1df8bae1dSRodney W. Grimes /* 2df8bae1dSRodney W. Grimes * Copyright (c) 1989, 1993 3df8bae1dSRodney W. Grimes * The Regents of the University of California. All rights reserved. 4df8bae1dSRodney W. Grimes * (c) UNIX System Laboratories, Inc. 5df8bae1dSRodney W. Grimes * All or some portions of this file are derived from material licensed 6df8bae1dSRodney W. Grimes * to the University of California by American Telephone and Telegraph 7df8bae1dSRodney W. Grimes * Co. or Unix System Laboratories, Inc. and are reproduced herein with 8df8bae1dSRodney W. Grimes * the permission of UNIX System Laboratories, Inc. 9df8bae1dSRodney W. Grimes * 10df8bae1dSRodney W. Grimes * Redistribution and use in source and binary forms, with or without 11df8bae1dSRodney W. Grimes * modification, are permitted provided that the following conditions 12df8bae1dSRodney W. Grimes * are met: 13df8bae1dSRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 14df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer. 15df8bae1dSRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 16df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 17df8bae1dSRodney W. Grimes * documentation and/or other materials provided with the distribution. 18df8bae1dSRodney W. Grimes * 4. Neither the name of the University nor the names of its contributors 19df8bae1dSRodney W. Grimes * may be used to endorse or promote products derived from this software 20df8bae1dSRodney W. Grimes * without specific prior written permission. 21df8bae1dSRodney W. Grimes * 22df8bae1dSRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 23df8bae1dSRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 24df8bae1dSRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 25df8bae1dSRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 26df8bae1dSRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 27df8bae1dSRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 28df8bae1dSRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 29df8bae1dSRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 30df8bae1dSRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 31df8bae1dSRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 32df8bae1dSRodney W. Grimes * SUCH DAMAGE. 33df8bae1dSRodney W. Grimes * 34996c772fSJohn Dyson * @(#)vfs_subr.c 8.31 (Berkeley) 5/26/95 35df8bae1dSRodney W. Grimes */ 36df8bae1dSRodney W. Grimes 37677b542eSDavid E. O'Brien #include <sys/cdefs.h> 38677b542eSDavid E. O'Brien __FBSDID("$FreeBSD$"); 39677b542eSDavid E. O'Brien 40df8bae1dSRodney W. Grimes #include <sys/param.h> 41057e2795SBruce Evans #include <sys/dirent.h> 42057e2795SBruce Evans #include <sys/domain.h> 43986f4ce7SBruce Evans #include <sys/kernel.h> 44057e2795SBruce Evans #include <sys/lock.h> 45a1c995b6SPoul-Henning Kamp #include <sys/malloc.h> 46bf61e266SKris Kennaway #include <sys/mbuf.h> 47df8bae1dSRodney W. Grimes #include <sys/mount.h> 48057e2795SBruce Evans #include <sys/mutex.h> 49057e2795SBruce Evans #include <sys/socket.h> 50057e2795SBruce