nfs_export.c revision 1.37 1 1.37 ad /* $NetBSD: nfs_export.c,v 1.37 2008/05/06 18:43:44 ad Exp $ */
2 1.1 jmmv
3 1.1 jmmv /*-
4 1.36 ad * Copyright (c) 1997, 1998, 2004, 2005, 2008 The NetBSD Foundation, Inc.
5 1.1 jmmv * All rights reserved.
6 1.1 jmmv *
7 1.1 jmmv * This code is derived from software contributed to The NetBSD Foundation
8 1.1 jmmv * by Jason R. Thorpe of the Numerical Aerospace Simulation Facility,
9 1.1 jmmv * NASA Ames Research Center.
10 1.1 jmmv * This code is derived from software contributed to The NetBSD Foundation
11 1.1 jmmv * by Charles M. Hannum.
12 1.1 jmmv * This code is derived from software contributed to The NetBSD Foundation
13 1.1 jmmv * by Julio M. Merino Vidal.
14 1.1 jmmv *
15 1.1 jmmv * Redistribution and use in source and binary forms, with or without
16 1.1 jmmv * modification, are permitted provided that the following conditions
17 1.1 jmmv * are met:
18 1.1 jmmv * 1. Redistributions of source code must retain the above copyright
19 1.1 jmmv * notice, this list of conditions and the following disclaimer.
20 1.1 jmmv * 2. Redistributions in binary form must reproduce the above copyright
21 1.1 jmmv * notice, this list of conditions and the following disclaimer in the
22 1.1 jmmv * documentation and/or other materials provided with the distribution.
23 1.1 jmmv *
24 1.1 jmmv * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
25 1.1 jmmv * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
26 1.1 jmmv * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
27 1.1 jmmv * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
28 1.1 jmmv * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
29 1.1 jmmv * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
30 1.1 jmmv * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
31 1.1 jmmv * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
32 1.1 jmmv * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
33 1.1 jmmv * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
34 1.1 jmmv * POSSIBILITY OF SUCH DAMAGE.
35 1.1 jmmv */
36 1.1 jmmv
37 1.1 jmmv /*
38 1.1 jmmv * Copyright (c) 1989, 1993
39 1.1 jmmv * The Regents of the University of California. All rights reserved.
40 1.1 jmmv * (c) UNIX System Laboratories, Inc.
41 1.1 jmmv * All or some portions of this file are derived from material licensed
42 1.1 jmmv * to the University of California by American Telephone and Telegraph
43 1.1 jmmv * Co. or Unix System Laboratories, Inc. and are reproduced herein with
44 1.1 jmmv * the permission of UNIX System Laboratories, Inc.
45 1.1 jmmv *
46 1.1 jmmv * Redistribution and use in source and binary forms, with or without
47 1.1 jmmv * modification, are permitted provided that the following conditions
48 1.1 jmmv * are met:
49 1.1 jmmv * 1. Redistributions of source code must retain the above copyright
50 1.1 jmmv * notice, this list of conditions and the following disclaimer.
51 1.1 jmmv * 2. Redistributions in binary form must reproduce the above copyright
52 1.1 jmmv * notice, this list of conditions and the following disclaimer in the
53 1.1 jmmv * documentation and/or other materials provided with the distribution.
54 1.1 jmmv * 3. Neither the name of the University nor the names of its contributors
55 1.1 jmmv * may be used to endorse or promote products derived from this software
56 1.1 jmmv * without specific prior written permission.
57 1.1 jmmv *
58 1.1 jmmv * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
59 1.1 jmmv * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
60 1.1 jmmv * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
61 1.1 jmmv * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
62 1.1 jmmv * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
63 1.1 jmmv * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
64 1.1 jmmv * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
65 1.1 jmmv * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
66 1.1 jmmv * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
67 1.1 jmmv * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
68 1.1 jmmv * SUCH DAMAGE.
69 1.1 jmmv *
70 1.1 jmmv * @(#)vfs_subr.c 8.13 (Berkeley) 4/18/94
71 1.1 jmmv */
72 1.1 jmmv
73 1.1 jmmv /*
74 1.1 jmmv * VFS exports list management.
75 1.1 jmmv */
76 1.1 jmmv
77 1.1 jmmv #include <sys/cdefs.h>
78 1.37 ad __KERNEL_RCSID(0, "$NetBSD: nfs_export.c,v 1.37 2008/05/06 18:43:44 ad Exp $");
79 1.1 jmmv
80 1.3 jmmv #include "opt_compat_netbsd.h"
81 1.1 jmmv #include "opt_inet.h"
82 1.1 jmmv
83 1.1 jmmv #include <sys/param.h>
84 1.1 jmmv #include <sys/systm.h>
85 1.1 jmmv #include <sys/queue.h>
86 1.1 jmmv #include <sys/proc.h>
87 1.1 jmmv #include <sys/mount.h>
88 1.1 jmmv #include <sys/vnode.h>
89 1.1 jmmv #include <sys/namei.h>
90 1.1 jmmv #include <sys/errno.h>
91 1.1 jmmv #include <sys/malloc.h>
92 1.1 jmmv #include <sys/domain.h>
93 1.1 jmmv #include <sys/mbuf.h>
94 1.1 jmmv #include <sys/dirent.h>
95 1.1 jmmv #include <sys/socket.h> /* XXX for AF_MAX */
96 1.11 elad #include <sys/kauth.h>
97 1.1 jmmv
98 1.1 jmmv #include <net/radix.h>
99 1.1 jmmv
100 1.1 jmmv #include <netinet/in.h>
101 1.1 jmmv
102 1.1 jmmv #include <nfs/rpcv2.h>
103 1.1 jmmv #include <nfs/nfsproto.h>
104 1.1 jmmv #include <nfs/nfs.h>
105 1.1 jmmv #include <nfs/nfs_var.h>
106 1.1 jmmv
107 1.1 jmmv /*
108 1.1 jmmv * Network address lookup element.
