xref: /netbsd/sys/nfs/nfs_export.c (revision fe7fc08e)
1 /*	$NetBSD: nfs_export.c,v 1.63 2021/06/04 10:44:58 hannken Exp $	*/
2 
3 /*-
4  * Copyright (c) 1997, 1998, 2004, 2005, 2008, 2019 The NetBSD Foundation, Inc.
5  * All rights reserved.
6  *
7  * This code is derived from software contributed to The NetBSD Foundation
8  * by Jason R. Thorpe of the Numerical Aerospace Simulation Facility,
9  * NASA Ames Research Center.
10  * This code is derived from software contributed to The NetBSD Foundation
11  * by Charles M. Hannum.
12  * This code is derived from software contributed to The NetBSD Foundation
13  * by Julio M. Merino Vidal.
14  *
15  * Redistribution and use in source and binary forms, with or without
16  * modification, are permitted provided that the following conditions
17  * are met:
18  * 1. Redistributions of source code must retain the above copyright
19  *    notice, this list of conditions and the following disclaimer.
20  * 2. Redistributions in binary form must reproduce the above copyright
21  *    notice, this list of conditions and the following disclaimer in the
22  *    documentation and/or other materials provided with the distribution.
23  *
24  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
25  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
26  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
27  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
28  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
29  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
30  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
31  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
32  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
33  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
34  * POSSIBILITY OF SUCH DAMAGE.
35  */
36 
37 /*
38  * Copyright (c) 1989, 1993
39  *	The Regents of the University of California.  All rights reserved.
40  * (c) UNIX System Laboratories, Inc.
41  * All or some portions of this file are derived from material licensed
42  * to the University of California by American Telephone and Telegraph
43  * Co. or Unix System Laboratories, Inc. and are reproduced herein with
44  * the permission of UNIX System Laboratories, Inc.
45  *
46  * Redistribution and use in source and binary forms, with or without
47  * modification, are permitted provided that the following conditions
48  * are met:
49  * 1. Redistributions of source code must retain the above copyright
50  *    notice, this list of conditions and the following disclaimer.
51  * 2. Redistributions in binary form must reproduce the above copyright
52  *    notice, this list of conditions and the following disclaimer in the
53  *    documentation and/or other materials provided with the distribution.
54  * 3. Neither the name of the University nor the names of its contributors
55  *    may be used to endorse or promote products derived from this software
56  *    without specific prior written permission.
57  *
58  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
59  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
60  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
61  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
62  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
63  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
64  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
65  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
66  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
67  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
68  * SUCH DAMAGE.
69  *
70  *	@(#)vfs_subr.c	8.13 (Berkeley) 4/18/94
71  */
72 
73 /*
74  * VFS exports list management.
75  *
76  * Lock order: vfs_busy -> mnt_updating -> netexport_lock.
77  */
78 
79 #include <sys/cdefs.h>
80 __KERNEL_RCSID(0, "$NetBSD: nfs_export.c,v 1.63 2021/06/04 10:44:58 hannken Exp $");
81 
82 #include <sys/param.h>
83 #include <sys/systm.h>
84 #include <sys/kernel.h>
85 #include <sys/queue.h>
86 #include <sys/proc.h>
87 #include <sys/mount.h>
88 #include <sys/vnode.h>
89 #include <sys/namei.h>
90 #include <sys/errno.h>
91 #include <sys/malloc.h>
92 #include <sys/domain.h>
93 #include <sys/mbuf.h>
94 #include <sys/dirent.h>
95 #include <sys/socket.h>		/* XXX for AF_MAX */
96 #include <sys/kauth.h>
97 
98 #include <net/radix.h>
99 
100 #include <netinet/in.h>
101 
102 #include <nfs/rpcv2.h>
103 #include <nfs/nfsproto.h>
104 #include <nfs/nfs.h>
105 #include <nfs/nfs_var.h>
106 
107 /*
108  * Network address lookup element.
109  */
110 struct netcred {
111 	struct	radix_node netc_rnodes[2];
112 	int	netc_refcnt;
113 	int	netc_exflags;
114 	kauth_cred_t netc_anon;
115 };
116 
117 /*
118  * Network export information.
119  */
120 struct netexport {
121 	TAILQ_ENTRY(netexport) ne_list;
122 	struct mount *ne_mount;
123 	struct netcred ne_defexported;		      /* Default export */
124 	struct radix_node_head *ne_rtable[AF_MAX+1]; /* Individual exports */
125 };
126 TAILQ_HEAD(, netexport) netexport_list =
127     TAILQ_HEAD_INITIALIZER(netexport_list);
128 
129 /* Publicly exported file system. */
130 struct nfs_public nfs_pub;
131 
132 /*
133  * Local prototypes.
