Commit | Line | Data |
---|---|---|
984263bc MD |
1 | /* |
2 | * Copyright (c) 1989, 1993 | |
3 | * The Regents of the University of California. All rights reserved. | |
4 | * | |
5 | * This code is derived from software contributed to Berkeley by | |
6 | * Rick Macklem at The University of Guelph. | |
7 | * | |
8 | * Redistribution and use in source and binary forms, with or without | |
9 | * modification, are permitted provided that the following conditions | |
10 | * are met: | |
11 | * 1. Redistributions of source code must retain the above copyright | |
12 | * notice, this list of conditions and the following disclaimer. | |
13 | * 2. Redistributions in binary form must reproduce the above copyright | |
14 | * notice, this list of conditions and the following disclaimer in the | |
15 | * documentation and/or other materials provided with the distribution. | |
16 | * 3. All advertising materials mentioning features or use of this software | |
17 | * must display the following acknowledgement: | |
18 | * This product includes software developed by the University of | |
19 | * California, Berkeley and its contributors. | |
20 | * 4. Neither the name of the University nor the names of its contributors | |
21 | * may be used to endorse or promote products derived from this software | |
22 | * without specific prior written permission. | |
23 | * | |
24 | * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND | |
25 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
26 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
27 | * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE | |
28 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
29 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
30 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
31 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
32 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
33 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
34 | * SUCH DAMAGE. | |
35 | * | |
36 | * @(#)nfs_subs.c 8.8 (Berkeley) 5/22/95 | |
79e5012e | 37 | * $FreeBSD: /repoman/r/ncvs/src/sys/nfsclient/nfs_subs.c,v 1.128 2004/04/14 23:23:55 peadar Exp $ |
70aac194 | 38 | * $DragonFly: src/sys/vfs/nfs/nfs_subs.c,v 1.39 2006/06/01 06:10:57 dillon Exp $ |
984263bc MD |
39 | */ |
40 | ||
41 | /* | |
42 | * These functions support the macros and help fiddle mbuf chains for | |
43 | * the nfs op functions. They do things like create the rpc header and | |
44 | * copy data between mbuf chains and uio lists. | |
45 | */ | |
46 | #include <sys/param.h> | |
47 | #include <sys/systm.h> | |
48 | #include <sys/kernel.h> | |
49 | #include <sys/buf.h> | |
50 | #include <sys/proc.h> | |
51 | #include <sys/mount.h> | |
52 | #include <sys/vnode.h> | |
fad57d0e | 53 | #include <sys/nlookup.h> |
984263bc MD |
54 | #include <sys/namei.h> |
55 | #include <sys/mbuf.h> | |
56 | #include <sys/socket.h> | |
57 | #include <sys/stat.h> | |
58 | #include <sys/malloc.h> | |
59 | #include <sys/sysent.h> | |
60 | #include <sys/syscall.h> | |
61 | #include <sys/conf.h> | |
70aac194 | 62 | #include <sys/objcache.h> |
984263bc MD |
63 | |
64 | #include <vm/vm.h> | |
65 | #include <vm/vm_object.h> | |
66 | #include <vm/vm_extern.h> | |
67 | #include <vm/vm_zone.h> | |
68 | ||
3020e3be MD |
69 | #include <sys/buf2.h> |
70 | ||
1f2de5d4 MD |
71 | #include "rpcv2.h" |
72 | #include "nfsproto.h" | |
73 | #include "nfs.h" | |
c1cf1e59 | 74 | #include "nfsmount.h" |
1f2de5d4 MD |
75 | #include "nfsnode.h" |
76 | #include "xdr_subs.h" | |
77 | #include "nfsm_subs.h" | |
1f2de5d4 | 78 | #include "nfsrtt.h" |
984263bc MD |
79 | |
80 | #include <netinet/in.h> | |
81 | ||
82 | /* | |
83 | * Data items converted to xdr at startup, since they are constant | |
84 | * This is kinda hokey, but may save a little time doing byte swaps | |
85 | */ | |
86 | u_int32_t nfs_xdrneg1; | |
87 | u_int32_t rpc_call, rpc_vers, rpc_reply, rpc_msgdenied, rpc_autherr, | |
88 | rpc_mismatch, rpc_auth_unix, rpc_msgaccepted, | |
89 | rpc_auth_kerb; | |
e07fef60 | 90 | u_int32_t nfs_prog, nfs_true, nfs_false; |
984263bc MD |
91 | |
92 | /* And other global data */ | |
93 | static u_int32_t nfs_xid = 0; | |
94 | static enum vtype nv2tov_type[8]= { | |
95 | VNON, VREG, VDIR, VBLK, VCHR, VLNK, VNON, VNON | |
96 | }; | |
97 | enum vtype nv3tov_type[8]= { | |
98 | VNON, VREG, VDIR, VBLK, VCHR, VLNK, VSOCK, VFIFO | |
99 | }; | |
100 | ||
101 | int nfs_ticks; | |
102 | int nfs_pbuf_freecnt = -1; /* start out unlimited */ | |
103 | ||
104 | struct nfs_reqq nfs_reqq; | |
105 | struct nfssvc_sockhead nfssvc_sockhead; | |
106 | int nfssvc_sockhead_flag; | |
107 | struct nfsd_head nfsd_head; | |
108 | int nfsd_head_flag; | |
109 | struct nfs_bufq nfs_bufq; | |
984263bc MD |
110 | struct nqfhhashhead *nqfhhashtbl; |
111 | u_long nqfhhash; | |
112 | ||
984263bc MD |
113 | static int nfs_prev_nfssvc_sy_narg; |
114 | static sy_call_t *nfs_prev_nfssvc_sy_call; | |
115 | ||
116 | #ifndef NFS_NOSERVER | |
117 | ||
984263bc MD |
118 | /* |
119 | * Mapping of old NFS Version 2 RPC numbers to generic numbers. | |
120 | */ | |
121 | int nfsv3_procid[NFS_NPROCS] = { | |
122 | NFSPROC_NULL, | |
123 | NFSPROC_GETATTR, | |
124 | NFSPROC_SETATTR, | |
125 | NFSPROC_NOOP, | |
126 | NFSPROC_LOOKUP, | |
127 | NFSPROC_READLINK, | |
128 | NFSPROC_READ, | |
129 | NFSPROC_NOOP, | |
130 | NFSPROC_WRITE, | |
131 | NFSPROC_CREATE, | |
132 | NFSPROC_REMOVE, | |
133 | NFSPROC_RENAME, | |
134 | NFSPROC_LINK, | |
135 | NFSPROC_SYMLINK, | |
136 | NFSPROC_MKDIR, | |
137 | NFSPROC_RMDIR, | |
138 | NFSPROC_READDIR, | |
139 | NFSPROC_FSSTAT, | |
140 | NFSPROC_NOOP, | |
141 | NFSPROC_NOOP, | |
142 | NFSPROC_NOOP, | |
143 | NFSPROC_NOOP, | |
144 | NFSPROC_NOOP, | |
145 | NFSPROC_NOOP, | |
146 | NFSPROC_NOOP, | |
147 | NFSPROC_NOOP | |
148 | }; | |
149 | ||
150 | #endif /* NFS_NOSERVER */ | |
151 | /* | |
152 | * and the reverse mapping from generic to Version 2 procedure numbers | |
153 | */ | |
154 | int nfsv2_procid[NFS_NPROCS] = { | |
155 | NFSV2PROC_NULL, | |
156 | NFSV2PROC_GETATTR, | |
157 | NFSV2PROC_SETATTR, | |
158 | NFSV2PROC_LOOKUP, | |
159 | NFSV2PROC_NOOP, | |
160 | NFSV2PROC_READLINK, | |
161 | NFSV2PROC_READ, | |
162 | NFSV2PROC_WRITE, | |
163 | NFSV2PROC_CREATE, | |
164 | NFSV2PROC_MKDIR, | |
165 | NFSV2PROC_SYMLINK, | |
166 | NFSV2PROC_CREATE, | |
167 | NFSV2PROC_REMOVE, | |
168 | NFSV2PROC_RMDIR, | |
169 | NFSV2PROC_RENAME, | |
170 | NFSV2PROC_LINK, | |
171 | NFSV2PROC_READDIR, | |
172 | NFSV2PROC_NOOP, | |
173 | NFSV2PROC_STATFS, | |
174 | NFSV2PROC_NOOP, | |
175 | NFSV2PROC_NOOP, | |
176 | NFSV2PROC_NOOP, | |
177 | NFSV2PROC_NOOP, | |
178 | NFSV2PROC_NOOP, | |
179 | NFSV2PROC_NOOP, | |
180 | NFSV2PROC_NOOP, | |
181 | }; | |
182 | ||
183 | #ifndef NFS_NOSERVER | |
184 | /* | |
185 | * Maps errno values to nfs error numbers. | |
186 | * Use NFSERR_IO as the catch all for ones not specifically defined in | |
187 | * RFC 1094. | |
188 | */ | |
189 | static u_char nfsrv_v2errmap[ELAST] = { | |
190 | NFSERR_PERM, NFSERR_NOENT, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
191 | NFSERR_NXIO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
192 | NFSERR_IO, NFSERR_IO, NFSERR_ACCES, NFSERR_IO, NFSERR_IO, | |
193 | NFSERR_IO, NFSERR_EXIST, NFSERR_IO, NFSERR_NODEV, NFSERR_NOTDIR, | |
194 | NFSERR_ISDIR, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
195 | NFSERR_IO, NFSERR_FBIG, NFSERR_NOSPC, NFSERR_IO, NFSERR_ROFS, | |
196 | NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
197 | NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
198 | NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
199 | NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
200 | NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
201 | NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
202 | NFSERR_IO, NFSERR_IO, NFSERR_NAMETOL, NFSERR_IO, NFSERR_IO, | |
203 | NFSERR_NOTEMPTY, NFSERR_IO, NFSERR_IO, NFSERR_DQUOT, NFSERR_STALE, | |
204 | NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
205 | NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
206 | NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
207 | NFSERR_IO /* << Last is 86 */ | |
208 | }; | |
209 | ||
210 | /* | |
211 | * Maps errno values to nfs error numbers. | |
212 | * Although it is not obvious whether or not NFS clients really care if | |
213 | * a returned error value is in the specified list for the procedure, the | |
214 | * safest thing to do is filter them appropriately. For Version 2, the | |
215 | * X/Open XNFS document is the only specification that defines error values | |
216 | * for each RPC (The RFC simply lists all possible error values for all RPCs), | |
217 | * so I have decided to not do this for Version 2. | |
218 | * The first entry is the default error return and the rest are the valid | |
219 | * errors for that RPC in increasing numeric order. | |
220 | */ | |
221 | static short nfsv3err_null[] = { | |
222 | 0, | |
223 | 0, | |
224 | }; | |
225 | ||
226 | static short nfsv3err_getattr[] = { | |
227 | NFSERR_IO, | |
228 | NFSERR_IO, | |
229 | NFSERR_STALE, | |
