Add kernel-layer support for chflags checks, remove (most) from the VFS layer.
[dragonfly.git] / sys / vfs / nfs / nfs_subs.c
CommitLineData
984263bc
MD
1/*
2 * Copyright (c) 1989, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * This code is derived from software contributed to Berkeley by
6 * Rick Macklem at The University of Guelph.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. All advertising materials mentioning features or use of this software
17 * must display the following acknowledgement:
18 * This product includes software developed by the University of
19 * California, Berkeley and its contributors.
20 * 4. Neither the name of the University nor the names of its contributors
21 * may be used to endorse or promote products derived from this software
22 * without specific prior written permission.
23 *
24 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
25 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
28 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
29 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
30 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
32 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
33 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 * SUCH DAMAGE.
35 *
36 * @(#)nfs_subs.c 8.8 (Berkeley) 5/22/95
79e5012e 37 * $FreeBSD: /repoman/r/ncvs/src/sys/nfsclient/nfs_subs.c,v 1.128 2004/04/14 23:23:55 peadar Exp $
67863d04 38 * $DragonFly: src/sys/vfs/nfs/nfs_subs.c,v 1.48 2008/09/17 21:44:24 dillon Exp $
984263bc
MD
39 */
40
41/*
42 * These functions support the macros and help fiddle mbuf chains for
43 * the nfs op functions. They do things like create the rpc header and
44 * copy data between mbuf chains and uio lists.
45 */
46#include <sys/param.h>
47#include <sys/systm.h>
48#include <sys/kernel.h>
49#include <sys/buf.h>
50#include <sys/proc.h>
51#include <sys/mount.h>
52#include <sys/vnode.h>
fad57d0e 53#include <sys/nlookup.h>
984263bc
MD
54#include <sys/namei.h>
55#include <sys/mbuf.h>
56#include <sys/socket.h>
57#include <sys/stat.h>
58#include <sys/malloc.h>
59#include <sys/sysent.h>
60#include <sys/syscall.h>
61#include <sys/conf.h>
70aac194 62#include <sys/objcache.h>
984263bc
MD
63
64#include <vm/vm.h>
65#include <vm/vm_object.h>
66#include <vm/vm_extern.h>
67#include <vm/vm_zone.h>
68
3020e3be
MD
69#include <sys/buf2.h>
70
1f2de5d4
MD
71#include "rpcv2.h"
72#include "nfsproto.h"
73#include "nfs.h"
c1cf1e59 74#include "nfsmount.h"
1f2de5d4
MD
75#include "nfsnode.h"
76#include "xdr_subs.h"
77#include "nfsm_subs.h"
1f2de5d4 78#include "nfsrtt.h"
984263bc
MD
79
80#include <netinet/in.h>
81
82/*
83 * Data items converted to xdr at startup, since they are constant
84 * This is kinda hokey, but may save a little time doing byte swaps
85 */
86u_int32_t nfs_xdrneg1;
87u_int32_t rpc_call, rpc_vers, rpc_reply, rpc_msgdenied, rpc_autherr,
88 rpc_mismatch, rpc_auth_unix, rpc_msgaccepted,
89 rpc_auth_kerb;
e07fef60 90u_int32_t nfs_prog, nfs_true, nfs_false;
984263bc
MD
91
92/* And other global data */
93static u_int32_t nfs_xid = 0;
94static enum vtype nv2tov_type[8]= {
95 VNON, VREG, VDIR, VBLK, VCHR, VLNK, VNON, VNON
96};
97enum vtype nv3tov_type[8]= {
98 VNON, VREG, VDIR, VBLK, VCHR, VLNK, VSOCK, VFIFO
99};
100
101int nfs_ticks;
102int nfs_pbuf_freecnt = -1; /* start out unlimited */
103
104struct nfs_reqq nfs_reqq;
105struct nfssvc_sockhead nfssvc_sockhead;
106int nfssvc_sockhead_flag;
107struct nfsd_head nfsd_head;
108int nfsd_head_flag;
109struct nfs_bufq nfs_bufq;
984263bc
MD
110struct nqfhhashhead *nqfhhashtbl;
111u_long nqfhhash;
112
984263bc
MD
113static int nfs_prev_nfssvc_sy_narg;
114static sy_call_t *nfs_prev_nfssvc_sy_call;
115
116#ifndef NFS_NOSERVER
117
984263bc
MD
118/*
119 * Mapping of old NFS Version 2 RPC numbers to generic numbers.
120 */
121int nfsv3_procid[NFS_NPROCS] = {
122 NFSPROC_NULL,
123 NFSPROC_GETATTR,
124 NFSPROC_SETATTR,
125 NFSPROC_NOOP,
126 NFSPROC_LOOKUP,
127 NFSPROC_READLINK,
128 NFSPROC_READ,
129 NFSPROC_NOOP,
130 NFSPROC_WRITE,
131 NFSPROC_CREATE,
132 NFSPROC_REMOVE,
133 NFSPROC_RENAME,
134 NFSPROC_LINK,
135 NFSPROC_SYMLINK,
136 NFSPROC_MKDIR,
137 NFSPROC_RMDIR,
138 NFSPROC_READDIR,
139 NFSPROC_FSSTAT,
140 NFSPROC_NOOP,
141 NFSPROC_NOOP,
142 NFSPROC_NOOP,
143 NFSPROC_NOOP,
144 NFSPROC_NOOP,
145 NFSPROC_NOOP,
146 NFSPROC_NOOP,
147 NFSPROC_NOOP
148};
149
150#endif /* NFS_NOSERVER */
151/*
152 * and the reverse mapping from generic to Version 2 procedure numbers
153 */
154int nfsv2_procid[NFS_NPROCS] = {
155 NFSV2PROC_NULL,
156 NFSV2PROC_GETATTR,
157 NFSV2PROC_SETATTR,
158 NFSV2PROC_LOOKUP,
159 NFSV2PROC_NOOP,
160 NFSV2PROC_READLINK,
161 NFSV2PROC_READ,
162 NFSV2PROC_WRITE,
163 NFSV2PROC_CREATE,
164 NFSV2PROC_MKDIR,
165 NFSV2PROC_SYMLINK,
166 NFSV2PROC_CREATE,
167 NFSV2PROC_REMOVE,
168 NFSV2PROC_RMDIR,
169 NFSV2PROC_RENAME,
170 NFSV2PROC_LINK,
171 NFSV2PROC_READDIR,
172 NFSV2PROC_NOOP,
173 NFSV2PROC_STATFS,
174 NFSV2PROC_NOOP,
175 NFSV2PROC_NOOP,
176 NFSV2PROC_NOOP,
177 NFSV2PROC_NOOP,
178 NFSV2PROC_NOOP,
179 NFSV2PROC_NOOP,
180 NFSV2PROC_NOOP,
181};
182
183#ifndef NFS_NOSERVER
184/*
185 * Maps errno values to nfs error numbers.
186 * Use NFSERR_IO as the catch all for ones not specifically defined in
187 * RFC 1094.
188 */
189static u_char nfsrv_v2errmap[ELAST] = {
190 NFSERR_PERM, NFSERR_NOENT, NFSERR_IO, NFSERR_IO, NFSERR_IO,
191 NFSERR_NXIO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO,
192 NFSERR_IO, NFSERR_IO, NFSERR_ACCES, NFSERR_IO, NFSERR_IO,
193 NFSERR_IO, NFSERR_EXIST, NFSERR_IO, NFSERR_NODEV, NFSERR_NOTDIR,
194 NFSERR_ISDIR, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO,
195 NFSERR_IO, NFSERR_FBIG, NFSERR_NOSPC, NFSERR_IO, NFSERR_ROFS,
196 NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO,
197 NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO,
198 NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO,
199 NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO,
200 NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO,
201 NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO,
202 NFSERR_IO, NFSERR_IO, NFSERR_NAMETOL, NFSERR_IO, NFSERR_IO,
203 NFSERR_NOTEMPTY, NFSERR_IO, NFSERR_IO, NFSERR_DQUOT, NFSERR_STALE,
204 NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO,
205 NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO,
206 NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO,
207 NFSERR_IO /* << Last is 86 */
208};
209
210/*
211 * Maps errno values to nfs error numbers.
212 * Although it is not obvious whether or not NFS clients really care if
213 * a returned error value is in the specified list for the procedure, the
214 * safest thing to do is filter them appropriately. For Version 2, the
215 * X/Open XNFS document is the only specification that defines error values
216 * for each RPC (The RFC simply lists all possible error values for all RPCs),
217 * so I have decided to not do this for Version 2.
218 * The first entry is the default error return and the rest are the valid
219 * errors for that RPC in increasing numeric order.