Evans #include <sys/systm.h> 515e950839SLuoqi Chen #include <sys/vnode.h> 52df8bae1dSRodney W. Grimes 53057e2795SBruce Evans #include <net/radix.h> 54057e2795SBruce Evans 55a1c995b6SPoul-Henning Kamp static MALLOC_DEFINE(M_NETADDR, "Export Host", "Export host address structure"); 5655166637SPoul-Henning Kamp 574d77a549SAlfred Perlstein static void vfs_free_addrlist(struct netexport *nep); 584d77a549SAlfred Perlstein static int vfs_free_netcred(struct radix_node *rn, void *w); 594d77a549SAlfred Perlstein static int vfs_hang_addrlist(struct mount *mp, struct netexport *nep, 604d77a549SAlfred Perlstein struct export_args *argp); 6198d93822SBruce Evans 62df8bae1dSRodney W. Grimes /* 63a13234bbSPoul-Henning Kamp * Network address lookup element 64a13234bbSPoul-Henning Kamp */ 65a13234bbSPoul-Henning Kamp struct netcred { 66a13234bbSPoul-Henning Kamp struct radix_node netc_rnodes[2]; 67a13234bbSPoul-Henning Kamp int netc_exflags; 68a13234bbSPoul-Henning Kamp struct ucred netc_anon; 69a13234bbSPoul-Henning Kamp }; 70a13234bbSPoul-Henning Kamp 71a13234bbSPoul-Henning Kamp /* 72a13234bbSPoul-Henning Kamp * Network export information 73a13234bbSPoul-Henning Kamp */ 74a13234bbSPoul-Henning Kamp struct netexport { 75a13234bbSPoul-Henning Kamp struct netcred ne_defexported; /* Default export */ 76a13234bbSPoul-Henning Kamp struct radix_node_head *ne_rtable[AF_MAX+1]; /* Individual exports */ 77a13234bbSPoul-Henning Kamp }; 78a13234bbSPoul-Henning Kamp 79a13234bbSPoul-Henning Kamp /* 80df8bae1dSRodney W. Grimes * Build hash lists of net addresses and hang them off the mount point. 81df8bae1dSRodney W. Grimes * Called by ufs_mount() to set up the lists of export addresses. 82df8bae1dSRodney W. Grimes */ 83df8bae1dSRodney W. Grimes static int 84514ede09SBruce Evans vfs_hang_addrlist(mp, nep, argp) 85514ede09SBruce Evans struct mount *mp; 86514ede09SBruce Evans struct netexport *nep; 87514ede09SBruce Evans struct export_args *argp; 88df8bae1dSRodney W. Grimes { 89df8bae1dSRodney W. Grimes register struct netcred *np; 90df8bae1dSRodney W. Grimes register struct radix_node_head *rnh; 91df8bae1dSRodney W. Grimes register int i; 92df8bae1dSRodney W. Grimes struct radix_node *rn; 93df8bae1dSRodney W. Grimes struct sockaddr *saddr, *smask = 0; 94df8bae1dSRodney W. Grimes struct domain *dom; 95df8bae1dSRodney W. Grimes int error; 96df8bae1dSRodney W. Grimes 97e74d4831SDima Dorfman /* 98e74d4831SDima Dorfman * XXX: This routine converts from a `struct xucred' 99e74d4831SDima Dorfman * (argp->ex_anon) to a `struct ucred' (np->netc_anon). This 100e74d4831SDima Dorfman * operation is questionable; for example, what should be done 101e74d4831SDima Dorfman * with fields like cr_uidinfo and cr_prison? Currently, this 102e74d4831SDima Dorfman * routine does not touch them (leaves them as NULL). 