Commit | Line | Data |
---|---|---|
457c8996 | 1 | // SPDX-License-Identifier: GPL-2.0-only |
f7b422b1 DH |
2 | /* |
3 | * linux/fs/nfs/super.c | |
4 | * | |
5 | * Copyright (C) 1992 Rick Sladkey | |
6 | * | |
7 | * nfs superblock handling functions | |
8 | * | |
526719ba | 9 | * Modularised by Alan Cox <alan@lxorguk.ukuu.org.uk>, while hacking some |
f7b422b1 DH |
10 | * experimental NFS changes. Modularisation taken straight from SYS5 fs. |
11 | * | |
12 | * Change to nfs_read_super() to permit NFS mounts to multi-homed hosts. | |
13 | * J.S.Peatfield@damtp.cam.ac.uk | |
14 | * | |
15 | * Split from inode.c by David Howells <dhowells@redhat.com> | |
16 | * | |
54ceac45 DH |
17 | * - superblocks are indexed on server only - all inodes, dentries, etc. associated with a |
18 | * particular server are held in the same superblock | |
19 | * - NFS superblocks can have several effective roots to the dentry tree | |
20 | * - directory type roots are spliced into the tree when a path from one root reaches the root | |
21 | * of another (see nfs_lookup()) | |
f7b422b1 DH |
22 | */ |
23 | ||
f7b422b1 DH |
24 | #include <linux/module.h> |
25 | #include <linux/init.h> | |
26 | ||
27 | #include <linux/time.h> | |
28 | #include <linux/kernel.h> | |
29 | #include <linux/mm.h> | |
30 | #include <linux/string.h> | |
31 | #include <linux/stat.h> | |
32 | #include <linux/errno.h> | |
33 | #include <linux/unistd.h> | |
34 | #include <linux/sunrpc/clnt.h> | |
5976687a | 35 | #include <linux/sunrpc/addr.h> |
f7b422b1 DH |
36 | #include <linux/sunrpc/stats.h> |
37 | #include <linux/sunrpc/metrics.h> | |
0896a725 | 38 | #include <linux/sunrpc/xprtsock.h> |
2cf7ff7a | 39 | #include <linux/sunrpc/xprtrdma.h> |
f7b422b1 DH |
40 | #include <linux/nfs_fs.h> |
41 | #include <linux/nfs_mount.h> | |
42 | #include <linux/nfs4_mount.h> | |
43 | #include <linux/lockd/bind.h> | |
f7b422b1 DH |
44 | #include <linux/seq_file.h> |
45 | #include <linux/mount.h> | |
c02d7adf | 46 | #include <linux/namei.h> |
f7b422b1 DH |
47 | #include <linux/vfs.h> |
48 | #include <linux/inet.h> | |
fd00a8ff | 49 | #include <linux/in6.h> |
5a0e3ad6 | 50 | #include <linux/slab.h> |
fd00a8ff | 51 | #include <net/ipv6.h> |
d8e7748a | 52 | #include <linux/netdevice.h> |
f7b422b1 | 53 | #include <linux/nfs_xdr.h> |
b5d5dfbd | 54 | #include <linux/magic.h> |
bf0fd768 | 55 | #include <linux/parser.h> |
e50a7a1a | 56 | #include <linux/nsproxy.h> |
2446ab60 | 57 | #include <linux/rcupdate.h> |
f7b422b1 | 58 | |
7c0f6ba6 | 59 | #include <linux/uaccess.h> |
f7b422b1 DH |
60 | |
61 | #include "nfs4_fs.h" | |
62 | #include "callback.h" | |
63 | #include "delegation.h" | |
64 | #include "iostat.h" | |
65 | #include "internal.h" | |
08734048 | 66 | #include "fscache.h" |
76e697ba | 67 | #include "nfs4session.h" |
ae50c0b5 | 68 | #include "pnfs.h" |
ab7017a3 | 69 | #include "nfs.h" |
f7b422b1 DH |
70 | |
71 | #define NFSDBG_FACILITY NFSDBG_VFS | |
bf0fd768 | 72 | |
6a74490d | 73 | const struct super_operations nfs_sops = { |
f7b422b1 | 74 | .alloc_inode = nfs_alloc_inode, |
ca1a199e | 75 | .free_inode = nfs_free_inode, |
f7b422b1 | 76 | .write_inode = nfs_write_inode, |
eed99357 | 77 | .drop_inode = nfs_drop_inode, |
f7b422b1 | 78 | .statfs = nfs_statfs, |
b57922d9 | 79 | .evict_inode = nfs_evict_inode, |
f7b422b1 DH |
80 | .umount_begin = nfs_umount_begin, |
81 | .show_options = nfs_show_options, | |
c7f404b4 AV |
82 | .show_devname = nfs_show_devname, |
83 | .show_path = nfs_show_path, | |
f7b422b1 DH |
84 | .show_stats = nfs_show_stats, |
85 | }; | |
ddda8e0a | 86 | EXPORT_SYMBOL_GPL(nfs_sops); |
f7b422b1 | 87 | |
89d77c8f | 88 | #if IS_ENABLED(CONFIG_NFS_V4) |
1ae811ee | 89 | static int __init register_nfs4_fs(void) |
90 | { | |
91 | return register_filesystem(&nfs4_fs_type); | |
92 | } | |
93 | ||
94 | static void unregister_nfs4_fs(void) | |
95 | { | |
96 | unregister_filesystem(&nfs4_fs_type); | |
97 | } | |
98 | #else | |
99 | static int __init register_nfs4_fs(void) | |
100 | { | |
101 | return 0; | |
102 | } | |
103 | ||
104 | static void unregister_nfs4_fs(void) | |
105 | { | |
106 | } | |
f7b422b1 DH |
107 | #endif |
108 | ||
8e1f936b | 109 | static struct shrinker acl_shrinker = { |
1ab6c499 DC |
110 | .count_objects = nfs_access_cache_count, |
111 | .scan_objects = nfs_access_cache_scan, | |
8e1f936b RR |
112 | .seeks = DEFAULT_SEEKS, |
113 | }; | |
979df72e | 114 | |
f7b422b1 DH |
115 | /* |
116 | * Register the NFS filesystems | |
117 | */ | |
118 | int __init register_nfs_fs(void) | |
119 | { | |
120 | int ret; | |
121 | ||
122 | ret = register_filesystem(&nfs_fs_type); | |
123 | if (ret < 0) | |
124 | goto error_0; | |
125 | ||
1ae811ee | 126 | ret = register_nfs4_fs(); |
f7b422b1 DH |
127 | if (ret < 0) |
128 | goto error_1; | |
1ae811ee | 129 | |
130 | ret = nfs_register_sysctl(); | |
131 | if (ret < 0) | |
132 | goto error_2; | |
5ef8d792 KM |
133 | ret = register_shrinker(&acl_shrinker); |
134 | if (ret < 0) | |
135 | goto error_3; | |
f7b422b1 | 136 | return 0; |
5ef8d792 KM |
137 | error_3: |
138 | nfs_unregister_sysctl(); | |
1ae811ee | 139 | error_2: |
140 | unregister_nfs4_fs(); | |
f7b422b1 DH |
141 | error_1: |
142 | unregister_filesystem(&nfs_fs_type); | |
f7b422b1 DH |
143 | error_0: |
144 | return ret; | |
145 | } | |
146 | ||
147 | /* | |
148 | * Unregister the NFS filesystems | |
149 | */ | |
150 | void __exit unregister_nfs_fs(void) | |
151 | { | |
8e1f936b | 152 | unregister_shrinker(&acl_shrinker); |
49af7ee1 | 153 | nfs_unregister_sysctl(); |
1ae811ee | 154 | unregister_nfs4_fs(); |
f7b422b1 DH |
155 | unregister_filesystem(&nfs_fs_type); |
156 | } | |
157 | ||
ea7c38fe | 158 | bool nfs_sb_active(struct super_block *sb) |
ef818a28 | 159 | { |
1daef0a8 | 160 | struct nfs_server *server = NFS_SB(sb); |
ef818a28 | 161 | |
ea7c38fe TM |
162 | if (!atomic_inc_not_zero(&sb->s_active)) |
163 | return false; | |
164 | if (atomic_inc_return(&server->active) != 1) | |
165 | atomic_dec(&sb->s_active); | |
166 | return true; | |
ef818a28 | 167 | } |
89d77c8f | 168 | EXPORT_SYMBOL_GPL(nfs_sb_active); |
ef818a28 | 169 | |
1daef0a8 | 170 | void nfs_sb_deactive(struct super_block *sb) |
ef818a28 SD |
171 | { |
172 | struct nfs_server *server = NFS_SB(sb); | |
1daef0a8 TM |
173 | |
174 | if (atomic_dec_and_test(&server->active)) | |
175 | deactivate_super(sb); | |
ef818a28 | 176 | } |
89d77c8f | 177 | EXPORT_SYMBOL_GPL(nfs_sb_deactive); |
ef818a28 | 178 | |
f7b422b1 DH |
179 | /* |
180 | * Deliver file system statistics to userspace | |
181 | */ | |
fbdefd64 | 182 | int nfs_statfs(struct dentry *dentry, struct kstatfs *buf) |
f7b422b1 | 183 | { |
0c7d90cf | 184 | struct nfs_server *server = NFS_SB(dentry->d_sb); |
f7b422b1 DH |
185 | unsigned char blockbits; |
186 | unsigned long blockres; | |
2b0143b5 | 187 | struct nfs_fh *fh = NFS_FH(d_inode(dentry)); |
ca7e9a0d TM |
188 | struct nfs_fsstat res; |
189 | int error = -ENOMEM; | |
190 | ||
191 | res.fattr = nfs_alloc_fattr(); | |
192 | if (res.fattr == NULL) | |