220 */
221static short nfsv3err_null[] = {
222 0,
223 0,
224};
225
226static short nfsv3err_getattr[] = {
227 NFSERR_IO,
228 NFSERR_IO,
229 NFSERR_STALE,
230 NFSERR_BADHANDLE,
231 NFSERR_SERVERFAULT,
232 0,
233};
234
235static short nfsv3err_setattr[] = {
236 NFSERR_IO,
237 NFSERR_PERM,
238 NFSERR_IO,
239 NFSERR_ACCES,
240 NFSERR_INVAL,
241 NFSERR_NOSPC,
242 NFSERR_ROFS,
243 NFSERR_DQUOT,
244 NFSERR_STALE,
245 NFSERR_BADHANDLE,
246 NFSERR_NOT_SYNC,
247 NFSERR_SERVERFAULT,
248 0,
249};
250
251static short nfsv3err_lookup[] = {
252 NFSERR_IO,
253 NFSERR_NOENT,
254 NFSERR_IO,
255 NFSERR_ACCES,
256 NFSERR_NOTDIR,
257 NFSERR_NAMETOL,
258 NFSERR_STALE,
259 NFSERR_BADHANDLE,
260 NFSERR_SERVERFAULT,
261 0,
262};
263
264static short nfsv3err_access[] = {
265 NFSERR_IO,
266 NFSERR_IO,
267 NFSERR_STALE,
268 NFSERR_BADHANDLE,
269 NFSERR_SERVERFAULT,
270 0,
271};
272
273static short nfsv3err_readlink[] = {
274 NFSERR_IO,
275 NFSERR_IO,
276 NFSERR_ACCES,
277 NFSERR_INVAL,
278 NFSERR_STALE,
279 NFSERR_BADHANDLE,
280 NFSERR_NOTSUPP,
281 NFSERR_SERVERFAULT,
282 0,
283};
284
285static short nfsv3err_read[] = {
286 NFSERR_IO,
287 NFSERR_IO,
288 NFSERR_NXIO,
289 NFSERR_ACCES,
290 NFSERR_INVAL,
291 NFSERR_STALE,
292 NFSERR_BADHANDLE,
293 NFSERR_SERVERFAULT,
294 0,
295};
296
297static short nfsv3err_write[] = {
298 NFSERR_IO,
299 NFSERR_IO,
300 NFSERR_ACCES,
301 NFSERR_INVAL,
302 NFSERR_FBIG,
303 NFSERR_NOSPC,
304 NFSERR_ROFS,
305 NFSERR_DQUOT,
306 NFSERR_STALE,
307 NFSERR_BADHANDLE,
308 NFSERR_SERVERFAULT,
309 0,
310};
311
312static short nfsv3err_create[] = {
313 NFSERR_IO,
314 NFSERR_IO,
315 NFSERR_ACCES,
316 NFSERR_EXIST,
317 NFSERR_NOTDIR,
318 NFSERR_NOSPC,
319 NFSERR_ROFS,
320 NFSERR_NAMETOL,
321 NFSERR_DQUOT,
322 NFSERR_STALE,
323 NFSERR_BADHANDLE,
324 NFSERR_NOTSUPP,
325 NFSERR_SERVERFAULT,
326 0,
327};
328
329static short nfsv3err_mkdir[] = {
330 NFSERR_IO,
331 NFSERR_IO,
332 NFSERR_ACCES,
333 NFSERR_EXIST,
334 NFSERR_NOTDIR,
335 NFSERR_NOSPC,
336 NFSERR_ROFS,
337 NFSERR_NAMETOL,
338 NFSERR_DQUOT,
339 NFSERR_STALE,
340 NFSERR_BADHANDLE,
341 NFSERR_NOTSUPP,
342 NFSERR_SERVERFAULT,
343 0,
344};
345
346static short nfsv3err_symlink[] = {
347 NFSERR_IO,
348 NFSERR_IO,
349 NFSERR_ACCES,
350 NFSERR_EXIST,
351 NFSERR_NOTDIR,
352 NFSERR_NOSPC,
353 NFSERR_ROFS,
354 NFSERR_NAMETOL,
355 NFSERR_DQUOT,
356 NFSERR_STALE,
357 NFSERR_BADHANDLE,
358 NFSERR_NOTSUPP,
359 NFSERR_SERVERFAULT,
360 0,
361};
362
363static short nfsv3err_mknod[] = {
364 NFSERR_IO,
365 NFSERR_IO,
366 NFSERR_ACCES,
367 NFSERR_EXIST,
368 NFSERR_NOTDIR,
369 NFSERR_NOSPC,
370 NFSERR_ROFS,
371 NFSERR_NAMETOL,
372 NFSERR_DQUOT,
373 NFSERR_STALE,
374 NFSERR_BADHANDLE,
375 NFSERR_NOTSUPP,
376 NFSERR_SERVERFAULT,
377 NFSERR_BADTYPE,
378 0,
379};
380
381static short nfsv3err_remove[] = {
382 NFSERR_IO,
383 NFSERR_NOENT,
384 NFSERR_IO,
385 NFSERR_ACCES,
386 NFSERR_NOTDIR,
387 NFSERR_ROFS,
388 NFSERR_NAMETOL,
389 NFSERR_STALE,
390 NFSERR_BADHANDLE,
391 NFSERR_SERVERFAULT,
392 0,
393};
394
395static short nfsv3err_rmdir[] = {
396 NFSERR_IO,
397 NFSERR_NOENT,
398 NFSERR_IO,
399 NFSERR_ACCES,
400 NFSERR_EXIST,
401 NFSERR_NOTDIR,
402 NFSERR_INVAL,
403 NFSERR_ROFS,
404 NFSERR_NAMETOL,
405 NFSERR_NOTEMPTY,
406 NFSERR_STALE,
407 NFSERR_BADHANDLE,
408 NFSERR_NOTSUPP,
409 NFSERR_SERVERFAULT,
410 0,
411};
412
413static short nfsv3err_rename[] = {
414 NFSERR_IO,
415 NFSERR_NOENT,
416 NFSERR_IO,
417 NFSERR_ACCES,
418 NFSERR_EXIST,
419 NFSERR_XDEV,
420 NFSERR_NOTDIR,
421 NFSERR_ISDIR,
422 NFSERR_INVAL,
423 NFSERR_NOSPC,
424 NFSERR_ROFS,
425 NFSERR_MLINK,
426 NFSERR_NAMETOL,
427 NFSERR_NOTEMPTY,
428 NFSERR_DQUOT,
429 NFSERR_STALE,
430 NFSERR_BADHANDLE,
431 NFSERR_NOTSUPP,
432 NFSERR_SERVERFAULT,
433 0,
434};
435
436static short nfsv3err_link[] = {
437 NFSERR_IO,
438 NFSERR_IO,
439 NFSERR_ACCES,
440 NFSERR_EXIST,
441 NFSERR_XDEV,
442 NFSERR_NOTDIR,
443 NFSERR_INVAL,
444 NFSERR_NOSPC,
445 NFSERR_ROFS,
446 NFSERR_MLINK,
447 NFSERR_NAMETOL,
448 NFSERR_DQUOT,
449 NFSERR_STALE,
450 NFSERR_BADHANDLE,
451 NFSERR_NOTSUPP,
452 NFSERR_SERVERFAULT,
453 0,
454};
455
456static short nfsv3err_readdir[] = {
457 NFSERR_IO,
458 NFSERR_IO,
459 NFSERR_ACCES,
460 NFSERR_NOTDIR,
461 NFSERR_STALE,
462 NFSERR_BADHANDLE,
463 NFSERR_BAD_COOKIE,
464 NFSERR_TOOSMALL,
465 NFSERR_SERVERFAULT,
466 0,
467};
468
469static short nfsv3err_readdirplus[] = {
470 NFSERR_IO,
471 NFSERR_IO,
472 NFSERR_ACCES,
473 NFSERR_NOTDIR,
474 NFSERR_STALE,
475 NFSERR_BADHANDLE,
476 NFSERR_BAD_COOKIE,
477 NFSERR_NOTSUPP,
478 NFSERR_TOOSMALL,
479 NFSERR_SERVERFAULT,
480 0,
481};
482
483static short nfsv3err_fsstat[] = {
484 NFSERR_IO,
485 NFSERR_IO,
486 NFSERR_STALE,
487 NFSERR_BADHANDLE,
488 NFSERR_SERVERFAULT,
489 0,
490};
491
492static short nfsv3err_fsinfo[] = {
493 NFSERR_STALE,
494 NFSERR_STALE,
495 NFSERR_BADHANDLE,
496 NFSERR_SERVERFAULT,
497 0,
498};
499
500static short nfsv3err_pathconf[] = {
501 NFSERR_STALE,
502 NFSERR_STALE,
503 NFSERR_BADHANDLE,
504 NFSERR_SERVERFAULT,
505 0,
506};
507
508static short nfsv3err_commit[] = {
509 NFSERR_IO,
510 NFSERR_IO,
511 NFSERR_STALE,
512 NFSERR_BADHANDLE,
513 NFSERR_SERVERFAULT,
514 0,
515};
516
517static short *nfsrv_v3errmap[] = {
518 nfsv3err_null,
519 nfsv3err_getattr,
520 nfsv3err_setattr,
521 nfsv3err_lookup,
522 nfsv3err_access,
523 nfsv3err_readlink,
524 nfsv3err_read,
525 nfsv3err_write,
526 nfsv3err_create,
527 nfsv3err_mkdir,
528 nfsv3err_symlink,
529 nfsv3err_mknod,
530 nfsv3err_remove,
531 nfsv3err_rmdir,
532 nfsv3err_rename,
533 nfsv3err_link,
534 nfsv3err_readdir,
535 nfsv3err_readdirplus,
536 nfsv3err_fsstat,
537 nfsv3err_fsinfo,
538 nfsv3err_pathconf,
539 nfsv3err_commit,
540};
541
542#endif /* NFS_NOSERVER */
543
544extern struct nfsrtt nfsrtt;
984263bc 545extern struct nfsstats nfsstats;
984263bc
MD
546extern nfstype nfsv2_type[9];
547extern nfstype nfsv3_type[9];
548extern struct nfsnodehashhead *nfsnodehashtbl;
549extern u_long nfsnodehash;
550
551struct nfssvc_args;
753fd850 552extern int sys_nfssvc(struct proc *, struct nfssvc_args *, int *);
984263bc
MD
553
554LIST_HEAD(nfsnodehashhead, nfsnode);
555
2cb16efc
MD
556/*
557 * This needs to return a monotonically increasing or close to monotonically
558 * increasing result, otherwise the write gathering queues won't work
559 * properly.
560 */
984263bc 561u_quad_t
e851b29e 562nfs_curusec(void)
984263bc
MD
563{
564 struct timeval tv;
565
2cb16efc 566 getmicrouptime(&tv);
984263bc
MD
567 return ((u_quad_t)tv.tv_sec * 1000000 + (u_quad_t)tv.tv_usec);
568}
569
570/*
571 * Create the header for an rpc request packet
572 * The hsiz is the size of the rest of the nfs request header.
573 * (just used to decide if a cluster is a good idea)
574 */
575struct mbuf *
e851b29e 576nfsm_reqh(struct vnode *vp, u_long procid, int hsiz, caddr_t *bposp)
984263bc 577{
40393ded 578 struct mbuf *mb;
40393ded 579 caddr_t bpos;
984263bc 580
50503f0f 581 mb = m_getl(hsiz, MB_WAIT, MT_DATA, 0, NULL);
984263bc
MD
582 mb->m_len = 0;
583 bpos = mtod(mb, caddr_t);
584
984263bc
MD
585 /* Finally, return values */
586 *bposp = bpos;
587 return (mb);
588}
589
590/*
591 * Build the RPC header and fill in the authorization info.
592 * The authorization string argument is only used when the credentials
593 * come from outside of the kernel.
594 * Returns the head of the mbuf list.
595 */
596struct mbuf *
e851b29e
CP
597nfsm_rpchead(struct ucred *cr, int nmflag, int procid, int auth_type,
598 int auth_len, char *auth_str, int verf_len, char *verf_str,
599 struct mbuf *mrest, int mrest_len, struct mbuf **mbp,
600 u_int32_t *xidp)
984263bc 601{
40393ded
RG
602 struct mbuf *mb;
603 u_int32_t *tl;
604 caddr_t bpos;
605 int i;
984263bc 606 struct mbuf *mreq, *mb2;
7771277f 607 int siz, grpsiz, authsiz, dsiz;
984263bc
MD
608
609 authsiz = nfsm_rndup(auth_len);
7771277f
JH
610 dsiz = authsiz + 10 * NFSX_UNSIGNED;
611 mb = m_getl(dsiz, MB_WAIT, MT_DATA, M_PKTHDR, NULL);
612 if (dsiz < MINCLSIZE) {
613 if (dsiz < MHLEN)
614 MH_ALIGN(mb, dsiz);
615 else
616 MH_ALIGN(mb, 8 * NFSX_UNSIGNED);
984263bc 617 }
7771277f 618 mb->m_len = mb->m_pkthdr.len = 0;
984263bc
MD
619 mreq = mb;
620 bpos = mtod(mb, caddr_t);
621
622 /*
623 * First the RPC header.