103e74d4831SDima Dorfman */ 104e74d4831SDima Dorfman if (argp->ex_anon.cr_version != XUCRED_VERSION) 105e74d4831SDima Dorfman return (EINVAL); 106e74d4831SDima Dorfman 107df8bae1dSRodney W. Grimes if (argp->ex_addrlen == 0) { 108df8bae1dSRodney W. Grimes if (mp->mnt_flag & MNT_DEFEXPORTED) 109df8bae1dSRodney W. Grimes return (EPERM); 110df8bae1dSRodney W. Grimes np = &nep->ne_defexported; 111df8bae1dSRodney W. Grimes np->netc_exflags = argp->ex_flags; 112c0511d3bSBrian Feldman bzero(&np->netc_anon, sizeof(np->netc_anon)); 113c0511d3bSBrian Feldman np->netc_anon.cr_uid = argp->ex_anon.cr_uid; 114c0511d3bSBrian Feldman np->netc_anon.cr_ngroups = argp->ex_anon.cr_ngroups; 115c0511d3bSBrian Feldman bcopy(argp->ex_anon.cr_groups, np->netc_anon.cr_groups, 116c0511d3bSBrian Feldman sizeof(np->netc_anon.cr_groups)); 117df8bae1dSRodney W. Grimes np->netc_anon.cr_ref = 1; 118df8bae1dSRodney W. Grimes mp->mnt_flag |= MNT_DEFEXPORTED; 119df8bae1dSRodney W. Grimes return (0); 120df8bae1dSRodney W. Grimes } 121bf61e266SKris Kennaway 122c43cad1aSScott Long #if MSIZE <= 256 123bf61e266SKris Kennaway if (argp->ex_addrlen > MLEN) 124bf61e266SKris Kennaway return (EINVAL); 125c43cad1aSScott Long #endif 126bf61e266SKris Kennaway 127df8bae1dSRodney W. Grimes i = sizeof(struct netcred) + argp->ex_addrlen + argp->ex_masklen; 128a163d034SWarner Losh np = (struct netcred *) malloc(i, M_NETADDR, M_WAITOK | M_ZERO); 129df8bae1dSRodney W. Grimes saddr = (struct sockaddr *) (np + 1); 130210a5a71SAlfred Perlstein if ((error = copyin(argp->ex_addr, saddr, argp->ex_addrlen))) 131df8bae1dSRodney W. Grimes goto out; 132df8bae1dSRodney W. Grimes if (saddr->sa_len > argp->ex_addrlen) 133df8bae1dSRodney W. Grimes saddr->sa_len = argp->ex_addrlen; 134df8bae1dSRodney W. Grimes if (argp->ex_masklen) { 135c5e3ef7eSAlfred Perlstein smask = (struct sockaddr *)((caddr_t)saddr + argp->ex_addrlen); 136210a5a71SAlfred Perlstein error = copyin(argp->ex_mask, smask, argp->ex_masklen); 137df8bae1dSRodney W. Grimes if (error) 138df8bae1dSRodney W. Grimes goto out; 139df8bae1dSRodney W. Grimes if (smask->sa_len > argp->ex_masklen) 140df8bae1dSRodney W. Grimes smask->sa_len = argp->ex_masklen; 141df8bae1dSRodney W. Grimes } 142df8bae1dSRodney W. Grimes i = saddr->sa_family; 143956b0b65SJeffrey Hsu if ((rnh = nep->ne_rtable[i]) == NULL) { 144df8bae1dSRodney W. Grimes /* 1450d94caffSDavid Greenman * Seems silly to initialize every AF when most are not used, 1460d94caffSDavid Greenman * do so on demand here 147df8bae1dSRodney W. Grimes */ 148df8bae1dSRodney W. Grimes for (dom = domains; dom; dom = dom->dom_next) 149df8bae1dSRodney W. Grimes if (dom->dom_family == i && dom->dom_rtattach) { 150df8bae1dSRodney W. Grimes dom->dom_rtattach((void **) &nep->ne_rtable[i], 151df8bae1dSRodney W. Grimes dom->dom_rtoffset); 152df8bae1dSRodney W. Grimes break; 153df8bae1dSRodney W. Grimes } 154956b0b65SJeffrey Hsu if ((rnh = nep->ne_rtable[i]) == NULL) { 155df8bae1dSRodney W. Grimes error = ENOBUFS; 156df8bae1dSRodney W. Grimes goto out; 157df8bae1dSRodney W. Grimes } 158df8bae1dSRodney W. Grimes } 159956b0b65SJeffrey Hsu RADIX_NODE_HEAD_LOCK(rnh); 16097bb78acSAlfred Perlstein rn = (*rnh->rnh_addaddr)(saddr, smask, rnh, np->netc_rnodes); 