nfs_export.c revision 1.41 1 1.41 pooka /* $NetBSD: nfs_export.c,v 1.41 2008/11/25 14:04:23 pooka Exp $ */
2 1.1 jmmv
3 1.1 jmmv /*-
4 1.36 ad * Copyright (c) 1997, 1998, 2004, 2005, 2008 The NetBSD Foundation, Inc.
5 1.1 jmmv * All rights reserved.
6 1.1 jmmv *
7 1.1 jmmv * This code is derived from software contributed to The NetBSD Foundation
8 1.1 jmmv * by Jason R. Thorpe of the Numerical Aerospace Simulation Facility,
9 1.1 jmmv * NASA Ames Research Center.
10 1.1 jmmv * This code is derived from software contributed to The NetBSD Foundation
11 1.1 jmmv * by Charles M. Hannum.
12 1.1 jmmv * This code is derived from software contributed to The NetBSD Foundation
13 1.1 jmmv * by Julio M. Merino Vidal.
14 1.1 jmmv *
15 1.1 jmmv * Redistribution and use in source and binary forms, with or without
16 1.1 jmmv * modification, are permitted provided that the following conditions
17 1.1 jmmv * are met:
18 1.1 jmmv * 1. Redistributions of source code must retain the above copyright
19 1.1 jmmv * notice, this list of conditions and the following disclaimer.
20 1.1 jmmv * 2. Redistributions in binary form must reproduce the above copyright
21 1.1 jmmv * notice, this list of conditions and the following disclaimer in the
22 1.1 jmmv * documentation and/or other materials provided with the distribution.
23 1.1 jmmv *
24 1.1 jmmv * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
25 1.1 jmmv * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
26 1.1 jmmv * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
27 1.1 jmmv * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
28 1.1 jmmv * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
29 1.1 jmmv * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
30 1.1 jmmv * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
31 1.1 jmmv * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
32 1.1 jmmv * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
33 1.1 jmmv * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
34 1.1 jmmv * POSSIBILITY OF SUCH DAMAGE.
35 1.1 jmmv */
36 1.1 jmmv
37 1.1 jmmv /*
38 1.1 jmmv * Copyright (c) 1989, 1993
39 1.1 jmmv * The Regents of the University of California. All rights reserved.
40 1.1 jmmv * (c) UNIX System Laboratories, Inc.
41 1.1 jmmv * All or some portions of this file are derived from material licensed
42 1.1 jmmv * to the University of California by American Telephone and Telegraph
43 1.1 jmmv * Co. or Unix System Laboratories, Inc. and are reproduced herein with
44 1.1 jmmv * the permission of UNIX System Laboratories, Inc.
45 1.1 jmmv *
46 1.1 jmmv * Redistribution and use in source and binary forms, with or without
47 1.1 jmmv * modification, are permitted provided that the following conditions
48 1.1 jmmv * are met:
49 1.1 jmmv * 1. Redistributions of source code must retain the above copyright
50 1.1 jmmv * notice, this list of conditions and the following disclaimer.
51 1.1 jmmv * 2. Redistributions in binary form must reproduce the above copyright
52 1.1 jmmv * notice, this list of conditions and the following disclaimer in the
53 1.1 jmmv * documentation and/or other materials provided with the distribution.
54 1.1 jmmv * 3. Neither the name of the University nor the names of its contributors
55 1.1 jmmv * may be used to endorse or promote products derived from this software
56 1.1 jmmv * without specific prior written permission.
57 1.1 jmmv *
58 1.1 jmmv * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
59 1.1 jmmv * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
60 1.1 jmmv * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
61 1.1 jmmv * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
62 1.1 jmmv * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
63 1.1 jmmv * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
64 1.1 jmmv * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
65 1.1 jmmv * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
66 1.1 jmmv * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
67 1.1 jmmv * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
68 1.1 jmmv * SUCH DAMAGE.
69 1.1 jmmv *
70 1.1 jmmv * @(#)vfs_subr.c 8.13 (Berkeley) 4/18/94
71 1.1 jmmv */
72 1.1 jmmv
73 1.1 jmmv /*
74 1.1 jmmv * VFS exports list management.
75 1.1 jmmv */
76 1.1 jmmv
77 1.1 jmmv #include <sys/cdefs.h>
78 1.41 pooka __KERNEL_RCSID(0, "$NetBSD: nfs_export.c,v 1.41 2008/11/25 14:04:23 pooka Exp $");
79 1.1 jmmv
80 1.1 jmmv #include <sys/param.h>
81 1.1 jmmv #include <sys/systm.h>
82 1.1 jmmv #include <sys/queue.h>
83 1.1 jmmv #include <sys/proc.h>
84 1.1 jmmv #include <sys/mount.h>
85 1.1 jmmv #include <sys/vnode.h>
86 1.1 jmmv #include <sys/namei.h>
87 1.1 jmmv #include <sys/errno.h>
88 1.1 jmmv #include <sys/malloc.h>
89 1.1 jmmv #include <sys/domain.h>
90 1.1 jmmv #include <sys/mbuf.h>
91 1.1 jmmv #include <sys/dirent.h>
92 1.1 jmmv #include <sys/socket.h> /* XXX for AF_MAX */
93 1.11 elad #include <sys/kauth.h>
94 1.1 jmmv
95 1.1 jmmv #include <net/radix.h>
96 1.1 jmmv
97 1.1 jmmv #include <netinet/in.h>
98 1.1 jmmv
99 1.1 jmmv #include <nfs/rpcv2.h>
100 1.1 jmmv #include <nfs/nfsproto.h>
101 1.1 jmmv #include <nfs/nfs.h>
102 1.1 jmmv #include <nfs/nfs_var.h>
103 1.1 jmmv
104 1.1 jmmv /*
105 1.1 jmmv * Network address lookup element.