624 */
625 nfsm_build(tl, u_int32_t *, 8 * NFSX_UNSIGNED);
626
627 /* Get a pretty random xid to start with */
628 if (!nfs_xid)
cddfb7bb 629 nfs_xid = krandom();
984263bc
MD
630 /*
631 * Skip zero xid if it should ever happen.
632 */
633 if (++nfs_xid == 0)
634 nfs_xid++;
635
636 *tl++ = *xidp = txdr_unsigned(nfs_xid);
637 *tl++ = rpc_call;
638 *tl++ = rpc_vers;
e07fef60
MD
639 *tl++ = txdr_unsigned(NFS_PROG);
640 if (nmflag & NFSMNT_NFSV3)
641 *tl++ = txdr_unsigned(NFS_VER3);
642 else
643 *tl++ = txdr_unsigned(NFS_VER2);
984263bc
MD
644 if (nmflag & NFSMNT_NFSV3)
645 *tl++ = txdr_unsigned(procid);
646 else
647 *tl++ = txdr_unsigned(nfsv2_procid[procid]);
648
649 /*
650 * And then the authorization cred.
651 */
652 *tl++ = txdr_unsigned(auth_type);
653 *tl = txdr_unsigned(authsiz);
654 switch (auth_type) {
655 case RPCAUTH_UNIX:
656 nfsm_build(tl, u_int32_t *, auth_len);
657 *tl++ = 0; /* stamp ?? */
658 *tl++ = 0; /* NULL hostname */
659 *tl++ = txdr_unsigned(cr->cr_uid);
660 *tl++ = txdr_unsigned(cr->cr_groups[0]);
661 grpsiz = (auth_len >> 2) - 5;
662 *tl++ = txdr_unsigned(grpsiz);
663 for (i = 1; i <= grpsiz; i++)
664 *tl++ = txdr_unsigned(cr->cr_groups[i]);
665 break;
666 case RPCAUTH_KERB4:
667 siz = auth_len;
668 while (siz > 0) {
669 if (M_TRAILINGSPACE(mb) == 0) {
50503f0f
JH
670 mb2 = m_getl(siz, MB_WAIT, MT_DATA, 0, NULL);
671 mb2->m_len = 0;
984263bc
MD
672 mb->m_next = mb2;
673 mb = mb2;
984263bc
MD
674 bpos = mtod(mb, caddr_t);
675 }
676 i = min(siz, M_TRAILINGSPACE(mb));
677 bcopy(auth_str, bpos, i);
678 mb->m_len += i;
679 auth_str += i;
680 bpos += i;
681 siz -= i;
682 }
683 if ((siz = (nfsm_rndup(auth_len) - auth_len)) > 0) {
684 for (i = 0; i < siz; i++)
685 *bpos++ = '\0';
686 mb->m_len += siz;
687 }
688 break;
689 };
690
691 /*
692 * And the verifier...
693 */
694 nfsm_build(tl, u_int32_t *, 2 * NFSX_UNSIGNED);
695 if (verf_str) {
696 *tl++ = txdr_unsigned(RPCAUTH_KERB4);
697 *tl = txdr_unsigned(verf_len);
698 siz = verf_len;
699 while (siz > 0) {
700 if (M_TRAILINGSPACE(mb) == 0) {
50503f0f
JH
701 mb2 = m_getl(siz, MB_WAIT, MT_DATA, 0, NULL);
702 mb2->m_len = 0;
984263bc
MD
703 mb->m_next = mb2;
704 mb = mb2;
984263bc
MD
705 bpos = mtod(mb, caddr_t);
706 }
707 i = min(siz, M_TRAILINGSPACE(mb));
708 bcopy(verf_str, bpos, i);
709 mb->m_len += i;
710 verf_str += i;
711 bpos += i;
712 siz -= i;
713 }
714 if ((siz = (nfsm_rndup(verf_len) - verf_len)) > 0) {
715 for (i = 0; i < siz; i++)
716 *bpos++ = '\0';
717 mb->m_len += siz;
718 }
719 } else {
720 *tl++ = txdr_unsigned(RPCAUTH_NULL);
721 *tl = 0;
722 }
723 mb->m_next = mrest;
724 mreq->m_pkthdr.len = authsiz + 10 * NFSX_UNSIGNED + mrest_len;
60233e58 725 mreq->m_pkthdr.rcvif = NULL;
984263bc
MD
726 *mbp = mb;
727 return (mreq);
728}
729
730/*
731 * copies mbuf chain to the uio scatter/gather list
732 */
733int
e851b29e 734nfsm_mbuftouio(struct mbuf **mrep, struct uio *uiop, int siz, caddr_t *dpos)
984263bc 735{
40393ded
RG
736 char *mbufcp, *uiocp;
737 int xfer, left, len;
738 struct mbuf *mp;
984263bc
MD
739 long uiosiz, rem;
740 int error = 0;
741
742 mp = *mrep;
743 mbufcp = *dpos;
744 len = mtod(mp, caddr_t)+mp->m_len-mbufcp;
745 rem = nfsm_rndup(siz)-siz;
746 while (siz > 0) {
747 if (uiop->uio_iovcnt <= 0 || uiop->uio_iov == NULL)
748 return (EFBIG);
749 left = uiop->uio_iov->iov_len;
750 uiocp = uiop->uio_iov->iov_base;
751 if (left > siz)
752 left = siz;
753 uiosiz = left;
754 while (left > 0) {
755 while (len == 0) {
756 mp = mp->m_next;
757 if (mp == NULL)
758 return (EBADRPC);
759 mbufcp = mtod(mp, caddr_t);
760 len = mp->m_len;
761 }
762 xfer = (left > len) ? len : left;
763#ifdef notdef
764 /* Not Yet.. */
765 if (uiop->uio_iov->iov_op != NULL)
766 (*(uiop->uio_iov->iov_op))
767 (mbufcp, uiocp, xfer);
768 else
769#endif
770 if (uiop->uio_segflg == UIO_SYSSPACE)
771 bcopy(mbufcp, uiocp, xfer);
772 else
773 copyout(mbufcp, uiocp, xfer);
774 left -= xfer;
775 len -= xfer;
776 mbufcp += xfer;
777 uiocp += xfer;
778 uiop->uio_offset += xfer;
779 uiop->uio_resid -= xfer;
780 }
781 if (uiop->uio_iov->iov_len <= siz) {
782 uiop->uio_iovcnt--;
783 uiop->uio_iov++;
784 } else {
656849c6 785 uiop->uio_iov->iov_base = (char *)uiop->uio_iov->iov_base + uiosiz;
984263bc
MD
786 uiop->uio_iov->iov_len -= uiosiz;
787 }
788 siz -= uiosiz;
789 }
790 *dpos = mbufcp;
791 *mrep = mp;
792 if (rem > 0) {
793 if (len < rem)
794 error = nfs_adv(mrep, dpos, rem, len);
795 else
796 *dpos += rem;
797 }
798 return (error);
799}
800
801/*
802 * copies a uio scatter/gather list to an mbuf chain.
803 * NOTE: can ony handle iovcnt == 1
804 */
805int
e851b29e 806nfsm_uiotombuf(struct uio *uiop, struct mbuf **mq, int siz, caddr_t *bpos)
984263bc 807{
40393ded
RG
808 char *uiocp;
809 struct mbuf *mp, *mp2;
810 int xfer, left, mlen;
50503f0f
JH
811 int uiosiz, rem;
812 boolean_t getcluster;
984263bc
MD
813 char *cp;
814
815#ifdef DIAGNOSTIC
816 if (uiop->uio_iovcnt != 1)
817 panic("nfsm_uiotombuf: iovcnt != 1");
818#endif
819
50503f0f
JH
820 if (siz >= MINCLSIZE)
821 getcluster = TRUE;
984263bc 822 else
50503f0f
JH
823 getcluster = FALSE;
824 rem = nfsm_rndup(siz) - siz;
984263bc
MD
825 mp = mp2 = *mq;
826 while (siz > 0) {
827 left = uiop->uio_iov->iov_len;
828 uiocp = uiop->uio_iov->iov_base;
829 if (left > siz)
830 left = siz;
831 uiosiz = left;
832 while (left > 0) {
833 mlen = M_TRAILINGSPACE(mp);
834 if (mlen == 0) {
50503f0f
JH
835 if (getcluster)
836 mp = m_getcl(MB_WAIT, MT_DATA, 0);
837 else
838 mp = m_get(MB_WAIT, MT_DATA);
984263bc
MD
839 mp->m_len = 0;
840 mp2->m_next = mp;
841 mp2 = mp;
842 mlen = M_TRAILINGSPACE(mp);
843 }
844 xfer = (left > mlen) ? mlen : left;
845#ifdef notdef
846 /* Not Yet.. */
847 if (uiop->uio_iov->iov_op != NULL)
848 (*(uiop->uio_iov->iov_op))
849 (uiocp, mtod(mp, caddr_t)+mp->m_len, xfer);
850 else
851#endif
852 if (uiop->uio_segflg == UIO_SYSSPACE)
853 bcopy(uiocp, mtod(mp, caddr_t)+mp->m_len, xfer);
854 else
855 copyin(uiocp, mtod(mp, caddr_t)+mp->m_len, xfer);
856 mp->m_len += xfer;
857 left -= xfer;
858 uiocp += xfer;
859 uiop->uio_offset += xfer;
860 uiop->uio_resid -= xfer;
861 }
656849c6 862 uiop->uio_iov->iov_base = (char *)uiop->uio_iov->iov_base + uiosiz;
984263bc
MD
863 uiop->uio_iov->iov_len -= uiosiz;
864 siz -= uiosiz;
865 }
866 if (rem > 0) {
867 if (rem > M_TRAILINGSPACE(mp)) {
74f1caca 868 MGET(mp, MB_WAIT, MT_DATA);
984263bc
MD
869 mp->m_len = 0;
870 mp2->m_next = mp;
871 }
872 cp = mtod(mp, caddr_t)+mp->m_len;
873 for (left = 0; left < rem; left++)
874 *cp++ = '\0';
875 mp->m_len += rem;
876 *bpos = cp;
877 } else
878 *bpos = mtod(mp, caddr_t)+mp->m_len;
879 *mq = mp;
880 return (0);
881}
882
883/*
884 * Help break down an mbuf chain by setting the first siz bytes contiguous
885 * pointed to by returned val.
