The Design and Implementation of the FreeBSD Operating System, Second Edition
Now available: The Design and Implementation of the FreeBSD Operating System (Second Edition)


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]

FreeBSD/Linux Kernel Cross Reference
sys/nfs/nfs_export.c

Version: -  FREEBSD  -  FREEBSD-13-STABLE  -  FREEBSD-13-0  -  FREEBSD-12-STABLE  -  FREEBSD-12-0  -  FREEBSD-11-STABLE  -  FREEBSD-11-0  -  FREEBSD-10-STABLE  -  FREEBSD-10-0  -  FREEBSD-9-STABLE  -  FREEBSD-9-0  -  FREEBSD-8-STABLE  -  FREEBSD-8-0  -  FREEBSD-7-STABLE  -  FREEBSD-7-0  -  FREEBSD-6-STABLE  -  FREEBSD-6-0  -  FREEBSD-5-STABLE  -  FREEBSD-5-0  -  FREEBSD-4-STABLE  -  FREEBSD-3-STABLE  -  FREEBSD22  -  l41  -  OPENBSD  -  linux-2.6  -  MK84  -  PLAN9  -  xnu-8792 
SearchContext: -  none  -  3  -  10 

    1 /*      $NetBSD: nfs_export.c,v 1.38 2008/05/10 02:26:10 rumble Exp $   */
    2 
    3 /*-
    4  * Copyright (c) 1997, 1998, 2004, 2005, 2008 The NetBSD Foundation, Inc.
    5  * All rights reserved.
    6  *
    7  * This code is derived from software contributed to The NetBSD Foundation
    8  * by Jason R. Thorpe of the Numerical Aerospace Simulation Facility,
    9  * NASA Ames Research Center.
   10  * This code is derived from software contributed to The NetBSD Foundation
   11  * by Charles M. Hannum.
   12  * This code is derived from software contributed to The NetBSD Foundation
   13  * by Julio M. Merino Vidal.
   14  *
   15  * Redistribution and use in source and binary forms, with or without
   16  * modification, are permitted provided that the following conditions
   17  * are met:
   18  * 1. Redistributions of source code must retain the above copyright
   19  *    notice, this list of conditions and the following disclaimer.
   20  * 2. Redistributions in binary form must reproduce the above copyright
   21  *    notice, this list of conditions and the following disclaimer in the
   22  *    documentation and/or other materials provided with the distribution.
   23  *
   24  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
   25  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
   26  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
   27  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
   28  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
   29  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
   30  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
   31  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
   32  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
   33  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
   34  * POSSIBILITY OF SUCH DAMAGE.
   35  */
   36 
   37 /*
   38  * Copyright (c) 1989, 1993
   39  *      The Regents of the University of California.  All rights reserved.
   40  * (c) UNIX System Laboratories, Inc.
   41  * All or some portions of this file are derived from material licensed
   42  * to the University of California by American Telephone and Telegraph
   43  * Co. or Unix System Laboratories, Inc. and are reproduced herein with
   44  * the permission of UNIX System Laboratories, Inc.
   45  *
   46  * Redistribution and use in source and binary forms, with or without
   47  * modification, are permitted provided that the following conditions
   48  * are met:
   49  * 1. Redistributions of source code must retain the above copyright
   50  *    notice, this list of conditions and the following disclaimer.
   51  * 2. Redistributions in binary form must reproduce the above copyright
   52  *    notice, this list of conditions and the following disclaimer in the
   53  *    documentation and/or other materials provided with the distribution.
   54  * 3. Neither the name of the University nor the names of its contributors
   55  *    may be used to endorse or promote products derived from this software
   56  *    without specific prior written permission.
   57  *
   58  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
   59  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
   60  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
   61  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
   62  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   63  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
   64  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
   65  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
   66  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
   67  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
   68  * SUCH DAMAGE.
   69  *
   70  *      @(#)vfs_subr.c  8.13 (Berkeley) 4/18/94
   71  */
   72 
   73 /*
   74  * VFS exports list management.
