19ec7b004SRick Macklem /*-
251369649SPedro F. Giffuni * SPDX-License-Identifier: BSD-3-Clause
351369649SPedro F. Giffuni *
49ec7b004SRick Macklem * Copyright (c) 1989, 1993
59ec7b004SRick Macklem * The Regents of the University of California. All rights reserved.
69ec7b004SRick Macklem *
79ec7b004SRick Macklem * This code is derived from software contributed to Berkeley by
89ec7b004SRick Macklem * Rick Macklem at The University of Guelph.
99ec7b004SRick Macklem *
109ec7b004SRick Macklem * Redistribution and use in source and binary forms, with or without
119ec7b004SRick Macklem * modification, are permitted provided that the following conditions
129ec7b004SRick Macklem * are met:
139ec7b004SRick Macklem * 1. Redistributions of source code must retain the above copyright
149ec7b004SRick Macklem * notice, this list of conditions and the following disclaimer.
159ec7b004SRick Macklem * 2. Redistributions in binary form must reproduce the above copyright
169ec7b004SRick Macklem * notice, this list of conditions and the following disclaimer in the
179ec7b004SRick Macklem * documentation and/or other materials provided with the distribution.
18fbbd9655SWarner Losh * 3. Neither the name of the University nor the names of its contributors
199ec7b004SRick Macklem * may be used to endorse or promote products derived from this software
209ec7b004SRick Macklem * without specific prior written permission.
219ec7b004SRick Macklem *
229ec7b004SRick Macklem * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
239ec7b004SRick Macklem * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
249ec7b004SRick Macklem * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
259ec7b004SRick Macklem * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
269ec7b004SRick Macklem * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
279ec7b004SRick Macklem * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
289ec7b004SRick Macklem * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
299ec7b004SRick Macklem * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
309ec7b004SRick Macklem * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
319ec7b004SRick Macklem * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
329ec7b004SRick Macklem * SUCH DAMAGE.
339ec7b004SRick Macklem *
349ec7b004SRick Macklem */
359ec7b004SRick Macklem
369ec7b004SRick Macklem #include <sys/cdefs.h>
37d3bf8f64SAlexander V. Chernikov #include "opt_inet.h"
38f7258644SRick Macklem #include "opt_inet6.h"
398f0e65c9SRick Macklem
404a144410SRobert Watson #include <sys/capsicum.h>
41a9d2f8d8SRobert Watson
429ec7b004SRick Macklem /*
439ec7b004SRick Macklem * generally, I don't like #includes inside .h files, but it seems to
449ec7b004SRick Macklem * be the easiest way to handle the port.
459ec7b004SRick Macklem */
46b5af3f30SConrad Meyer #include <sys/fail.h>
473707cf89SRick Macklem #include <sys/hash.h>
48b5af3f30SConrad Meyer #include <sys/sysctl.h>
499ec7b004SRick Macklem #include <fs/nfs/nfsport.h>
50d3bf8f64SAlexander V. Chernikov #include <netinet/in_fib.h>
519ec7b004SRick Macklem #include <netinet/if_ether.h>
52d3bf8f64SAlexander V. Chernikov #include <netinet6/ip6_var.h>
539ec7b004SRick Macklem #include <net/if_types.h>
54c74ce5ccSAlexander V. Chernikov #include <net/route/nhop.h>
559ec7b004SRick Macklem
568f0e65c9SRick Macklem #include <fs/nfsclient/nfs_kdtrace.h>
578f0e65c9SRick Macklem
588f0e65c9SRick Macklem #ifdef KDTRACE_HOOKS
598f0e65c9SRick Macklem dtrace_nfsclient_attrcache_flush_probe_func_t
608f0e65c9SRick Macklem dtrace_nfscl_attrcache_flush_done_probe;
618f0e65c9SRick Macklem uint32_t nfscl_attrcache_flush_done_id;
628f0e65c9SRick Macklem
638f0e65c9SRick Macklem dtrace_nfsclient_attrcache_get_hit_probe_func_t
648f0e65c9SRick Macklem dtrace_nfscl_attrcache_get_hit_probe;
658f0e65c9SRick Macklem uint32_t nfscl_attrcache_get_hit_id;
668f0e65c9SRick Macklem
678f0e65c9SRick Macklem dtrace_nfsclient_attrcache_get_miss_probe_func_t
688f0e65c9SRick Macklem dtrace_nfscl_attrcache_get_miss_probe;
698f0e65c9SRick Macklem uint32_t nfscl_attrcache_get_miss_id;
708f0e65c9SRick Macklem
718f0e65c9SRick Macklem dtrace_nfsclient_attrcache_load_probe_func_t
728f0e65c9SRick Macklem dtrace_nfscl_attrcache_load_done_probe;
738f0e65c9SRick Macklem uint32_t nfscl_attrcache_load_done_id;
748f0e65c9SRick Macklem #endif /* !KDTRACE_HOOKS */
758f0e65c9SRick Macklem
769ec7b004SRick Macklem extern u_int32_t newnfs_true, newnfs_false, newnfs_xdrneg1;
779ec7b004SRick Macklem extern struct vop_vector newnfs_vnodeops;
789ec7b004SRick Macklem extern struct vop_vector newnfs_fifoops;
799ec7b004SRick Macklem extern uma_zone_t newnfsnode_zone;
80756a5412SGleb Smirnoff extern uma_zone_t ncl_pbuf_zone;
819ec7b004SRick Macklem extern short nfsv4_cbport;
829ec7b004SRick Macklem extern int nfscl_enablecallb;
839ec7b004SRick Macklem extern int nfs_numnfscbd;
849ec7b004SRick Macklem extern int nfscl_inited;
859ec7b004SRick Macklem struct mtx ncl_iod_mutex;
869ec7b004SRick Macklem NFSDLOCKMUTEX;
8790d2dfabSRick Macklem extern struct mtx nfsrv_dslock_mtx;
889ec7b004SRick Macklem
899ec7b004SRick Macklem extern void (*ncl_call_invalcaches)(struct vnode *);
909ec7b004SRick Macklem
91b5af3f30SConrad Meyer SYSCTL_DECL(_vfs_nfs);
92b5af3f30SConrad Meyer static int ncl_fileid_maxwarnings = 10;
93b5af3f30SConrad Meyer SYSCTL_INT(_vfs_nfs, OID_AUTO, fileid_maxwarnings, CTLFLAG_RWTUN,
94b5af3f30SConrad Meyer &ncl_fileid_maxwarnings, 0,
95b5af3f30SConrad Meyer "Limit fileid corruption warnings; 0 is off; -1 is unlimited");
96b5af3f30SConrad Meyer static volatile int ncl_fileid_nwarnings;
97b5af3f30SConrad Meyer
98b5af3f30SConrad Meyer static void nfscl_warn_fileid(struct nfsmount *, struct nfsvattr *,
99b5af3f30SConrad Meyer struct nfsvattr *);
100b5af3f30SConrad Meyer
1019ec7b004SRick Macklem /*
1029ec7b004SRick Macklem * Comparison function for vfs_hash functions.
1039ec7b004SRick Macklem */
1049ec7b004SRick Macklem int
newnfs_vncmpf(struct vnode * vp,void * arg)1059ec7b004SRick Macklem newnfs_vncmpf(struct vnode *vp, void *arg)
1069ec7b004SRick Macklem {
1079ec7b004SRick Macklem struct nfsfh *nfhp = (struct nfsfh *)arg;
1089ec7b004SRick Macklem struct nfsnode *np = VTONFS(vp);
1099ec7b004SRick Macklem
1109ec7b004SRick Macklem if (np->n_fhp->nfh_len != nfhp->nfh_len ||
1119ec7b004SRick Macklem NFSBCMP(np->n_fhp->nfh_fh, nfhp->nfh_fh, nfhp->nfh_len))
1129ec7b004SRick Macklem return (1);
1139ec7b004SRick Macklem return (0);
1149ec7b004SRick Macklem }
1159ec7b004SRick Macklem
1169ec7b004SRick Macklem /*
1179ec7b004SRick Macklem * Look up a vnode/nfsnode by file handle.
1189ec7b004SRick Macklem * Callers must check for mount points!!
1199ec7b004SRick Macklem * In all cases, a pointer to a
1209ec7b004SRick Macklem * nfsnode structure is returned.
1219ec7b004SRick Macklem * This variant takes a "struct nfsfh *" as second argument and uses
1229ec7b004SRick Macklem * that structure up, either by hanging off the nfsnode or FREEing it.
1239ec7b004SRick Macklem */
1249ec7b004SRick Macklem int
nfscl_nget(struct mount * mntp,struct vnode * dvp,struct nfsfh * nfhp,struct componentname * cnp,struct thread * td,struct nfsnode ** npp,int lkflags)1259ec7b004SRick Macklem nfscl_nget(struct mount *mntp, struct vnode *dvp, struct nfsfh *nfhp,
1269ec7b004SRick Macklem struct componentname *cnp, struct thread *td, struct nfsnode **npp,
127068fc057SRick Macklem int lkflags)
1289ec7b004SRick Macklem {
1299ec7b004SRick Macklem struct nfsnode *np, *dnp;
1309ec7b004SRick Macklem struct vnode *vp, *nvp;
1319ec7b004SRick Macklem struct nfsv4node *newd, *oldd;
1329ec7b004SRick Macklem int error;
1339ec7b004SRick Macklem u_int hash;
1349ec7b004SRick Macklem struct nfsmount *nmp;
1359ec7b004SRick Macklem
1369ec7b004SRick Macklem nmp = VFSTONFS(mntp);
1379ec7b004SRick Macklem dnp = VTONFS(dvp);
1389ec7b004SRick Macklem *npp = NULL;
1399ec7b004SRick Macklem
140896516e5SRick Macklem /*
141896516e5SRick Macklem * If this is the mount point fh and NFSMNTP_FAKEROOT is set, replace
142896516e5SRick Macklem * it with the fake fh.
143896516e5SRick Macklem */
144896516e5SRick Macklem if ((nmp->nm_privflag & NFSMNTP_FAKEROOTFH) != 0 &&
145896516e5SRick Macklem nmp->nm_fhsize > 0 && nmp->nm_fhsize == nfhp->nfh_len &&
146896516e5SRick Macklem !NFSBCMP(nmp->nm_fh, nfhp->nfh_fh, nmp->nm_fhsize)) {
147896516e5SRick Macklem free(nfhp, M_NFSFH);
148896516e5SRick Macklem nfhp = malloc(sizeof(struct nfsfh) + NFSX_FHMAX + 1,
149896516e5SRick Macklem M_NFSFH, M_WAITOK | M_ZERO);
150896516e5SRick Macklem nfhp->nfh_len = NFSX_FHMAX + 1;
151896516e5SRick Macklem }
152896516e5SRick Macklem
1539ec7b004SRick Macklem hash = fnv_32_buf(nfhp->nfh_fh, nfhp->nfh_len, FNV1_32_INIT);
1549ec7b004SRick Macklem
1554b3a38ecSRick Macklem error = vfs_hash_get(mntp, hash, lkflags,
1569ec7b004SRick Macklem td, &nvp, newnfs_vncmpf, nfhp);
1579ec7b004SRick Macklem if (error == 0 && nvp != NULL) {
1589ec7b004SRick Macklem /*
1599ec7b004SRick Macklem * I believe there is a slight chance that vgonel() could
16098f234f3SZack Kirsch * get called on this vnode between when NFSVOPLOCK() drops
1619ec7b004SRick Macklem * the VI_LOCK() and vget() acquires it again, so that it
1629ec7b004SRick Macklem * hasn't yet had v_usecount incremented. If this were to
163abd80ddbSMateusz Guzik * happen, the VIRF_DOOMED flag would be set, so check for
1649ec7b004SRick Macklem * that here. Since we now have the v_usecount incremented,
165abd80ddbSMateusz Guzik * we should be ok until we vrele() it, if the VIRF_DOOMED
1669ec7b004SRick Macklem * flag isn't set now.
1679ec7b004SRick Macklem */
1689ec7b004SRick Macklem VI_LOCK(nvp);
169abd80ddbSMateusz Guzik if (VN_IS_DOOMED(nvp)) {
1709ec7b004SRick Macklem VI_UNLOCK(nvp);
1719ec7b004SRick Macklem vrele(nvp);
1729ec7b004SRick Macklem error = ENOENT;
1739ec7b004SRick Macklem } else {
1749ec7b004SRick Macklem VI_UNLOCK(nvp);
1759ec7b004SRick Macklem }
1769ec7b004SRick Macklem }
1779ec7b004SRick Macklem if (error) {
178222daa42SConrad Meyer free(nfhp, M_NFSFH);
1799ec7b004SRick Macklem return (error);
1809ec7b004SRick Macklem }
1819ec7b004SRick Macklem if (nvp != NULL) {
1829ec7b004SRick Macklem np = VTONFS(nvp);
1839ec7b004SRick Macklem /*
1849ec7b004SRick Macklem * For NFSv4, check to see if it is the same name and
1859ec7b004SRick Macklem * replace the name, if it is different.
