorf(fc,
815 				    "can not change password of active session during remount\n");
816 			return -EINVAL;
817 		} else if (old_ctx->sectype == Kerberos) {
818 			cifs_errorf(fc,
819 				    "can not change password for Kerberos via remount\n");
820 			return -EINVAL;
821 		}
822 	}
823 	if (new_ctx->domainname &&
824 	    (!old_ctx->domainname || strcmp(new_ctx->domainname, old_ctx->domainname))) {
825 		cifs_errorf(fc, "can not change domainname during remount\n");
826 		return -EINVAL;
827 	}
828 	if (strcmp(new_ctx->workstation_name, old_ctx->workstation_name)) {
829 		cifs_errorf(fc, "can not change workstation_name during remount\n");
830 		return -EINVAL;
831 	}
832 	if (new_ctx->nodename &&
833 	    (!old_ctx->nodename || strcmp(new_ctx->nodename, old_ctx->nodename))) {
834 		cifs_errorf(fc, "can not change nodename during remount\n");
835 		return -EINVAL;
836 	}
837 	if (new_ctx->iocharset &&
838 	    (!old_ctx->iocharset || strcmp(new_ctx->iocharset, old_ctx->iocharset))) {
839 		cifs_errorf(fc, "can not change iocharset during remount\n");
840 		return -EINVAL;
841 	}
842 
843 	return 0;
844 }
845 
846 #define STEAL_STRING(cifs_sb, ctx, field)				\
847 do {									\
848 	kfree(ctx->field);						\
849 	ctx->field = cifs_sb->ctx->field;				\
850 	cifs_sb->ctx->field = NULL;					\
851 } while (0)
852 
853 #define STEAL_STRING_SENSITIVE(cifs_sb, ctx, field)			\
854 do {									\
855 	kfree_sensitive(ctx->field);					\
856 	ctx->field = cifs_sb->ctx->field;				\
857 	cifs_sb->ctx->field = NULL;					\
858 } while (0)
859 
860 static int smb3_reconfigure(struct fs_context *fc)
861 {
862 	struct smb3_fs_context *ctx = smb3_fc2context(fc);
863 	struct dentry *root = fc->root;
864 	struct cifs_sb_info *cifs_sb = CIFS_SB(root->d_sb);
865 	struct cifs_ses *ses = cifs_sb_master_tcon(cifs_sb)->ses;
866 	bool need_recon = false;
867 	int rc;
868 
869 	if (ses->expired_pwd)
870 		need_recon = true;
871 
872 	rc = smb3_verify_reconfigure_ctx(fc, ctx, cifs_sb->ctx, need_recon);
873 	if (rc)
874 		return rc;
875 
876 	/*
877 	 * We can not change UNC/username/password/domainname/
878 	 * workstation_name/nodename/iocharset
879 	 * during reconnect so ignore what we have in the new context and
880 	 * just use what we already have in cifs_sb->ctx.
881 	 */
882 	STEAL_STRING(cifs_sb, ctx, UNC);
883 	STEAL_STRING(cifs_sb, ctx, source);
884 	STEAL_STRING(cifs_sb, ctx, username);
885 	if (need_recon == false)
886 		STEAL_STRING_SENSITIVE(cifs_sb, ctx, password);
887 	else  {
888 		kfree_sensitive(ses->password);
889 		ses->password = kstrdup(ctx->password, GFP_KERNEL);
890 		kfree_sensitive(ses->password2);
891 		ses->password2 = kstrdup(ctx->password2, GFP_KERNEL);
892 	}
893 	STEAL_STRING(cifs_sb, ctx, domainname);
894 	STEAL_STRING(cifs_sb, ctx, nodename);
895 	STEAL_STRING(cifs_sb, ctx, iocharset);
896 
897 	/* if rsize or wsize not passed in on remount, use previous values */
898 	if (ctx->rsize == 0)
899 		ctx->rsize = cifs_sb->ctx->rsize;
900 	if (ctx->wsize == 0)
901 		ctx->wsize = cifs_sb->ctx->wsize;
902 
903 
904 	smb3_cleanup_fs_context_contents(cifs_sb->ctx);
905 	rc = smb3_fs_context_dup(cifs_sb->ctx, ctx);
906 	smb3_update_mnt_flags(cifs_sb);
907 #ifdef CONFIG_CIFS_DFS_UPCALL
908 	if (!rc)
909 		rc = dfs_cache_remount_fs(cifs_sb);
910 #endif
911 
912 	return rc;
913 }
914 
915 static int smb3_fs_context_parse_param(struct fs_context *fc,
916 				      struct fs_parameter *param)
917 {
918 	struct fs_parse_result result;
919 	struct smb3_fs_context *ctx = smb3_fc2context(fc);
920 	int i, opt;
921 	bool is_smb3 = !strcmp(fc->fs_type->name, "smb3");
922 	bool skip_parsing = false;
923 	kuid_t uid;
924 	kgid_t gid;
925 
926 	cifs_dbg(FYI, "CIFS: parsing cifs mount option '%s'\n", param->key);
927 
928 	/*
929 	 * fs_parse can not handle string options with an empty value so
930 	 * we will need special handling of them.