134  */
135 static int init_exports(struct mount *, struct netexport **);
136 static int hang_addrlist(struct mount *, struct netexport *,
137     const struct export_args *);
138 static int sacheck(struct sockaddr *);
139 static int free_netcred(struct radix_node *, void *);
140 static int export(struct netexport *, const struct export_args *);
141 static int setpublicfs(struct mount *, struct netexport *,
142     const struct export_args *);
143 static struct netcred *netcred_lookup(struct netexport *, struct mbuf *);
144 static struct netexport *netexport_lookup(const struct mount *);
145 static struct netexport *netexport_lookup_byfsid(const fsid_t *);
146 static void netexport_clear(struct netexport *);
147 static void netexport_insert(struct netexport *);
148 static void netexport_remove(struct netexport *);
149 static void netexport_wrlock(void);
150 static void netexport_wrunlock(void);
151 static int nfs_export_update_30(struct mount *mp, const char *path, void *);
152 
153 static krwlock_t netexport_lock;
154 
155 /*
156  * PUBLIC INTERFACE
157  */
158 
159 /*
160  * Declare and initialize the file system export hooks.
161  */
162 static void netexport_unmount(struct mount *);
163 
164 struct vfs_hooks nfs_export_hooks = {
165 	{ NULL, NULL },
166 	.vh_unmount = netexport_unmount,
167 	.vh_reexport = nfs_export_update_30,
168 };
169 
170 /*
171  * VFS unmount hook for NFS exports.
172  *
173  * Releases NFS exports list resources if the given mount point has some.
174  * As allocation happens lazily, it may be that it doesn't have this
175  * information, although it theoretically should.
176  */
177 static void
netexport_unmount(struct mount * mp)178 netexport_unmount(struct mount *mp)
179 {
180 	struct netexport *ne;
181 
182 	KASSERT(mp != NULL);
183 
184 	netexport_wrlock();
185 	ne = netexport_lookup(mp);
186 	if (ne == NULL) {
187 		netexport_wrunlock();
188 		return;
189 	}
190 	netexport_clear(ne);
191 	netexport_remove(ne);
192 	netexport_wrunlock();
193 	kmem_free(ne, sizeof(*ne));
194 }
195 
196 void
netexport_init(void)197 netexport_init(void)
198 {
199 
200 	rw_init(&netexport_lock);
201 }
202 
203 void
netexport_fini(void)204 netexport_fini(void)
205 {
206 	struct netexport *ne;
207 	struct mount *mp;
208 	int error;
209 
210 	while (!TAILQ_EMPTY(&netexport_list)) {
211 		netexport_wrlock();
212 		ne = TAILQ_FIRST(&netexport_list);
213 		mp = ne->ne_mount;
214 		error = vfs_busy(mp);
215 		netexport_wrunlock();
216 		if (error != 0) {
217 			kpause("nfsfini", false, hz, NULL);
218 			continue;
219 		}
220 		mutex_enter(mp->mnt_updating);	/* mnt_flag */
221 		netexport_unmount(mp);
222 		mutex_exit(mp->mnt_updating);	/* mnt_flag */
223 		vfs_unbusy(mp);
224 	}
225 	rw_destroy(&netexport_lock);
226 }
227 
228 
229 /*
230  * Atomically set the NFS exports list of the given file system, replacing
231  * it with a new list of entries.
232  *
233  * Returns zero on success or an appropriate error code otherwise.
234  *
235  * Helper function for the nfssvc(2) system call (NFSSVC_SETEXPORTSLIST
236  * and NFSSVC_REPLACEEXPORTSLIST command).
237  */
238 int
mountd_set_exports_list(const struct mountd_exports_list * mel,struct lwp * l,struct mount * nmp,int cmd)239 mountd_set_exports_list(const struct mountd_exports_list *mel, struct lwp *l,
240     struct mount *nmp, int cmd)
241 {
242 	int error;
243 	size_t i;
244 	struct mount *mp;
245 	struct netexport *ne;
246 	struct pathbuf *pb;
247 	struct nameidata nd;
248 	struct vnode *vp;
249 	size_t fid_size;
250 
251 	if (kauth_authorize_network(l->l_cred, KAUTH_NETWORK_NFS,
252 	    KAUTH_REQ_NETWORK_NFS_EXPORT, NULL, NULL, NULL) != 0)
253 		return EPERM;
254 
255 	/* Look up the file system path. */
256 	error = pathbuf_copyin(mel->mel_path, &pb);
257 	if (error) {
258 		return error;
259 	}
260 	NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, pb);
261 	error = namei(&nd);
262 	if (error != 0) {
263 		pathbuf_destroy(pb);
264 		return error;
265 	}
266 	vp = nd.ni_vp;
267 	mp = vp->v_mount;
268 	KASSERT(nmp == NULL || nmp == mp);
269 	pathbuf_destroy(pb);
270 
271 	/*
272 	 * Make sure the file system can do vptofh.  If the file system
273 	 * knows the handle's size, just trust it's able to do the
274 	 * actual translation also (otherwise we should check fhtovp
275 	 * also, and that's getting a wee bit ridiculous).
