19454b2d8SWarner Losh /*- 251369649SPedro F. Giffuni * SPDX-License-Identifier: BSD-3-Clause 351369649SPedro F. Giffuni * 4df8bae1dSRodney W. Grimes * Copyright (c) 1989, 1993 5df8bae1dSRodney W. Grimes * The Regents of the University of California. All rights reserved. 6df8bae1dSRodney W. Grimes * (c) UNIX System Laboratories, Inc. 7df8bae1dSRodney W. Grimes * All or some portions of this file are derived from material licensed 8df8bae1dSRodney W. Grimes * to the University of California by American Telephone and Telegraph 9df8bae1dSRodney W. Grimes * Co. or Unix System Laboratories, Inc. and are reproduced herein with 10df8bae1dSRodney W. Grimes * the permission of UNIX System Laboratories, Inc. 11df8bae1dSRodney W. Grimes * 12df8bae1dSRodney W. Grimes * Redistribution and use in source and binary forms, with or without 13df8bae1dSRodney W. Grimes * modification, are permitted provided that the following conditions 14df8bae1dSRodney W. Grimes * are met: 15df8bae1dSRodney W. Grimes * 1. Redistributions of source code must retain the above copyright 16df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer. 17df8bae1dSRodney W. Grimes * 2. Redistributions in binary form must reproduce the above copyright 18df8bae1dSRodney W. Grimes * notice, this list of conditions and the following disclaimer in the 19df8bae1dSRodney W. Grimes * documentation and/or other materials provided with the distribution. 2069a28758SEd Maste * 3. Neither the name of the University nor the names of its contributors 21df8bae1dSRodney W. Grimes * may be used to endorse or promote products derived from this software 22df8bae1dSRodney W. Grimes * without specific prior written permission. 23df8bae1dSRodney W. Grimes * 24df8bae1dSRodney W. Grimes * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 25df8bae1dSRodney W. Grimes * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 26df8bae1dSRodney W. Grimes * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 27df8bae1dSRodney W. Grimes * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 28df8bae1dSRodney W. Grimes * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 29df8bae1dSRodney W. Grimes * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 30df8bae1dSRodney W. Grimes * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 31df8bae1dSRodney W. Grimes * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 32df8bae1dSRodney W. Grimes * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 33df8bae1dSRodney W. Grimes * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 34df8bae1dSRodney W. Grimes * SUCH DAMAGE. 35df8bae1dSRodney W. Grimes * 36996c772fSJohn Dyson * @(#)vfs_subr.c 8.31 (Berkeley) 5/26/95 37df8bae1dSRodney W. Grimes */ 38df8bae1dSRodney W. Grimes 39677b542eSDavid E. O'Brien #include <sys/cdefs.h> 40677b542eSDavid E. O'Brien __FBSDID("$FreeBSD$"); 41677b542eSDavid E. O'Brien 429f25cbe4SAlexander V. Chernikov #include "opt_inet.h" 439f25cbe4SAlexander V. Chernikov #include "opt_inet6.h" 449f25cbe4SAlexander V. Chernikov 45df8bae1dSRodney W. Grimes #include <sys/param.h> 466d2e2df7SMark Johnston #include <sys/systm.h> 47057e2795SBruce Evans #include <sys/dirent.h> 48d4468577SJamie Gritton #include <sys/jail.h> 49986f4ce7SBruce Evans #include <sys/kernel.h> 50057e2795SBruce Evans #include <sys/lock.h> 51a1c995b6SPoul-Henning Kamp #include <sys/malloc.h> 52bf61e266SKris Kennaway #include <sys/mbuf.h> 53df8bae1dSRodney W. Grimes #include <sys/mount.h> 54057e2795SBruce Evans #include <sys/mutex.h> 5520efcfc6SAndrey V. Elsukov #include <sys/rmlock.h> 567e9e371fSJohn Baldwin #include <sys/refcount.h> 57593efaf9SJohn