931 	 */
932 	if (param->type == fs_value_is_string && param->string[0] == 0) {
933 		if (!strcmp("pass", param->key) || !strcmp("password", param->key)) {
934 			skip_parsing = true;
935 			opt = Opt_pass;
936 		} else if (!strcmp("user", param->key) || !strcmp("username", param->key)) {
937 			skip_parsing = true;
938 			opt = Opt_user;
939 		}
940 	}
941 
942 	if (!skip_parsing) {
943 		opt = fs_parse(fc, smb3_fs_parameters, param, &result);
944 		if (opt < 0)
945 			return ctx->sloppy ? 1 : opt;
946 	}
947 
948 	switch (opt) {
949 	case Opt_compress:
950 		ctx->compression = UNKNOWN_TYPE;
951 		cifs_dbg(VFS,
952 			"SMB3 compression support is experimental\n");
953 		break;
954 	case Opt_nodfs:
955 		ctx->nodfs = 1;
956 		break;
957 	case Opt_hard:
958 		if (result.negated) {
959 			if (ctx->retry == 1)
960 				cifs_dbg(VFS, "conflicting hard vs. soft mount options\n");
961 			ctx->retry = 0;
962 		} else
963 			ctx->retry = 1;
964 		break;
965 	case Opt_soft:
966 		if (result.negated)
967 			ctx->retry = 1;
968 		else {
969 			if (ctx->retry == 1)
970 				cifs_dbg(VFS, "conflicting hard vs soft mount options\n");
971 			ctx->retry = 0;
972 		}
973 		break;
974 	case Opt_mapposix:
975 		if (result.negated)
976 			ctx->remap = false;
977 		else {
978 			ctx->remap = true;
979 			ctx->sfu_remap = false; /* disable SFU mapping */
980 		}
981 		break;
982 	case Opt_mapchars:
983 		if (result.negated)
984 			ctx->sfu_remap = false;
985 		else {
986 			ctx->sfu_remap = true;
987 			ctx->remap = false; /* disable SFM (mapposix) mapping */
988 		}
989 		break;
990 	case Opt_user_xattr:
991 		if (result.negated)
992 			ctx->no_xattr = 1;
993 		else
994 			ctx->no_xattr = 0;
995 		break;
996 	case Opt_forceuid:
997 		if (result.negated)
998 			ctx->override_uid = 0;
999 		else
1000 			ctx->override_uid = 1;
1001 		ctx->forceuid_specified = true;
1002 		break;
1003 	case Opt_forcegid:
1004 		if (result.negated)
1005 			ctx->override_gid = 0;
1006 		else
1007 			ctx->override_gid = 1;
1008 		ctx->forcegid_specified = true;
1009 		break;
1010 	case Opt_perm:
1011 		if (result.negated)
1012 			ctx->noperm = 1;
1013 		else
1014 			ctx->noperm = 0;
1015 		break;
1016 	case Opt_dynperm:
1017 		if (result.negated)
1018 			ctx->dynperm = 0;
1019 		else
1020 			ctx->dynperm = 1;
1021 		break;
1022 	case Opt_sfu:
1023 		if (result.negated)
1024 			ctx->sfu_emul = 0;
1025 		else
1026 			ctx->sfu_emul = 1;
1027 		break;
1028 	case Opt_noblocksend:
1029 		ctx->noblocksnd = 1;
1030 		break;
1031 	case Opt_noautotune:
1032 		ctx->noautotune = 1;
1033 		break;
1034 	case Opt_nolease:
1035 		ctx->no_lease = 1;
1036 		break;
1037 	case Opt_nosparse:
1038 		ctx->no_sparse = 1;
1039 		break;
1040 	case Opt_nodelete:
1041 		ctx->nodelete = 1;
1042 		break;
1043 	case Opt_multichannel:
1044 		if (result.negated) {
1045 			ctx->multichannel = false;
1046 			ctx->max_channels = 1;
1047 		} else {
1048 			ctx->multichannel = true;
1049 			/* if number of channels not specified, default to 2 */
1050 			if (ctx->max_channels < 2)
1051 				ctx->max_channels = 2;
1052 		}
1053 		break;
1054 	case Opt_uid:
1055 		uid = make_kuid(current_user_ns(), result.uint_32);
1056 		if (!uid_valid(uid))
1057 			goto cifs_parse_mount_err;
1058 		ctx->linux_uid = uid;
1059 		ctx->uid_specified = true;
1060 		break;
1061 	case Opt_cruid:
1062 		uid = make_kuid(current_user_ns(), result.uint_32);
1063 		if (!uid_valid(uid))
1064 			goto cifs_parse_mount_err;
1065 		ctx->cred_uid = uid;
1066 		ctx->cruid_specified = true;
1067 		break;
1068 	case Opt_backupuid:
1069 		uid = make_kuid(current_user_ns(), result.uint_32);
1070 		if (!uid_valid(uid))
1071 			goto cifs_parse_mount_err;
1072 		ctx->backupuid = uid;
1073 		ctx->backupuid_specified = true;
1074 		break;
1075 	case Opt_backupgid:
1076 		gid = make_kgid(current_user_ns(), result.uint_32);
1077 		if (!gid_valid(gid))
1078 			goto cifs_parse_mount_err;
1079 		ctx->backupgid = gid;
1080 		ctx->backupgid_specified = true;
1081 		break;
1082 	case Opt_gid:
1083 		gid = make_kgid(current_user_ns(), result.uint_32);
1084 		if (!gid_valid(gid))
1085 			goto cifs_parse_mount_err;
1086 		ctx->linux_gid = gid;
1087 		ctx->gid_specified = true;
1088 		break;
1089 	case Opt_port:
1090 		ctx->port = result.uint_32;
1091 		break;
1092 	case Opt_file_mode:
1093 		ctx->file_mode = result.uint_32;
1094 		break;
1095 	case Opt_dirmode:
1096 		ctx->dir_mode = result.uint_32;
1097 		break;
1098 	case Opt_min_enc_offload:
1099 		ctx->min_offload = result.uint_32;
1100 		break;
1101 	case Opt_blocksize:
1102 		/*
1103 		 * inode blocksize realistically should never need to be
1104 		 * less than 16K or greater than 16M and default is 1MB.