886 * This is used by the macros nfsm_dissect and nfsm_dissecton for tough
887 * cases. (The macros use the vars. dpos and dpos2)
888 */
889int
e851b29e 890nfsm_disct(struct mbuf **mdp, caddr_t *dposp, int siz, int left, caddr_t *cp2)
984263bc 891{
40393ded
RG
892 struct mbuf *mp, *mp2;
893 int siz2, xfer;
894 caddr_t p;
984263bc
MD
895
896 mp = *mdp;
897 while (left == 0) {
898 *mdp = mp = mp->m_next;
899 if (mp == NULL)
900 return (EBADRPC);
901 left = mp->m_len;
902 *dposp = mtod(mp, caddr_t);
903 }
904 if (left >= siz) {
905 *cp2 = *dposp;
906 *dposp += siz;
907 } else if (mp->m_next == NULL) {
908 return (EBADRPC);
909 } else if (siz > MHLEN) {
910 panic("nfs S too big");
911 } else {
74f1caca 912 MGET(mp2, MB_WAIT, MT_DATA);
984263bc
MD
913 mp2->m_next = mp->m_next;
914 mp->m_next = mp2;
915 mp->m_len -= left;
916 mp = mp2;
917 *cp2 = p = mtod(mp, caddr_t);
918 bcopy(*dposp, p, left); /* Copy what was left */
919 siz2 = siz-left;
920 p += left;
921 mp2 = mp->m_next;
922 /* Loop around copying up the siz2 bytes */
923 while (siz2 > 0) {
924 if (mp2 == NULL)
925 return (EBADRPC);
926 xfer = (siz2 > mp2->m_len) ? mp2->m_len : siz2;
927 if (xfer > 0) {
928 bcopy(mtod(mp2, caddr_t), p, xfer);
929 NFSMADV(mp2, xfer);
930 mp2->m_len -= xfer;
931 p += xfer;
932 siz2 -= xfer;
933 }
934 if (siz2 > 0)
935 mp2 = mp2->m_next;
936 }
937 mp->m_len = siz;
938 *mdp = mp2;
939 *dposp = mtod(mp2, caddr_t);
940 }
941 return (0);
942}
943
944/*
945 * Advance the position in the mbuf chain.
946 */
947int
e851b29e 948nfs_adv(struct mbuf **mdp, caddr_t *dposp, int offs, int left)
984263bc 949{
40393ded
RG
950 struct mbuf *m;
951 int s;
984263bc
MD
952
953 m = *mdp;
954 s = left;
955 while (s < offs) {
956 offs -= s;
957 m = m->m_next;
958 if (m == NULL)
959 return (EBADRPC);
960 s = m->m_len;
961 }
962 *mdp = m;
963 *dposp = mtod(m, caddr_t)+offs;
964 return (0);
965}
966
967/*
968 * Copy a string into mbufs for the hard cases...
969 */
970int
e851b29e 971nfsm_strtmbuf(struct mbuf **mb, char **bpos, const char *cp, long siz)
984263bc 972{
40393ded 973 struct mbuf *m1 = NULL, *m2;
984263bc
MD
974 long left, xfer, len, tlen;
975 u_int32_t *tl;
976 int putsize;
977
978 putsize = 1;
979 m2 = *mb;
980 left = M_TRAILINGSPACE(m2);
981 if (left > 0) {
982 tl = ((u_int32_t *)(*bpos));
983 *tl++ = txdr_unsigned(siz);
984 putsize = 0;
985 left -= NFSX_UNSIGNED;
986 m2->m_len += NFSX_UNSIGNED;
987 if (left > 0) {
988 bcopy(cp, (caddr_t) tl, left);
989 siz -= left;
990 cp += left;
991 m2->m_len += left;
992 left = 0;
993 }
994 }
995 /* Loop around adding mbufs */
996 while (siz > 0) {
50503f0f
JH
997 int msize;
998
999 m1 = m_getl(siz, MB_WAIT, MT_DATA, 0, &msize);
1000 m1->m_len = msize;
984263bc
MD
1001 m2->m_next = m1;
1002 m2 = m1;
1003 tl = mtod(m1, u_int32_t *);
1004 tlen = 0;
1005 if (putsize) {
1006 *tl++ = txdr_unsigned(siz);
1007 m1->m_len -= NFSX_UNSIGNED;
1008 tlen = NFSX_UNSIGNED;
1009 putsize = 0;
1010 }
1011 if (siz < m1->m_len) {
1012 len = nfsm_rndup(siz);
1013 xfer = siz;
1014 if (xfer < len)
1015 *(tl+(xfer>>2)) = 0;
1016 } else {
1017 xfer = len = m1->m_len;
1018 }
1019 bcopy(cp, (caddr_t) tl, xfer);
1020 m1->m_len = len+tlen;
1021 siz -= xfer;
1022 cp += xfer;
1023 }
1024 *mb = m1;
1025 *bpos = mtod(m1, caddr_t)+m1->m_len;
1026 return (0);
1027}
1028
1029/*
1030 * Called once to initialize data structures...
1031 */
1032int
e851b29e 1033nfs_init(struct vfsconf *vfsp)
984263bc 1034{
40393ded 1035 int i;
984263bc 1036
f786cc86 1037 callout_init(&nfs_timer_handle);
984263bc
MD
1038 nfsmount_zone = zinit("NFSMOUNT", sizeof(struct nfsmount), 0, 0, 1);
1039
1040 nfs_mount_type = vfsp->vfc_typenum;
1041 nfsrtt.pos = 0;
1042 rpc_vers = txdr_unsigned(RPC_VER2);
1043 rpc_call = txdr_unsigned(RPC_CALL);
1044 rpc_reply = txdr_unsigned(RPC_REPLY);
1045 rpc_msgdenied = txdr_unsigned(RPC_MSGDENIED);
1046 rpc_msgaccepted = txdr_unsigned(RPC_MSGACCEPTED);
1047 rpc_mismatch = txdr_unsigned(RPC_MISMATCH);
1048 rpc_autherr = txdr_unsigned(RPC_AUTHERR);
1049 rpc_auth_unix = txdr_unsigned(RPCAUTH_UNIX);
1050 rpc_auth_kerb = txdr_unsigned(RPCAUTH_KERB4);
1051 nfs_prog = txdr_unsigned(NFS_PROG);
984263bc
MD
1052 nfs_true = txdr_unsigned(TRUE);
1053 nfs_false = txdr_unsigned(FALSE);
1054 nfs_xdrneg1 = txdr_unsigned(-1);
1055 nfs_ticks = (hz * NFS_TICKINTVL + 500) / 1000;
1056 if (nfs_ticks < 1)
1057 nfs_ticks = 1;
1058 /* Ensure async daemons disabled */
1059 for (i = 0; i < NFS_MAXASYNCDAEMON; i++) {
dadab5e9 1060 nfs_iodwant[i] = NULL;
60233e58 1061 nfs_iodmount[i] = NULL;
984263bc
MD
1062 }
1063 nfs_nhinit(); /* Init the nfsnode table */
1064#ifndef NFS_NOSERVER
1065 nfsrv_init(0); /* Init server data structures */
1066 nfsrv_initcache(); /* Init the server request cache */
1067#endif
1068
1069 /*
984263bc
MD
1070 * Initialize reply list and start timer
1071 */
1072 TAILQ_INIT(&nfs_reqq);
1073
1074 nfs_timer(0);
1075
984263bc
MD
1076 nfs_prev_nfssvc_sy_narg = sysent[SYS_nfssvc].sy_narg;
1077 sysent[SYS_nfssvc].sy_narg = 2;
1078 nfs_prev_nfssvc_sy_call = sysent[SYS_nfssvc].sy_call;
753fd850 1079 sysent[SYS_nfssvc].sy_call = (sy_call_t *)sys_nfssvc;
984263bc
MD
1080
1081 nfs_pbuf_freecnt = nswbuf / 2 + 1;
1082
1083 return (0);
1084}
1085
1086int
e851b29e 1087nfs_uninit(struct vfsconf *vfsp)
984263bc 1088{
f786cc86 1089 callout_stop(&nfs_timer_handle);
984263bc 1090 nfs_mount_type = -1;
984263bc
MD
1091 sysent[SYS_nfssvc].sy_narg = nfs_prev_nfssvc_sy_narg;
1092 sysent[SYS_nfssvc].sy_call = nfs_prev_nfssvc_sy_call;
1093 return (0);
1094}
1095
1096/*
1097 * Attribute cache routines.
1098 * nfs_loadattrcache() - loads or updates the cache contents from attributes
1099 * that are on the mbuf list
1100 * nfs_getattrcache() - returns valid attributes if found in cache, returns
1101 * error otherwise
1102 */
1103
1104/*
1105 * Load the attribute cache (that lives in the nfsnode entry) with
5a9187cb
MD
1106 * the values on the mbuf list. Load *vaper with the attributes. vaper
1107 * may be NULL.
1108 *
1109 * As a side effect n_mtime, which we use to determine if the file was
1110 * modified by some other host, is set to the attribute timestamp and
1111 * NRMODIFIED is set if the two values differ.
1112 *
1113 * WARNING: the mtime loaded into vaper does not necessarily represent
1114 * n_mtime or n_attr.mtime due to NACC and NUPD.
984263bc
MD
1115 */
1116int
e851b29e 1117nfs_loadattrcache(struct vnode **vpp, struct mbuf **mdp, caddr_t *dposp,
5a9187cb 1118 struct vattr *vaper, int lattr_flags)
984263bc 1119{
40393ded
RG
1120 struct vnode *vp = *vpp;
1121 struct vattr *vap;
1122 struct nfs_fattr *fp;
1123 struct nfsnode *np;
1124 int32_t t1;
984263bc 1125 caddr_t cp2;
e4c9c0c8 1126 int error = 0;
0e9b9130 1127 int rmajor, rminor;
e4c9c0c8 1128 udev_t rdev;
984263bc
MD
1129 struct mbuf *md;
1130 enum vtype vtyp;
1131 u_short vmode;
1132 struct timespec mtime;
1133 int v3 = NFS_ISV3(vp);
1134
1135 md = *mdp;
1136 t1 = (mtod(md, caddr_t) + md->m_len) - *dposp;
1137 if ((error = nfsm_disct(mdp, dposp, NFSX_FATTR(v3), t1, &cp2)) != 0)
1138 return (error);
1139 fp = (struct nfs_fattr *)cp2;
1140 if (v3) {
1141 vtyp = nfsv3tov_type(fp->fa_type);
1142 vmode = fxdr_unsigned(u_short, fp->fa_mode);
0e9b9130
MD
1143 rmajor = (int)fxdr_unsigned(int, fp->fa3_rdev.specdata1);
1144 rminor = (int)fxdr_unsigned(int, fp->fa3_rdev.specdata2);
984263bc
MD
1145 fxdr_nfsv3time(&fp->fa3_mtime, &mtime);
1146 } else {
1147 vtyp = nfsv2tov_type(fp->fa_type);
1148 vmode = fxdr_unsigned(u_short, fp->fa_mode);
1149 /*
1150 * XXX
1151 *
1152 * The duplicate information returned in fa_type and fa_mode
1153 * is an ambiguity in the NFS version 2 protocol.