230 | NFSERR_BADHANDLE, | |
231 | NFSERR_SERVERFAULT, | |
232 | 0, | |
233 | }; | |
234 | ||
235 | static short nfsv3err_setattr[] = { | |
236 | NFSERR_IO, | |
237 | NFSERR_PERM, | |
238 | NFSERR_IO, | |
239 | NFSERR_ACCES, | |
240 | NFSERR_INVAL, | |
241 | NFSERR_NOSPC, | |
242 | NFSERR_ROFS, | |
243 | NFSERR_DQUOT, | |
244 | NFSERR_STALE, | |
245 | NFSERR_BADHANDLE, | |
246 | NFSERR_NOT_SYNC, | |
247 | NFSERR_SERVERFAULT, | |
248 | 0, | |
249 | }; | |
250 | ||
251 | static short nfsv3err_lookup[] = { | |
252 | NFSERR_IO, | |
253 | NFSERR_NOENT, | |
254 | NFSERR_IO, | |
255 | NFSERR_ACCES, | |
256 | NFSERR_NOTDIR, | |
257 | NFSERR_NAMETOL, | |
258 | NFSERR_STALE, | |
259 | NFSERR_BADHANDLE, | |
260 | NFSERR_SERVERFAULT, | |
261 | 0, | |
262 | }; | |
263 | ||
264 | static short nfsv3err_access[] = { | |
265 | NFSERR_IO, | |
266 | NFSERR_IO, | |
267 | NFSERR_STALE, | |
268 | NFSERR_BADHANDLE, | |
269 | NFSERR_SERVERFAULT, | |
270 | 0, | |
271 | }; | |
272 | ||
273 | static short nfsv3err_readlink[] = { | |
274 | NFSERR_IO, | |
275 | NFSERR_IO, | |
276 | NFSERR_ACCES, | |
277 | NFSERR_INVAL, | |
278 | NFSERR_STALE, | |
279 | NFSERR_BADHANDLE, | |
280 | NFSERR_NOTSUPP, | |
281 | NFSERR_SERVERFAULT, | |
282 | 0, | |
283 | }; | |
284 | ||
285 | static short nfsv3err_read[] = { | |
286 | NFSERR_IO, | |
287 | NFSERR_IO, | |
288 | NFSERR_NXIO, | |
289 | NFSERR_ACCES, | |
290 | NFSERR_INVAL, | |
291 | NFSERR_STALE, | |
292 | NFSERR_BADHANDLE, | |
293 | NFSERR_SERVERFAULT, | |
294 | 0, | |
295 | }; | |
296 | ||
297 | static short nfsv3err_write[] = { | |
298 | NFSERR_IO, | |
299 | NFSERR_IO, | |
300 | NFSERR_ACCES, | |
301 | NFSERR_INVAL, | |
302 | NFSERR_FBIG, | |
303 | NFSERR_NOSPC, | |
304 | NFSERR_ROFS, | |
305 | NFSERR_DQUOT, | |
306 | NFSERR_STALE, | |
307 | NFSERR_BADHANDLE, | |
308 | NFSERR_SERVERFAULT, | |
309 | 0, | |
310 | }; | |
311 | ||
312 | static short nfsv3err_create[] = { | |
313 | NFSERR_IO, | |
314 | NFSERR_IO, | |
315 | NFSERR_ACCES, | |
316 | NFSERR_EXIST, | |
317 | NFSERR_NOTDIR, | |
318 | NFSERR_NOSPC, | |
319 | NFSERR_ROFS, | |
320 | NFSERR_NAMETOL, | |
321 | NFSERR_DQUOT, | |
322 | NFSERR_STALE, | |
323 | NFSERR_BADHANDLE, | |
324 | NFSERR_NOTSUPP, | |
325 | NFSERR_SERVERFAULT, | |
326 | 0, | |
327 | }; | |
328 | ||
329 | static short nfsv3err_mkdir[] = { | |
330 | NFSERR_IO, | |
331 | NFSERR_IO, | |
332 | NFSERR_ACCES, | |
333 | NFSERR_EXIST, | |
334 | NFSERR_NOTDIR, | |
335 | NFSERR_NOSPC, | |
336 | NFSERR_ROFS, | |
337 | NFSERR_NAMETOL, | |
338 | NFSERR_DQUOT, | |
339 | NFSERR_STALE, | |
340 | NFSERR_BADHANDLE, | |
341 | NFSERR_NOTSUPP, | |
342 | NFSERR_SERVERFAULT, | |
343 | 0, | |
344 | }; | |
345 | ||
346 | static short nfsv3err_symlink[] = { | |
347 | NFSERR_IO, | |
348 | NFSERR_IO, | |
349 | NFSERR_ACCES, | |
350 | NFSERR_EXIST, | |
351 | NFSERR_NOTDIR, | |
352 | NFSERR_NOSPC, | |
353 | NFSERR_ROFS, | |
354 | NFSERR_NAMETOL, | |
355 | NFSERR_DQUOT, | |
356 | NFSERR_STALE, | |
357 | NFSERR_BADHANDLE, | |
358 | NFSERR_NOTSUPP, | |
359 | NFSERR_SERVERFAULT, | |
360 | 0, | |
361 | }; | |
362 | ||
363 | static short nfsv3err_mknod[] = { | |
364 | NFSERR_IO, | |
365 | NFSERR_IO, | |
366 | NFSERR_ACCES, | |
367 | NFSERR_EXIST, | |
368 | NFSERR_NOTDIR, | |
369 | NFSERR_NOSPC, | |
370 | NFSERR_ROFS, | |
371 | NFSERR_NAMETOL, | |
372 | NFSERR_DQUOT, | |
373 | NFSERR_STALE, | |
374 | NFSERR_BADHANDLE, | |
375 | NFSERR_NOTSUPP, | |
376 | NFSERR_SERVERFAULT, | |
377 | NFSERR_BADTYPE, | |
378 | 0, | |
379 | }; | |
380 | ||
381 | static short nfsv3err_remove[] = { | |
382 | NFSERR_IO, | |
383 | NFSERR_NOENT, | |
384 | NFSERR_IO, | |
385 | NFSERR_ACCES, | |
386 | NFSERR_NOTDIR, | |
387 | NFSERR_ROFS, | |
388 | NFSERR_NAMETOL, | |
389 | NFSERR_STALE, | |
390 | NFSERR_BADHANDLE, | |
391 | NFSERR_SERVERFAULT, | |
392 | 0, | |
393 | }; | |
394 | ||
395 | static short nfsv3err_rmdir[] = { | |
396 | NFSERR_IO, | |
397 | NFSERR_NOENT, | |
398 | NFSERR_IO, | |
399 | NFSERR_ACCES, | |
400 | NFSERR_EXIST, | |
401 | NFSERR_NOTDIR, | |
402 | NFSERR_INVAL, | |
403 | NFSERR_ROFS, | |
404 | NFSERR_NAMETOL, | |
405 | NFSERR_NOTEMPTY, | |
406 | NFSERR_STALE, | |
407 | NFSERR_BADHANDLE, | |
408 | NFSERR_NOTSUPP, | |
409 | NFSERR_SERVERFAULT, | |
410 | 0, | |
411 | }; | |
412 | ||
413 | static short nfsv3err_rename[] = { | |
414 | NFSERR_IO, | |
415 | NFSERR_NOENT, | |
416 | NFSERR_IO, | |
417 | NFSERR_ACCES, | |
418 | NFSERR_EXIST, | |
419 | NFSERR_XDEV, | |
420 | NFSERR_NOTDIR, | |
421 | NFSERR_ISDIR, | |
422 | NFSERR_INVAL, | |
423 | NFSERR_NOSPC, | |
424 | NFSERR_ROFS, | |
425 | NFSERR_MLINK, | |
426 | NFSERR_NAMETOL, | |
427 | NFSERR_NOTEMPTY, | |
428 | NFSERR_DQUOT, | |
429 | NFSERR_STALE, | |
430 | NFSERR_BADHANDLE, | |
431 | NFSERR_NOTSUPP, | |
432 | NFSERR_SERVERFAULT, | |
433 | 0, | |
434 | }; | |
435 | ||
436 | static short nfsv3err_link[] = { | |
437 | NFSERR_IO, | |
438 | NFSERR_IO, | |
439 | NFSERR_ACCES, | |
440 | NFSERR_EXIST, | |
441 | NFSERR_XDEV, | |
442 | NFSERR_NOTDIR, | |
443 | NFSERR_INVAL, | |
444 | NFSERR_NOSPC, | |
445 | NFSERR_ROFS, | |
446 | NFSERR_MLINK, | |
447 | NFSERR_NAMETOL, | |
448 | NFSERR_DQUOT, | |
449 | NFSERR_STALE, | |
450 | NFSERR_BADHANDLE, | |
451 | NFSERR_NOTSUPP, | |
452 | NFSERR_SERVERFAULT, | |
453 | 0, | |
454 | }; | |
455 | ||
456 | static short nfsv3err_readdir[] = { | |
457 | NFSERR_IO, | |
458 | NFSERR_IO, | |
459 | NFSERR_ACCES, | |
460 | NFSERR_NOTDIR, | |
461 | NFSERR_STALE, | |
462 | NFSERR_BADHANDLE, | |
463 | NFSERR_BAD_COOKIE, | |
464 | NFSERR_TOOSMALL, | |
465 | NFSERR_SERVERFAULT, | |
466 | 0, | |
467 | }; | |
468 | ||
469 | static short nfsv3err_readdirplus[] = { | |
470 | NFSERR_IO, | |
471 | NFSERR_IO, | |
472 | NFSERR_ACCES, | |
473 | NFSERR_NOTDIR, | |
474 | NFSERR_STALE, | |
475 | NFSERR_BADHANDLE, | |
476 | NFSERR_BAD_COOKIE, | |
477 | NFSERR_NOTSUPP, | |
478 | NFSERR_TOOSMALL, | |
479 | NFSERR_SERVERFAULT, | |
480 | 0, | |
481 | }; | |
482 | ||
483 | static short nfsv3err_fsstat[] = { | |
484 | NFSERR_IO, | |
485 | NFSERR_IO, | |
486 | NFSERR_STALE, | |
487 | NFSERR_BADHANDLE, | |
488 | NFSERR_SERVERFAULT, | |
489 | 0, | |
490 | }; | |
491 | ||
492 | static short nfsv3err_fsinfo[] = { | |
493 | NFSERR_STALE, | |
494 | NFSERR_STALE, | |
495 | NFSERR_BADHANDLE, | |
496 | NFSERR_SERVERFAULT, | |
497 | 0, | |
498 | }; | |
499 | ||
500 | static short nfsv3err_pathconf[] = { | |
501 | NFSERR_STALE, | |
502 | NFSERR_STALE, | |
503 | NFSERR_BADHANDLE, | |
504 | NFSERR_SERVERFAULT, | |
505 | 0, | |
506 | }; | |
507 | ||
508 | static short nfsv3err_commit[] = { | |
509 | NFSERR_IO, | |
510 | NFSERR_IO, | |
511 | NFSERR_STALE, | |
512 | NFSERR_BADHANDLE, | |
513 | NFSERR_SERVERFAULT, | |
514 | 0, | |
515 | }; | |
516 | ||
517 | static short *nfsrv_v3errmap[] = { | |
518 | nfsv3err_null, | |
519 | nfsv3err_getattr, | |
520 | nfsv3err_setattr, | |
521 | nfsv3err_lookup, | |
522 | nfsv3err_access, | |
523 | nfsv3err_readlink, | |
524 | nfsv3err_read, | |
525 | nfsv3err_write, | |
526 | nfsv3err_create, | |
527 | nfsv3err_mkdir, | |
528 | nfsv3err_symlink, | |
529 | nfsv3err_mknod, | |
530 | nfsv3err_remove, | |
531 | nfsv3err_rmdir, | |
532 | nfsv3err_rename, | |
533 | nfsv3err_link, | |
534 | nfsv3err_readdir, | |
535 | nfsv3err_readdirplus, | |
536 | nfsv3err_fsstat, | |
537 | nfsv3err_fsinfo, | |
538 | nfsv3err_pathconf, | |
539 | nfsv3err_commit, | |
540 | }; | |
541 | ||
542 | #endif /* NFS_NOSERVER */ | |
543 | ||
544 | extern struct nfsrtt nfsrtt; | |
984263bc | 545 | extern struct nfsstats nfsstats; |
984263bc MD |
546 | extern nfstype nfsv2_type[9]; |
547 | extern nfstype nfsv3_type[9]; | |
548 | extern struct nfsnodehashhead *nfsnodehashtbl; | |
549 | extern u_long nfsnodehash; | |
550 | ||
551 | struct nfssvc_args; | |
552 | extern int nfssvc(struct proc *, struct nfssvc_args *, int *); | |
553 | ||
554 | LIST_HEAD(nfsnodehashhead, nfsnode); | |
555 | ||
2cb16efc MD |
556 | /* |
557 | * This needs to return a monotonically increasing or close to monotonically | |
558 | * increasing result, otherwise the write gathering queues won't work | |
559 | * properly. | |
560 | */ | |
984263bc | 561 | u_quad_t |
e851b29e | 562 | nfs_curusec(void) |
984263bc MD |
563 | { |
564 | struct timeval tv; | |
565 | ||
2cb16efc | 566 | getmicrouptime(&tv); |
984263bc MD |
567 | return ((u_quad_t)tv.tv_sec * 1000000 + (u_quad_t)tv.tv_usec); |
568 | } | |
569 | ||
570 | /* | |
571 | * Create the header for an rpc request packet | |
572 | * The hsiz is the size of the rest of the nfs request header. | |
573 | * (just used to decide if a cluster is a good idea) | |
574 | */ | |
575 | struct mbuf * | |
e851b29e | 576 | nfsm_reqh(struct vnode *vp, u_long procid, int hsiz, caddr_t *bposp) |
984263bc | 577 | { |
40393ded | 578 | struct mbuf *mb; |
40393ded | 579 | caddr_t bpos; |
984263bc | 580 | |
50503f0f | 581 | mb = m_getl(hsiz, MB_WAIT, MT_DATA, 0, NULL); |
984263bc MD |
582 | mb->m_len = 0; |
583 | bpos = mtod(mb, caddr_t); | |
584 | ||
984263bc MD |
585 | /* Finally, return values */ |
586 | *bposp = bpos; | |
587 | return (mb); | |
588 | } | |
589 | ||
590 | /* | |
591 | * Build the RPC header and fill in the authorization info. | |