   75  */
   76 
   77 #include <sys/cdefs.h>
   78 __KERNEL_RCSID(0, "$NetBSD: nfs_export.c,v 1.38 2008/05/10 02:26:10 rumble Exp $");
   79 
   80 #include "opt_compat_netbsd.h"
   81 #include "opt_inet.h"
   82 
   83 #include <sys/param.h>
   84 #include <sys/systm.h>
   85 #include <sys/queue.h>
   86 #include <sys/proc.h>
   87 #include <sys/mount.h>
   88 #include <sys/vnode.h>
   89 #include <sys/namei.h>
   90 #include <sys/errno.h>
   91 #include <sys/malloc.h>
   92 #include <sys/domain.h>
   93 #include <sys/mbuf.h>
   94 #include <sys/dirent.h>
   95 #include <sys/socket.h>         /* XXX for AF_MAX */
   96 #include <sys/kauth.h>
   97 
   98 #include <net/radix.h>
   99 
  100 #include <netinet/in.h>
  101 
  102 #include <nfs/rpcv2.h>
  103 #include <nfs/nfsproto.h>
  104 #include <nfs/nfs.h>
  105 #include <nfs/nfs_var.h>
  106 
  107 /*
  108  * Network address lookup element.
  109  */
  110 struct netcred {
  111         struct  radix_node netc_rnodes[2];
  112         int     netc_refcnt;
  113         int     netc_exflags;
  114         kauth_cred_t netc_anon;
  115 };
  116 
  117 /*
  118  * Network export information.
  119  */
  120 struct netexport {
  121         CIRCLEQ_ENTRY(netexport) ne_list;
  122         struct mount *ne_mount;
  123         struct netcred ne_defexported;                /* Default export */
  124         struct radix_node_head *ne_rtable[AF_MAX+1]; /* Individual exports */
  125 };
  126 CIRCLEQ_HEAD(, netexport) netexport_list =
  127     CIRCLEQ_HEAD_INITIALIZER(netexport_list);
  128 
  129 /* Malloc type used by the mount<->netexport map. */
  130 MALLOC_DEFINE(M_NFS_EXPORT, "nfs_export", "NFS export data");
  131 
  132 /* Publicly exported file system. */
  133 struct nfs_public nfs_pub;
  134 
  135 /*
  136  * Local prototypes.
  137  */
  138 static int init_exports(struct mount *, struct netexport **);
  139 static int hang_addrlist(struct mount *, struct netexport *,
  140     const struct export_args *);
  141 static int sacheck(struct sockaddr *);
  142 static int free_netcred(struct radix_node *, void *);
  143 static int export(struct netexport *, const struct export_args *);
  144 static int setpublicfs(struct mount *, struct netexport *,
  145     const struct export_args *);
  146 static struct netcred *netcred_lookup(struct netexport *, struct mbuf *);
  147 static struct netexport *netexport_lookup(const struct mount *);
  148 static struct netexport *netexport_lookup_byfsid(const fsid_t *);
  149 static void netexport_clear(struct netexport *);
  150 static void netexport_insert(struct netexport *);
  151 static void netexport_remove(struct netexport *);
  152 static void netexport_wrlock(void);
  153 static void netexport_wrunlock(void);
  154 
  155 /*
  156  * PUBLIC INTERFACE
  157  */
  158 
  159 /*
  160  * Declare and initialize the file system export hooks.
  161  */
  162 static void nfs_export_unmount(struct mount *);
  163 
  164 struct vfs_hooks nfs_export_hooks = {
  165         nfs_export_unmount,
  166         { NULL, NULL }
  167 };
  168 
  169 /*
  170  * VFS unmount hook for NFS exports.
  171  *
  172  * Releases NFS exports list resources if the given mount point has some.
  173  * As allocation happens lazily, it may be that it doesn't has this
  174  * information, although it theorically should.
