1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2008 Sun Microsystems, Inc. All rights reserved. 23 * Use is subject to license terms. 24 */ 25 26 #include <sys/param.h> 27 #include <sys/errno.h> 28 #include <sys/vfs.h> 29 #include <sys/vnode.h> 30 #include <sys/cred.h> 31 #include <sys/cmn_err.h> 32 #include <sys/systm.h> 33 #include <sys/kmem.h> 34 #include <sys/pathname.h> 35 #include <sys/utsname.h> 36 #include <sys/debug.h> 37 #include <sys/door.h> 38 #include <sys/sdt.h> 39 40 #include <rpc/types.h> 41 #include <rpc/auth.h> 42 #include <rpc/clnt.h> 43 44 #include <nfs/nfs.h> 45 #include <nfs/export.h> 46 #include <nfs/nfs_clnt.h> 47 #include <nfs/auth.h> 48 49 #define EQADDR(a1, a2) \ 50 (bcmp((char *)(a1)->buf, (char *)(a2)->buf, (a1)->len) == 0 && \ 51 (a1)->len == (a2)->len) 52 53 static struct knetconfig auth_knconf; 54 static servinfo_t svp; 55 static clinfo_t ci; 56 57 static struct kmem_cache *exi_cache_handle; 58 static void exi_cache_reclaim(void *); 59 static void exi_cache_trim(struct exportinfo *exi); 60 61 int nfsauth_cache_hit; 62 int nfsauth_cache_miss; 63 int nfsauth_cache_reclaim; 64 65 /* 66 * Number of seconds to wait for an NFSAUTH upcall. 67 */ 68 static int nfsauth_timeout = 20; 69 70 /* 71 * mountd is a server-side only daemon. This will need to be 72 * revisited if the NFS server is ever made zones-aware. 73 */ 74 kmutex_t mountd_lock; 75 door_handle_t mountd_dh; 76 77 void 78 mountd_args(uint_t did) 79 { 80 mutex_enter(&mountd_lock); 81 if (mountd_dh) 82 door_ki_rele(mountd_dh); 83 mountd_dh = door_ki_lookup(did); 84 mutex_exit(&mountd_lock); 85 } 86 87 void 88 nfsauth_init(void) 89 { 90 /* 91 * mountd can be restarted by smf(5). We need to make sure 92 * the updated door handle will safely make it to mountd_dh 93 */ 94 mutex_init(&mountd_lock, NULL, MUTEX_DEFAULT, NULL); 95 96 /* 97 * Allocate nfsauth cache handle 98 */ 99 exi_cache_handle = kmem_cache_create("exi_cache_handle", 100 sizeof (struct auth_cache), 0, NULL, NULL, 101 exi_cache_reclaim, NULL, NULL, 0); 102 } 103 104 /* 105 * Finalization routine for nfsauth. It is important to call this routine 106 * before destroying the exported_lock. 107 */ 108 void 109 nfsauth_fini(void) 110 { 111 /* 112 * Deallocate nfsauth cache handle 113 */ 114 kmem_cache_destroy(exi_cache_handle); 115 } 116 117 /* 118 * Convert the address in a netbuf to 119 * a hash index for the auth_cache table. 120 */ 121 static int 122 hash(struct netbuf *a) 123 { 124 int i, h = 0; 125 126 for (i = 0; i < a->len; i++) 127 h ^= a->buf[i]; 128 129 return (h & (AUTH_TABLESIZE - 1)); 130 } 131 132 /* 133 * Mask out the components of an 134 * address that do not identify 135 * a host. For socket addresses the 136 * masking gets rid of the port number. 137 */ 138 static void 139 addrmask(struct netbuf *addr, struct netbuf *mask) 140 { 141 int i; 142 143 for (i = 0; i < addr->len; i++) 144 addr->buf[i] &= mask->buf[i]; 145 } 146 147 /* 148 * nfsauth4_access is used for NFS V4 auth checking. Besides doing 149 * the common nfsauth_access(), it will check if the client can 150 * have a limited access to this vnode even if the security flavor 151 * used does not meet the policy. 