592 | * The authorization string argument is only used when the credentials | |
593 | * come from outside of the kernel. | |
594 | * Returns the head of the mbuf list. | |
595 | */ | |
596 | struct mbuf * | |
e851b29e CP |
597 | nfsm_rpchead(struct ucred *cr, int nmflag, int procid, int auth_type, |
598 | int auth_len, char *auth_str, int verf_len, char *verf_str, | |
599 | struct mbuf *mrest, int mrest_len, struct mbuf **mbp, | |
600 | u_int32_t *xidp) | |
984263bc | 601 | { |
40393ded RG |
602 | struct mbuf *mb; |
603 | u_int32_t *tl; | |
604 | caddr_t bpos; | |
605 | int i; | |
984263bc | 606 | struct mbuf *mreq, *mb2; |
7771277f | 607 | int siz, grpsiz, authsiz, dsiz; |
984263bc MD |
608 | |
609 | authsiz = nfsm_rndup(auth_len); | |
7771277f JH |
610 | dsiz = authsiz + 10 * NFSX_UNSIGNED; |
611 | mb = m_getl(dsiz, MB_WAIT, MT_DATA, M_PKTHDR, NULL); | |
612 | if (dsiz < MINCLSIZE) { | |
613 | if (dsiz < MHLEN) | |
614 | MH_ALIGN(mb, dsiz); | |
615 | else | |
616 | MH_ALIGN(mb, 8 * NFSX_UNSIGNED); | |
984263bc | 617 | } |
7771277f | 618 | mb->m_len = mb->m_pkthdr.len = 0; |
984263bc MD |
619 | mreq = mb; |
620 | bpos = mtod(mb, caddr_t); | |
621 | ||
622 | /* | |
623 | * First the RPC header. | |
624 | */ | |
625 | nfsm_build(tl, u_int32_t *, 8 * NFSX_UNSIGNED); | |
626 | ||
627 | /* Get a pretty random xid to start with */ | |
628 | if (!nfs_xid) | |
629 | nfs_xid = random(); | |
630 | /* | |
631 | * Skip zero xid if it should ever happen. | |
632 | */ | |
633 | if (++nfs_xid == 0) | |
634 | nfs_xid++; | |
635 | ||
636 | *tl++ = *xidp = txdr_unsigned(nfs_xid); | |
637 | *tl++ = rpc_call; | |
638 | *tl++ = rpc_vers; | |
e07fef60 MD |
639 | *tl++ = txdr_unsigned(NFS_PROG); |
640 | if (nmflag & NFSMNT_NFSV3) | |
641 | *tl++ = txdr_unsigned(NFS_VER3); | |
642 | else | |
643 | *tl++ = txdr_unsigned(NFS_VER2); | |
984263bc MD |
644 | if (nmflag & NFSMNT_NFSV3) |
645 | *tl++ = txdr_unsigned(procid); | |
646 | else | |
647 | *tl++ = txdr_unsigned(nfsv2_procid[procid]); | |
648 | ||
649 | /* | |
650 | * And then the authorization cred. | |
651 | */ | |
652 | *tl++ = txdr_unsigned(auth_type); | |
653 | *tl = txdr_unsigned(authsiz); | |
654 | switch (auth_type) { | |
655 | case RPCAUTH_UNIX: | |
656 | nfsm_build(tl, u_int32_t *, auth_len); | |
657 | *tl++ = 0; /* stamp ?? */ | |
658 | *tl++ = 0; /* NULL hostname */ | |
659 | *tl++ = txdr_unsigned(cr->cr_uid); | |
660 | *tl++ = txdr_unsigned(cr->cr_groups[0]); | |
661 | grpsiz = (auth_len >> 2) - 5; | |
662 | *tl++ = txdr_unsigned(grpsiz); | |
663 | for (i = 1; i <= grpsiz; i++) | |
664 | *tl++ = txdr_unsigned(cr->cr_groups[i]); | |
665 | break; | |
666 | case RPCAUTH_KERB4: | |
667 | siz = auth_len; | |
668 | while (siz > 0) { | |
669 | if (M_TRAILINGSPACE(mb) == 0) { | |
50503f0f JH |
670 | mb2 = m_getl(siz, MB_WAIT, MT_DATA, 0, NULL); |
671 | mb2->m_len = 0; | |
984263bc MD |
672 | mb->m_next = mb2; |
673 | mb = mb2; | |
984263bc MD |
674 | bpos = mtod(mb, caddr_t); |
675 | } | |
676 | i = min(siz, M_TRAILINGSPACE(mb)); | |
677 | bcopy(auth_str, bpos, i); | |
678 | mb->m_len += i; | |
679 | auth_str += i; | |
680 | bpos += i; | |
681 | siz -= i; | |
682 | } | |
683 | if ((siz = (nfsm_rndup(auth_len) - auth_len)) > 0) { | |
684 | for (i = 0; i < siz; i++) | |
685 | *bpos++ = '\0'; | |
686 | mb->m_len += siz; | |
687 | } | |
688 | break; | |
689 | }; | |
690 | ||
691 | /* | |
692 | * And the verifier... | |
693 | */ | |
694 | nfsm_build(tl, u_int32_t *, 2 * NFSX_UNSIGNED); | |
695 | if (verf_str) { | |
696 | *tl++ = txdr_unsigned(RPCAUTH_KERB4); | |
697 | *tl = txdr_unsigned(verf_len); | |
698 | siz = verf_len; | |
699 | while (siz > 0) { | |
700 | if (M_TRAILINGSPACE(mb) == 0) { | |
50503f0f JH |
701 | mb2 = m_getl(siz, MB_WAIT, MT_DATA, 0, NULL); |
702 | mb2->m_len = 0; | |
984263bc MD |
703 | mb->m_next = mb2; |
704 | mb = mb2; | |
984263bc MD |
705 | bpos = mtod(mb, caddr_t); |
706 | } | |
707 | i = min(siz, M_TRAILINGSPACE(mb)); | |
708 | bcopy(verf_str, bpos, i); | |
709 | mb->m_len += i; | |
710 | verf_str += i; | |
711 | bpos += i; | |
712 | siz -= i; | |
713 | } | |
714 | if ((siz = (nfsm_rndup(verf_len) - verf_len)) > 0) { | |
715 | for (i = 0; i < siz; i++) | |
716 | *bpos++ = '\0'; | |
717 | mb->m_len += siz; | |
718 | } | |
719 | } else { | |
720 | *tl++ = txdr_unsigned(RPCAUTH_NULL); | |
721 | *tl = 0; | |
722 | } | |
723 | mb->m_next = mrest; | |
724 | mreq->m_pkthdr.len = authsiz + 10 * NFSX_UNSIGNED + mrest_len; | |
725 | mreq->m_pkthdr.rcvif = (struct ifnet *)0; | |
726 | *mbp = mb; | |
727 | return (mreq); | |
728 | } | |
729 | ||
730 | /* | |
731 | * copies mbuf chain to the uio scatter/gather list | |
732 | */ | |
733 | int | |
e851b29e | 734 | nfsm_mbuftouio(struct mbuf **mrep, struct uio *uiop, int siz, caddr_t *dpos) |
984263bc | 735 | { |
40393ded RG |
736 | char *mbufcp, *uiocp; |
737 | int xfer, left, len; | |
738 | struct mbuf *mp; | |
984263bc MD |
739 | long uiosiz, rem; |
740 | int error = 0; | |
741 | ||
742 | mp = *mrep; | |
743 | mbufcp = *dpos; | |
744 | len = mtod(mp, caddr_t)+mp->m_len-mbufcp; | |
745 | rem = nfsm_rndup(siz)-siz; | |
746 | while (siz > 0) { | |
747 | if (uiop->uio_iovcnt <= 0 || uiop->uio_iov == NULL) | |
748 | return (EFBIG); | |
749 | left = uiop->uio_iov->iov_len; | |
750 | uiocp = uiop->uio_iov->iov_base; | |
751 | if (left > siz) | |
752 | left = siz; | |
753 | uiosiz = left; | |
754 | while (left > 0) { | |
755 | while (len == 0) { | |
756 | mp = mp->m_next; | |
757 | if (mp == NULL) | |
758 | return (EBADRPC); | |
759 | mbufcp = mtod(mp, caddr_t); | |
760 | len = mp->m_len; | |
761 | } | |
762 | xfer = (left > len) ? len : left; | |
763 | #ifdef notdef | |
764 | /* Not Yet.. */ | |
765 | if (uiop->uio_iov->iov_op != NULL) | |
766 | (*(uiop->uio_iov->iov_op)) | |
767 | (mbufcp, uiocp, xfer); | |
768 | else | |
769 | #endif | |
770 | if (uiop->uio_segflg == UIO_SYSSPACE) | |
771 | bcopy(mbufcp, uiocp, xfer); | |
772 | else | |
773 | copyout(mbufcp, uiocp, xfer); | |
774 | left -= xfer; | |
775 | len -= xfer; | |
776 | mbufcp += xfer; | |
777 | uiocp += xfer; | |
778 | uiop->uio_offset += xfer; | |
779 | uiop->uio_resid -= xfer; | |
780 | } | |
781 | if (uiop->uio_iov->iov_len <= siz) { | |
782 | uiop->uio_iovcnt--; | |
783 | uiop->uio_iov++; | |
784 | } else { | |
785 | uiop->uio_iov->iov_base += uiosiz; | |
786 | uiop->uio_iov->iov_len -= uiosiz; | |
787 | } | |
788 | siz -= uiosiz; | |
789 | } | |
790 | *dpos = mbufcp; | |
791 | *mrep = mp; | |
792 | if (rem > 0) { | |
793 | if (len < rem) | |
794 | error = nfs_adv(mrep, dpos, rem, len); | |
795 | else | |
796 | *dpos += rem; | |
797 | } | |
798 | return (error); | |
799 | } | |
800 | ||
801 | /* | |
802 | * copies a uio scatter/gather list to an mbuf chain. | |
803 | * NOTE: can ony handle iovcnt == 1 | |
804 | */ | |
805 | int | |
e851b29e | 806 | nfsm_uiotombuf(struct uio *uiop, struct mbuf **mq, int siz, caddr_t *bpos) |
984263bc | 807 | { |
40393ded RG |
808 | char *uiocp; |
809 | struct mbuf *mp, *mp2; | |
810 | int xfer, left, mlen; | |
50503f0f JH |
811 | int uiosiz, rem; |
812 | boolean_t getcluster; | |
984263bc MD |
813 | char *cp; |
814 | ||
815 | #ifdef DIAGNOSTIC | |
816 | if (uiop->uio_iovcnt != 1) | |
817 | panic("nfsm_uiotombuf: iovcnt != 1"); | |
818 | #endif | |
819 | ||
50503f0f JH |
820 | if (siz >= MINCLSIZE) |
821 | getcluster = TRUE; | |
984263bc | 822 | else |
50503f0f JH |
823 | getcluster = FALSE; |
824 | rem = nfsm_rndup(siz) - siz; | |
984263bc MD |
825 | mp = mp2 = *mq; |
826 | while (siz > 0) { | |
827 | left = uiop->uio_iov->iov_len; | |
828 | uiocp = uiop->uio_iov->iov_base; | |
829 | if (left > siz) | |
830 | left = siz; | |
831 | uiosiz = left; | |
832 | while (left > 0) { | |
833 | mlen = M_TRAILINGSPACE(mp); | |
834 | if (mlen == 0) { | |
50503f0f JH |
835 | if (getcluster) |
836 | mp = m_getcl(MB_WAIT, MT_DATA, 0); | |
837 | else | |
838 | mp = m_get(MB_WAIT, MT_DATA); | |
984263bc MD |
839 | mp->m_len = 0; |
840 | mp2->m_next = mp; | |
841 | mp2 = mp; | |
842 | mlen = M_TRAILINGSPACE(mp); | |
843 | } | |
844 | xfer = (left > mlen) ? mlen : left; | |
845 | #ifdef notdef | |
846 | /* Not Yet.. */ | |
847 | if (uiop->uio_iov->iov_op != NULL) | |
848 | (*(uiop->uio_iov->iov_op)) | |
849 | (uiocp, mtod(mp, caddr_t)+mp->m_len, xfer); | |
850 | else | |
851 | #endif | |
852 | if (uiop->uio_segflg == UIO_SYSSPACE) | |
853 | bcopy(uiocp, mtod(mp, caddr_t)+mp->m_len, xfer); | |
854 | else | |
855 | copyin(uiocp, mtod(mp, caddr_t)+mp->m_len, xfer); | |
856 | mp->m_len += xfer; | |
857 | left -= xfer; | |
858 | uiocp += xfer; | |
859 | uiop->uio_offset += xfer; | |
860 | uiop->uio_resid -= xfer; | |
861 | } | |
862 | uiop->uio_iov->iov_base += uiosiz; | |
863 | uiop->uio_iov->iov_len -= uiosiz; | |
864 | siz -= uiosiz; | |
865 | } | |
866 | if (rem > 0) { | |
867 | if (rem > M_TRAILINGSPACE(mp)) { | |
74f1caca | 868 | MGET(mp, MB_WAIT, MT_DATA); |
984263bc MD |
869 | mp->m_len = 0; |
870 | mp2->m_next = mp; | |
871 | } | |
872 | cp = mtod(mp, caddr_t)+mp->m_len; | |
873 | for (left = 0; left < rem; left++) | |
874 | *cp++ = '\0'; | |