193 | goto out_err; | |
f7b422b1 | 194 | |
8fa5c000 | 195 | error = server->nfs_client->rpc_ops->statfs(server, fh, &res); |
fbf3fdd2 MZ |
196 | if (unlikely(error == -ESTALE)) { |
197 | struct dentry *pd_dentry; | |
198 | ||
199 | pd_dentry = dget_parent(dentry); | |
1cfb7072 AV |
200 | nfs_zap_caches(d_inode(pd_dentry)); |
201 | dput(pd_dentry); | |
fbf3fdd2 | 202 | } |
ca7e9a0d | 203 | nfs_free_fattr(res.fattr); |
f7b422b1 DH |
204 | if (error < 0) |
205 | goto out_err; | |
ca7e9a0d | 206 | |
1a0ba9ae | 207 | buf->f_type = NFS_SUPER_MAGIC; |
f7b422b1 DH |
208 | |
209 | /* | |
210 | * Current versions of glibc do not correctly handle the | |
211 | * case where f_frsize != f_bsize. Eventually we want to | |
212 | * report the value of wtmult in this field. | |
213 | */ | |
0c7d90cf | 214 | buf->f_frsize = dentry->d_sb->s_blocksize; |
f7b422b1 DH |
215 | |
216 | /* | |
217 | * On most *nix systems, f_blocks, f_bfree, and f_bavail | |
218 | * are reported in units of f_frsize. Linux hasn't had | |
219 | * an f_frsize field in its statfs struct until recently, | |
220 | * thus historically Linux's sys_statfs reports these | |
221 | * fields in units of f_bsize. | |
222 | */ | |
0c7d90cf DH |
223 | buf->f_bsize = dentry->d_sb->s_blocksize; |
224 | blockbits = dentry->d_sb->s_blocksize_bits; | |
f7b422b1 DH |
225 | blockres = (1 << blockbits) - 1; |
226 | buf->f_blocks = (res.tbytes + blockres) >> blockbits; | |
227 | buf->f_bfree = (res.fbytes + blockres) >> blockbits; | |
228 | buf->f_bavail = (res.abytes + blockres) >> blockbits; | |
229 | ||
230 | buf->f_files = res.tfiles; | |
231 | buf->f_ffree = res.afiles; | |
232 | ||
233 | buf->f_namelen = server->namelen; | |
1a0ba9ae | 234 | |
f7b422b1 DH |
235 | return 0; |
236 | ||
237 | out_err: | |
3110ff80 | 238 | dprintk("%s: statfs error = %d\n", __func__, -error); |
1a0ba9ae | 239 | return error; |
f7b422b1 | 240 | } |
89d77c8f | 241 | EXPORT_SYMBOL_GPL(nfs_statfs); |
f7b422b1 | 242 | |
7d4e2747 DH |
243 | /* |
244 | * Map the security flavour number to a name | |
245 | */ | |
81039f1f TM |
246 | static const char *nfs_pseudoflavour_to_name(rpc_authflavor_t flavour) |
247 | { | |
7d4e2747 | 248 | static const struct { |
81039f1f TM |
249 | rpc_authflavor_t flavour; |
250 | const char *str; | |
4d4b69dd WAA |
251 | } sec_flavours[NFS_AUTH_INFO_MAX_FLAVORS] = { |
252 | /* update NFS_AUTH_INFO_MAX_FLAVORS when this list changes! */ | |
81039f1f TM |
253 | { RPC_AUTH_NULL, "null" }, |
254 | { RPC_AUTH_UNIX, "sys" }, | |
255 | { RPC_AUTH_GSS_KRB5, "krb5" }, | |
256 | { RPC_AUTH_GSS_KRB5I, "krb5i" }, | |
257 | { RPC_AUTH_GSS_KRB5P, "krb5p" }, | |
258 | { RPC_AUTH_GSS_LKEY, "lkey" }, | |
259 | { RPC_AUTH_GSS_LKEYI, "lkeyi" }, | |
260 | { RPC_AUTH_GSS_LKEYP, "lkeyp" }, | |
261 | { RPC_AUTH_GSS_SPKM, "spkm" }, | |
262 | { RPC_AUTH_GSS_SPKMI, "spkmi" }, | |
263 | { RPC_AUTH_GSS_SPKMP, "spkmp" }, | |
4d81cd16 | 264 | { UINT_MAX, "unknown" } |
81039f1f TM |
265 | }; |
266 | int i; | |
267 | ||
4d81cd16 | 268 | for (i = 0; sec_flavours[i].flavour != UINT_MAX; i++) { |
81039f1f TM |
269 | if (sec_flavours[i].flavour == flavour) |
270 | break; | |
271 | } | |
272 | return sec_flavours[i].str; | |
273 | } | |
274 | ||
ee671b01 JL |
275 | static void nfs_show_mountd_netid(struct seq_file *m, struct nfs_server *nfss, |
276 | int showdefaults) | |
277 | { | |
278 | struct sockaddr *sap = (struct sockaddr *) &nfss->mountd_address; | |
6f6e3c09 | 279 | char *proto = NULL; |
ee671b01 | 280 | |
ee671b01 JL |
281 | switch (sap->sa_family) { |
282 | case AF_INET: | |
283 | switch (nfss->mountd_protocol) { | |
284 | case IPPROTO_UDP: | |
6f6e3c09 | 285 | proto = RPCBIND_NETID_UDP; |
ee671b01 JL |
286 | break; |
287 | case IPPROTO_TCP: | |
6f6e3c09 | 288 | proto = RPCBIND_NETID_TCP; |
ee671b01 | 289 | break; |
ee671b01 JL |
290 | } |
291 | break; | |
292 | case AF_INET6: | |
293 | switch (nfss->mountd_protocol) { | |
294 | case IPPROTO_UDP: | |
6f6e3c09 | 295 | proto = RPCBIND_NETID_UDP6; |
ee671b01 JL |
296 | break; |
297 | case IPPROTO_TCP: | |
6f6e3c09 | 298 | proto = RPCBIND_NETID_TCP6; |
ee671b01 | 299 | break; |
ee671b01 JL |
300 | } |
301 | break; | |
ee671b01 | 302 | } |
6f6e3c09 N |
303 | if (proto || showdefaults) |
304 | seq_printf(m, ",mountproto=%s", proto ?: "auto"); | |
ee671b01 JL |
305 | } |
306 | ||
82d101d5 CL |
307 | static void nfs_show_mountd_options(struct seq_file *m, struct nfs_server *nfss, |
308 | int showdefaults) | |
309 | { | |
310 | struct sockaddr *sap = (struct sockaddr *)&nfss->mountd_address; | |
311 | ||
d5eff1a3 BS |
312 | if (nfss->flags & NFS_MOUNT_LEGACY_INTERFACE) |
313 | return; | |
314 | ||
82d101d5 CL |
315 | switch (sap->sa_family) { |
316 | case AF_INET: { | |
317 | struct sockaddr_in *sin = (struct sockaddr_in *)sap; | |
be859405 | 318 | seq_printf(m, ",mountaddr=%pI4", &sin->sin_addr.s_addr); |
82d101d5 CL |
319 | break; |
320 | } | |
321 | case AF_INET6: { | |
322 | struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sap; | |
d250e190 | 323 | seq_printf(m, ",mountaddr=%pI6c", &sin6->sin6_addr); |
82d101d5 CL |
324 | break; |
325 | } | |
326 | default: | |
327 | if (showdefaults) | |
1c316e39 | 328 | seq_puts(m, ",mountaddr=unspecified"); |
82d101d5 CL |
329 | } |
330 | ||
331 | if (nfss->mountd_version || showdefaults) | |
332 | seq_printf(m, ",mountvers=%u", nfss->mountd_version); | |
aa699473 SK |
333 | if ((nfss->mountd_port && |
334 | nfss->mountd_port != (unsigned short)NFS_UNSPEC_PORT) || | |
335 | showdefaults) | |
82d101d5 CL |
336 | seq_printf(m, ",mountport=%u", nfss->mountd_port); |
337 | ||
ee671b01 | 338 | nfs_show_mountd_netid(m, nfss, showdefaults); |
82d101d5 CL |
339 | } |
340 | ||
89d77c8f | 341 | #if IS_ENABLED(CONFIG_NFS_V4) |
0be8189f TM |
342 | static void nfs_show_nfsv4_options(struct seq_file *m, struct nfs_server *nfss, |
343 | int showdefaults) | |
344 | { | |
345 | struct nfs_client *clp = nfss->nfs_client; | |
346 | ||
347 | seq_printf(m, ",clientaddr=%s", clp->cl_ipaddr); | |
0be8189f TM |
348 | } |
349 | #else | |
350 | static void nfs_show_nfsv4_options(struct seq_file *m, struct nfs_server *nfss, | |
351 | int showdefaults) | |
352 | { | |
353 | } | |
354 | #endif | |
355 | ||
7bbceb6f TM |
356 | static void nfs_show_nfs_version(struct seq_file *m, |
357 | unsigned int version, | |
358 | unsigned int minorversion) | |
359 | { | |
360 | seq_printf(m, ",vers=%u", version); | |
361 | if (version == 4) | |
362 | seq_printf(m, ".%u", minorversion); | |
363 | } | |
364 | ||
f7b422b1 DH |
365 | /* |
366 | * Describe the mount options in force on this server representation | |
367 | */ | |
82d101d5 CL |
368 | static void nfs_show_mount_options(struct seq_file *m, struct nfs_server *nfss, |
369 | int showdefaults) | |
f7b422b1 | 370 | { |
509de811 | 371 | static const struct proc_nfs_info { |
f7b422b1 | 372 | int flag; |
509de811 DH |
373 | const char *str; |
374 | const char *nostr; | |
f7b422b1 | 375 | } nfs_info[] = { |
91a575e1 TM |
376 | { NFS_MOUNT_SOFT, ",soft", "" }, |