152 */ 153 int 154 nfsauth4_access(struct exportinfo *exi, vnode_t *vp, struct svc_req *req) 155 { 156 int access; 157 158 access = nfsauth_access(exi, req); 159 160 /* 161 * There are cases that the server needs to allow the client 162 * to have a limited view. 163 * 164 * e.g. 165 * /export is shared as "sec=sys,rw=dfs-test-4,sec=krb5,rw" 166 * /export/home is shared as "sec=sys,rw" 167 * 168 * When the client mounts /export with sec=sys, the client 169 * would get a limited view with RO access on /export to see 170 * "home" only because the client is allowed to access 171 * /export/home with auth_sys. 172 */ 173 if (access & NFSAUTH_DENIED || access & NFSAUTH_WRONGSEC) { 174 /* 175 * Allow ro permission with LIMITED view if there is a 176 * sub-dir exported under vp. 177 */ 178 if (has_visible(exi, vp)) 179 return (NFSAUTH_LIMITED); 180 } 181 182 return (access); 183 } 184 185 static void 186 sys_log(const char *msg) 187 { 188 static time_t tstamp = 0; 189 time_t now; 190 191 /* 192 * msg is shown (at most) once per minute 193 */ 194 now = gethrestime_sec(); 195 if ((tstamp + 60) < now) { 196 tstamp = now; 197 cmn_err(CE_WARN, msg); 198 } 199 } 200 201 /* 202 * Get the access information from the cache or callup to the mountd 203 * to get and cache the access information in the kernel. 204 */ 205 int 206 nfsauth_cache_get(struct exportinfo *exi, struct svc_req *req, int flavor) 207 { 208 struct netbuf addr; 209 struct netbuf *claddr; 210 struct auth_cache **head; 211 struct auth_cache *ap; 212 int access; 213 varg_t varg = {0}; 214 nfsauth_res_t res = {0}; 215 XDR xdrs_a; 216 XDR xdrs_r; 217 size_t absz; 218 caddr_t abuf; 219 size_t rbsz = (size_t)(BYTES_PER_XDR_UNIT * 2); 220 char result[BYTES_PER_XDR_UNIT * 2] = {0}; 221 caddr_t rbuf = (caddr_t)&result; 222 int last = 0; 223 door_arg_t da; 224 door_info_t di; 225 door_handle_t dh; 226 uint_t ntries = 0; 227 228 /* 229 * Now check whether this client already 230 * has an entry for this flavor in the cache 231 * for this export. 232 * Get the caller's address, mask off the 233 * parts of the address that do not identify 234 * the host (port number, etc), and then hash 235 * it to find the chain of cache entries. 236 */ 237 238 claddr = svc_getrpccaller(req->rq_xprt); 239 addr = *claddr; 240 addr.buf = kmem_alloc(addr.len, KM_SLEEP); 241 bcopy(claddr->buf, addr.buf, claddr->len); 242 addrmask(&addr, svc_getaddrmask(req->rq_xprt)); 243 head = &exi->exi_cache[hash(&addr)]; 244 245 rw_enter(&exi->exi_cache_lock, RW_READER); 246 for (ap = *head; ap; ap = ap->auth_next) { 247 if (EQADDR(&addr, &ap->auth_addr) && flavor == ap->auth_flavor) 248 break; 249 } 250 if (ap) { /* cache hit */ 251 access = ap->auth_access; 252 ap->auth_time = gethrestime_sec(); 253 nfsauth_cache_hit++; 254 } 255 256 rw_exit(&exi->exi_cache_lock); 257 258 if (ap) { 259 kmem_free(addr.buf, addr.len); 260 return (access); 261 } 262 263 nfsauth_cache_miss++; 264 265 /* 266 * No entry in the cache for this client/flavor 267 * so we need to call the nfsauth service in the 268 * mount daemon. 269 */ 270 retry: 271 mutex_enter(&mountd_lock); 272 dh = mountd_dh; 273 if (dh) 274 door_ki_hold(dh); 275 mutex_exit(&mountd_lock); 276 277 if (dh == NULL) { 278 /* 279 * The rendezvous point has not been established yet ! 280 * This could mean that either mountd(1m) has not yet 281 * been started or that _this_ routine nuked the door 282 * handle after receiving an EINTR for a REVOKED door. 283 * 284 * Returning NFSAUTH_DROP will cause the NFS client 285 * to retransmit the request, so let's try to be more 286 * rescillient and attempt for ntries before we bail. 287 */ 288 if (++ntries % NFSAUTH_DR_TRYCNT) { 289 delay(hz); 290 goto retry; 291 } 292 sys_log("nfsauth: mountd has not established door"); 293 kmem_free(addr.buf, addr.len); 294 return (NFSAUTH_DROP); 295 } 296 