Baldwin #include <sys/signalvar.h> 58057e2795SBruce Evans #include <sys/socket.h> 595e950839SLuoqi Chen #include <sys/vnode.h> 60df8bae1dSRodney W. Grimes 619f25cbe4SAlexander V. Chernikov #include <netinet/in.h> 62057e2795SBruce Evans #include <net/radix.h> 63057e2795SBruce Evans 645bb84bc8SRobert Watson static MALLOC_DEFINE(M_NETADDR, "export_host", "Export host address structure"); 6555166637SPoul-Henning Kamp 666e18247aSRuslan Bukin #if defined(INET) || defined(INET6) 679f25cbe4SAlexander V. Chernikov static struct radix_node_head *vfs_create_addrlist_af( 689f25cbe4SAlexander V. Chernikov struct radix_node_head **prnh, int off); 696e18247aSRuslan Bukin #endif 704d77a549SAlfred Perlstein static void vfs_free_addrlist(struct netexport *nep); 714d77a549SAlfred Perlstein static int vfs_free_netcred(struct radix_node *rn, void *w); 729f25cbe4SAlexander V. Chernikov static void vfs_free_addrlist_af(struct radix_node_head **prnh); 734d77a549SAlfred Perlstein static int vfs_hang_addrlist(struct mount *mp, struct netexport *nep, 744d77a549SAlfred Perlstein struct export_args *argp); 75ebbfc2f8SPoul-Henning Kamp static struct netcred *vfs_export_lookup(struct mount *, struct sockaddr *); 7698d93822SBruce Evans 77df8bae1dSRodney W. Grimes /* 78a13234bbSPoul-Henning Kamp * Network address lookup element 79a13234bbSPoul-Henning Kamp */ 80a13234bbSPoul-Henning Kamp struct netcred { 81a13234bbSPoul-Henning Kamp struct radix_node netc_rnodes[2]; 82a13234bbSPoul-Henning Kamp int netc_exflags; 835679fe19SAlexander Kabaev struct ucred *netc_anon; 84a9148abdSDoug Rabson int netc_numsecflavors; 85a9148abdSDoug Rabson int netc_secflavors[MAXSECFLAVORS]; 86a13234bbSPoul-Henning Kamp }; 87a13234bbSPoul-Henning Kamp 88a13234bbSPoul-Henning Kamp /* 89a13234bbSPoul-Henning Kamp * Network export information 90a13234bbSPoul-Henning Kamp */ 91a13234bbSPoul-Henning Kamp struct netexport { 92a13234bbSPoul-Henning Kamp struct netcred ne_defexported; /* Default export */ 939f25cbe4SAlexander V. Chernikov struct radix_node_head *ne4; 949f25cbe4SAlexander V. Chernikov struct radix_node_head *ne6; 95a13234bbSPoul-Henning Kamp }; 96a13234bbSPoul-Henning Kamp 97a13234bbSPoul-Henning Kamp /* 98df8bae1dSRodney W. Grimes * Build hash lists of net addresses and hang them off the mount point. 995679fe19SAlexander Kabaev * Called by vfs_export() to set up the lists of export addresses. 100df8bae1dSRodney W. Grimes */ 101df8bae1dSRodney W. Grimes static int 1022830e09dSCraig Rodrigues vfs_hang_addrlist(struct mount *mp, struct netexport *nep, 1032830e09dSCraig Rodrigues struct export_args *argp) 104df8bae1dSRodney W. Grimes { 1053e85b721SEd Maste struct netcred *np; 1063e85b721SEd Maste struct radix_node_head *rnh; 1073e85b721SEd Maste int i; 108df8bae1dSRodney W. Grimes struct radix_node *rn; 109b85f65afSPedro F. Giffuni struct sockaddr *saddr, *smask = NULL; 110763f2e78SBjoern A. Zeeb #if defined(INET6) || defined(INET) 1119f25cbe4SAlexander V. Chernikov int off; 112763f2e78SBjoern A. Zeeb #endif 113df8bae1dSRodney W. Grimes int error; 114df8bae1dSRodney W. Grimes 115*e51e957eSRyan Moeller KASSERT(argp->ex_numsecflavors > 0, 116*e51e957eSRyan Moeller ("%s: numsecflavors <= 0", __func__)); 117*e51e957eSRyan Moeller KASSERT(argp->ex_numsecflavors < MAXSECFLAVORS, 118*e51e957eSRyan Moeller ("%s: numsecflavors >= MAXSECFLAVORS", __func__)); 119*e51e957eSRyan Moeller 120e74d4831SDima Dorfman /* 121e74d4831SDima Dorfman * XXX: This routine converts from a `struct xucred' 122e74d4831SDima Dorfman * (argp->ex_anon) to a `struct ucred' (np->netc_anon). This 123e74d4831SDima Dorfman * operation is questionable; for example, what should be done 124e74d4831SDima Dorfman * with fields like cr_uidinfo and cr_prison? Currently, this 125e74d4831SDima Dorfman * routine does not touch them (leaves them as NULL). 