377 | { NFS_MOUNT_SOFTERR, ",softerr", "" }, | |
82d101d5 | 378 | { NFS_MOUNT_POSIX, ",posix", "" }, |
f7b422b1 DH |
379 | { NFS_MOUNT_NOCTO, ",nocto", "" }, |
380 | { NFS_MOUNT_NOAC, ",noac", "" }, | |
381 | { NFS_MOUNT_NONLM, ",nolock", "" }, | |
382 | { NFS_MOUNT_NOACL, ",noacl", "" }, | |
74dd34e6 | 383 | { NFS_MOUNT_NORDIRPLUS, ",nordirplus", "" }, |
d740351b CL |
384 | { NFS_MOUNT_UNSHARED, ",nosharecache", "" }, |
385 | { NFS_MOUNT_NORESVPORT, ",noresvport", "" }, | |
f7b422b1 DH |
386 | { 0, NULL, NULL } |
387 | }; | |
509de811 | 388 | const struct proc_nfs_info *nfs_infop; |
8fa5c000 | 389 | struct nfs_client *clp = nfss->nfs_client; |
82d101d5 | 390 | u32 version = clp->rpc_ops->version; |
7c563cc9 | 391 | int local_flock, local_fcntl; |
f7b422b1 | 392 | |
7bbceb6f | 393 | nfs_show_nfs_version(m, version, clp->cl_minorversion); |
2d767432 CL |
394 | seq_printf(m, ",rsize=%u", nfss->rsize); |
395 | seq_printf(m, ",wsize=%u", nfss->wsize); | |
82d101d5 CL |
396 | if (nfss->bsize != 0) |
397 | seq_printf(m, ",bsize=%u", nfss->bsize); | |
398 | seq_printf(m, ",namlen=%u", nfss->namelen); | |
0e0cab74 | 399 | if (nfss->acregmin != NFS_DEF_ACREGMIN*HZ || showdefaults) |
2d767432 | 400 | seq_printf(m, ",acregmin=%u", nfss->acregmin/HZ); |
0e0cab74 | 401 | if (nfss->acregmax != NFS_DEF_ACREGMAX*HZ || showdefaults) |
2d767432 | 402 | seq_printf(m, ",acregmax=%u", nfss->acregmax/HZ); |
0e0cab74 | 403 | if (nfss->acdirmin != NFS_DEF_ACDIRMIN*HZ || showdefaults) |
2d767432 | 404 | seq_printf(m, ",acdirmin=%u", nfss->acdirmin/HZ); |
0e0cab74 | 405 | if (nfss->acdirmax != NFS_DEF_ACDIRMAX*HZ || showdefaults) |
2d767432 | 406 | seq_printf(m, ",acdirmax=%u", nfss->acdirmax/HZ); |
91a575e1 TM |
407 | if (!(nfss->flags & (NFS_MOUNT_SOFT|NFS_MOUNT_SOFTERR))) |
408 | seq_puts(m, ",hard"); | |
f7b422b1 DH |
409 | for (nfs_infop = nfs_info; nfs_infop->flag; nfs_infop++) { |
410 | if (nfss->flags & nfs_infop->flag) | |
411 | seq_puts(m, nfs_infop->str); | |
412 | else | |
413 | seq_puts(m, nfs_infop->nostr); | |
414 | } | |
2446ab60 | 415 | rcu_read_lock(); |
56928edd | 416 | seq_printf(m, ",proto=%s", |
ee671b01 | 417 | rpc_peeraddr2str(nfss->client, RPC_DISPLAY_NETID)); |
2446ab60 | 418 | rcu_read_unlock(); |
fd87c8b7 TM |
419 | if (clp->cl_nconnect > 0) |
420 | seq_printf(m, ",nconnect=%u", clp->cl_nconnect); | |
82d101d5 CL |
421 | if (version == 4) { |
422 | if (nfss->port != NFS_PORT) | |
423 | seq_printf(m, ",port=%u", nfss->port); | |
424 | } else | |
425 | if (nfss->port) | |
426 | seq_printf(m, ",port=%u", nfss->port); | |
427 | ||
33170233 TM |
428 | seq_printf(m, ",timeo=%lu", 10U * nfss->client->cl_timeout->to_initval / HZ); |
429 | seq_printf(m, ",retrans=%u", nfss->client->cl_timeout->to_retries); | |
81039f1f | 430 | seq_printf(m, ",sec=%s", nfs_pseudoflavour_to_name(nfss->client->cl_auth->au_flavor)); |
82d101d5 CL |
431 | |
432 | if (version != 4) | |
433 | nfs_show_mountd_options(m, nfss, showdefaults); | |
0be8189f TM |
434 | else |
435 | nfs_show_nfsv4_options(m, nfss, showdefaults); | |
82d101d5 | 436 | |
b797cac7 | 437 | if (nfss->options & NFS_OPTION_FSCACHE) |
1c316e39 | 438 | seq_puts(m, ",fsc"); |
9b00c643 | 439 | |
89652617 | 440 | if (nfss->options & NFS_OPTION_MIGRATION) |
1c316e39 | 441 | seq_puts(m, ",migration"); |
89652617 | 442 | |
9b00c643 PL |
443 | if (nfss->flags & NFS_MOUNT_LOOKUP_CACHE_NONEG) { |
444 | if (nfss->flags & NFS_MOUNT_LOOKUP_CACHE_NONE) | |
1c316e39 | 445 | seq_puts(m, ",lookupcache=none"); |
9b00c643 | 446 | else |
1c316e39 | 447 | seq_puts(m, ",lookupcache=pos"); |
9b00c643 | 448 | } |
7c563cc9 SJ |
449 | |
450 | local_flock = nfss->flags & NFS_MOUNT_LOCAL_FLOCK; | |
451 | local_fcntl = nfss->flags & NFS_MOUNT_LOCAL_FCNTL; | |
452 | ||
453 | if (!local_flock && !local_fcntl) | |
1c316e39 | 454 | seq_puts(m, ",local_lock=none"); |
7c563cc9 | 455 | else if (local_flock && local_fcntl) |
1c316e39 | 456 | seq_puts(m, ",local_lock=all"); |
7c563cc9 | 457 | else if (local_flock) |
1c316e39 | 458 | seq_puts(m, ",local_lock=flock"); |
7c563cc9 | 459 | else |
1c316e39 | 460 | seq_puts(m, ",local_lock=posix"); |
f7b422b1 DH |
461 | } |
462 | ||
463 | /* | |
464 | * Describe the mount options on this VFS mountpoint | |
465 | */ | |
fbdefd64 | 466 | int nfs_show_options(struct seq_file *m, struct dentry *root) |
f7b422b1 | 467 | { |
34c80b1d | 468 | struct nfs_server *nfss = NFS_SB(root->d_sb); |
f7b422b1 DH |
469 | |
470 | nfs_show_mount_options(m, nfss, 0); | |
471 | ||
2446ab60 | 472 | rcu_read_lock(); |
5d8515ca CL |
473 | seq_printf(m, ",addr=%s", |
474 | rpc_peeraddr2str(nfss->nfs_client->cl_rpcclient, | |
475 | RPC_DISPLAY_ADDR)); | |
2446ab60 | 476 | rcu_read_unlock(); |
f7b422b1 DH |
477 | |
478 | return 0; | |
479 | } | |
89d77c8f | 480 | EXPORT_SYMBOL_GPL(nfs_show_options); |
45402c38 | 481 | |
89d77c8f | 482 | #if IS_ENABLED(CONFIG_NFS_V4) |
1a7441b2 DW |
483 | static void show_lease(struct seq_file *m, struct nfs_server *server) |
484 | { | |
485 | struct nfs_client *clp = server->nfs_client; | |
486 | unsigned long expire; | |
487 | ||
488 | seq_printf(m, ",lease_time=%ld", clp->cl_lease_time / HZ); | |
489 | expire = clp->cl_last_renewal + clp->cl_lease_time; | |
490 | seq_printf(m, ",lease_expired=%ld", | |
491 | time_after(expire, jiffies) ? 0 : (jiffies - expire) / HZ); | |
492 | } | |
ae50c0b5 | 493 | #ifdef CONFIG_NFS_V4_1 |
45402c38 | 494 | static void show_sessions(struct seq_file *m, struct nfs_server *server) |
ae50c0b5 BF |
495 | { |
496 | if (nfs4_has_session(server->nfs_client)) | |
1c316e39 | 497 | seq_puts(m, ",sessions"); |
ae50c0b5 BF |
498 | } |
499 | #else | |
45402c38 HS |
500 | static void show_sessions(struct seq_file *m, struct nfs_server *server) {} |
501 | #endif | |
ae50c0b5 BF |
502 | #endif |
503 | ||
504 | #ifdef CONFIG_NFS_V4_1 | |
45402c38 | 505 | static void show_pnfs(struct seq_file *m, struct nfs_server *server) |
ae50c0b5 BF |
506 | { |
507 | seq_printf(m, ",pnfs="); | |
508 | if (server->pnfs_curr_ld) | |
509 | seq_printf(m, "%s", server->pnfs_curr_ld->name); | |
510 | else | |
511 | seq_printf(m, "not configured"); | |
512 | } | |
7e03b7cc TM |
513 | |
514 | static void show_implementation_id(struct seq_file *m, struct nfs_server *nfss) | |
515 | { | |
59155546 CL |
516 | if (nfss->nfs_client && nfss->nfs_client->cl_implid) { |
517 | struct nfs41_impl_id *impl_id = nfss->nfs_client->cl_implid; | |
7e03b7cc TM |
518 | seq_printf(m, "\n\timpl_id:\tname='%s',domain='%s'," |
519 | "date='%llu,%u'", | |
520 | impl_id->name, impl_id->domain, | |
521 | impl_id->date.seconds, impl_id->date.nseconds); | |
522 | } | |
523 | } | |
45402c38 | 524 | #else |
89d77c8f | 525 | #if IS_ENABLED(CONFIG_NFS_V4) |
7e03b7cc TM |
526 | static void show_pnfs(struct seq_file *m, struct nfs_server *server) |
527 | { | |
528 | } | |
45402c38 | 529 | #endif |
7e03b7cc TM |
530 | static void show_implementation_id(struct seq_file *m, struct nfs_server *nfss) |
531 | { | |
532 | } | |
45402c38 | 533 | #endif |
