Commit | Line | Data |
---|---|---|
984263bc MD |
1 | /* |
2 | * Copyright (c) 1989, 1993 | |
3 | * The Regents of the University of California. All rights reserved. | |
4 | * | |
5 | * This code is derived from software contributed to Berkeley by | |
6 | * Rick Macklem at The University of Guelph. | |
7 | * | |
8 | * Redistribution and use in source and binary forms, with or without | |
9 | * modification, are permitted provided that the following conditions | |
10 | * are met: | |
11 | * 1. Redistributions of source code must retain the above copyright | |
12 | * notice, this list of conditions and the following disclaimer. | |
13 | * 2. Redistributions in binary form must reproduce the above copyright | |
14 | * notice, this list of conditions and the following disclaimer in the | |
15 | * documentation and/or other materials provided with the distribution. | |
16 | * 3. All advertising materials mentioning features or use of this software | |
17 | * must display the following acknowledgement: | |
18 | * This product includes software developed by the University of | |
19 | * California, Berkeley and its contributors. | |
20 | * 4. Neither the name of the University nor the names of its contributors | |
21 | * may be used to endorse or promote products derived from this software | |
22 | * without specific prior written permission. | |
23 | * | |
24 | * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND | |
25 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
26 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
27 | * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE | |
28 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
29 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
30 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
31 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
32 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
33 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
34 | * SUCH DAMAGE. | |
35 | * | |
36 | * @(#)nfs_subs.c 8.8 (Berkeley) 5/22/95 | |
79e5012e | 37 | * $FreeBSD: /repoman/r/ncvs/src/sys/nfsclient/nfs_subs.c,v 1.128 2004/04/14 23:23:55 peadar Exp $ |
67863d04 | 38 | * $DragonFly: src/sys/vfs/nfs/nfs_subs.c,v 1.48 2008/09/17 21:44:24 dillon Exp $ |
984263bc MD |
39 | */ |
40 | ||
41 | /* | |
42 | * These functions support the macros and help fiddle mbuf chains for | |
43 | * the nfs op functions. They do things like create the rpc header and | |
44 | * copy data between mbuf chains and uio lists. | |
45 | */ | |
46 | #include <sys/param.h> | |
47 | #include <sys/systm.h> | |
48 | #include <sys/kernel.h> | |
49 | #include <sys/buf.h> | |
50 | #include <sys/proc.h> | |
51 | #include <sys/mount.h> | |
52 | #include <sys/vnode.h> | |
fad57d0e | 53 | #include <sys/nlookup.h> |
984263bc MD |
54 | #include <sys/namei.h> |
55 | #include <sys/mbuf.h> | |
56 | #include <sys/socket.h> | |
57 | #include <sys/stat.h> | |
58 | #include <sys/malloc.h> | |
59 | #include <sys/sysent.h> | |
60 | #include <sys/syscall.h> | |
61 | #include <sys/conf.h> | |
70aac194 | 62 | #include <sys/objcache.h> |
984263bc MD |
63 | |
64 | #include <vm/vm.h> | |
65 | #include <vm/vm_object.h> | |
66 | #include <vm/vm_extern.h> | |
67 | #include <vm/vm_zone.h> | |
68 | ||
3020e3be MD |
69 | #include <sys/buf2.h> |
70 | ||
1f2de5d4 MD |
71 | #include "rpcv2.h" |
72 | #include "nfsproto.h" | |
73 | #include "nfs.h" | |
c1cf1e59 | 74 | #include "nfsmount.h" |
1f2de5d4 MD |
75 | #include "nfsnode.h" |
76 | #include "xdr_subs.h" | |
77 | #include "nfsm_subs.h" | |
1f2de5d4 | 78 | #include "nfsrtt.h" |
984263bc MD |
79 | |
80 | #include <netinet/in.h> | |
81 | ||
82 | /* | |
83 | * Data items converted to xdr at startup, since they are constant | |
84 | * This is kinda hokey, but may save a little time doing byte swaps | |
85 | */ | |
86 | u_int32_t nfs_xdrneg1; | |
e97453f3 MD |
87 | u_int32_t rpc_reply, rpc_msgdenied, rpc_mismatch, rpc_vers; |
88 | u_int32_t rpc_auth_unix, rpc_msgaccepted, rpc_call, rpc_autherr; | |
89 | u_int32_t rpc_auth_kerb; | |
e07fef60 | 90 | u_int32_t nfs_prog, nfs_true, nfs_false; |
984263bc MD |
91 | |
92 | /* And other global data */ | |
984263bc MD |
93 | static enum vtype nv2tov_type[8]= { |
94 | VNON, VREG, VDIR, VBLK, VCHR, VLNK, VNON, VNON | |
95 | }; | |
96 | enum vtype nv3tov_type[8]= { | |
97 | VNON, VREG, VDIR, VBLK, VCHR, VLNK, VSOCK, VFIFO | |
98 | }; | |
99 | ||
100 | int nfs_ticks; | |
e97453f3 MD |
101 | |
102 | static int nfs_pbuf_freecnt = -1; /* start out unlimited */ | |
984263bc | 103 | |
49433307 | 104 | struct nfsmount_head nfs_mountq = TAILQ_HEAD_INITIALIZER(nfs_mountq); |
984263bc MD |
105 | struct nfssvc_sockhead nfssvc_sockhead; |
106 | int nfssvc_sockhead_flag; | |
107 | struct nfsd_head nfsd_head; | |
108 | int nfsd_head_flag; | |
109 | struct nfs_bufq nfs_bufq; | |
984263bc MD |
110 | struct nqfhhashhead *nqfhhashtbl; |
111 | u_long nqfhhash; | |
112 | ||
984263bc MD |
113 | static int nfs_prev_nfssvc_sy_narg; |
114 | static sy_call_t *nfs_prev_nfssvc_sy_call; | |
115 | ||
116 | #ifndef NFS_NOSERVER | |
117 | ||
984263bc MD |
118 | /* |
119 | * Mapping of old NFS Version 2 RPC numbers to generic numbers. | |
120 | */ | |
121 | int nfsv3_procid[NFS_NPROCS] = { | |
122 | NFSPROC_NULL, | |
123 | NFSPROC_GETATTR, | |
124 | NFSPROC_SETATTR, | |
125 | NFSPROC_NOOP, | |
126 | NFSPROC_LOOKUP, | |
127 | NFSPROC_READLINK, | |
128 | NFSPROC_READ, | |
129 | NFSPROC_NOOP, | |
130 | NFSPROC_WRITE, | |
131 | NFSPROC_CREATE, | |
132 | NFSPROC_REMOVE, | |
133 | NFSPROC_RENAME, | |
134 | NFSPROC_LINK, | |
135 | NFSPROC_SYMLINK, | |
136 | NFSPROC_MKDIR, | |
137 | NFSPROC_RMDIR, | |
138 | NFSPROC_READDIR, | |
139 | NFSPROC_FSSTAT, | |
140 | NFSPROC_NOOP, | |
141 | NFSPROC_NOOP, | |
142 | NFSPROC_NOOP, | |
143 | NFSPROC_NOOP, | |
144 | NFSPROC_NOOP, | |
145 | NFSPROC_NOOP, | |
146 | NFSPROC_NOOP, | |
147 | NFSPROC_NOOP | |
148 | }; | |
149 | ||
150 | #endif /* NFS_NOSERVER */ | |
151 | /* | |
152 | * and the reverse mapping from generic to Version 2 procedure numbers | |
153 | */ | |
154 | int nfsv2_procid[NFS_NPROCS] = { | |
155 | NFSV2PROC_NULL, | |
156 | NFSV2PROC_GETATTR, | |
157 | NFSV2PROC_SETATTR, | |
158 | NFSV2PROC_LOOKUP, | |
159 | NFSV2PROC_NOOP, | |
160 | NFSV2PROC_READLINK, | |
161 | NFSV2PROC_READ, | |
162 | NFSV2PROC_WRITE, | |
163 | NFSV2PROC_CREATE, | |
164 | NFSV2PROC_MKDIR, | |
165 | NFSV2PROC_SYMLINK, | |
166 | NFSV2PROC_CREATE, | |
167 | NFSV2PROC_REMOVE, | |
168 | NFSV2PROC_RMDIR, | |
169 | NFSV2PROC_RENAME, | |
170 | NFSV2PROC_LINK, | |
171 | NFSV2PROC_READDIR, | |