126e74d4831SDima Dorfman */ 12761e323a2SCraig Rodrigues if (argp->ex_anon.cr_version != XUCRED_VERSION) { 12861e323a2SCraig Rodrigues vfs_mount_error(mp, "ex_anon.cr_version: %d != %d", 12961e323a2SCraig Rodrigues argp->ex_anon.cr_version, XUCRED_VERSION); 130e74d4831SDima Dorfman return (EINVAL); 13161e323a2SCraig Rodrigues } 132e74d4831SDima Dorfman 133df8bae1dSRodney W. Grimes if (argp->ex_addrlen == 0) { 13461e323a2SCraig Rodrigues if (mp->mnt_flag & MNT_DEFEXPORTED) { 13561e323a2SCraig Rodrigues vfs_mount_error(mp, 13661e323a2SCraig Rodrigues "MNT_DEFEXPORTED already set for mount %p", mp); 137df8bae1dSRodney W. Grimes return (EPERM); 13861e323a2SCraig Rodrigues } 139df8bae1dSRodney W. Grimes np = &nep->ne_defexported; 140df8bae1dSRodney W. Grimes np->netc_exflags = argp->ex_flags; 1415679fe19SAlexander Kabaev np->netc_anon = crget(); 1425679fe19SAlexander Kabaev np->netc_anon->cr_uid = argp->ex_anon.cr_uid; 143838d9858SBrooks Davis crsetgroups(np->netc_anon, argp->ex_anon.cr_ngroups, 144838d9858SBrooks Davis argp->ex_anon.cr_groups); 145d4468577SJamie Gritton np->netc_anon->cr_prison = &prison0; 146d4468577SJamie Gritton prison_hold(np->netc_anon->cr_prison); 147a9148abdSDoug Rabson np->netc_numsecflavors = argp->ex_numsecflavors; 148a9148abdSDoug Rabson bcopy(argp->ex_secflavors, np->netc_secflavors, 149a9148abdSDoug Rabson sizeof(np->netc_secflavors)); 1505da56ddbSTor Egge MNT_ILOCK(mp); 151df8bae1dSRodney W. Grimes mp->mnt_flag |= MNT_DEFEXPORTED; 1525da56ddbSTor Egge MNT_IUNLOCK(mp); 153df8bae1dSRodney W. Grimes return (0); 154df8bae1dSRodney W. Grimes } 155bf61e266SKris Kennaway 156c43cad1aSScott Long #if MSIZE <= 256 1573a13c9ccSCraig Rodrigues if (argp->ex_addrlen > MLEN) { 1583a13c9ccSCraig Rodrigues vfs_mount_error(mp, "ex_addrlen %d is greater than %d", 1593a13c9ccSCraig Rodrigues argp->ex_addrlen, MLEN); 160bf61e266SKris Kennaway return (EINVAL); 1613a13c9ccSCraig Rodrigues } 162c43cad1aSScott Long #endif 163bf61e266SKris Kennaway 164df8bae1dSRodney W. Grimes i = sizeof(struct netcred) + argp->ex_addrlen + argp->ex_masklen; 165a163d034SWarner Losh np = (struct netcred *) malloc(i, M_NETADDR, M_WAITOK | M_ZERO); 166df8bae1dSRodney W. Grimes saddr = (struct sockaddr *) (np + 1); 167210a5a71SAlfred Perlstein if ((error = copyin(argp->ex_addr, saddr, argp->ex_addrlen))) 168df8bae1dSRodney W. Grimes goto out; 16961e323a2SCraig Rodrigues if (saddr->sa_family == AF_UNSPEC || saddr->sa_family > AF_MAX) { 170b96e102aSColin Percival error = EINVAL; 17161e323a2SCraig Rodrigues vfs_mount_error(mp, "Invalid saddr->sa_family: %d"); 172b96e102aSColin Percival goto out; 173b96e102aSColin Percival } 174df8bae1dSRodney W. Grimes if (saddr->sa_len > argp->ex_addrlen) 175df8bae1dSRodney W. Grimes saddr->sa_len = argp->ex_addrlen; 176df8bae1dSRodney W. Grimes if (argp->ex_masklen) { 177c5e3ef7eSAlfred Perlstein smask = (struct sockaddr *)((caddr_t)saddr + argp->ex_addrlen); 178210a5a71SAlfred Perlstein error = copyin(argp->ex_mask, smask, argp->ex_masklen); 179df8bae1dSRodney W. Grimes if (error) 180df8bae1dSRodney W. Grimes goto out; 181df8bae1dSRodney W. Grimes if (smask->sa_len > argp->ex_masklen) 182df8bae1dSRodney W. Grimes smask->sa_len = argp->ex_masklen; 183df8bae1dSRodney W. Grimes } 1849f25cbe4SAlexander V. Chernikov rnh = NULL; 1859f25cbe4SAlexander V. Chernikov switch (saddr->sa_family) { 1869f25cbe4SAlexander V. Chernikov #ifdef INET 1879f25cbe4SAlexander