106 1.1 jmmv */
107 1.1 jmmv struct netcred {
108 1.1 jmmv struct radix_node netc_rnodes[2];
109 1.1 jmmv int netc_refcnt;
110 1.1 jmmv int netc_exflags;
111 1.11 elad kauth_cred_t netc_anon;
112 1.1 jmmv };
113 1.1 jmmv
114 1.1 jmmv /*
115 1.1 jmmv * Network export information.
116 1.1 jmmv */
117 1.1 jmmv struct netexport {
118 1.5 yamt CIRCLEQ_ENTRY(netexport) ne_list;
119 1.5 yamt struct mount *ne_mount;
120 1.5 yamt struct netcred ne_defexported; /* Default export */
121 1.5 yamt struct radix_node_head *ne_rtable[AF_MAX+1]; /* Individual exports */
122 1.1 jmmv };
123 1.5 yamt CIRCLEQ_HEAD(, netexport) netexport_list =
124 1.5 yamt CIRCLEQ_HEAD_INITIALIZER(netexport_list);
125 1.1 jmmv
126 1.1 jmmv /* Malloc type used by the mount<->netexport map. */
127 1.1 jmmv MALLOC_DEFINE(M_NFS_EXPORT, "nfs_export", "NFS export data");
128 1.1 jmmv
129 1.1 jmmv /* Publicly exported file system. */
130 1.1 jmmv struct nfs_public nfs_pub;
131 1.1 jmmv
132 1.1 jmmv /*
133 1.1 jmmv * Local prototypes.
134 1.1 jmmv */
135 1.5 yamt static int init_exports(struct mount *, struct netexport **);
136 1.1 jmmv static int hang_addrlist(struct mount *, struct netexport *,
137 1.1 jmmv const struct export_args *);
138 1.1 jmmv static int sacheck(struct sockaddr *);
139 1.1 jmmv static int free_netcred(struct radix_node *, void *);
140 1.5 yamt static int export(struct netexport *, const struct export_args *);
141 1.1 jmmv static int setpublicfs(struct mount *, struct netexport *,
142 1.1 jmmv const struct export_args *);
143 1.5 yamt static struct netcred *netcred_lookup(struct netexport *, struct mbuf *);
144 1.5 yamt static struct netexport *netexport_lookup(const struct mount *);
145 1.5 yamt static struct netexport *netexport_lookup_byfsid(const fsid_t *);
146 1.12 yamt static void netexport_clear(struct netexport *);
147 1.5 yamt static void netexport_insert(struct netexport *);
148 1.5 yamt static void netexport_remove(struct netexport *);
149 1.8 yamt static void netexport_wrlock(void);
150 1.8 yamt static void netexport_wrunlock(void);
151 1.40 ad static int nfs_export_update_30(struct mount *mp, const char *path, void *);
152 1.40 ad
153 1.1 jmmv
154 1.1 jmmv /*
155 1.1 jmmv * PUBLIC INTERFACE
156 1.1 jmmv */
157 1.1 jmmv
158 1.1 jmmv /*
159 1.1 jmmv * Declare and initialize the file system export hooks.
160 1.1 jmmv */
161 1.1 jmmv static void nfs_export_unmount(struct mount *);
162 1.1 jmmv
163 1.1 jmmv struct vfs_hooks nfs_export_hooks = {
164 1.40 ad { NULL, NULL },
165 1.40 ad .vh_unmount = nfs_export_unmount,
166 1.40 ad .vh_reexport = nfs_export_update_30,
167 1.1 jmmv };
168 1.1 jmmv
169 1.1 jmmv /*
170 1.1 jmmv * VFS unmount hook for NFS exports.
171 1.1 jmmv *
172 1.1 jmmv * Releases NFS exports list resources if the given mount point has some.
173 1.1 jmmv * As allocation happens lazily, it may be that it doesn't has this
174 1.1 jmmv * information, although it theorically should.
175 1.1 jmmv */
176 1.1 jmmv static void
177 1.1 jmmv nfs_export_unmount(struct mount *mp)
178 1.1 jmmv {
179 1.5 yamt struct netexport *ne;
180 1.1 jmmv
181 1.1 jmmv KASSERT(mp != NULL);
182 1.1 jmmv
183 1.8 yamt netexport_wrlock();
184 1.5 yamt ne = netexport_lookup(mp);
185 1.5 yamt if (ne == NULL) {
186 1.8 yamt netexport_wrunlock();
187 1.5 yamt return;
188 1.1 jmmv }
189 1.12 yamt netexport_clear(ne);
190 1.5 yamt netexport_remove(ne);
191 1.8 yamt netexport_wrunlock();
192 1.5 yamt free(ne, M_NFS_EXPORT);
193 1.1 jmmv }
194 1.1 jmmv
195 1.1 jmmv /*
196 1.1 jmmv * Atomically set the NFS exports list of the given file system, replacing
197 1.1 jmmv * it with a new list of entries.
198 1.1 jmmv *
199 1.1 jmmv * Returns zero on success or an appropriate error code otherwise.
200 1.1 jmmv *
201 1.1 jmmv * Helper function for the nfssvc(2) system call (NFSSVC_SETEXPORTSLIST
202 1.1 jmmv * command).