1869ec7b004SRick Macklem */
1879ec7b004SRick Macklem oldd = newd = NULL;
1889ec7b004SRick Macklem if ((nmp->nm_flag & NFSMNT_NFSV4) && np->n_v4 != NULL &&
1899ec7b004SRick Macklem nvp->v_type == VREG &&
1909ec7b004SRick Macklem (np->n_v4->n4_namelen != cnp->cn_namelen ||
1919ec7b004SRick Macklem NFSBCMP(cnp->cn_nameptr, NFS4NODENAME(np->n_v4),
1929ec7b004SRick Macklem cnp->cn_namelen) ||
1939ec7b004SRick Macklem dnp->n_fhp->nfh_len != np->n_v4->n4_fhlen ||
1949ec7b004SRick Macklem NFSBCMP(dnp->n_fhp->nfh_fh, np->n_v4->n4_data,
1959ec7b004SRick Macklem dnp->n_fhp->nfh_len))) {
196222daa42SConrad Meyer newd = malloc(
1979ec7b004SRick Macklem sizeof (struct nfsv4node) + dnp->n_fhp->nfh_len +
1989ec7b004SRick Macklem + cnp->cn_namelen - 1, M_NFSV4NODE, M_WAITOK);
1999ec7b004SRick Macklem NFSLOCKNODE(np);
2009ec7b004SRick Macklem if (newd != NULL && np->n_v4 != NULL && nvp->v_type == VREG
2019ec7b004SRick Macklem && (np->n_v4->n4_namelen != cnp->cn_namelen ||
2029ec7b004SRick Macklem NFSBCMP(cnp->cn_nameptr, NFS4NODENAME(np->n_v4),
2039ec7b004SRick Macklem cnp->cn_namelen) ||
2049ec7b004SRick Macklem dnp->n_fhp->nfh_len != np->n_v4->n4_fhlen ||
2059ec7b004SRick Macklem NFSBCMP(dnp->n_fhp->nfh_fh, np->n_v4->n4_data,
2069ec7b004SRick Macklem dnp->n_fhp->nfh_len))) {
2079ec7b004SRick Macklem oldd = np->n_v4;
2089ec7b004SRick Macklem np->n_v4 = newd;
2099ec7b004SRick Macklem newd = NULL;
2109ec7b004SRick Macklem np->n_v4->n4_fhlen = dnp->n_fhp->nfh_len;
2119ec7b004SRick Macklem np->n_v4->n4_namelen = cnp->cn_namelen;
2129ec7b004SRick Macklem NFSBCOPY(dnp->n_fhp->nfh_fh, np->n_v4->n4_data,
2139ec7b004SRick Macklem dnp->n_fhp->nfh_len);
2149ec7b004SRick Macklem NFSBCOPY(cnp->cn_nameptr, NFS4NODENAME(np->n_v4),
2159ec7b004SRick Macklem cnp->cn_namelen);
2169ec7b004SRick Macklem }
2179ec7b004SRick Macklem NFSUNLOCKNODE(np);
2189ec7b004SRick Macklem }
2199ec7b004SRick Macklem if (newd != NULL)
220222daa42SConrad Meyer free(newd, M_NFSV4NODE);
2219ec7b004SRick Macklem if (oldd != NULL)
222222daa42SConrad Meyer free(oldd, M_NFSV4NODE);
2239ec7b004SRick Macklem *npp = np;
224222daa42SConrad Meyer free(nfhp, M_NFSFH);
2259ec7b004SRick Macklem return (0);
2269ec7b004SRick Macklem }
2279ec7b004SRick Macklem np = uma_zalloc(newnfsnode_zone, M_WAITOK | M_ZERO);
2289ec7b004SRick Macklem
22943a993bbSKirk McKusick error = getnewvnode(nfs_vnode_tag, mntp, &newnfs_vnodeops, &nvp);
2309ec7b004SRick Macklem if (error) {
2319ec7b004SRick Macklem uma_zfree(newnfsnode_zone, np);
232222daa42SConrad Meyer free(nfhp, M_NFSFH);
2339ec7b004SRick Macklem return (error);
2349ec7b004SRick Macklem }
2359ec7b004SRick Macklem vp = nvp;
2367f763fc3SRick Macklem KASSERT(vp->v_bufobj.bo_bsize != 0, ("nfscl_nget: bo_bsize == 0"));
2379ec7b004SRick Macklem vp->v_data = np;
2389ec7b004SRick Macklem np->n_vnode = vp;
2399ec7b004SRick Macklem /*
2409ec7b004SRick Macklem * Initialize the mutex even if the vnode is going to be a loser.
2419ec7b004SRick Macklem * This simplifies the logic in reclaim, which can then unconditionally
2429ec7b004SRick Macklem * destroy the mutex (in the case of the loser, or if hash_insert
2439ec7b004SRick Macklem * happened to return an error no special casing is needed).
2449ec7b004SRick Macklem */
2459ec7b004SRick Macklem mtx_init(&np->n_mtx, "NEWNFSnode lock", NULL, MTX_DEF | MTX_DUPOK);
246e5cffdd3SKonstantin Belousov lockinit(&np->n_excl, PVFS, "nfsupg", VLKTIMEOUT, LK_NOSHARE |
247e5cffdd3SKonstantin Belousov LK_CANRECURSE);
2489ec7b004SRick Macklem
2499ec7b004SRick Macklem /*
2509ec7b004SRick Macklem * Are we getting the root? If so, make sure the vnode flags
2519ec7b004SRick Macklem * are correct
2529ec7b004SRick Macklem */
253896516e5SRick Macklem if (nfhp->nfh_len == NFSX_FHMAX + 1 ||
254896516e5SRick Macklem (nfhp->nfh_len == nmp->nm_fhsize &&
255896516e5SRick Macklem !bcmp(nfhp->nfh_fh, nmp->nm_fh, nfhp->nfh_len))) {
2569ec7b004SRick Macklem if (vp->v_type == VNON)
2579ec7b004SRick Macklem vp->v_type = VDIR;
2589ec7b004SRick Macklem vp->v_vflag |= VV_ROOT;
2599ec7b004SRick Macklem }
2609ec7b004SRick Macklem
261c6ba06d8SKonstantin Belousov vp->v_vflag |= VV_VMSIZEVNLOCK;
262c6ba06d8SKonstantin Belousov
2639ec7b004SRick Macklem np->n_fhp = nfhp;
2649ec7b004SRick Macklem /*
265*196787f7SRick Macklem * For NFSv4.0, we have to attach the directory file handle and
2669ec7b004SRick Macklem * file name, so that Open Ops can be done later.
2679ec7b004SRick Macklem */
268*196787f7SRick Macklem if (NFSHASNFSV4(nmp) && !NFSHASNFSV4N(nmp)) {
269222daa42SConrad Meyer np->n_v4 = malloc(sizeof (struct nfsv4node)
2709ec7b004SRick Macklem + dnp->n_fhp->nfh_len + cnp->cn_namelen - 1, M_NFSV4NODE,
2719ec7b004SRick Macklem M_WAITOK);
2729ec7b004SRick Macklem np->n_v4->n4_fhlen = dnp->n_fhp->nfh_len;
2739ec7b004SRick Macklem np->n_v4->n4_namelen = cnp->cn_namelen;
2749ec7b004SRick Macklem NFSBCOPY(dnp->n_fhp->nfh_fh, np->n_v4->n4_data,
2759ec7b004SRick Macklem dnp->n_fhp->nfh_len);
2769ec7b004SRick Macklem NFSBCOPY(cnp->cn_nameptr, NFS4NODENAME(np->n_v4),
2779ec7b004SRick Macklem cnp->cn_namelen);
2789ec7b004SRick Macklem } else {
2799ec7b004SRick Macklem np->n_v4 = NULL;
2809ec7b004SRick Macklem }
2819ec7b004SRick Macklem
2829ec7b004SRick Macklem /*
2839ec7b004SRick Macklem * NFS supports recursive and shared locking.
2849ec7b004SRick Macklem */
2853634d5b2SJohn Baldwin lockmgr(vp->v_vnlock, LK_EXCLUSIVE | LK_NOWITNESS, NULL);
2869ec7b004SRick Macklem VN_LOCK_AREC(vp);
2879ec7b004SRick Macklem VN_LOCK_ASHARE(vp);
2889ec7b004SRick Macklem error = insmntque(vp, mntp);
2899ec7b004SRick Macklem if (error != 0) {
2909ec7b004SRick Macklem *npp = NULL;
2919ec7b004SRick Macklem mtx_destroy(&np->n_mtx);
292e5cffdd3SKonstantin Belousov lockdestroy(&np->n_excl);
293222daa42SConrad Meyer free(nfhp, M_NFSFH);
2949ec7b004SRick Macklem if (np->n_v4 != NULL)
295222daa42SConrad Meyer free(np->n_v4, M_NFSV4NODE);
2969ec7b004SRick Macklem uma_zfree(newnfsnode_zone, np);
2979ec7b004SRick Macklem return (error);
2989ec7b004SRick Macklem }
299829f0bcbSMateusz Guzik vn_set_state(vp, VSTATE_CONSTRUCTED);
3004b3a38ecSRick Macklem error = vfs_hash_insert(vp, hash, lkflags,
3019ec7b004SRick Macklem td, &nvp, newnfs_vncmpf, nfhp);
3029ec7b004SRick Macklem if (error)
3039ec7b004SRick Macklem return (error);
3049ec7b004SRick Macklem if (nvp != NULL) {
3059ec7b004SRick Macklem *npp = VTONFS(nvp);
3069ec7b004SRick Macklem /* vfs_hash_insert() vput()'s the losing vnode */
3079ec7b004SRick Macklem return (0);
3089ec7b004SRick Macklem }
3099ec7b004SRick Macklem *npp = np;
3109ec7b004SRick Macklem
3119ec7b004SRick Macklem return (0);
3129ec7b004SRick Macklem }
3139ec7b004SRick Macklem
3149ec7b004SRick Macklem /*
315b6a60ae7SKonstantin Belousov * Another variant of nfs_nget(). This one is only used by reopen. It
3169ec7b004SRick Macklem * takes almost the same args as nfs_nget(), but only succeeds if an entry
3179ec7b004SRick Macklem * exists in the cache. (Since files should already be "open" with a
3189ec7b004SRick Macklem * vnode ref cnt on the node when reopen calls this, it should always
3199ec7b004SRick Macklem * succeed.)
3209ec7b004SRick Macklem * Also, don't get a vnode lock, since it may already be locked by some
3219ec7b004SRick Macklem * other process that is handling it. This is ok, since all other threads
3229ec7b004SRick Macklem * on the client are blocked by the nfsc_lock being exclusively held by the
3239ec7b004SRick Macklem * caller of this function.
3249ec7b004SRick Macklem */
3259ec7b004SRick Macklem int
nfscl_ngetreopen(struct mount * mntp,u_int8_t * fhp,int fhsize,struct thread * td,struct nfsnode ** npp)3269ec7b004SRick Macklem nfscl_ngetreopen(struct mount *mntp, u_int8_t *fhp, int fhsize,
3279ec7b004SRick Macklem struct thread *td, struct nfsnode **npp)
3289ec7b004SRick Macklem {
3299ec7b004SRick Macklem struct vnode *nvp;
3309ec7b004SRick Macklem u_int hash;
3319ec7b004SRick Macklem struct nfsfh *nfhp;
3329ec7b004SRick Macklem int error;
3339ec7b004SRick Macklem
3349ec7b004SRick Macklem *npp = NULL;
3359ec7b004SRick Macklem /* For forced dismounts, just return error. */
33616f300faSRick Macklem if (NFSCL_FORCEDISM(mntp))
3379ec7b004SRick Macklem return (EINTR);
338222daa42SConrad Meyer nfhp = malloc(sizeof (struct nfsfh) + fhsize,
3399ec7b004SRick Macklem M_NFSFH, M_WAITOK);
3409ec7b004SRick Macklem bcopy(fhp, &nfhp->nfh_fh[0], fhsize);
3419ec7b004SRick Macklem nfhp->nfh_len = fhsize;
3429ec7b004SRick Macklem
3439ec7b004SRick Macklem hash = fnv_32_buf(fhp, fhsize, FNV1_32_INIT);
3449ec7b004SRick Macklem
3459ec7b004SRick Macklem /*
3469ec7b004SRick Macklem * First, try to get the vnode locked, but don't block for the lock.
3479ec7b004SRick Macklem */
3489ec7b004SRick Macklem error = vfs_hash_get(mntp, hash, (LK_EXCLUSIVE | LK_NOWAIT), td, &nvp,
3499ec7b004SRick Macklem newnfs_vncmpf, nfhp);
3509ec7b004SRick Macklem if (error == 0 && nvp != NULL) {
351b249ce48SMateusz Guzik NFSVOPUNLOCK(nvp);
3529ec7b004SRick Macklem } else if (error == EBUSY) {
3539ec7b004SRick Macklem /*
354b6a60ae7SKonstantin Belousov * It is safe so long as a vflush() with
3559ec7b004SRick Macklem * FORCECLOSE has not been done. Since the Renew thread is
3569ec7b004SRick Macklem * stopped and the MNTK_UNMOUNTF flag is set before doing
3579ec7b004SRick Macklem * a vflush() with FORCECLOSE, we should be ok here.