V. Chernikov case AF_INET: 1889f25cbe4SAlexander V. Chernikov if ((rnh = nep->ne4) == NULL) { 1899f25cbe4SAlexander V. Chernikov off = offsetof(struct sockaddr_in, sin_addr) << 3; 1909f25cbe4SAlexander V. Chernikov rnh = vfs_create_addrlist_af(&nep->ne4, off); 1919f25cbe4SAlexander V. Chernikov } 192df8bae1dSRodney W. Grimes break; 1939f25cbe4SAlexander V. Chernikov #endif 1949f25cbe4SAlexander V. Chernikov #ifdef INET6 1959f25cbe4SAlexander V. Chernikov case AF_INET6: 1969f25cbe4SAlexander V. Chernikov if ((rnh = nep->ne6) == NULL) { 1979f25cbe4SAlexander V. Chernikov off = offsetof(struct sockaddr_in6, sin6_addr) << 3; 1989f25cbe4SAlexander V. Chernikov rnh = vfs_create_addrlist_af(&nep->ne6, off); 199df8bae1dSRodney W. Grimes } 2009f25cbe4SAlexander V. Chernikov break; 2019f25cbe4SAlexander V. Chernikov #endif 2028b07e49aSJulian Elischer } 2039f25cbe4SAlexander V. Chernikov if (rnh == NULL) { 204df8bae1dSRodney W. Grimes error = ENOBUFS; 20561e323a2SCraig Rodrigues vfs_mount_error(mp, "%s %s %d", 20661e323a2SCraig Rodrigues "Unable to initialize radix node head ", 2079f25cbe4SAlexander V. Chernikov "for address family", saddr->sa_family); 208df8bae1dSRodney W. Grimes goto out; 209df8bae1dSRodney W. Grimes } 210956b0b65SJeffrey Hsu RADIX_NODE_HEAD_LOCK(rnh); 21161eee0e2SAlexander V. Chernikov rn = (*rnh->rnh_addaddr)(saddr, smask, &rnh->rh, np->netc_rnodes); 212956b0b65SJeffrey Hsu RADIX_NODE_HEAD_UNLOCK(rnh); 213956b0b65SJeffrey Hsu if (rn == NULL || np != (struct netcred *)rn) { /* already exists */ 21437a6b453SAlfred Perlstein error = EPERM; 2159f25cbe4SAlexander V. Chernikov vfs_mount_error(mp, 2169f25cbe4SAlexander V. Chernikov "netcred already exists for given addr/mask"); 21737a6b453SAlfred Perlstein goto out; 218df8bae1dSRodney W. Grimes } 219df8bae1dSRodney W. Grimes np->netc_exflags = argp->ex_flags; 2205679fe19SAlexander Kabaev np->netc_anon = crget(); 2215679fe19SAlexander Kabaev np->netc_anon->cr_uid = argp->ex_anon.cr_uid; 222838d9858SBrooks Davis crsetgroups(np->netc_anon, argp->ex_anon.cr_ngroups, 223f1c4014cSRick Macklem argp->ex_anon.cr_groups); 224d4468577SJamie Gritton np->netc_anon->cr_prison = &prison0; 225d4468577SJamie Gritton prison_hold(np->netc_anon->cr_prison); 226a9148abdSDoug Rabson np->netc_numsecflavors = argp->ex_numsecflavors; 227a9148abdSDoug Rabson bcopy(argp->ex_secflavors, np->netc_secflavors, 228a9148abdSDoug Rabson sizeof(np->netc_secflavors)); 229df8bae1dSRodney W. Grimes return (0); 230df8bae1dSRodney W. Grimes out: 231df8bae1dSRodney W. Grimes free(np, M_NETADDR); 232df8bae1dSRodney W. Grimes return (error); 233df8bae1dSRodney W. Grimes } 234df8bae1dSRodney W. Grimes 235a863c0fbSEivind Eklund /* Helper for vfs_free_addrlist. */ 236df8bae1dSRodney W. Grimes /* ARGSUSED */ 237df8bae1dSRodney W. Grimes static int 2382830e09dSCraig Rodrigues vfs_free_netcred(struct radix_node *rn, void *w) 239df8bae1dSRodney W. Grimes { 240a73034efSKonstantin Belousov struct radix_node_head *rnh = (struct radix_node_head *) w; 241a73034efSKonstantin Belousov struct ucred *cred; 242df8bae1dSRodney W. Grimes 24361eee0e2SAlexander V. Chernikov (*rnh->rnh_deladdr) (rn->rn_key, rn->rn_mask, &rnh->rh); 244a73034efSKonstantin Belousov cred = ((struct netcred *)rn)->netc_anon; 245a73034efSKonstantin Belousov if (cred != NULL) 246a73034efSKonstantin Belousov crfree(cred); 247210a5a71SAlfred Perlstein free(rn, M_NETADDR); 248df8bae1dSRodney W. Grimes return (0); 249df8bae1dSRodney W. Grimes } 250df8bae1dSRodney W. Grimes 2516e18247aSRuslan Bukin #if defined(INET) || defined(INET6) 2529f25cbe4SAlexander V. Chernikov static struct radix_node_head * 