f7b422b1 | 534 | |
fbdefd64 | 535 | int nfs_show_devname(struct seq_file *m, struct dentry *root) |
c7f404b4 AV |
536 | { |
537 | char *page = (char *) __get_free_page(GFP_KERNEL); | |
538 | char *devname, *dummy; | |
539 | int err = 0; | |
540 | if (!page) | |
541 | return -ENOMEM; | |
97a54868 | 542 | devname = nfs_path(&dummy, root, page, PAGE_SIZE, 0); |
c7f404b4 AV |
543 | if (IS_ERR(devname)) |
544 | err = PTR_ERR(devname); | |
545 | else | |
546 | seq_escape(m, devname, " \t\n\\"); | |
547 | free_page((unsigned long)page); | |
548 | return err; | |
549 | } | |
89d77c8f | 550 | EXPORT_SYMBOL_GPL(nfs_show_devname); |
c7f404b4 | 551 | |
fbdefd64 | 552 | int nfs_show_path(struct seq_file *m, struct dentry *dentry) |
c7f404b4 AV |
553 | { |
554 | seq_puts(m, "/"); | |
555 | return 0; | |
556 | } | |
89d77c8f | 557 | EXPORT_SYMBOL_GPL(nfs_show_path); |
c7f404b4 | 558 | |
f7b422b1 DH |
559 | /* |
560 | * Present statistical information for this VFS mountpoint | |
561 | */ | |
fbdefd64 | 562 | int nfs_show_stats(struct seq_file *m, struct dentry *root) |
f7b422b1 DH |
563 | { |
564 | int i, cpu; | |
64132379 | 565 | struct nfs_server *nfss = NFS_SB(root->d_sb); |
f7b422b1 DH |
566 | struct rpc_auth *auth = nfss->client->cl_auth; |
567 | struct nfs_iostats totals = { }; | |
568 | ||
569 | seq_printf(m, "statvers=%s", NFS_IOSTAT_VERS); | |
570 | ||
571 | /* | |
572 | * Display all mount option settings | |
573 | */ | |
1c316e39 | 574 | seq_puts(m, "\n\topts:\t"); |
bc98a42c | 575 | seq_puts(m, sb_rdonly(root->d_sb) ? "ro" : "rw"); |
1751e8a6 LT |
576 | seq_puts(m, root->d_sb->s_flags & SB_SYNCHRONOUS ? ",sync" : ""); |
577 | seq_puts(m, root->d_sb->s_flags & SB_NOATIME ? ",noatime" : ""); | |
578 | seq_puts(m, root->d_sb->s_flags & SB_NODIRATIME ? ",nodiratime" : ""); | |
f7b422b1 DH |
579 | nfs_show_mount_options(m, nfss, 1); |
580 | ||
581 | seq_printf(m, "\n\tage:\t%lu", (jiffies - nfss->mount_time) / HZ); | |
582 | ||
7e03b7cc | 583 | show_implementation_id(m, nfss); |
7d2ed9ac | 584 | |
1c316e39 | 585 | seq_puts(m, "\n\tcaps:\t"); |
f7b422b1 | 586 | seq_printf(m, "caps=0x%x", nfss->caps); |
2d767432 CL |
587 | seq_printf(m, ",wtmult=%u", nfss->wtmult); |
588 | seq_printf(m, ",dtsize=%u", nfss->dtsize); | |
589 | seq_printf(m, ",bsize=%u", nfss->bsize); | |
590 | seq_printf(m, ",namlen=%u", nfss->namelen); | |
f7b422b1 | 591 | |
89d77c8f | 592 | #if IS_ENABLED(CONFIG_NFS_V4) |
40c55319 | 593 | if (nfss->nfs_client->rpc_ops->version == 4) { |
1c316e39 | 594 | seq_puts(m, "\n\tnfsv4:\t"); |
f7b422b1 DH |
595 | seq_printf(m, "bm0=0x%x", nfss->attr_bitmask[0]); |
596 | seq_printf(m, ",bm1=0x%x", nfss->attr_bitmask[1]); | |
a09df2ca | 597 | seq_printf(m, ",bm2=0x%x", nfss->attr_bitmask[2]); |
f7b422b1 | 598 | seq_printf(m, ",acl=0x%x", nfss->acl_bitmask); |
ae50c0b5 BF |
599 | show_sessions(m, nfss); |
600 | show_pnfs(m, nfss); | |
1a7441b2 | 601 | show_lease(m, nfss); |
f7b422b1 DH |
602 | } |
603 | #endif | |
604 | ||
605 | /* | |
606 | * Display security flavor in effect for this mount | |
607 | */ | |
2d767432 | 608 | seq_printf(m, "\n\tsec:\tflavor=%u", auth->au_ops->au_flavor); |
f7b422b1 | 609 | if (auth->au_flavor) |
2d767432 | 610 | seq_printf(m, ",pseudoflavor=%u", auth->au_flavor); |
f7b422b1 DH |
611 | |
612 | /* | |
613 | * Display superblock I/O counters | |
614 | */ | |
615 | for_each_possible_cpu(cpu) { | |
616 | struct nfs_iostats *stats; | |
617 | ||
618 | preempt_disable(); | |
619 | stats = per_cpu_ptr(nfss->io_stats, cpu); | |
620 | ||
621 | for (i = 0; i < __NFSIOS_COUNTSMAX; i++) | |
622 | totals.events[i] += stats->events[i]; | |
623 | for (i = 0; i < __NFSIOS_BYTESMAX; i++) | |
624 | totals.bytes[i] += stats->bytes[i]; | |
6a51091d DH |
625 | #ifdef CONFIG_NFS_FSCACHE |
626 | for (i = 0; i < __NFSIOS_FSCACHEMAX; i++) | |
627 | totals.fscache[i] += stats->fscache[i]; | |
628 | #endif | |
f7b422b1 DH |
629 | |
630 | preempt_enable(); | |
631 | } | |
632 | ||
1c316e39 | 633 | seq_puts(m, "\n\tevents:\t"); |
f7b422b1 DH |
634 | for (i = 0; i < __NFSIOS_COUNTSMAX; i++) |
635 | seq_printf(m, "%lu ", totals.events[i]); | |
1c316e39 | 636 | seq_puts(m, "\n\tbytes:\t"); |
f7b422b1 DH |
637 | for (i = 0; i < __NFSIOS_BYTESMAX; i++) |
638 | seq_printf(m, "%Lu ", totals.bytes[i]); | |
6a51091d DH |
639 | #ifdef CONFIG_NFS_FSCACHE |
640 | if (nfss->options & NFS_OPTION_FSCACHE) { | |
1c316e39 | 641 | seq_puts(m, "\n\tfsc:\t"); |
6a51091d | 642 | for (i = 0; i < __NFSIOS_FSCACHEMAX; i++) |
ce85bd29 | 643 | seq_printf(m, "%Lu ", totals.fscache[i]); |
6a51091d DH |
644 | } |
645 | #endif | |
9bcaa35c | 646 | seq_putc(m, '\n'); |
f7b422b1 | 647 | |
016583d7 | 648 | rpc_clnt_show_stats(m, nfss->client); |
f7b422b1 DH |
649 | |
650 | return 0; | |
651 | } | |
89d77c8f | 652 | EXPORT_SYMBOL_GPL(nfs_show_stats); |
f7b422b1 DH |
653 | |
654 | /* | |
655 | * Begin unmount by attempting to remove all automounted mountpoints we added | |
54ceac45 | 656 | * in response to xdev traversals and referrals |
f7b422b1 | 657 | */ |
fbdefd64 | 658 | void nfs_umount_begin(struct super_block *sb) |
f7b422b1 | 659 | { |
67e55205 | 660 | struct nfs_server *server; |
fc6ae3cf TM |
661 | struct rpc_clnt *rpc; |
662 | ||
67e55205 | 663 | server = NFS_SB(sb); |
fc6ae3cf TM |
664 | /* -EIO all pending I/O */ |
665 | rpc = server->client_acl; | |
666 | if (!IS_ERR(rpc)) | |
667 | rpc_killall_tasks(rpc); | |
668 | rpc = server->client; | |
669 | if (!IS_ERR(rpc)) | |
670 | rpc_killall_tasks(rpc); | |
f7b422b1 | 671 | } |
89d77c8f | 672 | EXPORT_SYMBOL_GPL(nfs_umount_begin); |
f7b422b1 | 673 | |
4d4b69dd WAA |
674 | /* |
675 | * Return true if 'match' is in auth_info or auth_info is empty. | |
676 | * Return false otherwise. | |
677 | */ | |
678 | bool nfs_auth_info_match(const struct nfs_auth_info *auth_info, | |
679 | rpc_authflavor_t match) | |
680 | { | |
681 | int i; | |
682 | ||
683 | if (!auth_info->flavor_len) | |
684 | return true; | |
685 | ||
686 | for (i = 0; i < auth_info->flavor_len; i++) { | |
687 | if (auth_info->flavors[i] == match) | |
688 | return true; | |
689 | } | |
690 | return false; | |
691 | } | |
692 | EXPORT_SYMBOL_GPL(nfs_auth_info_match); | |
693 | ||
ec88f28d | 694 | /* |
38465f5d SM |
695 | * Ensure that a specified authtype in ctx->auth_info is supported by |
696 | * the server. Returns 0 and sets ctx->selected_flavor if it's ok, and | |
4d4b69dd | 697 | * -EACCES if not. |
ec88f28d | 698 | */ |
38465f5d | 699 | static int nfs_verify_authflavors(struct nfs_fs_context *ctx, |
5eb005ca DH |
700 | rpc_authflavor_t *server_authlist, |
701 | unsigned int count) | |
ec88f28d | 702 | { |
4d4b69dd | 703 | rpc_authflavor_t flavor = RPC_AUTH_MAXFLAVOR; |
53a75f22 | 704 | bool found_auth_null = false; |
9111c95b | 705 | unsigned int i; |
4580a92d | 706 | |
d497ab97 WAA |
707 | /* |
708 | * If the sec= mount option is used, the specified flavor or AUTH_NULL | |
709 | * must be in the list returned by the server. | |
710 | * | |