3589ec7b004SRick Macklem */
35916f300faSRick Macklem if (NFSCL_FORCEDISM(mntp))
3609ec7b004SRick Macklem error = EINTR;
361b6a60ae7SKonstantin Belousov else {
362b6a60ae7SKonstantin Belousov vfs_hash_ref(mntp, hash, td, &nvp, newnfs_vncmpf, nfhp);
363b6a60ae7SKonstantin Belousov if (nvp == NULL) {
364b6a60ae7SKonstantin Belousov error = ENOENT;
365abd80ddbSMateusz Guzik } else if (VN_IS_DOOMED(nvp)) {
366b6a60ae7SKonstantin Belousov error = ENOENT;
367b6a60ae7SKonstantin Belousov vrele(nvp);
368b6a60ae7SKonstantin Belousov } else {
369b6a60ae7SKonstantin Belousov error = 0;
370b6a60ae7SKonstantin Belousov }
371b6a60ae7SKonstantin Belousov }
3729ec7b004SRick Macklem }
373222daa42SConrad Meyer free(nfhp, M_NFSFH);
3749ec7b004SRick Macklem if (error)
3759ec7b004SRick Macklem return (error);
3769ec7b004SRick Macklem if (nvp != NULL) {
3779ec7b004SRick Macklem *npp = VTONFS(nvp);
3789ec7b004SRick Macklem return (0);
3799ec7b004SRick Macklem }
3809ec7b004SRick Macklem return (EINVAL);
3819ec7b004SRick Macklem }
3829ec7b004SRick Macklem
383b5af3f30SConrad Meyer static void
nfscl_warn_fileid(struct nfsmount * nmp,struct nfsvattr * oldnap,struct nfsvattr * newnap)384b5af3f30SConrad Meyer nfscl_warn_fileid(struct nfsmount *nmp, struct nfsvattr *oldnap,
385b5af3f30SConrad Meyer struct nfsvattr *newnap)
386b5af3f30SConrad Meyer {
387b5af3f30SConrad Meyer int off;
388b5af3f30SConrad Meyer
389b5af3f30SConrad Meyer if (ncl_fileid_maxwarnings >= 0 &&
390b5af3f30SConrad Meyer ncl_fileid_nwarnings >= ncl_fileid_maxwarnings)
391b5af3f30SConrad Meyer return;
392b5af3f30SConrad Meyer off = 0;
393b5af3f30SConrad Meyer if (ncl_fileid_maxwarnings >= 0) {
394b5af3f30SConrad Meyer if (++ncl_fileid_nwarnings >= ncl_fileid_maxwarnings)
395b5af3f30SConrad Meyer off = 1;
396b5af3f30SConrad Meyer }
397b5af3f30SConrad Meyer
398b5af3f30SConrad Meyer printf("newnfs: server '%s' error: fileid changed. "
399b5af3f30SConrad Meyer "fsid %jx:%jx: expected fileid %#jx, got %#jx. "
400b5af3f30SConrad Meyer "(BROKEN NFS SERVER OR MIDDLEWARE)\n",
401b5af3f30SConrad Meyer nmp->nm_com.nmcom_hostname,
402b5af3f30SConrad Meyer (uintmax_t)nmp->nm_fsid[0],
403b5af3f30SConrad Meyer (uintmax_t)nmp->nm_fsid[1],
404b5af3f30SConrad Meyer (uintmax_t)oldnap->na_fileid,
405b5af3f30SConrad Meyer (uintmax_t)newnap->na_fileid);
406b5af3f30SConrad Meyer
407b5af3f30SConrad Meyer if (off)
408b5af3f30SConrad Meyer printf("newnfs: Logged %d times about fileid corruption; "
409b5af3f30SConrad Meyer "going quiet to avoid spamming logs excessively. (Limit "
410b5af3f30SConrad Meyer "is: %d).\n", ncl_fileid_nwarnings,
411b5af3f30SConrad Meyer ncl_fileid_maxwarnings);
412b5af3f30SConrad Meyer }
413b5af3f30SConrad Meyer
4148bde6d15SMark Johnston void
ncl_copy_vattr(struct vattr * dst,struct vattr * src)4158bde6d15SMark Johnston ncl_copy_vattr(struct vattr *dst, struct vattr *src)
4168bde6d15SMark Johnston {
4178bde6d15SMark Johnston dst->va_type = src->va_type;
4188bde6d15SMark Johnston dst->va_mode = src->va_mode;
4198bde6d15SMark Johnston dst->va_nlink = src->va_nlink;
4208bde6d15SMark Johnston dst->va_uid = src->va_uid;
4218bde6d15SMark Johnston dst->va_gid = src->va_gid;
4228bde6d15SMark Johnston dst->va_fsid = src->va_fsid;
4238bde6d15SMark Johnston dst->va_fileid = src->va_fileid;
4248bde6d15SMark Johnston dst->va_size = src->va_size;
4258bde6d15SMark Johnston dst->va_blocksize = src->va_blocksize;
4268bde6d15SMark Johnston dst->va_atime = src->va_atime;
4278bde6d15SMark Johnston dst->va_mtime = src->va_mtime;
4288bde6d15SMark Johnston dst->va_ctime = src->va_ctime;
429dd02d9d6SRick Macklem dst->va_birthtime = src->va_birthtime;
4308bde6d15SMark Johnston dst->va_gen = src->va_gen;
4318bde6d15SMark Johnston dst->va_flags = src->va_flags;
4328bde6d15SMark Johnston dst->va_rdev = src->va_rdev;
4338bde6d15SMark Johnston dst->va_bytes = src->va_bytes;
4348bde6d15SMark Johnston dst->va_filerev = src->va_filerev;
4358bde6d15SMark Johnston }
4368bde6d15SMark Johnston
4379ec7b004SRick Macklem /*
4389ec7b004SRick Macklem * Load the attribute cache (that lives in the nfsnode entry) with
4399ec7b004SRick Macklem * the attributes of the second argument and
4409ec7b004SRick Macklem * Iff vaper not NULL
4419ec7b004SRick Macklem * copy the attributes to *vaper
4429ec7b004SRick Macklem * Similar to nfs_loadattrcache(), except the attributes are passed in
4439ec7b004SRick Macklem * instead of being parsed out of the mbuf list.
4449ec7b004SRick Macklem */
4459ec7b004SRick Macklem int
nfscl_loadattrcache(struct vnode ** vpp,struct nfsvattr * nap,void * nvaper,int writeattr,int dontshrink)4469ec7b004SRick Macklem nfscl_loadattrcache(struct vnode **vpp, struct nfsvattr *nap, void *nvaper,
4474ad3423bSRick Macklem int writeattr, int dontshrink)
4489ec7b004SRick Macklem {
4499ec7b004SRick Macklem struct vnode *vp = *vpp;
4509ec7b004SRick Macklem struct vattr *vap, *nvap = &nap->na_vattr, *vaper = nvaper;
4519ec7b004SRick Macklem struct nfsnode *np;
4529ec7b004SRick Macklem struct nfsmount *nmp;
4539ec7b004SRick Macklem struct timespec mtime_save;
4546fd58358SKonstantin Belousov int error, force_fid_err;
45503c81af2SRick Macklem dev_t topfsid;
456b5af3f30SConrad Meyer
457b5af3f30SConrad Meyer error = 0;
4589ec7b004SRick Macklem
4599ec7b004SRick Macklem /*
4609ec7b004SRick Macklem * If v_type == VNON it is a new node, so fill in the v_type,
4619ec7b004SRick Macklem * n_mtime fields. Check to see if it represents a special
4629ec7b004SRick Macklem * device, and if so, check for a possible alias. Once the
4639ec7b004SRick Macklem * correct vnode has been obtained, fill in the rest of the
4649ec7b004SRick Macklem * information.
4659ec7b004SRick Macklem */
4669ec7b004SRick Macklem np = VTONFS(vp);
4679ec7b004SRick Macklem NFSLOCKNODE(np);
4689ec7b004SRick Macklem if (vp->v_type != nvap->va_type) {
4699ec7b004SRick Macklem vp->v_type = nvap->va_type;
4709ec7b004SRick Macklem if (vp->v_type == VFIFO)
4719ec7b004SRick Macklem vp->v_op = &newnfs_fifoops;
4729ec7b004SRick Macklem np->n_mtime = nvap->va_mtime;
4739ec7b004SRick Macklem }
4749ec7b004SRick Macklem nmp = VFSTONFS(vp->v_mount);
4759ec7b004SRick Macklem vap = &np->n_vattr.na_vattr;
4769ec7b004SRick Macklem mtime_save = vap->va_mtime;
4779ec7b004SRick Macklem if (writeattr) {
4789ec7b004SRick Macklem np->n_vattr.na_filerev = nap->na_filerev;
4799ec7b004SRick Macklem np->n_vattr.na_size = nap->na_size;
4809ec7b004SRick Macklem np->n_vattr.na_mtime = nap->na_mtime;
4819ec7b004SRick Macklem np->n_vattr.na_ctime = nap->na_ctime;
482dd02d9d6SRick Macklem np->n_vattr.na_btime = nap->na_btime;
4839ec7b004SRick Macklem np->n_vattr.na_fsid = nap->na_fsid;
4844875024bSRick Macklem np->n_vattr.na_mode = nap->na_mode;
4859ec7b004SRick Macklem } else {
486b5af3f30SConrad Meyer force_fid_err = 0;
487b5af3f30SConrad Meyer KFAIL_POINT_ERROR(DEBUG_FP, nfscl_force_fileid_warning,
488b5af3f30SConrad Meyer force_fid_err);
489b5af3f30SConrad Meyer /*
490b5af3f30SConrad Meyer * BROKEN NFS SERVER OR MIDDLEWARE
491b5af3f30SConrad Meyer *
492b5af3f30SConrad Meyer * Certain NFS servers (certain old proprietary filers ca.
493b5af3f30SConrad Meyer * 2006) or broken middleboxes (e.g. WAN accelerator products)
494b5af3f30SConrad Meyer * will respond to GETATTR requests with results for a
495b5af3f30SConrad Meyer * different fileid.
496b5af3f30SConrad Meyer *
497b5af3f30SConrad Meyer * The WAN accelerator we've observed not only serves stale
498b5af3f30SConrad Meyer * cache results for a given file, it also occasionally serves
499b5af3f30SConrad Meyer * results for wholly different files. This causes surprising
500b5af3f30SConrad Meyer * problems; for example the cached size attribute of a file
501b5af3f30SConrad Meyer * may truncate down and then back up, resulting in zero
502b5af3f30SConrad Meyer * regions in file contents read by applications. We observed
503b5af3f30SConrad Meyer * this reliably with Clang and .c files during parallel build.
504b5af3f30SConrad Meyer * A pcap revealed packet fragmentation and GETATTR RPC
505b5af3f30SConrad Meyer * responses with wholly wrong fileids.
506896516e5SRick Macklem * For the case where the file handle is a fake one
507896516e5SRick Macklem * generated via the "syskrb5" mount option and
508896516e5SRick Macklem * the old fileid is 2, ignore the test, since this might
509896516e5SRick Macklem * be replacing the fake attributes with correct ones.
510b5af3f30SConrad Meyer */
511b5af3f30SConrad Meyer if ((np->n_vattr.na_fileid != 0 &&
512896516e5SRick Macklem np->n_vattr.na_fileid != nap->na_fileid &&
513896516e5SRick Macklem (np->n_vattr.na_fileid != 2 || !NFSHASSYSKRB5(nmp) ||
514896516e5SRick Macklem np->n_fhp->nfh_len != NFSX_FHMAX + 1)) ||
515b5af3f30SConrad Meyer force_fid_err) {
516b5af3f30SConrad Meyer nfscl_warn_fileid(nmp, &np->n_vattr, nap);
517b5af3f30SConrad Meyer error = EIDRM;
518b5af3f30SConrad Meyer goto out;
519b5af3f30SConrad Meyer }
5209ec7b004SRick Macklem NFSBCOPY((caddr_t)nap, (caddr_t)&np->n_vattr,
5219ec7b004SRick Macklem sizeof (struct nfsvattr));
5229ec7b004SRick Macklem }
5239ec7b004SRick Macklem
5249ec7b004SRick Macklem /*
52503c81af2SRick Macklem * For NFSv4, the server's export may be a tree of file systems
52603c81af2SRick Macklem * where a fileno is a unique value within each file system.
52703c81af2SRick Macklem * na_filesid[0,1] uniquely identify the server file system
52803c81af2SRick Macklem * and nm_fsid[0,1] is the value for the root file system mounted.
52903c81af2SRick Macklem * As such, the value of va_fsid generated by vn_fsid() represents
53003c81af2SRick Macklem * the root file system on the server and a different value for
53103c81af2SRick Macklem * va_fsid is needed for the other server file systems. This
53203c81af2SRick Macklem * va_fsid is ideally unique for all of the server file systems,
53303c81af2SRick Macklem * so a 64bit hash on na_filesid[0,1] is calculated.
53403c81af2SRick Macklem * Although highly unlikely that the fnv_64_hash() will be
53503c81af2SRick Macklem * the same as the root, test for this case and recalculate the hash.
5369ec7b004SRick Macklem */
53703c81af2SRick Macklem vn_fsid(vp, vap);
5383707cf89SRick Macklem if (NFSHASNFSV4(nmp) && NFSHASHASSETFSID(nmp) &&
5399ec7b004SRick Macklem (nmp->nm_fsid[0] != np->n_vattr.na_filesid[0] ||
5403707cf89SRick Macklem nmp->nm_fsid[1] != np->n_vattr.na_filesid[1])) {
54103c81af2SRick Macklem topfsid = vap->va_fsid;
54203c81af2SRick Macklem vap->va_fsid = FNV1_64_INIT;
54303c81af2SRick Macklem do {
54403c81af2SRick Macklem vap->va_fsid = fnv_64_buf(np->n_vattr.na_filesid,
54503c81af2SRick Macklem sizeof(np->n_vattr.na_filesid), vap->va_fsid);
54603c81af2SRick Macklem } while (vap->va_fsid == topfsid);
54703c81af2SRick Macklem }
54803c81af2SRick Macklem
5499ec7b004SRick Macklem np->n_attrstamp = time_second;
5509ec7b004SRick Macklem if (vap->va_size != np->n_size) {
5519ec7b004SRick Macklem if (vap->va_type == VREG) {
5529ec7b004SRick Macklem if (dontshrink && vap->va_size < np->n_size) {
5539ec7b004SRick Macklem /*
5549ec7b004SRick Macklem * We've been told not to shrink the file;
5559ec7b004SRick Macklem * zero np->n_attrstamp to indicate that
5569ec7b004SRick Macklem * the attributes are stale.