2539f25cbe4SAlexander V. Chernikov vfs_create_addrlist_af(struct radix_node_head **prnh, int off) 2549f25cbe4SAlexander V. Chernikov { 2559f25cbe4SAlexander V. Chernikov 2569f25cbe4SAlexander V. Chernikov if (rn_inithead((void **)prnh, off) == 0) 2579f25cbe4SAlexander V. Chernikov return (NULL); 2589f25cbe4SAlexander V. Chernikov RADIX_NODE_HEAD_LOCK_INIT(*prnh); 2599f25cbe4SAlexander V. Chernikov return (*prnh); 2609f25cbe4SAlexander V. Chernikov } 2616e18247aSRuslan Bukin #endif 2629f25cbe4SAlexander V. Chernikov 2639f25cbe4SAlexander V. Chernikov static void 2649f25cbe4SAlexander V. Chernikov vfs_free_addrlist_af(struct radix_node_head **prnh) 2659f25cbe4SAlexander V. Chernikov { 2669f25cbe4SAlexander V. Chernikov struct radix_node_head *rnh; 2679f25cbe4SAlexander V. Chernikov 2689f25cbe4SAlexander V. Chernikov rnh = *prnh; 2699f25cbe4SAlexander V. Chernikov RADIX_NODE_HEAD_LOCK(rnh); 2701c9b29f9SBryan Drewery (*rnh->rnh_walktree)(&rnh->rh, vfs_free_netcred, rnh); 2719f25cbe4SAlexander V. Chernikov RADIX_NODE_HEAD_UNLOCK(rnh); 2729f25cbe4SAlexander V. Chernikov RADIX_NODE_HEAD_DESTROY(rnh); 27357a8e341SBryan Drewery rn_detachhead((void **)prnh); 2749f25cbe4SAlexander V. Chernikov prnh = NULL; 2759f25cbe4SAlexander V. Chernikov } 2769f25cbe4SAlexander V. Chernikov 277df8bae1dSRodney W. Grimes /* 278df8bae1dSRodney W. Grimes * Free the net address hash lists that are hanging off the mount points. 279df8bae1dSRodney W. Grimes */ 280df8bae1dSRodney W. Grimes static void 2812830e09dSCraig Rodrigues vfs_free_addrlist(struct netexport *nep) 282df8bae1dSRodney W. Grimes { 283a73034efSKonstantin Belousov struct ucred *cred; 284df8bae1dSRodney W. Grimes 2859f25cbe4SAlexander V. Chernikov if (nep->ne4 != NULL) 2869f25cbe4SAlexander V. Chernikov vfs_free_addrlist_af(&nep->ne4); 2879f25cbe4SAlexander V. Chernikov if (nep->ne6 != NULL) 2889f25cbe4SAlexander V. Chernikov vfs_free_addrlist_af(&nep->ne6); 2899f25cbe4SAlexander V. Chernikov 290a73034efSKonstantin Belousov cred = nep->ne_defexported.netc_anon; 291a73034efSKonstantin Belousov if (cred != NULL) 292a73034efSKonstantin Belousov crfree(cred); 293a73034efSKonstantin Belousov 294a73034efSKonstantin Belousov } 295df8bae1dSRodney W. Grimes 29621a90397SAlfred Perlstein /* 29721a90397SAlfred Perlstein * High level function to manipulate export options on a mount point 29821a90397SAlfred Perlstein * and the passed in netexport. 29921a90397SAlfred Perlstein * Struct export_args *argp is the variable used to twiddle options, 30021a90397SAlfred Perlstein * the structure is described in sys/mount.h 30121a90397SAlfred Perlstein */ 302df8bae1dSRodney W. Grimes int 3032830e09dSCraig Rodrigues vfs_export(struct mount *mp, struct export_args *argp) 304df8bae1dSRodney W. Grimes { 305a13234bbSPoul-Henning Kamp struct netexport *nep; 306df8bae1dSRodney W. Grimes int error; 307df8bae1dSRodney W. Grimes 308*e51e957eSRyan Moeller if ((argp->ex_flags & (MNT_DELEXPORT | MNT_EXPORTED)) == 0) 309*e51e957eSRyan Moeller return (EINVAL); 310*e51e957eSRyan Moeller 311*e51e957eSRyan Moeller if ((argp->ex_flags & MNT_EXPORTED) != 0 && 312*e51e957eSRyan Moeller (argp->ex_numsecflavors <= 0 313*e51e957eSRyan Moeller || argp->ex_numsecflavors >= MAXSECFLAVORS)) 314a9148abdSDoug Rabson return (EINVAL); 315a9148abdSDoug Rabson 31661e323a2SCraig Rodrigues error = 0; 317a7053783SKonstantin Belousov lockmgr(&mp->mnt_explock, LK_EXCLUSIVE, NULL); 3185679fe19SAlexander Kabaev nep = mp->mnt_export; 319df8bae1dSRodney W. Grimes if (argp->ex_flags & MNT_DELEXPORT) { 32003eff583SCraig Rodrigues if (nep == NULL) { 32161e323a2SCraig Rodrigues error = ENOENT; 