276 	 */
277 	fid_size = 0;
278 	if ((error = VFS_VPTOFH(vp, NULL, &fid_size)) != E2BIG) {
279 		vput(vp);
280 		return EOPNOTSUPP;
281 	}
282 
283 	/* Mark the file system busy. */
284 	error = vfs_busy(mp);
285 	vput(vp);
286 	if (error != 0)
287 		return error;
288 	if (nmp == NULL)
289 		mutex_enter(mp->mnt_updating);	/* mnt_flag */
290 	netexport_wrlock();
291 	ne = netexport_lookup(mp);
292 	if (ne == NULL) {
293 		error = init_exports(mp, &ne);
294 		if (error != 0) {
295 			goto out;
296 		}
297 	}
298 
299 	KASSERT(ne != NULL);
300 	KASSERT(ne->ne_mount == mp);
301 
302 	if (cmd == NFSSVC_SETEXPORTSLIST) {
303 		if (mel->mel_nexports == 0)
304 			netexport_clear(ne);
305 		else if (mel->mel_nexports == 1)
306 			error = export(ne, &mel->mel_exports[0]);
307 		else {
308 			printf("%s: Cannot set more than one "
309 			    "entry at once (unimplemented)\n", __func__);
310 			error = EOPNOTSUPP;
311 		}
312 	} else if (cmd == NFSSVC_REPLACEEXPORTSLIST) {
313 		netexport_clear(ne);
314 		for (i = 0; error == 0 && i < mel->mel_nexports; i++)
315 			error = export(ne, &mel->mel_exports[i]);
316 	} else {
317 		printf("%s: Command %#x not implemented\n", __func__, cmd);
318 		error = EOPNOTSUPP;
319 	}
320 
321 out:
322 	netexport_wrunlock();
323 	if (nmp == NULL)
324 		mutex_exit(mp->mnt_updating);	/* mnt_flag */
325 	vfs_unbusy(mp);
326 	return error;
327 }
328 
329 static void
netexport_insert(struct netexport * ne)330 netexport_insert(struct netexport *ne)
331 {
332 
333 	TAILQ_INSERT_HEAD(&netexport_list, ne, ne_list);
334 }
335 
336 static void
netexport_remove(struct netexport * ne)337 netexport_remove(struct netexport *ne)
338 {
339 
340 	TAILQ_REMOVE(&netexport_list, ne, ne_list);
341 }
342 
343 static struct netexport *
netexport_lookup(const struct mount * mp)344 netexport_lookup(const struct mount *mp)
345 {
346 	struct netexport *ne;
347 
348 	TAILQ_FOREACH(ne, &netexport_list, ne_list) {
349 		if (ne->ne_mount == mp) {
350 			goto done;
351 		}
352 	}
353 	ne = NULL;
354 done:
355 	return ne;
356 }
357 
358 static struct netexport *
netexport_lookup_byfsid(const fsid_t * fsid)359 netexport_lookup_byfsid(const fsid_t *fsid)
360 {
361 	struct netexport *ne;
362 
363 	TAILQ_FOREACH(ne, &netexport_list, ne_list) {
364 		const struct mount *mp = ne->ne_mount;
365 
366 		if (mp->mnt_stat.f_fsidx.__fsid_val[0] == fsid->__fsid_val[0] &&
367 		    mp->mnt_stat.f_fsidx.__fsid_val[1] == fsid->__fsid_val[1]) {
368 			goto done;
369 		}
370 	}
371 	ne = NULL;
372 done:
373 
374 	return ne;
375 }
376 
377 /*
378  * Check if the file system specified by the 'mp' mount structure is
379  * exported to a client with 'anon' anonymous credentials.  The 'mb'
380  * argument is an mbuf containing the network address of the client.
381  * The return parameters for the export flags for the client are returned
382  * in the address specified by 'wh'.
383  *
384  * This function is used exclusively by the NFS server.  It is generally
385  * invoked before VFS_FHTOVP to validate that a client has access to the
386  * file system.