875 | mp->m_len += rem; | |
876 | *bpos = cp; | |
877 | } else | |
878 | *bpos = mtod(mp, caddr_t)+mp->m_len; | |
879 | *mq = mp; | |
880 | return (0); | |
881 | } | |
882 | ||
883 | /* | |
884 | * Help break down an mbuf chain by setting the first siz bytes contiguous | |
885 | * pointed to by returned val. | |
886 | * This is used by the macros nfsm_dissect and nfsm_dissecton for tough | |
887 | * cases. (The macros use the vars. dpos and dpos2) | |
888 | */ | |
889 | int | |
e851b29e | 890 | nfsm_disct(struct mbuf **mdp, caddr_t *dposp, int siz, int left, caddr_t *cp2) |
984263bc | 891 | { |
40393ded RG |
892 | struct mbuf *mp, *mp2; |
893 | int siz2, xfer; | |
894 | caddr_t p; | |
984263bc MD |
895 | |
896 | mp = *mdp; | |
897 | while (left == 0) { | |
898 | *mdp = mp = mp->m_next; | |
899 | if (mp == NULL) | |
900 | return (EBADRPC); | |
901 | left = mp->m_len; | |
902 | *dposp = mtod(mp, caddr_t); | |
903 | } | |
904 | if (left >= siz) { | |
905 | *cp2 = *dposp; | |
906 | *dposp += siz; | |
907 | } else if (mp->m_next == NULL) { | |
908 | return (EBADRPC); | |
909 | } else if (siz > MHLEN) { | |
910 | panic("nfs S too big"); | |
911 | } else { | |
74f1caca | 912 | MGET(mp2, MB_WAIT, MT_DATA); |
984263bc MD |
913 | mp2->m_next = mp->m_next; |
914 | mp->m_next = mp2; | |
915 | mp->m_len -= left; | |
916 | mp = mp2; | |
917 | *cp2 = p = mtod(mp, caddr_t); | |
918 | bcopy(*dposp, p, left); /* Copy what was left */ | |
919 | siz2 = siz-left; | |
920 | p += left; | |
921 | mp2 = mp->m_next; | |
922 | /* Loop around copying up the siz2 bytes */ | |
923 | while (siz2 > 0) { | |
924 | if (mp2 == NULL) | |
925 | return (EBADRPC); | |
926 | xfer = (siz2 > mp2->m_len) ? mp2->m_len : siz2; | |
927 | if (xfer > 0) { | |
928 | bcopy(mtod(mp2, caddr_t), p, xfer); | |
929 | NFSMADV(mp2, xfer); | |
930 | mp2->m_len -= xfer; | |
931 | p += xfer; | |
932 | siz2 -= xfer; | |
933 | } | |
934 | if (siz2 > 0) | |
935 | mp2 = mp2->m_next; | |
936 | } | |
937 | mp->m_len = siz; | |
938 | *mdp = mp2; | |
939 | *dposp = mtod(mp2, caddr_t); | |
940 | } | |
941 | return (0); | |
942 | } | |
943 | ||
944 | /* | |
945 | * Advance the position in the mbuf chain. | |
946 | */ | |
947 | int | |
e851b29e | 948 | nfs_adv(struct mbuf **mdp, caddr_t *dposp, int offs, int left) |
984263bc | 949 | { |
40393ded RG |
950 | struct mbuf *m; |
951 | int s; | |
984263bc MD |
952 | |
953 | m = *mdp; | |
954 | s = left; | |
955 | while (s < offs) { | |
956 | offs -= s; | |
957 | m = m->m_next; | |
958 | if (m == NULL) | |
959 | return (EBADRPC); | |
960 | s = m->m_len; | |
961 | } | |
962 | *mdp = m; | |
963 | *dposp = mtod(m, caddr_t)+offs; | |
964 | return (0); | |
965 | } | |
966 | ||
967 | /* | |
968 | * Copy a string into mbufs for the hard cases... | |
969 | */ | |
970 | int | |
e851b29e | 971 | nfsm_strtmbuf(struct mbuf **mb, char **bpos, const char *cp, long siz) |
984263bc | 972 | { |
40393ded | 973 | struct mbuf *m1 = NULL, *m2; |
984263bc MD |
974 | long left, xfer, len, tlen; |
975 | u_int32_t *tl; | |
976 | int putsize; | |
977 | ||
978 | putsize = 1; | |
979 | m2 = *mb; | |
980 | left = M_TRAILINGSPACE(m2); | |
981 | if (left > 0) { | |
982 | tl = ((u_int32_t *)(*bpos)); | |
983 | *tl++ = txdr_unsigned(siz); | |
984 | putsize = 0; | |
985 | left -= NFSX_UNSIGNED; | |
986 | m2->m_len += NFSX_UNSIGNED; | |
987 | if (left > 0) { | |
988 | bcopy(cp, (caddr_t) tl, left); | |
989 | siz -= left; | |
990 | cp += left; | |
991 | m2->m_len += left; | |
992 | left = 0; | |
993 | } | |
994 | } | |
995 | /* Loop around adding mbufs */ | |
996 | while (siz > 0) { | |
50503f0f JH |
997 | int msize; |
998 | ||
999 | m1 = m_getl(siz, MB_WAIT, MT_DATA, 0, &msize); | |
1000 | m1->m_len = msize; | |
984263bc MD |
1001 | m2->m_next = m1; |
1002 | m2 = m1; | |
1003 | tl = mtod(m1, u_int32_t *); | |
1004 | tlen = 0; | |
1005 | if (putsize) { | |
1006 | *tl++ = txdr_unsigned(siz); | |
1007 | m1->m_len -= NFSX_UNSIGNED; | |
1008 | tlen = NFSX_UNSIGNED; | |
1009 | putsize = 0; | |
1010 | } | |
1011 | if (siz < m1->m_len) { | |
1012 | len = nfsm_rndup(siz); | |
1013 | xfer = siz; | |
1014 | if (xfer < len) | |
1015 | *(tl+(xfer>>2)) = 0; | |
1016 | } else { | |
1017 | xfer = len = m1->m_len; | |
1018 | } | |
1019 | bcopy(cp, (caddr_t) tl, xfer); | |
1020 | m1->m_len = len+tlen; | |
1021 | siz -= xfer; | |
1022 | cp += xfer; | |
1023 | } | |
1024 | *mb = m1; | |
1025 | *bpos = mtod(m1, caddr_t)+m1->m_len; | |
1026 | return (0); | |
1027 | } | |
1028 | ||
1029 | /* | |
1030 | * Called once to initialize data structures... | |
1031 | */ | |
1032 | int | |
e851b29e | 1033 | nfs_init(struct vfsconf *vfsp) |
984263bc | 1034 | { |
40393ded | 1035 | int i; |
984263bc | 1036 | |
f786cc86 | 1037 | callout_init(&nfs_timer_handle); |
984263bc MD |
1038 | nfsmount_zone = zinit("NFSMOUNT", sizeof(struct nfsmount), 0, 0, 1); |
1039 | ||
1040 | nfs_mount_type = vfsp->vfc_typenum; | |
1041 | nfsrtt.pos = 0; | |
1042 | rpc_vers = txdr_unsigned(RPC_VER2); | |
1043 | rpc_call = txdr_unsigned(RPC_CALL); | |
1044 | rpc_reply = txdr_unsigned(RPC_REPLY); | |
1045 | rpc_msgdenied = txdr_unsigned(RPC_MSGDENIED); | |
1046 | rpc_msgaccepted = txdr_unsigned(RPC_MSGACCEPTED); | |
1047 | rpc_mismatch = txdr_unsigned(RPC_MISMATCH); | |
1048 | rpc_autherr = txdr_unsigned(RPC_AUTHERR); | |
1049 | rpc_auth_unix = txdr_unsigned(RPCAUTH_UNIX); | |
1050 | rpc_auth_kerb = txdr_unsigned(RPCAUTH_KERB4); | |
1051 | nfs_prog = txdr_unsigned(NFS_PROG); | |
984263bc MD |
1052 | nfs_true = txdr_unsigned(TRUE); |
1053 | nfs_false = txdr_unsigned(FALSE); | |
1054 | nfs_xdrneg1 = txdr_unsigned(-1); | |
1055 | nfs_ticks = (hz * NFS_TICKINTVL + 500) / 1000; | |
1056 | if (nfs_ticks < 1) | |
1057 | nfs_ticks = 1; | |
1058 | /* Ensure async daemons disabled */ | |
1059 | for (i = 0; i < NFS_MAXASYNCDAEMON; i++) { | |
dadab5e9 | 1060 | nfs_iodwant[i] = NULL; |
984263bc MD |
1061 | nfs_iodmount[i] = (struct nfsmount *)0; |
1062 | } | |
1063 | nfs_nhinit(); /* Init the nfsnode table */ | |
1064 | #ifndef NFS_NOSERVER | |
1065 | nfsrv_init(0); /* Init server data structures */ | |
1066 | nfsrv_initcache(); /* Init the server request cache */ | |
1067 | #endif | |
1068 | ||
984263bc MD |
1069 | /* |
1070 | * Initialize reply list and start timer | |
1071 | */ | |
1072 | TAILQ_INIT(&nfs_reqq); | |
1073 | ||
1074 | nfs_timer(0); | |
1075 | ||
984263bc MD |
1076 | nfs_prev_nfssvc_sy_narg = sysent[SYS_nfssvc].sy_narg; |
1077 | sysent[SYS_nfssvc].sy_narg = 2; | |
1078 | nfs_prev_nfssvc_sy_call = sysent[SYS_nfssvc].sy_call; | |
1079 | sysent[SYS_nfssvc].sy_call = (sy_call_t *)nfssvc; | |
1080 | ||
1081 | nfs_pbuf_freecnt = nswbuf / 2 + 1; | |
1082 | ||
1083 | return (0); | |
1084 | } | |
1085 | ||
1086 | int | |
e851b29e | 1087 | nfs_uninit(struct vfsconf *vfsp) |
984263bc | 1088 | { |
f786cc86 | 1089 | callout_stop(&nfs_timer_handle); |
984263bc | 1090 | nfs_mount_type = -1; |
984263bc MD |
1091 | sysent[SYS_nfssvc].sy_narg = nfs_prev_nfssvc_sy_narg; |
1092 | sysent[SYS_nfssvc].sy_call = nfs_prev_nfssvc_sy_call; | |
1093 | return (0); | |
1094 | } | |
1095 | ||
1096 | /* | |
1097 | * Attribute cache routines. | |
1098 | * nfs_loadattrcache() - loads or updates the cache contents from attributes | |
1099 | * that are on the mbuf list | |
1100 | * nfs_getattrcache() - returns valid attributes if found in cache, returns | |
1101 | * error otherwise | |
1102 | */ | |
1103 | ||
1104 | /* | |
1105 | * Load the attribute cache (that lives in the nfsnode entry) with | |
5a9187cb MD |
1106 | * the values on the mbuf list. Load *vaper with the attributes. vaper |
1107 | * may be NULL. | |
1108 | * | |
1109 | * As a side effect n_mtime, which we use to determine if the file was | |
1110 | * modified by some other host, is set to the attribute timestamp and | |
1111 | * NRMODIFIED is set if the two values differ. | |
1112 | * | |
1113 | * WARNING: the mtime loaded into vaper does not necessarily represent | |
1114 | * n_mtime or n_attr.mtime due to NACC and NUPD. | |
984263bc MD |
1115 | */ |
1116 | int | |
e851b29e | 1117 | nfs_loadattrcache(struct vnode **vpp, struct mbuf **mdp, caddr_t *dposp, |
5a9187cb | 1118 | struct vattr *vaper, int lattr_flags) |
984263bc | 1119 | { |
40393ded RG |
1120 | struct vnode *vp = *vpp; |
1121 | struct vattr *vap; | |
1122 | struct nfs_fattr *fp; | |
1123 | struct nfsnode *np; | |
1124 | int32_t t1; | |
984263bc | 1125 | caddr_t cp2; |
e4c9c0c8 MD |
1126 | int error = 0; |
1127 | udev_t rdev; | |
984263bc MD |
1128 | struct mbuf *md; |
1129 | enum vtype vtyp; | |
1130 | u_short vmode; | |
1131 | struct timespec mtime; | |
1132 | int v3 = NFS_ISV3(vp); | |
1133 | ||
1134 | md = *mdp; | |
1135 | t1 = (mtod(md, caddr_t) + md->m_len) - *dposp; | |
1136 | if ((error = nfsm_disct(mdp, dposp, NFSX_FATTR(v3), t1, &cp2)) != 0) | |
1137 | return (error); | |
1138 | fp = (struct nfs_fattr *)cp2; | |
1139 | if (v3) { | |
1140 | vtyp = nfsv3tov_type(fp->fa_type); | |
1141 | vmode = fxdr_unsigned(u_short, fp->fa_mode); | |
1142 | rdev = makeudev(fxdr_unsigned(int, fp->fa3_rdev.specdata1), | |
1143 | fxdr_unsigned(int, fp->fa3_rdev.specdata2)); | |