32261e323a2SCraig Rodrigues goto out; 32303eff583SCraig Rodrigues } 324f6b4c285SDoug Rabson if (mp->mnt_flag & MNT_EXPUBLIC) { 325f6b4c285SDoug Rabson vfs_setpublicfs(NULL, NULL, NULL); 3265da56ddbSTor Egge MNT_ILOCK(mp); 327f6b4c285SDoug Rabson mp->mnt_flag &= ~MNT_EXPUBLIC; 3285da56ddbSTor Egge MNT_IUNLOCK(mp); 329f6b4c285SDoug Rabson } 330df8bae1dSRodney W. Grimes vfs_free_addrlist(nep); 331a13234bbSPoul-Henning Kamp mp->mnt_export = NULL; 332a13234bbSPoul-Henning Kamp free(nep, M_MOUNT); 3330ca9ed86SAlexander Kabaev nep = NULL; 3345da56ddbSTor Egge MNT_ILOCK(mp); 335df8bae1dSRodney W. Grimes mp->mnt_flag &= ~(MNT_EXPORTED | MNT_DEFEXPORTED); 3365da56ddbSTor Egge MNT_IUNLOCK(mp); 337df8bae1dSRodney W. Grimes } 338df8bae1dSRodney W. Grimes if (argp->ex_flags & MNT_EXPORTED) { 339a13234bbSPoul-Henning Kamp if (nep == NULL) { 340a163d034SWarner Losh nep = malloc(sizeof(struct netexport), M_MOUNT, M_WAITOK | M_ZERO); 341a13234bbSPoul-Henning Kamp mp->mnt_export = nep; 342a13234bbSPoul-Henning Kamp } 343f6b4c285SDoug Rabson if (argp->ex_flags & MNT_EXPUBLIC) { 344f6b4c285SDoug Rabson if ((error = vfs_setpublicfs(mp, nep, argp)) != 0) 34561e323a2SCraig Rodrigues goto out; 3465da56ddbSTor Egge MNT_ILOCK(mp); 347f6b4c285SDoug Rabson mp->mnt_flag |= MNT_EXPUBLIC; 3485da56ddbSTor Egge MNT_IUNLOCK(mp); 349f6b4c285SDoug Rabson } 350bb56ec4aSPoul-Henning Kamp if ((error = vfs_hang_addrlist(mp, nep, argp))) 35161e323a2SCraig Rodrigues goto out; 3525da56ddbSTor Egge MNT_ILOCK(mp); 353df8bae1dSRodney W. Grimes mp->mnt_flag |= MNT_EXPORTED; 3545da56ddbSTor Egge MNT_IUNLOCK(mp); 355df8bae1dSRodney W. Grimes } 35661e323a2SCraig Rodrigues 35761e323a2SCraig Rodrigues out: 358a7053783SKonstantin Belousov lockmgr(&mp->mnt_explock, LK_RELEASE, NULL); 35961e323a2SCraig Rodrigues /* 36061e323a2SCraig Rodrigues * Once we have executed the vfs_export() command, we do 36161e323a2SCraig Rodrigues * not want to keep the "export" option around in the 36261e323a2SCraig Rodrigues * options list, since that will cause subsequent MNT_UPDATE 36361e323a2SCraig Rodrigues * calls to fail. The export information is saved in 36461e323a2SCraig Rodrigues * mp->mnt_export, so we can safely delete the "export" mount option 36561e323a2SCraig Rodrigues * here. 36661e323a2SCraig Rodrigues */ 36761e323a2SCraig Rodrigues vfs_deleteopt(mp->mnt_optnew, "export"); 36861e323a2SCraig Rodrigues vfs_deleteopt(mp->mnt_opt, "export"); 36961e323a2SCraig Rodrigues return (error); 370df8bae1dSRodney W. Grimes } 371df8bae1dSRodney W. Grimes 372f6b4c285SDoug Rabson /* 373f6b4c285SDoug Rabson * Set the publicly exported filesystem (WebNFS). Currently, only 374f6b4c285SDoug Rabson * one public filesystem is possible in the spec (RFC 2054 and 2055) 375f6b4c285SDoug Rabson */ 376f6b4c285SDoug Rabson int 3772830e09dSCraig Rodrigues vfs_setpublicfs(struct mount *mp, struct netexport *nep, 3782830e09dSCraig Rodrigues struct export_args *argp) 379f6b4c285SDoug Rabson { 380f6b4c285SDoug Rabson int error; 381f6b4c285SDoug Rabson struct vnode *rvp; 382f6b4c285SDoug Rabson char *cp; 383f6b4c285SDoug Rabson 384f6b4c285SDoug Rabson /* 385f6b4c285SDoug Rabson * mp == NULL -> invalidate the current info, the FS is 386f6b4c285SDoug Rabson * no longer exported. May be called from either vfs_export 387f6b4c285SDoug Rabson * or unmount, so check if it hasn't already been done. 388f6b4c285SDoug Rabson */ 389f6b4c285SDoug Rabson if (mp == NULL) { 390f6b4c285SDoug Rabson if (nfs_pub.np_valid) { 391f6b4c285SDoug Rabson nfs_pub.np_valid = 0; 392f6b4c285SDoug Rabson if (nfs_pub.np_index != NULL) { 3931ede983cSDag-Erling Smørgrav free(nfs_pub.np_index, M_TEMP); 