5579ec7b004SRick Macklem */
5586fd58358SKonstantin Belousov vap->va_size = np->n_size;
5599ec7b004SRick Macklem np->n_attrstamp = 0;
5608f0e65c9SRick Macklem KDTRACE_NFS_ATTRCACHE_FLUSH_DONE(vp);
5619ec7b004SRick Macklem } else if (np->n_flag & NMODIFIED) {
5629ec7b004SRick Macklem /*
5639ec7b004SRick Macklem * We've modified the file: Use the larger
5649ec7b004SRick Macklem * of our size, and the server's size.
5659ec7b004SRick Macklem */
5669ec7b004SRick Macklem if (vap->va_size < np->n_size) {
5679ec7b004SRick Macklem vap->va_size = np->n_size;
5689ec7b004SRick Macklem } else {
5699ec7b004SRick Macklem np->n_size = vap->va_size;
5709ec7b004SRick Macklem np->n_flag |= NSIZECHANGED;
5719ec7b004SRick Macklem }
5729ec7b004SRick Macklem } else {
5736fd58358SKonstantin Belousov np->n_size = vap->va_size;
5749ec7b004SRick Macklem np->n_flag |= NSIZECHANGED;
5759ec7b004SRick Macklem }
576734b03c3SRick Macklem } else {
577734b03c3SRick Macklem np->n_size = vap->va_size;
5787157d8f7SKonstantin Belousov }
5799ec7b004SRick Macklem }
5809ec7b004SRick Macklem /*
5819ec7b004SRick Macklem * The following checks are added to prevent a race between (say)
5829ec7b004SRick Macklem * a READDIR+ and a WRITE.
5839ec7b004SRick Macklem * READDIR+, WRITE requests sent out.
5849ec7b004SRick Macklem * READDIR+ resp, WRITE resp received on client.
5859ec7b004SRick Macklem * However, the WRITE resp was handled before the READDIR+ resp
5869ec7b004SRick Macklem * causing the post op attrs from the write to be loaded first
5879ec7b004SRick Macklem * and the attrs from the READDIR+ to be loaded later. If this
5889ec7b004SRick Macklem * happens, we have stale attrs loaded into the attrcache.
5899ec7b004SRick Macklem * We detect this by for the mtime moving back. We invalidate the
5909ec7b004SRick Macklem * attrcache when this happens.
5919ec7b004SRick Macklem */
5928f0e65c9SRick Macklem if (timespeccmp(&mtime_save, &vap->va_mtime, >)) {
5939ec7b004SRick Macklem /* Size changed or mtime went backwards */
5949ec7b004SRick Macklem np->n_attrstamp = 0;
5958f0e65c9SRick Macklem KDTRACE_NFS_ATTRCACHE_FLUSH_DONE(vp);
5968f0e65c9SRick Macklem }
5979ec7b004SRick Macklem if (vaper != NULL) {
5988bde6d15SMark Johnston ncl_copy_vattr(vaper, vap);
5999ec7b004SRick Macklem if (np->n_flag & NCHG) {
6009ec7b004SRick Macklem if (np->n_flag & NACC)
6019ec7b004SRick Macklem vaper->va_atime = np->n_atim;
6029ec7b004SRick Macklem if (np->n_flag & NUPD)
6039ec7b004SRick Macklem vaper->va_mtime = np->n_mtim;
6049ec7b004SRick Macklem }
6059ec7b004SRick Macklem }
606b5af3f30SConrad Meyer
607b5af3f30SConrad Meyer out:
6088f0e65c9SRick Macklem #ifdef KDTRACE_HOOKS
6098f0e65c9SRick Macklem if (np->n_attrstamp != 0)
610b5af3f30SConrad Meyer KDTRACE_NFS_ATTRCACHE_LOAD_DONE(vp, vap, error);
6118f0e65c9SRick Macklem #endif
612c6ba06d8SKonstantin Belousov (void)ncl_pager_setsize(vp, NULL);
613c6ba06d8SKonstantin Belousov return (error);
614c6ba06d8SKonstantin Belousov }
615c6ba06d8SKonstantin Belousov
616c6ba06d8SKonstantin Belousov /*
617c6ba06d8SKonstantin Belousov * Call vnode_pager_setsize() if the size of the node changed, as
618c6ba06d8SKonstantin Belousov * recorded in nfsnode vs. v_object, or delay the call if notifying
619c6ba06d8SKonstantin Belousov * the pager is not possible at the moment.
620c6ba06d8SKonstantin Belousov *
621c6ba06d8SKonstantin Belousov * If nsizep is non-NULL, the call is delayed and the new node size is
622c6ba06d8SKonstantin Belousov * provided. Caller should itself call vnode_pager_setsize() if
623c6ba06d8SKonstantin Belousov * function returned true. If nsizep is NULL, function tries to call
624c6ba06d8SKonstantin Belousov * vnode_pager_setsize() itself if needed and possible, and the nfs
625c6ba06d8SKonstantin Belousov * node is unlocked unconditionally, the return value is not useful.
626c6ba06d8SKonstantin Belousov */
627c6ba06d8SKonstantin Belousov bool
ncl_pager_setsize(struct vnode * vp,u_quad_t * nsizep)628c6ba06d8SKonstantin Belousov ncl_pager_setsize(struct vnode *vp, u_quad_t *nsizep)
629c6ba06d8SKonstantin Belousov {
630c6ba06d8SKonstantin Belousov struct nfsnode *np;
631c6ba06d8SKonstantin Belousov vm_object_t object;
632c6ba06d8SKonstantin Belousov struct vattr *vap;
633c6ba06d8SKonstantin Belousov u_quad_t nsize;
634c6ba06d8SKonstantin Belousov bool setnsize;
635c6ba06d8SKonstantin Belousov
636c6ba06d8SKonstantin Belousov np = VTONFS(vp);
637c6ba06d8SKonstantin Belousov NFSASSERTNODE(np);
638c6ba06d8SKonstantin Belousov
639c6ba06d8SKonstantin Belousov vap = &np->n_vattr.na_vattr;
6406fd58358SKonstantin Belousov nsize = vap->va_size;
6416fd58358SKonstantin Belousov object = vp->v_object;
6426fd58358SKonstantin Belousov setnsize = false;
643c6ba06d8SKonstantin Belousov
644c6ba06d8SKonstantin Belousov if (object != NULL && nsize != object->un_pager.vnp.vnp_size) {
6450ff51c98SKonstantin Belousov if (VOP_ISLOCKED(vp) == LK_EXCLUSIVE &&
6460ff51c98SKonstantin Belousov (curthread->td_pflags2 & TDP2_SBPAGES) == 0)
6476fd58358SKonstantin Belousov setnsize = true;
648c6ba06d8SKonstantin Belousov else
649c6ba06d8SKonstantin Belousov np->n_flag |= NVNSETSZSKIP;
6506fd58358SKonstantin Belousov }
651c6ba06d8SKonstantin Belousov if (nsizep == NULL) {
6529ec7b004SRick Macklem NFSUNLOCKNODE(np);
6537157d8f7SKonstantin Belousov if (setnsize)
6547157d8f7SKonstantin Belousov vnode_pager_setsize(vp, nsize);
655c6ba06d8SKonstantin Belousov setnsize = false;
656c6ba06d8SKonstantin Belousov } else {
657c6ba06d8SKonstantin Belousov *nsizep = nsize;
658c6ba06d8SKonstantin Belousov }
659c6ba06d8SKonstantin Belousov return (setnsize);
6609ec7b004SRick Macklem }
6619ec7b004SRick Macklem
6629ec7b004SRick Macklem /*
6639ec7b004SRick Macklem * Fill in the client id name. For these bytes:
6649ec7b004SRick Macklem * 1 - they must be unique
6659ec7b004SRick Macklem * 2 - they should be persistent across client reboots
6669ec7b004SRick Macklem * 1 is more critical than 2
6679ec7b004SRick Macklem * Use the mount point's unique id plus either the uuid or, if that
6689ec7b004SRick Macklem * isn't set, random junk.
6699ec7b004SRick Macklem */
6709ec7b004SRick Macklem void
nfscl_fillclid(u_int64_t clval,char * uuid,u_int8_t * cp,u_int16_t idlen)6719ec7b004SRick Macklem nfscl_fillclid(u_int64_t clval, char *uuid, u_int8_t *cp, u_int16_t idlen)
6729ec7b004SRick Macklem {
6739ec7b004SRick Macklem int uuidlen;
6749ec7b004SRick Macklem
6759ec7b004SRick Macklem /*
6769ec7b004SRick Macklem * First, put in the 64bit mount point identifier.
6779ec7b004SRick Macklem */
6789ec7b004SRick Macklem if (idlen >= sizeof (u_int64_t)) {
6799ec7b004SRick Macklem NFSBCOPY((caddr_t)&clval, cp, sizeof (u_int64_t));
6809ec7b004SRick Macklem cp += sizeof (u_int64_t);
6819ec7b004SRick Macklem idlen -= sizeof (u_int64_t);
6829ec7b004SRick Macklem }
6839ec7b004SRick Macklem
6849ec7b004SRick Macklem /*
6859ec7b004SRick Macklem * If uuid is non-zero length, use it.
6869ec7b004SRick Macklem */
6879ec7b004SRick Macklem uuidlen = strlen(uuid);
6889ec7b004SRick Macklem if (uuidlen > 0 && idlen >= uuidlen) {
6899ec7b004SRick Macklem NFSBCOPY(uuid, cp, uuidlen);
6909ec7b004SRick Macklem cp += uuidlen;
6919ec7b004SRick Macklem idlen -= uuidlen;
6929ec7b004SRick Macklem }
6939ec7b004SRick Macklem
6949ec7b004SRick Macklem /*
6959ec7b004SRick Macklem * This only normally happens if the uuid isn't set.
6969ec7b004SRick Macklem */
6979ec7b004SRick Macklem while (idlen > 0) {
6989ec7b004SRick Macklem *cp++ = (u_int8_t)(arc4random() % 256);
6999ec7b004SRick Macklem idlen--;
7009ec7b004SRick Macklem }
7019ec7b004SRick Macklem }
7029ec7b004SRick Macklem
7039ec7b004SRick Macklem /*
7049ec7b004SRick Macklem * Fill in a lock owner name. For now, pid + the process's creation time.
7059ec7b004SRick Macklem */
7069ec7b004SRick Macklem void
nfscl_filllockowner(void * id,u_int8_t * cp,int flags)707f8f4e256SRick Macklem nfscl_filllockowner(void *id, u_int8_t *cp, int flags)
7089ec7b004SRick Macklem {
7099ec7b004SRick Macklem union {
7109ec7b004SRick Macklem u_int32_t lval;
7119ec7b004SRick Macklem u_int8_t cval[4];
7129ec7b004SRick Macklem } tl;
7139ec7b004SRick Macklem struct proc *p;
7149ec7b004SRick Macklem
715f8f4e256SRick Macklem if (id == NULL) {
716037a2012SRick Macklem /* Return the single open_owner of all 0 bytes. */
717f8f4e256SRick Macklem bzero(cp, NFSV4CL_LOCKNAMELEN);
7189ec7b004SRick Macklem return;
7199ec7b004SRick Macklem }
720f8f4e256SRick Macklem if ((flags & F_POSIX) != 0) {
721f8f4e256SRick Macklem p = (struct proc *)id;
7229ec7b004SRick Macklem tl.lval = p->p_pid;
7239ec7b004SRick Macklem *cp++ = tl.cval[0];
7249ec7b004SRick Macklem *cp++ = tl.cval[1];
7259ec7b004SRick Macklem *cp++ = tl.cval[2];
7269ec7b004SRick Macklem *cp++ = tl.cval[3];
7279ec7b004SRick Macklem tl.lval = p->p_stats->p_start.tv_sec;
7289ec7b004SRick Macklem *cp++ = tl.cval[0];
7299ec7b004SRick Macklem *cp++ = tl.cval[1];
7309ec7b004SRick Macklem *cp++ = tl.cval[2];
7319ec7b004SRick Macklem *cp++ = tl.cval[3];
7329ec7b004SRick Macklem tl.lval = p->p_stats->p_start.tv_usec;
7339ec7b004SRick Macklem *cp++ = tl.cval[0];
7349ec7b004SRick Macklem *cp++ = tl.cval[1];
7359ec7b004SRick Macklem *cp++ = tl.cval[2];
7369ec7b004SRick Macklem *cp = tl.cval[3];
737fb35711dSRick Macklem } else if ((flags & F_FLOCK) != 0) {
738fb35711dSRick Macklem bcopy(&id, cp, sizeof(id));
739fb35711dSRick Macklem bzero(&cp[sizeof(id)], NFSV4CL_LOCKNAMELEN - sizeof(id));
740f8f4e256SRick Macklem } else {
741fb35711dSRick Macklem printf("nfscl_filllockowner: not F_POSIX or F_FLOCK\n");
742f8f4e256SRick Macklem bzero(cp, NFSV4CL_LOCKNAMELEN);
743f8f4e256SRick Macklem }
7449ec7b004SRick Macklem }
7459ec7b004SRick Macklem
7469ec7b004SRick Macklem /*
7479ec7b004SRick Macklem * Find the parent process for the thread passed in as an argument.