109 1.1 jmmv */
110 1.1 jmmv struct netcred {
111 1.1 jmmv struct radix_node netc_rnodes[2];
112 1.1 jmmv int netc_refcnt;
113 1.1 jmmv int netc_exflags;
114 1.11 elad kauth_cred_t netc_anon;
115 1.1 jmmv };
116 1.1 jmmv
117 1.1 jmmv /*
118 1.1 jmmv * Network export information.
119 1.1 jmmv */
120 1.1 jmmv struct netexport {
121 1.5 yamt CIRCLEQ_ENTRY(netexport) ne_list;
122 1.5 yamt struct mount *ne_mount;
123 1.5 yamt struct netcred ne_defexported; /* Default export */
124 1.5 yamt struct radix_node_head *ne_rtable[AF_MAX+1]; /* Individual exports */
125 1.1 jmmv };
126 1.5 yamt CIRCLEQ_HEAD(, netexport) netexport_list =
127 1.5 yamt CIRCLEQ_HEAD_INITIALIZER(netexport_list);
128 1.1 jmmv
129 1.1 jmmv /* Malloc type used by the mount<->netexport map. */
130 1.1 jmmv MALLOC_DEFINE(M_NFS_EXPORT, "nfs_export", "NFS export data");
131 1.1 jmmv
132 1.1 jmmv /* Publicly exported file system. */
133 1.1 jmmv struct nfs_public nfs_pub;
134 1.1 jmmv
135 1.1 jmmv /*
136 1.1 jmmv * Local prototypes.
137 1.1 jmmv */
138 1.5 yamt static int init_exports(struct mount *, struct netexport **);
139 1.1 jmmv static int hang_addrlist(struct mount *, struct netexport *,
140 1.1 jmmv const struct export_args *);
141 1.1 jmmv static int sacheck(struct sockaddr *);
142 1.1 jmmv static int free_netcred(struct radix_node *, void *);
143 1.5 yamt static int export(struct netexport *, const struct export_args *);
144 1.1 jmmv static int setpublicfs(struct mount *, struct netexport *,
145 1.1 jmmv const struct export_args *);
146 1.5 yamt static struct netcred *netcred_lookup(struct netexport *, struct mbuf *);
147 1.5 yamt static struct netexport *netexport_lookup(const struct mount *);
148 1.5 yamt static struct netexport *netexport_lookup_byfsid(const fsid_t *);
149 1.12 yamt static void netexport_clear(struct netexport *);
150 1.5 yamt static void netexport_insert(struct netexport *);
151 1.5 yamt static void netexport_remove(struct netexport *);
152 1.8 yamt static void netexport_wrlock(void);
153 1.8 yamt static void netexport_wrunlock(void);
154 1.1 jmmv
155 1.1 jmmv /*
156 1.1 jmmv * PUBLIC INTERFACE
157 1.1 jmmv */
158 1.1 jmmv
159 1.1 jmmv /*
160 1.1 jmmv * Declare and initialize the file system export hooks.
161 1.1 jmmv */
162 1.1 jmmv static void nfs_export_unmount(struct mount *);
163 1.1 jmmv
164 1.1 jmmv struct vfs_hooks nfs_export_hooks = {
165 1.1 jmmv nfs_export_unmount
166 1.1 jmmv };
167 1.1 jmmv VFS_HOOKS_ATTACH(nfs_export_hooks);
168 1.1 jmmv
169 1.1 jmmv /*
170 1.1 jmmv * VFS unmount hook for NFS exports.
171 1.1 jmmv *
172 1.1 jmmv * Releases NFS exports list resources if the given mount point has some.
173 1.1 jmmv * As allocation happens lazily, it may be that it doesn't has this
174 1.1 jmmv * information, although it theorically should.
175 1.1 jmmv */
176 1.1 jmmv static void
177 1.1 jmmv nfs_export_unmount(struct mount *mp)
178 1.1 jmmv {
179 1.5 yamt struct netexport *ne;
180 1.1 jmmv
181 1.1 jmmv KASSERT(mp != NULL);
182 1.1 jmmv
183 1.8 yamt netexport_wrlock();
184 1.5 yamt ne = netexport_lookup(mp);
185 1.5 yamt if (ne == NULL) {
186 1.8 yamt netexport_wrunlock();
187 1.5 yamt return;
188 1.1 jmmv }
189 1.12 yamt netexport_clear(ne);
190 1.5 yamt netexport_remove(ne);
191 1.8 yamt netexport_wrunlock();
192 1.5 yamt free(ne, M_NFS_EXPORT);
193 1.1 jmmv }
194 1.1 jmmv
195 1.1 jmmv /*
196 1.1 jmmv * Atomically set the NFS exports list of the given file system, replacing
197 1.1 jmmv * it with a new list of entries.
198 1.1 jmmv *
199 1.1 jmmv * Returns zero on success or an appropriate error code otherwise.
200 1.1 jmmv *
201 1.1 jmmv * Helper function for the nfssvc(2) system call (NFSSVC_SETEXPORTSLIST
202 1.1 jmmv * command).