ntries = 0; 297 varg.vers = V_PROTO; 298 varg.arg_u.arg.cmd = NFSAUTH_ACCESS; 299 varg.arg_u.arg.areq.req_client.n_len = addr.len; 300 varg.arg_u.arg.areq.req_client.n_bytes = addr.buf; 301 varg.arg_u.arg.areq.req_netid = svc_getnetid(req->rq_xprt); 302 varg.arg_u.arg.areq.req_path = exi->exi_export.ex_path; 303 varg.arg_u.arg.areq.req_flavor = flavor; 304 305 /* 306 * Setup the XDR stream for encoding the arguments. Notice that 307 * in addition to the args having variable fields (req_netid and 308 * req_path), the argument data structure is itself versioned, 309 * so we need to make sure we can size the arguments buffer 310 * appropriately to encode all the args. If we can't get sizing 311 * info _or_ properly encode the arguments, there's really no 312 * point in continuting, so we fail the request. 313 */ 314 DTRACE_PROBE1(nfsserv__func__nfsauth__varg, varg_t *, &varg); 315 if ((absz = xdr_sizeof(xdr_varg, (void *)&varg)) == 0) { 316 door_ki_rele(dh); 317 kmem_free(addr.buf, addr.len); 318 return (NFSAUTH_DENIED); 319 } 320 abuf = (caddr_t)kmem_alloc(absz, KM_SLEEP); 321 xdrmem_create(&xdrs_a, abuf, absz, XDR_ENCODE); 322 if (!xdr_varg(&xdrs_a, &varg)) { 323 door_ki_rele(dh); 324 goto fail; 325 } 326 XDR_DESTROY(&xdrs_a); 327 328 /* 329 * The result (nfsauth_res_t) is always two int's, so we don't 330 * have to dynamically size (or allocate) the results buffer. 331 * Now that we've got what we need, we prep the door arguments 332 * and place the call. 333 */ 334 da.data_ptr = (char *)abuf; 335 da.data_size = absz; 336 da.desc_ptr = NULL; 337 da.desc_num = 0; 338 da.rbuf = (char *)rbuf; 339 da.rsize = rbsz; 340 341 switch (door_ki_upcall_limited(dh, &da, NULL, SIZE_MAX, 0)) { 342 case 0: /* Success */ 343 if (da.data_ptr != da.rbuf && da.data_size == 0) { 344 /* 345 * The door_return that contained the data 346 * failed ! We're here because of the 2nd 347 * door_return (w/o data) such that we can 348 * get control of the thread (and exit 349 * gracefully). 350 */ 351 DTRACE_PROBE1(nfsserv__func__nfsauth__door__nil, 352 door_arg_t *, &da); 353 door_ki_rele(dh); 354 goto fail; 355 356 } else if (rbuf != da.rbuf) { 357 /* 358 * The only time this should be true 359 * is iff userland wanted to hand us 360 * a bigger response than what we 361 * expect; that should not happen 362 * (nfsauth_res_t is only 2 int's), 363 * but we check nevertheless. 364 */ 365 rbuf = da.rbuf; 366 rbsz = da.rsize; 367 368 } else if (rbsz > da.data_size) { 369 /* 370 * We were expecting two int's; but if 371 * userland fails in encoding the XDR 372 * stream, we detect that here, since 373 * the mountd forces down only one byte 374 * in such scenario. 375 */ 376 door_ki_rele(dh); 377 goto fail; 378 } 379 door_ki_rele(dh); 380 break; 381 382 case EAGAIN: 383 /* 384 * Server out of resources; back off for a bit 385 */ 386 door_ki_rele(dh); 387 kmem_free(abuf, absz); 388 delay(hz); 389 goto retry; 390 /* NOTREACHED */ 391 392 case EINTR: 393 if (!door_ki_info(dh, &di)) { 394 if (di.di_attributes & DOOR_REVOKED) { 395 /* 396 * The server barfed and revoked 397 * the (existing) door on us; we 398 * want to wait to give smf(5) a 399 * chance to restart mountd(1m) 400 * and establish a new door handle. 401 */ 402 mutex_enter(&mountd_lock); 403 if (dh == mountd_dh) 404 mountd_dh = NULL; 405 mutex_exit(&mountd_lock); 406 door_ki_rele(dh); 407 kmem_free(abuf, absz); 408 delay(hz); 409 goto retry; 410 } 411 /* 412 * If the door was _not_ revoked on us, 413 * then more than likely we took an INTR, 414 * so we need to fail the operation. 