161956b0b65SJeffrey Hsu RADIX_NODE_HEAD_UNLOCK(rnh); 162956b0b65SJeffrey Hsu if (rn == NULL || np != (struct netcred *)rn) { /* already exists */ 16337a6b453SAlfred Perlstein error = EPERM; 16437a6b453SAlfred Perlstein goto out; 165df8bae1dSRodney W. Grimes } 166df8bae1dSRodney W. Grimes np->netc_exflags = argp->ex_flags; 167c0511d3bSBrian Feldman bzero(&np->netc_anon, sizeof(np->netc_anon)); 168c0511d3bSBrian Feldman np->netc_anon.cr_uid = argp->ex_anon.cr_uid; 169c0511d3bSBrian Feldman np->netc_anon.cr_ngroups = argp->ex_anon.cr_ngroups; 170c0511d3bSBrian Feldman bcopy(argp->ex_anon.cr_groups, np->netc_anon.cr_groups, 171c0511d3bSBrian Feldman sizeof(np->netc_anon.cr_groups)); 172df8bae1dSRodney W. Grimes np->netc_anon.cr_ref = 1; 173df8bae1dSRodney W. Grimes return (0); 174df8bae1dSRodney W. Grimes out: 175df8bae1dSRodney W. Grimes free(np, M_NETADDR); 176df8bae1dSRodney W. Grimes return (error); 177df8bae1dSRodney W. Grimes } 178df8bae1dSRodney W. Grimes 179a863c0fbSEivind Eklund /* Helper for vfs_free_addrlist. */ 180df8bae1dSRodney W. Grimes /* ARGSUSED */ 181df8bae1dSRodney W. Grimes static int 182514ede09SBruce Evans vfs_free_netcred(rn, w) 183514ede09SBruce Evans struct radix_node *rn; 184514ede09SBruce Evans void *w; 185df8bae1dSRodney W. Grimes { 186df8bae1dSRodney W. Grimes register struct radix_node_head *rnh = (struct radix_node_head *) w; 187df8bae1dSRodney W. Grimes 188df8bae1dSRodney W. Grimes (*rnh->rnh_deladdr) (rn->rn_key, rn->rn_mask, rnh); 189210a5a71SAlfred Perlstein free(rn, M_NETADDR); 190df8bae1dSRodney W. Grimes return (0); 191df8bae1dSRodney W. Grimes } 192df8bae1dSRodney W. Grimes 193df8bae1dSRodney W. Grimes /* 194df8bae1dSRodney W. Grimes * Free the net address hash lists that are hanging off the mount points. 195df8bae1dSRodney W. Grimes */ 196df8bae1dSRodney W. Grimes static void 197514ede09SBruce Evans vfs_free_addrlist(nep) 198514ede09SBruce Evans struct netexport *nep; 199df8bae1dSRodney W. Grimes { 200df8bae1dSRodney W. Grimes register int i; 201df8bae1dSRodney W. Grimes register struct radix_node_head *rnh; 202df8bae1dSRodney W. Grimes 203df8bae1dSRodney W. Grimes for (i = 0; i <= AF_MAX; i++) 204bb56ec4aSPoul-Henning Kamp if ((rnh = nep->ne_rtable[i])) { 205956b0b65SJeffrey Hsu RADIX_NODE_HEAD_LOCK(rnh); 206210a5a71SAlfred Perlstein (*rnh->rnh_walktree) (rnh, vfs_free_netcred, rnh); 207956b0b65SJeffrey Hsu RADIX_NODE_HEAD_DESTROY(rnh); 208210a5a71SAlfred Perlstein free(rnh, M_RTABLE); 209956b0b65SJeffrey Hsu nep->ne_rtable[i] = NULL; /* not SMP safe XXX */ 210df8bae1dSRodney W. Grimes } 211df8bae1dSRodney W. Grimes } 212df8bae1dSRodney W. Grimes 21321a90397SAlfred Perlstein /* 21421a90397SAlfred Perlstein * High level function to manipulate export options on a mount point 21521a90397SAlfred Perlstein * and the passed in netexport. 