7489ec7b004SRick Macklem * If none exists, return NULL, otherwise return a thread for the parent.
7499ec7b004SRick Macklem * (Can be any of the threads, since it is only used for td->td_proc.)
7509ec7b004SRick Macklem */
7519ec7b004SRick Macklem NFSPROC_T *
nfscl_getparent(struct thread * td)7529ec7b004SRick Macklem nfscl_getparent(struct thread *td)
7539ec7b004SRick Macklem {
7549ec7b004SRick Macklem struct proc *p;
7559ec7b004SRick Macklem struct thread *ptd;
7569ec7b004SRick Macklem
7579ec7b004SRick Macklem if (td == NULL)
7589ec7b004SRick Macklem return (NULL);
7599ec7b004SRick Macklem p = td->td_proc;
7609ec7b004SRick Macklem if (p->p_pid == 0)
7619ec7b004SRick Macklem return (NULL);
7629ec7b004SRick Macklem p = p->p_pptr;
7639ec7b004SRick Macklem if (p == NULL)
7649ec7b004SRick Macklem return (NULL);
7659ec7b004SRick Macklem ptd = TAILQ_FIRST(&p->p_threads);
7669ec7b004SRick Macklem return (ptd);
7679ec7b004SRick Macklem }
7689ec7b004SRick Macklem
7699ec7b004SRick Macklem /*
7709ec7b004SRick Macklem * Start up the renew kernel thread.
7719ec7b004SRick Macklem */
7729ec7b004SRick Macklem static void
start_nfscl(void * arg)7739ec7b004SRick Macklem start_nfscl(void *arg)
7749ec7b004SRick Macklem {
7759ec7b004SRick Macklem struct nfsclclient *clp;
7769ec7b004SRick Macklem struct thread *td;
7779ec7b004SRick Macklem
7789ec7b004SRick Macklem clp = (struct nfsclclient *)arg;
7799ec7b004SRick Macklem td = TAILQ_FIRST(&clp->nfsc_renewthread->p_threads);
7809ec7b004SRick Macklem nfscl_renewthread(clp, td);
7819ec7b004SRick Macklem kproc_exit(0);
7829ec7b004SRick Macklem }
7839ec7b004SRick Macklem
7849ec7b004SRick Macklem void
nfscl_start_renewthread(struct nfsclclient * clp)7859ec7b004SRick Macklem nfscl_start_renewthread(struct nfsclclient *clp)
7869ec7b004SRick Macklem {
7879ec7b004SRick Macklem
7889ec7b004SRick Macklem kproc_create(start_nfscl, (void *)clp, &clp->nfsc_renewthread, 0, 0,
7899ec7b004SRick Macklem "nfscl");
7909ec7b004SRick Macklem }
7919ec7b004SRick Macklem
7929ec7b004SRick Macklem /*
7939ec7b004SRick Macklem * Handle wcc_data.
7949ec7b004SRick Macklem * For NFSv4, it assumes that nfsv4_wccattr() was used to set up the getattr
7959ec7b004SRick Macklem * as the first Op after PutFH.
7969ec7b004SRick Macklem * (For NFSv4, the postop attributes are after the Op, so they can't be
7979ec7b004SRick Macklem * parsed here. A separate call to nfscl_postop_attr() is required.)
7989ec7b004SRick Macklem */
7999ec7b004SRick Macklem int
nfscl_wcc_data(struct nfsrv_descript * nd,struct vnode * vp,struct nfsvattr * nap,int * flagp,int * wccflagp,uint64_t * repsizep)8009ec7b004SRick Macklem nfscl_wcc_data(struct nfsrv_descript *nd, struct vnode *vp,
80121de450aSRick Macklem struct nfsvattr *nap, int *flagp, int *wccflagp, uint64_t *repsizep)
8029ec7b004SRick Macklem {
8039ec7b004SRick Macklem u_int32_t *tl;
8049ec7b004SRick Macklem struct nfsnode *np = VTONFS(vp);
8059ec7b004SRick Macklem struct nfsvattr nfsva;
8069ec7b004SRick Macklem int error = 0;
8079ec7b004SRick Macklem
8089ec7b004SRick Macklem if (wccflagp != NULL)
8099ec7b004SRick Macklem *wccflagp = 0;
8109ec7b004SRick Macklem if (nd->nd_flag & ND_NFSV3) {
8119ec7b004SRick Macklem *flagp = 0;
8129ec7b004SRick Macklem NFSM_DISSECT(tl, u_int32_t *, NFSX_UNSIGNED);
8139ec7b004SRick Macklem if (*tl == newnfs_true) {
8149ec7b004SRick Macklem NFSM_DISSECT(tl, u_int32_t *, 6 * NFSX_UNSIGNED);
8159ec7b004SRick Macklem if (wccflagp != NULL) {
8165d85e12fSRick Macklem NFSLOCKNODE(np);
8179ec7b004SRick Macklem *wccflagp = (np->n_mtime.tv_sec ==
8189ec7b004SRick Macklem fxdr_unsigned(u_int32_t, *(tl + 2)) &&
8199ec7b004SRick Macklem np->n_mtime.tv_nsec ==
8209ec7b004SRick Macklem fxdr_unsigned(u_int32_t, *(tl + 3)));
8215d85e12fSRick Macklem NFSUNLOCKNODE(np);
8229ec7b004SRick Macklem }
8239ec7b004SRick Macklem }
82438c3cf6aSRick Macklem error = nfscl_postop_attr(nd, nap, flagp);
825ad6eb976SRick Macklem if (wccflagp != NULL && *flagp == 0)
826ad6eb976SRick Macklem *wccflagp = 0;
8279ec7b004SRick Macklem } else if ((nd->nd_flag & (ND_NOMOREDATA | ND_NFSV4 | ND_V4WCCATTR))
8289ec7b004SRick Macklem == (ND_NFSV4 | ND_V4WCCATTR)) {
8299ec7b004SRick Macklem error = nfsv4_loadattr(nd, NULL, &nfsva, NULL,
8309ec7b004SRick Macklem NULL, 0, NULL, NULL, NULL, NULL, NULL, 0,
8319ec7b004SRick Macklem NULL, NULL, NULL, NULL, NULL);
8329ec7b004SRick Macklem if (error)
8339ec7b004SRick Macklem return (error);
8349ec7b004SRick Macklem /*
8359ec7b004SRick Macklem * Get rid of Op# and status for next op.
8369ec7b004SRick Macklem */
8379ec7b004SRick Macklem NFSM_DISSECT(tl, u_int32_t *, 2 * NFSX_UNSIGNED);
8389ec7b004SRick Macklem if (*++tl)
8399ec7b004SRick Macklem nd->nd_flag |= ND_NOMOREDATA;
84021de450aSRick Macklem if (repsizep != NULL)
84121de450aSRick Macklem *repsizep = nfsva.na_size;
8429ec7b004SRick Macklem if (wccflagp != NULL &&
8439ec7b004SRick Macklem nfsva.na_vattr.va_mtime.tv_sec != 0) {
8445d85e12fSRick Macklem NFSLOCKNODE(np);
8459ec7b004SRick Macklem *wccflagp = (np->n_mtime.tv_sec ==
8469ec7b004SRick Macklem nfsva.na_vattr.va_mtime.tv_sec &&
8479ec7b004SRick Macklem np->n_mtime.tv_nsec ==
8489ec7b004SRick Macklem nfsva.na_vattr.va_mtime.tv_sec);
8495d85e12fSRick Macklem NFSUNLOCKNODE(np);
8509ec7b004SRick Macklem }
8519ec7b004SRick Macklem }
8529ec7b004SRick Macklem nfsmout:
8539ec7b004SRick Macklem return (error);
8549ec7b004SRick Macklem }
8559ec7b004SRick Macklem
8569ec7b004SRick Macklem /*
8579ec7b004SRick Macklem * Get postop attributes.
8589ec7b004SRick Macklem */
8599ec7b004SRick Macklem int
nfscl_postop_attr(struct nfsrv_descript * nd,struct nfsvattr * nap,int * retp)86038c3cf6aSRick Macklem nfscl_postop_attr(struct nfsrv_descript *nd, struct nfsvattr *nap, int *retp)
8619ec7b004SRick Macklem {
8629ec7b004SRick Macklem u_int32_t *tl;
8639ec7b004SRick Macklem int error = 0;
8649ec7b004SRick Macklem
8659ec7b004SRick Macklem *retp = 0;
8669ec7b004SRick Macklem if (nd->nd_flag & ND_NOMOREDATA)
8679ec7b004SRick Macklem return (error);
8689ec7b004SRick Macklem if (nd->nd_flag & ND_NFSV3) {
8699ec7b004SRick Macklem NFSM_DISSECT(tl, u_int32_t *, NFSX_UNSIGNED);
8709ec7b004SRick Macklem *retp = fxdr_unsigned(int, *tl);
8719ec7b004SRick Macklem } else if (nd->nd_flag & ND_NFSV4) {
8729ec7b004SRick Macklem /*
8739ec7b004SRick Macklem * For NFSv4, the postop attr are at the end, so no point
8749ec7b004SRick Macklem * in looking if nd_repstat != 0.
8759ec7b004SRick Macklem */
8769ec7b004SRick Macklem if (!nd->nd_repstat) {
8779ec7b004SRick Macklem NFSM_DISSECT(tl, u_int32_t *, 2 * NFSX_UNSIGNED);
8789ec7b004SRick Macklem if (*(tl + 1))
8799ec7b004SRick Macklem /* should never happen since nd_repstat != 0 */
8809ec7b004SRick Macklem nd->nd_flag |= ND_NOMOREDATA;
8819ec7b004SRick Macklem else
8829ec7b004SRick Macklem *retp = 1;
8839ec7b004SRick Macklem }
8849ec7b004SRick Macklem } else if (!nd->nd_repstat) {
8859ec7b004SRick Macklem /* For NFSv2, the attributes are here iff nd_repstat == 0 */
8869ec7b004SRick Macklem *retp = 1;
8879ec7b004SRick Macklem }
8889ec7b004SRick Macklem if (*retp) {
8899ec7b004SRick Macklem error = nfsm_loadattr(nd, nap);
8909ec7b004SRick Macklem if (error)
8919ec7b004SRick Macklem *retp = 0;
8929ec7b004SRick Macklem }
8939ec7b004SRick Macklem nfsmout:
8949ec7b004SRick Macklem return (error);
8959ec7b004SRick Macklem }
8969ec7b004SRick Macklem
8979ec7b004SRick Macklem /*
8989ec7b004SRick Macklem * nfscl_request() - mostly a wrapper for newnfs_request().
8999ec7b004SRick Macklem */
9009ec7b004SRick Macklem int
nfscl_request(struct nfsrv_descript * nd,struct vnode * vp,NFSPROC_T * p,struct ucred * cred)9019ec7b004SRick Macklem nfscl_request(struct nfsrv_descript *nd, struct vnode *vp, NFSPROC_T *p,
9025580e5bdSRick Macklem struct ucred *cred)
9039ec7b004SRick Macklem {
9049ec7b004SRick Macklem int ret, vers;
9059ec7b004SRick Macklem struct nfsmount *nmp;
9069ec7b004SRick Macklem
9079ec7b004SRick Macklem nmp = VFSTONFS(vp->v_mount);
9089ec7b004SRick Macklem if (nd->nd_flag & ND_NFSV4)
9099ec7b004SRick Macklem vers = NFS_VER4;
9109ec7b004SRick Macklem else if (nd->nd_flag & ND_NFSV3)
9119ec7b004SRick Macklem vers = NFS_VER3;
9129ec7b004SRick Macklem else
9139ec7b004SRick Macklem vers = NFS_VER2;
9149ec7b004SRick Macklem ret = newnfs_request(nd, nmp, NULL, &nmp->nm_sockreq, vp, p, cred,
9151f60bfd8SRick Macklem NFS_PROG, vers, NULL, 1, NULL, NULL);
9169ec7b004SRick Macklem return (ret);
9179ec7b004SRick Macklem }
9189ec7b004SRick Macklem
9199ec7b004SRick Macklem /*
9209ec7b004SRick Macklem * fill in this bsden's variant of statfs using nfsstatfs.
9219ec7b004SRick Macklem */
9229ec7b004SRick Macklem void
nfscl_loadsbinfo(struct nfsmount * nmp,struct nfsstatfs * sfp,void * statfs)9239ec7b004SRick Macklem nfscl_loadsbinfo(struct nfsmount *nmp, struct nfsstatfs *sfp, void *statfs)
9249ec7b004SRick Macklem {
9259ec7b004SRick Macklem struct statfs *sbp = (struct statfs *)statfs;
9269ec7b004SRick Macklem
9279ec7b004SRick Macklem if (nmp->nm_flag & (NFSMNT_NFSV3 | NFSMNT_NFSV4)) {
9289ec7b004SRick Macklem sbp->f_bsize = NFS_FABLKSIZE;
929f96712c2SRick Macklem sbp->f_blocks = sfp->sf_tbytes / NFS_FABLKSIZE;
930f96712c2SRick Macklem sbp->f_bfree = sfp->sf_fbytes / NFS_FABLKSIZE;
931f96712c2SRick Macklem /*
932f96712c2SRick Macklem * Although sf_abytes is uint64_t and f_bavail is int64_t,
933f96712c2SRick Macklem * the value after dividing by NFS_FABLKSIZE is small
934f96712c2SRick Macklem * enough that it will fit in 63bits, so it is ok to
935f96712c2SRick Macklem * assign it to f_bavail without fear that it will become
936f96712c2SRick Macklem * negative.