711 | * AUTH_NULL has a special meaning when it's in the server list - it | |
712 | * means that the server will ignore the rpc creds, so any flavor | |
e68fd7c8 | 713 | * can be used but still use the sec= that was specified. |
53a75f22 CL |
714 | * |
715 | * Note also that the MNT procedure in MNTv1 does not return a list | |
716 | * of supported security flavors. In this case, nfs_mount() fabricates | |
717 | * a security flavor list containing just AUTH_NULL. | |
d497ab97 | 718 | */ |
4580a92d | 719 | for (i = 0; i < count; i++) { |
4d4b69dd WAA |
720 | flavor = server_authlist[i]; |
721 | ||
38465f5d | 722 | if (nfs_auth_info_match(&ctx->auth_info, flavor)) |
9111c95b | 723 | goto out; |
e68fd7c8 SD |
724 | |
725 | if (flavor == RPC_AUTH_NULL) | |
53a75f22 | 726 | found_auth_null = true; |
e68fd7c8 SD |
727 | } |
728 | ||
53a75f22 | 729 | if (found_auth_null) { |
38465f5d | 730 | flavor = ctx->auth_info.flavors[0]; |
e68fd7c8 | 731 | goto out; |
4580a92d | 732 | } |
ec88f28d | 733 | |
4d4b69dd WAA |
734 | dfprintk(MOUNT, |
735 | "NFS: specified auth flavors not supported by server\n"); | |
9111c95b | 736 | return -EACCES; |
d497ab97 | 737 | |
4580a92d | 738 | out: |
38465f5d SM |
739 | ctx->selected_flavor = flavor; |
740 | dfprintk(MOUNT, "NFS: using auth flavor %u\n", ctx->selected_flavor); | |
d497ab97 | 741 | return 0; |
ec88f28d CL |
742 | } |
743 | ||
0076d7b7 CL |
744 | /* |
745 | * Use the remote server's MOUNT service to request the NFS file handle | |
746 | * corresponding to the provided path. | |
747 | */ | |
38465f5d | 748 | static int nfs_request_mount(struct nfs_fs_context *ctx, |
294ae81d JL |
749 | struct nfs_fh *root_fh, |
750 | rpc_authflavor_t *server_authlist, | |
751 | unsigned int *server_authlist_len) | |
0076d7b7 | 752 | { |
c5d120f8 CL |
753 | struct nfs_mount_request request = { |
754 | .sap = (struct sockaddr *) | |
38465f5d SM |
755 | &ctx->mount_server.address, |
756 | .dirpath = ctx->nfs_server.export_path, | |
757 | .protocol = ctx->mount_server.protocol, | |
c5d120f8 | 758 | .fh = root_fh, |
38465f5d | 759 | .noresvport = ctx->flags & NFS_MOUNT_NORESVPORT, |
294ae81d | 760 | .auth_flav_len = server_authlist_len, |
ec88f28d | 761 | .auth_flavs = server_authlist, |
38465f5d | 762 | .net = ctx->net, |
c5d120f8 | 763 | }; |
4c568017 | 764 | int status; |
0076d7b7 | 765 | |
38465f5d SM |
766 | if (ctx->mount_server.version == 0) { |
767 | switch (ctx->version) { | |
8a6e5deb | 768 | default: |
38465f5d | 769 | ctx->mount_server.version = NFS_MNT3_VERSION; |
8a6e5deb TM |
770 | break; |
771 | case 2: | |
38465f5d | 772 | ctx->mount_server.version = NFS_MNT_VERSION; |
8a6e5deb | 773 | } |
0076d7b7 | 774 | } |
38465f5d | 775 | request.version = ctx->mount_server.version; |
0076d7b7 | 776 | |
38465f5d SM |
777 | if (ctx->mount_server.hostname) |
778 | request.hostname = ctx->mount_server.hostname; | |
33832034 | 779 | else |
38465f5d | 780 | request.hostname = ctx->nfs_server.hostname; |
33832034 | 781 | |
0076d7b7 CL |
782 | /* |
783 | * Construct the mount server's address. | |
784 | */ | |
38465f5d SM |
785 | if (ctx->mount_server.address.sa_family == AF_UNSPEC) { |
786 | memcpy(request.sap, &ctx->nfs_server.address, | |
787 | ctx->nfs_server.addrlen); | |
788 | ctx->mount_server.addrlen = ctx->nfs_server.addrlen; | |
4c568017 | 789 | } |
38465f5d SM |
790 | request.salen = ctx->mount_server.addrlen; |
791 | nfs_set_port(request.sap, &ctx->mount_server.port, 0); | |
0076d7b7 CL |
792 | |
793 | /* | |
794 | * Now ask the mount server to map our export path | |
795 | * to a file handle. | |
796 | */ | |
c5d120f8 | 797 | status = nfs_mount(&request); |
ec88f28d CL |
798 | if (status != 0) { |
799 | dfprintk(MOUNT, "NFS: unable to mount server %s, error %d\n", | |
800 | request.hostname, status); | |
801 | return status; | |
802 | } | |
0076d7b7 | 803 | |
9111c95b | 804 | return 0; |
0076d7b7 CL |
805 | } |
806 | ||
0c38f213 | 807 | static struct nfs_server *nfs_try_mount_request(struct nfs_mount_info *mount_info) |
d17540c6 JL |
808 | { |
809 | int status; | |
9111c95b JL |
810 | unsigned int i; |
811 | bool tried_auth_unix = false; | |
812 | bool auth_null_in_list = false; | |
813 | struct nfs_server *server = ERR_PTR(-EACCES); | |
5eb005ca | 814 | struct nfs_fs_context *ctx = mount_info->ctx; |
294ae81d JL |
815 | rpc_authflavor_t authlist[NFS_MAX_SECFLAVORS]; |
816 | unsigned int authlist_len = ARRAY_SIZE(authlist); | |
0c38f213 | 817 | struct nfs_subversion *nfs_mod = mount_info->nfs_mod; |
d17540c6 | 818 | |
5eb005ca | 819 | status = nfs_request_mount(ctx, mount_info->mntfh, authlist, |
294ae81d | 820 | &authlist_len); |
d17540c6 JL |
821 | if (status) |
822 | return ERR_PTR(status); | |
823 | ||
9111c95b JL |
824 | /* |
825 | * Was a sec= authflavor specified in the options? First, verify | |
826 | * whether the server supports it, and then just try to use it if so. | |
827 | */ | |
5eb005ca DH |
828 | if (ctx->auth_info.flavor_len > 0) { |
829 | status = nfs_verify_authflavors(ctx, authlist, authlist_len); | |
a3f73c27 | 830 | dfprintk(MOUNT, "NFS: using auth flavor %u\n", |
5eb005ca | 831 | ctx->selected_flavor); |
9111c95b JL |
832 | if (status) |
833 | return ERR_PTR(status); | |
0c38f213 | 834 | return nfs_mod->rpc_ops->create_server(mount_info); |
9111c95b JL |
835 | } |
836 | ||
837 | /* | |
838 | * No sec= option was provided. RFC 2623, section 2.7 suggests we | |
839 | * SHOULD prefer the flavor listed first. However, some servers list | |
840 | * AUTH_NULL first. Avoid ever choosing AUTH_NULL. | |
841 | */ | |
842 | for (i = 0; i < authlist_len; ++i) { | |
843 | rpc_authflavor_t flavor; | |
844 | struct rpcsec_gss_info info; | |
845 | ||
846 | flavor = authlist[i]; | |
847 | switch (flavor) { | |
848 | case RPC_AUTH_UNIX: | |
849 | tried_auth_unix = true; | |
850 | break; | |
851 | case RPC_AUTH_NULL: | |
852 | auth_null_in_list = true; | |
853 | continue; | |
854 | default: | |
855 | if (rpcauth_get_gssinfo(flavor, &info) != 0) | |
856 | continue; | |
857 | /* Fallthrough */ | |
858 | } | |
859 | dfprintk(MOUNT, "NFS: attempting to use auth flavor %u\n", flavor); | |
5eb005ca | 860 | ctx->selected_flavor = flavor; |
0c38f213 | 861 | server = nfs_mod->rpc_ops->create_server(mount_info); |
9111c95b JL |
862 | if (!IS_ERR(server)) |
863 | return server; | |
864 | } | |
865 | ||
866 | /* | |
867 | * Nothing we tried so far worked. At this point, give up if we've | |
868 | * already tried AUTH_UNIX or if the server's list doesn't contain | |
869 | * AUTH_NULL | |
870 | */ | |
871 | if (tried_auth_unix || !auth_null_in_list) | |
872 | return server; | |
873 | ||
874 | /* Last chance! Try AUTH_UNIX */ | |
875 | dfprintk(MOUNT, "NFS: attempting to use auth flavor %u\n", RPC_AUTH_UNIX); | |
5eb005ca | 876 | ctx->selected_flavor = RPC_AUTH_UNIX; |
0c38f213 | 877 | return nfs_mod->rpc_ops->create_server(mount_info); |
d17540c6 JL |
878 | } |
879 | ||
f2aedb71 | 880 | int nfs_try_get_tree(struct fs_context *fc) |
486aa699 | 881 | { |
f2aedb71 DH |