203 1.1 jmmv */
204 1.1 jmmv int
205 1.6 christos mountd_set_exports_list(const struct mountd_exports_list *mel, struct lwp *l)
206 1.1 jmmv {
207 1.1 jmmv int error;
208 1.1 jmmv #ifdef notyet
209 1.1 jmmv /* XXX: See below to see the reason why this is disabled. */
210 1.1 jmmv size_t i;
211 1.1 jmmv #endif
212 1.1 jmmv struct mount *mp;
213 1.5 yamt struct netexport *ne;
214 1.1 jmmv struct nameidata nd;
215 1.1 jmmv struct vnode *vp;
216 1.15 martin size_t fid_size;
217 1.1 jmmv
218 1.33 elad if (kauth_authorize_network(l->l_cred, KAUTH_NETWORK_NFS,
219 1.33 elad KAUTH_REQ_NETWORK_NFS_EXPORT, NULL, NULL, NULL) != 0)
220 1.1 jmmv return EPERM;
221 1.1 jmmv
222 1.1 jmmv /* Lookup the file system path. */
223 1.31 pooka NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, mel->mel_path);
224 1.1 jmmv error = namei(&nd);
225 1.1 jmmv if (error != 0)
226 1.1 jmmv return error;
227 1.5 yamt vp = nd.ni_vp;
228 1.5 yamt mp = vp->v_mount;
229 1.1 jmmv
230 1.41 pooka /*
231 1.41 pooka * Make sure the file system can do vptofh. If the file system
232 1.41 pooka * knows the handle's size, just trust it's able to do the
233 1.41 pooka * actual translation also (otherwise we should check fhtovp
234 1.41 pooka * also, and that's getting a wee bit ridiculous).
235 1.41 pooka */
236 1.15 martin fid_size = 0;
237 1.41 pooka if ((error = VFS_VPTOFH(vp, NULL, &fid_size)) != E2BIG) {
238 1.26 chs vput(vp);
239 1.25 chs return EOPNOTSUPP;
240 1.1 jmmv }
241 1.1 jmmv
242 1.1 jmmv /* Mark the file system busy. */
243 1.37 ad error = vfs_busy(mp, NULL);
244 1.25 chs vput(vp);
245 1.1 jmmv if (error != 0)
246 1.25 chs return error;
247 1.1 jmmv
248 1.8 yamt netexport_wrlock();
249 1.5 yamt ne = netexport_lookup(mp);
250 1.5 yamt if (ne == NULL) {
251 1.5 yamt error = init_exports(mp, &ne);
252 1.1 jmmv if (error != 0) {
253 1.25 chs goto out;
254 1.1 jmmv }
255 1.1 jmmv }
256 1.1 jmmv
257 1.5 yamt KASSERT(ne != NULL);
258 1.5 yamt KASSERT(ne->ne_mount == mp);
259 1.5 yamt
260 1.1 jmmv /*
261 1.1 jmmv * XXX: The part marked as 'notyet' works fine from the kernel's
262 1.1 jmmv * point of view, in the sense that it is able to atomically update
263 1.1 jmmv * the complete exports list for a file system. However, supporting
264 1.1 jmmv * this in mountd(8) requires a lot of work; so, for now, keep the
265 1.1 jmmv * old behavior of updating a single entry per call.
266 1.1 jmmv *
267 1.1 jmmv * When mountd(8) is fixed, just remove the second branch of this
268 1.1 jmmv * preprocessor conditional and enable the first one.
269 1.1 jmmv */
270 1.1 jmmv #ifdef notyet
271 1.12 yamt netexport_clear(ne);
272 1.1 jmmv for (i = 0; error == 0 && i < mel->mel_nexports; i++)
273 1.5 yamt error = export(ne, &mel->mel_exports[i]);
274 1.1 jmmv #else
275 1.1 jmmv if (mel->mel_nexports == 0)
276 1.12 yamt netexport_clear(ne);
277 1.1 jmmv else if (mel->mel_nexports == 1)
278 1.5 yamt error = export(ne, &mel->mel_exports[0]);
279 1.1 jmmv else {
280 1.1 jmmv printf("mountd_set_exports_list: Cannot set more than one "
281 1.1 jmmv "entry at once (unimplemented)\n");
282 1.1 jmmv error = EOPNOTSUPP;
283 1.1 jmmv }
284 1.1 jmmv #endif
285 1.1 jmmv
286 1.25 chs out:
287 1.8 yamt netexport_wrunlock();
288 1.36 ad vfs_unbusy(mp, false, NULL);
289 1.4 yamt return error;
290 1.1 jmmv }
291 1.1 jmmv
292 1.5 yamt static void
293 1.5 yamt netexport_insert(struct netexport *ne)
294 1.5 yamt {
295 1.5 yamt
296 1.5 yamt CIRCLEQ_INSERT_HEAD(&netexport_list, ne, ne_list);
297 1.5 yamt }
298 1.5 yamt
299 1.5 yamt static void
300 1.5 yamt netexport_remove(struct netexport *ne)
301 1.5 yamt {
302 1.5 yamt
303 1.5 yamt CIRCLEQ_REMOVE(&netexport_list, ne, ne_list);
304 1.5 yamt }
305 1.5 yamt
306 1.5 yamt static struct netexport *
307 1.5 yamt netexport_lookup(const struct mount *mp)
308 1.5 yamt {
309 1.5 yamt struct netexport *ne;
310 1.5 yamt
311 1.5 yamt CIRCLEQ_FOREACH(ne, &netexport_list, ne_list) {
312 1.5 yamt if (ne->ne_mount == mp) {