1154 *
1155 * VREG should be taken literally as a regular file. If a
1156 * server intents to return some type information differently
1157 * in the upper bits of the mode field (e.g. for sockets, or
1158 * FIFOs), NFSv2 mandates fa_type to be VNON. Anyway, we
1159 * leave the examination of the mode bits even in the VREG
1160 * case to avoid breakage for bogus servers, but we make sure
1161 * that there are actually type bits set in the upper part of
1162 * fa_mode (and failing that, trust the va_type field).
1163 *
1164 * NFSv3 cleared the issue, and requires fa_mode to not
1165 * contain any type information (while also introduing sockets
1166 * and FIFOs for fa_type).
1167 */
1168 if (vtyp == VNON || (vtyp == VREG && (vmode & S_IFMT) != 0))
1169 vtyp = IFTOVT(vmode);
1170 rdev = fxdr_unsigned(int32_t, fp->fa2_rdev);
0e9b9130
MD
1171 rmajor = umajor(rdev);
1172 rminor = uminor(rdev);
984263bc
MD
1173 fxdr_nfsv2time(&fp->fa2_mtime, &mtime);
1174
1175 /*
1176 * Really ugly NFSv2 kludge.
1177 */
e4c9c0c8 1178 if (vtyp == VCHR && rdev == (udev_t)0xffffffff)
984263bc
MD
1179 vtyp = VFIFO;
1180 }
1181
1182 /*
1183 * If v_type == VNON it is a new node, so fill in the v_type,
1184 * n_mtime fields. Check to see if it represents a special
1185 * device, and if so, check for a possible alias. Once the
1186 * correct vnode has been obtained, fill in the rest of the
1187 * information.
1188 */
1189 np = VTONFS(vp);
1190 if (vp->v_type != vtyp) {
1c843a13 1191 nfs_setvtype(vp, vtyp);
984263bc 1192 if (vp->v_type == VFIFO) {
6ddb7618 1193 vp->v_ops = &vp->v_mount->mnt_vn_fifo_ops;
0961aa92 1194 } else if (vp->v_type == VCHR || vp->v_type == VBLK) {
6ddb7618 1195 vp->v_ops = &vp->v_mount->mnt_vn_spec_ops;
0e9b9130 1196 addaliasu(vp, rmajor, rminor);
0961aa92 1197 } else {
6ddb7618 1198 vp->v_ops = &vp->v_mount->mnt_vn_use_ops;
984263bc
MD
1199 }
1200 np->n_mtime = mtime.tv_sec;
5a9187cb 1201 } else if (np->n_mtime != mtime.tv_sec) {
9793c819 1202 /*
5a9187cb
MD
1203 * If we haven't modified the file locally and the server
1204 * timestamp does not match, then the server probably
1205 * modified the file. We must flag this condition so
1206 * the proper syncnronization can be done. We do not
1207 * try to synchronize the state here because that
1208 * could lead to an endless recursion.
1209 *
1210 * XXX loadattrcache can be set during the reply to a write,
1211 * before the write timestamp is properly processed. To
1212 * avoid unconditionally setting the rmodified bit (which
1213 * has the effect of flushing the cache), we only do this
1214 * check if the lmodified bit is not set.
9793c819
MD
1215 */
1216 np->n_mtime = mtime.tv_sec;
5a9187cb
MD
1217 if ((lattr_flags & NFS_LATTR_NOMTIMECHECK) == 0)
1218 np->n_flag |= NRMODIFIED;
984263bc
MD
1219 }
1220 vap = &np->n_vattr;
1221 vap->va_type = vtyp;
1222 vap->va_mode = (vmode & 07777);
0e9b9130
MD
1223 vap->va_rmajor = rmajor;
1224 vap->va_rminor = rminor;
984263bc
MD
1225 vap->va_mtime = mtime;
1226 vap->va_fsid = vp->v_mount->mnt_stat.f_fsid.val[0];
1227 if (v3) {
1228 vap->va_nlink = fxdr_unsigned(u_short, fp->fa_nlink);
1229 vap->va_uid = fxdr_unsigned(uid_t, fp->fa_uid);
1230 vap->va_gid = fxdr_unsigned(gid_t, fp->fa_gid);
1231 vap->va_size = fxdr_hyper(&fp->fa3_size);
1232 vap->va_blocksize = NFS_FABLKSIZE;
1233 vap->va_bytes = fxdr_hyper(&fp->fa3_used);
50626622 1234 vap->va_fileid = fxdr_hyper(&fp->fa3_fileid);
984263bc
MD
1235 fxdr_nfsv3time(&fp->fa3_atime, &vap->va_atime);
1236 fxdr_nfsv3time(&fp->fa3_ctime, &vap->va_ctime);
1237 vap->va_flags = 0;
1238 vap->va_filerev = 0;
1239 } else {
1240 vap->va_nlink = fxdr_unsigned(u_short, fp->fa_nlink);
1241 vap->va_uid = fxdr_unsigned(uid_t, fp->fa_uid);
1242 vap->va_gid = fxdr_unsigned(gid_t, fp->fa_gid);
1243 vap->va_size = fxdr_unsigned(u_int32_t, fp->fa2_size);
1244 vap->va_blocksize = fxdr_unsigned(int32_t, fp->fa2_blocksize);
1245 vap->va_bytes = (u_quad_t)fxdr_unsigned(int32_t, fp->fa2_blocks)
1246 * NFS_FABLKSIZE;
1247 vap->va_fileid = fxdr_unsigned(int32_t, fp->fa2_fileid);
1248 fxdr_nfsv2time(&fp->fa2_atime, &vap->va_atime);
1249 vap->va_flags = 0;
1250 vap->va_ctime.tv_sec = fxdr_unsigned(u_int32_t,
1251 fp->fa2_ctime.nfsv2_sec);
1252 vap->va_ctime.tv_nsec = 0;
1253 vap->va_gen = fxdr_unsigned(u_int32_t,fp->fa2_ctime.nfsv2_usec);
1254 vap->va_filerev = 0;
1255 }
1256 np->n_attrstamp = time_second;
1257 if (vap->va_size != np->n_size) {
1258 if (vap->va_type == VREG) {
5a9187cb
MD
1259 if ((lattr_flags & NFS_LATTR_NOSHRINK) &&
1260 vap->va_size < np->n_size) {
984263bc
MD
1261 /*
1262 * We've been told not to shrink the file;
1263 * zero np->n_attrstamp to indicate that
1264 * the attributes are stale.
5a9187cb
MD
1265 *
1266 * This occurs primarily due to recursive
1267 * NFS ops that are executed during periods
1268 * where we cannot safely reduce the size of
1269 * the file.
1270 *
1271 * Additionally, write rpcs are broken down
1272 * into buffers and np->n_size is
1273 * pre-extended. Setting NRMODIFIED here
1274 * can result in n_size getting reset to a
1275 * lower value, which is NOT what we want.
1276 * XXX this needs to be cleaned up a lot
1277 * more.
984263bc
MD
1278 */
1279 vap->va_size = np->n_size;
1280 np->n_attrstamp = 0;
5a9187cb
MD
1281 if ((np->n_flag & NLMODIFIED) == 0)
1282 np->n_flag |= NRMODIFIED;
1283 } else if (np->n_flag & NLMODIFIED) {
79e5012e
MD
1284 /*
1285 * We've modified the file: Use the larger
5a9187cb
MD
1286 * of our size, and the server's size. At
1287 * this point the cache coherency is all
1288 * shot to hell. To try to handle multiple
1289 * clients appending to the file at the same
1290 * time mark that the server has changed
1291 * the file if the server's notion of the
1292 * file size is larger then our notion.
1293 *
1294 * XXX this needs work.
79e5012e
MD
1295 */
1296 if (vap->va_size < np->n_size) {
984263bc 1297 vap->va_size = np->n_size;
79e5012e 1298 } else {
984263bc 1299 np->n_size = vap->va_size;
5a9187cb 1300 np->n_flag |= NRMODIFIED;
79e5012e 1301 }
984263bc 1302 } else {
5a9187cb
MD
1303 /*
1304 * Someone changed the file's size on the
1305 * server and there are no local changes
1306 * to get in the way, set the size and mark
1307 * it.
1308 */
984263bc 1309 np->n_size = vap->va_size;
5a9187cb 1310 np->n_flag |= NRMODIFIED;
984263bc
MD
1311 }
1312 vnode_pager_setsize(vp, np->n_size);
1313 } else {
1314 np->n_size = vap->va_size;
1315 }
1316 }
1317 if (vaper != NULL) {
1318 bcopy((caddr_t)vap, (caddr_t)vaper, sizeof(*vap));
1319 if (np->n_flag & NCHG) {
1320 if (np->n_flag & NACC)
1321 vaper->va_atime = np->n_atim;
1322 if (np->n_flag & NUPD)
1323 vaper->va_mtime = np->n_mtim;
1324 }
1325 }
1326 return (0);
1327}
1328
1329#ifdef NFS_ACDEBUG
1330#include <sys/sysctl.h>
1331SYSCTL_DECL(_vfs_nfs);
1332static int nfs_acdebug;
1333SYSCTL_INT(_vfs_nfs, OID_AUTO, acdebug, CTLFLAG_RW, &nfs_acdebug, 0, "");
1334#endif
1335
1336/*
1337 * Check the time stamp
1338 * If the cache is valid, copy contents to *vap and return 0
1339 * otherwise return an error
1340 */
1341int
e851b29e 1342nfs_getattrcache(struct vnode *vp, struct vattr *vaper)
984263bc 1343{
40393ded
RG
1344 struct nfsnode *np;
1345 struct vattr *vap;
984263bc
MD
1346 struct nfsmount *nmp;
1347 int timeo;
1348
1349 np = VTONFS(vp);
1350 vap = &np->n_vattr;
1351 nmp = VFSTONFS(vp->v_mount);
fad57d0e
MD
1352
1353 /*
1354 * Dynamic timeout based on how recently the file was modified.