937f96712c2SRick Macklem */
938f96712c2SRick Macklem sbp->f_bavail = sfp->sf_abytes / NFS_FABLKSIZE;
939f96712c2SRick Macklem sbp->f_files = sfp->sf_tfiles;
940f96712c2SRick Macklem /* Since f_ffree is int64_t, clip it to 63bits. */
941f96712c2SRick Macklem if (sfp->sf_ffiles > INT64_MAX)
942f96712c2SRick Macklem sbp->f_ffree = INT64_MAX;
943f96712c2SRick Macklem else
944f96712c2SRick Macklem sbp->f_ffree = sfp->sf_ffiles;
9459ec7b004SRick Macklem } else if ((nmp->nm_flag & NFSMNT_NFSV4) == 0) {
946f96712c2SRick Macklem /*
947f96712c2SRick Macklem * The type casts to (int32_t) ensure that this code is
948f96712c2SRick Macklem * compatible with the old NFS client, in that it will
949f96712c2SRick Macklem * propagate bit31 to the high order bits. This may or may
950f96712c2SRick Macklem * not be correct for NFSv2, but since it is a legacy
951f96712c2SRick Macklem * environment, I'd rather retain backwards compatibility.
952f96712c2SRick Macklem */
9539ec7b004SRick Macklem sbp->f_bsize = (int32_t)sfp->sf_bsize;
9549ec7b004SRick Macklem sbp->f_blocks = (int32_t)sfp->sf_blocks;
9559ec7b004SRick Macklem sbp->f_bfree = (int32_t)sfp->sf_bfree;
9569ec7b004SRick Macklem sbp->f_bavail = (int32_t)sfp->sf_bavail;
9579ec7b004SRick Macklem sbp->f_files = 0;
9589ec7b004SRick Macklem sbp->f_ffree = 0;
9599ec7b004SRick Macklem }
9609ec7b004SRick Macklem }
9619ec7b004SRick Macklem
9629ec7b004SRick Macklem /*
9639ec7b004SRick Macklem * Use the fsinfo stuff to update the mount point.
9649ec7b004SRick Macklem */
9659ec7b004SRick Macklem void
nfscl_loadfsinfo(struct nfsmount * nmp,struct nfsfsinfo * fsp)9669ec7b004SRick Macklem nfscl_loadfsinfo(struct nfsmount *nmp, struct nfsfsinfo *fsp)
9679ec7b004SRick Macklem {
9689ec7b004SRick Macklem
9699ec7b004SRick Macklem if ((nmp->nm_wsize == 0 || fsp->fs_wtpref < nmp->nm_wsize) &&
9709ec7b004SRick Macklem fsp->fs_wtpref >= NFS_FABLKSIZE)
9719ec7b004SRick Macklem nmp->nm_wsize = (fsp->fs_wtpref + NFS_FABLKSIZE - 1) &
9729ec7b004SRick Macklem ~(NFS_FABLKSIZE - 1);
9739ec7b004SRick Macklem if (fsp->fs_wtmax < nmp->nm_wsize && fsp->fs_wtmax > 0) {
9749ec7b004SRick Macklem nmp->nm_wsize = fsp->fs_wtmax & ~(NFS_FABLKSIZE - 1);
9759ec7b004SRick Macklem if (nmp->nm_wsize == 0)
9769ec7b004SRick Macklem nmp->nm_wsize = fsp->fs_wtmax;
9779ec7b004SRick Macklem }
9789ec7b004SRick Macklem if (nmp->nm_wsize < NFS_FABLKSIZE)
9799ec7b004SRick Macklem nmp->nm_wsize = NFS_FABLKSIZE;
9809ec7b004SRick Macklem if ((nmp->nm_rsize == 0 || fsp->fs_rtpref < nmp->nm_rsize) &&
9819ec7b004SRick Macklem fsp->fs_rtpref >= NFS_FABLKSIZE)
9829ec7b004SRick Macklem nmp->nm_rsize = (fsp->fs_rtpref + NFS_FABLKSIZE - 1) &
9839ec7b004SRick Macklem ~(NFS_FABLKSIZE - 1);
9849ec7b004SRick Macklem if (fsp->fs_rtmax < nmp->nm_rsize && fsp->fs_rtmax > 0) {
9859ec7b004SRick Macklem nmp->nm_rsize = fsp->fs_rtmax & ~(NFS_FABLKSIZE - 1);
9869ec7b004SRick Macklem if (nmp->nm_rsize == 0)
9879ec7b004SRick Macklem nmp->nm_rsize = fsp->fs_rtmax;
9889ec7b004SRick Macklem }
9899ec7b004SRick Macklem if (nmp->nm_rsize < NFS_FABLKSIZE)
9909ec7b004SRick Macklem nmp->nm_rsize = NFS_FABLKSIZE;
9919ec7b004SRick Macklem if ((nmp->nm_readdirsize == 0 || fsp->fs_dtpref < nmp->nm_readdirsize)
9929ec7b004SRick Macklem && fsp->fs_dtpref >= NFS_DIRBLKSIZ)
9939ec7b004SRick Macklem nmp->nm_readdirsize = (fsp->fs_dtpref + NFS_DIRBLKSIZ - 1) &
9949ec7b004SRick Macklem ~(NFS_DIRBLKSIZ - 1);
9959ec7b004SRick Macklem if (fsp->fs_rtmax < nmp->nm_readdirsize && fsp->fs_rtmax > 0) {
9969ec7b004SRick Macklem nmp->nm_readdirsize = fsp->fs_rtmax & ~(NFS_DIRBLKSIZ - 1);
9979ec7b004SRick Macklem if (nmp->nm_readdirsize == 0)
9989ec7b004SRick Macklem nmp->nm_readdirsize = fsp->fs_rtmax;
9999ec7b004SRick Macklem }
10009ec7b004SRick Macklem if (nmp->nm_readdirsize < NFS_DIRBLKSIZ)
10019ec7b004SRick Macklem nmp->nm_readdirsize = NFS_DIRBLKSIZ;
10029ec7b004SRick Macklem if (fsp->fs_maxfilesize > 0 &&
10039ec7b004SRick Macklem fsp->fs_maxfilesize < nmp->nm_maxfilesize)
10049ec7b004SRick Macklem nmp->nm_maxfilesize = fsp->fs_maxfilesize;
10059ec7b004SRick Macklem nmp->nm_mountp->mnt_stat.f_iosize = newnfs_iosize(nmp);
10069ec7b004SRick Macklem nmp->nm_state |= NFSSTA_GOTFSINFO;
10079ec7b004SRick Macklem }
10089ec7b004SRick Macklem
10099ec7b004SRick Macklem /*
1010d3bf8f64SAlexander V. Chernikov * Lookups source address which should be used to communicate with
1011d3bf8f64SAlexander V. Chernikov * @nmp and stores it inside @pdst.
1012d3bf8f64SAlexander V. Chernikov *
1013d3bf8f64SAlexander V. Chernikov * Returns 0 on success.
10149ec7b004SRick Macklem */
10159ec7b004SRick Macklem u_int8_t *
nfscl_getmyip(struct nfsmount * nmp,struct in6_addr * paddr,int * isinet6p)1016d3bf8f64SAlexander V. Chernikov nfscl_getmyip(struct nfsmount *nmp, struct in6_addr *paddr, int *isinet6p)
10179ec7b004SRick Macklem {
101886767049SBjoern A. Zeeb #if defined(INET6) || defined(INET)
10199d5df78eSAlexander V. Chernikov int fibnum;
1020d3bf8f64SAlexander V. Chernikov
1021d3bf8f64SAlexander V. Chernikov fibnum = curthread->td_proc->p_fibnum;
102286767049SBjoern A. Zeeb #endif
1023d3bf8f64SAlexander V. Chernikov #ifdef INET
1024d3bf8f64SAlexander V. Chernikov if (nmp->nm_nam->sa_family == AF_INET) {
1025c74ce5ccSAlexander V. Chernikov struct epoch_tracker et;
1026c74ce5ccSAlexander V. Chernikov struct nhop_object *nh;
1027d3bf8f64SAlexander V. Chernikov struct sockaddr_in *sin;
1028c74ce5ccSAlexander V. Chernikov struct in_addr addr = {};
1029d3bf8f64SAlexander V. Chernikov
1030d3bf8f64SAlexander V. Chernikov sin = (struct sockaddr_in *)nmp->nm_nam;
1031c74ce5ccSAlexander V. Chernikov NET_EPOCH_ENTER(et);
1032d3bf8f64SAlexander V. Chernikov CURVNET_SET(CRED_TO_VNET(nmp->nm_sockreq.nr_cred));
1033c74ce5ccSAlexander V. Chernikov nh = fib4_lookup(fibnum, sin->sin_addr, 0, NHR_NONE, 0);
10347d9dc91aSRick Macklem if (nh != NULL) {
1035c74ce5ccSAlexander V. Chernikov addr = IA_SIN(ifatoia(nh->nh_ifa))->sin_addr;
1036c74ce5ccSAlexander V. Chernikov if (IN_LOOPBACK(ntohl(addr.s_addr))) {
1037d3bf8f64SAlexander V. Chernikov /* Ignore loopback addresses */
10387d9dc91aSRick Macklem nh = NULL;
1039d3bf8f64SAlexander V. Chernikov }
10407d9dc91aSRick Macklem }
10417d9dc91aSRick Macklem CURVNET_RESTORE();
10427d9dc91aSRick Macklem NET_EPOCH_EXIT(et);
10439ec7b004SRick Macklem
10447d9dc91aSRick Macklem if (nh == NULL)
10457d9dc91aSRick Macklem return (NULL);
10469ec7b004SRick Macklem *isinet6p = 0;
1047c74ce5ccSAlexander V. Chernikov *((struct in_addr *)paddr) = addr;
10489ec7b004SRick Macklem
1049d3bf8f64SAlexander V. Chernikov return (u_int8_t *)paddr;
10509ec7b004SRick Macklem }
10519ec7b004SRick Macklem #endif
1052d3bf8f64SAlexander V. Chernikov #ifdef INET6
1053d3bf8f64SAlexander V. Chernikov if (nmp->nm_nam->sa_family == AF_INET6) {
1054605284b8SAlexander V. Chernikov struct epoch_tracker et;
1055d3bf8f64SAlexander V. Chernikov struct sockaddr_in6 *sin6;
10569d5df78eSAlexander V. Chernikov int error;
1057d3bf8f64SAlexander V. Chernikov
1058d3bf8f64SAlexander V. Chernikov sin6 = (struct sockaddr_in6 *)nmp->nm_nam;
1059d3bf8f64SAlexander V. Chernikov
1060605284b8SAlexander V. Chernikov NET_EPOCH_ENTER(et);
1061d3bf8f64SAlexander V. Chernikov CURVNET_SET(CRED_TO_VNET(nmp->nm_sockreq.nr_cred));
1062d3bf8f64SAlexander V. Chernikov error = in6_selectsrc_addr(fibnum, &sin6->sin6_addr,
1063d3bf8f64SAlexander V. Chernikov sin6->sin6_scope_id, NULL, paddr, NULL);
1064d3bf8f64SAlexander V. Chernikov CURVNET_RESTORE();
1065605284b8SAlexander V. Chernikov NET_EPOCH_EXIT(et);
1066d3bf8f64SAlexander V. Chernikov if (error != 0)
1067d3bf8f64SAlexander V. Chernikov return (NULL);
1068d3bf8f64SAlexander V. Chernikov
1069d3bf8f64SAlexander V. Chernikov if (IN6_IS_ADDR_LOOPBACK(paddr))
1070d3bf8f64SAlexander V. Chernikov return (NULL);
1071d3bf8f64SAlexander V. Chernikov
1072d3bf8f64SAlexander V. Chernikov /* Scope is embedded in */
1073d3bf8f64SAlexander V. Chernikov *isinet6p = 1;
1074d3bf8f64SAlexander V. Chernikov
1075d3bf8f64SAlexander V. Chernikov return (u_int8_t *)paddr;
10769ec7b004SRick Macklem }
1077d3bf8f64SAlexander V. Chernikov #endif
1078d3bf8f64SAlexander V. Chernikov return (NULL);
10799ec7b004SRick Macklem }
10809ec7b004SRick Macklem
10819ec7b004SRick Macklem /*
10829ec7b004SRick Macklem * Copy NFS uid, gids from the cred structure.
10839ec7b004SRick Macklem */
10849ec7b004SRick Macklem void
newnfs_copyincred(struct ucred * cr,struct nfscred * nfscr)10859ec7b004SRick Macklem newnfs_copyincred(struct ucred *cr, struct nfscred *nfscr)
10869ec7b004SRick Macklem {
1087838d9858SBrooks Davis int i;
10889ec7b004SRick Macklem
108955909abfSRick Macklem KASSERT(cr->cr_ngroups >= 0,
109055909abfSRick Macklem ("newnfs_copyincred: negative cr_ngroups"));
10919ec7b004SRick Macklem nfscr->nfsc_uid = cr->cr_uid;
109265cc6600SRick Macklem nfscr->nfsc_ngroups = MIN(cr->cr_ngroups, NFS_MAXGRPS + 1);
1093838d9858SBrooks Davis for (i = 0; i < nfscr->nfsc_ngroups; i++)
10949ec7b004SRick Macklem nfscr->nfsc_groups[i] = cr->cr_groups[i];
10959ec7b004SRick Macklem }
10969ec7b004SRick Macklem
10979ec7b004SRick Macklem /*
10989ec7b004SRick Macklem * Do any client specific initialization.