  175  */
  176 static void
  177 nfs_export_unmount(struct mount *mp)
  178 {
  179         struct netexport *ne;
  180 
  181         KASSERT(mp != NULL);
  182 
  183         netexport_wrlock();
  184         ne = netexport_lookup(mp);
  185         if (ne == NULL) {
  186                 netexport_wrunlock();
  187                 return;
  188         }
  189         netexport_clear(ne);
  190         netexport_remove(ne);
  191         netexport_wrunlock();
  192         free(ne, M_NFS_EXPORT);
  193 }
  194 
  195 /*
  196  * Atomically set the NFS exports list of the given file system, replacing
  197  * it with a new list of entries.
  198  *
  199  * Returns zero on success or an appropriate error code otherwise.
  200  *
  201  * Helper function for the nfssvc(2) system call (NFSSVC_SETEXPORTSLIST
  202  * command).
  203  */
  204 int
  205 mountd_set_exports_list(const struct mountd_exports_list *mel, struct lwp *l)
  206 {
  207         int error;
  208 #ifdef notyet
  209         /* XXX: See below to see the reason why this is disabled. */
  210         size_t i;
  211 #endif
  212         struct mount *mp;
  213         struct netexport *ne;
  214         struct nameidata nd;
  215         struct vnode *vp;
  216         struct fid *fid;
  217         size_t fid_size;
  218 
  219         if (kauth_authorize_network(l->l_cred, KAUTH_NETWORK_NFS,
  220             KAUTH_REQ_NETWORK_NFS_EXPORT, NULL, NULL, NULL) != 0)
  221                 return EPERM;
  222 
  223         /* Lookup the file system path. */
  224         NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, UIO_USERSPACE, mel->mel_path);
  225         error = namei(&nd);
  226         if (error != 0)
  227                 return error;
  228         vp = nd.ni_vp;
  229         mp = vp->v_mount;
  230 
  231         fid_size = 0;
  232         if ((error = VFS_VPTOFH(vp, NULL, &fid_size)) == E2BIG) {
  233                 fid = malloc(fid_size, M_TEMP, M_NOWAIT);
  234                 if (fid != NULL) {
  235                         error = VFS_VPTOFH(vp, fid, &fid_size);
  236                         free(fid, M_TEMP);
  237                 }
  238         }
  239         if (error != 0) {
  240                 vput(vp);
  241                 return EOPNOTSUPP;
  242         }
  243 
  244         /* Mark the file system busy. */
  245         error = vfs_busy(mp, NULL);
  246         vput(vp);
  247         if (error != 0)
  248                 return error;
  249 
  250         netexport_wrlock();
  251         ne = netexport_lookup(mp);
  252         if (ne == NULL) {
  253                 error = init_exports(mp, &ne);
  254                 if (error != 0) {
  255                         goto out;
  256                 }
  257         }
  258 
  259         KASSERT(ne != NULL);
  260         KASSERT(ne->ne_mount == mp);
  261 
  262         /*
  263          * XXX: The part marked as 'notyet' works fine from the kernel's
  264          * point of view, in the sense that it is able to atomically update
  265          * the complete exports list for a file system.  However, supporting
  266          * this in mountd(8) requires a lot of work; so, for now, keep the
  267          * old behavior of updating a single entry per call.
  268          *
  269          * When mountd(8) is fixed, just remove the second branch of this
  270          * preprocessor conditional and enable the first one.