313 1.5 yamt goto done;
314 1.5 yamt }
315 1.5 yamt }
316 1.5 yamt ne = NULL;
317 1.5 yamt done:
318 1.5 yamt return ne;
319 1.5 yamt }
320 1.5 yamt
321 1.5 yamt static struct netexport *
322 1.5 yamt netexport_lookup_byfsid(const fsid_t *fsid)
323 1.5 yamt {
324 1.5 yamt struct netexport *ne;
325 1.5 yamt
326 1.5 yamt CIRCLEQ_FOREACH(ne, &netexport_list, ne_list) {
327 1.5 yamt const struct mount *mp = ne->ne_mount;
328 1.5 yamt
329 1.5 yamt if (mp->mnt_stat.f_fsidx.__fsid_val[0] == fsid->__fsid_val[0] &&
330 1.5 yamt mp->mnt_stat.f_fsidx.__fsid_val[1] == fsid->__fsid_val[1]) {
331 1.5 yamt goto done;
332 1.5 yamt }
333 1.5 yamt }
334 1.5 yamt ne = NULL;
335 1.5 yamt done:
336 1.5 yamt
337 1.5 yamt return ne;
338 1.5 yamt }
339 1.5 yamt
340 1.1 jmmv /*
341 1.1 jmmv * Check if the file system specified by the 'mp' mount structure is
342 1.1 jmmv * exported to a client with 'anon' anonymous credentials. The 'mb'
343 1.1 jmmv * argument is an mbuf containing the network address of the client.
344 1.1 jmmv * The return parameters for the export flags for the client are returned
345 1.1 jmmv * in the address specified by 'wh'.
346 1.1 jmmv *
347 1.1 jmmv * This function is used exclusively by the NFS server. It is generally
348 1.1 jmmv * invoked before VFS_FHTOVP to validate that client has access to the
349 1.1 jmmv * file system.
350 1.1 jmmv */
351 1.5 yamt
352 1.1 jmmv int
353 1.5 yamt netexport_check(const fsid_t *fsid, struct mbuf *mb, struct mount **mpp,
354 1.11 elad int *wh, kauth_cred_t *anon)
355 1.1 jmmv {
356 1.5 yamt struct netexport *ne;
357 1.1 jmmv struct netcred *np;
358 1.1 jmmv
359 1.5 yamt ne = netexport_lookup_byfsid(fsid);
360 1.5 yamt if (ne == NULL) {
361 1.5 yamt return EACCES;
362 1.1 jmmv }
363 1.5 yamt np = netcred_lookup(ne, mb);
364 1.5 yamt if (np == NULL) {
365 1.1 jmmv return EACCES;
366 1.5 yamt }
367 1.1 jmmv
368 1.5 yamt *mpp = ne->ne_mount;
369 1.5 yamt *wh = np->netc_exflags;
370 1.11 elad *anon = np->netc_anon;
371 1.1 jmmv
372 1.5 yamt return 0;
373 1.1 jmmv }
374 1.1 jmmv
375 1.3 jmmv /*
376 1.3 jmmv * Handles legacy export requests. In this case, the export information
377 1.3 jmmv * is hardcoded in a specific place of the mount arguments structure (given
378 1.3 jmmv * in data); the request for an update is given through the fspec field
379 1.3 jmmv * (also in a known location), which must be a null pointer.
380 1.3 jmmv *
381 1.3 jmmv * Returns EJUSTRETURN if the given command was not a export request.
382 1.3 jmmv * Otherwise, returns 0 on success or an appropriate error code otherwise.
383 1.3 jmmv */
384 1.40 ad static int
385 1.40 ad nfs_export_update_30(struct mount *mp, const char *path, void *data)
386 1.3 jmmv {
387 1.3 jmmv struct mountd_exports_list mel;
388 1.40 ad struct mnt_export_args30 *args;
389 1.3 jmmv
390 1.40 ad args = data;
391 1.3 jmmv mel.mel_path = path;
392 1.3 jmmv
393 1.30 dsl if (args->fspec != NULL)
394 1.3 jmmv return EJUSTRETURN;
395 1.3 jmmv
396 1.30 dsl if (args->eargs.ex_flags & 0x00020000) {
397 1.3 jmmv /* Request to delete exports. The mask above holds the
398 1.3 jmmv * value that used to be in MNT_DELEXPORT. */
399 1.3 jmmv mel.mel_nexports = 0;
400 1.3 jmmv } else {
401 1.3 jmmv /* The following assumes export_args has not changed since
402 1.30 dsl * export_args30 - typedef checks sizes. */
403 1.30 dsl typedef char x[sizeof args->eargs == sizeof *mel.mel_exports ? 1 : -1];
404 1.3 jmmv
405 1.3 jmmv mel.mel_nexports = 1;
406 1.30 dsl mel.mel_exports = (void *)&args->eargs;
407 1.3 jmmv }
408 1.3 jmmv
409 1.40 ad return mountd_set_exports_list(&mel, curlwp);
410 1.3 jmmv }
411 1.3 jmmv
412 1.1 jmmv /*
413 1.1 jmmv * INTERNAL FUNCTIONS
414 1.1 jmmv */
415 1.1 jmmv
416 1.1 jmmv /*
417 1.1 jmmv * Initializes NFS exports for the file system given in 'mp' if it supports
418 1.1 jmmv * file handles; this is determined by checking whether mp's vfs_vptofh and
419 1.1 jmmv * vfs_fhtovp operations are NULL or not.