1144 | fxdr_nfsv3time(&fp->fa3_mtime, &mtime); | |
1145 | } else { | |
1146 | vtyp = nfsv2tov_type(fp->fa_type); | |
1147 | vmode = fxdr_unsigned(u_short, fp->fa_mode); | |
1148 | /* | |
1149 | * XXX | |
1150 | * | |
1151 | * The duplicate information returned in fa_type and fa_mode | |
1152 | * is an ambiguity in the NFS version 2 protocol. | |
1153 | * | |
1154 | * VREG should be taken literally as a regular file. If a | |
1155 | * server intents to return some type information differently | |
1156 | * in the upper bits of the mode field (e.g. for sockets, or | |
1157 | * FIFOs), NFSv2 mandates fa_type to be VNON. Anyway, we | |
1158 | * leave the examination of the mode bits even in the VREG | |
1159 | * case to avoid breakage for bogus servers, but we make sure | |
1160 | * that there are actually type bits set in the upper part of | |
1161 | * fa_mode (and failing that, trust the va_type field). | |
1162 | * | |
1163 | * NFSv3 cleared the issue, and requires fa_mode to not | |
1164 | * contain any type information (while also introduing sockets | |
1165 | * and FIFOs for fa_type). | |
1166 | */ | |
1167 | if (vtyp == VNON || (vtyp == VREG && (vmode & S_IFMT) != 0)) | |
1168 | vtyp = IFTOVT(vmode); | |
1169 | rdev = fxdr_unsigned(int32_t, fp->fa2_rdev); | |
1170 | fxdr_nfsv2time(&fp->fa2_mtime, &mtime); | |
1171 | ||
1172 | /* | |
1173 | * Really ugly NFSv2 kludge. | |
1174 | */ | |
e4c9c0c8 | 1175 | if (vtyp == VCHR && rdev == (udev_t)0xffffffff) |
984263bc MD |
1176 | vtyp = VFIFO; |
1177 | } | |
1178 | ||
1179 | /* | |
1180 | * If v_type == VNON it is a new node, so fill in the v_type, | |
1181 | * n_mtime fields. Check to see if it represents a special | |
1182 | * device, and if so, check for a possible alias. Once the | |
1183 | * correct vnode has been obtained, fill in the rest of the | |
1184 | * information. | |
1185 | */ | |
1186 | np = VTONFS(vp); | |
1187 | if (vp->v_type != vtyp) { | |
1c843a13 | 1188 | nfs_setvtype(vp, vtyp); |
984263bc | 1189 | if (vp->v_type == VFIFO) { |
6ddb7618 | 1190 | vp->v_ops = &vp->v_mount->mnt_vn_fifo_ops; |
0961aa92 | 1191 | } else if (vp->v_type == VCHR || vp->v_type == VBLK) { |
6ddb7618 | 1192 | vp->v_ops = &vp->v_mount->mnt_vn_spec_ops; |
984263bc | 1193 | addaliasu(vp, rdev); |
0961aa92 | 1194 | } else { |
6ddb7618 | 1195 | vp->v_ops = &vp->v_mount->mnt_vn_use_ops; |
984263bc MD |
1196 | } |
1197 | np->n_mtime = mtime.tv_sec; | |
5a9187cb | 1198 | } else if (np->n_mtime != mtime.tv_sec) { |
9793c819 | 1199 | /* |
5a9187cb MD |
1200 | * If we haven't modified the file locally and the server |
1201 | * timestamp does not match, then the server probably | |
1202 | * modified the file. We must flag this condition so | |
1203 | * the proper syncnronization can be done. We do not | |
1204 | * try to synchronize the state here because that | |
1205 | * could lead to an endless recursion. | |
1206 | * | |
1207 | * XXX loadattrcache can be set during the reply to a write, | |
1208 | * before the write timestamp is properly processed. To | |
1209 | * avoid unconditionally setting the rmodified bit (which | |
1210 | * has the effect of flushing the cache), we only do this | |
1211 | * check if the lmodified bit is not set. | |
9793c819 MD |
1212 | */ |
1213 | np->n_mtime = mtime.tv_sec; | |
5a9187cb MD |
1214 | if ((lattr_flags & NFS_LATTR_NOMTIMECHECK) == 0) |
1215 | np->n_flag |= NRMODIFIED; | |
984263bc MD |
1216 | } |
1217 | vap = &np->n_vattr; | |
1218 | vap->va_type = vtyp; | |
1219 | vap->va_mode = (vmode & 07777); | |
1220 | vap->va_rdev = rdev; | |
1221 | vap->va_mtime = mtime; | |
1222 | vap->va_fsid = vp->v_mount->mnt_stat.f_fsid.val[0]; | |
1223 | if (v3) { | |
1224 | vap->va_nlink = fxdr_unsigned(u_short, fp->fa_nlink); | |
1225 | vap->va_uid = fxdr_unsigned(uid_t, fp->fa_uid); | |
1226 | vap->va_gid = fxdr_unsigned(gid_t, fp->fa_gid); | |
1227 | vap->va_size = fxdr_hyper(&fp->fa3_size); | |
1228 | vap->va_blocksize = NFS_FABLKSIZE; | |
1229 | vap->va_bytes = fxdr_hyper(&fp->fa3_used); | |
1230 | vap->va_fileid = fxdr_unsigned(int32_t, | |
1231 | fp->fa3_fileid.nfsuquad[1]); | |
1232 | fxdr_nfsv3time(&fp->fa3_atime, &vap->va_atime); | |
1233 | fxdr_nfsv3time(&fp->fa3_ctime, &vap->va_ctime); | |
1234 | vap->va_flags = 0; | |
1235 | vap->va_filerev = 0; | |
1236 | } else { | |
1237 | vap->va_nlink = fxdr_unsigned(u_short, fp->fa_nlink); | |
1238 | vap->va_uid = fxdr_unsigned(uid_t, fp->fa_uid); | |
1239 | vap->va_gid = fxdr_unsigned(gid_t, fp->fa_gid); | |
1240 | vap->va_size = fxdr_unsigned(u_int32_t, fp->fa2_size); | |
1241 | vap->va_blocksize = fxdr_unsigned(int32_t, fp->fa2_blocksize); | |
1242 | vap->va_bytes = (u_quad_t)fxdr_unsigned(int32_t, fp->fa2_blocks) | |
1243 | * NFS_FABLKSIZE; | |
1244 | vap->va_fileid = fxdr_unsigned(int32_t, fp->fa2_fileid); | |
1245 | fxdr_nfsv2time(&fp->fa2_atime, &vap->va_atime); | |
1246 | vap->va_flags = 0; | |
1247 | vap->va_ctime.tv_sec = fxdr_unsigned(u_int32_t, | |
1248 | fp->fa2_ctime.nfsv2_sec); | |
1249 | vap->va_ctime.tv_nsec = 0; | |
1250 | vap->va_gen = fxdr_unsigned(u_int32_t,fp->fa2_ctime.nfsv2_usec); | |
1251 | vap->va_filerev = 0; | |
1252 | } | |
1253 | np->n_attrstamp = time_second; | |
1254 | if (vap->va_size != np->n_size) { | |
1255 | if (vap->va_type == VREG) { | |
5a9187cb MD |
1256 | if ((lattr_flags & NFS_LATTR_NOSHRINK) && |
1257 | vap->va_size < np->n_size) { | |
984263bc MD |
1258 | /* |
1259 | * We've been told not to shrink the file; | |
1260 | * zero np->n_attrstamp to indicate that | |
1261 | * the attributes are stale. | |
5a9187cb MD |
1262 | * |
1263 | * This occurs primarily due to recursive | |
1264 | * NFS ops that are executed during periods | |
1265 | * where we cannot safely reduce the size of | |
1266 | * the file. | |
1267 | * | |
1268 | * Additionally, write rpcs are broken down | |
1269 | * into buffers and np->n_size is | |
1270 | * pre-extended. Setting NRMODIFIED here | |
1271 | * can result in n_size getting reset to a | |
1272 | * lower value, which is NOT what we want. | |
1273 | * XXX this needs to be cleaned up a lot | |
1274 | * more. | |
984263bc MD |
1275 | */ |
1276 | vap->va_size = np->n_size; | |
1277 | np->n_attrstamp = 0; | |
5a9187cb MD |
1278 | if ((np->n_flag & NLMODIFIED) == 0) |
1279 | np->n_flag |= NRMODIFIED; | |
1280 | } else if (np->n_flag & NLMODIFIED) { | |
79e5012e MD |
1281 | /* |
1282 | * We've modified the file: Use the larger | |
5a9187cb MD |
1283 | * of our size, and the server's size. At |
1284 | * this point the cache coherency is all | |
1285 | * shot to hell. To try to handle multiple | |
1286 | * clients appending to the file at the same | |
1287 | * time mark that the server has changed | |
1288 | * the file if the server's notion of the | |
1289 | * file size is larger then our notion. | |
1290 | * | |
1291 | * XXX this needs work. | |
79e5012e MD |
1292 | */ |
1293 | if (vap->va_size < np->n_size) { | |
984263bc | 1294 | vap->va_size = np->n_size; |
79e5012e | 1295 | } else { |
984263bc | 1296 | np->n_size = vap->va_size; |
5a9187cb | 1297 | np->n_flag |= NRMODIFIED; |
79e5012e | 1298 | } |
984263bc | 1299 | } else { |
5a9187cb MD |
1300 | /* |
1301 | * Someone changed the file's size on the | |
1302 | * server and there are no local changes | |
1303 | * to get in the way, set the size and mark | |
1304 | * it. | |
1305 | */ | |
984263bc | 1306 | np->n_size = vap->va_size; |
5a9187cb | 1307 | np->n_flag |= NRMODIFIED; |
984263bc MD |
1308 | } |
1309 | vnode_pager_setsize(vp, np->n_size); | |
1310 | } else { | |
1311 | np->n_size = vap->va_size; | |
1312 | } | |
1313 | } | |
1314 | if (vaper != NULL) { | |
1315 | bcopy((caddr_t)vap, (caddr_t)vaper, sizeof(*vap)); | |
1316 | if (np->n_flag & NCHG) { | |
1317 | if (np->n_flag & NACC) | |
1318 | vaper->va_atime = np->n_atim; | |
1319 | if (np->n_flag & NUPD) | |
1320 | vaper->va_mtime = np->n_mtim; | |
1321 | } | |
1322 | } | |
1323 | return (0); | |
1324 | } | |
1325 | ||
1326 | #ifdef NFS_ACDEBUG | |
1327 | #include <sys/sysctl.h> | |
1328 | SYSCTL_DECL(_vfs_nfs); | |
1329 | static int nfs_acdebug; | |
1330 | SYSCTL_INT(_vfs_nfs, OID_AUTO, acdebug, CTLFLAG_RW, &nfs_acdebug, 0, ""); | |
1331 | #endif | |
1332 | ||
1333 | /* | |
1334 | * Check the time stamp | |
1335 | * If the cache is valid, copy contents to *vap and return 0 | |
1336 | * otherwise return an error | |
1337 | */ | |
1338 | int | |
e851b29e | 1339 | nfs_getattrcache(struct vnode *vp, struct vattr *vaper) |
984263bc | 1340 | { |
40393ded RG |
1341 | struct nfsnode *np; |
1342 | struct vattr *vap; | |
984263bc MD |
1343 | struct nfsmount *nmp; |
1344 | int timeo; | |
1345 | ||
1346 | np = VTONFS(vp); | |
1347 | vap = &np->n_vattr; | |
1348 | nmp = VFSTONFS(vp->v_mount); | |
fad57d0e MD |
1349 | |
1350 | /* | |
1351 | * Dynamic timeout based on how recently the file was modified. | |
5a9187cb | 1352 | * n_mtime is always valid. |
fad57d0e | 1353 | */ |
97100839 | 1354 | timeo = (get_approximate_time_t() - np->n_mtime) / 60; |
984263bc MD |
1355 | |
1356 | #ifdef NFS_ACDEBUG | |
1357 | if (nfs_acdebug>1) | |