203 1.1 jmmv */
204 1.1 jmmv int
205 1.6 christos mountd_set_exports_list(const struct mountd_exports_list *mel, struct lwp *l)
206 1.1 jmmv {
207 1.1 jmmv int error;
208 1.1 jmmv #ifdef notyet
209 1.1 jmmv /* XXX: See below to see the reason why this is disabled. */
210 1.1 jmmv size_t i;
211 1.1 jmmv #endif
212 1.1 jmmv struct mount *mp;
213 1.5 yamt struct netexport *ne;
214 1.1 jmmv struct nameidata nd;
215 1.1 jmmv struct vnode *vp;
216 1.15 martin struct fid *fid;
217 1.15 martin size_t fid_size;
218 1.1 jmmv
219 1.33 elad if (kauth_authorize_network(l->l_cred, KAUTH_NETWORK_NFS,
220 1.33 elad KAUTH_REQ_NETWORK_NFS_EXPORT, NULL, NULL, NULL) != 0)
221 1.1 jmmv return EPERM;
222 1.1 jmmv
223 1.1 jmmv /* Lookup the file system path. */
224 1.31 pooka NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, mel->mel_path);
225 1.1 jmmv error = namei(&nd);
226 1.1 jmmv if (error != 0)
227 1.1 jmmv return error;
228 1.5 yamt vp = nd.ni_vp;
229 1.5 yamt mp = vp->v_mount;
230 1.1 jmmv
231 1.15 martin fid_size = 0;
232 1.15 martin if ((error = VFS_VPTOFH(vp, NULL, &fid_size)) == E2BIG) {
233 1.15 martin fid = malloc(fid_size, M_TEMP, M_NOWAIT);
234 1.15 martin if (fid != NULL) {
235 1.15 martin error = VFS_VPTOFH(vp, fid, &fid_size);
236 1.15 martin free(fid, M_TEMP);
237 1.15 martin }
238 1.15 martin }
239 1.15 martin if (error != 0) {
240 1.26 chs vput(vp);
241 1.25 chs return EOPNOTSUPP;
242 1.1 jmmv }
243 1.1 jmmv
244 1.1 jmmv /* Mark the file system busy. */
245 1.37 ad error = vfs_busy(mp, NULL);
246 1.25 chs vput(vp);
247 1.1 jmmv if (error != 0)
248 1.25 chs return error;
249 1.1 jmmv
250 1.8 yamt netexport_wrlock();
251 1.5 yamt ne = netexport_lookup(mp);
252 1.5 yamt if (ne == NULL) {
253 1.5 yamt error = init_exports(mp, &ne);
254 1.1 jmmv if (error != 0) {
255 1.25 chs goto out;
256 1.1 jmmv }
257 1.1 jmmv }
258 1.1 jmmv
259 1.5 yamt KASSERT(ne != NULL);
260 1.5 yamt KASSERT(ne->ne_mount == mp);
261 1.5 yamt
262 1.1 jmmv /*
263 1.1 jmmv * XXX: The part marked as 'notyet' works fine from the kernel's
264 1.1 jmmv * point of view, in the sense that it is able to atomically update
265 1.1 jmmv * the complete exports list for a file system. However, supporting
266 1.1 jmmv * this in mountd(8) requires a lot of work; so, for now, keep the
267 1.1 jmmv * old behavior of updating a single entry per call.
268 1.1 jmmv *
269 1.1 jmmv * When mountd(8) is fixed, just remove the second branch of this
270 1.1 jmmv * preprocessor conditional and enable the first one.
271 1.1 jmmv */
272 1.1 jmmv #ifdef notyet
273 1.12 yamt netexport_clear(ne);
274 1.1 jmmv for (i = 0; error == 0 && i < mel->mel_nexports; i++)
275 1.5 yamt error = export(ne, &mel->mel_exports[i]);
276 1.1 jmmv #else
277 1.1 jmmv if (mel->mel_nexports == 0)
278 1.12 yamt netexport_clear(ne);
279 1.1 jmmv else if (mel->mel_nexports == 1)
280 1.5 yamt error = export(ne, &mel->mel_exports[0]);
281 1.1 jmmv else {
282 1.1 jmmv printf("mountd_set_exports_list: Cannot set more than one "
283 1.1 jmmv "entry at once (unimplemented)\n");
284 1.1 jmmv error = EOPNOTSUPP;
285 1.1 jmmv }
286 1.1 jmmv #endif
287 1.1 jmmv
288 1.25 chs out:
289 1.8 yamt netexport_wrunlock();
290 1.36 ad vfs_unbusy(mp, false, NULL);
291 1.4 yamt return error;
292 1.1 jmmv }
293 1.1 jmmv
294 1.5 yamt static void
295 1.5 yamt netexport_insert(struct netexport *ne)
296 1.5 yamt {
297 1.5 yamt
298 1.5 yamt CIRCLEQ_INSERT_HEAD(&netexport_list, ne, ne_list);
299 1.5 yamt }
300 1.5 yamt
301 1.5 yamt static void
302 1.5 yamt netexport_remove(struct netexport *ne)
303 1.5 yamt {
304 1.5 yamt
305 1.5 yamt CIRCLEQ_REMOVE(&netexport_list, ne, ne_list);
306 1.5 yamt }
307 1.5 yamt
308 1.5 yamt static struct netexport *
309 1.5 yamt netexport_lookup(const struct mount *mp)
310 1.5 yamt {
311 1.5 yamt struct netexport *ne;
312 1.5 yamt
313 1.5 yamt CIRCLEQ_FOREACH(ne, &netexport_list, ne_list) {
314 1.5 yamt if (ne->ne_mount == mp) {
315 1.5 yamt goto done;
316 1.5 yamt }