394f6b4c285SDoug Rabson nfs_pub.np_index = NULL; 395f6b4c285SDoug Rabson } 396f6b4c285SDoug Rabson } 397f6b4c285SDoug Rabson return (0); 398f6b4c285SDoug Rabson } 399f6b4c285SDoug Rabson 400f6b4c285SDoug Rabson /* 401f6b4c285SDoug Rabson * Only one allowed at a time. 402f6b4c285SDoug Rabson */ 403f6b4c285SDoug Rabson if (nfs_pub.np_valid != 0 && mp != nfs_pub.np_mount) 404f6b4c285SDoug Rabson return (EBUSY); 405f6b4c285SDoug Rabson 406f6b4c285SDoug Rabson /* 407f6b4c285SDoug Rabson * Get real filehandle for root of exported FS. 408f6b4c285SDoug Rabson */ 409210a5a71SAlfred Perlstein bzero(&nfs_pub.np_handle, sizeof(nfs_pub.np_handle)); 410f6b4c285SDoug Rabson nfs_pub.np_handle.fh_fsid = mp->mnt_stat.f_fsid; 411f6b4c285SDoug Rabson 412dfd233edSAttilio Rao if ((error = VFS_ROOT(mp, LK_EXCLUSIVE, &rvp))) 413f6b4c285SDoug Rabson return (error); 414f6b4c285SDoug Rabson 41510bcafe9SPawel Jakub Dawidek if ((error = VOP_VPTOFH(rvp, &nfs_pub.np_handle.fh_fid))) 416f6b4c285SDoug Rabson return (error); 417f6b4c285SDoug Rabson 418f6b4c285SDoug Rabson vput(rvp); 419f6b4c285SDoug Rabson 420f6b4c285SDoug Rabson /* 421f6b4c285SDoug Rabson * If an indexfile was specified, pull it in. 422f6b4c285SDoug Rabson */ 423f6b4c285SDoug Rabson if (argp->ex_indexfile != NULL) { 4246d41588bSAlexander Kabaev if (nfs_pub.np_index == NULL) 4251ede983cSDag-Erling Smørgrav nfs_pub.np_index = malloc(MAXNAMLEN + 1, M_TEMP, 426a163d034SWarner Losh M_WAITOK); 427f6b4c285SDoug Rabson error = copyinstr(argp->ex_indexfile, nfs_pub.np_index, 428f6b4c285SDoug Rabson MAXNAMLEN, (size_t *)0); 429f6b4c285SDoug Rabson if (!error) { 430f6b4c285SDoug Rabson /* 431f6b4c285SDoug Rabson * Check for illegal filenames. 432f6b4c285SDoug Rabson */ 433f6b4c285SDoug Rabson for (cp = nfs_pub.np_index; *cp; cp++) { 434f6b4c285SDoug Rabson if (*cp == '/') { 435f6b4c285SDoug Rabson error = EINVAL; 436f6b4c285SDoug Rabson break; 437f6b4c285SDoug Rabson } 438f6b4c285SDoug Rabson } 439f6b4c285SDoug Rabson } 440f6b4c285SDoug Rabson if (error) { 4411ede983cSDag-Erling Smørgrav free(nfs_pub.np_index, M_TEMP); 4425679fe19SAlexander Kabaev nfs_pub.np_index = NULL; 443f6b4c285SDoug Rabson return (error); 444f6b4c285SDoug Rabson } 445f6b4c285SDoug Rabson } 446f6b4c285SDoug Rabson 447f6b4c285SDoug Rabson nfs_pub.np_mount = mp; 448f6b4c285SDoug Rabson nfs_pub.np_valid = 1; 449f6b4c285SDoug Rabson return (0); 450f6b4c285SDoug Rabson } 451f6b4c285SDoug Rabson 45221a90397SAlfred Perlstein /* 45321a90397SAlfred Perlstein * Used by the filesystems to determine if a given network address 4546ffb78d1SEd Maste * (passed in 'nam') is present in their exports list, returns a pointer 45521a90397SAlfred Perlstein * to struct netcred so that the filesystem can examine it for 45621a90397SAlfred Perlstein * access rights (read/write/etc). 45721a90397SAlfred Perlstein */ 458ebbfc2f8SPoul-Henning Kamp static struct netcred * 459ebbfc2f8SPoul-Henning Kamp vfs_export_lookup(struct mount *mp, struct sockaddr *nam) 460df8bae1dSRodney W. Grimes { 46120efcfc6SAndrey V. Elsukov RADIX_NODE_HEAD_RLOCK_TRACKER; 462a13234bbSPoul-Henning Kamp struct netexport *nep; 4635e254379SEmmanuel Vadot struct netcred *np = NULL; 4643e85b721SEd Maste struct radix_node_head *rnh; 465df8bae1dSRodney W. Grimes struct sockaddr *saddr; 466df8bae1dSRodney W. Grimes 467a13234bbSPoul-Henning Kamp nep = mp->mnt_export; 468a13234bbSPoul-Henning Kamp if (nep == NULL) 469a13234bbSPoul-Henning Kamp return (NULL); 4705e254379SEmmanuel Vadot if ((mp->mnt_flag & MNT_EXPORTED) == 0) 4715e254379SEmmanuel Vadot return (NULL); 4725e254379SEmmanuel Vadot 473df8bae1dSRodney W. Grimes /* 