420 1.1 jmmv *
421 1.1 jmmv * If successful, returns 0 and sets *mnpp to the address of the new
422 1.20 jmmv * mount_netexport_pair item; otherwise returns an appropriate error code
423 1.1 jmmv * and *mnpp remains unmodified.
424 1.1 jmmv */
425 1.1 jmmv static int
426 1.5 yamt init_exports(struct mount *mp, struct netexport **nep)
427 1.1 jmmv {
428 1.1 jmmv int error;
429 1.1 jmmv struct export_args ea;
430 1.5 yamt struct netexport *ne;
431 1.1 jmmv
432 1.1 jmmv KASSERT(mp != NULL);
433 1.1 jmmv
434 1.1 jmmv /* Ensure that we do not already have this mount point. */
435 1.5 yamt KASSERT(netexport_lookup(mp) == NULL);
436 1.1 jmmv
437 1.5 yamt ne = malloc(sizeof(*ne), M_NFS_EXPORT, M_WAITOK | M_ZERO);
438 1.5 yamt ne->ne_mount = mp;
439 1.1 jmmv
440 1.1 jmmv /* Set the default export entry. Handled internally by export upon
441 1.1 jmmv * first call. */
442 1.1 jmmv memset(&ea, 0, sizeof(ea));
443 1.1 jmmv ea.ex_root = -2;
444 1.1 jmmv if (mp->mnt_flag & MNT_RDONLY)
445 1.1 jmmv ea.ex_flags |= MNT_EXRDONLY;
446 1.5 yamt error = export(ne, &ea);
447 1.5 yamt if (error != 0) {
448 1.5 yamt free(ne, M_NFS_EXPORT);
449 1.5 yamt } else {
450 1.5 yamt netexport_insert(ne);
451 1.5 yamt *nep = ne;
452 1.1 jmmv }
453 1.1 jmmv
454 1.1 jmmv return error;
455 1.1 jmmv }
456 1.1 jmmv
457 1.1 jmmv /*
458 1.1 jmmv * Build hash lists of net addresses and hang them off the mount point.
459 1.1 jmmv * Called by export() to set up a new entry in the lists of export
460 1.1 jmmv * addresses.
461 1.1 jmmv */
462 1.1 jmmv static int
463 1.1 jmmv hang_addrlist(struct mount *mp, struct netexport *nep,
464 1.1 jmmv const struct export_args *argp)
465 1.1 jmmv {
466 1.1 jmmv int error, i;
467 1.1 jmmv struct netcred *np, *enp;
468 1.1 jmmv struct radix_node_head *rnh;
469 1.1 jmmv struct sockaddr *saddr, *smask;
470 1.1 jmmv struct domain *dom;
471 1.1 jmmv
472 1.1 jmmv smask = NULL;
473 1.1 jmmv
474 1.1 jmmv if (argp->ex_addrlen == 0) {
475 1.1 jmmv if (mp->mnt_flag & MNT_DEFEXPORTED)
476 1.1 jmmv return EPERM;
477 1.1 jmmv np = &nep->ne_defexported;
478 1.13 yamt KASSERT(np->netc_anon == NULL);
479 1.13 yamt np->netc_anon = kauth_cred_alloc();
480 1.1 jmmv np->netc_exflags = argp->ex_flags;
481 1.18 pooka kauth_uucred_to_cred(np->netc_anon, &argp->ex_anon);
482 1.1 jmmv mp->mnt_flag |= MNT_DEFEXPORTED;
483 1.1 jmmv return 0;
484 1.1 jmmv }
485 1.1 jmmv
486 1.1 jmmv if (argp->ex_addrlen > MLEN || argp->ex_masklen > MLEN)
487 1.1 jmmv return EINVAL;
488 1.1 jmmv
489 1.1 jmmv i = sizeof(struct netcred) + argp->ex_addrlen + argp->ex_masklen;
490 1.5 yamt np = malloc(i, M_NETADDR, M_WAITOK | M_ZERO);
491 1.13 yamt np->netc_anon = kauth_cred_alloc();
492 1.1 jmmv saddr = (struct sockaddr *)(np + 1);
493 1.5 yamt error = copyin(argp->ex_addr, saddr, argp->ex_addrlen);
494 1.1 jmmv if (error)
495 1.1 jmmv goto out;
496 1.1 jmmv if (saddr->sa_len > argp->ex_addrlen)
497 1.1 jmmv saddr->sa_len = argp->ex_addrlen;
498 1.1 jmmv if (sacheck(saddr) == -1)
499 1.1 jmmv return EINVAL;
500 1.1 jmmv if (argp->ex_masklen) {
501 1.27 christos smask = (struct sockaddr *)((char *)saddr + argp->ex_addrlen);
502 1.5 yamt error = copyin(argp->ex_mask, smask, argp->ex_masklen);
503 1.1 jmmv if (error)
504 1.1 jmmv goto out;
505 1.1 jmmv if (smask->sa_len > argp->ex_masklen)
506 1.1 jmmv smask->sa_len = argp->ex_masklen;
507 1.1 jmmv if (smask->sa_family != saddr->sa_family)
508 1.1 jmmv return EINVAL;
509 1.1 jmmv if (sacheck(smask) == -1)
510 1.1 jmmv return EINVAL;
511 1.1 jmmv }
512 1.1 jmmv i = saddr->sa_family;