1105 		 * Note that small inode block sizes (e.g. 64K) can lead
1106 		 * to very poor performance of common tools like cp and scp
1107 		 */
1108 		if ((result.uint_32 < CIFS_MAX_MSGSIZE) ||
1109 		   (result.uint_32 > (4 * SMB3_DEFAULT_IOSIZE))) {
1110 			cifs_errorf(fc, "%s: Invalid blocksize\n",
1111 				__func__);
1112 			goto cifs_parse_mount_err;
1113 		}
1114 		ctx->bsize = result.uint_32;
1115 		ctx->got_bsize = true;
1116 		break;
1117 	case Opt_rasize:
1118 		/*
1119 		 * readahead size realistically should never need to be
1120 		 * less than 1M (CIFS_DEFAULT_IOSIZE) or greater than 32M
1121 		 * (perhaps an exception should be considered in the
1122 		 * for the case of a large number of channels
1123 		 * when multichannel is negotiated) since that would lead
1124 		 * to plenty of parallel I/O in flight to the server.
1125 		 * Note that smaller read ahead sizes would
1126 		 * hurt performance of common tools like cp and scp
1127 		 * which often trigger sequential i/o with read ahead
1128 		 */
1129 		if ((result.uint_32 > (8 * SMB3_DEFAULT_IOSIZE)) ||
1130 		    (result.uint_32 < CIFS_DEFAULT_IOSIZE)) {
1131 			cifs_errorf(fc, "%s: Invalid rasize %d vs. %d\n",
1132 				__func__, result.uint_32, SMB3_DEFAULT_IOSIZE);
1133 			goto cifs_parse_mount_err;
1134 		}
1135 		ctx->rasize = result.uint_32;
1136 		break;
1137 	case Opt_rsize:
1138 		ctx->rsize = result.uint_32;
1139 		ctx->got_rsize = true;
1140 		break;
1141 	case Opt_wsize:
1142 		ctx->wsize = result.uint_32;
1143 		ctx->got_wsize = true;
1144 		if (ctx->wsize % PAGE_SIZE != 0) {
1145 			ctx->wsize = round_down(ctx->wsize, PAGE_SIZE);
1146 			if (ctx->wsize == 0) {
1147 				ctx->wsize = PAGE_SIZE;
1148 				cifs_dbg(VFS, "wsize too small, reset to minimum %ld\n", PAGE_SIZE);
1149 			} else {
1150 				cifs_dbg(VFS,
1151 					 "wsize rounded down to %d to multiple of PAGE_SIZE %ld\n",
1152 					 ctx->wsize, PAGE_SIZE);
1153 			}
1154 		}
1155 		break;
1156 	case Opt_acregmax:
1157 		ctx->acregmax = HZ * result.uint_32;
1158 		if (ctx->acregmax > CIFS_MAX_ACTIMEO) {
1159 			cifs_errorf(fc, "acregmax too large\n");
1160 			goto cifs_parse_mount_err;
1161 		}
1162 		break;
1163 	case Opt_acdirmax:
1164 		ctx->acdirmax = HZ * result.uint_32;
1165 		if (ctx->acdirmax > CIFS_MAX_ACTIMEO) {
1166 			cifs_errorf(fc, "acdirmax too large\n");
1167 			goto cifs_parse_mount_err;
1168 		}
1169 		break;
1170 	case Opt_actimeo:
1171 		if (HZ * result.uint_32 > CIFS_MAX_ACTIMEO) {
1172 			cifs_errorf(fc, "timeout too large\n");
1173 			goto cifs_parse_mount_err;
1174 		}
1175 		if ((ctx->acdirmax != CIFS_DEF_ACTIMEO) ||
1176 		    (ctx->acregmax != CIFS_DEF_ACTIMEO)) {
1177 			cifs_errorf(fc, "actimeo ignored since acregmax or acdirmax specified\n");
1178 			break;
1179 		}
1180 		ctx->acdirmax = ctx->acregmax = HZ * result.uint_32;
1181 		break;
1182 	case Opt_closetimeo:
1183 		ctx->closetimeo = HZ * result.uint_32;
1184 		if (ctx->closetimeo > SMB3_MAX_DCLOSETIMEO) {
1185 			cifs_errorf(fc, "closetimeo too large\n");
1186 			goto cifs_parse_mount_err;
1187 		}
1188 		break;
1189 	case Opt_echo_interval:
1190 		ctx->echo_interval = result.uint_32;
1191 		break;
1192 	case Opt_snapshot:
1193 		ctx->snapshot_time = result.uint_64;
1194 		break;
1195 	case Opt_max_credits:
1196 		if (result.uint_32 < 20 || result.uint_32 > 60000) {
1197 			cifs_errorf(fc, "%s: Invalid max_credits value\n",
1198 				 __func__);
1199 			goto cifs_parse_mount_err;
1200 		}
1201 		ctx->max_credits = result.uint_32;
1202 		break;
1203 	case Opt_max_channels:
1204 		if (result.uint_32 < 1 || result.uint_32 > CIFS_MAX_CHANNELS) {
1205 			cifs_errorf(fc, "%s: Invalid max_channels value, needs to be 1-%d\n",
1206 				 __func__, CIFS_MAX_CHANNELS);
1207 			goto cifs_parse_mount_err;
1208 		}
1209 		ctx->max_channels = result.uint_32;
1210 		/* If more than one channel requested ... they want multichan */
1211 		if (result.uint_32 > 1)
1212 			ctx->multichannel = true;
1213 		break;
1214 	case Opt_max_cached_dirs:
1215 		if (result.uint_32 < 1) {
1216 			cifs_errorf(fc, "%s: Invalid max_cached_dirs, needs to be 1 or more\n",
1217 				    __func__);
1218 			goto cifs_parse_mount_err;
1219 		}
1220 		ctx->max_cached_dirs = result.uint_32;
1221 		break;
1222 	case Opt_handletimeout:
1223 		ctx->handle_timeout = result.uint_32;
1224 		if (ctx->handle_timeout > SMB3_MAX_HANDLE_TIMEOUT) {
1225 			cifs_errorf(fc, "Invalid handle cache timeout, longer than 16 minutes\n");