172 | NFSV2PROC_NOOP, | |
173 | NFSV2PROC_STATFS, | |
174 | NFSV2PROC_NOOP, | |
175 | NFSV2PROC_NOOP, | |
176 | NFSV2PROC_NOOP, | |
177 | NFSV2PROC_NOOP, | |
178 | NFSV2PROC_NOOP, | |
179 | NFSV2PROC_NOOP, | |
180 | NFSV2PROC_NOOP, | |
181 | }; | |
182 | ||
183 | #ifndef NFS_NOSERVER | |
184 | /* | |
185 | * Maps errno values to nfs error numbers. | |
186 | * Use NFSERR_IO as the catch all for ones not specifically defined in | |
187 | * RFC 1094. | |
188 | */ | |
189 | static u_char nfsrv_v2errmap[ELAST] = { | |
190 | NFSERR_PERM, NFSERR_NOENT, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
191 | NFSERR_NXIO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
192 | NFSERR_IO, NFSERR_IO, NFSERR_ACCES, NFSERR_IO, NFSERR_IO, | |
193 | NFSERR_IO, NFSERR_EXIST, NFSERR_IO, NFSERR_NODEV, NFSERR_NOTDIR, | |
194 | NFSERR_ISDIR, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
195 | NFSERR_IO, NFSERR_FBIG, NFSERR_NOSPC, NFSERR_IO, NFSERR_ROFS, | |
196 | NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
197 | NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
198 | NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
199 | NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
200 | NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
201 | NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
202 | NFSERR_IO, NFSERR_IO, NFSERR_NAMETOL, NFSERR_IO, NFSERR_IO, | |
203 | NFSERR_NOTEMPTY, NFSERR_IO, NFSERR_IO, NFSERR_DQUOT, NFSERR_STALE, | |
204 | NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
205 | NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
206 | NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, NFSERR_IO, | |
207 | NFSERR_IO /* << Last is 86 */ | |
208 | }; | |
209 | ||
210 | /* | |
211 | * Maps errno values to nfs error numbers. | |
212 | * Although it is not obvious whether or not NFS clients really care if | |
213 | * a returned error value is in the specified list for the procedure, the | |
214 | * safest thing to do is filter them appropriately. For Version 2, the | |
215 | * X/Open XNFS document is the only specification that defines error values | |
216 | * for each RPC (The RFC simply lists all possible error values for all RPCs), | |
217 | * so I have decided to not do this for Version 2. | |
218 | * The first entry is the default error return and the rest are the valid | |
219 | * errors for that RPC in increasing numeric order. | |
220 | */ | |
221 | static short nfsv3err_null[] = { | |
222 | 0, | |
223 | 0, | |
224 | }; | |
225 | ||
226 | static short nfsv3err_getattr[] = { | |
227 | NFSERR_IO, | |
228 | NFSERR_IO, | |
229 | NFSERR_STALE, | |
230 | NFSERR_BADHANDLE, | |
231 | NFSERR_SERVERFAULT, | |
232 | 0, | |
233 | }; | |
234 | ||
235 | static short nfsv3err_setattr[] = { | |
236 | NFSERR_IO, | |
237 | NFSERR_PERM, | |
238 | NFSERR_IO, | |
239 | NFSERR_ACCES, | |
240 | NFSERR_INVAL, | |
241 | NFSERR_NOSPC, | |
242 | NFSERR_ROFS, | |
243 | NFSERR_DQUOT, | |
244 | NFSERR_STALE, | |
245 | NFSERR_BADHANDLE, | |
246 | NFSERR_NOT_SYNC, | |
247 | NFSERR_SERVERFAULT, | |
248 | 0, | |
249 | }; | |
250 | ||
251 | static short nfsv3err_lookup[] = { | |
252 | NFSERR_IO, | |
253 | NFSERR_NOENT, | |
254 | NFSERR_IO, | |
255 | NFSERR_ACCES, | |
256 | NFSERR_NOTDIR, | |
257 | NFSERR_NAMETOL, | |
258 | NFSERR_STALE, | |
259 | NFSERR_BADHANDLE, | |
260 | NFSERR_SERVERFAULT, | |
261 | 0, | |
262 | }; | |
263 | ||
264 | static short nfsv3err_access[] = { | |
265 | NFSERR_IO, | |
266 | NFSERR_IO, | |
267 | NFSERR_STALE, | |
268 | NFSERR_BADHANDLE, | |
269 | NFSERR_SERVERFAULT, | |
270 | 0, | |
271 | }; | |
272 | ||
273 | static short nfsv3err_readlink[] = { | |
274 | NFSERR_IO, | |
275 | NFSERR_IO, | |
276 | NFSERR_ACCES, | |
277 | NFSERR_INVAL, | |
278 | NFSERR_STALE, | |
279 | NFSERR_BADHANDLE, | |
280 | NFSERR_NOTSUPP, | |
281 | NFSERR_SERVERFAULT, | |
282 | 0, | |
283 | }; | |
284 | ||
285 | static short nfsv3err_read[] = { | |
286 | NFSERR_IO, | |
287 | NFSERR_IO, | |
288 | NFSERR_NXIO, | |
289 | NFSERR_ACCES, | |
290 | NFSERR_INVAL, | |
291 | NFSERR_STALE, | |
292 | NFSERR_BADHANDLE, | |
293 | NFSERR_SERVERFAULT, | |
294 | 0, | |
295 | }; | |
296 | ||
297 | static short nfsv3err_write[] = { | |
298 | NFSERR_IO, | |
299 | NFSERR_IO, | |
300 | NFSERR_ACCES, | |
301 | NFSERR_INVAL, | |
302 | NFSERR_FBIG, | |
303 | NFSERR_NOSPC, | |
304 | NFSERR_ROFS, | |
305 | NFSERR_DQUOT, | |
306 | NFSERR_STALE, | |
307 | NFSERR_BADHANDLE, | |
308 | NFSERR_SERVERFAULT, | |
309 | 0, | |
310 | }; | |
311 | ||
312 | static short nfsv3err_create[] = { | |
313 | NFSERR_IO, | |
314 | NFSERR_IO, | |
315 | NFSERR_ACCES, | |
316 | NFSERR_EXIST, | |
317 | NFSERR_NOTDIR, | |
318 | NFSERR_NOSPC, | |
319 | NFSERR_ROFS, | |
320 | NFSERR_NAMETOL, | |
321 | NFSERR_DQUOT, | |
322 | NFSERR_STALE, | |
323 | NFSERR_BADHANDLE, | |
324 | NFSERR_NOTSUPP, | |
325 | NFSERR_SERVERFAULT, | |
326 | 0, | |
327 | }; | |
328 | ||
329 | static short nfsv3err_mkdir[] = { | |
330 | NFSERR_IO, | |
331 | NFSERR_IO, | |
332 | NFSERR_ACCES, | |
333 | NFSERR_EXIST, | |
334 | NFSERR_NOTDIR, | |
335 | NFSERR_NOSPC, | |
336 | NFSERR_ROFS, | |
337 | NFSERR_NAMETOL, | |
338 | NFSERR_DQUOT, | |
339 | NFSERR_STALE, | |
340 | NFSERR_BADHANDLE, | |
341 | NFSERR_NOTSUPP, | |
342 | NFSERR_SERVERFAULT, | |
343 | 0, | |
344 | }; | |
345 | ||
346 | static short nfsv3err_symlink[] = { | |
347 | NFSERR_IO, | |
348 | NFSERR_IO, | |
349 | NFSERR_ACCES, | |
350 | NFSERR_EXIST, | |
351 | NFSERR_NOTDIR, | |
352 | NFSERR_NOSPC, | |
353 | NFSERR_ROFS, | |
354 | NFSERR_NAMETOL, | |
355 | NFSERR_DQUOT, | |
356 | NFSERR_STALE, | |
357 | NFSERR_BADHANDLE, | |
358 | NFSERR_NOTSUPP, | |
359 | NFSERR_SERVERFAULT, | |
360 | 0, | |
361 | }; | |
362 | ||
363 | static short nfsv3err_mknod[] = { | |
364 | NFSERR_IO, | |
365 | NFSERR_IO, | |
366 | NFSERR_ACCES, | |
367 | NFSERR_EXIST, | |
368 | NFSERR_NOTDIR, | |
369 | NFSERR_NOSPC, | |
370 | NFSERR_ROFS, | |
371 | NFSERR_NAMETOL, | |
372 | NFSERR_DQUOT, | |
373 | NFSERR_STALE, | |
374 | NFSERR_BADHANDLE, | |
375 | NFSERR_NOTSUPP, | |
376 | NFSERR_SERVERFAULT, | |
377 | NFSERR_BADTYPE, | |
378 | 0, | |
379 | }; | |
380 | ||
381 | static short nfsv3err_remove[] = { | |
382 | NFSERR_IO, | |
383 | NFSERR_NOENT, | |
384 | NFSERR_IO, | |
385 | NFSERR_ACCES, | |
386 | NFSERR_NOTDIR, | |
387 | NFSERR_ROFS, | |
388 | NFSERR_NAMETOL, | |
389 | NFSERR_STALE, | |
390 | NFSERR_BADHANDLE, | |
391 | NFSERR_SERVERFAULT, | |
392 | 0, | |
393 | }; | |
394 | ||
395 | static short nfsv3err_rmdir[] = { | |
396 | NFSERR_IO, | |
397 | NFSERR_NOENT, | |