415 */ 416 door_ki_rele(dh); 417 goto fail; 418 } 419 /* 420 * The only failure that can occur from getting 421 * the door info is EINVAL, so we let the code 422 * below handle it. 423 */ 424 /* FALLTHROUGH */ 425 426 case EBADF: 427 case EINVAL: 428 default: 429 /* 430 * If we have a stale door handle, give smf a last 431 * chance to start it by sleeping for a little bit. 432 * If we're still hosed, we'll fail the call. 433 * 434 * Since we're going to reacquire the door handle 435 * upon the retry, we opt to sleep for a bit and 436 * _not_ to clear mountd_dh. If mountd restarted 437 * and was able to set mountd_dh, we should see 438 * the new instance; if not, we won't get caught 439 * up in the retry/DELAY loop. 440 */ 441 door_ki_rele(dh); 442 if (!last) { 443 delay(hz); 444 last++; 445 goto retry; 446 } 447 sys_log("nfsauth: stale mountd door handle"); 448 goto fail; 449 } 450 451 /* 452 * No door errors encountered; setup the XDR stream for decoding 453 * the results. If we fail to decode the results, we've got no 454 * other recourse than to fail the request. 455 */ 456 xdrmem_create(&xdrs_r, rbuf, rbsz, XDR_DECODE); 457 if (!xdr_nfsauth_res(&xdrs_r, &res)) 458 goto fail; 459 XDR_DESTROY(&xdrs_r); 460 461 DTRACE_PROBE1(nfsserv__func__nfsauth__results, nfsauth_res_t *, &res); 462 switch (res.stat) { 463 case NFSAUTH_DR_OKAY: 464 access = res.ares.auth_perm; 465 kmem_free(abuf, absz); 466 break; 467 468 case NFSAUTH_DR_EFAIL: 469 case NFSAUTH_DR_DECERR: 470 case NFSAUTH_DR_BADCMD: 471 default: 472 fail: 473 kmem_free(addr.buf, addr.len); 474 kmem_free(abuf, absz); 475 return (NFSAUTH_DENIED); 476 /* NOTREACHED */ 477 } 478 479 /* 480 * Now cache the result on the cache chain 481 * for this export (if there's enough memory) 482 */ 483 ap = kmem_cache_alloc(exi_cache_handle, KM_NOSLEEP); 484 if (ap) { 485 ap->auth_addr = addr; 486 ap->auth_flavor = flavor; 487 ap->auth_access = access; 488 ap->auth_time = gethrestime_sec(); 489 rw_enter(&exi->exi_cache_lock, RW_WRITER); 490 ap->auth_next = *head; 491 *head = ap; 492 rw_exit(&exi->exi_cache_lock); 493 } else { 494 kmem_free(addr.buf, addr.len); 495 } 496 497 return (access); 498 } 499 500 /* 501 * Check if the requesting client has access to the filesystem with 502 * a given nfs flavor number which is an explicitly shared flavor. 503 */ 504 int 505 nfsauth4_secinfo_access(struct exportinfo *exi, struct svc_req *req, 506 int flavor, int perm) 507 { 508 int access; 509 510 if (! (perm & M_4SEC_EXPORTED)) { 511 return (NFSAUTH_DENIED); 512 } 513 514 /* 515 * Optimize if there are no lists 516 */ 517 if ((perm & (M_ROOT|M_NONE)) == 0) { 518 perm &= ~M_4SEC_EXPORTED; 519 if (perm == M_RO) 520 return (NFSAUTH_RO); 521 if (perm == M_RW) 522 return (NFSAUTH_RW); 523 } 524 525 access = nfsauth_cache_get(exi, req, flavor); 526 527 return (access); 528 } 529 530 int 531 nfsauth_access(struct exportinfo *exi, struct svc_req *req) 532 { 533 int access, mapaccess; 534 struct secinfo *sp; 535 int i, flavor, perm; 536 int authnone_entry = -1; 537 538 /* 539 * Get the nfs flavor number from xprt. 540 */ 541 flavor = (int)(uintptr_t)req->rq_xprt->xp_cookie; 542 543 /* 544 * First check the access restrictions on the filesystem. If 545 * there are no lists associated with this flavor then there's no 546 * need to make an expensive call to the nfsauth service or to 547 * cache anything. 