1226 			goto cifs_parse_mount_err;
1227 		}
1228 		break;
1229 	case Opt_source:
1230 		kfree(ctx->UNC);
1231 		ctx->UNC = NULL;
1232 		switch (smb3_parse_devname(param->string, ctx)) {
1233 		case 0:
1234 			break;
1235 		case -ENOMEM:
1236 			cifs_errorf(fc, "Unable to allocate memory for devname\n");
1237 			goto cifs_parse_mount_err;
1238 		case -EINVAL:
1239 			cifs_errorf(fc, "Malformed UNC in devname\n");
1240 			goto cifs_parse_mount_err;
1241 		default:
1242 			cifs_errorf(fc, "Unknown error parsing devname\n");
1243 			goto cifs_parse_mount_err;
1244 		}
1245 		ctx->source = smb3_fs_context_fullpath(ctx, '/');
1246 		if (IS_ERR(ctx->source)) {
1247 			ctx->source = NULL;
1248 			cifs_errorf(fc, "OOM when copying UNC string\n");
1249 			goto cifs_parse_mount_err;
1250 		}
1251 		fc->source = kstrdup(ctx->source, GFP_KERNEL);
1252 		if (fc->source == NULL) {
1253 			cifs_errorf(fc, "OOM when copying UNC string\n");
1254 			goto cifs_parse_mount_err;
1255 		}
1256 		break;
1257 	case Opt_user:
1258 		kfree(ctx->username);
1259 		ctx->username = NULL;
1260 		if (ctx->nullauth)
1261 			break;
1262 		if (strlen(param->string) == 0) {
1263 			/* null user, ie. anonymous authentication */
1264 			ctx->nullauth = 1;
1265 			break;
1266 		}
1267 
1268 		if (strnlen(param->string, CIFS_MAX_USERNAME_LEN) >
1269 		    CIFS_MAX_USERNAME_LEN) {
1270 			pr_warn("username too long\n");
1271 			goto cifs_parse_mount_err;
1272 		}
1273 		ctx->username = kstrdup(param->string, GFP_KERNEL);
1274 		if (ctx->username == NULL) {
1275 			cifs_errorf(fc, "OOM when copying username string\n");
1276 			goto cifs_parse_mount_err;
1277 		}
1278 		break;
1279 	case Opt_pass:
1280 		kfree_sensitive(ctx->password);
1281 		ctx->password = NULL;
1282 		if (strlen(param->string) == 0)
1283 			break;
1284 
1285 		ctx->password = kstrdup(param->string, GFP_KERNEL);
1286 		if (ctx->password == NULL) {
1287 			cifs_errorf(fc, "OOM when copying password string\n");
1288 			goto cifs_parse_mount_err;
1289 		}
1290 		break;
1291 	case Opt_pass2:
1292 		kfree_sensitive(ctx->password2);
1293 		ctx->password2 = NULL;
1294 		if (strlen(param->string) == 0)
1295 			break;
1296 
1297 		ctx->password2 = kstrdup(param->string, GFP_KERNEL);
1298 		if (ctx->password2 == NULL) {
1299 			cifs_errorf(fc, "OOM when copying password2 string\n");
1300 			goto cifs_parse_mount_err;
1301 		}
1302 		break;
1303 	case Opt_ip:
1304 		if (strlen(param->string) == 0) {
1305 			ctx->got_ip = false;
1306 			break;
1307 		}
1308 		if (!cifs_convert_address((struct sockaddr *)&ctx->dstaddr,
1309 					  param->string,
1310 					  strlen(param->string))) {
1311 			pr_err("bad ip= option (%s)\n", param->string);
1312 			goto cifs_parse_mount_err;
1313 		}
1314 		ctx->got_ip = true;
1315 		break;
1316 	case Opt_domain:
1317 		if (strnlen(param->string, CIFS_MAX_DOMAINNAME_LEN)
1318 				== CIFS_MAX_DOMAINNAME_LEN) {
1319 			pr_warn("domain name too long\n");
1320 			goto cifs_parse_mount_err;
1321 		}
1322 
1323 		kfree(ctx->domainname);
1324 		ctx->domainname = kstrdup(param->string, GFP_KERNEL);
1325 		if (ctx->domainname == NULL) {
1326 			cifs_errorf(fc, "OOM when copying domainname string\n");
1327 			goto cifs_parse_mount_err;
1328 		}
1329 		cifs_dbg(FYI, "Domain name set\n");
1330 		break;
1331 	case Opt_srcaddr:
1332 		if (!cifs_convert_address(
1333 				(struct sockaddr *)&ctx->srcaddr,
1334 				param->string, strlen(param->string))) {
1335 			pr_warn("Could not parse srcaddr: %s\n",
1336 				param->string);
1337 			goto cifs_parse_mount_err;
1338 		}
1339 		break;
1340 	case Opt_iocharset:
1341 		if (strnlen(param->string, 1024) >= 65) {
1342 			pr_warn("iocharset name too long\n");
1343 			goto cifs_parse_mount_err;
1344 		}
1345 
1346 		if (strncasecmp(param->string, "default", 7) != 0) {
1347 			kfree(ctx->iocharset);
1348 			ctx->iocharset = kstrdup(param->string, GFP_KERNEL);
1349 			if (ctx->iocharset == NULL) {
1350 				cifs_errorf(fc, "OOM when copying iocharset string\n");
1351 				goto cifs_parse_mount_err;
1352 			}
1353 		}
1354 		/* if iocharset not set then load_nls_default
1355 		 * is used by caller
1356 		 */
1357 		cifs_dbg(FYI, "iocharset set to %s\n", ctx->iocharset);
1358 		break;
1359 	case Opt_netbiosname:
1360 		memset(ctx->source_rfc1001_name, 0x20,
1361 			RFC1001_NAME_LEN);
1362 		/*
1363 		 * FIXME: are there cases in which a comma can
1364 		 * be valid in workstation netbios name (and
1365 		 * need special handling)?