882 | struct nfs_fs_context *ctx = nfs_fc2context(fc); |
883 | ||
884 | if (ctx->need_mount) | |
885 | ctx->mount_info.server = nfs_try_mount_request(&ctx->mount_info); | |
d17540c6 | 886 | else |
f2aedb71 | 887 | ctx->mount_info.server = ctx->mount_info.nfs_mod->rpc_ops->create_server(&ctx->mount_info); |
486aa699 | 888 | |
f2aedb71 | 889 | return nfs_get_tree_common(fc); |
486aa699 | 890 | } |
f2aedb71 DH |
891 | EXPORT_SYMBOL_GPL(nfs_try_get_tree); |
892 | ||
486aa699 | 893 | |
71a6ec8a | 894 | #define NFS_REMOUNT_CMP_FLAGMASK ~(NFS_MOUNT_INTR \ |
c8e47028 SM |
895 | | NFS_MOUNT_SECURE \ |
896 | | NFS_MOUNT_TCP \ | |
897 | | NFS_MOUNT_VER3 \ | |
898 | | NFS_MOUNT_KERBEROS \ | |
899 | | NFS_MOUNT_NONLM \ | |
900 | | NFS_MOUNT_BROKEN_SUID \ | |
901 | | NFS_MOUNT_STRICTLOCK \ | |
c8e47028 SM |
902 | | NFS_MOUNT_LEGACY_INTERFACE) |
903 | ||
71a6ec8a SM |
904 | #define NFS_MOUNT_CMP_FLAGMASK (NFS_REMOUNT_CMP_FLAGMASK & \ |
905 | ~(NFS_MOUNT_UNSHARED | NFS_MOUNT_NORESVPORT)) | |
906 | ||
48b605f8 JL |
907 | static int |
908 | nfs_compare_remount_data(struct nfs_server *nfss, | |
5eb005ca | 909 | struct nfs_fs_context *ctx) |
48b605f8 | 910 | { |
5eb005ca DH |
911 | if ((ctx->flags ^ nfss->flags) & NFS_REMOUNT_CMP_FLAGMASK || |
912 | ctx->rsize != nfss->rsize || | |
913 | ctx->wsize != nfss->wsize || | |
914 | ctx->version != nfss->nfs_client->rpc_ops->version || | |
915 | ctx->minorversion != nfss->nfs_client->cl_minorversion || | |
916 | ctx->retrans != nfss->client->cl_timeout->to_retries || | |
917 | !nfs_auth_info_match(&ctx->auth_info, nfss->client->cl_auth->au_flavor) || | |
918 | ctx->acregmin != nfss->acregmin / HZ || | |
919 | ctx->acregmax != nfss->acregmax / HZ || | |
920 | ctx->acdirmin != nfss->acdirmin / HZ || | |
921 | ctx->acdirmax != nfss->acdirmax / HZ || | |
922 | ctx->timeo != (10U * nfss->client->cl_timeout->to_initval / HZ) || | |
923 | (ctx->options & NFS_OPTION_FSCACHE) != (nfss->options & NFS_OPTION_FSCACHE) || | |
924 | ctx->nfs_server.port != nfss->port || | |
925 | ctx->nfs_server.addrlen != nfss->nfs_client->cl_addrlen || | |
926 | !rpc_cmp_addr((struct sockaddr *)&ctx->nfs_server.address, | |
a1be9eee | 927 | (struct sockaddr *)&nfss->nfs_client->cl_addr)) |
48b605f8 JL |
928 | return -EINVAL; |
929 | ||
930 | return 0; | |
931 | } | |
932 | ||
f2aedb71 | 933 | int nfs_reconfigure(struct fs_context *fc) |
48b605f8 | 934 | { |
f2aedb71 DH |
935 | struct nfs_fs_context *ctx = nfs_fc2context(fc); |
936 | struct super_block *sb = fc->root->d_sb; | |
48b605f8 | 937 | struct nfs_server *nfss = sb->s_fs_info; |
48b605f8 | 938 | |
02b9984d TT |
939 | sync_filesystem(sb); |
940 | ||
48b605f8 JL |
941 | /* |
942 | * Userspace mount programs that send binary options generally send | |
943 | * them populated with default values. We have no way to know which | |
944 | * ones were explicitly specified. Fall back to legacy behavior and | |
945 | * just return success. | |
946 | */ | |
f2aedb71 | 947 | if (ctx->skip_reconfig_option_check) |
48b605f8 JL |
948 | return 0; |
949 | ||
26c4c170 JL |
950 | /* |
951 | * noac is a special case. It implies -o sync, but that's not | |
f2aedb71 | 952 | * necessarily reflected in the mtab options. reconfigure_super |
1751e8a6 | 953 | * will clear SB_SYNCHRONOUS if -o sync wasn't specified in the |
26c4c170 JL |
954 | * remount options, so we have to explicitly reset it. |
955 | */ | |
f2aedb71 DH |
956 | if (ctx->flags & NFS_MOUNT_NOAC) { |
957 | fc->sb_flags |= SB_SYNCHRONOUS; | |
958 | fc->sb_flags_mask |= SB_SYNCHRONOUS; | |
959 | } | |
26c4c170 | 960 | |
48b605f8 | 961 | /* compare new mount options with old ones */ |
f2aedb71 | 962 | return nfs_compare_remount_data(nfss, ctx); |
48b605f8 | 963 | } |
f2aedb71 | 964 | EXPORT_SYMBOL_GPL(nfs_reconfigure); |
48b605f8 | 965 | |
f7b422b1 | 966 | /* |
ab88dca3 | 967 | * Finish setting up an NFS superblock |
f7b422b1 | 968 | */ |
ab88dca3 | 969 | static void nfs_fill_super(struct super_block *sb, struct nfs_mount_info *mount_info) |
f7b422b1 | 970 | { |
5eb005ca | 971 | struct nfs_fs_context *ctx = mount_info->ctx; |
f7b422b1 | 972 | struct nfs_server *server = NFS_SB(sb); |
5006a76c | 973 | |
54ceac45 DH |
974 | sb->s_blocksize_bits = 0; |
975 | sb->s_blocksize = 0; | |
6a74490d BS |
976 | sb->s_xattr = server->nfs_client->cl_nfs_mod->xattr; |
977 | sb->s_op = server->nfs_client->cl_nfs_mod->sops; | |
5eb005ca DH |
978 | if (ctx && ctx->bsize) |
979 | sb->s_blocksize = nfs_block_size(ctx->bsize, &sb->s_blocksize_bits); | |
f7b422b1 | 980 | |
6a74490d | 981 | if (server->nfs_client->rpc_ops->version != 2) { |
54ceac45 DH |
982 | /* The VFS shouldn't apply the umask to mode bits. We will do |
983 | * so ourselves when necessary. | |
984 | */ | |
1751e8a6 | 985 | sb->s_flags |= SB_POSIXACL; |
54ceac45 | 986 | sb->s_time_gran = 1; |
20fa1902 | 987 | sb->s_export_op = &nfs_export_ops; |
1fcb79c1 DD |
988 | } else |
989 | sb->s_time_gran = 1000; | |
990 | ||
991 | if (server->nfs_client->rpc_ops->version != 4) { | |
992 | sb->s_time_min = 0; | |
993 | sb->s_time_max = U32_MAX; | |
994 | } else { | |
995 | sb->s_time_min = S64_MIN; | |
996 | sb->s_time_max = S64_MAX; | |
816724e6 | 997 | } |
54ceac45 | 998 | |
ab88dca3 | 999 | sb->s_magic = NFS_SUPER_MAGIC; |
f7b422b1 | 1000 | |
ab88dca3 AV |
1001 | /* We probably want something more informative here */ |
1002 | snprintf(sb->s_id, sizeof(sb->s_id), | |
1003 | "%u:%u", MAJOR(sb->s_dev), MINOR(sb->s_dev)); | |
1fcb79c1 | 1004 | |
ab88dca3 AV |
1005 | if (sb->s_blocksize == 0) |
1006 | sb->s_blocksize = nfs_block_bits(server->wsize, | |
1007 | &sb->s_blocksize_bits); | |
f7b422b1 | 1008 | |
ab88dca3 | 1009 | nfs_super_set_maxbytes(sb, server->maxfilesize); |
f7b422b1 DH |
1010 | } |
1011 | ||
275a5d24 TM |
1012 | static int nfs_compare_mount_options(const struct super_block *s, const struct nfs_server *b, int flags) |
1013 | { | |
1014 | const struct nfs_server *a = s->s_fs_info; | |
1015 | const struct rpc_clnt *clnt_a = a->client; | |
1016 | const struct rpc_clnt *clnt_b = b->client; | |
1017 | ||
1018 | if ((s->s_flags & NFS_MS_MASK) != (flags & NFS_MS_MASK)) | |
1019 | goto Ebusy; | |
1020 | if (a->nfs_client != b->nfs_client) | |
1021 | goto Ebusy; | |
0aea92bf | 1022 | if ((a->flags ^ b->flags) & NFS_MOUNT_CMP_FLAGMASK) |
275a5d24 TM |
1023 | goto Ebusy; |
1024 | if (a->wsize != b->wsize) | |
1025 | goto Ebusy; | |
1026 | if (a->rsize != b->rsize) | |
1027 | goto Ebusy; | |
1028 | if (a->acregmin != b->acregmin) | |
1029 | goto Ebusy; | |
1030 | if (a->acregmax != b->acregmax) | |
1031 | goto Ebusy; | |
1032 | if (a->acdirmin != b->acdirmin) | |
1033 | goto Ebusy; | |
1034 | if (a->acdirmax != b->acdirmax) | |
1035 | goto Ebusy; | |
594d1644 | 1036 | if (clnt_a->cl_auth->au_flavor != clnt_b->cl_auth->au_flavor) |
275a5d24 | 1037 | goto Ebusy; |
e89a5a43 | 1038 | return 1; |
275a5d24 | 1039 | Ebusy: |
e89a5a43 TM |
1040 | return 0; |
1041 | } | |
1042 | ||
f2aedb71 | 1043 | static int nfs_set_super(struct super_block *s, struct fs_context *fc) |