317 1.5 yamt }
318 1.5 yamt ne = NULL;
319 1.5 yamt done:
320 1.5 yamt return ne;
321 1.5 yamt }
322 1.5 yamt
323 1.5 yamt static struct netexport *
324 1.5 yamt netexport_lookup_byfsid(const fsid_t *fsid)
325 1.5 yamt {
326 1.5 yamt struct netexport *ne;
327 1.5 yamt
328 1.5 yamt CIRCLEQ_FOREACH(ne, &netexport_list, ne_list) {
329 1.5 yamt const struct mount *mp = ne->ne_mount;
330 1.5 yamt
331 1.5 yamt if (mp->mnt_stat.f_fsidx.__fsid_val[0] == fsid->__fsid_val[0] &&
332 1.5 yamt mp->mnt_stat.f_fsidx.__fsid_val[1] == fsid->__fsid_val[1]) {
333 1.5 yamt goto done;
334 1.5 yamt }
335 1.5 yamt }
336 1.5 yamt ne = NULL;
337 1.5 yamt done:
338 1.5 yamt
339 1.5 yamt return ne;
340 1.5 yamt }
341 1.5 yamt
342 1.1 jmmv /*
343 1.1 jmmv * Check if the file system specified by the 'mp' mount structure is
344 1.1 jmmv * exported to a client with 'anon' anonymous credentials. The 'mb'
345 1.1 jmmv * argument is an mbuf containing the network address of the client.
346 1.1 jmmv * The return parameters for the export flags for the client are returned
347 1.1 jmmv * in the address specified by 'wh'.
348 1.1 jmmv *
349 1.1 jmmv * This function is used exclusively by the NFS server. It is generally
350 1.1 jmmv * invoked before VFS_FHTOVP to validate that client has access to the
351 1.1 jmmv * file system.
352 1.1 jmmv */
353 1.5 yamt
354 1.1 jmmv int
355 1.5 yamt netexport_check(const fsid_t *fsid, struct mbuf *mb, struct mount **mpp,
356 1.11 elad int *wh, kauth_cred_t *anon)
357 1.1 jmmv {
358 1.5 yamt struct netexport *ne;
359 1.1 jmmv struct netcred *np;
360 1.1 jmmv
361 1.5 yamt ne = netexport_lookup_byfsid(fsid);
362 1.5 yamt if (ne == NULL) {
363 1.5 yamt return EACCES;
364 1.1 jmmv }
365 1.5 yamt np = netcred_lookup(ne, mb);
366 1.5 yamt if (np == NULL) {
367 1.1 jmmv return EACCES;
368 1.5 yamt }
369 1.1 jmmv
370 1.5 yamt *mpp = ne->ne_mount;
371 1.5 yamt *wh = np->netc_exflags;
372 1.11 elad *anon = np->netc_anon;
373 1.1 jmmv
374 1.5 yamt return 0;
375 1.1 jmmv }
376 1.1 jmmv
377 1.3 jmmv #ifdef COMPAT_30
378 1.3 jmmv /*
379 1.3 jmmv * Handles legacy export requests. In this case, the export information
380 1.3 jmmv * is hardcoded in a specific place of the mount arguments structure (given
381 1.3 jmmv * in data); the request for an update is given through the fspec field
382 1.3 jmmv * (also in a known location), which must be a null pointer.
383 1.3 jmmv *
384 1.3 jmmv * Returns EJUSTRETURN if the given command was not a export request.
385 1.3 jmmv * Otherwise, returns 0 on success or an appropriate error code otherwise.
386 1.3 jmmv */
387 1.3 jmmv int
388 1.30 dsl nfs_update_exports_30(struct mount *mp, const char *path,
389 1.30 dsl struct mnt_export_args30 *args, struct lwp *l)
390 1.3 jmmv {
391 1.3 jmmv struct mountd_exports_list mel;
392 1.3 jmmv
393 1.3 jmmv mel.mel_path = path;
394 1.3 jmmv
395 1.30 dsl if (args->fspec != NULL)
396 1.3 jmmv return EJUSTRETURN;
397 1.3 jmmv
398 1.30 dsl if (args->eargs.ex_flags & 0x00020000) {
399 1.3 jmmv /* Request to delete exports. The mask above holds the
400 1.3 jmmv * value that used to be in MNT_DELEXPORT. */
401 1.3 jmmv mel.mel_nexports = 0;
402 1.3 jmmv } else {
403 1.3 jmmv /* The following assumes export_args has not changed since
404 1.30 dsl * export_args30 - typedef checks sizes. */
405 1.30 dsl typedef char x[sizeof args->eargs == sizeof *mel.mel_exports ? 1 : -1];
406 1.3 jmmv
407 1.3 jmmv mel.mel_nexports = 1;
408 1.30 dsl mel.mel_exports = (void *)&args->eargs;
409 1.3 jmmv }
410 1.3 jmmv
411 1.6 christos return mountd_set_exports_list(&mel, l);
412 1.3 jmmv }
413 1.3 jmmv #endif
414 1.3 jmmv
415 1.1 jmmv /*
416 1.1 jmmv * INTERNAL FUNCTIONS
417 1.1 jmmv */
418 1.1 jmmv
419 1.1 jmmv /*
420 1.1 jmmv * Initializes NFS exports for the file system given in 'mp' if it supports
421 1.1 jmmv * file handles; this is determined by checking whether mp's vfs_vptofh and
422 1.1 jmmv * vfs_fhtovp operations are NULL or not.