5a9187cb 1355 * n_mtime is always valid.
fad57d0e 1356 */
97100839 1357 timeo = (get_approximate_time_t() - np->n_mtime) / 60;
984263bc
MD
1358
1359#ifdef NFS_ACDEBUG
1360 if (nfs_acdebug>1)
086c1d7e 1361 kprintf("nfs_getattrcache: initial timeo = %d\n", timeo);
984263bc
MD
1362#endif
1363
1364 if (vap->va_type == VDIR) {
5a9187cb 1365 if ((np->n_flag & NLMODIFIED) || timeo < nmp->nm_acdirmin)
984263bc
MD
1366 timeo = nmp->nm_acdirmin;
1367 else if (timeo > nmp->nm_acdirmax)
1368 timeo = nmp->nm_acdirmax;
1369 } else {
5a9187cb 1370 if ((np->n_flag & NLMODIFIED) || timeo < nmp->nm_acregmin)
984263bc
MD
1371 timeo = nmp->nm_acregmin;
1372 else if (timeo > nmp->nm_acregmax)
1373 timeo = nmp->nm_acregmax;
1374 }
1375
1376#ifdef NFS_ACDEBUG
1377 if (nfs_acdebug > 2)
086c1d7e 1378 kprintf("acregmin %d; acregmax %d; acdirmin %d; acdirmax %d\n",
984263bc
MD
1379 nmp->nm_acregmin, nmp->nm_acregmax,
1380 nmp->nm_acdirmin, nmp->nm_acdirmax);
1381
1382 if (nfs_acdebug)
086c1d7e 1383 kprintf("nfs_getattrcache: age = %d; final timeo = %d\n",
9793c819 1384 (int)(time_second - np->n_attrstamp), timeo);
984263bc
MD
1385#endif
1386
9793c819 1387 if (np->n_attrstamp == 0 || (time_second - np->n_attrstamp) >= timeo) {
984263bc
MD
1388 nfsstats.attrcache_misses++;
1389 return (ENOENT);
1390 }
1391 nfsstats.attrcache_hits++;
5a9187cb
MD
1392
1393 /*
1394 * Our attribute cache can be stale due to modifications made on
1395 * this host. XXX this is a bad hack. We need a more deterministic
1396 * means of finding out which np fields are valid verses attr cache
1397 * fields. We really should update the vattr info on the fly when
1398 * making local changes.
1399 */
984263bc
MD
1400 if (vap->va_size != np->n_size) {
1401 if (vap->va_type == VREG) {
5a9187cb 1402 if (np->n_flag & NLMODIFIED) {
984263bc
MD
1403 if (vap->va_size < np->n_size)
1404 vap->va_size = np->n_size;
1405 else
1406 np->n_size = vap->va_size;
1407 } else {
1408 np->n_size = vap->va_size;
1409 }
1410 vnode_pager_setsize(vp, np->n_size);
1411 } else {
1412 np->n_size = vap->va_size;
1413 }
1414 }
1415 bcopy((caddr_t)vap, (caddr_t)vaper, sizeof(struct vattr));
1416 if (np->n_flag & NCHG) {
1417 if (np->n_flag & NACC)
1418 vaper->va_atime = np->n_atim;
1419 if (np->n_flag & NUPD)
1420 vaper->va_mtime = np->n_mtim;
1421 }
1422 return (0);
1423}
1424
1425#ifndef NFS_NOSERVER
fad57d0e 1426
984263bc
MD
1427/*
1428 * Set up nameidata for a lookup() call and do it.
1429 *
1430 * If pubflag is set, this call is done for a lookup operation on the
1431 * public filehandle. In that case we allow crossing mountpoints and
1432 * absolute pathnames. However, the caller is expected to check that
1433 * the lookup result is within the public fs, and deny access if
1434 * it is not.
1435 *
984263bc
MD
1436 * dirp may be set whether an error is returned or not, and must be
1437 * released by the caller.
fad57d0e 1438 *
28623bf9 1439 * On return nd->nl_nch usually points to the target ncp, which may represent
fad57d0e
MD
1440 * a negative hit.
1441 *
1442 * NOTE: the caller must call nlookup_done(nd) unconditionally on return
1443 * to cleanup.
984263bc
MD
1444 */
1445int
3a907475 1446nfs_namei(struct nlookupdata *nd, struct ucred *cred, int nflags,
fad57d0e
MD
1447 struct vnode **dvpp, struct vnode **vpp,
1448 fhandle_t *fhp, int len,
1449 struct nfssvc_sock *slp, struct sockaddr *nam, struct mbuf **mdp,
1450 caddr_t *dposp, struct vnode **dirpp, struct thread *td,
1451 int kerbflag, int pubflag)
984263bc 1452{
40393ded
RG
1453 int i, rem;
1454 struct mbuf *md;
1455 char *fromcp, *tocp, *cp;
fad57d0e 1456 char *namebuf;
28623bf9 1457 struct nchandle nch;
984263bc 1458 struct vnode *dp;
67863d04 1459 struct mount *mp;
fad57d0e 1460 int error, rdonly;
984263bc 1461
70aac194 1462 namebuf = objcache_get(namei_oc, M_WAITOK);
fad57d0e 1463 *dirpp = NULL;
984263bc
MD
1464
1465 /*
fad57d0e 1466 * Copy the name from the mbuf list to namebuf.
984263bc
MD
1467 */
1468 fromcp = *dposp;
fad57d0e 1469 tocp = namebuf;
984263bc
MD
1470 md = *mdp;
1471 rem = mtod(md, caddr_t) + md->m_len - fromcp;
1472 for (i = 0; i < len; i++) {
1473 while (rem == 0) {
1474 md = md->m_next;
1475 if (md == NULL) {
1476 error = EBADRPC;
1477 goto out;
1478 }
1479 fromcp = mtod(md, caddr_t);
1480 rem = md->m_len;
1481 }
1482 if (*fromcp == '\0' || (!pubflag && *fromcp == '/')) {
1483 error = EACCES;
1484 goto out;
1485 }
1486 *tocp++ = *fromcp++;
1487 rem--;
1488 }
1489 *tocp = '\0';
1490 *mdp = md;
1491 *dposp = fromcp;
1492 len = nfsm_rndup(len)-len;
1493 if (len > 0) {
1494 if (rem >= len)
1495 *dposp += len;
1496 else if ((error = nfs_adv(mdp, dposp, len, rem)) != 0)
1497 goto out;
1498 }
1499
1500 /*
fad57d0e
MD
1501 * Extract and set starting directory. The returned dp is refd
1502 * but not locked.
984263bc 1503 */
67863d04 1504 error = nfsrv_fhtovp(fhp, FALSE, &mp, &dp, cred, slp,
fad57d0e 1505 nam, &rdonly, kerbflag, pubflag);
984263bc
MD
1506 if (error)
1507 goto out;
1508 if (dp->v_type != VDIR) {
1509 vrele(dp);
1510 error = ENOTDIR;
1511 goto out;
1512 }
1513
984263bc
MD
1514 /*
1515 * Set return directory. Reference to dp is implicitly transfered
fad57d0e
MD
1516 * to the returned pointer. This must be set before we potentially
1517 * goto out below.
984263bc 1518 */
fad57d0e 1519 *dirpp = dp;
984263bc
MD
1520
1521 if (pubflag) {
1522 /*
1523 * Oh joy. For WebNFS, handle those pesky '%' escapes,
1524 * and the 'native path' indicator.
1525 */
70aac194 1526 cp = objcache_get(namei_oc, M_WAITOK);
fad57d0e 1527 fromcp = namebuf;
984263bc
MD
1528 tocp = cp;
1529 if ((unsigned char)*fromcp >= WEBNFS_SPECCHAR_START) {
1530 switch ((unsigned char)*fromcp) {
1531 case WEBNFS_NATIVE_CHAR:
1532 /*
1533 * 'Native' path for us is the same
1534 * as a path according to the NFS spec,
1535 * just skip the escape char.
1536 */
1537 fromcp++;
1538 break;
1539 /*
1540 * More may be added in the future, range 0x80-0xff
1541 */
1542 default:
1543 error = EIO;
70aac194 1544 objcache_put(namei_oc, cp);
984263bc
MD
1545 goto out;
1546 }
1547 }
1548 /*
1549 * Translate the '%' escapes, URL-style.
1550 */
1551 while (*fromcp != '\0') {
1552 if (*fromcp == WEBNFS_ESC_CHAR) {
1553 if (fromcp[1] != '\0' && fromcp[2] != '\0') {
1554 fromcp++;
1555 *tocp++ = HEXSTRTOI(fromcp);
1556 fromcp += 2;
1557 continue;
1558 } else {
1559 error = ENOENT;
70aac194 1560 objcache_put(namei_oc, cp);
984263bc
MD
1561 goto out;
1562 }
1563 } else
1564 *tocp++ = *fromcp++;
1565 }
1566 *tocp = '\0';
70aac194 1567 objcache_put(namei_oc, namebuf);
fad57d0e 1568 namebuf = cp;
984263bc
MD
1569 }
1570
fad57d0e
MD
1571 /*
1572 * Setup for search. We need to get a start directory from dp. Note
1573 * that dp is ref'd, but we no longer 'own' the ref (*dirpp owns it).
1574 */
1575 if (pubflag == 0) {
3a907475
MD
1576 nflags |= NLC_NFS_NOSOFTLINKTRAV;
1577 nflags |= NLC_NOCROSSMOUNT;
984263bc 1578 }
fad57d0e 1579 if (rdonly)
3a907475 1580 nflags |= NLC_NFS_RDONLY;
984263bc
MD
1581
1582 /*
fad57d0e
MD
1583 * We need a starting ncp from the directory vnode dp. dp must not
1584 * be locked. The returned ncp will be refd but not locked.
1585 *
1586 * If no suitable ncp is found we instruct cache_fromdvp() to create
1587 * one. If this fails the directory has probably been removed while
1588 * the target was chdir'd into it and any further lookup will fail.
984263bc 1589 */
28623bf9 1590 if ((error = cache_fromdvp(dp, cred, 1, &nch)) != 0)
fad57d0e 1591 goto out;
3a907475 1592 nlookup_init_raw(nd, namebuf, UIO_SYSSPACE, nflags, cred, &nch);
28623bf9 1593 cache_drop(&nch);
984263bc 1594
fad57d0e
MD
1595 /*
1596 * Ok, do the lookup.
1597 */
1598 error = nlookup(nd);
984263bc 1599
fad57d0e
MD
1600 /*
1601 * If no error occured return the requested dvpp and vpp. If
28623bf9 1602 * NLC_CREATE was specified nd->nl_nch may represent a negative
fad57d0e
MD
1603 * cache hit in which case we do not attempt to obtain the vp.
1604 */
1605 if (error == 0) {
fad57d0e 1606 if (dvpp) {
443472eb 1607 if (nd->nl_nch.ncp->nc_parent) {
28623bf9
MD
1608 nch = nd->nl_nch;
1609 nch.ncp = nch.ncp->nc_parent;
1610 error = cache_vget(&nch, nd->nl_cred,
1611 LK_EXCLUSIVE, dvpp);
fad57d0e
MD
1612 } else {
1613 error = ENXIO;
1614 }
984263bc 1615 }
28623bf9
MD
1616 if (vpp && nd->nl_nch.ncp->nc_vp) {
1617 error = cache_vget(&nd->nl_nch, nd->nl_cred, LK_EXCLUSIVE, vpp);
984263bc 1618 }
984263bc 1619 if (error) {
fad57d0e
MD
1620 if (dvpp && *dvpp) {
1621 vput(*dvpp);
1622 *dvpp = NULL;
1623 }
1624 if (vpp && *vpp) {
1625 vput(*vpp);
1626 *vpp = NULL;
1627 }
984263bc 1628 }
984263bc
MD
1629 }
1630
1631 /*
fad57d0e 1632 * Finish up.