  271          */
  272 #ifdef notyet
  273         netexport_clear(ne);
  274         for (i = 0; error == 0 && i < mel->mel_nexports; i++)
  275                 error = export(ne, &mel->mel_exports[i]);
  276 #else
  277         if (mel->mel_nexports == 0)
  278                 netexport_clear(ne);
  279         else if (mel->mel_nexports == 1)
  280                 error = export(ne, &mel->mel_exports[0]);
  281         else {
  282                 printf("mountd_set_exports_list: Cannot set more than one "
  283                     "entry at once (unimplemented)\n");
  284                 error = EOPNOTSUPP;
  285         }
  286 #endif
  287 
  288 out:
  289         netexport_wrunlock();
  290         vfs_unbusy(mp, false, NULL);
  291         return error;
  292 }
  293 
  294 static void
  295 netexport_insert(struct netexport *ne)
  296 {
  297 
  298         CIRCLEQ_INSERT_HEAD(&netexport_list, ne, ne_list);
  299 }
  300 
  301 static void
  302 netexport_remove(struct netexport *ne)
  303 {
  304 
  305         CIRCLEQ_REMOVE(&netexport_list, ne, ne_list);
  306 }
  307 
  308 static struct netexport *
  309 netexport_lookup(const struct mount *mp)
  310 {
  311         struct netexport *ne;
  312 
  313         CIRCLEQ_FOREACH(ne, &netexport_list, ne_list) {
  314                 if (ne->ne_mount == mp) {
  315                         goto done;
  316                 }
  317         }
  318         ne = NULL;
  319 done:
  320         return ne;
  321 }
  322 
  323 static struct netexport *
  324 netexport_lookup_byfsid(const fsid_t *fsid)
  325 {
  326         struct netexport *ne;
  327 
  328         CIRCLEQ_FOREACH(ne, &netexport_list, ne_list) {
  329                 const struct mount *mp = ne->ne_mount;
  330 
  331                 if (mp->mnt_stat.f_fsidx.__fsid_val[0] == fsid->__fsid_val[0] &&
  332                     mp->mnt_stat.f_fsidx.__fsid_val[1] == fsid->__fsid_val[1]) {
  333                         goto done;
  334                 }
  335         }
  336         ne = NULL;
  337 done:
  338 
  339         return ne;
  340 }
  341 
  342 /*
  343  * Check if the file system specified by the 'mp' mount structure is
  344  * exported to a client with 'anon' anonymous credentials.  The 'mb'
  345  * argument is an mbuf containing the network address of the client.
  346  * The return parameters for the export flags for the client are returned
  347  * in the address specified by 'wh'.
  348  *
  349  * This function is used exclusively by the NFS server.  It is generally
  350  * invoked before VFS_FHTOVP to validate that client has access to the
  351  * file system.
  352  */
  353 
  354 int
  355 netexport_check(const fsid_t *fsid, struct mbuf *mb, struct mount **mpp,
  356     int *wh, kauth_cred_t *anon)
  357 {
  358         struct netexport *ne;
  359         struct netcred *np;
  360 
  361         ne = netexport_lookup_byfsid(fsid);
  362         if (ne == NULL) {
  363                 return EACCES;
  364         }
  365         np = netcred_lookup(ne, mb);
  366         if (np == NULL) {
  367                 return EACCES;
  368         }
  369 
  370         *mpp = ne->ne_mount;
  371         *wh = np->netc_exflags;
  372         *anon = np->netc_anon;
  373 
  374         return 0;
  375 }
  376 
  377 #ifdef COMPAT_30
  378 /*
  379  * Handles legacy export requests.  In this case, the export information
  380  * is hardcoded in a specific place of the mount arguments structure (given
  381  * in data); the request for an update is given through the fspec field
  382  * (also in a known location), which must be a null pointer.
  383  *
  384  * Returns EJUSTRETURN if the given command was not a export request.
  385  * Otherwise, returns 0 on success or an appropriate error code otherwise.
  386  */
  387 int
  388 nfs_update_exports_30(struct mount *mp, const char *path,
  389     struct mnt_export_args30 *args, struct lwp *l)
  390 {
  391         struct mountd_exports_list mel;
  392 
  393         mel.mel_path = path;
  394 
  395         if (args->fspec != NULL)
  396                 return EJUSTRETURN;
  397 
  398         if (args->eargs.ex_flags & 0x00020000) {
  399                 /* Request to delete exports.  The mask above holds the
  400                  * value that used to be in MNT_DELEXPORT. */
  401                 mel.mel_nexports = 0;
  402         } else {
  403                 /* The following assumes export_args has not changed since
  404                  * export_args30 - typedef checks sizes. */
  405                 typedef char x[sizeof args->eargs == sizeof *mel.mel_exports ? 1 : -1];
  406 
  407                 mel.mel_nexports = 1;
  408                 mel.mel_exports = (void *)&args->eargs;
  409         }
  410 
  411         return mountd_set_exports_list(&mel, l);
  412 }
  413 #endif
  414 
  415 /*
  416  * INTERNAL FUNCTIONS
  417  */
  418 
  419 /*
  420  * Initializes NFS exports for the file system given in 'mp' if it supports
  421  * file handles; this is determined by checking whether mp's vfs_vptofh and
  422  * vfs_fhtovp operations are NULL or not.