423 1.1 jmmv *
424 1.1 jmmv * If successful, returns 0 and sets *mnpp to the address of the new
425 1.20 jmmv * mount_netexport_pair item; otherwise returns an appropriate error code
426 1.1 jmmv * and *mnpp remains unmodified.
427 1.1 jmmv */
428 1.1 jmmv static int
429 1.5 yamt init_exports(struct mount *mp, struct netexport **nep)
430 1.1 jmmv {
431 1.1 jmmv int error;
432 1.1 jmmv struct export_args ea;
433 1.5 yamt struct netexport *ne;
434 1.1 jmmv
435 1.1 jmmv KASSERT(mp != NULL);
436 1.1 jmmv
437 1.1 jmmv /* Ensure that we do not already have this mount point. */
438 1.5 yamt KASSERT(netexport_lookup(mp) == NULL);
439 1.1 jmmv
440 1.5 yamt ne = malloc(sizeof(*ne), M_NFS_EXPORT, M_WAITOK | M_ZERO);
441 1.5 yamt ne->ne_mount = mp;
442 1.1 jmmv
443 1.1 jmmv /* Set the default export entry. Handled internally by export upon
444 1.1 jmmv * first call. */
445 1.1 jmmv memset(&ea, 0, sizeof(ea));
446 1.1 jmmv ea.ex_root = -2;
447 1.1 jmmv if (mp->mnt_flag & MNT_RDONLY)
448 1.1 jmmv ea.ex_flags |= MNT_EXRDONLY;
449 1.5 yamt error = export(ne, &ea);
450 1.5 yamt if (error != 0) {
451 1.5 yamt free(ne, M_NFS_EXPORT);
452 1.5 yamt } else {
453 1.5 yamt netexport_insert(ne);
454 1.5 yamt *nep = ne;
455 1.1 jmmv }
456 1.1 jmmv
457 1.1 jmmv return error;
458 1.1 jmmv }
459 1.1 jmmv
460 1.1 jmmv /*
461 1.1 jmmv * Build hash lists of net addresses and hang them off the mount point.
462 1.1 jmmv * Called by export() to set up a new entry in the lists of export
463 1.1 jmmv * addresses.
464 1.1 jmmv */
465 1.1 jmmv static int
466 1.1 jmmv hang_addrlist(struct mount *mp, struct netexport *nep,
467 1.1 jmmv const struct export_args *argp)
468 1.1 jmmv {
469 1.1 jmmv int error, i;
470 1.1 jmmv struct netcred *np, *enp;
471 1.1 jmmv struct radix_node_head *rnh;
472 1.1 jmmv struct sockaddr *saddr, *smask;
473 1.1 jmmv struct domain *dom;
474 1.1 jmmv
475 1.1 jmmv smask = NULL;
476 1.1 jmmv
477 1.1 jmmv if (argp->ex_addrlen == 0) {
478 1.1 jmmv if (mp->mnt_flag & MNT_DEFEXPORTED)
479 1.1 jmmv return EPERM;
480 1.1 jmmv np = &nep->ne_defexported;
481 1.13 yamt KASSERT(np->netc_anon == NULL);
482 1.13 yamt np->netc_anon = kauth_cred_alloc();
483 1.1 jmmv np->netc_exflags = argp->ex_flags;
484 1.18 pooka kauth_uucred_to_cred(np->netc_anon, &argp->ex_anon);
485 1.1 jmmv mp->mnt_flag |= MNT_DEFEXPORTED;
486 1.1 jmmv return 0;
487 1.1 jmmv }
488 1.1 jmmv
489 1.1 jmmv if (argp->ex_addrlen > MLEN || argp->ex_masklen > MLEN)
490 1.1 jmmv return EINVAL;
491 1.1 jmmv
492 1.1 jmmv i = sizeof(struct netcred) + argp->ex_addrlen + argp->ex_masklen;
493 1.5 yamt np = malloc(i, M_NETADDR, M_WAITOK | M_ZERO);
494 1.13 yamt np->netc_anon = kauth_cred_alloc();
495 1.1 jmmv saddr = (struct sockaddr *)(np + 1);
496 1.5 yamt error = copyin(argp->ex_addr, saddr, argp->ex_addrlen);
497 1.1 jmmv if (error)
498 1.1 jmmv goto out;
499 1.1 jmmv if (saddr->sa_len > argp->ex_addrlen)
500 1.1 jmmv saddr->sa_len = argp->ex_addrlen;
501 1.1 jmmv if (sacheck(saddr) == -1)
502 1.1 jmmv return EINVAL;
503 1.1 jmmv if (argp->ex_masklen) {
504 1.27 christos smask = (struct sockaddr *)((char *)saddr + argp->ex_addrlen);
505 1.5 yamt error = copyin(argp->ex_mask, smask, argp->ex_masklen);
506 1.1 jmmv if (error)
507 1.1 jmmv goto out;
508 1.1 jmmv if (smask->sa_len > argp->ex_masklen)
509 1.1 jmmv smask->sa_len = argp->ex_masklen;
510 1.1 jmmv if (smask->sa_family != saddr->sa_family)
511 1.1 jmmv return EINVAL;
512 1.1 jmmv if (sacheck(smask) == -1)
513 1.1 jmmv return EINVAL;
514 1.1 jmmv }
515 1.1 jmmv i = saddr->sa_family;
516 1.1 jmmv if ((rnh = nep->ne_rtable[i]) == 0) {