1366 		 */
1367 		for (i = 0; i < RFC1001_NAME_LEN; i++) {
1368 			/* don't ucase netbiosname for user */
1369 			if (param->string[i] == 0)
1370 				break;
1371 			ctx->source_rfc1001_name[i] = param->string[i];
1372 		}
1373 		/* The string has 16th byte zero still from
1374 		 * set at top of the function
1375 		 */
1376 		if (i == RFC1001_NAME_LEN && param->string[i] != 0)
1377 			pr_warn("netbiosname longer than 15 truncated\n");
1378 		break;
1379 	case Opt_servern:
1380 		/* last byte, type, is 0x20 for servr type */
1381 		memset(ctx->target_rfc1001_name, 0x20,
1382 			RFC1001_NAME_LEN_WITH_NULL);
1383 		/*
1384 		 * BB are there cases in which a comma can be valid in this
1385 		 * workstation netbios name (and need special handling)?
1386 		 */
1387 
1388 		/* user or mount helper must uppercase the netbios name */
1389 		for (i = 0; i < 15; i++) {
1390 			if (param->string[i] == 0)
1391 				break;
1392 			ctx->target_rfc1001_name[i] = param->string[i];
1393 		}
1394 
1395 		/* The string has 16th byte zero still from set at top of function */
1396 		if (i == RFC1001_NAME_LEN && param->string[i] != 0)
1397 			pr_warn("server netbiosname longer than 15 truncated\n");
1398 		break;
1399 	case Opt_ver:
1400 		/* version of mount userspace tools, not dialect */
1401 		/* If interface changes in mount.cifs bump to new ver */
1402 		if (strncasecmp(param->string, "1", 1) == 0) {
1403 			if (strlen(param->string) > 1) {
1404 				pr_warn("Bad mount helper ver=%s. Did you want SMB1 (CIFS) dialect and mean to type vers=1.0 instead?\n",
1405 					param->string);
1406 				goto cifs_parse_mount_err;
1407 			}
1408 			/* This is the default */
1409 			break;
1410 		}
1411 		/* For all other value, error */
1412 		pr_warn("Invalid mount helper version specified\n");
1413 		goto cifs_parse_mount_err;
1414 	case Opt_vers:
1415 		/* protocol version (dialect) */
1416 		if (cifs_parse_smb_version(fc, param->string, ctx, is_smb3) != 0)
1417 			goto cifs_parse_mount_err;
1418 		ctx->got_version = true;
1419 		break;
1420 	case Opt_sec:
1421 		if (cifs_parse_security_flavors(fc, param->string, ctx) != 0)
1422 			goto cifs_parse_mount_err;
1423 		break;
1424 	case Opt_cache:
1425 		if (cifs_parse_cache_flavor(fc, param->string, ctx) != 0)
1426 			goto cifs_parse_mount_err;
1427 		break;
1428 	case Opt_witness:
1429 #ifndef CONFIG_CIFS_SWN_UPCALL
1430 		cifs_errorf(fc, "Witness support needs CONFIG_CIFS_SWN_UPCALL config option\n");
1431 			goto cifs_parse_mount_err;
1432 #endif
1433 		ctx->witness = true;
1434 		pr_warn_once("Witness protocol support is experimental\n");
1435 		break;
1436 	case Opt_rootfs:
1437 #ifndef CONFIG_CIFS_ROOT
1438 		cifs_dbg(VFS, "rootfs support requires CONFIG_CIFS_ROOT config option\n");
1439 		goto cifs_parse_mount_err;
1440 #endif
1441 		ctx->rootfs = true;
1442 		break;
1443 	case Opt_posixpaths:
1444 		if (result.negated)
1445 			ctx->posix_paths = 0;
1446 		else
1447 			ctx->posix_paths = 1;
1448 		break;
1449 	case Opt_unix:
1450 		if (result.negated) {
1451 			if (ctx->linux_ext == 1)
1452 				pr_warn_once("conflicting posix mount options specified\n");
1453 			ctx->linux_ext = 0;
1454 			ctx->no_linux_ext = 1;
1455 		} else {
1456 			if (ctx->no_linux_ext == 1)
1457 				pr_warn_once("conflicting posix mount options specified\n");
1458 			ctx->linux_ext = 1;
1459 			ctx->no_linux_ext = 0;
1460 		}
1461 		break;
1462 	case Opt_nocase:
1463 		ctx->nocase = 1;
1464 		break;
1465 	case Opt_brl:
1466 		if (result.negated) {
1467 			/*
1468 			 * turn off mandatory locking in mode
1469 			 * if remote locking is turned off since the
1470 			 * local vfs will do advisory
1471 			 */
1472 			if (ctx->file_mode ==
1473 				(S_IALLUGO & ~(S_ISUID | S_IXGRP)))
1474 				ctx->file_mode = S_IALLUGO;
1475 			ctx->nobrl =  1;
1476 		} else
1477 			ctx->nobrl =  0;
1478 		break;
1479 	case Opt_handlecache:
1480 		if (result.negated)
1481 			ctx->nohandlecache = 1;
1482 		else
1483 			ctx->nohandlecache = 0;
1484 		break;
1485 	case Opt_forcemandatorylock:
1486 		ctx->mand_lock = 1;
1487 		break;
1488 	case Opt_setuids:
1489 		ctx->setuids = result.negated;
1490 		break;
1491 	case Opt_intr:
1492 		ctx->intr = !result.negated;
1493 		break;
1494 	case Opt_setuidfromacl:
1495 		ctx->setuidfromacl = 1;
1496 		break;
1497 	case Opt_strictsync:
1498 		ctx->nostrictsync = result.negated;
1499 		break;
1500 	case Opt_serverino:
1501 		ctx->server_ino = !result.negated;
1502 		break;
1503 	case Opt_rwpidforward:
1504 		ctx->rwpidforward = 1;
1505 		break;
1506 	case Opt_modesid:
1507 		ctx->mode_ace = 1;
1508 		break;
1509 	case Opt_cifsacl:
1510 		ctx->cifs_acl = !result.negated;
1511 		break;
1512 	case Opt_acl:
1513 		ctx->no_psx_acl = result.negated;
1514 		break;
1515 	case Opt_locallease:
1516 		ctx->local_lease = 1;
1517 		break;
1518 	case Opt_sign:
1519 		ctx->sign = true;
1520 		break;
1521 	case Opt_ignore_signature:
1522 		ctx->sign = true;
1523 		ctx->ignore_signature = true;
1524 		break;
1525 	case Opt_seal:
1526 		/* we do not do the following in secFlags because seal
1527 		 * is a per tree connection (mount) not a per socket
1528 		 * or per-smb connection option in the protocol
1529 		 * vol->secFlg |= CIFSSEC_MUST_SEAL;
1530 		 */
1531 		ctx->seal = 1;
1532 		break;
1533 	case Opt_noac:
1534 		pr_warn("Mount option noac not supported. Instead set /proc/fs/cifs/LookupCacheEnabled to 0\n");
1535 		break;
1536 	case Opt_fsc:
1537 #ifndef CONFIG_CIFS_FSCACHE
1538 		cifs_errorf(fc, "FS-Cache support needs CONFIG_CIFS_FSCACHE kernel config option set\n");
1539 		goto cifs_parse_mount_err;
1540 #endif
1541 		ctx->fsc = true;
1542 		break;
1543 	case Opt_mfsymlinks:
1544 		ctx->mfsymlinks = true;
1545 		break;
1546 	case Opt_multiuser:
1547 		ctx->multiuser = true;
1548 		break;
1549 	case Opt_sloppy:
1550 		ctx->sloppy = true;
1551 		break;
1552 	case Opt_nosharesock:
1553 		ctx->nosharesock = true;
1554 		break;
1555 	case Opt_persistent:
1556 		if (result.negated) {
1557 			ctx->nopersistent = true;
1558 			if (ctx->persistent) {
1559 				cifs_errorf(fc, "persistenthandles mount options conflict\n");
1560 				goto cifs_parse_mount_err;
1561 			}
1562 		} else {
1563 			ctx->persistent = true;
1564 			if ((ctx->nopersistent) || (ctx->resilient)) {
1565 				cifs_errorf(fc, "persistenthandles mount options conflict\n");
1566 				goto cifs_parse_mount_err;
1567 			}
1568 		}
1569 		break;
1570 	case Opt_resilient:
1571 		if (result.negated) {
1572 			ctx->resilient = false; /* already the default */
1573 		} else {
1574 			ctx->resilient = true;
1575 			if (ctx->persistent) {
1576 				cifs_errorf(fc, "persistenthandles mount options conflict\n");
1577 				goto cifs_parse_mount_err;
1578 			}
1579 		}
1580 		break;
1581 	case Opt_tcp_nodelay:
1582 		/* tcp nodelay should not usually be needed since we CORK/UNCORK the socket */
1583 		if (result.negated)
1584 			ctx->sockopt_tcp_nodelay = false;
1585 		else
1586 			ctx->sockopt_tcp_nodelay = true;
1587 		break;
1588 	case Opt_domainauto:
1589 		ctx->domainauto = true;
1590 		break;
1591 	case Opt_rdma:
1592 		ctx->rdma = true;
1593 		break;
1594 	}
1595 	/* case Opt_ignore: - is ignored as expected ... */
1596 
1597 	return 0;
1598 
1599  cifs_parse_mount_err:
1600 	kfree_sensitive(ctx->password);
1601 	ctx->password = NULL;
1602 	kfree_sensitive(ctx->password2);
1603 	ctx->password2 = NULL;
1604 	return -EINVAL;
1605 }
1606 
1607 int smb3_init_fs_context(struct fs_context *fc)
1608 {
1609 	struct smb3_fs_context *ctx;
1610 	char *nodename = utsname()->nodename;
1611 	int i;
1612 
1613 	ctx = kzalloc(sizeof(struct smb3_fs_context), GFP_KERNEL);
1614 	if (unlikely(!ctx))
1615 		return -ENOMEM;
1616 
1617 	strscpy(ctx->workstation_name, nodename, sizeof(ctx->workstation_name));
1618 
1619 	/*
1620 	 * does not have to be perfect mapping since field is
1621 	 * informational, only used for servers that do not support
1622 	 * port 445 and it can be overridden at mount time
1623 	 */
1624 	memset(ctx->source_rfc1001_name, 0x20, RFC1001_NAME_LEN);
1625 	for (i = 0; i < strnlen(nodename, RFC1001_NAME_LEN); i++)
1626 		ctx->source_rfc1001_name[i] = toupper(nodename[i]);
1627 
1628 	ctx->source_rfc1001_name[RFC1001_NAME_LEN] = 0;
1629 	/*
1630 	 * null target name indicates to use *SMBSERVR default called name
1631 	 *  if we end up sending RFC1001 session initialize
1632 	 */
1633 	ctx->target_rfc1001_name[0] = 0;
1634 	ctx->cred_uid = current_uid();
1635 	ctx->linux_uid = current_uid();
1636 	ctx->linux_gid = current_gid();
1637 	/* By default 4MB read ahead size, 1MB block size */
1638 	ctx->bsize = CIFS_DEFAULT_IOSIZE; /* can improve cp performance significantly */
1639 	ctx->rasize = 0; /* 0 = use default (ie negotiated rsize) for read ahead pages */
1640 
1641 	/*
