2009-05-04 15:23:58 +00:00
|
|
|
/*-
|
|
|
|
* Copyright (c) 1989, 1993
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* This code is derived from software contributed to Berkeley by
|
|
|
|
* Rick Macklem at The University of Guelph.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
|
2012-01-08 01:54:46 +00:00
|
|
|
#include "opt_inet6.h"
|
2011-06-18 23:02:53 +00:00
|
|
|
#include "opt_kdtrace.h"
|
|
|
|
|
2011-08-11 12:30:23 +00:00
|
|
|
#include <sys/capability.h>
|
|
|
|
|
2009-05-04 15:23:58 +00:00
|
|
|
/*
|
|
|
|
* generally, I don't like #includes inside .h files, but it seems to
|
|
|
|
* be the easiest way to handle the port.
|
|
|
|
*/
|
2011-04-13 22:16:52 +00:00
|
|
|
#include <sys/hash.h>
|
2009-05-04 15:23:58 +00:00
|
|
|
#include <fs/nfs/nfsport.h>
|
|
|
|
#include <netinet/if_ether.h>
|
|
|
|
#include <net/if_types.h>
|
|
|
|
|
2011-06-18 23:02:53 +00:00
|
|
|
#include <fs/nfsclient/nfs_kdtrace.h>
|
|
|
|
|
|
|
|
#ifdef KDTRACE_HOOKS
|
|
|
|
dtrace_nfsclient_attrcache_flush_probe_func_t
|
|
|
|
dtrace_nfscl_attrcache_flush_done_probe;
|
|
|
|
uint32_t nfscl_attrcache_flush_done_id;
|
|
|
|
|
|
|
|
dtrace_nfsclient_attrcache_get_hit_probe_func_t
|
|
|
|
dtrace_nfscl_attrcache_get_hit_probe;
|
|
|
|
uint32_t nfscl_attrcache_get_hit_id;
|
|
|
|
|
|
|
|
dtrace_nfsclient_attrcache_get_miss_probe_func_t
|
|
|
|
dtrace_nfscl_attrcache_get_miss_probe;
|
|
|
|
uint32_t nfscl_attrcache_get_miss_id;
|
|
|
|
|
|
|
|
dtrace_nfsclient_attrcache_load_probe_func_t
|
|
|
|
dtrace_nfscl_attrcache_load_done_probe;
|
|
|
|
uint32_t nfscl_attrcache_load_done_id;
|
|
|
|
#endif /* !KDTRACE_HOOKS */
|
|
|
|
|
2009-05-04 15:23:58 +00:00
|
|
|
extern u_int32_t newnfs_true, newnfs_false, newnfs_xdrneg1;
|
|
|
|
extern struct vop_vector newnfs_vnodeops;
|
|
|
|
extern struct vop_vector newnfs_fifoops;
|
|
|
|
extern uma_zone_t newnfsnode_zone;
|
|
|
|
extern struct buf_ops buf_ops_newnfs;
|
|
|
|
extern int ncl_pbuf_freecnt;
|
|
|
|
extern short nfsv4_cbport;
|
|
|
|
extern int nfscl_enablecallb;
|
|
|
|
extern int nfs_numnfscbd;
|
|
|
|
extern int nfscl_inited;
|
|
|
|
struct mtx nfs_clstate_mutex;
|
|
|
|
struct mtx ncl_iod_mutex;
|
|
|
|
NFSDLOCKMUTEX;
|
|
|
|
|
|
|
|
extern void (*ncl_call_invalcaches)(struct vnode *);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Comparison function for vfs_hash functions.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
newnfs_vncmpf(struct vnode *vp, void *arg)
|
|
|
|
{
|
|
|
|
struct nfsfh *nfhp = (struct nfsfh *)arg;
|
|
|
|
struct nfsnode *np = VTONFS(vp);
|
|
|
|
|
|
|
|
if (np->n_fhp->nfh_len != nfhp->nfh_len ||
|
|
|
|
NFSBCMP(np->n_fhp->nfh_fh, nfhp->nfh_fh, nfhp->nfh_len))
|
|
|
|
return (1);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Look up a vnode/nfsnode by file handle.
|
|
|
|
* Callers must check for mount points!!
|
|
|
|
* In all cases, a pointer to a
|
|
|
|
* nfsnode structure is returned.
|
|
|
|
* This variant takes a "struct nfsfh *" as second argument and uses
|
|
|
|
* that structure up, either by hanging off the nfsnode or FREEing it.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
nfscl_nget(struct mount *mntp, struct vnode *dvp, struct nfsfh *nfhp,
|
|
|
|
struct componentname *cnp, struct thread *td, struct nfsnode **npp,
|
2011-04-16 23:20:21 +00:00
|
|
|
void *stuff, int lkflags)
|
2009-05-04 15:23:58 +00:00
|
|
|
{
|
|
|
|
struct nfsnode *np, *dnp;
|
|
|
|
struct vnode *vp, *nvp;
|
|
|
|
struct nfsv4node *newd, *oldd;
|
|
|
|
int error;
|
|
|
|
u_int hash;
|
|
|
|
struct nfsmount *nmp;
|
|
|
|
|
|
|
|
nmp = VFSTONFS(mntp);
|
|
|
|
dnp = VTONFS(dvp);
|
|
|
|
*npp = NULL;
|
|
|
|
|
|
|
|
hash = fnv_32_buf(nfhp->nfh_fh, nfhp->nfh_len, FNV1_32_INIT);
|
|
|
|
|
2011-04-16 23:20:21 +00:00
|
|
|
error = vfs_hash_get(mntp, hash, lkflags,
|
2009-05-04 15:23:58 +00:00
|
|
|
td, &nvp, newnfs_vncmpf, nfhp);
|
|
|
|
if (error == 0 && nvp != NULL) {
|
|
|
|
/*
|
|
|
|
* I believe there is a slight chance that vgonel() could
|
2011-07-16 08:05:31 +00:00
|
|
|
* get called on this vnode between when NFSVOPLOCK() drops
|
2009-05-04 15:23:58 +00:00
|
|
|
* the VI_LOCK() and vget() acquires it again, so that it
|
|
|
|
* hasn't yet had v_usecount incremented. If this were to
|
|
|
|
* happen, the VI_DOOMED flag would be set, so check for
|
|
|
|
* that here. Since we now have the v_usecount incremented,
|
|
|
|
* we should be ok until we vrele() it, if the VI_DOOMED
|
|
|
|
* flag isn't set now.
|
|
|
|
*/
|
|
|
|
VI_LOCK(nvp);
|
|
|
|
if ((nvp->v_iflag & VI_DOOMED)) {
|
|
|
|
VI_UNLOCK(nvp);
|
|
|
|
vrele(nvp);
|
|
|
|
error = ENOENT;
|
|
|
|
} else {
|
|
|
|
VI_UNLOCK(nvp);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (error) {
|
|
|
|
FREE((caddr_t)nfhp, M_NFSFH);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
if (nvp != NULL) {
|
|
|
|
np = VTONFS(nvp);
|
|
|
|
/*
|
|
|
|
* For NFSv4, check to see if it is the same name and
|
|
|
|
* replace the name, if it is different.
|
|
|
|
*/
|
|
|
|
oldd = newd = NULL;
|
|
|
|
if ((nmp->nm_flag & NFSMNT_NFSV4) && np->n_v4 != NULL &&
|
|
|
|
nvp->v_type == VREG &&
|
|
|
|
(np->n_v4->n4_namelen != cnp->cn_namelen ||
|
|
|
|
NFSBCMP(cnp->cn_nameptr, NFS4NODENAME(np->n_v4),
|
|
|
|
cnp->cn_namelen) ||
|
|
|
|
dnp->n_fhp->nfh_len != np->n_v4->n4_fhlen ||
|
|
|
|
NFSBCMP(dnp->n_fhp->nfh_fh, np->n_v4->n4_data,
|
|
|
|
dnp->n_fhp->nfh_len))) {
|
|
|
|
MALLOC(newd, struct nfsv4node *,
|
|
|
|
sizeof (struct nfsv4node) + dnp->n_fhp->nfh_len +
|
|
|
|
+ cnp->cn_namelen - 1, M_NFSV4NODE, M_WAITOK);
|
|
|
|
NFSLOCKNODE(np);
|
|
|
|
if (newd != NULL && np->n_v4 != NULL && nvp->v_type == VREG
|
|
|
|
&& (np->n_v4->n4_namelen != cnp->cn_namelen ||
|
|
|
|
NFSBCMP(cnp->cn_nameptr, NFS4NODENAME(np->n_v4),
|
|
|
|
cnp->cn_namelen) ||
|
|
|
|
dnp->n_fhp->nfh_len != np->n_v4->n4_fhlen ||
|
|
|
|
NFSBCMP(dnp->n_fhp->nfh_fh, np->n_v4->n4_data,
|
|
|
|
dnp->n_fhp->nfh_len))) {
|
|
|
|
oldd = np->n_v4;
|
|
|
|
np->n_v4 = newd;
|
|
|
|
newd = NULL;
|
|
|
|
np->n_v4->n4_fhlen = dnp->n_fhp->nfh_len;
|
|
|
|
np->n_v4->n4_namelen = cnp->cn_namelen;
|
|
|
|
NFSBCOPY(dnp->n_fhp->nfh_fh, np->n_v4->n4_data,
|
|
|
|
dnp->n_fhp->nfh_len);
|
|
|
|
NFSBCOPY(cnp->cn_nameptr, NFS4NODENAME(np->n_v4),
|
|
|
|
cnp->cn_namelen);
|
|
|
|
}
|
|
|
|
NFSUNLOCKNODE(np);
|
|
|
|
}
|
|
|
|
if (newd != NULL)
|
|
|
|
FREE((caddr_t)newd, M_NFSV4NODE);
|
|
|
|
if (oldd != NULL)
|
|
|
|
FREE((caddr_t)oldd, M_NFSV4NODE);
|
|
|
|
*npp = np;
|
|
|
|
FREE((caddr_t)nfhp, M_NFSFH);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
np = uma_zalloc(newnfsnode_zone, M_WAITOK | M_ZERO);
|
|
|
|
|
|
|
|
error = getnewvnode("newnfs", mntp, &newnfs_vnodeops, &nvp);
|
|
|
|
if (error) {
|
|
|
|
uma_zfree(newnfsnode_zone, np);
|
|
|
|
FREE((caddr_t)nfhp, M_NFSFH);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
vp = nvp;
|
2012-01-27 02:46:12 +00:00
|
|
|
KASSERT(vp->v_bufobj.bo_bsize != 0, ("nfscl_nget: bo_bsize == 0"));
|
2009-05-04 15:23:58 +00:00
|
|
|
vp->v_bufobj.bo_ops = &buf_ops_newnfs;
|
|
|
|
vp->v_data = np;
|
|
|
|
np->n_vnode = vp;
|
|
|
|
/*
|
|
|
|
* Initialize the mutex even if the vnode is going to be a loser.