e89a5a43 | 1044 | { |
f2aedb71 | 1045 | struct nfs_server *server = fc->s_fs_info; |
e89a5a43 TM |
1046 | int ret; |
1047 | ||
8b244ff2 | 1048 | s->s_d_op = server->nfs_client->rpc_ops->dentry_ops; |
e89a5a43 TM |
1049 | ret = set_anon_super(s, server); |
1050 | if (ret == 0) | |
1051 | server->s_dev = s->s_dev; | |
1052 | return ret; | |
1053 | } | |
1054 | ||
fd00a8ff CL |
1055 | static int nfs_compare_super_address(struct nfs_server *server1, |
1056 | struct nfs_server *server2) | |
1057 | { | |
1058 | struct sockaddr *sap1, *sap2; | |
7e3fcf61 BF |
1059 | struct rpc_xprt *xprt1 = server1->client->cl_xprt; |
1060 | struct rpc_xprt *xprt2 = server2->client->cl_xprt; | |
1061 | ||
1062 | if (!net_eq(xprt1->xprt_net, xprt2->xprt_net)) | |
1063 | return 0; | |
fd00a8ff CL |
1064 | |
1065 | sap1 = (struct sockaddr *)&server1->nfs_client->cl_addr; | |
1066 | sap2 = (struct sockaddr *)&server2->nfs_client->cl_addr; | |
1067 | ||
1068 | if (sap1->sa_family != sap2->sa_family) | |
1069 | return 0; | |
1070 | ||
1071 | switch (sap1->sa_family) { | |
1072 | case AF_INET: { | |
1073 | struct sockaddr_in *sin1 = (struct sockaddr_in *)sap1; | |
1074 | struct sockaddr_in *sin2 = (struct sockaddr_in *)sap2; | |
1075 | if (sin1->sin_addr.s_addr != sin2->sin_addr.s_addr) | |
1076 | return 0; | |
1077 | if (sin1->sin_port != sin2->sin_port) | |
1078 | return 0; | |
1079 | break; | |
1080 | } | |
1081 | case AF_INET6: { | |
1082 | struct sockaddr_in6 *sin1 = (struct sockaddr_in6 *)sap1; | |
1083 | struct sockaddr_in6 *sin2 = (struct sockaddr_in6 *)sap2; | |
1084 | if (!ipv6_addr_equal(&sin1->sin6_addr, &sin2->sin6_addr)) | |
1085 | return 0; | |
1086 | if (sin1->sin6_port != sin2->sin6_port) | |
1087 | return 0; | |
1088 | break; | |
1089 | } | |
1090 | default: | |
1091 | return 0; | |
1092 | } | |
1093 | ||
1094 | return 1; | |
1095 | } | |
1096 | ||
3b7eb5e3 TM |
1097 | static int nfs_compare_userns(const struct nfs_server *old, |
1098 | const struct nfs_server *new) | |
1099 | { | |
1100 | const struct user_namespace *oldns = &init_user_ns; | |
1101 | const struct user_namespace *newns = &init_user_ns; | |
1102 | ||
1103 | if (old->client && old->client->cl_cred) | |
1104 | oldns = old->client->cl_cred->user_ns; | |
1105 | if (new->client && new->client->cl_cred) | |
1106 | newns = new->client->cl_cred->user_ns; | |
1107 | if (oldns != newns) | |
1108 | return 0; | |
1109 | return 1; | |
1110 | } | |
1111 | ||
f2aedb71 | 1112 | static int nfs_compare_super(struct super_block *sb, struct fs_context *fc) |
e89a5a43 | 1113 | { |
f2aedb71 | 1114 | struct nfs_server *server = fc->s_fs_info, *old = NFS_SB(sb); |
e89a5a43 | 1115 | |
fd00a8ff | 1116 | if (!nfs_compare_super_address(old, server)) |
e89a5a43 TM |
1117 | return 0; |
1118 | /* Note: NFS_MOUNT_UNSHARED == NFS4_MOUNT_UNSHARED */ | |
1119 | if (old->flags & NFS_MOUNT_UNSHARED) | |
1120 | return 0; | |
1121 | if (memcmp(&old->fsid, &server->fsid, sizeof(old->fsid)) != 0) | |
1122 | return 0; | |
3b7eb5e3 TM |
1123 | if (!nfs_compare_userns(old, server)) |
1124 | return 0; | |
f2aedb71 | 1125 | return nfs_compare_mount_options(sb, server, fc->sb_flags); |
275a5d24 TM |
1126 | } |
1127 | ||
39ffb921 | 1128 | #ifdef CONFIG_NFS_FSCACHE |
2311b943 | 1129 | static void nfs_get_cache_cookie(struct super_block *sb, |
f2aedb71 | 1130 | struct nfs_fs_context *ctx) |
2311b943 | 1131 | { |
c4271c6e | 1132 | struct nfs_server *nfss = NFS_SB(sb); |
2311b943 BS |
1133 | char *uniq = NULL; |
1134 | int ulen = 0; | |
1135 | ||
c4271c6e TM |
1136 | nfss->fscache_key = NULL; |
1137 | nfss->fscache = NULL; | |
1138 | ||
f2aedb71 DH |
1139 | if (!ctx) |
1140 | return; | |
1141 | ||
1142 | if (ctx->clone_data.sb) { | |
1143 | struct nfs_server *mnt_s = NFS_SB(ctx->clone_data.sb); | |
c4271c6e TM |
1144 | if (!(mnt_s->options & NFS_OPTION_FSCACHE)) |
1145 | return; | |
2311b943 BS |
1146 | if (mnt_s->fscache_key) { |
1147 | uniq = mnt_s->fscache_key->key.uniquifier; | |
1148 | ulen = mnt_s->fscache_key->key.uniq_len; | |
9c91fa36 | 1149 | } |
f2aedb71 DH |
1150 | } else { |
1151 | if (!(ctx->options & NFS_OPTION_FSCACHE)) | |
1152 | return; | |
1153 | if (ctx->fscache_uniq) { | |
1154 | uniq = ctx->fscache_uniq; | |
1155 | ulen = strlen(ctx->fscache_uniq); | |
1156 | } | |
c4271c6e | 1157 | return; |
f2aedb71 | 1158 | } |
2311b943 BS |
1159 | |
1160 | nfs_fscache_get_super_cookie(sb, uniq, ulen); | |
1161 | } | |
39ffb921 TM |
1162 | #else |
1163 | static void nfs_get_cache_cookie(struct super_block *sb, | |
f2aedb71 | 1164 | struct nfs_fs_context *ctx) |
39ffb921 TM |
1165 | { |
1166 | } | |
1167 | #endif | |
2311b943 | 1168 | |
c128e575 TM |
1169 | static void nfs_set_readahead(struct backing_dev_info *bdi, |
1170 | unsigned long iomax_pages) | |
1171 | { | |
1172 | bdi->ra_pages = VM_READAHEAD_PAGES; | |
1173 | bdi->io_pages = iomax_pages; | |
1174 | } | |
1175 | ||
f2aedb71 | 1176 | int nfs_get_tree_common(struct fs_context *fc) |
f7b422b1 | 1177 | { |
f2aedb71 | 1178 | struct nfs_fs_context *ctx = nfs_fc2context(fc); |
f7b422b1 | 1179 | struct super_block *s; |
01194981 | 1180 | struct dentry *mntroot = ERR_PTR(-ENOMEM); |
f2aedb71 DH |
1181 | int (*compare_super)(struct super_block *, struct fs_context *) = nfs_compare_super; |
1182 | struct nfs_server *server = ctx->mount_info.server; | |
adf2314f | 1183 | unsigned long kflags = 0, kflags_out = 0; |
01194981 | 1184 | int error; |
33852a1f | 1185 | |
f2aedb71 | 1186 | ctx->mount_info.server = NULL; |
444a5296 | 1187 | if (IS_ERR(server)) |
f2aedb71 | 1188 | return PTR_ERR(server); |
444a5296 | 1189 | |
75180df2 TM |
1190 | if (server->flags & NFS_MOUNT_UNSHARED) |
1191 | compare_super = NULL; | |
1192 | ||
fb2088cc SP |
1193 | /* -o noac implies -o sync */ |
1194 | if (server->flags & NFS_MOUNT_NOAC) | |
f2aedb71 DH |
1195 | fc->sb_flags |= SB_SYNCHRONOUS; |
1196 | ||
1197 | if (ctx->clone_data.sb) | |
1198 | if (ctx->clone_data.sb->s_flags & SB_SYNCHRONOUS) | |
1199 | fc->sb_flags |= SB_SYNCHRONOUS; | |
fb2088cc | 1200 | |
f2aedb71 DH |
1201 | if (server->caps & NFS_CAP_SECURITY_LABEL) |
1202 | fc->lsm_flags |= SECURITY_LSM_NATIVE_LABELS; | |
e890db01 | 1203 | |
54ceac45 | 1204 | /* Get a superblock - note that we may end up sharing one that already exists */ |
f2aedb71 DH |
1205 | fc->s_fs_info = server; |
1206 | s = sget_fc(fc, compare_super, nfs_set_super); | |
1207 | fc->s_fs_info = NULL; | |
816724e6 | 1208 | if (IS_ERR(s)) { |
f2aedb71 DH |
1209 | error = PTR_ERR(s); |
1210 | dfprintk(MOUNT, "NFS: Couldn't get superblock\n"); | |
54ceac45 | 1211 | goto out_err_nosb; |
816724e6 TM |
1212 | } |
1213 | ||
54ceac45 DH |
1214 | if (s->s_fs_info != server) { |
1215 | nfs_free_server(server); | |
1216 | server = NULL; | |
fa799759 | 1217 | } else { |
9052c7cf JK |
1218 | error = super_setup_bdi_name(s, "%u:%u", MAJOR(server->s_dev), |
1219 | MINOR(server->s_dev)); | |
f2aedb71 | 1220 | if (error) |
9052c7cf | 1221 | goto error_splat_super; |
c128e575 | 1222 | nfs_set_readahead(s->s_bdi, server->rpages); |