548 */ 549 550 sp = exi->exi_export.ex_secinfo; 551 for (i = 0; i < exi->exi_export.ex_seccnt; i++) { 552 if (flavor != sp[i].s_secinfo.sc_nfsnum) { 553 if (sp[i].s_secinfo.sc_nfsnum == AUTH_NONE) 554 authnone_entry = i; 555 continue; 556 } 557 break; 558 } 559 560 mapaccess = 0; 561 562 if (i >= exi->exi_export.ex_seccnt) { 563 /* 564 * Flavor not found, but use AUTH_NONE if it exists 565 */ 566 if (authnone_entry == -1) 567 return (NFSAUTH_DENIED); 568 flavor = AUTH_NONE; 569 mapaccess = NFSAUTH_MAPNONE; 570 i = authnone_entry; 571 } 572 573 /* 574 * If the flavor is in the ex_secinfo list, but not an explicitly 575 * shared flavor by the user, it is a result of the nfsv4 server 576 * namespace setup. We will grant an RO permission similar for 577 * a pseudo node except that this node is a shared one. 578 * 579 * e.g. flavor in (flavor) indicates that it is not explictly 580 * shared by the user: 581 * 582 * / (sys, krb5) 583 * | 584 * export #share -o sec=sys (krb5) 585 * | 586 * secure #share -o sec=krb5 587 * 588 * In this case, when a krb5 request coming in to access 589 * /export, RO permission is granted. 590 */ 591 if (!(sp[i].s_flags & M_4SEC_EXPORTED)) 592 return (mapaccess | NFSAUTH_RO); 593 594 /* 595 * Optimize if there are no lists 596 */ 597 perm = sp[i].s_flags; 598 if ((perm & (M_ROOT|M_NONE)) == 0) { 599 perm &= ~M_4SEC_EXPORTED; 600 if (perm == M_RO) 601 return (mapaccess | NFSAUTH_RO); 602 if (perm == M_RW) 603 return (mapaccess | NFSAUTH_RW); 604 } 605 606 access = nfsauth_cache_get(exi, req, flavor); 607 if (access & NFSAUTH_DENIED) 608 access = NFSAUTH_DENIED; 609 610 return (access | mapaccess); 611 } 612 613 /* 614 * Free the nfsauth cache for a given export 615 */ 616 void 617 nfsauth_cache_free(struct exportinfo *exi) 618 { 619 int i; 620 struct auth_cache *p, *next; 621 622 for (i = 0; i < AUTH_TABLESIZE; i++) { 623 for (p = exi->exi_cache[i]; p; p = next) { 624 kmem_free(p->auth_addr.buf, p->auth_addr.len); 625 next = p->auth_next; 626 kmem_cache_free(exi_cache_handle, (void *)p); 627 } 628 } 629 } 630 631 /* 632 * Called by the kernel memory allocator when 633 * memory is low. Free unused cache entries. 634 * If that's not enough, the VM system will 635 * call again for some more. 636 */ 637 /*ARGSUSED*/ 638 void 639 exi_cache_reclaim(void *cdrarg) 640 { 641 int i; 642 struct exportinfo *exi; 643 644 rw_enter(&exported_lock, RW_READER); 645 646 for (i = 0; i < EXPTABLESIZE; i++) { 647 for (exi = exptable[i]; exi; exi = exi->exi_hash) { 648 exi_cache_trim(exi); 649 } 650 } 651 nfsauth_cache_reclaim++; 652 653 rw_exit(&exported_lock); 654 } 655 656 /* 657 * Don't reclaim entries until they've been 658 * in the cache for at least exi_cache_time 659 * seconds. 660 */ 661 time_t exi_cache_time = 60 * 60; 662 663 void 664 exi_cache_trim(struct exportinfo *exi) 665 { 666 struct auth_cache *p; 667 struct auth_cache *prev, *next; 668 int i; 669 time_t stale_time; 670 671 stale_time = gethrestime_sec() - exi_cache_time; 672 673 rw_enter(&exi->exi_cache_lock, RW_WRITER); 674 675 for (i = 0; i < AUTH_TABLESIZE; i++) { 676 677 /* 678 * Free entries that have not been 679 * used for exi_cache_time seconds. 680 */ 681 prev = NULL; 682 for (p = exi->exi_cache[i]; p; p = next) { 683 next = p->auth_next; 684 if (p->auth_time > stale_time) { 685 prev = p; 686 continue; 687 } 688 689 kmem_free(p->auth_addr.buf, p->auth_addr.len); 690 kmem_cache_free(exi_cache_handle, (void *)p); 691 if (prev == NULL) 692 exi->exi_cache[i] = next; 693 else 694 prev->auth_next = next; 695 } 696 } 697 698 rw_exit(&exi->exi_cache_lock); 699 } 700