|
|
|
|
* This simplifies the logic in reclaim, which can then unconditionally
|
|
|
|
* destroy the mutex (in the case of the loser, or if hash_insert
|
|
|
|
* happened to return an error no special casing is needed).
|
|
|
|
*/
|
|
|
|
mtx_init(&np->n_mtx, "NEWNFSnode lock", NULL, MTX_DEF | MTX_DUPOK);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Are we getting the root? If so, make sure the vnode flags
|
|
|
|
* are correct
|
|
|
|
*/
|
|
|
|
if ((nfhp->nfh_len == nmp->nm_fhsize) &&
|
|
|
|
!bcmp(nfhp->nfh_fh, nmp->nm_fh, nfhp->nfh_len)) {
|
|
|
|
if (vp->v_type == VNON)
|
|
|
|
vp->v_type = VDIR;
|
|
|
|
vp->v_vflag |= VV_ROOT;
|
|
|
|
}
|
|
|
|
|
|
|
|
np->n_fhp = nfhp;
|
|
|
|
/*
|
|
|
|
* For NFSv4, we have to attach the directory file handle and
|
|
|
|
* file name, so that Open Ops can be done later.
|
|
|
|
*/
|
|
|
|
if (nmp->nm_flag & NFSMNT_NFSV4) {
|
|
|
|
MALLOC(np->n_v4, struct nfsv4node *, sizeof (struct nfsv4node)
|
|
|
|
+ dnp->n_fhp->nfh_len + cnp->cn_namelen - 1, M_NFSV4NODE,
|
|
|
|
M_WAITOK);
|
|
|
|
np->n_v4->n4_fhlen = dnp->n_fhp->nfh_len;
|
|
|
|
np->n_v4->n4_namelen = cnp->cn_namelen;
|
|
|
|
NFSBCOPY(dnp->n_fhp->nfh_fh, np->n_v4->n4_data,
|
|
|
|
dnp->n_fhp->nfh_len);
|
|
|
|
NFSBCOPY(cnp->cn_nameptr, NFS4NODENAME(np->n_v4),
|
|
|
|
cnp->cn_namelen);
|
|
|
|
} else {
|
|
|
|
np->n_v4 = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* NFS supports recursive and shared locking.
|
|
|
|
*/
|
2010-08-20 19:46:50 +00:00
|
|
|
lockmgr(vp->v_vnlock, LK_EXCLUSIVE | LK_NOWITNESS, NULL);
|
2009-05-04 15:23:58 +00:00
|
|
|
VN_LOCK_AREC(vp);
|
|
|
|
VN_LOCK_ASHARE(vp);
|
|
|
|
error = insmntque(vp, mntp);
|
|
|
|
if (error != 0) {
|
|
|
|
*npp = NULL;
|
|
|
|
mtx_destroy(&np->n_mtx);
|
|
|
|
FREE((caddr_t)nfhp, M_NFSFH);
|
|
|
|
if (np->n_v4 != NULL)
|
|
|
|
FREE((caddr_t)np->n_v4, M_NFSV4NODE);
|
|
|
|
uma_zfree(newnfsnode_zone, np);
|
|
|
|
return (error);
|
|
|
|
}
|
2011-04-16 23:20:21 +00:00
|
|
|
error = vfs_hash_insert(vp, hash, lkflags,
|
2009-05-04 15:23:58 +00:00
|
|
|
td, &nvp, newnfs_vncmpf, nfhp);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
if (nvp != NULL) {
|
|
|
|
*npp = VTONFS(nvp);
|
|
|
|
/* vfs_hash_insert() vput()'s the losing vnode */
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
*npp = np;
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Anothe variant of nfs_nget(). This one is only used by reopen. It
|
|
|
|
* takes almost the same args as nfs_nget(), but only succeeds if an entry
|
|
|
|
* exists in the cache. (Since files should already be "open" with a
|
|
|
|
* vnode ref cnt on the node when reopen calls this, it should always
|
|
|
|
* succeed.)
|
|
|
|
* Also, don't get a vnode lock, since it may already be locked by some
|
|
|
|
* other process that is handling it. This is ok, since all other threads
|
|
|
|
* on the client are blocked by the nfsc_lock being exclusively held by the
|
|
|
|
* caller of this function.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
nfscl_ngetreopen(struct mount *mntp, u_int8_t *fhp, int fhsize,
|
|
|
|
struct thread *td, struct nfsnode **npp)
|
|
|
|
{
|
|
|
|
struct vnode *nvp;
|
|
|
|
u_int hash;
|
|
|
|
struct nfsfh *nfhp;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
*npp = NULL;
|
|
|
|
/* For forced dismounts, just return error. */
|
|
|
|
if ((mntp->mnt_kern_flag & MNTK_UNMOUNTF))
|
|
|
|
return (EINTR);
|
|
|
|
MALLOC(nfhp, struct nfsfh *, sizeof (struct nfsfh) + fhsize,
|
|
|
|
M_NFSFH, M_WAITOK);
|
|
|
|
bcopy(fhp, &nfhp->nfh_fh[0], fhsize);
|
|
|
|
nfhp->nfh_len = fhsize;
|
|
|
|
|
|
|
|
hash = fnv_32_buf(fhp, fhsize, FNV1_32_INIT);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* First, try to get the vnode locked, but don't block for the lock.
|
|
|
|
*/
|
|
|
|
error = vfs_hash_get(mntp, hash, (LK_EXCLUSIVE | LK_NOWAIT), td, &nvp,
|
|
|
|
newnfs_vncmpf, nfhp);
|
|
|
|
if (error == 0 && nvp != NULL) {
|
2011-07-16 08:05:36 +00:00
|
|
|
NFSVOPUNLOCK(nvp, 0);
|
2009-05-04 15:23:58 +00:00
|
|
|
} else if (error == EBUSY) {
|
|
|
|
/*
|
|
|
|
* The LK_EXCLOTHER lock type tells nfs_lock1() to not try
|
|
|
|
* and lock the vnode, but just get a v_usecount on it.
|
|
|
|
* LK_NOWAIT is set so that when vget() returns ENOENT,
|
|
|
|
* vfs_hash_get() fails instead of looping.
|
|
|
|
* If this succeeds, it is safe so long as a vflush() with
|
|
|
|
* FORCECLOSE has not been done. Since the Renew thread is
|
|
|
|
* stopped and the MNTK_UNMOUNTF flag is set before doing
|
|
|
|
* a vflush() with FORCECLOSE, we should be ok here.
|
|
|
|
*/
|
|
|
|
if ((mntp->mnt_kern_flag & MNTK_UNMOUNTF))
|
|
|
|
error = EINTR;
|
|
|
|
else
|
|
|
|
error = vfs_hash_get(mntp, hash,
|
|
|
|
(LK_EXCLOTHER | LK_NOWAIT), td, &nvp,
|
|
|
|
newnfs_vncmpf, nfhp);
|
|
|
|
}
|
|
|
|
FREE(nfhp, M_NFSFH);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
if (nvp != NULL) {
|
|
|
|
*npp = VTONFS(nvp);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
return (EINVAL);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Load the attribute cache (that lives in the nfsnode entry) with
|
|
|
|
* the attributes of the second argument and
|
|
|
|
* Iff vaper not NULL
|
|
|
|
* copy the attributes to *vaper
|
|
|
|
* Similar to nfs_loadattrcache(), except the attributes are passed in
|
|
|
|
* instead of being parsed out of the mbuf list.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
nfscl_loadattrcache(struct vnode **vpp, struct nfsvattr *nap, void *nvaper,
|
|
|
|
void *stuff, int writeattr, int dontshrink)
|
|
|
|
{
|
|
|
|
struct vnode *vp = *vpp;
|
|
|
|
struct vattr *vap, *nvap = &nap->na_vattr, *vaper = nvaper;
|
|
|
|
struct nfsnode *np;
|
|
|
|
struct nfsmount *nmp;
|
|
|
|
struct timespec mtime_save;
|
2013-03-21 07:25:08 +00:00
|
|
|
u_quad_t nsize;
|
|
|
|
int setnsize;
|
2009-05-04 15:23:58 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If v_type == VNON it is a new node, so fill in the v_type,
|
|
|
|
* n_mtime fields. Check to see if it represents a special
|
|
|
|
* device, and if so, check for a possible alias. Once the
|
|
|
|
* correct vnode has been obtained, fill in the rest of the
|
|
|
|
* information.