984263bc
MD
1633 */
1634out:
70aac194 1635 objcache_put(namei_oc, namebuf);
984263bc
MD
1636 return (error);
1637}
1638
1639/*
1640 * A fiddled version of m_adj() that ensures null fill to a long
1641 * boundary and only trims off the back end
1642 */
1643void
e851b29e 1644nfsm_adj(struct mbuf *mp, int len, int nul)
984263bc 1645{
40393ded
RG
1646 struct mbuf *m;
1647 int count, i;
1648 char *cp;
984263bc
MD
1649
1650 /*
1651 * Trim from tail. Scan the mbuf chain,
1652 * calculating its length and finding the last mbuf.
1653 * If the adjustment only affects this mbuf, then just
1654 * adjust and return. Otherwise, rescan and truncate
1655 * after the remaining size.
1656 */
1657 count = 0;
1658 m = mp;
1659 for (;;) {
1660 count += m->m_len;
60233e58 1661 if (m->m_next == NULL)
984263bc
MD
1662 break;
1663 m = m->m_next;
1664 }
1665 if (m->m_len > len) {
1666 m->m_len -= len;
1667 if (nul > 0) {
1668 cp = mtod(m, caddr_t)+m->m_len-nul;
1669 for (i = 0; i < nul; i++)
1670 *cp++ = '\0';
1671 }
1672 return;
1673 }
1674 count -= len;
1675 if (count < 0)
1676 count = 0;
1677 /*
1678 * Correct length for chain is "count".
1679 * Find the mbuf with last data, adjust its length,
1680 * and toss data from remaining mbufs on chain.
1681 */
1682 for (m = mp; m; m = m->m_next) {
1683 if (m->m_len >= count) {
1684 m->m_len = count;
1685 if (nul > 0) {
1686 cp = mtod(m, caddr_t)+m->m_len-nul;
1687 for (i = 0; i < nul; i++)
1688 *cp++ = '\0';
1689 }
1690 break;
1691 }
1692 count -= m->m_len;
1693 }
1694 for (m = m->m_next;m;m = m->m_next)
1695 m->m_len = 0;
1696}
1697
1698/*
1699 * Make these functions instead of macros, so that the kernel text size
1700 * doesn't get too big...
1701 */
1702void
e851b29e
CP
1703nfsm_srvwcc(struct nfsrv_descript *nfsd, int before_ret,
1704 struct vattr *before_vap, int after_ret, struct vattr *after_vap,
1705 struct mbuf **mbp, char **bposp)
984263bc 1706{
40393ded
RG
1707 struct mbuf *mb = *mbp, *mb2;
1708 char *bpos = *bposp;
1709 u_int32_t *tl;
984263bc 1710
5a9187cb
MD
1711 /*
1712 * before_ret is 0 if before_vap is valid, non-zero if it isn't.
1713 */
984263bc
MD
1714 if (before_ret) {
1715 nfsm_build(tl, u_int32_t *, NFSX_UNSIGNED);
1716 *tl = nfs_false;
1717 } else {
1718 nfsm_build(tl, u_int32_t *, 7 * NFSX_UNSIGNED);
1719 *tl++ = nfs_true;
1720 txdr_hyper(before_vap->va_size, tl);
1721 tl += 2;
1722 txdr_nfsv3time(&(before_vap->va_mtime), tl);
1723 tl += 2;
1724 txdr_nfsv3time(&(before_vap->va_ctime), tl);
1725 }
1726 *bposp = bpos;
1727 *mbp = mb;
1728 nfsm_srvpostopattr(nfsd, after_ret, after_vap, mbp, bposp);
1729}
1730
1731void
e851b29e
CP
1732nfsm_srvpostopattr(struct nfsrv_descript *nfsd, int after_ret,
1733 struct vattr *after_vap, struct mbuf **mbp, char **bposp)
984263bc 1734{
40393ded
RG
1735 struct mbuf *mb = *mbp, *mb2;
1736 char *bpos = *bposp;
1737 u_int32_t *tl;
1738 struct nfs_fattr *fp;
984263bc
MD
1739
1740 if (after_ret) {
1741 nfsm_build(tl, u_int32_t *, NFSX_UNSIGNED);
1742 *tl = nfs_false;
1743 } else {
1744 nfsm_build(tl, u_int32_t *, NFSX_UNSIGNED + NFSX_V3FATTR);
1745 *tl++ = nfs_true;
1746 fp = (struct nfs_fattr *)tl;
1747 nfsm_srvfattr(nfsd, after_vap, fp);
1748 }
1749 *mbp = mb;
1750 *bposp = bpos;
1751}
1752
1753void
e851b29e
CP
1754nfsm_srvfattr(struct nfsrv_descript *nfsd, struct vattr *vap,
1755 struct nfs_fattr *fp)
984263bc 1756{
50626622
MD
1757 /*
1758 * NFS seems to truncate nlink to 16 bits, don't let it overflow.
1759 */
1760 if (vap->va_nlink > 65535)
1761 fp->fa_nlink = 65535;
1762 else
1763 fp->fa_nlink = txdr_unsigned(vap->va_nlink);
984263bc
MD
1764 fp->fa_uid = txdr_unsigned(vap->va_uid);
1765 fp->fa_gid = txdr_unsigned(vap->va_gid);
1766 if (nfsd->nd_flag & ND_NFSV3) {
1767 fp->fa_type = vtonfsv3_type(vap->va_type);
1768 fp->fa_mode = vtonfsv3_mode(vap->va_mode);
1769 txdr_hyper(vap->va_size, &fp->fa3_size);
1770 txdr_hyper(vap->va_bytes, &fp->fa3_used);
0e9b9130
MD
1771 fp->fa3_rdev.specdata1 = txdr_unsigned(vap->va_rmajor);
1772 fp->fa3_rdev.specdata2 = txdr_unsigned(vap->va_rminor);
984263bc
MD
1773 fp->fa3_fsid.nfsuquad[0] = 0;
1774 fp->fa3_fsid.nfsuquad[1] = txdr_unsigned(vap->va_fsid);
50626622 1775 txdr_hyper(vap->va_fileid, &fp->fa3_fileid);
984263bc
MD
1776 txdr_nfsv3time(&vap->va_atime, &fp->fa3_atime);
1777 txdr_nfsv3time(&vap->va_mtime, &fp->fa3_mtime);
1778 txdr_nfsv3time(&vap->va_ctime, &fp->fa3_ctime);
1779 } else {
1780 fp->fa_type = vtonfsv2_type(vap->va_type);
1781 fp->fa_mode = vtonfsv2_mode(vap->va_type, vap->va_mode);
1782 fp->fa2_size = txdr_unsigned(vap->va_size);
1783 fp->fa2_blocksize = txdr_unsigned(vap->va_blocksize);
1784 if (vap->va_type == VFIFO)
1785 fp->fa2_rdev = 0xffffffff;
1786 else
0e9b9130 1787 fp->fa2_rdev = txdr_unsigned(makeudev(vap->va_rmajor, vap->va_rminor));
984263bc
MD
1788 fp->fa2_blocks = txdr_unsigned(vap->va_bytes / NFS_FABLKSIZE);
1789 fp->fa2_fsid = txdr_unsigned(vap->va_fsid);
1790 fp->fa2_fileid = txdr_unsigned(vap->va_fileid);
1791 txdr_nfsv2time(&vap->va_atime, &fp->fa2_atime);
1792 txdr_nfsv2time(&vap->va_mtime, &fp->fa2_mtime);
1793 txdr_nfsv2time(&vap->va_ctime, &fp->fa2_ctime);
1794 }
1795}
1796
1797/*
1798 * nfsrv_fhtovp() - convert a fh to a vnode ptr (optionally locked)
1799 * - look up fsid in mount list (if not found ret error)
1800 * - get vp and export rights by calling VFS_FHTOVP()
1801 * - if cred->cr_uid == 0 or MNT_EXPORTANON set it to credanon
a11aaa81 1802 * - if not lockflag unlock it with vn_unlock()
984263bc
MD
1803 */
1804int
67863d04
MD
1805nfsrv_fhtovp(fhandle_t *fhp, int lockflag,
1806 struct mount **mpp, struct vnode **vpp,
e851b29e
CP
1807 struct ucred *cred, struct nfssvc_sock *slp, struct sockaddr *nam,
1808 int *rdonlyp, int kerbflag, int pubflag)
984263bc 1809{
40393ded
RG
1810 struct mount *mp;
1811 int i;
984263bc
MD
1812 struct ucred *credanon;
1813 int error, exflags;
1814#ifdef MNT_EXNORESPORT /* XXX needs mountd and /etc/exports help yet */
1815 struct sockaddr_int *saddr;
1816#endif
1817
67863d04
MD
1818 *vpp = NULL;
1819 *mpp = NULL;
984263bc
MD
1820
1821 if (nfs_ispublicfh(fhp)) {
1822 if (!pubflag || !nfs_pub.np_valid)
1823 return (ESTALE);
1824 fhp = &nfs_pub.np_handle;
1825 }
1826
67863d04
MD
1827 mp = *mpp = vfs_getvfs(&fhp->fh_fsid);
1828 if (mp == NULL)
984263bc
MD
1829 return (ESTALE);
1830 error = VFS_CHECKEXP(mp, nam, &exflags, &credanon);
1831 if (error)
1832 return (error);
67863d04 1833 error = VFS_FHTOVP(mp, NULL, &fhp->fh_fid, vpp);
984263bc
MD
1834 if (error)
1835 return (error);
1836#ifdef MNT_EXNORESPORT
1837 if (!(exflags & (MNT_EXNORESPORT|MNT_EXPUBLIC))) {
1838 saddr = (struct sockaddr_in *)nam;
1839 if (saddr->sin_family == AF_INET &&
1840 ntohs(saddr->sin_port) >= IPPORT_RESERVED) {
1841 vput(*vpp);
1842 *vpp = NULL;
1843 return (NFSERR_AUTHERR | AUTH_TOOWEAK);
1844 }
1845 }
1846#endif
1847 /*
1848 * Check/setup credentials.