ce6cda18 | 1223 | server->super = s; |
54ceac45 | 1224 | } |
f7b422b1 | 1225 | |
54ceac45 | 1226 | if (!s->s_root) { |
f2aedb71 | 1227 | unsigned bsize = ctx->mount_info.inherited_bsize; |
54ceac45 | 1228 | /* initial superblock/root creation */ |
f2aedb71 | 1229 | nfs_fill_super(s, &ctx->mount_info); |
ab88dca3 AV |
1230 | if (bsize) { |
1231 | s->s_blocksize_bits = bsize; | |
1232 | s->s_blocksize = 1U << bsize; | |
1233 | } | |
f2aedb71 | 1234 | nfs_get_cache_cookie(s, ctx); |
54ceac45 | 1235 | } |
f7b422b1 | 1236 | |
f2aedb71 DH |
1237 | mntroot = nfs_get_root(s, ctx->mount_info.mntfh, fc->source); |
1238 | if (IS_ERR(mntroot)) { | |
1239 | error = PTR_ERR(mntroot); | |
1240 | dfprintk(MOUNT, "NFS: Couldn't get root dentry\n"); | |
54ceac45 | 1241 | goto error_splat_super; |
f2aedb71 DH |
1242 | } |
1243 | fc->root = mntroot; | |
adf2314f AV |
1244 | |
1245 | if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL) | |
1246 | kflags |= SECURITY_LSM_NATIVE_LABELS; | |
f2aedb71 DH |
1247 | if (ctx->clone_data.sb) { |
1248 | if (d_inode(fc->root)->i_fop != &nfs_dir_operations) { | |
adf2314f AV |
1249 | error = -ESTALE; |
1250 | goto error_splat_root; | |
1251 | } | |
1252 | /* clone any lsm security options from the parent to the new sb */ | |
f2aedb71 | 1253 | error = security_sb_clone_mnt_opts(ctx->clone_data.sb, s, kflags, |
adf2314f AV |
1254 | &kflags_out); |
1255 | } else { | |
f2aedb71 | 1256 | error = security_sb_set_mnt_opts(s, fc->security, |
adf2314f AV |
1257 | kflags, &kflags_out); |
1258 | } | |
1259 | if (error) | |
1260 | goto error_splat_root; | |
1261 | if (NFS_SB(s)->caps & NFS_CAP_SECURITY_LABEL && | |
1262 | !(kflags_out & SECURITY_LSM_NATIVE_LABELS)) | |
1263 | NFS_SB(s)->caps &= ~NFS_CAP_SECURITY_LABEL; | |
f9c3a380 | 1264 | |
1751e8a6 | 1265 | s->s_flags |= SB_ACTIVE; |
f2aedb71 | 1266 | error = 0; |
0655960f CL |
1267 | |
1268 | out: | |
f2aedb71 | 1269 | return error; |
816724e6 | 1270 | |
54ceac45 DH |
1271 | out_err_nosb: |
1272 | nfs_free_server(server); | |
0655960f | 1273 | goto out; |
54ceac45 | 1274 | |
f9c3a380 | 1275 | error_splat_root: |
f2aedb71 DH |
1276 | dput(fc->root); |
1277 | fc->root = NULL; | |
54ceac45 | 1278 | error_splat_super: |
6f5bbff9 | 1279 | deactivate_locked_super(s); |
0655960f | 1280 | goto out; |
f7b422b1 DH |
1281 | } |
1282 | ||
54ceac45 DH |
1283 | /* |
1284 | * Destroy an NFS2/3 superblock | |
1285 | */ | |
fbdefd64 | 1286 | void nfs_kill_super(struct super_block *s) |
f7b422b1 DH |
1287 | { |
1288 | struct nfs_server *server = NFS_SB(s); | |
7b14a213 CH |
1289 | dev_t dev = s->s_dev; |
1290 | ||
1291 | generic_shutdown_super(s); | |
f7b422b1 | 1292 | |
08734048 | 1293 | nfs_fscache_release_super_cookie(s); |
7b14a213 | 1294 | |
54ceac45 | 1295 | nfs_free_server(server); |
7b14a213 | 1296 | free_anon_bdev(dev); |
f7b422b1 | 1297 | } |
89d77c8f | 1298 | EXPORT_SYMBOL_GPL(nfs_kill_super); |
f7b422b1 | 1299 | |
89d77c8f | 1300 | #if IS_ENABLED(CONFIG_NFS_V4) |
54ceac45 | 1301 | |
fac1e8e4 BS |
1302 | /* |
1303 | * NFS v4 module parameters need to stay in the | |
1304 | * NFS client for backwards compatibility | |
1305 | */ | |
1306 | unsigned int nfs_callback_set_tcpport; | |
5405fc44 | 1307 | unsigned short nfs_callback_nr_threads; |
fac1e8e4 BS |
1308 | /* Default cache timeout is 10 minutes */ |
1309 | unsigned int nfs_idmap_cache_timeout = 600; | |
1310 | /* Turn off NFSv4 uid/gid mapping when using AUTH_SYS */ | |
1311 | bool nfs4_disable_idmapping = true; | |
1312 | unsigned short max_session_slots = NFS4_DEF_SLOT_TABLE_SIZE; | |
5405fc44 | 1313 | unsigned short max_session_cb_slots = NFS4_DEF_CB_SLOT_TABLE_SIZE; |
fac1e8e4 | 1314 | unsigned short send_implementation_id = 1; |
6f2ea7f2 | 1315 | char nfs4_client_id_uniquifier[NFS4_CLIENT_ID_UNIQ_LEN] = ""; |
f6de7a39 | 1316 | bool recover_lost_locks = false; |
fac1e8e4 | 1317 | |
5405fc44 | 1318 | EXPORT_SYMBOL_GPL(nfs_callback_nr_threads); |
89d77c8f | 1319 | EXPORT_SYMBOL_GPL(nfs_callback_set_tcpport); |
89d77c8f BS |
1320 | EXPORT_SYMBOL_GPL(nfs_idmap_cache_timeout); |
1321 | EXPORT_SYMBOL_GPL(nfs4_disable_idmapping); | |
1322 | EXPORT_SYMBOL_GPL(max_session_slots); | |
5405fc44 | 1323 | EXPORT_SYMBOL_GPL(max_session_cb_slots); |
89d77c8f | 1324 | EXPORT_SYMBOL_GPL(send_implementation_id); |
6f2ea7f2 | 1325 | EXPORT_SYMBOL_GPL(nfs4_client_id_uniquifier); |
f6de7a39 | 1326 | EXPORT_SYMBOL_GPL(recover_lost_locks); |
89d77c8f | 1327 | |
fac1e8e4 BS |
1328 | #define NFS_CALLBACK_MAXPORTNR (65535U) |
1329 | ||
1330 | static int param_set_portnr(const char *val, const struct kernel_param *kp) | |
1331 | { | |
1332 | unsigned long num; | |
1333 | int ret; | |
1334 | ||
1335 | if (!val) | |
1336 | return -EINVAL; | |
7297cb68 | 1337 | ret = kstrtoul(val, 0, &num); |
379ebf07 | 1338 | if (ret || num > NFS_CALLBACK_MAXPORTNR) |
fac1e8e4 BS |
1339 | return -EINVAL; |
1340 | *((unsigned int *)kp->arg) = num; | |
1341 | return 0; | |
1342 | } | |
9c27847d | 1343 | static const struct kernel_param_ops param_ops_portnr = { |
fac1e8e4 BS |
1344 | .set = param_set_portnr, |
1345 | .get = param_get_uint, | |
1346 | }; | |
1347 | #define param_check_portnr(name, p) __param_check(name, p, unsigned int); | |
1348 | ||
1349 | module_param_named(callback_tcpport, nfs_callback_set_tcpport, portnr, 0644); | |
5405fc44 TM |
1350 | module_param_named(callback_nr_threads, nfs_callback_nr_threads, ushort, 0644); |
1351 | MODULE_PARM_DESC(callback_nr_threads, "Number of threads that will be " | |
1352 | "assigned to the NFSv4 callback channels."); | |
fac1e8e4 BS |
1353 | module_param(nfs_idmap_cache_timeout, int, 0644); |
1354 | module_param(nfs4_disable_idmapping, bool, 0644); | |
6f2ea7f2 CL |
1355 | module_param_string(nfs4_unique_id, nfs4_client_id_uniquifier, |
1356 | NFS4_CLIENT_ID_UNIQ_LEN, 0600); | |
fac1e8e4 BS |
1357 | MODULE_PARM_DESC(nfs4_disable_idmapping, |
1358 | "Turn off NFSv4 idmapping when using 'sec=sys'"); | |
1359 | module_param(max_session_slots, ushort, 0644); | |
1360 | MODULE_PARM_DESC(max_session_slots, "Maximum number of outstanding NFSv4.1 " | |
1361 | "requests the client will negotiate"); | |
5405fc44 | 1362 | module_param(max_session_cb_slots, ushort, 0644); |
f36ab161 | 1363 | MODULE_PARM_DESC(max_session_cb_slots, "Maximum number of parallel NFSv4.1 " |
5405fc44 | 1364 | "callbacks the client will process for a given server"); |
fac1e8e4 BS |
1365 | module_param(send_implementation_id, ushort, 0644); |
1366 | MODULE_PARM_DESC(send_implementation_id, | |
1367 | "Send implementation ID with NFSv4.1 exchange_id"); | |
6f2ea7f2 | 1368 | MODULE_PARM_DESC(nfs4_unique_id, "nfs_client_id4 uniquifier string"); |
425e776d | 1369 | |
f6de7a39 TM |
1370 | module_param(recover_lost_locks, bool, 0644); |
1371 | MODULE_PARM_DESC(recover_lost_locks, | |
1372 | "If the server reports that a lock might be lost, " | |
1373 | "try to recover it risking data corruption."); | |
1374 | ||
1375 | ||
54ceac45 | 1376 | #endif /* CONFIG_NFS_V4 */ |