|
|
|
|
*/
|
|
|
|
np = VTONFS(vp);
|
|
|
|
NFSLOCKNODE(np);
|
|
|
|
if (vp->v_type != nvap->va_type) {
|
|
|
|
vp->v_type = nvap->va_type;
|
|
|
|
if (vp->v_type == VFIFO)
|
|
|
|
vp->v_op = &newnfs_fifoops;
|
|
|
|
np->n_mtime = nvap->va_mtime;
|
|
|
|
}
|
|
|
|
nmp = VFSTONFS(vp->v_mount);
|
|
|
|
vap = &np->n_vattr.na_vattr;
|
|
|
|
mtime_save = vap->va_mtime;
|
|
|
|
if (writeattr) {
|
|
|
|
np->n_vattr.na_filerev = nap->na_filerev;
|
|
|
|
np->n_vattr.na_size = nap->na_size;
|
|
|
|
np->n_vattr.na_mtime = nap->na_mtime;
|
|
|
|
np->n_vattr.na_ctime = nap->na_ctime;
|
|
|
|
np->n_vattr.na_fsid = nap->na_fsid;
|
2011-06-28 22:52:38 +00:00
|
|
|
np->n_vattr.na_mode = nap->na_mode;
|
2009-05-04 15:23:58 +00:00
|
|
|
} else {
|
|
|
|
NFSBCOPY((caddr_t)nap, (caddr_t)&np->n_vattr,
|
|
|
|
sizeof (struct nfsvattr));
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* For NFSv4, if the node's fsid is not equal to the mount point's
|
|
|
|
* fsid, return the low order 32bits of the node's fsid. This
|
|
|
|
* allows getcwd(3) to work. There is a chance that the fsid might
|
|
|
|
* be the same as a local fs, but since this is in an NFS mount
|
|
|
|
* point, I don't think that will cause any problems?
|
|
|
|
*/
|
2011-04-13 22:16:52 +00:00
|
|
|
if (NFSHASNFSV4(nmp) && NFSHASHASSETFSID(nmp) &&
|
2009-05-04 15:23:58 +00:00
|
|
|
(nmp->nm_fsid[0] != np->n_vattr.na_filesid[0] ||
|
2011-04-13 22:16:52 +00:00
|
|
|
nmp->nm_fsid[1] != np->n_vattr.na_filesid[1])) {
|
|
|
|
/*
|
|
|
|
* va_fsid needs to be set to some value derived from
|
|
|
|
* np->n_vattr.na_filesid that is not equal
|
|
|
|
* vp->v_mount->mnt_stat.f_fsid[0], so that it changes
|
|
|
|
* from the value used for the top level server volume
|
|
|
|
* in the mounted subtree.
|
|
|
|
*/
|
|
|
|
if (vp->v_mount->mnt_stat.f_fsid.val[0] !=
|
|
|
|
(uint32_t)np->n_vattr.na_filesid[0])
|
|
|
|
vap->va_fsid = (uint32_t)np->n_vattr.na_filesid[0];
|
|
|
|
else
|
|
|
|
vap->va_fsid = (uint32_t)hash32_buf(
|
|
|
|
np->n_vattr.na_filesid, 2 * sizeof(uint64_t), 0);
|
|
|
|
} else
|
2009-05-04 15:23:58 +00:00
|
|
|
vap->va_fsid = vp->v_mount->mnt_stat.f_fsid.val[0];
|
|
|
|
np->n_attrstamp = time_second;
|
2013-03-21 07:25:08 +00:00
|
|
|
setnsize = 0;
|
2013-03-21 12:59:24 +00:00
|
|
|
nsize = 0;
|
2009-05-04 15:23:58 +00:00
|
|
|
if (vap->va_size != np->n_size) {
|
|
|
|
if (vap->va_type == VREG) {
|
|
|
|
if (dontshrink && vap->va_size < np->n_size) {
|
|
|
|
/*
|
|
|
|
* We've been told not to shrink the file;
|
|
|
|
* zero np->n_attrstamp to indicate that
|
|
|
|
* the attributes are stale.
|
|
|
|
*/
|
|
|
|
vap->va_size = np->n_size;
|
|
|
|
np->n_attrstamp = 0;
|
2011-06-18 23:02:53 +00:00
|
|
|
KDTRACE_NFS_ATTRCACHE_FLUSH_DONE(vp);
|
2009-05-04 15:23:58 +00:00
|
|
|
} else if (np->n_flag & NMODIFIED) {
|
|
|
|
/*
|
|
|
|
* We've modified the file: Use the larger
|
|
|
|
* of our size, and the server's size.
|
|
|
|
*/
|
|
|
|
if (vap->va_size < np->n_size) {
|
|
|
|
vap->va_size = np->n_size;
|
|
|
|
} else {
|
|
|
|
np->n_size = vap->va_size;
|
|
|
|
np->n_flag |= NSIZECHANGED;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
np->n_size = vap->va_size;
|
|
|
|
np->n_flag |= NSIZECHANGED;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
np->n_size = vap->va_size;
|
|
|
|
}
|
2013-03-21 07:25:08 +00:00
|
|
|
if (vap->va_type == VREG || vap->va_type == VDIR) {
|
|
|
|
setnsize = 1;
|
|
|
|
nsize = vap->va_size;
|
|
|
|
}
|
2009-05-04 15:23:58 +00:00
|
|
|
}
|
|
|
|
/*
|
|
|
|
* The following checks are added to prevent a race between (say)
|
|
|
|
* a READDIR+ and a WRITE.
|
|
|
|
* READDIR+, WRITE requests sent out.
|
|
|
|
* READDIR+ resp, WRITE resp received on client.
|
|
|
|
* However, the WRITE resp was handled before the READDIR+ resp
|
|
|
|
* causing the post op attrs from the write to be loaded first
|
|
|
|
* and the attrs from the READDIR+ to be loaded later. If this
|
|
|
|
* happens, we have stale attrs loaded into the attrcache.
|
|
|
|
* We detect this by for the mtime moving back. We invalidate the
|
|
|
|
* attrcache when this happens.
|
|
|
|
*/
|
2011-06-18 23:02:53 +00:00
|
|
|
if (timespeccmp(&mtime_save, &vap->va_mtime, >)) {
|
2009-05-04 15:23:58 +00:00
|
|
|
/* Size changed or mtime went backwards */
|
|
|
|
np->n_attrstamp = 0;
|
2011-06-18 23:02:53 +00:00
|
|
|
KDTRACE_NFS_ATTRCACHE_FLUSH_DONE(vp);
|
|
|
|
}
|
2009-05-04 15:23:58 +00:00
|
|
|
if (vaper != NULL) {
|
|
|
|
NFSBCOPY((caddr_t)vap, (caddr_t)vaper, sizeof(*vap));
|
|
|
|
if (np->n_flag & NCHG) {
|
|
|
|
if (np->n_flag & NACC)
|
|
|
|
vaper->va_atime = np->n_atim;
|
|
|
|
if (np->n_flag & NUPD)
|
|
|
|
vaper->va_mtime = np->n_mtim;
|
|
|
|
}
|
|
|
|
}
|
2011-06-18 23:02:53 +00:00
|
|
|
#ifdef KDTRACE_HOOKS
|
|
|
|
if (np->n_attrstamp != 0)
|
|
|
|
KDTRACE_NFS_ATTRCACHE_LOAD_DONE(vp, vap, 0);
|
|
|
|
#endif
|
2009-05-04 15:23:58 +00:00
|
|
|
NFSUNLOCKNODE(np);
|
2013-03-21 07:25:08 +00:00
|
|
|
if (setnsize)
|
|
|
|
vnode_pager_setsize(vp, nsize);
|
2009-05-04 15:23:58 +00:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Fill in the client id name. For these bytes:
|
|
|
|
* 1 - they must be unique
|
|
|
|
* 2 - they should be persistent across client reboots
|
|
|
|
* 1 is more critical than 2
|
|
|
|
* Use the mount point's unique id plus either the uuid or, if that
|
|
|
|
* isn't set, random junk.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
nfscl_fillclid(u_int64_t clval, char *uuid, u_int8_t *cp, u_int16_t idlen)
|
|
|
|
{
|
|
|
|
int uuidlen;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* First, put in the 64bit mount point identifier.
|
|
|
|
*/
|
|
|
|
if (idlen >= sizeof (u_int64_t)) {
|
|
|
|
NFSBCOPY((caddr_t)&clval, cp, sizeof (u_int64_t));
|
|
|
|
cp += sizeof (u_int64_t);
|
|
|
|
idlen -= sizeof (u_int64_t);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If uuid is non-zero length, use it.
|
|
|
|
*/
|
|
|
|
uuidlen = strlen(uuid);
|
|
|
|
if (uuidlen > 0 && idlen >= uuidlen) {
|
|
|
|
NFSBCOPY(uuid, cp, uuidlen);
|
|
|
|
cp += uuidlen;
|
|
|
|
idlen -= uuidlen;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This only normally happens if the uuid isn't set.
|
|
|
|
*/
|
|
|
|
while (idlen > 0) {
|
|
|
|
*cp++ = (u_int8_t)(arc4random() % 256);
|
|
|
|
idlen--;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Fill in a lock owner name. For now, pid + the process's creation time.
|
|
|
|
*/
|
|
|
|
void
|
2011-06-05 18:17:37 +00:00
|
|
|
nfscl_filllockowner(void *id, u_int8_t *cp, int flags)
|
2009-05-04 15:23:58 +00:00
|
|
|
{
|
|
|
|
union {
|
|
|
|
u_int32_t lval;
|
|
|
|
u_int8_t cval[4];
|
|
|
|
} tl;
|
|
|
|
struct proc *p;
|
|
|
|
|
2011-06-05 18:17:37 +00:00
|
|
|
if (id == NULL) {
|
|
|
|
printf("NULL id\n");
|
|
|
|
bzero(cp, NFSV4CL_LOCKNAMELEN);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if ((flags & F_POSIX) != 0) {
|
|
|
|
p = (struct proc *)id;
|
|
|
|
tl.lval = p->p_pid;
|
|
|
|
*cp++ = tl.cval[0];
|
|
|
|
*cp++ = tl.cval[1];
|
|
|
|
*cp++ = tl.cval[2];
|
|
|
|
*cp++ = tl.cval[3];
|
|
|
|
tl.lval = p->p_stats->p_start.tv_sec;
|
|
|
|
*cp++ = tl.cval[0];
|
|
|
|
*cp++ = tl.cval[1];
|
|
|
|
*cp++ = tl.cval[2];
|
|
|
|
*cp++ = tl.cval[3];
|
|
|
|
tl.lval = p->p_stats->p_start.tv_usec;
|
|
|
|
*cp++ = tl.cval[0];
|
|
|
|
*cp++ = tl.cval[1];
|
|
|
|
*cp++ = tl.cval[2];
|
|
|
|
*cp = tl.cval[3];
|
2011-06-05 20:22:56 +00:00
|
|
|
} else if ((flags & F_FLOCK) != 0) {
|
|
|
|
bcopy(&id, cp, sizeof(id));
|
|
|
|
bzero(&cp[sizeof(id)], NFSV4CL_LOCKNAMELEN - sizeof(id));
|
2011-06-05 18:17:37 +00:00
|
|
|
} else {
|
2011-06-05 20:22:56 +00:00
|
|
|
printf("nfscl_filllockowner: not F_POSIX or F_FLOCK\n");
|
2011-06-05 18:17:37 +00:00
|
|
|
bzero(cp, NFSV4CL_LOCKNAMELEN);
|
|
|
|
}
|
2009-05-04 15:23:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Find the parent process for the thread passed in as an argument.