4745e254379SEmmanuel Vadot * Lookup in the export list 4755e254379SEmmanuel Vadot */ 476b1d51685SEmmanuel Vadot if (nam != NULL) { 47757bf258eSGarrett Wollman saddr = nam; 4789f25cbe4SAlexander V. Chernikov rnh = NULL; 4799f25cbe4SAlexander V. Chernikov switch (saddr->sa_family) { 4809f25cbe4SAlexander V. Chernikov case AF_INET: 4819f25cbe4SAlexander V. Chernikov rnh = nep->ne4; 4829f25cbe4SAlexander V. Chernikov break; 4839f25cbe4SAlexander V. Chernikov case AF_INET6: 4849f25cbe4SAlexander V. Chernikov rnh = nep->ne6; 4859f25cbe4SAlexander V. Chernikov break; 4869f25cbe4SAlexander V. Chernikov } 487df8bae1dSRodney W. Grimes if (rnh != NULL) { 4883120b9d4SKip Macy RADIX_NODE_HEAD_RLOCK(rnh); 4895e254379SEmmanuel Vadot np = (struct netcred *) (*rnh->rnh_matchaddr)(saddr, &rnh->rh); 4903120b9d4SKip Macy RADIX_NODE_HEAD_RUNLOCK(rnh); 4915e254379SEmmanuel Vadot if (np != NULL && (np->netc_rnodes->rn_flags & RNF_ROOT) != 0) 4925e254379SEmmanuel Vadot return (NULL); 493df8bae1dSRodney W. Grimes } 494b1d51685SEmmanuel Vadot } 495b1d51685SEmmanuel Vadot 496b1d51685SEmmanuel Vadot /* 497b1d51685SEmmanuel Vadot * If no address match, use the default if it exists. 498b1d51685SEmmanuel Vadot */ 499b1d51685SEmmanuel Vadot if (np == NULL && (mp->mnt_flag & MNT_DEFEXPORTED) != 0) 500b1d51685SEmmanuel Vadot return (&nep->ne_defexported); 5015e254379SEmmanuel Vadot 502df8bae1dSRodney W. Grimes return (np); 503df8bae1dSRodney W. Grimes } 50461f5d510SDavid Greenman 50561f5d510SDavid Greenman /* 506a13234bbSPoul-Henning Kamp * XXX: This comment comes from the deprecated ufs_check_export() 507a13234bbSPoul-Henning Kamp * XXX: and may not entirely apply, but lacking something better: 508a13234bbSPoul-Henning Kamp * This is the generic part of fhtovp called after the underlying 509a13234bbSPoul-Henning Kamp * filesystem has validated the file handle. 510a13234bbSPoul-Henning Kamp * 511a13234bbSPoul-Henning Kamp * Verify that a host should have access to a filesystem. 512a13234bbSPoul-Henning Kamp */ 513a13234bbSPoul-Henning Kamp 514a13234bbSPoul-Henning Kamp int 5152830e09dSCraig Rodrigues vfs_stdcheckexp(struct mount *mp, struct sockaddr *nam, int *extflagsp, 516a9148abdSDoug Rabson struct ucred **credanonp, int *numsecflavors, int **secflavors) 517a13234bbSPoul-Henning Kamp { 518a13234bbSPoul-Henning Kamp struct netcred *np; 519a13234bbSPoul-Henning Kamp 520a7053783SKonstantin Belousov lockmgr(&mp->mnt_explock, LK_SHARED, NULL); 521a13234bbSPoul-Henning Kamp np = vfs_export_lookup(mp, nam); 5225679fe19SAlexander Kabaev if (np == NULL) { 523a7053783SKonstantin Belousov lockmgr(&mp->mnt_explock, LK_RELEASE, NULL); 5245679fe19SAlexander Kabaev *credanonp = NULL; 525a13234bbSPoul-Henning Kamp return (EACCES); 5265679fe19SAlexander Kabaev } 527a13234bbSPoul-Henning Kamp *extflagsp = np->netc_exflags; 5285679fe19SAlexander Kabaev if ((*credanonp = np->netc_anon) != NULL) 5295679fe19SAlexander Kabaev crhold(*credanonp); 530*e51e957eSRyan Moeller if (numsecflavors) { 531a9148abdSDoug Rabson *numsecflavors = np->netc_numsecflavors; 532*e51e957eSRyan Moeller KASSERT(*numsecflavors > 0, 533*e51e957eSRyan Moeller ("%s: numsecflavors <= 0", __func__)); 534*e51e957eSRyan Moeller KASSERT(*numsecflavors < MAXSECFLAVORS, 535*e51e957eSRyan Moeller ("%s: numsecflavors >= MAXSECFLAVORS", __func__)); 536*e51e957eSRyan Moeller } 537a9148abdSDoug Rabson if (secflavors) 538a9148abdSDoug Rabson *secflavors = np->netc_secflavors; 5395679fe19SAlexander Kabaev lockmgr(&mp->mnt_explock, LK_RELEASE, NULL); 540a13234bbSPoul-Henning Kamp return (0); 541a13234bbSPoul-Henning Kamp } 542a13234bbSPoul-Henning Kamp 543