1358 | printf("nfs_getattrcache: initial timeo = %d\n", timeo); | |
1359 | #endif | |
1360 | ||
1361 | if (vap->va_type == VDIR) { | |
5a9187cb | 1362 | if ((np->n_flag & NLMODIFIED) || timeo < nmp->nm_acdirmin) |
984263bc MD |
1363 | timeo = nmp->nm_acdirmin; |
1364 | else if (timeo > nmp->nm_acdirmax) | |
1365 | timeo = nmp->nm_acdirmax; | |
1366 | } else { | |
5a9187cb | 1367 | if ((np->n_flag & NLMODIFIED) || timeo < nmp->nm_acregmin) |
984263bc MD |
1368 | timeo = nmp->nm_acregmin; |
1369 | else if (timeo > nmp->nm_acregmax) | |
1370 | timeo = nmp->nm_acregmax; | |
1371 | } | |
1372 | ||
1373 | #ifdef NFS_ACDEBUG | |
1374 | if (nfs_acdebug > 2) | |
1375 | printf("acregmin %d; acregmax %d; acdirmin %d; acdirmax %d\n", | |
1376 | nmp->nm_acregmin, nmp->nm_acregmax, | |
1377 | nmp->nm_acdirmin, nmp->nm_acdirmax); | |
1378 | ||
1379 | if (nfs_acdebug) | |
1380 | printf("nfs_getattrcache: age = %d; final timeo = %d\n", | |
9793c819 | 1381 | (int)(time_second - np->n_attrstamp), timeo); |
984263bc MD |
1382 | #endif |
1383 | ||
9793c819 | 1384 | if (np->n_attrstamp == 0 || (time_second - np->n_attrstamp) >= timeo) { |
984263bc MD |
1385 | nfsstats.attrcache_misses++; |
1386 | return (ENOENT); | |
1387 | } | |
1388 | nfsstats.attrcache_hits++; | |
5a9187cb MD |
1389 | |
1390 | /* | |
1391 | * Our attribute cache can be stale due to modifications made on | |
1392 | * this host. XXX this is a bad hack. We need a more deterministic | |
1393 | * means of finding out which np fields are valid verses attr cache | |
1394 | * fields. We really should update the vattr info on the fly when | |
1395 | * making local changes. | |
1396 | */ | |
984263bc MD |
1397 | if (vap->va_size != np->n_size) { |
1398 | if (vap->va_type == VREG) { | |
5a9187cb | 1399 | if (np->n_flag & NLMODIFIED) { |
984263bc MD |
1400 | if (vap->va_size < np->n_size) |
1401 | vap->va_size = np->n_size; | |
1402 | else | |
1403 | np->n_size = vap->va_size; | |
1404 | } else { | |
1405 | np->n_size = vap->va_size; | |
1406 | } | |
1407 | vnode_pager_setsize(vp, np->n_size); | |
1408 | } else { | |
1409 | np->n_size = vap->va_size; | |
1410 | } | |
1411 | } | |
1412 | bcopy((caddr_t)vap, (caddr_t)vaper, sizeof(struct vattr)); | |
1413 | if (np->n_flag & NCHG) { | |
1414 | if (np->n_flag & NACC) | |
1415 | vaper->va_atime = np->n_atim; | |
1416 | if (np->n_flag & NUPD) | |
1417 | vaper->va_mtime = np->n_mtim; | |
1418 | } | |
1419 | return (0); | |
1420 | } | |
1421 | ||
1422 | #ifndef NFS_NOSERVER | |
fad57d0e | 1423 | |
984263bc MD |
1424 | /* |
1425 | * Set up nameidata for a lookup() call and do it. | |
1426 | * | |
1427 | * If pubflag is set, this call is done for a lookup operation on the | |
1428 | * public filehandle. In that case we allow crossing mountpoints and | |
1429 | * absolute pathnames. However, the caller is expected to check that | |
1430 | * the lookup result is within the public fs, and deny access if | |
1431 | * it is not. | |
1432 | * | |
984263bc MD |
1433 | * dirp may be set whether an error is returned or not, and must be |
1434 | * released by the caller. | |
fad57d0e MD |
1435 | * |
1436 | * On return nd->nl_ncp usually points to the target ncp, which may represent | |
1437 | * a negative hit. | |
1438 | * | |
1439 | * NOTE: the caller must call nlookup_done(nd) unconditionally on return | |
1440 | * to cleanup. | |
984263bc MD |
1441 | */ |
1442 | int | |
fad57d0e MD |
1443 | nfs_namei(struct nlookupdata *nd, struct ucred *cred, int nameiop, |
1444 | struct vnode **dvpp, struct vnode **vpp, | |
1445 | fhandle_t *fhp, int len, | |
1446 | struct nfssvc_sock *slp, struct sockaddr *nam, struct mbuf **mdp, | |
1447 | caddr_t *dposp, struct vnode **dirpp, struct thread *td, | |
1448 | int kerbflag, int pubflag) | |
984263bc | 1449 | { |
40393ded | 1450 | int i, rem; |
fad57d0e | 1451 | int flags; |
40393ded RG |
1452 | struct mbuf *md; |
1453 | char *fromcp, *tocp, *cp; | |
fad57d0e MD |
1454 | char *namebuf; |
1455 | struct namecache *ncp; | |
984263bc | 1456 | struct vnode *dp; |
fad57d0e | 1457 | int error, rdonly; |
984263bc | 1458 | |
70aac194 | 1459 | namebuf = objcache_get(namei_oc, M_WAITOK); |
fad57d0e MD |
1460 | flags = 0; |
1461 | *dirpp = NULL; | |
984263bc MD |
1462 | |
1463 | /* | |
fad57d0e | 1464 | * Copy the name from the mbuf list to namebuf. |
984263bc MD |
1465 | */ |
1466 | fromcp = *dposp; | |
fad57d0e | 1467 | tocp = namebuf; |
984263bc MD |
1468 | md = *mdp; |
1469 | rem = mtod(md, caddr_t) + md->m_len - fromcp; | |
1470 | for (i = 0; i < len; i++) { | |
1471 | while (rem == 0) { | |
1472 | md = md->m_next; | |
1473 | if (md == NULL) { | |
1474 | error = EBADRPC; | |
1475 | goto out; | |
1476 | } | |
1477 | fromcp = mtod(md, caddr_t); | |
1478 | rem = md->m_len; | |
1479 | } | |
1480 | if (*fromcp == '\0' || (!pubflag && *fromcp == '/')) { | |
1481 | error = EACCES; | |
1482 | goto out; | |
1483 | } | |
1484 | *tocp++ = *fromcp++; | |
1485 | rem--; | |
1486 | } | |
1487 | *tocp = '\0'; | |
1488 | *mdp = md; | |
1489 | *dposp = fromcp; | |
1490 | len = nfsm_rndup(len)-len; | |
1491 | if (len > 0) { | |
1492 | if (rem >= len) | |
1493 | *dposp += len; | |
1494 | else if ((error = nfs_adv(mdp, dposp, len, rem)) != 0) | |
1495 | goto out; | |
1496 | } | |
1497 | ||
1498 | /* | |
fad57d0e MD |
1499 | * Extract and set starting directory. The returned dp is refd |
1500 | * but not locked. | |
984263bc | 1501 | */ |
fad57d0e MD |
1502 | error = nfsrv_fhtovp(fhp, FALSE, &dp, cred, slp, |
1503 | nam, &rdonly, kerbflag, pubflag); | |
984263bc MD |
1504 | if (error) |
1505 | goto out; | |
1506 | if (dp->v_type != VDIR) { | |
1507 | vrele(dp); | |
1508 | error = ENOTDIR; | |
1509 | goto out; | |
1510 | } | |
1511 | ||
984263bc MD |
1512 | /* |
1513 | * Set return directory. Reference to dp is implicitly transfered | |
fad57d0e MD |
1514 | * to the returned pointer. This must be set before we potentially |
1515 | * goto out below. | |
984263bc | 1516 | */ |
fad57d0e | 1517 | *dirpp = dp; |
984263bc MD |
1518 | |
1519 | if (pubflag) { | |
1520 | /* | |
1521 | * Oh joy. For WebNFS, handle those pesky '%' escapes, | |
1522 | * and the 'native path' indicator. | |
1523 | */ | |
70aac194 | 1524 | cp = objcache_get(namei_oc, M_WAITOK); |
fad57d0e | 1525 | fromcp = namebuf; |
984263bc MD |
1526 | tocp = cp; |
1527 | if ((unsigned char)*fromcp >= WEBNFS_SPECCHAR_START) { | |
1528 | switch ((unsigned char)*fromcp) { | |
1529 | case WEBNFS_NATIVE_CHAR: | |
1530 | /* | |
1531 | * 'Native' path for us is the same | |
1532 | * as a path according to the NFS spec, | |
1533 | * just skip the escape char. | |
1534 | */ | |
1535 | fromcp++; | |
1536 | break; | |
1537 | /* | |
1538 | * More may be added in the future, range 0x80-0xff | |
1539 | */ | |
1540 | default: | |
1541 | error = EIO; | |
70aac194 | 1542 | objcache_put(namei_oc, cp); |
984263bc MD |
1543 | goto out; |
1544 | } | |
1545 | } | |
1546 | /* | |
1547 | * Translate the '%' escapes, URL-style. | |
1548 | */ | |
1549 | while (*fromcp != '\0') { | |
1550 | if (*fromcp == WEBNFS_ESC_CHAR) { | |
1551 | if (fromcp[1] != '\0' && fromcp[2] != '\0') { | |
1552 | fromcp++; | |
1553 | *tocp++ = HEXSTRTOI(fromcp); | |
1554 | fromcp += 2; | |
1555 | continue; | |
1556 | } else { | |
1557 | error = ENOENT; | |
70aac194 | 1558 | objcache_put(namei_oc, cp); |
984263bc MD |
1559 | goto out; |
1560 | } | |
1561 | } else | |
1562 | *tocp++ = *fromcp++; | |
1563 | } | |
1564 | *tocp = '\0'; | |
70aac194 | 1565 | objcache_put(namei_oc, namebuf); |
fad57d0e | 1566 | namebuf = cp; |
984263bc MD |
1567 | } |
1568 | ||
fad57d0e MD |
1569 | /* |
1570 | * Setup for search. We need to get a start directory from dp. Note | |
1571 | * that dp is ref'd, but we no longer 'own' the ref (*dirpp owns it). | |
1572 | */ | |
1573 | if (pubflag == 0) { | |
1574 | flags |= NLC_NFS_NOSOFTLINKTRAV; | |
1575 | flags |= NLC_NOCROSSMOUNT; | |
984263bc | 1576 | } |
fad57d0e MD |
1577 | if (rdonly) |
1578 | flags |= NLC_NFS_RDONLY; | |
1579 | if (nameiop == NAMEI_CREATE || nameiop == NAMEI_RENAME) | |
1580 | flags |= NLC_CREATE; | |
984263bc MD |
1581 | |
1582 | /* | |
fad57d0e MD |
1583 | * We need a starting ncp from the directory vnode dp. dp must not |
1584 | * be locked. The returned ncp will be refd but not locked. | |
1585 | * | |
1586 | * If no suitable ncp is found we instruct cache_fromdvp() to create | |
1587 | * one. If this fails the directory has probably been removed while | |
1588 | * the target was chdir'd into it and any further lookup will fail. | |
984263bc | 1589 | */ |
fad57d0e MD |
1590 | if ((ncp = cache_fromdvp(dp, cred, 1)) == NULL) { |
1591 | error = EINVAL; | |
1592 | goto out; | |
1593 | } | |
1594 | nlookup_init_raw(nd, namebuf, UIO_SYSSPACE, flags, cred, ncp); | |
1595 | cache_drop(ncp); | |
984263bc | 1596 | |
fad57d0e MD |
1597 | /* |
1598 | * Ok, do the lookup. | |
1599 | */ | |
1600 | error = nlookup(nd); | |
984263bc | 1601 | |
fad57d0e MD |
1602 | /* |
1603 | * If no error occured return the requested dvpp and vpp. If | |
1604 | * NLC_CREATE was specified nd->nl_ncp may represent a negative | |