513 1.1 jmmv if ((rnh = nep->ne_rtable[i]) == 0) {
514 1.1 jmmv /*
515 1.1 jmmv * Seems silly to initialize every AF when most are not
516 1.1 jmmv * used, do so on demand here
517 1.1 jmmv */
518 1.1 jmmv DOMAIN_FOREACH(dom) {
519 1.1 jmmv if (dom->dom_family == i && dom->dom_rtattach) {
520 1.1 jmmv dom->dom_rtattach((void **)&nep->ne_rtable[i],
521 1.1 jmmv dom->dom_rtoffset);
522 1.1 jmmv break;
523 1.1 jmmv }
524 1.1 jmmv }
525 1.1 jmmv if ((rnh = nep->ne_rtable[i]) == 0) {
526 1.1 jmmv error = ENOBUFS;
527 1.1 jmmv goto out;
528 1.1 jmmv }
529 1.1 jmmv }
530 1.1 jmmv
531 1.1 jmmv enp = (struct netcred *)(*rnh->rnh_addaddr)(saddr, smask, rnh,
532 1.1 jmmv np->netc_rnodes);
533 1.1 jmmv if (enp != np) {
534 1.1 jmmv if (enp == NULL) {
535 1.1 jmmv enp = (struct netcred *)(*rnh->rnh_lookup)(saddr,
536 1.1 jmmv smask, rnh);
537 1.1 jmmv if (enp == NULL) {
538 1.1 jmmv error = EPERM;
539 1.1 jmmv goto out;
540 1.1 jmmv }
541 1.1 jmmv } else
542 1.1 jmmv enp->netc_refcnt++;
543 1.1 jmmv
544 1.1 jmmv goto check;
545 1.1 jmmv } else
546 1.1 jmmv enp->netc_refcnt = 1;
547 1.1 jmmv
548 1.1 jmmv np->netc_exflags = argp->ex_flags;
549 1.18 pooka kauth_uucred_to_cred(np->netc_anon, &argp->ex_anon);
550 1.1 jmmv return 0;
551 1.1 jmmv check:
552 1.1 jmmv if (enp->netc_exflags != argp->ex_flags ||
553 1.11 elad kauth_cred_uucmp(enp->netc_anon, &argp->ex_anon) != 0)
554 1.1 jmmv error = EPERM;
555 1.1 jmmv else
556 1.1 jmmv error = 0;
557 1.1 jmmv out:
558 1.13 yamt KASSERT(np->netc_anon != NULL);
559 1.13 yamt kauth_cred_free(np->netc_anon);
560 1.1 jmmv free(np, M_NETADDR);
561 1.1 jmmv return error;
562 1.1 jmmv }
563 1.1 jmmv
564 1.1 jmmv /*
565 1.1 jmmv * Ensure that the address stored in 'sa' is valid.
566 1.1 jmmv * Returns zero on success, otherwise -1.
567 1.1 jmmv */
568 1.1 jmmv static int
569 1.1 jmmv sacheck(struct sockaddr *sa)
570 1.1 jmmv {
571 1.1 jmmv
572 1.1 jmmv switch (sa->sa_family) {
573 1.1 jmmv case AF_INET: {
574 1.1 jmmv struct sockaddr_in *sin = (struct sockaddr_in *)sa;
575 1.1 jmmv char *p = (char *)sin->sin_zero;
576 1.1 jmmv size_t i;
577 1.1 jmmv
578 1.1 jmmv if (sin->sin_len != sizeof(*sin))
579 1.1 jmmv return -1;
580 1.1 jmmv if (sin->sin_port != 0)
581 1.1 jmmv return -1;
582 1.1 jmmv for (i = 0; i < sizeof(sin->sin_zero); i++)
583 1.1 jmmv if (*p++ != '\0')
584 1.1 jmmv return -1;
585 1.1 jmmv return 0;
586 1.1 jmmv }
587 1.1 jmmv case AF_INET6: {
588 1.1 jmmv struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sa;
589 1.1 jmmv
590 1.1 jmmv if (sin6->sin6_len != sizeof(*sin6))
591 1.1 jmmv return -1;
592 1.1 jmmv if (sin6->sin6_port != 0)
593 1.1 jmmv return -1;
594 1.1 jmmv return 0;
595 1.1 jmmv }
596 1.1 jmmv default:
597 1.1 jmmv return -1;
598 1.1 jmmv }
599 1.1 jmmv }
600 1.1 jmmv
601 1.1 jmmv /*
602 1.1 jmmv * Free the netcred object pointed to by the 'rn' radix node.
603 1.1 jmmv * 'w' holds a pointer to the radix tree head.
604 1.1 jmmv */
605 1.1 jmmv static int
606 1.1 jmmv free_netcred(struct radix_node *rn, void *w)
607 1.1 jmmv {
608 1.1 jmmv struct radix_node_head *rnh = (struct radix_node_head *)w;
609 1.1 jmmv struct netcred *np = (struct netcred *)(void *)rn;
610 1.1 jmmv
611 1.1 jmmv (*rnh->rnh_deladdr)(rn->rn_key, rn->rn_mask, rnh);
612 1.13 yamt if (--(np->netc_refcnt) <= 0) {
613 1.13 yamt KASSERT(np->netc_anon != NULL);
614 1.13 yamt kauth_cred_free(np->netc_anon);
615 1.1 jmmv free(np, M_NETADDR);
616 1.13 yamt }
617 1.1 jmmv return 0;
618 1.1 jmmv }
619 1.1 jmmv
620 1.1 jmmv /*
621 1.1 jmmv * Clears the exports list for a given file system.