|
|
|
|
* If none exists, return NULL, otherwise return a thread for the parent.
|
|
|
|
* (Can be any of the threads, since it is only used for td->td_proc.)
|
|
|
|
*/
|
|
|
|
NFSPROC_T *
|
|
|
|
nfscl_getparent(struct thread *td)
|
|
|
|
{
|
|
|
|
struct proc *p;
|
|
|
|
struct thread *ptd;
|
|
|
|
|
|
|
|
if (td == NULL)
|
|
|
|
return (NULL);
|
|
|
|
p = td->td_proc;
|
|
|
|
if (p->p_pid == 0)
|
|
|
|
return (NULL);
|
|
|
|
p = p->p_pptr;
|
|
|
|
if (p == NULL)
|
|
|
|
return (NULL);
|
|
|
|
ptd = TAILQ_FIRST(&p->p_threads);
|
|
|
|
return (ptd);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Start up the renew kernel thread.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
start_nfscl(void *arg)
|
|
|
|
{
|
|
|
|
struct nfsclclient *clp;
|
|
|
|
struct thread *td;
|
|
|
|
|
|
|
|
clp = (struct nfsclclient *)arg;
|
|
|
|
td = TAILQ_FIRST(&clp->nfsc_renewthread->p_threads);
|
|
|
|
nfscl_renewthread(clp, td);
|
|
|
|
kproc_exit(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
nfscl_start_renewthread(struct nfsclclient *clp)
|
|
|
|
{
|
|
|
|
|
|
|
|
kproc_create(start_nfscl, (void *)clp, &clp->nfsc_renewthread, 0, 0,
|
|
|
|
"nfscl");
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Handle wcc_data.
|
|
|
|
* For NFSv4, it assumes that nfsv4_wccattr() was used to set up the getattr
|
|
|
|
* as the first Op after PutFH.
|
|
|
|
* (For NFSv4, the postop attributes are after the Op, so they can't be
|
|
|
|
* parsed here. A separate call to nfscl_postop_attr() is required.)
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
nfscl_wcc_data(struct nfsrv_descript *nd, struct vnode *vp,
|
|
|
|
struct nfsvattr *nap, int *flagp, int *wccflagp, void *stuff)
|
|
|
|
{
|
|
|
|
u_int32_t *tl;
|
|
|
|
struct nfsnode *np = VTONFS(vp);
|
|
|
|
struct nfsvattr nfsva;
|
|
|
|
int error = 0;
|
|
|
|
|
|
|
|
if (wccflagp != NULL)
|
|
|
|
*wccflagp = 0;
|
|
|
|
if (nd->nd_flag & ND_NFSV3) {
|
|
|
|
*flagp = 0;
|
|
|
|
NFSM_DISSECT(tl, u_int32_t *, NFSX_UNSIGNED);
|
|
|
|
if (*tl == newnfs_true) {
|
|
|
|
NFSM_DISSECT(tl, u_int32_t *, 6 * NFSX_UNSIGNED);
|
|
|
|
if (wccflagp != NULL) {
|
|
|
|
mtx_lock(&np->n_mtx);
|
|
|
|
*wccflagp = (np->n_mtime.tv_sec ==
|
|
|
|
fxdr_unsigned(u_int32_t, *(tl + 2)) &&
|
|
|
|
np->n_mtime.tv_nsec ==
|
|
|
|
fxdr_unsigned(u_int32_t, *(tl + 3)));
|
|
|
|
mtx_unlock(&np->n_mtx);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
error = nfscl_postop_attr(nd, nap, flagp, stuff);
|
|
|
|
} else if ((nd->nd_flag & (ND_NOMOREDATA | ND_NFSV4 | ND_V4WCCATTR))
|
|
|
|
== (ND_NFSV4 | ND_V4WCCATTR)) {
|
|
|
|
error = nfsv4_loadattr(nd, NULL, &nfsva, NULL,
|
|
|
|
NULL, 0, NULL, NULL, NULL, NULL, NULL, 0,
|
|
|
|
NULL, NULL, NULL, NULL, NULL);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
/*
|
|
|
|
* Get rid of Op# and status for next op.
|
|
|
|
*/
|
|
|
|
NFSM_DISSECT(tl, u_int32_t *, 2 * NFSX_UNSIGNED);
|
|
|
|
if (*++tl)
|
|
|
|
nd->nd_flag |= ND_NOMOREDATA;
|
|
|
|
if (wccflagp != NULL &&
|
|
|
|
nfsva.na_vattr.va_mtime.tv_sec != 0) {
|
|
|
|
mtx_lock(&np->n_mtx);
|
|
|
|
*wccflagp = (np->n_mtime.tv_sec ==
|
|
|
|
nfsva.na_vattr.va_mtime.tv_sec &&
|
|
|
|
np->n_mtime.tv_nsec ==
|
|
|
|
nfsva.na_vattr.va_mtime.tv_sec);
|
|
|
|
mtx_unlock(&np->n_mtx);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
nfsmout:
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Get postop attributes.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
nfscl_postop_attr(struct nfsrv_descript *nd, struct nfsvattr *nap, int *retp,
|
|
|
|
void *stuff)
|
|
|
|
{
|
|
|
|
u_int32_t *tl;
|
|
|
|
int error = 0;
|
|
|
|
|
|
|
|
*retp = 0;
|
|
|
|
if (nd->nd_flag & ND_NOMOREDATA)
|
|
|
|
return (error);
|
|
|
|
if (nd->nd_flag & ND_NFSV3) {
|
|
|
|
NFSM_DISSECT(tl, u_int32_t *, NFSX_UNSIGNED);
|
|
|
|
*retp = fxdr_unsigned(int, *tl);
|
|
|
|
} else if (nd->nd_flag & ND_NFSV4) {
|
|
|
|
/*
|
|
|
|
* For NFSv4, the postop attr are at the end, so no point
|
|
|
|
* in looking if nd_repstat != 0.
|
|
|
|
*/
|
|
|
|
if (!nd->nd_repstat) {
|
|
|
|
NFSM_DISSECT(tl, u_int32_t *, 2 * NFSX_UNSIGNED);
|
|
|
|
if (*(tl + 1))
|
|
|
|
/* should never happen since nd_repstat != 0 */
|
|
|
|
nd->nd_flag |= ND_NOMOREDATA;
|
|
|
|
else
|
|
|
|
*retp = 1;
|
|
|
|
}
|
|
|
|
} else if (!nd->nd_repstat) {
|
|
|
|
/* For NFSv2, the attributes are here iff nd_repstat == 0 */
|
|
|
|
*retp = 1;
|
|
|
|
}
|
|
|
|
if (*retp) {
|
|
|
|
error = nfsm_loadattr(nd, nap);
|
|
|
|
if (error)
|
|
|
|
*retp = 0;
|
|
|
|
}
|
|
|
|
nfsmout:
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Fill in the setable attributes. The full argument indicates whether
|
|
|
|
* to fill in them all or just mode and time.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
nfscl_fillsattr(struct nfsrv_descript *nd, struct vattr *vap,
|
|
|
|
struct vnode *vp, int flags, u_int32_t rdev)
|
|
|
|
{
|
|
|
|
u_int32_t *tl;
|
|
|
|
struct nfsv2_sattr *sp;
|
|
|
|
nfsattrbit_t attrbits;
|
|
|
|
|
|
|
|
switch (nd->nd_flag & (ND_NFSV2 | ND_NFSV3 | ND_NFSV4)) {
|
|
|
|
case ND_NFSV2:
|
|
|
|
NFSM_BUILD(sp, struct nfsv2_sattr *, NFSX_V2SATTR);
|
|
|
|
if (vap->va_mode == (mode_t)VNOVAL)
|
|
|
|
sp->sa_mode = newnfs_xdrneg1;
|
|
|
|
else
|
|
|
|
sp->sa_mode = vtonfsv2_mode(vap->va_type, vap->va_mode);
|
|
|
|
if (vap->va_uid == (uid_t)VNOVAL)
|
|
|
|
sp->sa_uid = newnfs_xdrneg1;
|
|
|
|
else
|
|
|
|
sp->sa_uid = txdr_unsigned(vap->va_uid);
|
|
|
|
if (vap->va_gid == (gid_t)VNOVAL)
|
|
|
|
sp->sa_gid = newnfs_xdrneg1;
|
|
|
|
else
|
|
|
|
sp->sa_gid = txdr_unsigned(vap->va_gid);
|
|
|
|
if (flags & NFSSATTR_SIZE0)
|
|
|
|
sp->sa_size = 0;
|
|
|
|
else if (flags & NFSSATTR_SIZENEG1)
|
|
|
|
sp->sa_size = newnfs_xdrneg1;
|
|
|
|
else if (flags & NFSSATTR_SIZERDEV)
|
|
|
|
sp->sa_size = txdr_unsigned(rdev);
|
|
|
|
else
|
|
|
|
sp->sa_size = txdr_unsigned(vap->va_size);
|