  423  *
  424  * If successful, returns 0 and sets *mnpp to the address of the new
  425  * mount_netexport_pair item; otherwise returns an appropriate error code
  426  * and *mnpp remains unmodified.
  427  */
  428 static int
  429 init_exports(struct mount *mp, struct netexport **nep)
  430 {
  431         int error;
  432         struct export_args ea;
  433         struct netexport *ne;
  434 
  435         KASSERT(mp != NULL);
  436 
  437         /* Ensure that we do not already have this mount point. */
  438         KASSERT(netexport_lookup(mp) == NULL);
  439 
  440         ne = malloc(sizeof(*ne), M_NFS_EXPORT, M_WAITOK | M_ZERO);
  441         ne->ne_mount = mp;
  442 
  443         /* Set the default export entry.  Handled internally by export upon
  444          * first call. */
  445         memset(&ea, 0, sizeof(ea));
  446         ea.ex_root = -2;
  447         if (mp->mnt_flag & MNT_RDONLY)
  448                 ea.ex_flags |= MNT_EXRDONLY;
  449         error = export(ne, &ea);
  450         if (error != 0) {
  451                 free(ne, M_NFS_EXPORT);
  452         } else {
  453                 netexport_insert(ne);
  454                 *nep = ne;
  455         }
  456 
  457         return error;
  458 }
  459 
  460 /*
  461  * Build hash lists of net addresses and hang them off the mount point.
  462  * Called by export() to set up a new entry in the lists of export
  463  * addresses.
  464  */
  465 static int
  466 hang_addrlist(struct mount *mp, struct netexport *nep,
  467     const struct export_args *argp)
  468 {
  469         int error, i;
  470         struct netcred *np, *enp;
  471         struct radix_node_head *rnh;
  472         struct sockaddr *saddr, *smask;
  473         struct domain *dom;
  474 
  475         smask = NULL;
  476 
  477         if (argp->ex_addrlen == 0) {
  478                 if (mp->mnt_flag & MNT_DEFEXPORTED)
  479                         return EPERM;
  480                 np = &nep->ne_defexported;
  481                 KASSERT(np->netc_anon == NULL);
  482                 np->netc_anon = kauth_cred_alloc();
  483                 np->netc_exflags = argp->ex_flags;
  484                 kauth_uucred_to_cred(np->netc_anon, &argp->ex_anon);
  485                 mp->mnt_flag |= MNT_DEFEXPORTED;
  486                 return 0;
  487         }
  488 
  489         if (argp->ex_addrlen > MLEN || argp->ex_masklen > MLEN)
  490                 return EINVAL;
  491 
  492         i = sizeof(struct netcred) + argp->ex_addrlen + argp->ex_masklen;
  493         np = malloc(i, M_NETADDR, M_WAITOK | M_ZERO);
  494         np->netc_anon = kauth_cred_alloc();
  495         saddr = (struct sockaddr *)(np + 1);
  496         error = copyin(argp->ex_addr, saddr, argp->ex_addrlen);
  497         if (error)
  498                 goto out;
  499         if (saddr->sa_len > argp->ex_addrlen)
  500                 saddr->sa_len = argp->ex_addrlen;
  501         if (sacheck(saddr) == -1)
  502                 return EINVAL;
  503         if (argp->ex_masklen) {
  504                 smask = (struct sockaddr *)((char *)saddr + argp->ex_addrlen);
  505                 error = copyin(argp->ex_mask, smask, argp->ex_masklen);
  506                 if (error)
  507                         goto out;
  508                 if (smask->sa_len > argp->ex_masklen)
  509                         smask->sa_len = argp->ex_masklen;
  510                 if (smask->sa_family != saddr->sa_family)
  511                         return EINVAL;
  512                 if (sacheck(smask) == -1)
  513                         return EINVAL;
  514         }
  515         i = saddr->sa_family;
  516         if ((rnh = nep->ne_rtable[i]) == 0) {
  517                 /*
  518                  * Seems silly to initialize every AF when most are not
  519                  * used, do so on demand here