517 1.1 jmmv /*
518 1.1 jmmv * Seems silly to initialize every AF when most are not
519 1.1 jmmv * used, do so on demand here
520 1.1 jmmv */
521 1.1 jmmv DOMAIN_FOREACH(dom) {
522 1.1 jmmv if (dom->dom_family == i && dom->dom_rtattach) {
523 1.1 jmmv dom->dom_rtattach((void **)&nep->ne_rtable[i],
524 1.1 jmmv dom->dom_rtoffset);
525 1.1 jmmv break;
526 1.1 jmmv }
527 1.1 jmmv }
528 1.1 jmmv if ((rnh = nep->ne_rtable[i]) == 0) {
529 1.1 jmmv error = ENOBUFS;
530 1.1 jmmv goto out;
531 1.1 jmmv }
532 1.1 jmmv }
533 1.1 jmmv
534 1.1 jmmv enp = (struct netcred *)(*rnh->rnh_addaddr)(saddr, smask, rnh,
535 1.1 jmmv np->netc_rnodes);
536 1.1 jmmv if (enp != np) {
537 1.1 jmmv if (enp == NULL) {
538 1.1 jmmv enp = (struct netcred *)(*rnh->rnh_lookup)(saddr,
539 1.1 jmmv smask, rnh);
540 1.1 jmmv if (enp == NULL) {
541 1.1 jmmv error = EPERM;
542 1.1 jmmv goto out;
543 1.1 jmmv }
544 1.1 jmmv } else
545 1.1 jmmv enp->netc_refcnt++;
546 1.1 jmmv
547 1.1 jmmv goto check;
548 1.1 jmmv } else
549 1.1 jmmv enp->netc_refcnt = 1;
550 1.1 jmmv
551 1.1 jmmv np->netc_exflags = argp->ex_flags;
552 1.18 pooka kauth_uucred_to_cred(np->netc_anon, &argp->ex_anon);
553 1.1 jmmv return 0;
554 1.1 jmmv check:
555 1.1 jmmv if (enp->netc_exflags != argp->ex_flags ||
556 1.11 elad kauth_cred_uucmp(enp->netc_anon, &argp->ex_anon) != 0)
557 1.1 jmmv error = EPERM;
558 1.1 jmmv else
559 1.1 jmmv error = 0;
560 1.1 jmmv out:
561 1.13 yamt KASSERT(np->netc_anon != NULL);
562 1.13 yamt kauth_cred_free(np->netc_anon);
563 1.1 jmmv free(np, M_NETADDR);
564 1.1 jmmv return error;
565 1.1 jmmv }
566 1.1 jmmv
567 1.1 jmmv /*
568 1.1 jmmv * Ensure that the address stored in 'sa' is valid.
569 1.1 jmmv * Returns zero on success, otherwise -1.
570 1.1 jmmv */
571 1.1 jmmv static int
572 1.1 jmmv sacheck(struct sockaddr *sa)
573 1.1 jmmv {
574 1.1 jmmv
575 1.1 jmmv switch (sa->sa_family) {
576 1.1 jmmv #ifdef INET
577 1.1 jmmv case AF_INET: {
578 1.1 jmmv struct sockaddr_in *sin = (struct sockaddr_in *)sa;
579 1.1 jmmv char *p = (char *)sin->sin_zero;
580 1.1 jmmv size_t i;
581 1.1 jmmv
582 1.1 jmmv if (sin->sin_len != sizeof(*sin))
583 1.1 jmmv return -1;
584 1.1 jmmv if (sin->sin_port != 0)
585 1.1 jmmv return -1;
586 1.1 jmmv for (i = 0; i < sizeof(sin->sin_zero); i++)
587 1.1 jmmv if (*p++ != '\0')
588 1.1 jmmv return -1;
589 1.1 jmmv return 0;
590 1.1 jmmv }
591 1.1 jmmv #endif
592 1.1 jmmv #ifdef INET6
593 1.1 jmmv case AF_INET6: {
594 1.1 jmmv struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sa;
595 1.1 jmmv
596 1.1 jmmv if (sin6->sin6_len != sizeof(*sin6))
597 1.1 jmmv return -1;
598 1.1 jmmv if (sin6->sin6_port != 0)
599 1.1 jmmv return -1;
600 1.1 jmmv return 0;
601 1.1 jmmv }
602 1.1 jmmv #endif
603 1.1 jmmv default:
604 1.1 jmmv return -1;
605 1.1 jmmv }
606 1.1 jmmv }
607 1.1 jmmv
608 1.1 jmmv /*
609 1.1 jmmv * Free the netcred object pointed to by the 'rn' radix node.
610 1.1 jmmv * 'w' holds a pointer to the radix tree head.
611 1.1 jmmv */
612 1.1 jmmv static int
613 1.1 jmmv free_netcred(struct radix_node *rn, void *w)
614 1.1 jmmv {
615 1.1 jmmv struct radix_node_head *rnh = (struct radix_node_head *)w;
616 1.1 jmmv struct netcred *np = (struct netcred *)(void *)rn;
617 1.1 jmmv
618 1.1 jmmv (*rnh->rnh_deladdr)(rn->rn_key, rn->rn_mask, rnh);
619 1.13 yamt if (--(np->netc_refcnt) <= 0) {
620 1.13 yamt KASSERT(np->netc_anon != NULL);
621 1.13 yamt kauth_cred_free(np->netc_anon);
622 1.1 jmmv free(np, M_NETADDR);
623 1.13 yamt }
624 1.1 jmmv return 0;
625 1.1 jmmv }
626 1.1 jmmv
627 1.1 jmmv /*
628 1.1 jmmv * Clears the exports list for a given file system.