398 | NFSERR_IO, | |
399 | NFSERR_ACCES, | |
400 | NFSERR_EXIST, | |
401 | NFSERR_NOTDIR, | |
402 | NFSERR_INVAL, | |
403 | NFSERR_ROFS, | |
404 | NFSERR_NAMETOL, | |
405 | NFSERR_NOTEMPTY, | |
406 | NFSERR_STALE, | |
407 | NFSERR_BADHANDLE, | |
408 | NFSERR_NOTSUPP, | |
409 | NFSERR_SERVERFAULT, | |
410 | 0, | |
411 | }; | |
412 | ||
413 | static short nfsv3err_rename[] = { | |
414 | NFSERR_IO, | |
415 | NFSERR_NOENT, | |
416 | NFSERR_IO, | |
417 | NFSERR_ACCES, | |
418 | NFSERR_EXIST, | |
419 | NFSERR_XDEV, | |
420 | NFSERR_NOTDIR, | |
421 | NFSERR_ISDIR, | |
422 | NFSERR_INVAL, | |
423 | NFSERR_NOSPC, | |
424 | NFSERR_ROFS, | |
425 | NFSERR_MLINK, | |
426 | NFSERR_NAMETOL, | |
427 | NFSERR_NOTEMPTY, | |
428 | NFSERR_DQUOT, | |
429 | NFSERR_STALE, | |
430 | NFSERR_BADHANDLE, | |
431 | NFSERR_NOTSUPP, | |
432 | NFSERR_SERVERFAULT, | |
433 | 0, | |
434 | }; | |
435 | ||
436 | static short nfsv3err_link[] = { | |
437 | NFSERR_IO, | |
438 | NFSERR_IO, | |
439 | NFSERR_ACCES, | |
440 | NFSERR_EXIST, | |
441 | NFSERR_XDEV, | |
442 | NFSERR_NOTDIR, | |
443 | NFSERR_INVAL, | |
444 | NFSERR_NOSPC, | |
445 | NFSERR_ROFS, | |
446 | NFSERR_MLINK, | |
447 | NFSERR_NAMETOL, | |
448 | NFSERR_DQUOT, | |
449 | NFSERR_STALE, | |
450 | NFSERR_BADHANDLE, | |
451 | NFSERR_NOTSUPP, | |
452 | NFSERR_SERVERFAULT, | |
453 | 0, | |
454 | }; | |
455 | ||
456 | static short nfsv3err_readdir[] = { | |
457 | NFSERR_IO, | |
458 | NFSERR_IO, | |
459 | NFSERR_ACCES, | |
460 | NFSERR_NOTDIR, | |
461 | NFSERR_STALE, | |
462 | NFSERR_BADHANDLE, | |
463 | NFSERR_BAD_COOKIE, | |
464 | NFSERR_TOOSMALL, | |
465 | NFSERR_SERVERFAULT, | |
466 | 0, | |
467 | }; | |
468 | ||
469 | static short nfsv3err_readdirplus[] = { | |
470 | NFSERR_IO, | |
471 | NFSERR_IO, | |
472 | NFSERR_ACCES, | |
473 | NFSERR_NOTDIR, | |
474 | NFSERR_STALE, | |
475 | NFSERR_BADHANDLE, | |
476 | NFSERR_BAD_COOKIE, | |
477 | NFSERR_NOTSUPP, | |
478 | NFSERR_TOOSMALL, | |
479 | NFSERR_SERVERFAULT, | |
480 | 0, | |
481 | }; | |
482 | ||
483 | static short nfsv3err_fsstat[] = { | |
484 | NFSERR_IO, | |
485 | NFSERR_IO, | |
486 | NFSERR_STALE, | |
487 | NFSERR_BADHANDLE, | |
488 | NFSERR_SERVERFAULT, | |
489 | 0, | |
490 | }; | |
491 | ||
492 | static short nfsv3err_fsinfo[] = { | |
493 | NFSERR_STALE, | |
494 | NFSERR_STALE, | |
495 | NFSERR_BADHANDLE, | |
496 | NFSERR_SERVERFAULT, | |
497 | 0, | |
498 | }; | |
499 | ||
500 | static short nfsv3err_pathconf[] = { | |
501 | NFSERR_STALE, | |
502 | NFSERR_STALE, | |
503 | NFSERR_BADHANDLE, | |
504 | NFSERR_SERVERFAULT, | |
505 | 0, | |
506 | }; | |
507 | ||
508 | static short nfsv3err_commit[] = { | |
509 | NFSERR_IO, | |
510 | NFSERR_IO, | |
511 | NFSERR_STALE, | |
512 | NFSERR_BADHANDLE, | |
513 | NFSERR_SERVERFAULT, | |
514 | 0, | |
515 | }; | |
516 | ||
517 | static short *nfsrv_v3errmap[] = { | |
518 | nfsv3err_null, | |
519 | nfsv3err_getattr, | |
520 | nfsv3err_setattr, | |
521 | nfsv3err_lookup, | |
522 | nfsv3err_access, | |
523 | nfsv3err_readlink, | |
524 | nfsv3err_read, | |
525 | nfsv3err_write, | |
526 | nfsv3err_create, | |
527 | nfsv3err_mkdir, | |
528 | nfsv3err_symlink, | |
529 | nfsv3err_mknod, | |
530 | nfsv3err_remove, | |
531 | nfsv3err_rmdir, | |
532 | nfsv3err_rename, | |
533 | nfsv3err_link, | |
534 | nfsv3err_readdir, | |
535 | nfsv3err_readdirplus, | |
536 | nfsv3err_fsstat, | |
537 | nfsv3err_fsinfo, | |
538 | nfsv3err_pathconf, | |
539 | nfsv3err_commit, | |
540 | }; | |
541 | ||
542 | #endif /* NFS_NOSERVER */ | |
543 | ||
984263bc | 544 | struct nfssvc_args; |
753fd850 | 545 | extern int sys_nfssvc(struct proc *, struct nfssvc_args *, int *); |
984263bc | 546 | |
2cb16efc MD |
547 | /* |
548 | * This needs to return a monotonically increasing or close to monotonically | |
549 | * increasing result, otherwise the write gathering queues won't work | |
550 | * properly. | |
551 | */ | |
984263bc | 552 | u_quad_t |
e851b29e | 553 | nfs_curusec(void) |
984263bc MD |
554 | { |
555 | struct timeval tv; | |
556 | ||
2cb16efc | 557 | getmicrouptime(&tv); |
984263bc MD |
558 | return ((u_quad_t)tv.tv_sec * 1000000 + (u_quad_t)tv.tv_usec); |
559 | } | |
560 | ||
984263bc MD |
561 | /* |
562 | * Called once to initialize data structures... | |
563 | */ | |
564 | int | |
e851b29e | 565 | nfs_init(struct vfsconf *vfsp) |
984263bc | 566 | { |
f786cc86 | 567 | callout_init(&nfs_timer_handle); |
984263bc MD |
568 | nfsmount_zone = zinit("NFSMOUNT", sizeof(struct nfsmount), 0, 0, 1); |
569 | ||
570 | nfs_mount_type = vfsp->vfc_typenum; | |
571 | nfsrtt.pos = 0; | |
572 | rpc_vers = txdr_unsigned(RPC_VER2); | |
573 | rpc_call = txdr_unsigned(RPC_CALL); | |
574 | rpc_reply = txdr_unsigned(RPC_REPLY); | |
575 | rpc_msgdenied = txdr_unsigned(RPC_MSGDENIED); | |
576 | rpc_msgaccepted = txdr_unsigned(RPC_MSGACCEPTED); | |
577 | rpc_mismatch = txdr_unsigned(RPC_MISMATCH); | |
578 | rpc_autherr = txdr_unsigned(RPC_AUTHERR); | |
579 | rpc_auth_unix = txdr_unsigned(RPCAUTH_UNIX); | |
580 | rpc_auth_kerb = txdr_unsigned(RPCAUTH_KERB4); | |
581 | nfs_prog = txdr_unsigned(NFS_PROG); | |
984263bc MD |
582 | nfs_true = txdr_unsigned(TRUE); |
583 | nfs_false = txdr_unsigned(FALSE); | |
584 | nfs_xdrneg1 = txdr_unsigned(-1); | |
585 | nfs_ticks = (hz * NFS_TICKINTVL + 500) / 1000; | |
586 | if (nfs_ticks < 1) | |
587 | nfs_ticks = 1; | |
984263bc MD |
588 | nfs_nhinit(); /* Init the nfsnode table */ |
589 | #ifndef NFS_NOSERVER | |
590 | nfsrv_init(0); /* Init server data structures */ | |
591 | nfsrv_initcache(); /* Init the server request cache */ | |
592 | #endif | |
593 | ||
984263bc MD |
594 | /* |
595 | * Initialize reply list and start timer | |
596 | */ | |
984263bc MD |
597 | nfs_timer(0); |
598 | ||
984263bc MD |
599 | nfs_prev_nfssvc_sy_narg = sysent[SYS_nfssvc].sy_narg; |
600 | sysent[SYS_nfssvc].sy_narg = 2; | |
601 | nfs_prev_nfssvc_sy_call = sysent[SYS_nfssvc].sy_call; | |
753fd850 | 602 | sysent[SYS_nfssvc].sy_call = (sy_call_t *)sys_nfssvc; |
984263bc MD |
603 | |
604 | nfs_pbuf_freecnt = nswbuf / 2 + 1; | |
605 | ||
606 | return (0); | |
607 | } | |
608 | ||
609 | int | |
e851b29e | 610 | nfs_uninit(struct vfsconf *vfsp) |
984263bc | 611 | { |
f786cc86 | 612 | callout_stop(&nfs_timer_handle); |
984263bc | 613 | nfs_mount_type = -1; |
984263bc MD |
614 | sysent[SYS_nfssvc].sy_narg = nfs_prev_nfssvc_sy_narg; |
615 | sysent[SYS_nfssvc].sy_call = nfs_prev_nfssvc_sy_call; | |
616 | return (0); | |
617 | } | |
618 | ||
619 | /* | |
620 | * Attribute cache routines. | |
621 | * nfs_loadattrcache() - loads or updates the cache contents from attributes | |