1605 | * cache hit in which case we do not attempt to obtain the vp. | |
1606 | */ | |
1607 | if (error == 0) { | |
1608 | ncp = nd->nl_ncp; | |
1609 | if (dvpp) { | |
1610 | if (ncp->nc_parent && | |
1611 | ncp->nc_parent->nc_mount == ncp->nc_mount) { | |
1612 | error = cache_vget(ncp->nc_parent, nd->nl_cred, | |
1613 | LK_EXCLUSIVE, dvpp); | |
1614 | } else { | |
1615 | error = ENXIO; | |
1616 | } | |
984263bc | 1617 | } |
fad57d0e MD |
1618 | if (vpp && ncp->nc_vp) { |
1619 | error = cache_vget(ncp, nd->nl_cred, LK_EXCLUSIVE, vpp); | |
984263bc | 1620 | } |
984263bc | 1621 | if (error) { |
fad57d0e MD |
1622 | if (dvpp && *dvpp) { |
1623 | vput(*dvpp); | |
1624 | *dvpp = NULL; | |
1625 | } | |
1626 | if (vpp && *vpp) { | |
1627 | vput(*vpp); | |
1628 | *vpp = NULL; | |
1629 | } | |
984263bc | 1630 | } |
984263bc MD |
1631 | } |
1632 | ||
1633 | /* | |
fad57d0e | 1634 | * Finish up. |
984263bc MD |
1635 | */ |
1636 | out: | |
70aac194 | 1637 | objcache_put(namei_oc, namebuf); |
984263bc MD |
1638 | return (error); |
1639 | } | |
1640 | ||
1641 | /* | |
1642 | * A fiddled version of m_adj() that ensures null fill to a long | |
1643 | * boundary and only trims off the back end | |
1644 | */ | |
1645 | void | |
e851b29e | 1646 | nfsm_adj(struct mbuf *mp, int len, int nul) |
984263bc | 1647 | { |
40393ded RG |
1648 | struct mbuf *m; |
1649 | int count, i; | |
1650 | char *cp; | |
984263bc MD |
1651 | |
1652 | /* | |
1653 | * Trim from tail. Scan the mbuf chain, | |
1654 | * calculating its length and finding the last mbuf. | |
1655 | * If the adjustment only affects this mbuf, then just | |
1656 | * adjust and return. Otherwise, rescan and truncate | |
1657 | * after the remaining size. | |
1658 | */ | |
1659 | count = 0; | |
1660 | m = mp; | |
1661 | for (;;) { | |
1662 | count += m->m_len; | |
1663 | if (m->m_next == (struct mbuf *)0) | |
1664 | break; | |
1665 | m = m->m_next; | |
1666 | } | |
1667 | if (m->m_len > len) { | |
1668 | m->m_len -= len; | |
1669 | if (nul > 0) { | |
1670 | cp = mtod(m, caddr_t)+m->m_len-nul; | |
1671 | for (i = 0; i < nul; i++) | |
1672 | *cp++ = '\0'; | |
1673 | } | |
1674 | return; | |
1675 | } | |
1676 | count -= len; | |
1677 | if (count < 0) | |
1678 | count = 0; | |
1679 | /* | |
1680 | * Correct length for chain is "count". | |
1681 | * Find the mbuf with last data, adjust its length, | |
1682 | * and toss data from remaining mbufs on chain. | |
1683 | */ | |
1684 | for (m = mp; m; m = m->m_next) { | |
1685 | if (m->m_len >= count) { | |
1686 | m->m_len = count; | |
1687 | if (nul > 0) { | |
1688 | cp = mtod(m, caddr_t)+m->m_len-nul; | |
1689 | for (i = 0; i < nul; i++) | |
1690 | *cp++ = '\0'; | |
1691 | } | |
1692 | break; | |
1693 | } | |
1694 | count -= m->m_len; | |
1695 | } | |
1696 | for (m = m->m_next;m;m = m->m_next) | |
1697 | m->m_len = 0; | |
1698 | } | |
1699 | ||
1700 | /* | |
1701 | * Make these functions instead of macros, so that the kernel text size | |
1702 | * doesn't get too big... | |
1703 | */ | |
1704 | void | |
e851b29e CP |
1705 | nfsm_srvwcc(struct nfsrv_descript *nfsd, int before_ret, |
1706 | struct vattr *before_vap, int after_ret, struct vattr *after_vap, | |
1707 | struct mbuf **mbp, char **bposp) | |
984263bc | 1708 | { |
40393ded RG |
1709 | struct mbuf *mb = *mbp, *mb2; |
1710 | char *bpos = *bposp; | |
1711 | u_int32_t *tl; | |
984263bc | 1712 | |
5a9187cb MD |
1713 | /* |
1714 | * before_ret is 0 if before_vap is valid, non-zero if it isn't. | |
1715 | */ | |
984263bc MD |
1716 | if (before_ret) { |
1717 | nfsm_build(tl, u_int32_t *, NFSX_UNSIGNED); | |
1718 | *tl = nfs_false; | |
1719 | } else { | |
1720 | nfsm_build(tl, u_int32_t *, 7 * NFSX_UNSIGNED); | |
1721 | *tl++ = nfs_true; | |
1722 | txdr_hyper(before_vap->va_size, tl); | |
1723 | tl += 2; | |
1724 | txdr_nfsv3time(&(before_vap->va_mtime), tl); | |
1725 | tl += 2; | |
1726 | txdr_nfsv3time(&(before_vap->va_ctime), tl); | |
1727 | } | |
1728 | *bposp = bpos; | |
1729 | *mbp = mb; | |
1730 | nfsm_srvpostopattr(nfsd, after_ret, after_vap, mbp, bposp); | |
1731 | } | |
1732 | ||
1733 | void | |
e851b29e CP |
1734 | nfsm_srvpostopattr(struct nfsrv_descript *nfsd, int after_ret, |
1735 | struct vattr *after_vap, struct mbuf **mbp, char **bposp) | |
984263bc | 1736 | { |
40393ded RG |
1737 | struct mbuf *mb = *mbp, *mb2; |
1738 | char *bpos = *bposp; | |
1739 | u_int32_t *tl; | |
1740 | struct nfs_fattr *fp; | |
984263bc MD |
1741 | |
1742 | if (after_ret) { | |
1743 | nfsm_build(tl, u_int32_t *, NFSX_UNSIGNED); | |
1744 | *tl = nfs_false; | |
1745 | } else { | |
1746 | nfsm_build(tl, u_int32_t *, NFSX_UNSIGNED + NFSX_V3FATTR); | |
1747 | *tl++ = nfs_true; | |
1748 | fp = (struct nfs_fattr *)tl; | |
1749 | nfsm_srvfattr(nfsd, after_vap, fp); | |
1750 | } | |
1751 | *mbp = mb; | |
1752 | *bposp = bpos; | |
1753 | } | |
1754 | ||
1755 | void | |
e851b29e CP |
1756 | nfsm_srvfattr(struct nfsrv_descript *nfsd, struct vattr *vap, |
1757 | struct nfs_fattr *fp) | |
984263bc MD |
1758 | { |
1759 | ||
1760 | fp->fa_nlink = txdr_unsigned(vap->va_nlink); | |
1761 | fp->fa_uid = txdr_unsigned(vap->va_uid); | |
1762 | fp->fa_gid = txdr_unsigned(vap->va_gid); | |
1763 | if (nfsd->nd_flag & ND_NFSV3) { | |
1764 | fp->fa_type = vtonfsv3_type(vap->va_type); | |
1765 | fp->fa_mode = vtonfsv3_mode(vap->va_mode); | |
1766 | txdr_hyper(vap->va_size, &fp->fa3_size); | |
1767 | txdr_hyper(vap->va_bytes, &fp->fa3_used); | |
1768 | fp->fa3_rdev.specdata1 = txdr_unsigned(umajor(vap->va_rdev)); | |
1769 | fp->fa3_rdev.specdata2 = txdr_unsigned(uminor(vap->va_rdev)); | |
1770 | fp->fa3_fsid.nfsuquad[0] = 0; | |
1771 | fp->fa3_fsid.nfsuquad[1] = txdr_unsigned(vap->va_fsid); | |
1772 | fp->fa3_fileid.nfsuquad[0] = 0; | |
1773 | fp->fa3_fileid.nfsuquad[1] = txdr_unsigned(vap->va_fileid); | |
1774 | txdr_nfsv3time(&vap->va_atime, &fp->fa3_atime); | |
1775 | txdr_nfsv3time(&vap->va_mtime, &fp->fa3_mtime); | |
1776 | txdr_nfsv3time(&vap->va_ctime, &fp->fa3_ctime); | |
1777 | } else { | |
1778 | fp->fa_type = vtonfsv2_type(vap->va_type); | |
1779 | fp->fa_mode = vtonfsv2_mode(vap->va_type, vap->va_mode); | |
1780 | fp->fa2_size = txdr_unsigned(vap->va_size); | |
1781 | fp->fa2_blocksize = txdr_unsigned(vap->va_blocksize); | |
1782 | if (vap->va_type == VFIFO) | |
1783 | fp->fa2_rdev = 0xffffffff; | |
1784 | else | |
1785 | fp->fa2_rdev = txdr_unsigned(vap->va_rdev); | |
1786 | fp->fa2_blocks = txdr_unsigned(vap->va_bytes / NFS_FABLKSIZE); | |
1787 | fp->fa2_fsid = txdr_unsigned(vap->va_fsid); | |
1788 | fp->fa2_fileid = txdr_unsigned(vap->va_fileid); | |
1789 | txdr_nfsv2time(&vap->va_atime, &fp->fa2_atime); | |
1790 | txdr_nfsv2time(&vap->va_mtime, &fp->fa2_mtime); | |
1791 | txdr_nfsv2time(&vap->va_ctime, &fp->fa2_ctime); | |
1792 | } | |
1793 | } | |
1794 | ||
1795 | /* | |
1796 | * nfsrv_fhtovp() - convert a fh to a vnode ptr (optionally locked) | |
1797 | * - look up fsid in mount list (if not found ret error) | |
1798 | * - get vp and export rights by calling VFS_FHTOVP() | |
1799 | * - if cred->cr_uid == 0 or MNT_EXPORTANON set it to credanon | |
1800 | * - if not lockflag unlock it with VOP_UNLOCK() | |
1801 | */ | |
1802 | int | |
e851b29e CP |
1803 | nfsrv_fhtovp(fhandle_t *fhp, int lockflag, struct vnode **vpp, |
1804 | struct ucred *cred, struct nfssvc_sock *slp, struct sockaddr *nam, | |
1805 | int *rdonlyp, int kerbflag, int pubflag) | |
984263bc | 1806 | { |
40393ded RG |
1807 | struct mount *mp; |
1808 | int i; | |
984263bc MD |
1809 | struct ucred *credanon; |
1810 | int error, exflags; | |
1811 | #ifdef MNT_EXNORESPORT /* XXX needs mountd and /etc/exports help yet */ | |
1812 | struct sockaddr_int *saddr; | |
1813 | #endif | |
1814 | ||
1815 | *vpp = (struct vnode *)0; | |
1816 | ||
1817 | if (nfs_ispublicfh(fhp)) { | |
1818 | if (!pubflag || !nfs_pub.np_valid) | |
1819 | return (ESTALE); | |
1820 | fhp = &nfs_pub.np_handle; | |
1821 | } | |
1822 | ||
1823 | mp = vfs_getvfs(&fhp->fh_fsid); | |
1824 | if (!mp) | |
1825 | return (ESTALE); | |
1826 | error = VFS_CHECKEXP(mp, nam, &exflags, &credanon); | |
1827 | if (error) | |
1828 | return (error); | |
1829 | error = VFS_FHTOVP(mp, &fhp->fh_fid, vpp); | |
1830 | if (error) | |
1831 | return (error); | |
1832 | #ifdef MNT_EXNORESPORT | |
1833 | if (!(exflags & (MNT_EXNORESPORT|MNT_EXPUBLIC))) { | |
1834 | saddr = (struct sockaddr_in *)nam; | |
1835 | if (saddr->sin_family == AF_INET && | |
1836 | ntohs(saddr->sin_port) >= IPPORT_RESERVED) { | |
1837 | vput(*vpp); | |
1838 | *vpp = NULL; | |
1839 | return (NFSERR_AUTHERR | AUTH_TOOWEAK); | |
1840 | } | |
1841 | } | |
1842 | #endif | |
1843 | /* | |
1844 | * Check/setup credentials. | |
1845 | */ | |
1846 | if (exflags & MNT_EXKERB) { | |
1847 | if (!kerbflag) { | |
1848 | vput(*vpp); | |
1849 | *vpp = NULL; | |
1850 | return (NFSERR_AUTHERR | AUTH_TOOWEAK); | |
1851 | } | |
1852 | } else if (kerbflag) { | |
1853 | vput(*vpp); | |
1854 | *vpp = NULL; | |
1855 | return (NFSERR_AUTHERR | AUTH_TOOWEAK); | |
1856 | } else if (cred->cr_uid == 0 || (exflags & MNT_EXPORTANON)) { | |
1857 | cred->cr_uid = credanon->cr_uid; | |
1858 | for (i = 0; i < credanon->cr_ngroups && i < NGROUPS; i++) | |