629 1.1 jmmv */
630 1.1 jmmv static void
631 1.12 yamt netexport_clear(struct netexport *ne)
632 1.1 jmmv {
633 1.5 yamt struct radix_node_head *rnh;
634 1.5 yamt struct mount *mp = ne->ne_mount;
635 1.1 jmmv int i;
636 1.1 jmmv
637 1.1 jmmv if (mp->mnt_flag & MNT_EXPUBLIC) {
638 1.1 jmmv setpublicfs(NULL, NULL, NULL);
639 1.1 jmmv mp->mnt_flag &= ~MNT_EXPUBLIC;
640 1.1 jmmv }
641 1.1 jmmv
642 1.1 jmmv for (i = 0; i <= AF_MAX; i++) {
643 1.5 yamt if ((rnh = ne->ne_rtable[i]) != NULL) {
644 1.28 dyoung rn_walktree(rnh, free_netcred, rnh);
645 1.5 yamt free(rnh, M_RTABLE);
646 1.5 yamt ne->ne_rtable[i] = NULL;
647 1.1 jmmv }
648 1.1 jmmv }
649 1.1 jmmv
650 1.13 yamt if ((mp->mnt_flag & MNT_DEFEXPORTED) != 0) {
651 1.13 yamt struct netcred *np = &ne->ne_defexported;
652 1.13 yamt
653 1.13 yamt KASSERT(np->netc_anon != NULL);
654 1.13 yamt kauth_cred_free(np->netc_anon);
655 1.13 yamt np->netc_anon = NULL;
656 1.13 yamt } else {
657 1.13 yamt KASSERT(ne->ne_defexported.netc_anon == NULL);
658 1.13 yamt }
659 1.13 yamt
660 1.1 jmmv mp->mnt_flag &= ~(MNT_EXPORTED | MNT_DEFEXPORTED);
661 1.1 jmmv }
662 1.1 jmmv
663 1.1 jmmv /*
664 1.1 jmmv * Add a new export entry (described by an export_args structure) to the
665 1.1 jmmv * given file system.
666 1.1 jmmv */
667 1.1 jmmv static int
668 1.5 yamt export(struct netexport *nep, const struct export_args *argp)
669 1.1 jmmv {
670 1.5 yamt struct mount *mp = nep->ne_mount;
671 1.1 jmmv int error;
672 1.1 jmmv
673 1.1 jmmv if (argp->ex_flags & MNT_EXPORTED) {
674 1.1 jmmv if (argp->ex_flags & MNT_EXPUBLIC) {
675 1.1 jmmv if ((error = setpublicfs(mp, nep, argp)) != 0)
676 1.1 jmmv return error;
677 1.1 jmmv mp->mnt_flag |= MNT_EXPUBLIC;
678 1.1 jmmv }
679 1.1 jmmv if ((error = hang_addrlist(mp, nep, argp)) != 0)
680 1.1 jmmv return error;
681 1.1 jmmv mp->mnt_flag |= MNT_EXPORTED;
682 1.1 jmmv }
683 1.1 jmmv return 0;
684 1.1 jmmv }
685 1.1 jmmv
686 1.1 jmmv /*
687 1.1 jmmv * Set the publicly exported filesystem (WebNFS). Currently, only
688 1.1 jmmv * one public filesystem is possible in the spec (RFC 2054 and 2055)
689 1.1 jmmv */
690 1.1 jmmv static int
691 1.22 yamt setpublicfs(struct mount *mp, struct netexport *nep,
692 1.1 jmmv const struct export_args *argp)
693 1.1 jmmv {
694 1.1 jmmv char *cp;
695 1.1 jmmv int error;
696 1.1 jmmv struct vnode *rvp;
697 1.15 martin size_t fhsize;
698 1.1 jmmv
699 1.1 jmmv /*
700 1.1 jmmv * mp == NULL -> invalidate the current info, the FS is
701 1.1 jmmv * no longer exported. May be called from either export
702 1.1 jmmv * or unmount, so check if it hasn't already been done.
703 1.1 jmmv */
704 1.1 jmmv if (mp == NULL) {
705 1.1 jmmv if (nfs_pub.np_valid) {
706 1.1 jmmv nfs_pub.np_valid = 0;
707 1.15 martin if (nfs_pub.np_handle != NULL) {
708 1.15 martin free(nfs_pub.np_handle, M_TEMP);
709 1.15 martin nfs_pub.np_handle = NULL;
710 1.15 martin }
711 1.1 jmmv if (nfs_pub.np_index != NULL) {
712 1.1 jmmv FREE(nfs_pub.np_index, M_TEMP);
713 1.1 jmmv nfs_pub.np_index = NULL;
714 1.1 jmmv }
715 1.1 jmmv }
716 1.1 jmmv return 0;
717 1.1 jmmv }
718 1.1 jmmv
719 1.1 jmmv /*
720 1.1 jmmv * Only one allowed at a time.
721 1.1 jmmv */
722 1.1 jmmv if (nfs_pub.np_valid != 0 && mp != nfs_pub.np_mount)
723 1.1 jmmv return EBUSY;
724 1.1 jmmv
725 1.1 jmmv /*
726 1.1 jmmv * Get real filehandle for root of exported FS.