|
|
|
txdr_nfsv2time(&vap->va_atime, &sp->sa_atime);
|
|
|
|
txdr_nfsv2time(&vap->va_mtime, &sp->sa_mtime);
|
|
|
|
break;
|
|
|
|
case ND_NFSV3:
|
|
|
|
if (vap->va_mode != (mode_t)VNOVAL) {
|
|
|
|
NFSM_BUILD(tl, u_int32_t *, 2 * NFSX_UNSIGNED);
|
|
|
|
*tl++ = newnfs_true;
|
|
|
|
*tl = txdr_unsigned(vap->va_mode);
|
|
|
|
} else {
|
|
|
|
NFSM_BUILD(tl, u_int32_t *, NFSX_UNSIGNED);
|
|
|
|
*tl = newnfs_false;
|
|
|
|
}
|
|
|
|
if ((flags & NFSSATTR_FULL) && vap->va_uid != (uid_t)VNOVAL) {
|
|
|
|
NFSM_BUILD(tl, u_int32_t *, 2 * NFSX_UNSIGNED);
|
|
|
|
*tl++ = newnfs_true;
|
|
|
|
*tl = txdr_unsigned(vap->va_uid);
|
|
|
|
} else {
|
|
|
|
NFSM_BUILD(tl, u_int32_t *, NFSX_UNSIGNED);
|
|
|
|
*tl = newnfs_false;
|
|
|
|
}
|
|
|
|
if ((flags & NFSSATTR_FULL) && vap->va_gid != (gid_t)VNOVAL) {
|
|
|
|
NFSM_BUILD(tl, u_int32_t *, 2 * NFSX_UNSIGNED);
|
|
|
|
*tl++ = newnfs_true;
|
|
|
|
*tl = txdr_unsigned(vap->va_gid);
|
|
|
|
} else {
|
|
|
|
NFSM_BUILD(tl, u_int32_t *, NFSX_UNSIGNED);
|
|
|
|
*tl = newnfs_false;
|
|
|
|
}
|
|
|
|
if ((flags & NFSSATTR_FULL) && vap->va_size != VNOVAL) {
|
|
|
|
NFSM_BUILD(tl, u_int32_t *, 3 * NFSX_UNSIGNED);
|
|
|
|
*tl++ = newnfs_true;
|
|
|
|
txdr_hyper(vap->va_size, tl);
|
|
|
|
} else {
|
|
|
|
NFSM_BUILD(tl, u_int32_t *, NFSX_UNSIGNED);
|
|
|
|
*tl = newnfs_false;
|
|
|
|
}
|
|
|
|
if (vap->va_atime.tv_sec != VNOVAL) {
|
2013-01-16 21:52:31 +00:00
|
|
|
if ((vap->va_vaflags & VA_UTIMES_NULL) == 0) {
|
2009-05-04 15:23:58 +00:00
|
|
|
NFSM_BUILD(tl, u_int32_t *, 3 * NFSX_UNSIGNED);
|
|
|
|
*tl++ = txdr_unsigned(NFSV3SATTRTIME_TOCLIENT);
|
|
|
|
txdr_nfsv3time(&vap->va_atime, tl);
|
|
|
|
} else {
|
|
|
|
NFSM_BUILD(tl, u_int32_t *, NFSX_UNSIGNED);
|
|
|
|
*tl = txdr_unsigned(NFSV3SATTRTIME_TOSERVER);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
NFSM_BUILD(tl, u_int32_t *, NFSX_UNSIGNED);
|
|
|
|
*tl = txdr_unsigned(NFSV3SATTRTIME_DONTCHANGE);
|
|
|
|
}
|
|
|
|
if (vap->va_mtime.tv_sec != VNOVAL) {
|
2013-01-16 21:52:31 +00:00
|
|
|
if ((vap->va_vaflags & VA_UTIMES_NULL) == 0) {
|
2009-05-04 15:23:58 +00:00
|
|
|
NFSM_BUILD(tl, u_int32_t *, 3 * NFSX_UNSIGNED);
|
|
|
|
*tl++ = txdr_unsigned(NFSV3SATTRTIME_TOCLIENT);
|
|
|
|
txdr_nfsv3time(&vap->va_mtime, tl);
|
|
|
|
} else {
|
|
|
|
NFSM_BUILD(tl, u_int32_t *, NFSX_UNSIGNED);
|
|
|
|
*tl = txdr_unsigned(NFSV3SATTRTIME_TOSERVER);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
NFSM_BUILD(tl, u_int32_t *, NFSX_UNSIGNED);
|
|
|
|
*tl = txdr_unsigned(NFSV3SATTRTIME_DONTCHANGE);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ND_NFSV4:
|
|
|
|
NFSZERO_ATTRBIT(&attrbits);
|
|
|
|
if (vap->va_mode != (mode_t)VNOVAL)
|
|
|
|
NFSSETBIT_ATTRBIT(&attrbits, NFSATTRBIT_MODE);
|
|
|
|
if ((flags & NFSSATTR_FULL) && vap->va_uid != (uid_t)VNOVAL)
|
|
|
|
NFSSETBIT_ATTRBIT(&attrbits, NFSATTRBIT_OWNER);
|
|
|
|
if ((flags & NFSSATTR_FULL) && vap->va_gid != (gid_t)VNOVAL)
|
|
|
|
NFSSETBIT_ATTRBIT(&attrbits, NFSATTRBIT_OWNERGROUP);
|
|
|
|
if ((flags & NFSSATTR_FULL) && vap->va_size != VNOVAL)
|
|
|
|
NFSSETBIT_ATTRBIT(&attrbits, NFSATTRBIT_SIZE);
|
|
|
|
if (vap->va_atime.tv_sec != VNOVAL)
|
|
|
|
NFSSETBIT_ATTRBIT(&attrbits, NFSATTRBIT_TIMEACCESSSET);
|
|
|
|
if (vap->va_mtime.tv_sec != VNOVAL)
|
|
|
|
NFSSETBIT_ATTRBIT(&attrbits, NFSATTRBIT_TIMEMODIFYSET);
|
2011-04-14 21:49:52 +00:00
|
|
|
(void) nfsv4_fillattr(nd, vp->v_mount, vp, NULL, vap, NULL, 0,
|
2011-04-14 23:46:15 +00:00
|
|
|
&attrbits, NULL, NULL, 0, 0, 0, 0, (uint64_t)0);
|
2009-05-04 15:23:58 +00:00
|
|
|
break;
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* nfscl_request() - mostly a wrapper for newnfs_request().
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
nfscl_request(struct nfsrv_descript *nd, struct vnode *vp, NFSPROC_T *p,
|
|
|
|
struct ucred *cred, void *stuff)
|
|
|
|
{
|
|
|
|
int ret, vers;
|
|
|
|
struct nfsmount *nmp;
|
|
|
|
|
|
|
|
nmp = VFSTONFS(vp->v_mount);
|
|
|
|
if (nd->nd_flag & ND_NFSV4)
|
|
|
|
vers = NFS_VER4;
|
|
|
|
else if (nd->nd_flag & ND_NFSV3)
|
|
|
|
vers = NFS_VER3;
|
|
|
|
else
|
|
|
|
vers = NFS_VER2;
|
|
|
|
ret = newnfs_request(nd, nmp, NULL, &nmp->nm_sockreq, vp, p, cred,
|
2012-12-08 22:52:39 +00:00
|
|
|
NFS_PROG, vers, NULL, 1, NULL, NULL);
|
2009-05-04 15:23:58 +00:00
|
|
|
return (ret);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* fill in this bsden's variant of statfs using nfsstatfs.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
nfscl_loadsbinfo(struct nfsmount *nmp, struct nfsstatfs *sfp, void *statfs)
|
|
|
|
{
|
|
|
|
struct statfs *sbp = (struct statfs *)statfs;
|
|
|
|
|
|
|
|
if (nmp->nm_flag & (NFSMNT_NFSV3 | NFSMNT_NFSV4)) {
|
|
|
|
sbp->f_bsize = NFS_FABLKSIZE;
|
2011-05-05 00:11:09 +00:00
|
|
|
sbp->f_blocks = sfp->sf_tbytes / NFS_FABLKSIZE;
|
|
|
|
sbp->f_bfree = sfp->sf_fbytes / NFS_FABLKSIZE;
|
|
|
|
/*
|
|
|
|
* Although sf_abytes is uint64_t and f_bavail is int64_t,
|
|
|
|
* the value after dividing by NFS_FABLKSIZE is small
|
|
|
|
* enough that it will fit in 63bits, so it is ok to
|
|
|
|
* assign it to f_bavail without fear that it will become
|
|
|
|
* negative.
|
|
|
|
*/
|
|
|
|
sbp->f_bavail = sfp->sf_abytes / NFS_FABLKSIZE;
|
|
|
|
sbp->f_files = sfp->sf_tfiles;
|
|
|
|
/* Since f_ffree is int64_t, clip it to 63bits. */
|
|
|
|
if (sfp->sf_ffiles > INT64_MAX)
|
|
|
|
sbp->f_ffree = INT64_MAX;
|
|
|
|
else
|
|
|
|
sbp->f_ffree = sfp->sf_ffiles;
|
2009-05-04 15:23:58 +00:00
|
|
|
} else if ((nmp->nm_flag & NFSMNT_NFSV4) == 0) {
|
2011-05-05 00:11:09 +00:00
|
|
|
/*
|
|
|
|
* The type casts to (int32_t) ensure that this code is
|
|
|
|
* compatible with the old NFS client, in that it will
|
|
|
|
* propagate bit31 to the high order bits. This may or may
|
|
|
|
* not be correct for NFSv2, but since it is a legacy
|
|
|
|
* environment, I'd rather retain backwards compatibility.