622 | * that are on the mbuf list | |
623 | * nfs_getattrcache() - returns valid attributes if found in cache, returns | |
624 | * error otherwise | |
625 | */ | |
626 | ||
627 | /* | |
628 | * Load the attribute cache (that lives in the nfsnode entry) with | |
5a9187cb MD |
629 | * the values on the mbuf list. Load *vaper with the attributes. vaper |
630 | * may be NULL. | |
631 | * | |
632 | * As a side effect n_mtime, which we use to determine if the file was | |
633 | * modified by some other host, is set to the attribute timestamp and | |
634 | * NRMODIFIED is set if the two values differ. | |
635 | * | |
636 | * WARNING: the mtime loaded into vaper does not necessarily represent | |
637 | * n_mtime or n_attr.mtime due to NACC and NUPD. | |
984263bc MD |
638 | */ |
639 | int | |
e851b29e | 640 | nfs_loadattrcache(struct vnode **vpp, struct mbuf **mdp, caddr_t *dposp, |
5a9187cb | 641 | struct vattr *vaper, int lattr_flags) |
984263bc | 642 | { |
40393ded RG |
643 | struct vnode *vp = *vpp; |
644 | struct vattr *vap; | |
645 | struct nfs_fattr *fp; | |
646 | struct nfsnode *np; | |
647 | int32_t t1; | |
984263bc | 648 | caddr_t cp2; |
e4c9c0c8 | 649 | int error = 0; |
0e9b9130 | 650 | int rmajor, rminor; |
e4c9c0c8 | 651 | udev_t rdev; |
984263bc MD |
652 | struct mbuf *md; |
653 | enum vtype vtyp; | |
654 | u_short vmode; | |
655 | struct timespec mtime; | |
656 | int v3 = NFS_ISV3(vp); | |
657 | ||
658 | md = *mdp; | |
659 | t1 = (mtod(md, caddr_t) + md->m_len) - *dposp; | |
660 | if ((error = nfsm_disct(mdp, dposp, NFSX_FATTR(v3), t1, &cp2)) != 0) | |
661 | return (error); | |
662 | fp = (struct nfs_fattr *)cp2; | |
663 | if (v3) { | |
664 | vtyp = nfsv3tov_type(fp->fa_type); | |
665 | vmode = fxdr_unsigned(u_short, fp->fa_mode); | |
0e9b9130 MD |
666 | rmajor = (int)fxdr_unsigned(int, fp->fa3_rdev.specdata1); |
667 | rminor = (int)fxdr_unsigned(int, fp->fa3_rdev.specdata2); | |
984263bc MD |
668 | fxdr_nfsv3time(&fp->fa3_mtime, &mtime); |
669 | } else { | |
670 | vtyp = nfsv2tov_type(fp->fa_type); | |
671 | vmode = fxdr_unsigned(u_short, fp->fa_mode); | |
672 | /* | |
673 | * XXX | |
674 | * | |
675 | * The duplicate information returned in fa_type and fa_mode | |
676 | * is an ambiguity in the NFS version 2 protocol. | |
677 | * | |
678 | * VREG should be taken literally as a regular file. If a | |
679 | * server intents to return some type information differently | |
680 | * in the upper bits of the mode field (e.g. for sockets, or | |
681 | * FIFOs), NFSv2 mandates fa_type to be VNON. Anyway, we | |
682 | * leave the examination of the mode bits even in the VREG | |
683 | * case to avoid breakage for bogus servers, but we make sure | |
684 | * that there are actually type bits set in the upper part of | |
685 | * fa_mode (and failing that, trust the va_type field). | |
686 | * | |
687 | * NFSv3 cleared the issue, and requires fa_mode to not | |
688 | * contain any type information (while also introduing sockets | |
689 | * and FIFOs for fa_type). | |
690 | */ | |
691 | if (vtyp == VNON || (vtyp == VREG && (vmode & S_IFMT) != 0)) | |
692 | vtyp = IFTOVT(vmode); | |
693 | rdev = fxdr_unsigned(int32_t, fp->fa2_rdev); | |
0e9b9130 MD |
694 | rmajor = umajor(rdev); |
695 | rminor = uminor(rdev); | |
984263bc MD |
696 | fxdr_nfsv2time(&fp->fa2_mtime, &mtime); |
697 | ||
698 | /* | |
699 | * Really ugly NFSv2 kludge. | |
700 | */ | |
e4c9c0c8 | 701 | if (vtyp == VCHR && rdev == (udev_t)0xffffffff) |
984263bc MD |
702 | vtyp = VFIFO; |
703 | } | |
704 | ||
705 | /* | |
706 | * If v_type == VNON it is a new node, so fill in the v_type, | |
707 | * n_mtime fields. Check to see if it represents a special | |
708 | * device, and if so, check for a possible alias. Once the | |
709 | * correct vnode has been obtained, fill in the rest of the | |
710 | * information. | |
711 | */ | |
712 | np = VTONFS(vp); | |
713 | if (vp->v_type != vtyp) { | |
1c843a13 | 714 | nfs_setvtype(vp, vtyp); |
984263bc | 715 | if (vp->v_type == VFIFO) { |
6ddb7618 | 716 | vp->v_ops = &vp->v_mount->mnt_vn_fifo_ops; |
0961aa92 | 717 | } else if (vp->v_type == VCHR || vp->v_type == VBLK) { |
6ddb7618 | 718 | vp->v_ops = &vp->v_mount->mnt_vn_spec_ops; |
0e9b9130 | 719 | addaliasu(vp, rmajor, rminor); |
0961aa92 | 720 | } else { |
6ddb7618 | 721 | vp->v_ops = &vp->v_mount->mnt_vn_use_ops; |
984263bc MD |
722 | } |
723 | np->n_mtime = mtime.tv_sec; | |
5a9187cb | 724 | } else if (np->n_mtime != mtime.tv_sec) { |
9793c819 | 725 | /* |
5a9187cb MD |
726 | * If we haven't modified the file locally and the server |
727 | * timestamp does not match, then the server probably | |
728 | * modified the file. We must flag this condition so | |
729 | * the proper syncnronization can be done. We do not | |
730 | * try to synchronize the state here because that | |
731 | * could lead to an endless recursion. | |
732 | * | |
733 | * XXX loadattrcache can be set during the reply to a write, | |
734 | * before the write timestamp is properly processed. To | |
735 | * avoid unconditionally setting the rmodified bit (which | |
736 | * has the effect of flushing the cache), we only do this | |
737 | * check if the lmodified bit is not set. | |
9793c819 MD |
738 | */ |
739 | np->n_mtime = mtime.tv_sec; | |
5a9187cb MD |
740 | if ((lattr_flags & NFS_LATTR_NOMTIMECHECK) == 0) |
741 | np->n_flag |= NRMODIFIED; | |
984263bc MD |
742 | } |
743 | vap = &np->n_vattr; | |
744 | vap->va_type = vtyp; | |
745 | vap->va_mode = (vmode & 07777); | |
0e9b9130 MD |
746 | vap->va_rmajor = rmajor; |
747 | vap->va_rminor = rminor; | |
984263bc MD |
748 | vap->va_mtime = mtime; |
749 | vap->va_fsid = vp->v_mount->mnt_stat.f_fsid.val[0]; | |
750 | if (v3) { | |
751 | vap->va_nlink = fxdr_unsigned(u_short, fp->fa_nlink); | |
752 | vap->va_uid = fxdr_unsigned(uid_t, fp->fa_uid); | |
753 | vap->va_gid = fxdr_unsigned(gid_t, fp->fa_gid); | |
754 | vap->va_size = fxdr_hyper(&fp->fa3_size); | |
755 | vap->va_blocksize = NFS_FABLKSIZE; | |
756 | vap->va_bytes = fxdr_hyper(&fp->fa3_used); | |
50626622 | 757 | vap->va_fileid = fxdr_hyper(&fp->fa3_fileid); |
984263bc MD |
758 | fxdr_nfsv3time(&fp->fa3_atime, &vap->va_atime); |
759 | fxdr_nfsv3time(&fp->fa3_ctime, &vap->va_ctime); | |
760 | vap->va_flags = 0; | |
761 | vap->va_filerev = 0; | |
762 | } else { | |
763 | vap->va_nlink = fxdr_unsigned(u_short, fp->fa_nlink); | |
764 | vap->va_uid = fxdr_unsigned(uid_t, fp->fa_uid); | |
765 | vap->va_gid = fxdr_unsigned(gid_t, fp->fa_gid); | |
766 | vap->va_size = fxdr_unsigned(u_int32_t, fp->fa2_size); | |