1642 	 * default to SFM style remapping of seven reserved characters
1643 	 * unless user overrides it or we negotiate CIFS POSIX where
1644 	 * it is unnecessary.  Can not simultaneously use more than one mapping
1645 	 * since then readdir could list files that open could not open
1646 	 */
1647 	ctx->remap = true;
1648 
1649 	/* default to only allowing write access to owner of the mount */
1650 	ctx->dir_mode = ctx->file_mode = S_IRUGO | S_IXUGO | S_IWUSR;
1651 
1652 	/* ctx->retry default is 0 (i.e. "soft" limited retry not hard retry) */
1653 	/* default is always to request posix paths. */
1654 	ctx->posix_paths = 1;
1655 	/* default to using server inode numbers where available */
1656 	ctx->server_ino = 1;
1657 
1658 	/* default is to use strict cifs caching semantics */
1659 	ctx->strict_io = true;
1660 
1661 	ctx->acregmax = CIFS_DEF_ACTIMEO;
1662 	ctx->acdirmax = CIFS_DEF_ACTIMEO;
1663 	ctx->closetimeo = SMB3_DEF_DCLOSETIMEO;
1664 	ctx->max_cached_dirs = MAX_CACHED_FIDS;
1665 	/* Most clients set timeout to 0, allows server to use its default */
1666 	ctx->handle_timeout = 0; /* See MS-SMB2 spec section 2.2.14.2.12 */
1667 
1668 	/* offer SMB2.1 and later (SMB3 etc). Secure and widely accepted */
1669 	ctx->ops = &smb30_operations;
1670 	ctx->vals = &smbdefault_values;
1671 
1672 	ctx->echo_interval = SMB_ECHO_INTERVAL_DEFAULT;
1673 
1674 	/* default to no multichannel (single server connection) */
1675 	ctx->multichannel = false;
1676 	ctx->max_channels = 1;
1677 
1678 	ctx->backupuid_specified = false; /* no backup intent for a user */
1679 	ctx->backupgid_specified = false; /* no backup intent for a group */
1680 
1681 /*
1682  *	short int override_uid = -1;
1683  *	short int override_gid = -1;
1684  *	char *nodename = strdup(utsname()->nodename);
1685  *	struct sockaddr *dstaddr = (struct sockaddr *)&vol->dstaddr;
1686  */
1687 
1688 	fc->fs_private = ctx;
1689 	fc->ops = &smb3_fs_context_ops;
1690 	return 0;
1691 }
1692 
1693 void
1694 smb3_cleanup_fs_context_contents(struct smb3_fs_context *ctx)
1695 {
1696 	if (ctx == NULL)
1697 		return;
1698 
1699 	/*
1700 	 * Make sure this stays in sync with smb3_fs_context_dup()
1701 	 */
1702 	kfree(ctx->username);
1703 	ctx->username = NULL;
1704 	kfree_sensitive(ctx->password);
1705 	ctx->password = NULL;
1706 	kfree_sensitive(ctx->password2);
1707 	ctx->password2 = NULL;
1708 	kfree(ctx->server_hostname);
1709 	ctx->server_hostname = NULL;
1710 	kfree(ctx->UNC);
1711 	ctx->UNC = NULL;
1712 	kfree(ctx->source);
1713 	ctx->source = NULL;
1714 	kfree(ctx->domainname);
1715 	ctx->domainname = NULL;
1716 	kfree(ctx->nodename);
1717 	ctx->nodename = NULL;
1718 	kfree(ctx->iocharset);
1719 	ctx->iocharset = NULL;
1720 	kfree(ctx->prepath);
1721 	ctx->prepath = NULL;
1722 	kfree(ctx->leaf_fullpath);
1723 	ctx->leaf_fullpath = NULL;
1724 }
1725 
1726 void
1727 smb3_cleanup_fs_context(struct smb3_fs_context *ctx)
1728 {
1729 	if (!ctx)
1730 		return;
1731 	smb3_cleanup_fs_context_contents(ctx);
1732 	kfree(ctx);
1733 }
1734 
1735 void smb3_update_mnt_flags(struct cifs_sb_info *cifs_sb)
1736 {
1737 	struct smb3_fs_context *ctx = cifs_sb->ctx;
1738 
1739 	if (ctx->nodfs)
1740 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_NO_DFS;
1741 	else
1742 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_NO_DFS;
1743 
1744 	if (ctx->noperm)
1745 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_NO_PERM;
1746 	else
1747 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_NO_PERM;
1748 
1749 	if (ctx->setuids)
1750 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_SET_UID;
1751 	else
1752 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_SET_UID;
1753 
1754 	if (ctx->setuidfromacl)
1755 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_UID_FROM_ACL;
1756 	else
1757 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_UID_FROM_ACL;
1758 
1759 	if (ctx->server_ino)
1760 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_SERVER_INUM;
1761 	else
1762 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_SERVER_INUM;
1763 
1764 	if (ctx->remap)
1765 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_MAP_SFM_CHR;
1766 	else
1767 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_MAP_SFM_CHR;
1768 
1769 	if (ctx->sfu_remap)
1770 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_MAP_SPECIAL_CHR;
1771 	else
1772 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_MAP_SPECIAL_CHR;