10999ec7b004SRick Macklem */
11009ec7b004SRick Macklem void
nfscl_init(void)11019ec7b004SRick Macklem nfscl_init(void)
11029ec7b004SRick Macklem {
11039ec7b004SRick Macklem static int inited = 0;
11049ec7b004SRick Macklem
11059ec7b004SRick Macklem if (inited)
11069ec7b004SRick Macklem return;
11079ec7b004SRick Macklem inited = 1;
11089ec7b004SRick Macklem nfscl_inited = 1;
1109756a5412SGleb Smirnoff ncl_pbuf_zone = pbuf_zsecond_create("nfspbuf", nswbuf / 2);
11109ec7b004SRick Macklem }
11119ec7b004SRick Macklem
11129ec7b004SRick Macklem /*
11139ec7b004SRick Macklem * Check each of the attributes to be set, to ensure they aren't already
11149ec7b004SRick Macklem * the correct value. Disable setting ones already correct.
11159ec7b004SRick Macklem */
11169ec7b004SRick Macklem int
nfscl_checksattr(struct vattr * vap,struct nfsvattr * nvap)11179ec7b004SRick Macklem nfscl_checksattr(struct vattr *vap, struct nfsvattr *nvap)
11189ec7b004SRick Macklem {
11199ec7b004SRick Macklem
11209ec7b004SRick Macklem if (vap->va_mode != (mode_t)VNOVAL) {
11219ec7b004SRick Macklem if (vap->va_mode == nvap->na_mode)
11229ec7b004SRick Macklem vap->va_mode = (mode_t)VNOVAL;
11239ec7b004SRick Macklem }
11249ec7b004SRick Macklem if (vap->va_uid != (uid_t)VNOVAL) {
11259ec7b004SRick Macklem if (vap->va_uid == nvap->na_uid)
11269ec7b004SRick Macklem vap->va_uid = (uid_t)VNOVAL;
11279ec7b004SRick Macklem }
11289ec7b004SRick Macklem if (vap->va_gid != (gid_t)VNOVAL) {
11299ec7b004SRick Macklem if (vap->va_gid == nvap->na_gid)
11309ec7b004SRick Macklem vap->va_gid = (gid_t)VNOVAL;
11319ec7b004SRick Macklem }
11329ec7b004SRick Macklem if (vap->va_size != VNOVAL) {
11339ec7b004SRick Macklem if (vap->va_size == nvap->na_size)
11349ec7b004SRick Macklem vap->va_size = VNOVAL;
11359ec7b004SRick Macklem }
11369ec7b004SRick Macklem
11379ec7b004SRick Macklem /*
11389ec7b004SRick Macklem * We are normally called with only a partially initialized
11399ec7b004SRick Macklem * VAP. Since the NFSv3 spec says that server may use the
11409ec7b004SRick Macklem * file attributes to store the verifier, the spec requires
11419ec7b004SRick Macklem * us to do a SETATTR RPC. FreeBSD servers store the verifier
11429ec7b004SRick Macklem * in atime, but we can't really assume that all servers will
11439ec7b004SRick Macklem * so we ensure that our SETATTR sets both atime and mtime.
114407d491deSRick Macklem * Set the VA_UTIMES_NULL flag for this case, so that
114507d491deSRick Macklem * the server's time will be used. This is needed to
114607d491deSRick Macklem * work around a bug in some Solaris servers, where
114707d491deSRick Macklem * setting the time TOCLIENT causes the Setattr RPC
114807d491deSRick Macklem * to return NFS_OK, but not set va_mode.
11499ec7b004SRick Macklem */
115007d491deSRick Macklem if (vap->va_mtime.tv_sec == VNOVAL) {
11519ec7b004SRick Macklem vfs_timestamp(&vap->va_mtime);
115207d491deSRick Macklem vap->va_vaflags |= VA_UTIMES_NULL;
115307d491deSRick Macklem }
11549ec7b004SRick Macklem if (vap->va_atime.tv_sec == VNOVAL)
11559ec7b004SRick Macklem vap->va_atime = vap->va_mtime;
11569ec7b004SRick Macklem return (1);
11579ec7b004SRick Macklem }
11589ec7b004SRick Macklem
11599ec7b004SRick Macklem /*
11609ec7b004SRick Macklem * Map nfsv4 errors to errno.h errors.
11619ec7b004SRick Macklem * The uid and gid arguments are only used for NFSERR_BADOWNER and that
11629ec7b004SRick Macklem * error should only be returned for the Open, Create and Setattr Ops.
11639ec7b004SRick Macklem * As such, most calls can just pass in 0 for those arguments.
11649ec7b004SRick Macklem */
1165b9cc3262SRyan Moeller int
nfscl_maperr(struct thread * td,int error,uid_t uid,gid_t gid)11669ec7b004SRick Macklem nfscl_maperr(struct thread *td, int error, uid_t uid, gid_t gid)
11679ec7b004SRick Macklem {
11689ec7b004SRick Macklem struct proc *p;
11699ec7b004SRick Macklem
11704e7dcfabSRick Macklem if (error < 10000 || error >= NFSERR_STALEWRITEVERF)
11719ec7b004SRick Macklem return (error);
11729ec7b004SRick Macklem if (td != NULL)
11739ec7b004SRick Macklem p = td->td_proc;
11749ec7b004SRick Macklem else
11759ec7b004SRick Macklem p = NULL;
11769ec7b004SRick Macklem switch (error) {
11779ec7b004SRick Macklem case NFSERR_BADOWNER:
11789ec7b004SRick Macklem tprintf(p, LOG_INFO,
11799ec7b004SRick Macklem "No name and/or group mapping for uid,gid:(%d,%d)\n",
11809ec7b004SRick Macklem uid, gid);
11819ec7b004SRick Macklem return (EPERM);
11821f60bfd8SRick Macklem case NFSERR_BADNAME:
11831f60bfd8SRick Macklem case NFSERR_BADCHAR:
11841f60bfd8SRick Macklem printf("nfsv4 char/name not handled by server\n");
11851f60bfd8SRick Macklem return (ENOENT);
11869ec7b004SRick Macklem case NFSERR_STALECLIENTID:
11879ec7b004SRick Macklem case NFSERR_STALESTATEID:
11889ec7b004SRick Macklem case NFSERR_EXPIRED:
11899ec7b004SRick Macklem case NFSERR_BADSTATEID:
11901f60bfd8SRick Macklem case NFSERR_BADSESSION:
11919ec7b004SRick Macklem printf("nfsv4 recover err returned %d\n", error);
11929ec7b004SRick Macklem return (EIO);
11939ec7b004SRick Macklem case NFSERR_BADHANDLE:
11949ec7b004SRick Macklem case NFSERR_SERVERFAULT:
11959ec7b004SRick Macklem case NFSERR_BADTYPE:
11969ec7b004SRick Macklem case NFSERR_FHEXPIRED:
11979ec7b004SRick Macklem case NFSERR_RESOURCE:
11989ec7b004SRick Macklem case NFSERR_MOVED:
11999ec7b004SRick Macklem case NFSERR_MINORVERMISMATCH:
12009ec7b004SRick Macklem case NFSERR_OLDSTATEID:
12019ec7b004SRick Macklem case NFSERR_BADSEQID:
12029ec7b004SRick Macklem case NFSERR_LEASEMOVED:
12039ec7b004SRick Macklem case NFSERR_RECLAIMBAD:
12049ec7b004SRick Macklem case NFSERR_BADXDR:
12059ec7b004SRick Macklem case NFSERR_OPILLEGAL:
12069ec7b004SRick Macklem printf("nfsv4 client/server protocol prob err=%d\n",
12079ec7b004SRick Macklem error);
12089ec7b004SRick Macklem return (EIO);
12096032cf3dSRick Macklem case NFSERR_NOFILEHANDLE:
12106032cf3dSRick Macklem printf("nfsv4 no file handle: usually means the file "
12116032cf3dSRick Macklem "system is not exported on the NFSv4 server\n");
12126032cf3dSRick Macklem return (EIO);
121339633fc1SRick Macklem case NFSERR_WRONGSEC:
121439633fc1SRick Macklem tprintf(p, LOG_INFO, "NFSv4 error WrongSec: You probably need a"
121539633fc1SRick Macklem " Kerberos TGT\n");
121639633fc1SRick Macklem return (EIO);
12179ec7b004SRick Macklem default:
12189ec7b004SRick Macklem tprintf(p, LOG_INFO, "nfsv4 err=%d\n", error);
12199ec7b004SRick Macklem return (EIO);
12209ec7b004SRick Macklem };
12219ec7b004SRick Macklem }
12229ec7b004SRick Macklem
12239ec7b004SRick Macklem /*
12249ec7b004SRick Macklem * Check to see if the process for this owner exists. Return 1 if it doesn't
12259ec7b004SRick Macklem * and 0 otherwise.
12269ec7b004SRick Macklem */
12279ec7b004SRick Macklem int
nfscl_procdoesntexist(u_int8_t * own)12289ec7b004SRick Macklem nfscl_procdoesntexist(u_int8_t *own)
12299ec7b004SRick Macklem {
12309ec7b004SRick Macklem union {
12319ec7b004SRick Macklem u_int32_t lval;
12329ec7b004SRick Macklem u_int8_t cval[4];
12339ec7b004SRick Macklem } tl;
12349ec7b004SRick Macklem struct proc *p;
12359ec7b004SRick Macklem pid_t pid;
1236037a2012SRick Macklem int i, ret = 0;
1237037a2012SRick Macklem
1238037a2012SRick Macklem /* For the single open_owner of all 0 bytes, just return 0. */
1239037a2012SRick Macklem for (i = 0; i < NFSV4CL_LOCKNAMELEN; i++)
1240037a2012SRick Macklem if (own[i] != 0)
1241037a2012SRick Macklem break;
1242037a2012SRick Macklem if (i == NFSV4CL_LOCKNAMELEN)
1243037a2012SRick Macklem return (0);
12449ec7b004SRick Macklem
12459ec7b004SRick Macklem tl.cval[0] = *own++;
12469ec7b004SRick Macklem tl.cval[1] = *own++;
12479ec7b004SRick Macklem tl.cval[2] = *own++;
12489ec7b004SRick Macklem tl.cval[3] = *own++;
12499ec7b004SRick Macklem pid = tl.lval;
1250eeb1f3edSRick Macklem p = pfind_any_locked(pid);
12519ec7b004SRick Macklem if (p == NULL)
12529ec7b004SRick Macklem return (1);
12539ec7b004SRick Macklem if (p->p_stats == NULL) {
12549ec7b004SRick Macklem PROC_UNLOCK(p);
12559ec7b004SRick Macklem return (0);
12569ec7b004SRick Macklem }
12579ec7b004SRick Macklem tl.cval[0] = *own++;
12589ec7b004SRick Macklem tl.cval[1] = *own++;
12599ec7b004SRick Macklem tl.cval[2] = *own++;
12609ec7b004SRick Macklem tl.cval[3] = *own++;
12619ec7b004SRick Macklem if (tl.lval != p->p_stats->p_start.tv_sec) {
12629ec7b004SRick Macklem ret = 1;
12639ec7b004SRick Macklem } else {
12649ec7b004SRick Macklem tl.cval[0] = *own++;
12659ec7b004SRick Macklem tl.cval[1] = *own++;
12669ec7b004SRick Macklem tl.cval[2] = *own++;
12679ec7b004SRick Macklem tl.cval[3] = *own;
12689ec7b004SRick Macklem if (tl.lval != p->p_stats->p_start.tv_usec)
12699ec7b004SRick Macklem ret = 1;
12709ec7b004SRick Macklem }
12719ec7b004SRick Macklem PROC_UNLOCK(p);
12729ec7b004SRick Macklem return (ret);
12739ec7b004SRick Macklem }
12749ec7b004SRick Macklem
12759ec7b004SRick Macklem /*
12769ec7b004SRick Macklem * - nfs pseudo system call for the client
12779ec7b004SRick Macklem */
12789ec7b004SRick Macklem /*
12799ec7b004SRick Macklem * MPSAFE
12809ec7b004SRick Macklem */
12819ec7b004SRick Macklem static int
nfssvc_nfscl(struct thread * td,struct nfssvc_args * uap)12829ec7b004SRick Macklem nfssvc_nfscl(struct thread *td, struct nfssvc_args *uap)
12839ec7b004SRick Macklem {
12849ec7b004SRick Macklem struct file *fp;
12859ec7b004SRick Macklem struct nfscbd_args nfscbdarg;
12869ec7b004SRick Macklem struct nfsd_nfscbd_args nfscbdarg2;
128799d2727dSRick Macklem struct nameidata nd;
128899d2727dSRick Macklem struct nfscl_dumpmntopts dumpmntopts;
12897008be5bSPawel Jakub Dawidek cap_rights_t rights;
129099d2727dSRick Macklem char *buf;
12917008be5bSPawel Jakub Dawidek int error;
129247cbff34SRick Macklem struct mount *mp;
129347cbff34SRick Macklem struct nfsmount *nmp;
12949ec7b004SRick Macklem
1295357492c9SRick Macklem NFSD_CURVNET_SET(NFSD_TD_TO_VNET(td));
12969ec7b004SRick Macklem if (uap->flag & NFSSVC_CBADDSOCK) {
12979ec7b004SRick Macklem error = copyin(uap->argp, (caddr_t)&nfscbdarg, sizeof(nfscbdarg));
12989ec7b004SRick Macklem if (error)
1299357492c9SRick Macklem goto out;
1300a9d2f8d8SRobert Watson /*
1301a9d2f8d8SRobert Watson * Since we don't know what rights might be required,
1302a9d2f8d8SRobert Watson * pretend that we need them all. It is better to be too
1303a9d2f8d8SRobert Watson * careful than too reckless.