727 1.1 jmmv */
728 1.1 jmmv if ((error = VFS_ROOT(mp, &rvp)))
729 1.1 jmmv return error;
730 1.1 jmmv
731 1.15 martin fhsize = 0;
732 1.15 martin error = vfs_composefh(rvp, NULL, &fhsize);
733 1.15 martin if (error != E2BIG)
734 1.15 martin return error;
735 1.15 martin nfs_pub.np_handle = malloc(fhsize, M_TEMP, M_NOWAIT);
736 1.15 martin if (nfs_pub.np_handle == NULL)
737 1.15 martin error = ENOMEM;
738 1.15 martin else
739 1.15 martin error = vfs_composefh(rvp, nfs_pub.np_handle, &fhsize);
740 1.14 yamt if (error)
741 1.1 jmmv return error;
742 1.1 jmmv
743 1.1 jmmv vput(rvp);
744 1.1 jmmv
745 1.1 jmmv /*
746 1.1 jmmv * If an indexfile was specified, pull it in.
747 1.1 jmmv */
748 1.1 jmmv if (argp->ex_indexfile != NULL) {
749 1.1 jmmv MALLOC(nfs_pub.np_index, char *, MAXNAMLEN + 1, M_TEMP,
750 1.1 jmmv M_WAITOK);
751 1.1 jmmv error = copyinstr(argp->ex_indexfile, nfs_pub.np_index,
752 1.1 jmmv MAXNAMLEN, (size_t *)0);
753 1.1 jmmv if (!error) {
754 1.1 jmmv /*
755 1.1 jmmv * Check for illegal filenames.
756 1.1 jmmv */
757 1.1 jmmv for (cp = nfs_pub.np_index; *cp; cp++) {
758 1.1 jmmv if (*cp == '/') {
759 1.1 jmmv error = EINVAL;
760 1.1 jmmv break;
761 1.1 jmmv }
762 1.1 jmmv }
763 1.1 jmmv }
764 1.1 jmmv if (error) {
765 1.1 jmmv FREE(nfs_pub.np_index, M_TEMP);
766 1.1 jmmv return error;
767 1.1 jmmv }
768 1.1 jmmv }
769 1.1 jmmv
770 1.1 jmmv nfs_pub.np_mount = mp;
771 1.1 jmmv nfs_pub.np_valid = 1;
772 1.1 jmmv return 0;
773 1.1 jmmv }
774 1.1 jmmv
775 1.1 jmmv /*
776 1.1 jmmv * Lookup an export entry in the exports list that matches the address
777 1.1 jmmv * stored in 'nam'. If no entry is found, the default one is used instead
778 1.1 jmmv * (if available).
779 1.1 jmmv */
780 1.1 jmmv static struct netcred *
781 1.5 yamt netcred_lookup(struct netexport *ne, struct mbuf *nam)
782 1.1 jmmv {
783 1.1 jmmv struct netcred *np;
784 1.1 jmmv struct radix_node_head *rnh;
785 1.1 jmmv struct sockaddr *saddr;
786 1.1 jmmv
787 1.7 yamt if ((ne->ne_mount->mnt_flag & MNT_EXPORTED) == 0) {
788 1.7 yamt return NULL;
789 1.7 yamt }
790 1.5 yamt
791 1.5 yamt /*
792 1.5 yamt * Lookup in the export list first.
793 1.5 yamt */
794 1.1 jmmv np = NULL;
795 1.5 yamt if (nam != NULL) {
796 1.5 yamt saddr = mtod(nam, struct sockaddr *);
797 1.5 yamt rnh = ne->ne_rtable[saddr->sa_family];
798 1.5 yamt if (rnh != NULL) {
799 1.5 yamt np = (struct netcred *)
800 1.27 christos (*rnh->rnh_matchaddr)((void *)saddr,
801 1.5 yamt rnh);
802 1.5 yamt if (np && np->netc_rnodes->rn_flags & RNF_ROOT)
803 1.5 yamt np = NULL;
804 1.1 jmmv }
805 1.1 jmmv }
806 1.5 yamt /*
807 1.5 yamt * If no address match, use the default if it exists.
808 1.5 yamt */
809 1.5 yamt if (np == NULL && ne->ne_mount->mnt_flag & MNT_DEFEXPORTED)
810 1.5 yamt np = &ne->ne_defexported;
811 1.5 yamt
812 1.1 jmmv return np;
813 1.1 jmmv }
814 1.8 yamt
815 1.29 ad krwlock_t netexport_lock;
816 1.8 yamt
817 1.8 yamt void
818 1.8 yamt netexport_rdlock(void)
819 1.8 yamt {
820 1.8 yamt
821 1.29 ad rw_enter(&netexport_lock, RW_READER);
822 1.8 yamt }
823 1.8 yamt
824 1.8 yamt void
825 1.8 yamt netexport_rdunlock(void)
826 1.8 yamt {
827 1.8 yamt
828 1.29 ad rw_exit(&netexport_lock);
829 1.8 yamt }
830 1.8 yamt
831 1.8 yamt static void
832 1.8 yamt netexport_wrlock(void)
833 1.8 yamt {
834 1.8 yamt
835 1.29 ad rw_enter(&netexport_lock, RW_WRITER);
836 1.8 yamt }
837 1.8 yamt
838 1.8 yamt static void
839 1.8 yamt netexport_wrunlock(void)
840 1.8 yamt {
841 1.8 yamt
842 1.29 ad rw_exit(&netexport_lock);
843 1.8 yamt }
844