1773 
1774 	if (ctx->no_xattr)
1775 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_NO_XATTR;
1776 	else
1777 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_NO_XATTR;
1778 
1779 	if (ctx->sfu_emul)
1780 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_UNX_EMUL;
1781 	else
1782 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_UNX_EMUL;
1783 
1784 	if (ctx->nobrl)
1785 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_NO_BRL;
1786 	else
1787 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_NO_BRL;
1788 
1789 	if (ctx->nohandlecache)
1790 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_NO_HANDLE_CACHE;
1791 	else
1792 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_NO_HANDLE_CACHE;
1793 
1794 	if (ctx->nostrictsync)
1795 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_NOSSYNC;
1796 	else
1797 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_NOSSYNC;
1798 
1799 	if (ctx->mand_lock)
1800 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_NOPOSIXBRL;
1801 	else
1802 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_NOPOSIXBRL;
1803 
1804 	if (ctx->rwpidforward)
1805 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_RWPIDFORWARD;
1806 	else
1807 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_RWPIDFORWARD;
1808 
1809 	if (ctx->mode_ace)
1810 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_MODE_FROM_SID;
1811 	else
1812 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_MODE_FROM_SID;
1813 
1814 	if (ctx->cifs_acl)
1815 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_CIFS_ACL;
1816 	else
1817 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_CIFS_ACL;
1818 
1819 	if (ctx->backupuid_specified)
1820 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_CIFS_BACKUPUID;
1821 	else
1822 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_CIFS_BACKUPUID;
1823 
1824 	if (ctx->backupgid_specified)
1825 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_CIFS_BACKUPGID;
1826 	else
1827 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_CIFS_BACKUPGID;
1828 
1829 	if (ctx->override_uid)
1830 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_OVERR_UID;
1831 	else
1832 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_OVERR_UID;
1833 
1834 	if (ctx->override_gid)
1835 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_OVERR_GID;
1836 	else
1837 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_OVERR_GID;
1838 
1839 	if (ctx->dynperm)
1840 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_DYNPERM;
1841 	else
1842 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_DYNPERM;
1843 
1844 	if (ctx->fsc)
1845 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_FSCACHE;
1846 	else
1847 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_FSCACHE;
1848 
1849 	if (ctx->multiuser)
1850 		cifs_sb->mnt_cifs_flags |= (CIFS_MOUNT_MULTIUSER |
1851 					    CIFS_MOUNT_NO_PERM);
1852 	else
1853 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_MULTIUSER;
1854 
1855 
1856 	if (ctx->strict_io)
1857 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_STRICT_IO;
1858 	else
1859 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_STRICT_IO;
1860 
1861 	if (ctx->direct_io)
1862 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_DIRECT_IO;
1863 	else
1864 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_DIRECT_IO;
1865 
1866 	if (ctx->mfsymlinks)
1867 		cifs_sb->mnt_cifs_flags |= CIFS_MOUNT_MF_SYMLINKS;
1868 	else
1869 		cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_MF_SYMLINKS;
1870 	if (ctx->mfsymlinks) {
1871 		if (ctx->sfu_emul) {
1872 			/*
1873 			 * Our SFU ("Services for Unix" emulation does not allow
1874 			 * creating symlinks but does allow reading existing SFU
1875 			 * symlinks (it does allow both creating and reading SFU
1876 			 * style mknod and FIFOs though). When "mfsymlinks" and
1877 			 * "sfu" are both enabled at the same time, it allows
1878 			 * reading both types of symlinks, but will only create
1879 			 * them with mfsymlinks format. This allows better
1880 			 * Apple compatibility (probably better for Samba too)
1881 			 * while still recognizing old Windows style symlinks.
1882 			 */
1883 			cifs_dbg(VFS, "mount options mfsymlinks and sfu both enabled\n");
1884 		}
1885 	}
1886 	cifs_sb->mnt_cifs_flags &= ~CIFS_MOUNT_SHUTDOWN;
1887 
1888 	return;
1889 }
1890