21621a90397SAlfred Perlstein * Struct export_args *argp is the variable used to twiddle options, 21721a90397SAlfred Perlstein * the structure is described in sys/mount.h 21821a90397SAlfred Perlstein */ 219df8bae1dSRodney W. Grimes int 220a13234bbSPoul-Henning Kamp vfs_export(mp, argp) 221df8bae1dSRodney W. Grimes struct mount *mp; 222df8bae1dSRodney W. Grimes struct export_args *argp; 223df8bae1dSRodney W. Grimes { 224a13234bbSPoul-Henning Kamp struct netexport *nep; 225df8bae1dSRodney W. Grimes int error; 226df8bae1dSRodney W. Grimes 227a13234bbSPoul-Henning Kamp nep = mp->mnt_export; 228df8bae1dSRodney W. Grimes if (argp->ex_flags & MNT_DELEXPORT) { 229a13234bbSPoul-Henning Kamp if (nep == NULL) 2305f558fa4SIan Dowse return (ENOENT); 231f6b4c285SDoug Rabson if (mp->mnt_flag & MNT_EXPUBLIC) { 232f6b4c285SDoug Rabson vfs_setpublicfs(NULL, NULL, NULL); 233f6b4c285SDoug Rabson mp->mnt_flag &= ~MNT_EXPUBLIC; 234f6b4c285SDoug Rabson } 235df8bae1dSRodney W. Grimes vfs_free_addrlist(nep); 236a13234bbSPoul-Henning Kamp mp->mnt_export = NULL; 237a13234bbSPoul-Henning Kamp free(nep, M_MOUNT); 238df8bae1dSRodney W. Grimes mp->mnt_flag &= ~(MNT_EXPORTED | MNT_DEFEXPORTED); 239df8bae1dSRodney W. Grimes } 240df8bae1dSRodney W. Grimes if (argp->ex_flags & MNT_EXPORTED) { 241a13234bbSPoul-Henning Kamp if (nep == NULL) { 242a163d034SWarner Losh nep = malloc(sizeof(struct netexport), M_MOUNT, M_WAITOK | M_ZERO); 243a13234bbSPoul-Henning Kamp mp->mnt_export = nep; 244a13234bbSPoul-Henning Kamp } 245f6b4c285SDoug Rabson if (argp->ex_flags & MNT_EXPUBLIC) { 246f6b4c285SDoug Rabson if ((error = vfs_setpublicfs(mp, nep, argp)) != 0) 247f6b4c285SDoug Rabson return (error); 248f6b4c285SDoug Rabson mp->mnt_flag |= MNT_EXPUBLIC; 249f6b4c285SDoug Rabson } 250bb56ec4aSPoul-Henning Kamp if ((error = vfs_hang_addrlist(mp, nep, argp))) 251df8bae1dSRodney W. Grimes return (error); 252df8bae1dSRodney W. Grimes mp->mnt_flag |= MNT_EXPORTED; 253df8bae1dSRodney W. Grimes } 254df8bae1dSRodney W. Grimes return (0); 255df8bae1dSRodney W. Grimes } 256df8bae1dSRodney W. Grimes 257f6b4c285SDoug Rabson /* 258f6b4c285SDoug Rabson * Set the publicly exported filesystem (WebNFS). Currently, only 259f6b4c285SDoug Rabson * one public filesystem is possible in the spec (RFC 2054 and 2055) 260f6b4c285SDoug Rabson */ 261f6b4c285SDoug Rabson int 262f6b4c285SDoug Rabson vfs_setpublicfs(mp, nep, argp) 263f6b4c285SDoug Rabson struct mount *mp; 264f6b4c285SDoug Rabson struct netexport *nep; 265f6b4c285SDoug Rabson struct export_args *argp; 266f6b4c285SDoug Rabson { 267f6b4c285SDoug Rabson int error; 268f6b4c285SDoug Rabson struct vnode *rvp; 269f6b4c285SDoug Rabson char *cp; 270f6b4c285SDoug Rabson 271f6b4c285SDoug Rabson /* 272f6b4c285SDoug Rabson * mp == NULL -> invalidate the current info, the FS is 273f6b4c285SDoug Rabson * no longer exported. May be called from either vfs_export 274f6b4c285SDoug Rabson * or unmount, so check if it hasn't already been done. 275f6b4c285SDoug Rabson */ 276f6b4c285SDoug Rabson if (mp == NULL) { 277f6b4c285SDoug Rabson if (nfs_pub.np_valid) { 278f6b4c285SDoug Rabson nfs_pub.np_valid = 0; 279f6b4c285SDoug Rabson if (nfs_pub.np_index != NULL) { 