|
|
|
|
*/
|
2009-05-04 15:23:58 +00:00
|
|
|
sbp->f_bsize = (int32_t)sfp->sf_bsize;
|
|
|
|
sbp->f_blocks = (int32_t)sfp->sf_blocks;
|
|
|
|
sbp->f_bfree = (int32_t)sfp->sf_bfree;
|
|
|
|
sbp->f_bavail = (int32_t)sfp->sf_bavail;
|
|
|
|
sbp->f_files = 0;
|
|
|
|
sbp->f_ffree = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Use the fsinfo stuff to update the mount point.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
nfscl_loadfsinfo(struct nfsmount *nmp, struct nfsfsinfo *fsp)
|
|
|
|
{
|
|
|
|
|
|
|
|
if ((nmp->nm_wsize == 0 || fsp->fs_wtpref < nmp->nm_wsize) &&
|
|
|
|
fsp->fs_wtpref >= NFS_FABLKSIZE)
|
|
|
|
nmp->nm_wsize = (fsp->fs_wtpref + NFS_FABLKSIZE - 1) &
|
|
|
|
~(NFS_FABLKSIZE - 1);
|
|
|
|
if (fsp->fs_wtmax < nmp->nm_wsize && fsp->fs_wtmax > 0) {
|
|
|
|
nmp->nm_wsize = fsp->fs_wtmax & ~(NFS_FABLKSIZE - 1);
|
|
|
|
if (nmp->nm_wsize == 0)
|
|
|
|
nmp->nm_wsize = fsp->fs_wtmax;
|
|
|
|
}
|
|
|
|
if (nmp->nm_wsize < NFS_FABLKSIZE)
|
|
|
|
nmp->nm_wsize = NFS_FABLKSIZE;
|
|
|
|
if ((nmp->nm_rsize == 0 || fsp->fs_rtpref < nmp->nm_rsize) &&
|
|
|
|
fsp->fs_rtpref >= NFS_FABLKSIZE)
|
|
|
|
nmp->nm_rsize = (fsp->fs_rtpref + NFS_FABLKSIZE - 1) &
|
|
|
|
~(NFS_FABLKSIZE - 1);
|
|
|
|
if (fsp->fs_rtmax < nmp->nm_rsize && fsp->fs_rtmax > 0) {
|
|
|
|
nmp->nm_rsize = fsp->fs_rtmax & ~(NFS_FABLKSIZE - 1);
|
|
|
|
if (nmp->nm_rsize == 0)
|
|
|
|
nmp->nm_rsize = fsp->fs_rtmax;
|
|
|
|
}
|
|
|
|
if (nmp->nm_rsize < NFS_FABLKSIZE)
|
|
|
|
nmp->nm_rsize = NFS_FABLKSIZE;
|
|
|
|
if ((nmp->nm_readdirsize == 0 || fsp->fs_dtpref < nmp->nm_readdirsize)
|
|
|
|
&& fsp->fs_dtpref >= NFS_DIRBLKSIZ)
|
|
|
|
nmp->nm_readdirsize = (fsp->fs_dtpref + NFS_DIRBLKSIZ - 1) &
|
|
|
|
~(NFS_DIRBLKSIZ - 1);
|
|
|
|
if (fsp->fs_rtmax < nmp->nm_readdirsize && fsp->fs_rtmax > 0) {
|
|
|
|
nmp->nm_readdirsize = fsp->fs_rtmax & ~(NFS_DIRBLKSIZ - 1);
|
|
|
|
if (nmp->nm_readdirsize == 0)
|
|
|
|
nmp->nm_readdirsize = fsp->fs_rtmax;
|
|
|
|
}
|
|
|
|
if (nmp->nm_readdirsize < NFS_DIRBLKSIZ)
|
|
|
|
nmp->nm_readdirsize = NFS_DIRBLKSIZ;
|
|
|
|
if (fsp->fs_maxfilesize > 0 &&
|
|
|
|
fsp->fs_maxfilesize < nmp->nm_maxfilesize)
|
|
|
|
nmp->nm_maxfilesize = fsp->fs_maxfilesize;
|
|
|
|
nmp->nm_mountp->mnt_stat.f_iosize = newnfs_iosize(nmp);
|
|
|
|
nmp->nm_state |= NFSSTA_GOTFSINFO;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Get a pointer to my IP addrress and return it.
|
|
|
|
* Return NULL if you can't find one.
|
|
|
|
*/
|
|
|
|
u_int8_t *
|
|
|
|
nfscl_getmyip(struct nfsmount *nmp, int *isinet6p)
|
|
|
|
{
|
|
|
|
struct sockaddr_in sad, *sin;
|
|
|
|
struct rtentry *rt;
|
|
|
|
u_int8_t *retp = NULL;
|
|
|
|
static struct in_addr laddr;
|
|
|
|
|
|
|
|
*isinet6p = 0;
|
|
|
|
/*
|
|
|
|
* Loop up a route for the destination address.
|
|
|
|
*/
|
|
|
|
if (nmp->nm_nam->sa_family == AF_INET) {
|
|
|
|
bzero(&sad, sizeof (sad));
|
|
|
|
sin = (struct sockaddr_in *)nmp->nm_nam;
|
|
|
|
sad.sin_family = AF_INET;
|
|
|
|
sad.sin_len = sizeof (struct sockaddr_in);
|
|
|
|
sad.sin_addr.s_addr = sin->sin_addr.s_addr;
|
2011-06-05 17:31:44 +00:00
|
|
|
CURVNET_SET(CRED_TO_VNET(nmp->nm_sockreq.nr_cred));
|
2012-02-17 02:39:58 +00:00
|
|
|
rt = rtalloc1_fib((struct sockaddr *)&sad, 0, 0UL,
|
|
|
|
curthread->td_proc->p_fibnum);
|
2009-05-04 15:23:58 +00:00
|
|
|
if (rt != NULL) {
|
|
|
|
if (rt->rt_ifp != NULL &&
|
|
|
|
rt->rt_ifa != NULL &&
|
|
|
|
((rt->rt_ifp->if_flags & IFF_LOOPBACK) == 0) &&
|
|
|
|
rt->rt_ifa->ifa_addr->sa_family == AF_INET) {
|
|
|
|
sin = (struct sockaddr_in *)
|
|
|
|
rt->rt_ifa->ifa_addr;
|
|
|
|
laddr.s_addr = sin->sin_addr.s_addr;
|
|
|
|
retp = (u_int8_t *)&laddr;
|
|
|
|
}
|
|
|
|
RTFREE_LOCKED(rt);
|
|
|
|
}
|
2011-06-05 17:31:44 +00:00
|
|
|
CURVNET_RESTORE();
|
2009-05-04 15:23:58 +00:00
|
|
|
#ifdef INET6
|
|
|
|
} else if (nmp->nm_nam->sa_family == AF_INET6) {
|
|
|
|
struct sockaddr_in6 sad6, *sin6;
|
|
|
|
static struct in6_addr laddr6;
|
|
|
|
|
|
|
|
bzero(&sad6, sizeof (sad6));
|
|
|
|
sin6 = (struct sockaddr_in6 *)nmp->nm_nam;
|
|
|
|
sad6.sin6_family = AF_INET6;
|
|
|
|
sad6.sin6_len = sizeof (struct sockaddr_in6);
|
|
|
|
sad6.sin6_addr = sin6->sin6_addr;
|
2011-06-05 17:31:44 +00:00
|
|
|
CURVNET_SET(CRED_TO_VNET(nmp->nm_sockreq.nr_cred));
|
2012-02-17 02:39:58 +00:00
|
|
|
rt = rtalloc1_fib((struct sockaddr *)&sad6, 0, 0UL,
|
|
|
|
curthread->td_proc->p_fibnum);
|
2009-05-04 15:23:58 +00:00
|
|
|
if (rt != NULL) {
|
|
|
|
if (rt->rt_ifp != NULL &&
|
|
|
|
rt->rt_ifa != NULL &&
|
|
|
|
((rt->rt_ifp->if_flags & IFF_LOOPBACK) == 0) &&
|
|
|
|
rt->rt_ifa->ifa_addr->sa_family == AF_INET6) {
|
|
|
|
sin6 = (struct sockaddr_in6 *)
|
|
|
|
rt->rt_ifa->ifa_addr;
|
|
|
|
laddr6 = sin6->sin6_addr;
|
|
|
|
retp = (u_int8_t *)&laddr6;
|
|
|
|
*isinet6p = 1;
|
|
|
|
}
|
|
|
|
RTFREE_LOCKED(rt);
|
|
|
|
}
|
2011-06-05 17:31:44 +00:00
|
|
|
CURVNET_RESTORE();
|
2009-05-04 15:23:58 +00:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
return (retp);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Copy NFS uid, gids from the cred structure.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
newnfs_copyincred(struct ucred *cr, struct nfscred *nfscr)
|
|
|
|
{
|
2009-06-19 17:10:35 +00:00
|
|
|
int i;
|
2009-05-04 15:23:58 +00:00
|
|
|
|
2010-04-15 22:57:30 +00:00
|
|
|
KASSERT(cr->cr_ngroups >= 0,
|
|
|
|
("newnfs_copyincred: negative cr_ngroups"));
|
2009-05-04 15:23:58 +00:00
|
|
|
nfscr->nfsc_uid = cr->cr_uid;
|
2009-06-20 17:11:07 +00:00
|
|
|
nfscr->nfsc_ngroups = MIN(cr->cr_ngroups, NFS_MAXGRPS + 1);
|
2009-06-19 17:10:35 +00:00
|
|
|
for (i = 0; i < nfscr->nfsc_ngroups; i++)
|
2009-05-04 15:23:58 +00:00
|
|
|
nfscr->nfsc_groups[i] = cr->cr_groups[i];
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Do any client specific initialization.