622 1.1 jmmv */
623 1.1 jmmv static void
624 1.12 yamt netexport_clear(struct netexport *ne)
625 1.1 jmmv {
626 1.5 yamt struct radix_node_head *rnh;
627 1.5 yamt struct mount *mp = ne->ne_mount;
628 1.1 jmmv int i;
629 1.1 jmmv
630 1.1 jmmv if (mp->mnt_flag & MNT_EXPUBLIC) {
631 1.1 jmmv setpublicfs(NULL, NULL, NULL);
632 1.1 jmmv mp->mnt_flag &= ~MNT_EXPUBLIC;
633 1.1 jmmv }
634 1.1 jmmv
635 1.1 jmmv for (i = 0; i <= AF_MAX; i++) {
636 1.5 yamt if ((rnh = ne->ne_rtable[i]) != NULL) {
637 1.28 dyoung rn_walktree(rnh, free_netcred, rnh);
638 1.5 yamt free(rnh, M_RTABLE);
639 1.5 yamt ne->ne_rtable[i] = NULL;
640 1.1 jmmv }
641 1.1 jmmv }
642 1.1 jmmv
643 1.13 yamt if ((mp->mnt_flag & MNT_DEFEXPORTED) != 0) {
644 1.13 yamt struct netcred *np = &ne->ne_defexported;
645 1.13 yamt
646 1.13 yamt KASSERT(np->netc_anon != NULL);
647 1.13 yamt kauth_cred_free(np->netc_anon);
648 1.13 yamt np->netc_anon = NULL;
649 1.13 yamt } else {
650 1.13 yamt KASSERT(ne->ne_defexported.netc_anon == NULL);
651 1.13 yamt }
652 1.13 yamt
653 1.1 jmmv mp->mnt_flag &= ~(MNT_EXPORTED | MNT_DEFEXPORTED);
654 1.1 jmmv }
655 1.1 jmmv
656 1.1 jmmv /*
657 1.1 jmmv * Add a new export entry (described by an export_args structure) to the
658 1.1 jmmv * given file system.
659 1.1 jmmv */
660 1.1 jmmv static int
661 1.5 yamt export(struct netexport *nep, const struct export_args *argp)
662 1.1 jmmv {
663 1.5 yamt struct mount *mp = nep->ne_mount;
664 1.1 jmmv int error;
665 1.1 jmmv
666 1.1 jmmv if (argp->ex_flags & MNT_EXPORTED) {
667 1.1 jmmv if (argp->ex_flags & MNT_EXPUBLIC) {
668 1.1 jmmv if ((error = setpublicfs(mp, nep, argp)) != 0)
669 1.1 jmmv return error;
670 1.1 jmmv mp->mnt_flag |= MNT_EXPUBLIC;
671 1.1 jmmv }
672 1.1 jmmv if ((error = hang_addrlist(mp, nep, argp)) != 0)
673 1.1 jmmv return error;
674 1.1 jmmv mp->mnt_flag |= MNT_EXPORTED;
675 1.1 jmmv }
676 1.1 jmmv return 0;
677 1.1 jmmv }
678 1.1 jmmv
679 1.1 jmmv /*
680 1.1 jmmv * Set the publicly exported filesystem (WebNFS). Currently, only
681 1.1 jmmv * one public filesystem is possible in the spec (RFC 2054 and 2055)
682 1.1 jmmv */
683 1.1 jmmv static int
684 1.22 yamt setpublicfs(struct mount *mp, struct netexport *nep,
685 1.1 jmmv const struct export_args *argp)
686 1.1 jmmv {
687 1.1 jmmv char *cp;
688 1.1 jmmv int error;
689 1.1 jmmv struct vnode *rvp;
690 1.15 martin size_t fhsize;
691 1.1 jmmv
692 1.1 jmmv /*
693 1.1 jmmv * mp == NULL -> invalidate the current info, the FS is
694 1.1 jmmv * no longer exported. May be called from either export
695 1.1 jmmv * or unmount, so check if it hasn't already been done.
696 1.1 jmmv */
697 1.1 jmmv if (mp == NULL) {
698 1.1 jmmv if (nfs_pub.np_valid) {
699 1.1 jmmv nfs_pub.np_valid = 0;
700 1.15 martin if (nfs_pub.np_handle != NULL) {
701 1.15 martin free(nfs_pub.np_handle, M_TEMP);
702 1.15 martin nfs_pub.np_handle = NULL;
703 1.15 martin }
704 1.1 jmmv if (nfs_pub.np_index != NULL) {
705 1.1 jmmv FREE(nfs_pub.np_index, M_TEMP);
706 1.1 jmmv nfs_pub.np_index = NULL;
707 1.1 jmmv }
708 1.1 jmmv }
709 1.1 jmmv return 0;
710 1.1 jmmv }
711 1.1 jmmv
712 1.1 jmmv /*
713 1.1 jmmv * Only one allowed at a time.
714 1.1 jmmv */
715 1.1 jmmv if (nfs_pub.np_valid != 0 && mp != nfs_pub.np_mount)
716 1.1 jmmv return EBUSY;
717 1.1 jmmv
718 1.1 jmmv /*
719 1.1 jmmv * Get real filehandle for root of exported FS.