280f6b4c285SDoug Rabson FREE(nfs_pub.np_index, M_TEMP); 281f6b4c285SDoug Rabson nfs_pub.np_index = NULL; 282f6b4c285SDoug Rabson } 283f6b4c285SDoug Rabson } 284f6b4c285SDoug Rabson return (0); 285f6b4c285SDoug Rabson } 286f6b4c285SDoug Rabson 287f6b4c285SDoug Rabson /* 288f6b4c285SDoug Rabson * Only one allowed at a time. 289f6b4c285SDoug Rabson */ 290f6b4c285SDoug Rabson if (nfs_pub.np_valid != 0 && mp != nfs_pub.np_mount) 291f6b4c285SDoug Rabson return (EBUSY); 292f6b4c285SDoug Rabson 293f6b4c285SDoug Rabson /* 294f6b4c285SDoug Rabson * Get real filehandle for root of exported FS. 295f6b4c285SDoug Rabson */ 296210a5a71SAlfred Perlstein bzero(&nfs_pub.np_handle, sizeof(nfs_pub.np_handle)); 297f6b4c285SDoug Rabson nfs_pub.np_handle.fh_fsid = mp->mnt_stat.f_fsid; 298f6b4c285SDoug Rabson 299f6b4c285SDoug Rabson if ((error = VFS_ROOT(mp, &rvp))) 300f6b4c285SDoug Rabson return (error); 301f6b4c285SDoug Rabson 302f6b4c285SDoug Rabson if ((error = VFS_VPTOFH(rvp, &nfs_pub.np_handle.fh_fid))) 303f6b4c285SDoug Rabson return (error); 304f6b4c285SDoug Rabson 305f6b4c285SDoug Rabson vput(rvp); 306f6b4c285SDoug Rabson 307f6b4c285SDoug Rabson /* 308f6b4c285SDoug Rabson * If an indexfile was specified, pull it in. 309f6b4c285SDoug Rabson */ 310f6b4c285SDoug Rabson if (argp->ex_indexfile != NULL) { 311f6b4c285SDoug Rabson MALLOC(nfs_pub.np_index, char *, MAXNAMLEN + 1, M_TEMP, 312a163d034SWarner Losh M_WAITOK); 313f6b4c285SDoug Rabson error = copyinstr(argp->ex_indexfile, nfs_pub.np_index, 314f6b4c285SDoug Rabson MAXNAMLEN, (size_t *)0); 315f6b4c285SDoug Rabson if (!error) { 316f6b4c285SDoug Rabson /* 317f6b4c285SDoug Rabson * Check for illegal filenames. 318f6b4c285SDoug Rabson */ 319f6b4c285SDoug Rabson for (cp = nfs_pub.np_index; *cp; cp++) { 320f6b4c285SDoug Rabson if (*cp == '/') { 321f6b4c285SDoug Rabson error = EINVAL; 322f6b4c285SDoug Rabson break; 323f6b4c285SDoug Rabson } 324f6b4c285SDoug Rabson } 325f6b4c285SDoug Rabson } 326f6b4c285SDoug Rabson if (error) { 327f6b4c285SDoug Rabson FREE(nfs_pub.np_index, M_TEMP); 328f6b4c285SDoug Rabson return (error); 329f6b4c285SDoug Rabson } 330f6b4c285SDoug Rabson } 331f6b4c285SDoug Rabson 332f6b4c285SDoug Rabson nfs_pub.np_mount = mp; 333f6b4c285SDoug Rabson nfs_pub.np_valid = 1; 334f6b4c285SDoug Rabson return (0); 335f6b4c285SDoug Rabson } 336f6b4c285SDoug Rabson 33721a90397SAlfred Perlstein /* 33821a90397SAlfred Perlstein * Used by the filesystems to determine if a given network address 33921a90397SAlfred Perlstein * (passed in 'nam') is present in thier exports list, returns a pointer 34021a90397SAlfred Perlstein * to struct netcred so that the filesystem can examine it for 34121a90397SAlfred Perlstein * access rights (read/write/etc). 