1849 */
1850 if (exflags & MNT_EXKERB) {
1851 if (!kerbflag) {
1852 vput(*vpp);
1853 *vpp = NULL;
1854 return (NFSERR_AUTHERR | AUTH_TOOWEAK);
1855 }
1856 } else if (kerbflag) {
1857 vput(*vpp);
1858 *vpp = NULL;
1859 return (NFSERR_AUTHERR | AUTH_TOOWEAK);
1860 } else if (cred->cr_uid == 0 || (exflags & MNT_EXPORTANON)) {
1861 cred->cr_uid = credanon->cr_uid;
1862 for (i = 0; i < credanon->cr_ngroups && i < NGROUPS; i++)
1863 cred->cr_groups[i] = credanon->cr_groups[i];
1864 cred->cr_ngroups = i;
1865 }
1866 if (exflags & MNT_EXRDONLY)
1867 *rdonlyp = 1;
1868 else
1869 *rdonlyp = 0;
1870
984263bc 1871 if (!lockflag)
a11aaa81 1872 vn_unlock(*vpp);
984263bc
MD
1873 return (0);
1874}
1875
1876
1877/*
1878 * WebNFS: check if a filehandle is a public filehandle. For v3, this
1879 * means a length of 0, for v2 it means all zeroes. nfsm_srvmtofh has
1880 * transformed this to all zeroes in both cases, so check for it.
1881 */
1882int
e851b29e 1883nfs_ispublicfh(fhandle_t *fhp)
984263bc
MD
1884{
1885 char *cp = (char *)fhp;
1886 int i;
1887
1888 for (i = 0; i < NFSX_V3FH; i++)
1889 if (*cp++ != 0)
1890 return (FALSE);
1891 return (TRUE);
1892}
1893
1894#endif /* NFS_NOSERVER */
1895/*
1896 * This function compares two net addresses by family and returns TRUE
1897 * if they are the same host.
1898 * If there is any doubt, return FALSE.
1899 * The AF_INET family is handled as a special case so that address mbufs
1900 * don't need to be saved to store "struct in_addr", which is only 4 bytes.
1901 */
1902int
e851b29e 1903netaddr_match(int family, union nethostaddr *haddr, struct sockaddr *nam)
984263bc 1904{
40393ded 1905 struct sockaddr_in *inetaddr;
984263bc
MD
1906
1907 switch (family) {
1908 case AF_INET:
1909 inetaddr = (struct sockaddr_in *)nam;
1910 if (inetaddr->sin_family == AF_INET &&
1911 inetaddr->sin_addr.s_addr == haddr->had_inetaddr)
1912 return (1);
1913 break;
1914 default:
1915 break;
1916 };
1917 return (0);
1918}
1919
1920static nfsuint64 nfs_nullcookie = { { 0, 0 } };
1921/*
1922 * This function finds the directory cookie that corresponds to the
1923 * logical byte offset given.
1924 */
1925nfsuint64 *
e851b29e 1926nfs_getcookie(struct nfsnode *np, off_t off, int add)
984263bc 1927{
40393ded
RG
1928 struct nfsdmap *dp, *dp2;
1929 int pos;
984263bc
MD
1930
1931 pos = (uoff_t)off / NFS_DIRBLKSIZ;
1932 if (pos == 0 || off < 0) {
1933#ifdef DIAGNOSTIC
1934 if (add)
1935 panic("nfs getcookie add at <= 0");
1936#endif
1937 return (&nfs_nullcookie);
1938 }
1939 pos--;
1940 dp = np->n_cookies.lh_first;
1941 if (!dp) {
1942 if (add) {
1943 MALLOC(dp, struct nfsdmap *, sizeof (struct nfsdmap),
1944 M_NFSDIROFF, M_WAITOK);
1945 dp->ndm_eocookie = 0;
1946 LIST_INSERT_HEAD(&np->n_cookies, dp, ndm_list);
1947 } else
60233e58 1948 return (NULL);
984263bc
MD
1949 }
1950 while (pos >= NFSNUMCOOKIES) {
1951 pos -= NFSNUMCOOKIES;
1952 if (dp->ndm_list.le_next) {
1953 if (!add && dp->ndm_eocookie < NFSNUMCOOKIES &&
1954 pos >= dp->ndm_eocookie)
60233e58 1955 return (NULL);
984263bc
MD
1956 dp = dp->ndm_list.le_next;
1957 } else if (add) {
1958 MALLOC(dp2, struct nfsdmap *, sizeof (struct nfsdmap),
1959 M_NFSDIROFF, M_WAITOK);
1960 dp2->ndm_eocookie = 0;
1961 LIST_INSERT_AFTER(dp, dp2, ndm_list);
1962 dp = dp2;
1963 } else
60233e58 1964 return (NULL);
984263bc
MD
1965 }
1966 if (pos >= dp->ndm_eocookie) {
1967 if (add)
1968 dp->ndm_eocookie = pos + 1;
1969 else
60233e58 1970 return (NULL);
984263bc
MD
1971 }
1972 return (&dp->ndm_cookies[pos]);
1973}
1974
1975/*
1976 * Invalidate cached directory information, except for the actual directory
1977 * blocks (which are invalidated separately).
1978 * Done mainly to avoid the use of stale offset cookies.
1979 */
1980void
e851b29e 1981nfs_invaldir(struct vnode *vp)
984263bc 1982{
40393ded 1983 struct nfsnode *np = VTONFS(vp);
984263bc
MD
1984
1985#ifdef DIAGNOSTIC
1986 if (vp->v_type != VDIR)
1987 panic("nfs: invaldir not dir");
1988#endif
1989 np->n_direofoffset = 0;
1990 np->n_cookieverf.nfsuquad[0] = 0;
1991 np->n_cookieverf.nfsuquad[1] = 0;
1992 if (np->n_cookies.lh_first)
1993 np->n_cookies.lh_first->ndm_eocookie = 0;
1994}
1995
1996/*
1c843a13
MD
1997 * Set the v_type field for an NFS client's vnode and initialize for
1998 * buffer cache operations if necessary.
1999 */
2000void
2001nfs_setvtype(struct vnode *vp, enum vtype vtyp)
2002{
2003 vp->v_type = vtyp;
2004
2005 switch(vtyp) {
2006 case VREG:
2007 case VDIR:
2008 case VLNK:
2009 vinitvmio(vp, 0); /* needs VMIO, size not yet known */
2010 break;
2011 default:
2012 break;
2013 }
2014}
2015
2016/*
984263bc
MD
2017 * The write verifier has changed (probably due to a server reboot), so all
2018 * B_NEEDCOMMIT blocks will have to be written again. Since they are on the
2019 * dirty block list as B_DELWRI, all this takes is clearing the B_NEEDCOMMIT
2020 * and B_CLUSTEROK flags. Once done the new write verifier can be set for the
2021 * mount point.
2022 *
2023 * B_CLUSTEROK must be cleared along with B_NEEDCOMMIT because stage 1 data
2024 * writes are not clusterable.
2025 */
6bae6177
MD
2026
2027static int nfs_clearcommit_bp(struct buf *bp, void *data __unused);
2028
984263bc 2029void
e851b29e 2030nfs_clearcommit(struct mount *mp)
984263bc 2031{
40393ded 2032 struct vnode *vp, *nvp;
b2eb81cd 2033 lwkt_tokref ilock;
984263bc 2034
b2eb81cd 2035 lwkt_gettoken(&ilock, &mntvnode_token);
165dba55 2036 crit_enter();
984263bc 2037 for (vp = TAILQ_FIRST(&mp->mnt_nvnodelist); vp; vp = nvp) {
41a01a4d 2038 nvp = TAILQ_NEXT(vp, v_nmntvnodes); /* ZZZ */
6bae6177
MD
2039 RB_SCAN(buf_rb_tree, &vp->v_rbdirty_tree, NULL,
2040 nfs_clearcommit_bp, NULL);
984263bc 2041 }
165dba55 2042 crit_exit();
b2eb81cd 2043 lwkt_reltoken(&ilock);
984263bc
MD
2044}
2045
6bae6177
MD
2046static int
2047nfs_clearcommit_bp(struct buf *bp, void *data __unused)
2048{
2049 if (BUF_REFCNT(bp) == 0 &&
2050 (bp->b_flags & (B_DELWRI | B_NEEDCOMMIT))
2051 == (B_DELWRI | B_NEEDCOMMIT)) {
2052 bp->b_flags &= ~(B_NEEDCOMMIT | B_CLUSTEROK);
2053 }
2054 return(0);
2055}
2056
984263bc
MD
2057#ifndef NFS_NOSERVER
2058/*
2059 * Map errnos to NFS error numbers. For Version 3 also filter out error
2060 * numbers not specified for the associated procedure.
2061 */
2062int
e851b29e 2063nfsrv_errmap(struct nfsrv_descript *nd, int err)
984263bc 2064{
40393ded 2065 short *defaulterrp, *errp;
984263bc
MD
2066
2067 if (nd->nd_flag & ND_NFSV3) {
2068 if (nd->nd_procnum <= NFSPROC_COMMIT) {
2069 errp = defaulterrp = nfsrv_v3errmap[nd->nd_procnum];
2070 while (*++errp) {
2071 if (*errp == err)
2072 return (err);
2073 else if (*errp > err)
2074 break;
2075 }
2076 return ((int)*defaulterrp);
2077 } else
2078 return (err & 0xffff);
2079 }
2080 if (err <= ELAST)
2081 return ((int)nfsrv_v2errmap[err - 1]);
2082 return (NFSERR_IO);
2083}
2084
984263bc
MD
2085/*
2086 * Sort the group list in increasing numerical order.
2087 * (Insertion sort by Chris Torek, who was grossed out by the bubble sort
2088 * that used to be here.)
2089 */
2090void
e851b29e 2091nfsrvw_sort(gid_t *list, int num)
984263bc 2092{
40393ded 2093 int i, j;
984263bc
MD
2094 gid_t v;
2095
2096 /* Insertion sort. */
2097 for (i = 1; i < num; i++) {
2098 v = list[i];
2099 /* find correct slot for value v, moving others up */
2100 for (j = i; --j >= 0 && v < list[j];)
2101 list[j + 1] = list[j];
2102 list[j + 1] = v;
2103 }
2104}
2105
2106/*
2107 * copy credentials making sure that the result can be compared with bcmp().
2108 */
2109void
e851b29e 2110nfsrv_setcred(struct ucred *incred, struct ucred *outcred)
984263bc 2111{
40393ded 2112 int i;
984263bc
MD
2113
2114 bzero((caddr_t)outcred, sizeof (struct ucred));
2115 outcred->cr_ref = 1;
2116 outcred->cr_uid = incred->cr_uid;
2117 outcred->cr_ngroups = incred->cr_ngroups;
2118 for (i = 0; i < incred->cr_ngroups; i++)
2119 outcred->cr_groups[i] = incred->cr_groups[i];
2120 nfsrvw_sort(outcred->cr_groups, outcred->cr_ngroups);
2121}
2122#endif /* NFS_NOSERVER */