720 1.1 jmmv */
721 1.1 jmmv if ((error = VFS_ROOT(mp, &rvp)))
722 1.1 jmmv return error;
723 1.1 jmmv
724 1.15 martin fhsize = 0;
725 1.15 martin error = vfs_composefh(rvp, NULL, &fhsize);
726 1.15 martin if (error != E2BIG)
727 1.15 martin return error;
728 1.15 martin nfs_pub.np_handle = malloc(fhsize, M_TEMP, M_NOWAIT);
729 1.15 martin if (nfs_pub.np_handle == NULL)
730 1.15 martin error = ENOMEM;
731 1.15 martin else
732 1.15 martin error = vfs_composefh(rvp, nfs_pub.np_handle, &fhsize);
733 1.14 yamt if (error)
734 1.1 jmmv return error;
735 1.1 jmmv
736 1.1 jmmv vput(rvp);
737 1.1 jmmv
738 1.1 jmmv /*
739 1.1 jmmv * If an indexfile was specified, pull it in.
740 1.1 jmmv */
741 1.1 jmmv if (argp->ex_indexfile != NULL) {
742 1.1 jmmv MALLOC(nfs_pub.np_index, char *, MAXNAMLEN + 1, M_TEMP,
743 1.1 jmmv M_WAITOK);
744 1.1 jmmv error = copyinstr(argp->ex_indexfile, nfs_pub.np_index,
745 1.1 jmmv MAXNAMLEN, (size_t *)0);
746 1.1 jmmv if (!error) {
747 1.1 jmmv /*
748 1.1 jmmv * Check for illegal filenames.
749 1.1 jmmv */
750 1.1 jmmv for (cp = nfs_pub.np_index; *cp; cp++) {
751 1.1 jmmv if (*cp == '/') {
752 1.1 jmmv error = EINVAL;
753 1.1 jmmv break;
754 1.1 jmmv }
755 1.1 jmmv }
756 1.1 jmmv }
757 1.1 jmmv if (error) {
758 1.1 jmmv FREE(nfs_pub.np_index, M_TEMP);
759 1.1 jmmv return error;
760 1.1 jmmv }
761 1.1 jmmv }
762 1.1 jmmv
763 1.1 jmmv nfs_pub.np_mount = mp;
764 1.1 jmmv nfs_pub.np_valid = 1;
765 1.1 jmmv return 0;
766 1.1 jmmv }
767 1.1 jmmv
768 1.1 jmmv /*
769 1.1 jmmv * Lookup an export entry in the exports list that matches the address
770 1.1 jmmv * stored in 'nam'. If no entry is found, the default one is used instead
771 1.1 jmmv * (if available).
772 1.1 jmmv */
773 1.1 jmmv static struct netcred *
774 1.5 yamt netcred_lookup(struct netexport *ne, struct mbuf *nam)
775 1.1 jmmv {
776 1.1 jmmv struct netcred *np;
777 1.1 jmmv struct radix_node_head *rnh;
778 1.1 jmmv struct sockaddr *saddr;
779 1.1 jmmv
780 1.7 yamt if ((ne->ne_mount->mnt_flag & MNT_EXPORTED) == 0) {
781 1.7 yamt return NULL;
782 1.7 yamt }
783 1.5 yamt
784 1.5 yamt /*
785 1.5 yamt * Lookup in the export list first.
786 1.5 yamt */
787 1.1 jmmv np = NULL;
788 1.5 yamt if (nam != NULL) {
789 1.5 yamt saddr = mtod(nam, struct sockaddr *);
790 1.5 yamt rnh = ne->ne_rtable[saddr->sa_family];
791 1.5 yamt if (rnh != NULL) {
792 1.5 yamt np = (struct netcred *)
793 1.27 christos (*rnh->rnh_matchaddr)((void *)saddr,
794 1.5 yamt rnh);
795 1.5 yamt if (np && np->netc_rnodes->rn_flags & RNF_ROOT)
796 1.5 yamt np = NULL;
797 1.1 jmmv }
798 1.1 jmmv }
799 1.5 yamt /*
800 1.5 yamt * If no address match, use the default if it exists.
801 1.5 yamt */
802 1.5 yamt if (np == NULL && ne->ne_mount->mnt_flag & MNT_DEFEXPORTED)
803 1.5 yamt np = &ne->ne_defexported;
804 1.5 yamt
805 1.1 jmmv return np;
806 1.1 jmmv }
807 1.8 yamt
808 1.29 ad krwlock_t netexport_lock;
809 1.8 yamt
810 1.8 yamt void
811 1.8 yamt netexport_rdlock(void)
812 1.8 yamt {
813 1.8 yamt
814 1.29 ad rw_enter(&netexport_lock, RW_READER);
815 1.8 yamt }
816 1.8 yamt
817 1.8 yamt void
818 1.8 yamt netexport_rdunlock(void)
819 1.8 yamt {
820 1.8 yamt
821 1.29 ad rw_exit(&netexport_lock);
822 1.8 yamt }
823 1.8 yamt
824 1.8 yamt static void
825 1.8 yamt netexport_wrlock(void)
826 1.8 yamt {
827 1.8 yamt
828 1.29 ad rw_enter(&netexport_lock, RW_WRITER);
829 1.8 yamt }
830 1.8 yamt
831 1.8 yamt static void
832 1.8 yamt netexport_wrunlock(void)
833 1.8 yamt {
834 1.8 yamt
835 1.29 ad rw_exit(&netexport_lock);
836 1.8 yamt }
837