  520                  */
  521                 DOMAIN_FOREACH(dom) {
  522                         if (dom->dom_family == i && dom->dom_rtattach) {
  523                                 dom->dom_rtattach((void **)&nep->ne_rtable[i],
  524                                         dom->dom_rtoffset);
  525                                 break;
  526                         }
  527                 }
  528                 if ((rnh = nep->ne_rtable[i]) == 0) {
  529                         error = ENOBUFS;
  530                         goto out;
  531                 }
  532         }
  533 
  534         enp = (struct netcred *)(*rnh->rnh_addaddr)(saddr, smask, rnh,
  535             np->netc_rnodes);
  536         if (enp != np) {
  537                 if (enp == NULL) {
  538                         enp = (struct netcred *)(*rnh->rnh_lookup)(saddr,
  539                             smask, rnh);
  540                         if (enp == NULL) {
  541                                 error = EPERM;
  542                                 goto out;
  543                         }
  544                 } else
  545                         enp->netc_refcnt++;
  546 
  547                 goto check;
  548         } else
  549                 enp->netc_refcnt = 1;
  550 
  551         np->netc_exflags = argp->ex_flags;
  552         kauth_uucred_to_cred(np->netc_anon, &argp->ex_anon);
  553         return 0;
  554 check:
  555         if (enp->netc_exflags != argp->ex_flags ||
  556             kauth_cred_uucmp(enp->netc_anon, &argp->ex_anon) != 0)
  557                 error = EPERM;
  558         else
  559                 error = 0;
  560 out:
  561         KASSERT(np->netc_anon != NULL);
  562         kauth_cred_free(np->netc_anon);
  563         free(np, M_NETADDR);
  564         return error;
  565 }
  566 
  567 /*
  568  * Ensure that the address stored in 'sa' is valid.
  569  * Returns zero on success, otherwise -1.
  570  */
  571 static int
  572 sacheck(struct sockaddr *sa)
  573 {
  574 
  575         switch (sa->sa_family) {
  576 #ifdef INET
  577         case AF_INET: {
  578                 struct sockaddr_in *sin = (struct sockaddr_in *)sa;
  579                 char *p = (char *)sin->sin_zero;
  580                 size_t i;
  581 
  582                 if (sin->sin_len != sizeof(*sin))
  583                         return -1;
  584                 if (sin->sin_port != 0)
  585                         return -1;
  586                 for (i = 0; i < sizeof(sin->sin_zero); i++)
  587                         if (*p++ != '\0')
  588                                 return -1;
  589                 return 0;
  590         }
  591 #endif
  592 #ifdef INET6
  593         case AF_INET6: {
  594                 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sa;
  595 
  596                 if (sin6->sin6_len != sizeof(*sin6))
  597                         return -1;
  598                 if (sin6->sin6_port != 0)
  599                         return -1;
  600                 return 0;
  601         }
  602 #endif
  603         default:
  604                 return -1;
  605         }
  606 }
  607 
  608 /*
  609  * Free the netcred object pointed to by the 'rn' radix node.
  610  * 'w' holds a pointer to the radix tree head.
  611  */
  612 static int
  613 free_netcred(struct radix_node *rn, void *w)
  614 {
  615         struct radix_node_head *rnh = (struct radix_node_head *)w;
  616         struct netcred *np = (struct netcred *)(void *)rn;
  617 
  618         (*rnh->rnh_deladdr)(rn->rn_key, rn->rn_mask, rnh);
  619         if (--(np->netc_refcnt) <= 0) {
  620                 KASSERT(np->netc_anon != NULL);
  621                 kauth_cred_free(np->netc_anon);
  622                 free(np, M_NETADDR);
  623         }
  624         return 0;
  625 }
  626 
  627 /*
  628  * Clears the exports list for a given file system.