767 | vap->va_blocksize = fxdr_unsigned(int32_t, fp->fa2_blocksize); | |
768 | vap->va_bytes = (u_quad_t)fxdr_unsigned(int32_t, fp->fa2_blocks) | |
769 | * NFS_FABLKSIZE; | |
770 | vap->va_fileid = fxdr_unsigned(int32_t, fp->fa2_fileid); | |
771 | fxdr_nfsv2time(&fp->fa2_atime, &vap->va_atime); | |
772 | vap->va_flags = 0; | |
773 | vap->va_ctime.tv_sec = fxdr_unsigned(u_int32_t, | |
774 | fp->fa2_ctime.nfsv2_sec); | |
775 | vap->va_ctime.tv_nsec = 0; | |
776 | vap->va_gen = fxdr_unsigned(u_int32_t,fp->fa2_ctime.nfsv2_usec); | |
777 | vap->va_filerev = 0; | |
778 | } | |
779 | np->n_attrstamp = time_second; | |
780 | if (vap->va_size != np->n_size) { | |
781 | if (vap->va_type == VREG) { | |
5a9187cb MD |
782 | if ((lattr_flags & NFS_LATTR_NOSHRINK) && |
783 | vap->va_size < np->n_size) { | |
984263bc MD |
784 | /* |
785 | * We've been told not to shrink the file; | |
786 | * zero np->n_attrstamp to indicate that | |
787 | * the attributes are stale. | |
5a9187cb MD |
788 | * |
789 | * This occurs primarily due to recursive | |
790 | * NFS ops that are executed during periods | |
791 | * where we cannot safely reduce the size of | |
792 | * the file. | |
793 | * | |
794 | * Additionally, write rpcs are broken down | |
795 | * into buffers and np->n_size is | |
796 | * pre-extended. Setting NRMODIFIED here | |
797 | * can result in n_size getting reset to a | |
798 | * lower value, which is NOT what we want. | |
799 | * XXX this needs to be cleaned up a lot | |
800 | * more. | |
984263bc MD |
801 | */ |
802 | vap->va_size = np->n_size; | |
803 | np->n_attrstamp = 0; | |
5a9187cb MD |
804 | if ((np->n_flag & NLMODIFIED) == 0) |
805 | np->n_flag |= NRMODIFIED; | |
806 | } else if (np->n_flag & NLMODIFIED) { | |
79e5012e MD |
807 | /* |
808 | * We've modified the file: Use the larger | |
5a9187cb MD |
809 | * of our size, and the server's size. At |
810 | * this point the cache coherency is all | |
811 | * shot to hell. To try to handle multiple | |
812 | * clients appending to the file at the same | |
813 | * time mark that the server has changed | |
814 | * the file if the server's notion of the | |
815 | * file size is larger then our notion. | |
816 | * | |
817 | * XXX this needs work. | |
79e5012e MD |
818 | */ |
819 | if (vap->va_size < np->n_size) { | |
984263bc | 820 | vap->va_size = np->n_size; |
79e5012e | 821 | } else { |
984263bc | 822 | np->n_size = vap->va_size; |
5a9187cb | 823 | np->n_flag |= NRMODIFIED; |
79e5012e | 824 | } |
984263bc | 825 | } else { |
5a9187cb MD |
826 | /* |
827 | * Someone changed the file's size on the | |
828 | * server and there are no local changes | |
829 | * to get in the way, set the size and mark | |
830 | * it. | |
831 | */ | |
984263bc | 832 | np->n_size = vap->va_size; |
5a9187cb | 833 | np->n_flag |= NRMODIFIED; |
984263bc MD |
834 | } |
835 | vnode_pager_setsize(vp, np->n_size); | |
836 | } else { | |
837 | np->n_size = vap->va_size; | |
838 | } | |
839 | } | |
840 | if (vaper != NULL) { | |
841 | bcopy((caddr_t)vap, (caddr_t)vaper, sizeof(*vap)); | |
842 | if (np->n_flag & NCHG) { | |
843 | if (np->n_flag & NACC) | |
844 | vaper->va_atime = np->n_atim; | |
845 | if (np->n_flag & NUPD) | |
846 | vaper->va_mtime = np->n_mtim; | |
847 | } | |
848 | } | |
849 | return (0); | |
850 | } | |
851 | ||
852 | #ifdef NFS_ACDEBUG | |
853 | #include <sys/sysctl.h> | |
854 | SYSCTL_DECL(_vfs_nfs); | |
855 | static int nfs_acdebug; | |
856 | SYSCTL_INT(_vfs_nfs, OID_AUTO, acdebug, CTLFLAG_RW, &nfs_acdebug, 0, ""); | |
857 | #endif | |
858 | ||
859 | /* | |
860 | * Check the time stamp | |
861 | * If the cache is valid, copy contents to *vap and return 0 | |
862 | * otherwise return an error | |
863 | */ | |
864 | int | |
e851b29e | 865 | nfs_getattrcache(struct vnode *vp, struct vattr *vaper) |
984263bc | 866 | { |
40393ded RG |
867 | struct nfsnode *np; |
868 | struct vattr *vap; | |
984263bc MD |
869 | struct nfsmount *nmp; |
870 | int timeo; | |
871 | ||
872 | np = VTONFS(vp); | |
873 | vap = &np->n_vattr; | |
874 | nmp = VFSTONFS(vp->v_mount); | |
fad57d0e MD |
875 | |
876 | /* | |
877 | * Dynamic timeout based on how recently the file was modified. | |
5a9187cb | 878 | * n_mtime is always valid. |
fad57d0e | 879 | */ |
97100839 | 880 | timeo = (get_approximate_time_t() - np->n_mtime) / 60; |
984263bc MD |
881 | |
882 | #ifdef NFS_ACDEBUG | |
883 | if (nfs_acdebug>1) | |
086c1d7e | 884 | kprintf("nfs_getattrcache: initial timeo = %d\n", timeo); |
984263bc MD |
885 | #endif |
886 | ||
887 | if (vap->va_type == VDIR) { | |
5a9187cb | 888 | if ((np->n_flag & NLMODIFIED) || timeo < nmp->nm_acdirmin) |
984263bc MD |
889 | timeo = nmp->nm_acdirmin; |
890 | else if (timeo > nmp->nm_acdirmax) | |
891 | timeo = nmp->nm_acdirmax; | |
892 | } else { | |
5a9187cb | 893 | if ((np->n_flag & NLMODIFIED) || timeo < nmp->nm_acregmin) |
984263bc MD |
894 | timeo = nmp->nm_acregmin; |
895 | else if (timeo > nmp->nm_acregmax) | |
896 | timeo = nmp->nm_acregmax; | |
897 | } | |
898 | ||
899 | #ifdef NFS_ACDEBUG | |
900 | if (nfs_acdebug > 2) | |
086c1d7e | 901 | kprintf("acregmin %d; acregmax %d; acdirmin %d; acdirmax %d\n", |
984263bc MD |
902 | nmp->nm_acregmin, nmp->nm_acregmax, |
903 | nmp->nm_acdirmin, nmp->nm_acdirmax); | |
904 | ||
905 | if (nfs_acdebug) | |
086c1d7e | 906 | kprintf("nfs_getattrcache: age = %d; final timeo = %d\n", |
9793c819 | 907 | (int)(time_second - np->n_attrstamp), timeo); |
984263bc MD |
908 | #endif |
909 | ||
9793c819 | 910 | if (np->n_attrstamp == 0 || (time_second - np->n_attrstamp) >= timeo) { |
984263bc MD |
911 | nfsstats.attrcache_misses++; |
912 | return (ENOENT); | |
913 | } | |
914 | nfsstats.attrcache_hits++; | |
5a9187cb MD |
915 | |
916 | /* | |
917 | * Our attribute cache can be stale due to modifications made on | |
918 | * this host. XXX this is a bad hack. We need a more deterministic | |
919 | * means of finding out which np fields are valid verses attr cache | |
920 | * fields. We really should update the vattr info on the fly when | |
921 | * making local changes. | |
922 | */ | |
984263bc MD |
923 | if (vap->va_size != np->n_size) { |
924 | if (vap->va_type == VREG) { | |
5a9187cb | 925 | if (np->n_flag & NLMODIFIED) { |
984263bc MD |
926 | if (vap->va_size < np->n_size) |
927 | vap->va_size = np->n_size; | |
928 | else | |
929 | np->n_size = vap->va_size; | |
930 | } else { | |
931 | np->n_size = vap->va_size; | |
932 | } | |
933 | vnode_pager_setsize(vp, np->n_size); | |
934 | } else { | |
935 | np->n_size = vap->va_size; | |
936 | } | |
937 | } | |
938 | bcopy((caddr_t)vap, (caddr_t)vaper, sizeof(struct vattr)); | |