1859 | cred->cr_groups[i] = credanon->cr_groups[i]; | |
1860 | cred->cr_ngroups = i; | |
1861 | } | |
1862 | if (exflags & MNT_EXRDONLY) | |
1863 | *rdonlyp = 1; | |
1864 | else | |
1865 | *rdonlyp = 0; | |
1866 | ||
984263bc | 1867 | if (!lockflag) |
ca466bae | 1868 | VOP_UNLOCK(*vpp, 0); |
984263bc MD |
1869 | return (0); |
1870 | } | |
1871 | ||
1872 | ||
1873 | /* | |
1874 | * WebNFS: check if a filehandle is a public filehandle. For v3, this | |
1875 | * means a length of 0, for v2 it means all zeroes. nfsm_srvmtofh has | |
1876 | * transformed this to all zeroes in both cases, so check for it. | |
1877 | */ | |
1878 | int | |
e851b29e | 1879 | nfs_ispublicfh(fhandle_t *fhp) |
984263bc MD |
1880 | { |
1881 | char *cp = (char *)fhp; | |
1882 | int i; | |
1883 | ||
1884 | for (i = 0; i < NFSX_V3FH; i++) | |
1885 | if (*cp++ != 0) | |
1886 | return (FALSE); | |
1887 | return (TRUE); | |
1888 | } | |
1889 | ||
1890 | #endif /* NFS_NOSERVER */ | |
1891 | /* | |
1892 | * This function compares two net addresses by family and returns TRUE | |
1893 | * if they are the same host. | |
1894 | * If there is any doubt, return FALSE. | |
1895 | * The AF_INET family is handled as a special case so that address mbufs | |
1896 | * don't need to be saved to store "struct in_addr", which is only 4 bytes. | |
1897 | */ | |
1898 | int | |
e851b29e | 1899 | netaddr_match(int family, union nethostaddr *haddr, struct sockaddr *nam) |
984263bc | 1900 | { |
40393ded | 1901 | struct sockaddr_in *inetaddr; |
984263bc MD |
1902 | |
1903 | switch (family) { | |
1904 | case AF_INET: | |
1905 | inetaddr = (struct sockaddr_in *)nam; | |
1906 | if (inetaddr->sin_family == AF_INET && | |
1907 | inetaddr->sin_addr.s_addr == haddr->had_inetaddr) | |
1908 | return (1); | |
1909 | break; | |
1910 | default: | |
1911 | break; | |
1912 | }; | |
1913 | return (0); | |
1914 | } | |
1915 | ||
1916 | static nfsuint64 nfs_nullcookie = { { 0, 0 } }; | |
1917 | /* | |
1918 | * This function finds the directory cookie that corresponds to the | |
1919 | * logical byte offset given. | |
1920 | */ | |
1921 | nfsuint64 * | |
e851b29e | 1922 | nfs_getcookie(struct nfsnode *np, off_t off, int add) |
984263bc | 1923 | { |
40393ded RG |
1924 | struct nfsdmap *dp, *dp2; |
1925 | int pos; | |
984263bc MD |
1926 | |
1927 | pos = (uoff_t)off / NFS_DIRBLKSIZ; | |
1928 | if (pos == 0 || off < 0) { | |
1929 | #ifdef DIAGNOSTIC | |
1930 | if (add) | |
1931 | panic("nfs getcookie add at <= 0"); | |
1932 | #endif | |
1933 | return (&nfs_nullcookie); | |
1934 | } | |
1935 | pos--; | |
1936 | dp = np->n_cookies.lh_first; | |
1937 | if (!dp) { | |
1938 | if (add) { | |
1939 | MALLOC(dp, struct nfsdmap *, sizeof (struct nfsdmap), | |
1940 | M_NFSDIROFF, M_WAITOK); | |
1941 | dp->ndm_eocookie = 0; | |
1942 | LIST_INSERT_HEAD(&np->n_cookies, dp, ndm_list); | |
1943 | } else | |
1944 | return ((nfsuint64 *)0); | |
1945 | } | |
1946 | while (pos >= NFSNUMCOOKIES) { | |
1947 | pos -= NFSNUMCOOKIES; | |
1948 | if (dp->ndm_list.le_next) { | |
1949 | if (!add && dp->ndm_eocookie < NFSNUMCOOKIES && | |
1950 | pos >= dp->ndm_eocookie) | |
1951 | return ((nfsuint64 *)0); | |
1952 | dp = dp->ndm_list.le_next; | |
1953 | } else if (add) { | |
1954 | MALLOC(dp2, struct nfsdmap *, sizeof (struct nfsdmap), | |
1955 | M_NFSDIROFF, M_WAITOK); | |
1956 | dp2->ndm_eocookie = 0; | |
1957 | LIST_INSERT_AFTER(dp, dp2, ndm_list); | |
1958 | dp = dp2; | |
1959 | } else | |
1960 | return ((nfsuint64 *)0); | |
1961 | } | |
1962 | if (pos >= dp->ndm_eocookie) { | |
1963 | if (add) | |
1964 | dp->ndm_eocookie = pos + 1; | |
1965 | else | |
1966 | return ((nfsuint64 *)0); | |
1967 | } | |
1968 | return (&dp->ndm_cookies[pos]); | |
1969 | } | |
1970 | ||
1971 | /* | |
1972 | * Invalidate cached directory information, except for the actual directory | |
1973 | * blocks (which are invalidated separately). | |
1974 | * Done mainly to avoid the use of stale offset cookies. | |
1975 | */ | |
1976 | void | |
e851b29e | 1977 | nfs_invaldir(struct vnode *vp) |
984263bc | 1978 | { |
40393ded | 1979 | struct nfsnode *np = VTONFS(vp); |
984263bc MD |
1980 | |
1981 | #ifdef DIAGNOSTIC | |
1982 | if (vp->v_type != VDIR) | |
1983 | panic("nfs: invaldir not dir"); | |
1984 | #endif | |
1985 | np->n_direofoffset = 0; | |
1986 | np->n_cookieverf.nfsuquad[0] = 0; | |
1987 | np->n_cookieverf.nfsuquad[1] = 0; | |
1988 | if (np->n_cookies.lh_first) | |
1989 | np->n_cookies.lh_first->ndm_eocookie = 0; | |
1990 | } | |
1991 | ||
1c843a13 MD |
1992 | /* |
1993 | * Set the v_type field for an NFS client's vnode and initialize for | |
1994 | * buffer cache operations if necessary. | |
1995 | */ | |
1996 | void | |
1997 | nfs_setvtype(struct vnode *vp, enum vtype vtyp) | |
1998 | { | |
1999 | vp->v_type = vtyp; | |
2000 | ||
2001 | switch(vtyp) { | |
2002 | case VREG: | |
2003 | case VDIR: | |
2004 | case VLNK: | |
2005 | vinitvmio(vp, 0); /* needs VMIO, size not yet known */ | |
2006 | break; | |
2007 | default: | |
2008 | break; | |
2009 | } | |
2010 | } | |
2011 | ||
984263bc MD |
2012 | /* |
2013 | * The write verifier has changed (probably due to a server reboot), so all | |
2014 | * B_NEEDCOMMIT blocks will have to be written again. Since they are on the | |
2015 | * dirty block list as B_DELWRI, all this takes is clearing the B_NEEDCOMMIT | |
2016 | * and B_CLUSTEROK flags. Once done the new write verifier can be set for the | |
2017 | * mount point. | |
2018 | * | |
2019 | * B_CLUSTEROK must be cleared along with B_NEEDCOMMIT because stage 1 data | |
2020 | * writes are not clusterable. | |
2021 | */ | |
6bae6177 MD |
2022 | |
2023 | static int nfs_clearcommit_bp(struct buf *bp, void *data __unused); | |
2024 | ||
984263bc | 2025 | void |
e851b29e | 2026 | nfs_clearcommit(struct mount *mp) |
984263bc | 2027 | { |
40393ded | 2028 | struct vnode *vp, *nvp; |
b2eb81cd | 2029 | lwkt_tokref ilock; |
984263bc | 2030 | |
b2eb81cd | 2031 | lwkt_gettoken(&ilock, &mntvnode_token); |
165dba55 | 2032 | crit_enter(); |
984263bc | 2033 | for (vp = TAILQ_FIRST(&mp->mnt_nvnodelist); vp; vp = nvp) { |
41a01a4d | 2034 | nvp = TAILQ_NEXT(vp, v_nmntvnodes); /* ZZZ */ |
6bae6177 MD |
2035 | RB_SCAN(buf_rb_tree, &vp->v_rbdirty_tree, NULL, |
2036 | nfs_clearcommit_bp, NULL); | |
984263bc | 2037 | } |
165dba55 | 2038 | crit_exit(); |
b2eb81cd | 2039 | lwkt_reltoken(&ilock); |
984263bc MD |
2040 | } |
2041 | ||
6bae6177 MD |
2042 | static int |
2043 | nfs_clearcommit_bp(struct buf *bp, void *data __unused) | |
2044 | { | |
2045 | if (BUF_REFCNT(bp) == 0 && | |
2046 | (bp->b_flags & (B_DELWRI | B_NEEDCOMMIT)) | |
2047 | == (B_DELWRI | B_NEEDCOMMIT)) { | |
2048 | bp->b_flags &= ~(B_NEEDCOMMIT | B_CLUSTEROK); | |
2049 | } | |
2050 | return(0); | |
2051 | } | |
2052 | ||
984263bc MD |
2053 | #ifndef NFS_NOSERVER |
2054 | /* | |
2055 | * Map errnos to NFS error numbers. For Version 3 also filter out error | |
2056 | * numbers not specified for the associated procedure. | |
2057 | */ | |
2058 | int | |
e851b29e | 2059 | nfsrv_errmap(struct nfsrv_descript *nd, int err) |
984263bc | 2060 | { |
40393ded | 2061 | short *defaulterrp, *errp; |
984263bc MD |
2062 | |
2063 | if (nd->nd_flag & ND_NFSV3) { | |
2064 | if (nd->nd_procnum <= NFSPROC_COMMIT) { | |
2065 | errp = defaulterrp = nfsrv_v3errmap[nd->nd_procnum]; | |
2066 | while (*++errp) { | |
2067 | if (*errp == err) | |
2068 | return (err); | |
2069 | else if (*errp > err) | |
2070 | break; | |
2071 | } | |
2072 | return ((int)*defaulterrp); | |
2073 | } else | |
2074 | return (err & 0xffff); | |
2075 | } | |
2076 | if (err <= ELAST) | |
2077 | return ((int)nfsrv_v2errmap[err - 1]); | |
2078 | return (NFSERR_IO); | |
2079 | } | |
2080 | ||
984263bc MD |
2081 | /* |
2082 | * Sort the group list in increasing numerical order. | |
2083 | * (Insertion sort by Chris Torek, who was grossed out by the bubble sort | |
2084 | * that used to be here.) | |
2085 | */ | |
2086 | void | |
e851b29e | 2087 | nfsrvw_sort(gid_t *list, int num) |
984263bc | 2088 | { |
40393ded | 2089 | int i, j; |
984263bc MD |
2090 | gid_t v; |
2091 | ||
2092 | /* Insertion sort. */ | |
2093 | for (i = 1; i < num; i++) { | |
2094 | v = list[i]; | |
2095 | /* find correct slot for value v, moving others up */ | |
2096 | for (j = i; --j >= 0 && v < list[j];) | |
2097 | list[j + 1] = list[j]; | |
2098 | list[j + 1] = v; | |
2099 | } | |
2100 | } | |
2101 | ||
2102 | /* | |
2103 | * copy credentials making sure that the result can be compared with bcmp(). | |
2104 | */ | |
2105 | void | |
e851b29e | 2106 | nfsrv_setcred(struct ucred *incred, struct ucred *outcred) |
984263bc | 2107 | { |
40393ded | 2108 | int i; |
984263bc MD |
2109 | |
2110 | bzero((caddr_t)outcred, sizeof (struct ucred)); | |
2111 | outcred->cr_ref = 1; | |
2112 | outcred->cr_uid = incred->cr_uid; | |
2113 | outcred->cr_ngroups = incred->cr_ngroups; | |
2114 | for (i = 0; i < incred->cr_ngroups; i++) | |
2115 | outcred->cr_groups[i] = incred->cr_groups[i]; | |
2116 | nfsrvw_sort(outcred->cr_groups, outcred->cr_ngroups); | |
2117 | } | |
2118 | #endif /* NFS_NOSERVER */ |