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
nfscl_init(void)
|
|
|
|
{
|
|
|
|
static int inited = 0;
|
|
|
|
|
|
|
|
if (inited)
|
|
|
|
return;
|
|
|
|
inited = 1;
|
|
|
|
nfscl_inited = 1;
|
|
|
|
ncl_pbuf_freecnt = nswbuf / 2 + 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check each of the attributes to be set, to ensure they aren't already
|
|
|
|
* the correct value. Disable setting ones already correct.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
nfscl_checksattr(struct vattr *vap, struct nfsvattr *nvap)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (vap->va_mode != (mode_t)VNOVAL) {
|
|
|
|
if (vap->va_mode == nvap->na_mode)
|
|
|
|
vap->va_mode = (mode_t)VNOVAL;
|
|
|
|
}
|
|
|
|
if (vap->va_uid != (uid_t)VNOVAL) {
|
|
|
|
if (vap->va_uid == nvap->na_uid)
|
|
|
|
vap->va_uid = (uid_t)VNOVAL;
|
|
|
|
}
|
|
|
|
if (vap->va_gid != (gid_t)VNOVAL) {
|
|
|
|
if (vap->va_gid == nvap->na_gid)
|
|
|
|
vap->va_gid = (gid_t)VNOVAL;
|
|
|
|
}
|
|
|
|
if (vap->va_size != VNOVAL) {
|
|
|
|
if (vap->va_size == nvap->na_size)
|
|
|
|
vap->va_size = VNOVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We are normally called with only a partially initialized
|
|
|
|
* VAP. Since the NFSv3 spec says that server may use the
|
|
|
|
* file attributes to store the verifier, the spec requires
|
|
|
|
* us to do a SETATTR RPC. FreeBSD servers store the verifier
|
|
|
|
* in atime, but we can't really assume that all servers will
|
|
|
|
* so we ensure that our SETATTR sets both atime and mtime.
|
|
|
|
*/
|
|
|
|
if (vap->va_mtime.tv_sec == VNOVAL)
|
|
|
|
vfs_timestamp(&vap->va_mtime);
|
|
|
|
if (vap->va_atime.tv_sec == VNOVAL)
|
|
|
|
vap->va_atime = vap->va_mtime;
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Map nfsv4 errors to errno.h errors.
|
|
|
|
* The uid and gid arguments are only used for NFSERR_BADOWNER and that
|
|
|
|
* error should only be returned for the Open, Create and Setattr Ops.
|
|
|
|
* As such, most calls can just pass in 0 for those arguments.
|
|
|
|
*/
|
|
|
|
APPLESTATIC int
|
|
|
|
nfscl_maperr(struct thread *td, int error, uid_t uid, gid_t gid)
|
|
|
|
{
|
|
|
|
struct proc *p;
|
|
|
|
|
|
|
|
if (error < 10000)
|
|
|
|
return (error);
|
|
|
|
if (td != NULL)
|
|
|
|
p = td->td_proc;
|
|
|
|
else
|
|
|
|
p = NULL;
|
|
|
|
switch (error) {
|
|
|
|
case NFSERR_BADOWNER:
|
|
|
|
tprintf(p, LOG_INFO,
|
|
|
|
"No name and/or group mapping for uid,gid:(%d,%d)\n",
|
|
|
|
uid, gid);
|
|
|
|
return (EPERM);
|
2012-12-08 22:52:39 +00:00
|
|
|
case NFSERR_BADNAME:
|
|
|
|
case NFSERR_BADCHAR:
|
|
|
|
printf("nfsv4 char/name not handled by server\n");
|
|
|
|
return (ENOENT);
|
2009-05-04 15:23:58 +00:00
|
|
|
case NFSERR_STALECLIENTID:
|
|
|
|
case NFSERR_STALESTATEID:
|
|
|
|
case NFSERR_EXPIRED:
|
|
|
|
case NFSERR_BADSTATEID:
|
2012-12-08 22:52:39 +00:00
|
|
|
case NFSERR_BADSESSION:
|
2009-05-04 15:23:58 +00:00
|
|
|
printf("nfsv4 recover err returned %d\n", error);
|
|
|
|
return (EIO);
|
|
|
|
case NFSERR_BADHANDLE:
|
|
|
|
case NFSERR_SERVERFAULT:
|
|
|
|
case NFSERR_BADTYPE:
|
|
|
|
case NFSERR_FHEXPIRED:
|
|
|
|
case NFSERR_RESOURCE:
|
|
|
|
case NFSERR_MOVED:
|
|
|
|
case NFSERR_NOFILEHANDLE:
|
|
|
|
case NFSERR_MINORVERMISMATCH:
|
|
|
|
case NFSERR_OLDSTATEID:
|
|
|
|
case NFSERR_BADSEQID:
|
|
|
|
case NFSERR_LEASEMOVED:
|
|
|
|
case NFSERR_RECLAIMBAD:
|
|
|
|
case NFSERR_BADXDR:
|
|
|
|
case NFSERR_OPILLEGAL:
|
|
|
|
printf("nfsv4 client/server protocol prob err=%d\n",
|
|
|
|
error);
|
|
|
|
return (EIO);
|
|
|
|
default:
|
|
|
|
tprintf(p, LOG_INFO, "nfsv4 err=%d\n", error);
|
|
|
|
return (EIO);
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check to see if the process for this owner exists. Return 1 if it doesn't
|
|
|
|
* and 0 otherwise.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
nfscl_procdoesntexist(u_int8_t *own)
|
|
|
|
{
|
|
|
|
union {
|
|
|
|
u_int32_t lval;
|
|
|
|
u_int8_t cval[4];
|
|
|
|
} tl;
|
|
|
|
struct proc *p;
|
|
|
|
pid_t pid;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
tl.cval[0] = *own++;
|
|
|
|
tl.cval[1] = *own++;
|
|
|
|
tl.cval[2] = *own++;
|
|
|
|
tl.cval[3] = *own++;
|
|
|
|
pid = tl.lval;
|
|
|
|
p = pfind_locked(pid);
|
|
|
|
if (p == NULL)
|
|
|
|
return (1);
|
|
|
|
if (p->p_stats == NULL) {
|
|
|
|
PROC_UNLOCK(p);
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
tl.cval[0] = *own++;
|
|
|
|
tl.cval[1] = *own++;
|
|
|
|
tl.cval[2] = *own++;
|
|
|
|
tl.cval[3] = *own++;
|
|
|
|
if (tl.lval != p->p_stats->p_start.tv_sec) {
|
|
|
|
ret = 1;
|
|
|
|
} else {
|
|
|
|
tl.cval[0] = *own++;
|
|
|
|
tl.cval[1] = *own++;
|
|
|
|
tl.cval[2] = *own++;
|
|
|
|
tl.cval[3] = *own;
|
|
|
|
if (tl.lval != p->p_stats->p_start.tv_usec)
|
|
|
|
ret = 1;
|
|
|
|
}
|
|
|
|
PROC_UNLOCK(p);
|
|
|
|
return (ret);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* - nfs pseudo system call for the client
|
|
|
|
*/
|
|
|
|
/*
|
|
|
|
* MPSAFE
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
nfssvc_nfscl(struct thread *td, struct nfssvc_args *uap)
|
|
|
|
{
|
|
|
|
struct file *fp;
|
|
|
|
struct nfscbd_args nfscbdarg;
|
|
|
|
struct nfsd_nfscbd_args nfscbdarg2;
|
|
|
|
int error;
|
2012-12-02 01:16:04 +00:00
|
|
|
struct nameidata nd;
|
|
|
|
struct nfscl_dumpmntopts dumpmntopts;
|
|
|
|
char *buf;
|
2009-05-04 15:23:58 +00:00
|
|
|
|
|
|
|
if (uap->flag & NFSSVC_CBADDSOCK) {
|
|
|
|
error = copyin(uap->argp, (caddr_t)&nfscbdarg, sizeof(nfscbdarg));
|
|
|
|
if (error)
|
|
|
|
return (error);
|
2011-08-11 12:30:23 +00:00
|
|
|
/*
|
|
|
|
* Since we don't know what rights might be required,
|
|
|
|
* pretend that we need them all. It is better to be too
|
|
|
|
* careful than too reckless.
|
|
|
|
*/
|
Merge Capsicum overhaul:
- Capability is no longer separate descriptor type. Now every descriptor
has set of its own capability rights.
- The cap_new(2) system call is left, but it is no longer documented and
should not be used in new code.
- The new syscall cap_rights_limit(2) should be used instead of
cap_new(2), which limits capability rights of the given descriptor
without creating a new one.
- The cap_getrights(2) syscall is renamed to cap_rights_get(2).
- If CAP_IOCTL capability right is present we can further reduce allowed
ioctls list with the new cap_ioctls_limit(2) syscall. List of allowed
ioctls can be retrived with cap_ioctls_get(2) syscall.
- If CAP_FCNTL capability right is present we can further reduce fcntls
that can be used with the new cap_fcntls_limit(2) syscall and retrive
them with cap_fcntls_get(2).
- To support ioctl and fcntl white-listing the filedesc structure was
heavly modified.
- The audit subsystem, kdump and procstat tools were updated to
recognize new syscalls.
- Capability rights were revised and eventhough I tried hard to provide
backward API and ABI compatibility there are some incompatible changes
that are described in detail below:
CAP_CREATE old behaviour:
- Allow for openat(2)+O_CREAT.
- Allow for linkat(2).
- Allow for symlinkat(2).
CAP_CREATE new behaviour:
- Allow for openat(2)+O_CREAT.
Added CAP_LINKAT:
- Allow for linkat(2). ABI: Reuses CAP_RMDIR bit.
- Allow to be target for renameat(2).
Added CAP_SYMLINKAT:
- Allow for symlinkat(2).
Removed CAP_DELETE. Old behaviour:
- Allow for unlinkat(2) when removing non-directory object.
- Allow to be source for renameat(2).
Removed CAP_RMDIR. Old behaviour:
- Allow for unlinkat(2) when removing directory.
Added CAP_RENAMEAT:
- Required for source directory for the renameat(2) syscall.
Added CAP_UNLINKAT (effectively it replaces CAP_DELETE and CAP_RMDIR):
- Allow for unlinkat(2) on any object.
- Required if target of renameat(2) exists and will be removed by this
call.
Removed CAP_MAPEXEC.
CAP_MMAP old behaviour:
- Allow for mmap(2) with any combination of PROT_NONE, PROT_READ and
PROT_WRITE.
CAP_MMAP new behaviour:
- Allow for mmap(2)+PROT_NONE.