939 | if (np->n_flag & NCHG) { | |
940 | if (np->n_flag & NACC) | |
941 | vaper->va_atime = np->n_atim; | |
942 | if (np->n_flag & NUPD) | |
943 | vaper->va_mtime = np->n_mtim; | |
944 | } | |
945 | return (0); | |
946 | } | |
947 | ||
948 | #ifndef NFS_NOSERVER | |
fad57d0e | 949 | |
984263bc MD |
950 | /* |
951 | * Set up nameidata for a lookup() call and do it. | |
952 | * | |
953 | * If pubflag is set, this call is done for a lookup operation on the | |
954 | * public filehandle. In that case we allow crossing mountpoints and | |
955 | * absolute pathnames. However, the caller is expected to check that | |
956 | * the lookup result is within the public fs, and deny access if | |
957 | * it is not. | |
958 | * | |
984263bc MD |
959 | * dirp may be set whether an error is returned or not, and must be |
960 | * released by the caller. | |
fad57d0e | 961 | * |
28623bf9 | 962 | * On return nd->nl_nch usually points to the target ncp, which may represent |
fad57d0e MD |
963 | * a negative hit. |
964 | * | |
965 | * NOTE: the caller must call nlookup_done(nd) unconditionally on return | |
966 | * to cleanup. | |
984263bc MD |
967 | */ |
968 | int | |
3a907475 | 969 | nfs_namei(struct nlookupdata *nd, struct ucred *cred, int nflags, |
fad57d0e MD |
970 | struct vnode **dvpp, struct vnode **vpp, |
971 | fhandle_t *fhp, int len, | |
972 | struct nfssvc_sock *slp, struct sockaddr *nam, struct mbuf **mdp, | |
973 | caddr_t *dposp, struct vnode **dirpp, struct thread *td, | |
974 | int kerbflag, int pubflag) | |
984263bc | 975 | { |
40393ded RG |
976 | int i, rem; |
977 | struct mbuf *md; | |
978 | char *fromcp, *tocp, *cp; | |
fad57d0e | 979 | char *namebuf; |
28623bf9 | 980 | struct nchandle nch; |
984263bc | 981 | struct vnode *dp; |
67863d04 | 982 | struct mount *mp; |
fad57d0e | 983 | int error, rdonly; |
984263bc | 984 | |
70aac194 | 985 | namebuf = objcache_get(namei_oc, M_WAITOK); |
fad57d0e | 986 | *dirpp = NULL; |
984263bc MD |
987 | |
988 | /* | |
fad57d0e | 989 | * Copy the name from the mbuf list to namebuf. |
984263bc MD |
990 | */ |
991 | fromcp = *dposp; | |
fad57d0e | 992 | tocp = namebuf; |
984263bc MD |
993 | md = *mdp; |
994 | rem = mtod(md, caddr_t) + md->m_len - fromcp; | |
995 | for (i = 0; i < len; i++) { | |
996 | while (rem == 0) { | |
997 | md = md->m_next; | |
998 | if (md == NULL) { | |
999 | error = EBADRPC; | |
1000 | goto out; | |
1001 | } | |
1002 | fromcp = mtod(md, caddr_t); | |
1003 | rem = md->m_len; | |
1004 | } | |
1005 | if (*fromcp == '\0' || (!pubflag && *fromcp == '/')) { | |
1006 | error = EACCES; | |
1007 | goto out; | |
1008 | } | |
1009 | *tocp++ = *fromcp++; | |
1010 | rem--; | |
1011 | } | |
1012 | *tocp = '\0'; | |
1013 | *mdp = md; | |
1014 | *dposp = fromcp; | |
1015 | len = nfsm_rndup(len)-len; | |
1016 | if (len > 0) { | |
1017 | if (rem >= len) | |
1018 | *dposp += len; | |
1019 | else if ((error = nfs_adv(mdp, dposp, len, rem)) != 0) | |
1020 | goto out; | |
1021 | } | |
1022 | ||
1023 | /* | |
fad57d0e MD |
1024 | * Extract and set starting directory. The returned dp is refd |
1025 | * but not locked. | |
984263bc | 1026 | */ |
67863d04 | 1027 | error = nfsrv_fhtovp(fhp, FALSE, &mp, &dp, cred, slp, |
fad57d0e | 1028 | nam, &rdonly, kerbflag, pubflag); |
984263bc MD |
1029 | if (error) |
1030 | goto out; | |
1031 | if (dp->v_type != VDIR) { | |
1032 | vrele(dp); | |
1033 | error = ENOTDIR; | |
1034 | goto out; | |
1035 | } | |
1036 | ||
984263bc MD |
1037 | /* |
1038 | * Set return directory. Reference to dp is implicitly transfered | |
fad57d0e MD |
1039 | * to the returned pointer. This must be set before we potentially |
1040 | * goto out below. | |
984263bc | 1041 | */ |
fad57d0e | 1042 | *dirpp = dp; |
984263bc MD |
1043 | |
1044 | if (pubflag) { | |
1045 | /* | |
1046 | * Oh joy. For WebNFS, handle those pesky '%' escapes, | |
1047 | * and the 'native path' indicator. | |
1048 | */ | |
70aac194 | 1049 | cp = objcache_get(namei_oc, M_WAITOK); |
fad57d0e | 1050 | fromcp = namebuf; |
984263bc MD |
1051 | tocp = cp; |
1052 | if ((unsigned char)*fromcp >= WEBNFS_SPECCHAR_START) { | |
1053 | switch ((unsigned char)*fromcp) { | |
1054 | case WEBNFS_NATIVE_CHAR: | |
1055 | /* | |
1056 | * 'Native' path for us is the same | |
1057 | * as a path according to the NFS spec, | |
1058 | * just skip the escape char. | |
1059 | */ | |
1060 | fromcp++; | |
1061 | break; | |
1062 | /* | |
1063 | * More may be added in the future, range 0x80-0xff | |
1064 | */ | |
1065 | default: | |
1066 | error = EIO; | |
70aac194 | 1067 | objcache_put(namei_oc, cp); |
984263bc MD |
1068 | goto out; |
1069 | } | |
1070 | } | |
1071 | /* | |
1072 | * Translate the '%' escapes, URL-style. | |
1073 | */ | |
1074 | while (*fromcp != '\0') { | |
1075 | if (*fromcp == WEBNFS_ESC_CHAR) { | |
1076 | if (fromcp[1] != '\0' && fromcp[2] != '\0') { | |
1077 | fromcp++; | |
1078 | *tocp++ = HEXSTRTOI(fromcp); | |
1079 | fromcp += 2; | |
1080 | continue; | |
1081 | } else { | |
1082 | error = ENOENT; | |
70aac194 | 1083 | objcache_put(namei_oc, cp); |
984263bc MD |
1084 | goto out; |
1085 | } | |
1086 | } else | |
1087 | *tocp++ = *fromcp++; | |
1088 | } | |
1089 | *tocp = '\0'; | |
70aac194 | 1090 | objcache_put(namei_oc, namebuf); |
fad57d0e | 1091 | namebuf = cp; |
984263bc MD |
1092 | } |
1093 | ||
fad57d0e MD |
1094 | /* |
1095 | * Setup for search. We need to get a start directory from dp. Note | |
1096 | * that dp is ref'd, but we no longer 'own' the ref (*dirpp owns it). | |
1097 | */ | |
1098 | if (pubflag == 0) { | |
3a907475 MD |
1099 | nflags |= NLC_NFS_NOSOFTLINKTRAV; |
1100 | nflags |= NLC_NOCROSSMOUNT; | |
984263bc | 1101 | } |
fad57d0e | 1102 | if (rdonly) |
3a907475 | 1103 | nflags |= NLC_NFS_RDONLY; |
984263bc MD |
1104 | |
1105 | /* | |
fad57d0e MD |
1106 | * We need a starting ncp from the directory vnode dp. dp must not |
1107 | * be locked. The returned ncp will be refd but not locked. | |
1108 | * | |
1109 | * If no suitable ncp is found we instruct cache_fromdvp() to create | |
1110 | * one. If this fails the directory has probably been removed while | |
1111 | * the target was chdir'd into it and any further lookup will fail. | |
984263bc | 1112 | */ |
28623bf9 | 1113 | if ((error = cache_fromdvp(dp, cred, 1, &nch)) != 0) |
fad57d0e | 1114 | goto out; |
3a907475 | 1115 | nlookup_init_raw(nd, namebuf, UIO_SYSSPACE, nflags, cred, &nch); |
28623bf9 | 1116 | cache_drop(&nch); |
984263bc | 1117 | |
fad57d0e MD |
1118 | /* |
1119 | * Ok, do the lookup. | |
1120 | */ | |
1121 | error = nlookup(nd); | |