  629  */
  630 static void
  631 netexport_clear(struct netexport *ne)
  632 {
  633         struct radix_node_head *rnh;
  634         struct mount *mp = ne->ne_mount;
  635         int i;
  636 
  637         if (mp->mnt_flag & MNT_EXPUBLIC) {
  638                 setpublicfs(NULL, NULL, NULL);
  639                 mp->mnt_flag &= ~MNT_EXPUBLIC;
  640         }
  641 
  642         for (i = 0; i <= AF_MAX; i++) {
  643                 if ((rnh = ne->ne_rtable[i]) != NULL) {
  644                         rn_walktree(rnh, free_netcred, rnh);
  645                         free(rnh, M_RTABLE);
  646                         ne->ne_rtable[i] = NULL;
  647                 }
  648         }
  649 
  650         if ((mp->mnt_flag & MNT_DEFEXPORTED) != 0) {
  651                 struct netcred *np = &ne->ne_defexported;
  652 
  653                 KASSERT(np->netc_anon != NULL);
  654                 kauth_cred_free(np->netc_anon);
  655                 np->netc_anon = NULL;
  656         } else {
  657                 KASSERT(ne->ne_defexported.netc_anon == NULL);
  658         }
  659 
  660         mp->mnt_flag &= ~(MNT_EXPORTED | MNT_DEFEXPORTED);
  661 }
  662 
  663 /*
  664  * Add a new export entry (described by an export_args structure) to the
  665  * given file system.
  666  */
  667 static int
  668 export(struct netexport *nep, const struct export_args *argp)
  669 {
  670         struct mount *mp = nep->ne_mount;
  671         int error;
  672 
  673         if (argp->ex_flags & MNT_EXPORTED) {
  674                 if (argp->ex_flags & MNT_EXPUBLIC) {
  675                         if ((error = setpublicfs(mp, nep, argp)) != 0)
  676                                 return error;
  677                         mp->mnt_flag |= MNT_EXPUBLIC;
  678                 }
  679                 if ((error = hang_addrlist(mp, nep, argp)) != 0)
  680                         return error;
  681                 mp->mnt_flag |= MNT_EXPORTED;
  682         }
  683         return 0;
  684 }
  685 
  686 /*
  687  * Set the publicly exported filesystem (WebNFS).  Currently, only
  688  * one public filesystem is possible in the spec (RFC 2054 and 2055)
  689  */
  690 static int
  691 setpublicfs(struct mount *mp, struct netexport *nep,
  692     const struct export_args *argp)
  693 {
  694         char *cp;
  695         int error;
  696         struct vnode *rvp;
  697         size_t fhsize;
  698 
  699         /*
  700          * mp == NULL -> invalidate the current info, the FS is
  701          * no longer exported. May be called from either export
  702          * or unmount, so check if it hasn't already been done.
  703          */
  704         if (mp == NULL) {
  705                 if (nfs_pub.np_valid) {
  706                         nfs_pub.np_valid = 0;
  707                         if (nfs_pub.np_handle != NULL) {
  708                                 free(nfs_pub.np_handle, M_TEMP);
  709                                 nfs_pub.np_handle = NULL;
  710                         }
  711                         if (nfs_pub.np_index != NULL) {
  712                                 FREE(nfs_pub.np_index, M_TEMP);
  713                                 nfs_pub.np_index = NULL;
  714                         }
  715                 }
  716                 return 0;
  717         }
  718 
  719         /*
  720          * Only one allowed at a time.
  721          */
  722         if (nfs_pub.np_valid != 0 && mp != nfs_pub.np_mount)
  723                 return EBUSY;
  724 
  725         /*
  726          * Get real filehandle for root of exported FS.