34221a90397SAlfred Perlstein */ 343df8bae1dSRodney W. Grimes struct netcred * 344a13234bbSPoul-Henning Kamp vfs_export_lookup(mp, nam) 345df8bae1dSRodney W. Grimes register struct mount *mp; 34657bf258eSGarrett Wollman struct sockaddr *nam; 347df8bae1dSRodney W. Grimes { 348a13234bbSPoul-Henning Kamp struct netexport *nep; 349df8bae1dSRodney W. Grimes register struct netcred *np; 350df8bae1dSRodney W. Grimes register struct radix_node_head *rnh; 351df8bae1dSRodney W. Grimes struct sockaddr *saddr; 352df8bae1dSRodney W. Grimes 353a13234bbSPoul-Henning Kamp nep = mp->mnt_export; 354a13234bbSPoul-Henning Kamp if (nep == NULL) 355a13234bbSPoul-Henning Kamp return (NULL); 356df8bae1dSRodney W. Grimes np = NULL; 357df8bae1dSRodney W. Grimes if (mp->mnt_flag & MNT_EXPORTED) { 358df8bae1dSRodney W. Grimes /* 359df8bae1dSRodney W. Grimes * Lookup in the export list first. 360df8bae1dSRodney W. Grimes */ 361df8bae1dSRodney W. Grimes if (nam != NULL) { 36257bf258eSGarrett Wollman saddr = nam; 363df8bae1dSRodney W. Grimes rnh = nep->ne_rtable[saddr->sa_family]; 364df8bae1dSRodney W. Grimes if (rnh != NULL) { 365956b0b65SJeffrey Hsu RADIX_NODE_HEAD_LOCK(rnh); 366df8bae1dSRodney W. Grimes np = (struct netcred *) 36797bb78acSAlfred Perlstein (*rnh->rnh_matchaddr)(saddr, rnh); 368956b0b65SJeffrey Hsu RADIX_NODE_HEAD_UNLOCK(rnh); 369df8bae1dSRodney W. Grimes if (np && np->netc_rnodes->rn_flags & RNF_ROOT) 370df8bae1dSRodney W. Grimes np = NULL; 371df8bae1dSRodney W. Grimes } 372df8bae1dSRodney W. Grimes } 373df8bae1dSRodney W. Grimes /* 374df8bae1dSRodney W. Grimes * If no address match, use the default if it exists. 375df8bae1dSRodney W. Grimes */ 376df8bae1dSRodney W. Grimes if (np == NULL && mp->mnt_flag & MNT_DEFEXPORTED) 377df8bae1dSRodney W. Grimes np = &nep->ne_defexported; 378df8bae1dSRodney W. Grimes } 379df8bae1dSRodney W. Grimes return (np); 380df8bae1dSRodney W. Grimes } 38161f5d510SDavid Greenman 38261f5d510SDavid Greenman /* 383a13234bbSPoul-Henning Kamp * XXX: This comment comes from the deprecated ufs_check_export() 384a13234bbSPoul-Henning Kamp * XXX: and may not entirely apply, but lacking something better: 385a13234bbSPoul-Henning Kamp * This is the generic part of fhtovp called after the underlying 386a13234bbSPoul-Henning Kamp * filesystem has validated the file handle. 387a13234bbSPoul-Henning Kamp * 388a13234bbSPoul-Henning Kamp * Verify that a host should have access to a filesystem. 389a13234bbSPoul-Henning Kamp */ 390a13234bbSPoul-Henning Kamp 391a13234bbSPoul-Henning Kamp int 392a13234bbSPoul-Henning Kamp vfs_stdcheckexp(mp, nam, extflagsp, credanonp) 393a13234bbSPoul-Henning Kamp struct mount *mp; 394a13234bbSPoul-Henning Kamp struct sockaddr *nam; 395a13234bbSPoul-Henning Kamp int *extflagsp; 396a13234bbSPoul-Henning Kamp struct ucred **credanonp; 397a13234bbSPoul-Henning Kamp { 398a13234bbSPoul-Henning Kamp struct netcred *np; 399a13234bbSPoul-Henning Kamp 400a13234bbSPoul-Henning Kamp np = vfs_export_lookup(mp, nam); 401a13234bbSPoul-Henning Kamp if (np == NULL) 402a13234bbSPoul-Henning Kamp return (EACCES); 403a13234bbSPoul-Henning Kamp *extflagsp = np->netc_exflags; 404a13234bbSPoul-Henning Kamp *credanonp = &np->netc_anon; 405a13234bbSPoul-Henning Kamp return (0); 406a13234bbSPoul-Henning Kamp } 407a13234bbSPoul-Henning Kamp 408