984263bc | 1122 | |
fad57d0e MD |
1123 | /* |
1124 | * If no error occured return the requested dvpp and vpp. If | |
28623bf9 | 1125 | * NLC_CREATE was specified nd->nl_nch may represent a negative |
fad57d0e MD |
1126 | * cache hit in which case we do not attempt to obtain the vp. |
1127 | */ | |
1128 | if (error == 0) { | |
fad57d0e | 1129 | if (dvpp) { |
443472eb | 1130 | if (nd->nl_nch.ncp->nc_parent) { |
28623bf9 MD |
1131 | nch = nd->nl_nch; |
1132 | nch.ncp = nch.ncp->nc_parent; | |
1133 | error = cache_vget(&nch, nd->nl_cred, | |
1134 | LK_EXCLUSIVE, dvpp); | |
fad57d0e MD |
1135 | } else { |
1136 | error = ENXIO; | |
1137 | } | |
984263bc | 1138 | } |
28623bf9 MD |
1139 | if (vpp && nd->nl_nch.ncp->nc_vp) { |
1140 | error = cache_vget(&nd->nl_nch, nd->nl_cred, LK_EXCLUSIVE, vpp); | |
984263bc | 1141 | } |
984263bc | 1142 | if (error) { |
fad57d0e MD |
1143 | if (dvpp && *dvpp) { |
1144 | vput(*dvpp); | |
1145 | *dvpp = NULL; | |
1146 | } | |
1147 | if (vpp && *vpp) { | |
1148 | vput(*vpp); | |
1149 | *vpp = NULL; | |
1150 | } | |
984263bc | 1151 | } |
984263bc MD |
1152 | } |
1153 | ||
1154 | /* | |
fad57d0e | 1155 | * Finish up. |
984263bc MD |
1156 | */ |
1157 | out: | |
70aac194 | 1158 | objcache_put(namei_oc, namebuf); |
984263bc MD |
1159 | return (error); |
1160 | } | |
1161 | ||
984263bc MD |
1162 | /* |
1163 | * nfsrv_fhtovp() - convert a fh to a vnode ptr (optionally locked) | |
1164 | * - look up fsid in mount list (if not found ret error) | |
1165 | * - get vp and export rights by calling VFS_FHTOVP() | |
1166 | * - if cred->cr_uid == 0 or MNT_EXPORTANON set it to credanon | |
a11aaa81 | 1167 | * - if not lockflag unlock it with vn_unlock() |
984263bc MD |
1168 | */ |
1169 | int | |
67863d04 MD |
1170 | nfsrv_fhtovp(fhandle_t *fhp, int lockflag, |
1171 | struct mount **mpp, struct vnode **vpp, | |
e851b29e CP |
1172 | struct ucred *cred, struct nfssvc_sock *slp, struct sockaddr *nam, |
1173 | int *rdonlyp, int kerbflag, int pubflag) | |
984263bc | 1174 | { |
40393ded RG |
1175 | struct mount *mp; |
1176 | int i; | |
984263bc MD |
1177 | struct ucred *credanon; |
1178 | int error, exflags; | |
1179 | #ifdef MNT_EXNORESPORT /* XXX needs mountd and /etc/exports help yet */ | |
1180 | struct sockaddr_int *saddr; | |
1181 | #endif | |
1182 | ||
67863d04 MD |
1183 | *vpp = NULL; |
1184 | *mpp = NULL; | |
984263bc MD |
1185 | |
1186 | if (nfs_ispublicfh(fhp)) { | |
1187 | if (!pubflag || !nfs_pub.np_valid) | |
1188 | return (ESTALE); | |
1189 | fhp = &nfs_pub.np_handle; | |
1190 | } | |
1191 | ||
67863d04 MD |
1192 | mp = *mpp = vfs_getvfs(&fhp->fh_fsid); |
1193 | if (mp == NULL) | |
984263bc MD |
1194 | return (ESTALE); |
1195 | error = VFS_CHECKEXP(mp, nam, &exflags, &credanon); | |
1196 | if (error) | |
1197 | return (error); | |
67863d04 | 1198 | error = VFS_FHTOVP(mp, NULL, &fhp->fh_fid, vpp); |
984263bc MD |
1199 | if (error) |
1200 | return (error); | |
1201 | #ifdef MNT_EXNORESPORT | |
1202 | if (!(exflags & (MNT_EXNORESPORT|MNT_EXPUBLIC))) { | |
1203 | saddr = (struct sockaddr_in *)nam; | |
1204 | if (saddr->sin_family == AF_INET && | |
1205 | ntohs(saddr->sin_port) >= IPPORT_RESERVED) { | |
1206 | vput(*vpp); | |
1207 | *vpp = NULL; | |
1208 | return (NFSERR_AUTHERR | AUTH_TOOWEAK); | |
1209 | } | |
1210 | } | |
1211 | #endif | |
1212 | /* | |
1213 | * Check/setup credentials. | |
1214 | */ | |
1215 | if (exflags & MNT_EXKERB) { | |
1216 | if (!kerbflag) { | |
1217 | vput(*vpp); | |
1218 | *vpp = NULL; | |
1219 | return (NFSERR_AUTHERR | AUTH_TOOWEAK); | |
1220 | } | |
1221 | } else if (kerbflag) { | |
1222 | vput(*vpp); | |
1223 | *vpp = NULL; | |
1224 | return (NFSERR_AUTHERR | AUTH_TOOWEAK); | |
1225 | } else if (cred->cr_uid == 0 || (exflags & MNT_EXPORTANON)) { | |
1226 | cred->cr_uid = credanon->cr_uid; | |
1227 | for (i = 0; i < credanon->cr_ngroups && i < NGROUPS; i++) | |
1228 | cred->cr_groups[i] = credanon->cr_groups[i]; | |
1229 | cred->cr_ngroups = i; | |
1230 | } | |
1231 | if (exflags & MNT_EXRDONLY) | |
1232 | *rdonlyp = 1; | |
1233 | else | |
1234 | *rdonlyp = 0; | |
1235 | ||
984263bc | 1236 | if (!lockflag) |
a11aaa81 | 1237 | vn_unlock(*vpp); |
984263bc MD |
1238 | return (0); |
1239 | } | |
1240 | ||
984263bc MD |
1241 | /* |
1242 | * WebNFS: check if a filehandle is a public filehandle. For v3, this | |
1243 | * means a length of 0, for v2 it means all zeroes. nfsm_srvmtofh has | |
1244 | * transformed this to all zeroes in both cases, so check for it. | |
1245 | */ | |
1246 | int | |
e851b29e | 1247 | nfs_ispublicfh(fhandle_t *fhp) |
984263bc MD |
1248 | { |
1249 | char *cp = (char *)fhp; | |
1250 | int i; | |
1251 | ||
1252 | for (i = 0; i < NFSX_V3FH; i++) | |
1253 | if (*cp++ != 0) | |
1254 | return (FALSE); | |
1255 | return (TRUE); | |
1256 | } | |
1257 | ||
1258 | #endif /* NFS_NOSERVER */ | |
1259 | /* | |
1260 | * This function compares two net addresses by family and returns TRUE | |
1261 | * if they are the same host. | |
1262 | * If there is any doubt, return FALSE. | |
1263 | * The AF_INET family is handled as a special case so that address mbufs | |
1264 | * don't need to be saved to store "struct in_addr", which is only 4 bytes. | |
1265 | */ | |
1266 | int | |
e851b29e | 1267 | netaddr_match(int family, union nethostaddr *haddr, struct sockaddr *nam) |
984263bc | 1268 | { |
40393ded | 1269 | struct sockaddr_in *inetaddr; |
984263bc MD |
1270 | |
1271 | switch (family) { | |
1272 | case AF_INET: | |
1273 | inetaddr = (struct sockaddr_in *)nam; | |
1274 | if (inetaddr->sin_family == AF_INET && | |
1275 | inetaddr->sin_addr.s_addr == haddr->had_inetaddr) | |
1276 | return (1); | |
1277 | break; | |
1278 | default: | |
1279 | break; | |
1280 | }; | |
1281 | return (0); | |
1282 | } | |
1283 | ||
1284 | static nfsuint64 nfs_nullcookie = { { 0, 0 } }; | |
1285 | /* | |
1286 | * This function finds the directory cookie that corresponds to the | |
1287 | * logical byte offset given. | |
1288 | */ | |
1289 | nfsuint64 * | |
e851b29e | 1290 | nfs_getcookie(struct nfsnode *np, off_t off, int add) |
984263bc | 1291 | { |
40393ded RG |
1292 | struct nfsdmap *dp, *dp2; |
1293 | int pos; | |
984263bc MD |
1294 | |
1295 | pos = (uoff_t)off / NFS_DIRBLKSIZ; | |
1296 | if (pos == 0 || off < 0) { | |
1297 | #ifdef DIAGNOSTIC | |
1298 | if (add) | |
1299 | panic("nfs getcookie add at <= 0"); | |
1300 | #endif | |
1301 | return (&nfs_nullcookie); | |
1302 | } | |
1303 | pos--; | |
1304 | dp = np->n_cookies.lh_first; | |
1305 | if (!dp) { | |
1306 | if (add) { | |
1307 | MALLOC(dp, struct nfsdmap *, sizeof (struct nfsdmap), | |