  727          */
  728         if ((error = VFS_ROOT(mp, &rvp)))
  729                 return error;
  730 
  731         fhsize = 0;
  732         error = vfs_composefh(rvp, NULL, &fhsize);
  733         if (error != E2BIG)
  734                 return error;
  735         nfs_pub.np_handle = malloc(fhsize, M_TEMP, M_NOWAIT);
  736         if (nfs_pub.np_handle == NULL)
  737                 error = ENOMEM;
  738         else
  739                 error = vfs_composefh(rvp, nfs_pub.np_handle, &fhsize);
  740         if (error)
  741                 return error;
  742 
  743         vput(rvp);
  744 
  745         /*
  746          * If an indexfile was specified, pull it in.
  747          */
  748         if (argp->ex_indexfile != NULL) {
  749                 MALLOC(nfs_pub.np_index, char *, MAXNAMLEN + 1, M_TEMP,
  750                     M_WAITOK);
  751                 error = copyinstr(argp->ex_indexfile, nfs_pub.np_index,
  752                     MAXNAMLEN, (size_t *)0);
  753                 if (!error) {
  754                         /*
  755                          * Check for illegal filenames.
  756                          */
  757                         for (cp = nfs_pub.np_index; *cp; cp++) {
  758                                 if (*cp == '/') {
  759                                         error = EINVAL;
  760                                         break;
  761                                 }
  762                         }
  763                 }
  764                 if (error) {
  765                         FREE(nfs_pub.np_index, M_TEMP);
  766                         return error;
  767                 }
  768         }
  769 
  770         nfs_pub.np_mount = mp;
  771         nfs_pub.np_valid = 1;
  772         return 0;
  773 }
  774 
  775 /*
  776  * Lookup an export entry in the exports list that matches the address
  777  * stored in 'nam'.  If no entry is found, the default one is used instead
  778  * (if available).
  779  */
  780 static struct netcred *
  781 netcred_lookup(struct netexport *ne, struct mbuf *nam)
  782 {
  783         struct netcred *np;
  784         struct radix_node_head *rnh;
  785         struct sockaddr *saddr;
  786 
  787         if ((ne->ne_mount->mnt_flag & MNT_EXPORTED) == 0) {
  788                 return NULL;
  789         }
  790 
  791         /*
  792          * Lookup in the export list first.
  793          */
  794         np = NULL;
  795         if (nam != NULL) {
  796                 saddr = mtod(nam, struct sockaddr *);
  797                 rnh = ne->ne_rtable[saddr->sa_family];
  798                 if (rnh != NULL) {
  799                         np = (struct netcred *)
  800                                 (*rnh->rnh_matchaddr)((void *)saddr,
  801                                                       rnh);
  802                         if (np && np->netc_rnodes->rn_flags & RNF_ROOT)
  803                                 np = NULL;
  804                 }
  805         }
  806         /*
  807          * If no address match, use the default if it exists.
  808          */
  809         if (np == NULL && ne->ne_mount->mnt_flag & MNT_DEFEXPORTED)
  810                 np = &ne->ne_defexported;
  811 
  812         return np;
  813 }
  814 
  815 krwlock_t netexport_lock;
  816 
  817 void
  818 netexport_rdlock(void)
  819 {
  820 
  821         rw_enter(&netexport_lock, RW_READER);
  822 }
  823 
  824 void
  825 netexport_rdunlock(void)
  826 {
  827 
  828         rw_exit(&netexport_lock);
  829 }
  830 
  831 static void
  832 netexport_wrlock(void)
  833 {
  834 
  835         rw_enter(&netexport_lock, RW_WRITER);
  836 }
  837 
  838 static void
  839 netexport_wrunlock(void)
  840 {
  841 
  842         rw_exit(&netexport_lock);
  843 }

Cache object: d5182a29d0723c301fcdb33c1f270376


[ source navigation ] [ diff markup ] [ identifier search ] [ freetext search ] [ file search ] [ list types ] [ track identifier ]


This page is part of the FreeBSD/Linux Linux Kernel Cross-Reference, and was automatically generated using a modified version of the LXR engine.