Added CAP_MMAP_R:
- Allow for mmap(PROT_READ).
Added CAP_MMAP_W:
- Allow for mmap(PROT_WRITE).
Added CAP_MMAP_X:
- Allow for mmap(PROT_EXEC).
Added CAP_MMAP_RW:
- Allow for mmap(PROT_READ | PROT_WRITE).
Added CAP_MMAP_RX:
- Allow for mmap(PROT_READ | PROT_EXEC).
Added CAP_MMAP_WX:
- Allow for mmap(PROT_WRITE | PROT_EXEC).
Added CAP_MMAP_RWX:
- Allow for mmap(PROT_READ | PROT_WRITE | PROT_EXEC).
Renamed CAP_MKDIR to CAP_MKDIRAT.
Renamed CAP_MKFIFO to CAP_MKFIFOAT.
Renamed CAP_MKNODE to CAP_MKNODEAT.
CAP_READ old behaviour:
- Allow pread(2).
- Disallow read(2), readv(2) (if there is no CAP_SEEK).
CAP_READ new behaviour:
- Allow read(2), readv(2).
- Disallow pread(2) (CAP_SEEK was also required).
CAP_WRITE old behaviour:
- Allow pwrite(2).
- Disallow write(2), writev(2) (if there is no CAP_SEEK).
CAP_WRITE new behaviour:
- Allow write(2), writev(2).
- Disallow pwrite(2) (CAP_SEEK was also required).
Added convinient defines:
#define CAP_PREAD (CAP_SEEK | CAP_READ)
#define CAP_PWRITE (CAP_SEEK | CAP_WRITE)
#define CAP_MMAP_R (CAP_MMAP | CAP_SEEK | CAP_READ)
#define CAP_MMAP_W (CAP_MMAP | CAP_SEEK | CAP_WRITE)
#define CAP_MMAP_X (CAP_MMAP | CAP_SEEK | 0x0000000000000008ULL)
#define CAP_MMAP_RW (CAP_MMAP_R | CAP_MMAP_W)
#define CAP_MMAP_RX (CAP_MMAP_R | CAP_MMAP_X)
#define CAP_MMAP_WX (CAP_MMAP_W | CAP_MMAP_X)
#define CAP_MMAP_RWX (CAP_MMAP_R | CAP_MMAP_W | CAP_MMAP_X)
#define CAP_RECV CAP_READ
#define CAP_SEND CAP_WRITE
#define CAP_SOCK_CLIENT \
(CAP_CONNECT | CAP_GETPEERNAME | CAP_GETSOCKNAME | CAP_GETSOCKOPT | \
CAP_PEELOFF | CAP_RECV | CAP_SEND | CAP_SETSOCKOPT | CAP_SHUTDOWN)
#define CAP_SOCK_SERVER \
(CAP_ACCEPT | CAP_BIND | CAP_GETPEERNAME | CAP_GETSOCKNAME | \
CAP_GETSOCKOPT | CAP_LISTEN | CAP_PEELOFF | CAP_RECV | CAP_SEND | \
CAP_SETSOCKOPT | CAP_SHUTDOWN)
Added defines for backward API compatibility:
#define CAP_MAPEXEC CAP_MMAP_X
#define CAP_DELETE CAP_UNLINKAT
#define CAP_MKDIR CAP_MKDIRAT
#define CAP_RMDIR CAP_UNLINKAT
#define CAP_MKFIFO CAP_MKFIFOAT
#define CAP_MKNOD CAP_MKNODAT
#define CAP_SOCK_ALL (CAP_SOCK_CLIENT | CAP_SOCK_SERVER)
Sponsored by: The FreeBSD Foundation
Reviewed by: Christoph Mallon <christoph.mallon@gmx.de>
Many aspects discussed with: rwatson, benl, jonathan
ABI compatibility discussed with: kib
2013-03-02 00:53:12 +00:00
|
|
|
if ((error = fget(td, nfscbdarg.sock, CAP_SOCK_CLIENT, &fp))
|
2011-08-11 12:30:23 +00:00
|
|
|
!= 0) {
|
2009-05-04 15:23:58 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
if (fp->f_type != DTYPE_SOCKET) {
|
|
|
|
fdrop(fp, td);
|
|
|
|
return (EPERM);
|
|
|
|
}
|
|
|
|
error = nfscbd_addsock(fp);
|
|
|
|
fdrop(fp, td);
|
|
|
|
if (!error && nfscl_enablecallb == 0) {
|
|
|
|
nfsv4_cbport = nfscbdarg.port;
|
|
|
|
nfscl_enablecallb = 1;
|
|
|
|
}
|
|
|
|
} else if (uap->flag & NFSSVC_NFSCBD) {
|
|
|
|
if (uap->argp == NULL)
|
|
|
|
return (EINVAL);
|
|
|
|
error = copyin(uap->argp, (caddr_t)&nfscbdarg2,
|
|
|
|
sizeof(nfscbdarg2));
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
error = nfscbd_nfsd(td, &nfscbdarg2);
|
2012-12-02 01:16:04 +00:00
|
|
|
} else if (uap->flag & NFSSVC_DUMPMNTOPTS) {
|
|
|
|
error = copyin(uap->argp, &dumpmntopts, sizeof(dumpmntopts));
|
|
|
|
if (error == 0 && (dumpmntopts.ndmnt_blen < 256 ||
|
|
|
|
dumpmntopts.ndmnt_blen > 1024))
|
|
|
|
error = EINVAL;
|
|
|
|
if (error == 0)
|
|
|
|
error = nfsrv_lookupfilename(&nd,
|
|
|
|
dumpmntopts.ndmnt_fname, td);
|
|
|
|
if (error == 0 && strcmp(nd.ni_vp->v_mount->mnt_vfc->vfc_name,
|
|
|
|
"nfs") != 0) {
|
|
|
|
vput(nd.ni_vp);
|
|
|
|
error = EINVAL;
|
|
|
|
}
|
|
|
|
if (error == 0) {
|
|
|
|
buf = malloc(dumpmntopts.ndmnt_blen, M_TEMP, M_WAITOK);
|
|
|
|
nfscl_retopts(VFSTONFS(nd.ni_vp->v_mount), buf,
|
|
|
|
dumpmntopts.ndmnt_blen);
|
|
|
|
vput(nd.ni_vp);
|
|
|
|
error = copyout(buf, dumpmntopts.ndmnt_buf,
|
|
|
|
dumpmntopts.ndmnt_blen);
|
|
|
|
free(buf, M_TEMP);
|
|
|
|
}
|
2009-05-04 15:23:58 +00:00
|
|
|
} else {
|
|
|
|
error = EINVAL;
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
extern int (*nfsd_call_nfscl)(struct thread *, struct nfssvc_args *);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Called once to initialize data structures...
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
nfscl_modevent(module_t mod, int type, void *data)
|
|
|
|
{
|
|
|
|
int error = 0;
|
|
|
|
static int loaded = 0;
|
|
|
|
|
|
|
|
switch (type) {
|
|
|
|
case MOD_LOAD:
|
|
|
|
if (loaded)
|
|
|
|
return (0);
|
|
|
|
newnfs_portinit();
|
|
|
|
mtx_init(&nfs_clstate_mutex, "nfs_clstate_mutex", NULL,
|
|
|
|
MTX_DEF);
|
|
|
|
mtx_init(&ncl_iod_mutex, "ncl_iod_mutex", NULL, MTX_DEF);
|
|
|
|
nfscl_init();
|
|
|
|
NFSD_LOCK();
|
|
|
|
nfsrvd_cbinit(0);
|
|
|
|
NFSD_UNLOCK();
|
|
|
|
ncl_call_invalcaches = ncl_invalcaches;
|
|
|
|
nfsd_call_nfscl = nfssvc_nfscl;
|
|
|
|
loaded = 1;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case MOD_UNLOAD:
|
|
|
|
if (nfs_numnfscbd != 0) {
|
|
|
|
error = EBUSY;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2009-10-20 15:06:18 +00:00
|
|
|
/*
|
|
|
|
* XXX: Unloading of nfscl module is unsupported.
|
|
|
|
*/
|
|
|
|
#if 0
|
2009-05-04 15:23:58 +00:00
|
|
|
ncl_call_invalcaches = NULL;
|
|
|
|
nfsd_call_nfscl = NULL;
|
|
|
|
/* and get rid of the mutexes */
|
|
|
|
mtx_destroy(&nfs_clstate_mutex);
|
|
|
|
mtx_destroy(&ncl_iod_mutex);
|
|
|
|
loaded = 0;
|
|
|
|
break;
|
2009-10-20 15:06:18 +00:00
|
|
|
#else
|
|
|
|
/* FALLTHROUGH */
|
|
|
|
#endif
|
2009-05-04 15:23:58 +00:00
|
|
|
default:
|
|
|
|
error = EOPNOTSUPP;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
static moduledata_t nfscl_mod = {
|
|
|
|
"nfscl",
|
|
|
|
nfscl_modevent,
|
|
|
|
NULL,
|
|
|
|
};
|
2009-10-20 15:01:46 +00:00
|
|
|
DECLARE_MODULE(nfscl, nfscl_mod, SI_SUB_VFS, SI_ORDER_FIRST);
|
2009-05-04 15:23:58 +00:00
|
|
|
|
|
|
|
/* So that loader and kldload(2) can find us, wherever we are.. */
|
|
|
|
MODULE_VERSION(nfscl, 1);
|
2009-05-22 20:55:29 +00:00
|
|
|
MODULE_DEPEND(nfscl, nfscommon, 1, 1, 1);
|
2010-06-15 00:25:04 +00:00
|
|
|
MODULE_DEPEND(nfscl, krpc, 1, 1, 1);
|
|
|
|
MODULE_DEPEND(nfscl, nfssvc, 1, 1, 1);
|
2010-07-24 22:11:11 +00:00
|
|
|
MODULE_DEPEND(nfscl, nfslock, 1, 1, 1);
|
2009-05-04 15:23:58 +00:00
|
|
|
|