1304a9d2f8d8SRobert Watson */
13057008be5bSPawel Jakub Dawidek error = fget(td, nfscbdarg.sock,
13066b3a9a0fSMateusz Guzik cap_rights_init_one(&rights, CAP_SOCK_CLIENT), &fp);
13077008be5bSPawel Jakub Dawidek if (error)
1308357492c9SRick Macklem goto out;
13099ec7b004SRick Macklem if (fp->f_type != DTYPE_SOCKET) {
13109ec7b004SRick Macklem fdrop(fp, td);
1311357492c9SRick Macklem error = EPERM;
1312357492c9SRick Macklem goto out;
13139ec7b004SRick Macklem }
13149ec7b004SRick Macklem error = nfscbd_addsock(fp);
13159ec7b004SRick Macklem fdrop(fp, td);
13169ec7b004SRick Macklem if (!error && nfscl_enablecallb == 0) {
13179ec7b004SRick Macklem nfsv4_cbport = nfscbdarg.port;
13189ec7b004SRick Macklem nfscl_enablecallb = 1;
13199ec7b004SRick Macklem }
13209ec7b004SRick Macklem } else if (uap->flag & NFSSVC_NFSCBD) {
1321357492c9SRick Macklem if (uap->argp == NULL) {
1322357492c9SRick Macklem error = EINVAL;
1323357492c9SRick Macklem goto out;
1324357492c9SRick Macklem }
13259ec7b004SRick Macklem error = copyin(uap->argp, (caddr_t)&nfscbdarg2,
13269ec7b004SRick Macklem sizeof(nfscbdarg2));
13279ec7b004SRick Macklem if (error)
1328357492c9SRick Macklem goto out;
13299ec7b004SRick Macklem error = nfscbd_nfsd(td, &nfscbdarg2);
133099d2727dSRick Macklem } else if (uap->flag & NFSSVC_DUMPMNTOPTS) {
133199d2727dSRick Macklem error = copyin(uap->argp, &dumpmntopts, sizeof(dumpmntopts));
133299d2727dSRick Macklem if (error == 0 && (dumpmntopts.ndmnt_blen < 256 ||
133399d2727dSRick Macklem dumpmntopts.ndmnt_blen > 1024))
133499d2727dSRick Macklem error = EINVAL;
133599d2727dSRick Macklem if (error == 0)
133699d2727dSRick Macklem error = nfsrv_lookupfilename(&nd,
133799d2727dSRick Macklem dumpmntopts.ndmnt_fname, td);
133899d2727dSRick Macklem if (error == 0 && strcmp(nd.ni_vp->v_mount->mnt_vfc->vfc_name,
133999d2727dSRick Macklem "nfs") != 0) {
134099d2727dSRick Macklem vput(nd.ni_vp);
134199d2727dSRick Macklem error = EINVAL;
134299d2727dSRick Macklem }
134399d2727dSRick Macklem if (error == 0) {
13447a9bc8a8SMark Johnston buf = malloc(dumpmntopts.ndmnt_blen, M_TEMP, M_WAITOK |
13457a9bc8a8SMark Johnston M_ZERO);
134699d2727dSRick Macklem nfscl_retopts(VFSTONFS(nd.ni_vp->v_mount), buf,
134799d2727dSRick Macklem dumpmntopts.ndmnt_blen);
134899d2727dSRick Macklem vput(nd.ni_vp);
134999d2727dSRick Macklem error = copyout(buf, dumpmntopts.ndmnt_buf,
135099d2727dSRick Macklem dumpmntopts.ndmnt_blen);
135199d2727dSRick Macklem free(buf, M_TEMP);
135299d2727dSRick Macklem }
135347cbff34SRick Macklem } else if (uap->flag & NFSSVC_FORCEDISM) {
135447cbff34SRick Macklem buf = malloc(MNAMELEN + 1, M_TEMP, M_WAITOK);
135547cbff34SRick Macklem error = copyinstr(uap->argp, buf, MNAMELEN + 1, NULL);
135647cbff34SRick Macklem if (error == 0) {
135747cbff34SRick Macklem nmp = NULL;
135847cbff34SRick Macklem mtx_lock(&mountlist_mtx);
135947cbff34SRick Macklem TAILQ_FOREACH(mp, &mountlist, mnt_list) {
136047cbff34SRick Macklem if (strcmp(mp->mnt_stat.f_mntonname, buf) ==
136147cbff34SRick Macklem 0 && strcmp(mp->mnt_stat.f_fstypename,
136247cbff34SRick Macklem "nfs") == 0 && mp->mnt_data != NULL) {
136347cbff34SRick Macklem nmp = VFSTONFS(mp);
136490d2dfabSRick Macklem NFSDDSLOCK();
136590d2dfabSRick Macklem if (nfsv4_findmirror(nmp) != NULL) {
136690d2dfabSRick Macklem NFSDDSUNLOCK();
136790d2dfabSRick Macklem error = ENXIO;
136890d2dfabSRick Macklem nmp = NULL;
136990d2dfabSRick Macklem break;
137090d2dfabSRick Macklem }
137147cbff34SRick Macklem mtx_lock(&nmp->nm_mtx);
137247cbff34SRick Macklem if ((nmp->nm_privflag &
137347cbff34SRick Macklem NFSMNTP_FORCEDISM) == 0) {
137447cbff34SRick Macklem nmp->nm_privflag |=
137547cbff34SRick Macklem (NFSMNTP_FORCEDISM |
137647cbff34SRick Macklem NFSMNTP_CANCELRPCS);
137747cbff34SRick Macklem mtx_unlock(&nmp->nm_mtx);
137847cbff34SRick Macklem } else {
137947cbff34SRick Macklem mtx_unlock(&nmp->nm_mtx);
1380cb0d9834SRick Macklem nmp = NULL;
138147cbff34SRick Macklem }
138290d2dfabSRick Macklem NFSDDSUNLOCK();
138347cbff34SRick Macklem break;
138447cbff34SRick Macklem }
138547cbff34SRick Macklem }
138647cbff34SRick Macklem mtx_unlock(&mountlist_mtx);
138747cbff34SRick Macklem
138847cbff34SRick Macklem if (nmp != NULL) {
138947cbff34SRick Macklem /*
139047cbff34SRick Macklem * Call newnfs_nmcancelreqs() to cause
139147cbff34SRick Macklem * any RPCs in progress on the mount point to
139247cbff34SRick Macklem * fail.
139347cbff34SRick Macklem * This will cause any process waiting for an
139447cbff34SRick Macklem * RPC to complete while holding a vnode lock
139547cbff34SRick Macklem * on the mounted-on vnode (such as "df" or
139647cbff34SRick Macklem * a non-forced "umount") to fail.
139747cbff34SRick Macklem * This will unlock the mounted-on vnode so
139847cbff34SRick Macklem * a forced dismount can succeed.
139947cbff34SRick Macklem * Then clear NFSMNTP_CANCELRPCS and wakeup(),
140047cbff34SRick Macklem * so that nfs_unmount() can complete.
140147cbff34SRick Macklem */
140247cbff34SRick Macklem newnfs_nmcancelreqs(nmp);
140347cbff34SRick Macklem mtx_lock(&nmp->nm_mtx);
140447cbff34SRick Macklem nmp->nm_privflag &= ~NFSMNTP_CANCELRPCS;
140547cbff34SRick Macklem wakeup(nmp);
140647cbff34SRick Macklem mtx_unlock(&nmp->nm_mtx);
140790d2dfabSRick Macklem } else if (error == 0)
140847cbff34SRick Macklem error = EINVAL;
140947cbff34SRick Macklem }
141047cbff34SRick Macklem free(buf, M_TEMP);
14119ec7b004SRick Macklem } else {
14129ec7b004SRick Macklem error = EINVAL;
14139ec7b004SRick Macklem }
1414357492c9SRick Macklem out:
1415357492c9SRick Macklem NFSD_CURVNET_RESTORE();
14169ec7b004SRick Macklem return (error);
14179ec7b004SRick Macklem }
14189ec7b004SRick Macklem
14199ec7b004SRick Macklem extern int (*nfsd_call_nfscl)(struct thread *, struct nfssvc_args *);
14209ec7b004SRick Macklem
14219ec7b004SRick Macklem /*
14229ec7b004SRick Macklem * Called once to initialize data structures...
14239ec7b004SRick Macklem */
14249ec7b004SRick Macklem static int
nfscl_modevent(module_t mod,int type,void * data)14259ec7b004SRick Macklem nfscl_modevent(module_t mod, int type, void *data)
14269ec7b004SRick Macklem {
14279ec7b004SRick Macklem int error = 0;
14289ec7b004SRick Macklem static int loaded = 0;
14299ec7b004SRick Macklem
14309ec7b004SRick Macklem switch (type) {
14319ec7b004SRick Macklem case MOD_LOAD:
14329ec7b004SRick Macklem if (loaded)
14339ec7b004SRick Macklem return (0);
14349ec7b004SRick Macklem newnfs_portinit();
14359ec7b004SRick Macklem mtx_init(&ncl_iod_mutex, "ncl_iod_mutex", NULL, MTX_DEF);
14369ec7b004SRick Macklem nfscl_init();
14379ec7b004SRick Macklem NFSD_LOCK();
14389ec7b004SRick Macklem nfsrvd_cbinit(0);
14399ec7b004SRick Macklem NFSD_UNLOCK();
14409ec7b004SRick Macklem ncl_call_invalcaches = ncl_invalcaches;
14419ec7b004SRick Macklem nfsd_call_nfscl = nfssvc_nfscl;
14429ec7b004SRick Macklem loaded = 1;
14439ec7b004SRick Macklem break;
14449ec7b004SRick Macklem
14459ec7b004SRick Macklem case MOD_UNLOAD:
14469ec7b004SRick Macklem if (nfs_numnfscbd != 0) {
14479ec7b004SRick Macklem error = EBUSY;
14489ec7b004SRick Macklem break;
14499ec7b004SRick Macklem }
14509ec7b004SRick Macklem
1451dd697cbfSJaakko Heinonen /*
1452dd697cbfSJaakko Heinonen * XXX: Unloading of nfscl module is unsupported.
1453dd697cbfSJaakko Heinonen */
1454dd697cbfSJaakko Heinonen #if 0
14559ec7b004SRick Macklem ncl_call_invalcaches = NULL;
14569ec7b004SRick Macklem nfsd_call_nfscl = NULL;
1457756a5412SGleb Smirnoff uma_zdestroy(ncl_pbuf_zone);
14589ec7b004SRick Macklem /* and get rid of the mutexes */
14599ec7b004SRick Macklem mtx_destroy(&ncl_iod_mutex);
14609ec7b004SRick Macklem loaded = 0;
14619ec7b004SRick Macklem break;
1462dd697cbfSJaakko Heinonen #else
1463dd697cbfSJaakko Heinonen /* FALLTHROUGH */
1464dd697cbfSJaakko Heinonen #endif
14659ec7b004SRick Macklem default:
14669ec7b004SRick Macklem error = EOPNOTSUPP;
14679ec7b004SRick Macklem break;
14689ec7b004SRick Macklem }
14699ec7b004SRick Macklem return error;
14709ec7b004SRick Macklem }
14719ec7b004SRick Macklem static moduledata_t nfscl_mod = {
14729ec7b004SRick Macklem "nfscl",
14739ec7b004SRick Macklem nfscl_modevent,
14749ec7b004SRick Macklem NULL,
14759ec7b004SRick Macklem };
1476cb07628dSRick Macklem /*
1477cb07628dSRick Macklem * This is the main module declaration for the NFS client. The
1478cb07628dSRick Macklem * nfscl_modevent() function is needed to ensure that the module
1479cb07628dSRick Macklem * cannot be unloaded, among other things.
1480cb07628dSRick Macklem * There is also a module declaration in sys/fs/nfsclient/nfs_clvfsops.c
1481cb07628dSRick Macklem * for the name "nfs" within the VFS_SET() macro that defines the "nfs"
1482cb07628dSRick Macklem * file system type.
1483cb07628dSRick Macklem */
1484349af4deSJaakko Heinonen DECLARE_MODULE(nfscl, nfscl_mod, SI_SUB_VFS, SI_ORDER_FIRST);
14859ec7b004SRick Macklem
14869ec7b004SRick Macklem /* So that loader and kldload(2) can find us, wherever we are.. */
14879ec7b004SRick Macklem MODULE_VERSION(nfscl, 1);
14889dd7554fSRick Macklem MODULE_DEPEND(nfscl, nfscommon, 1, 1, 1);
1489a8437c97SRick Macklem MODULE_DEPEND(nfscl, krpc, 1, 1, 1);
1490a8437c97SRick Macklem MODULE_DEPEND(nfscl, nfssvc, 1, 1, 1);
1491cb07628dSRick Macklem MODULE_DEPEND(nfscl, xdr, 1, 1, 1);
1492