1308 | M_NFSDIROFF, M_WAITOK); | |
1309 | dp->ndm_eocookie = 0; | |
1310 | LIST_INSERT_HEAD(&np->n_cookies, dp, ndm_list); | |
1311 | } else | |
60233e58 | 1312 | return (NULL); |
984263bc MD |
1313 | } |
1314 | while (pos >= NFSNUMCOOKIES) { | |
1315 | pos -= NFSNUMCOOKIES; | |
1316 | if (dp->ndm_list.le_next) { | |
1317 | if (!add && dp->ndm_eocookie < NFSNUMCOOKIES && | |
1318 | pos >= dp->ndm_eocookie) | |
60233e58 | 1319 | return (NULL); |
984263bc MD |
1320 | dp = dp->ndm_list.le_next; |
1321 | } else if (add) { | |
1322 | MALLOC(dp2, struct nfsdmap *, sizeof (struct nfsdmap), | |
1323 | M_NFSDIROFF, M_WAITOK); | |
1324 | dp2->ndm_eocookie = 0; | |
1325 | LIST_INSERT_AFTER(dp, dp2, ndm_list); | |
1326 | dp = dp2; | |
1327 | } else | |
60233e58 | 1328 | return (NULL); |
984263bc MD |
1329 | } |
1330 | if (pos >= dp->ndm_eocookie) { | |
1331 | if (add) | |
1332 | dp->ndm_eocookie = pos + 1; | |
1333 | else | |
60233e58 | 1334 | return (NULL); |
984263bc MD |
1335 | } |
1336 | return (&dp->ndm_cookies[pos]); | |
1337 | } | |
1338 | ||
1339 | /* | |
1340 | * Invalidate cached directory information, except for the actual directory | |
1341 | * blocks (which are invalidated separately). | |
1342 | * Done mainly to avoid the use of stale offset cookies. | |
1343 | */ | |
1344 | void | |
e851b29e | 1345 | nfs_invaldir(struct vnode *vp) |
984263bc | 1346 | { |
40393ded | 1347 | struct nfsnode *np = VTONFS(vp); |
984263bc MD |
1348 | |
1349 | #ifdef DIAGNOSTIC | |
1350 | if (vp->v_type != VDIR) | |
1351 | panic("nfs: invaldir not dir"); | |
1352 | #endif | |
1353 | np->n_direofoffset = 0; | |
1354 | np->n_cookieverf.nfsuquad[0] = 0; | |
1355 | np->n_cookieverf.nfsuquad[1] = 0; | |
1356 | if (np->n_cookies.lh_first) | |
1357 | np->n_cookies.lh_first->ndm_eocookie = 0; | |
1358 | } | |
1359 | ||
1c843a13 MD |
1360 | /* |
1361 | * Set the v_type field for an NFS client's vnode and initialize for | |
1362 | * buffer cache operations if necessary. | |
1363 | */ | |
1364 | void | |
1365 | nfs_setvtype(struct vnode *vp, enum vtype vtyp) | |
1366 | { | |
1367 | vp->v_type = vtyp; | |
1368 | ||
1369 | switch(vtyp) { | |
1370 | case VREG: | |
1371 | case VDIR: | |
1372 | case VLNK: | |
1373 | vinitvmio(vp, 0); /* needs VMIO, size not yet known */ | |
1374 | break; | |
1375 | default: | |
1376 | break; | |
1377 | } | |
1378 | } | |
1379 | ||
984263bc MD |
1380 | /* |
1381 | * The write verifier has changed (probably due to a server reboot), so all | |
1382 | * B_NEEDCOMMIT blocks will have to be written again. Since they are on the | |
1383 | * dirty block list as B_DELWRI, all this takes is clearing the B_NEEDCOMMIT | |
1384 | * and B_CLUSTEROK flags. Once done the new write verifier can be set for the | |
1385 | * mount point. | |
1386 | * | |
1387 | * B_CLUSTEROK must be cleared along with B_NEEDCOMMIT because stage 1 data | |
1388 | * writes are not clusterable. | |
1389 | */ | |
6bae6177 MD |
1390 | |
1391 | static int nfs_clearcommit_bp(struct buf *bp, void *data __unused); | |
0202303b MD |
1392 | static int nfs_clearcommit_callback(struct mount *mp, struct vnode *vp, |
1393 | void *data __unused); | |
6bae6177 | 1394 | |
984263bc | 1395 | void |
e851b29e | 1396 | nfs_clearcommit(struct mount *mp) |
984263bc | 1397 | { |
0202303b MD |
1398 | vmntvnodescan(mp, VMSC_NOWAIT, nfs_clearcommit_callback, NULL, NULL); |
1399 | } | |
1400 | ||
1401 | static int | |
1402 | nfs_clearcommit_callback(struct mount *mp, struct vnode *vp, | |
1403 | void *data __unused) | |
1404 | { | |
1405 | lwkt_tokref vlock; | |
1406 | ||
1407 | vhold(vp); | |
1408 | lwkt_gettoken(&vlock, &vp->v_token); | |
1409 | RB_SCAN(buf_rb_tree, &vp->v_rbdirty_tree, NULL, | |
1410 | nfs_clearcommit_bp, NULL); | |
1411 | lwkt_reltoken(&vlock); | |
1412 | vdrop(vp); | |
1413 | return(0); | |
984263bc MD |
1414 | } |
1415 | ||
6bae6177 MD |
1416 | static int |
1417 | nfs_clearcommit_bp(struct buf *bp, void *data __unused) | |
1418 | { | |
1419 | if (BUF_REFCNT(bp) == 0 && | |
1420 | (bp->b_flags & (B_DELWRI | B_NEEDCOMMIT)) | |
1421 | == (B_DELWRI | B_NEEDCOMMIT)) { | |
1422 | bp->b_flags &= ~(B_NEEDCOMMIT | B_CLUSTEROK); | |
1423 | } | |
1424 | return(0); | |
1425 | } | |
1426 | ||
984263bc MD |
1427 | #ifndef NFS_NOSERVER |
1428 | /* | |
1429 | * Map errnos to NFS error numbers. For Version 3 also filter out error | |
1430 | * numbers not specified for the associated procedure. | |
1431 | */ | |
1432 | int | |
e851b29e | 1433 | nfsrv_errmap(struct nfsrv_descript *nd, int err) |
984263bc | 1434 | { |
40393ded | 1435 | short *defaulterrp, *errp; |
984263bc MD |
1436 | |
1437 | if (nd->nd_flag & ND_NFSV3) { | |
1438 | if (nd->nd_procnum <= NFSPROC_COMMIT) { | |
1439 | errp = defaulterrp = nfsrv_v3errmap[nd->nd_procnum]; | |
1440 | while (*++errp) { | |
1441 | if (*errp == err) | |
1442 | return (err); | |
1443 | else if (*errp > err) | |
1444 | break; | |
1445 | } | |
1446 | return ((int)*defaulterrp); | |
1447 | } else | |
1448 | return (err & 0xffff); | |
1449 | } | |
1450 | if (err <= ELAST) | |
1451 | return ((int)nfsrv_v2errmap[err - 1]); | |
1452 | return (NFSERR_IO); | |
1453 | } | |
1454 | ||
984263bc MD |
1455 | /* |
1456 | * Sort the group list in increasing numerical order. | |
1457 | * (Insertion sort by Chris Torek, who was grossed out by the bubble sort | |
1458 | * that used to be here.) | |
1459 | */ | |
1460 | void | |
e851b29e | 1461 | nfsrvw_sort(gid_t *list, int num) |
984263bc | 1462 | { |
40393ded | 1463 | int i, j; |
984263bc MD |
1464 | gid_t v; |
1465 | ||
1466 | /* Insertion sort. */ | |
1467 | for (i = 1; i < num; i++) { | |
1468 | v = list[i]; | |
1469 | /* find correct slot for value v, moving others up */ | |
1470 | for (j = i; --j >= 0 && v < list[j];) | |
1471 | list[j + 1] = list[j]; | |
1472 | list[j + 1] = v; | |
1473 | } | |
1474 | } | |
1475 | ||
1476 | /* | |
1477 | * copy credentials making sure that the result can be compared with bcmp(). | |
1478 | */ | |
1479 | void | |
e851b29e | 1480 | nfsrv_setcred(struct ucred *incred, struct ucred *outcred) |
984263bc | 1481 | { |
40393ded | 1482 | int i; |
984263bc MD |
1483 | |
1484 | bzero((caddr_t)outcred, sizeof (struct ucred)); | |
1485 | outcred->cr_ref = 1; | |
1486 | outcred->cr_uid = incred->cr_uid; | |
1487 | outcred->cr_ngroups = incred->cr_ngroups; | |
1488 | for (i = 0; i < incred->cr_ngroups; i++) | |
1489 | outcred->cr_groups[i] = incred->cr_groups[i]; | |
1490 | nfsrvw_sort(outcred->cr_groups, outcred->cr_ngroups); | |
1491 | } | |
1492 | #endif /* NFS_NOSERVER */ |