387  */
388 
389 int
netexport_check(const fsid_t * fsid,struct mbuf * mb,struct mount ** mpp,int * wh,kauth_cred_t * anon)390 netexport_check(const fsid_t *fsid, struct mbuf *mb, struct mount **mpp,
391     int *wh, kauth_cred_t *anon)
392 {
393 	struct netexport *ne;
394 	struct netcred *np;
395 
396 	ne = netexport_lookup_byfsid(fsid);
397 	if (ne == NULL) {
398 		return EACCES;
399 	}
400 	np = netcred_lookup(ne, mb);
401 	if (np == NULL) {
402 		return EACCES;
403 	}
404 
405 	*mpp = ne->ne_mount;
406 	*wh = np->netc_exflags;
407 	*anon = np->netc_anon;
408 
409 	return 0;
410 }
411 
412 /*
413  * Handles legacy export requests.  In this case, the export information
414  * is hardcoded in a specific place of the mount arguments structure (given
415  * in data); the request for an update is given through the fspec field
416  * (also in a known location), which must be a null pointer.
417  *
418  * Returns EJUSTRETURN if the given command was not a export request.
419  * Otherwise, returns 0 on success or an appropriate error code otherwise.
420  */
421 static int
nfs_export_update_30(struct mount * mp,const char * path,void * data)422 nfs_export_update_30(struct mount *mp, const char *path, void *data)
423 {
424 	struct mountd_exports_list mel;
425 	struct mnt_export_args30 *args;
426 
427 	args = data;
428 	mel.mel_path = path;
429 
430 	if (args->fspec != NULL)
431 		return EJUSTRETURN;
432 
433 	if (args->eargs.ex_flags & 0x00020000) {
434 		/* Request to delete exports.  The mask above holds the
435 		 * value that used to be in MNT_DELEXPORT. */
436 		mel.mel_nexports = 0;
437 	} else {
438 		/*
439 		 * The following code assumes export_args has not
440 		 * changed since export_args30, so check that.
441 		 */
442 		__CTASSERT(sizeof(args->eargs) == sizeof(*mel.mel_exports));
443 
444 		mel.mel_nexports = 1;
445 		mel.mel_exports = (void *)&args->eargs;
446 	}
447 
448 	return mountd_set_exports_list(&mel, curlwp, mp, NFSSVC_SETEXPORTSLIST);
449 }
450 
451 /*
452  * INTERNAL FUNCTIONS
453  */
454 
455 /*
456  * Initializes NFS exports for the mountpoint given in 'mp'.
457  * If successful, returns 0 and sets *nep to the address of the new
458  * netexport item; otherwise returns an appropriate error code
459  * and *nep remains unmodified.
460  */
461 static int
init_exports(struct mount * mp,struct netexport ** nep)462 init_exports(struct mount *mp, struct netexport **nep)
463 {
464 	int error;
465 	struct export_args ea;
466 	struct netexport *ne;
467 
468 	KASSERT(mp != NULL);
469 
470 	/* Ensure that we do not already have this mount point. */
471 	KASSERT(netexport_lookup(mp) == NULL);
472 
473 	ne = kmem_zalloc(sizeof(*ne), KM_SLEEP);
474 	ne->ne_mount = mp;
475 
476 	/* Set the default export entry.  Handled internally by export upon
477 	 * first call. */
478 	memset(&ea, 0, sizeof(ea));
479 	ea.ex_root = -2;
480 	if (mp->mnt_flag & MNT_RDONLY)
481 		ea.ex_flags |= MNT_EXRDONLY;
482 	error = export(ne, &ea);
483 	if (error != 0) {
484 		kmem_free(ne, sizeof(*ne));
485 	} else {
486 		netexport_insert(ne);
487 		*nep = ne;
488 	}
489 
490 	return error;
491 }
492 
493 /*
494  * Build hash lists of net addresses and hang them off the mount point.
495  * Called by export() to set up a new entry in the lists of export
496  * addresses.
497  */
498 static int
hang_addrlist(struct mount * mp,struct netexport * nep,const struct export_args * argp)499 hang_addrlist(struct mount *mp, struct netexport *nep,
500     const struct export_args *argp)
501 {
502 	int error, i;
503 	struct netcred *np, *enp;
504 	struct radix_node_head *rnh;
505 	struct sockaddr *saddr, *smask;
506 	struct domain *dom;
507 
508 	smask = NULL;
509 
510 	if (argp->ex_addrlen == 0) {
511 		if (mp->mnt_flag & MNT_DEFEXPORTED)
512 			return EPERM;
513 		np = &nep->ne_defexported;
514 		KASSERT(np->netc_anon == NULL);
515 		np->netc_anon = kauth_cred_alloc();
516 		np->netc_exflags = argp->ex_flags;
517 		kauth_uucred_to_cred(np->netc_anon, &argp->ex_anon);
518 		mp->mnt_flag |= MNT_DEFEXPORTED;
519 		return 0;
520 	}
521 
522 	if (argp->ex_addrlen > MLEN || argp->ex_masklen > MLEN)
523 		return EINVAL;
524 
525 	i = sizeof(struct netcred) + argp->ex_addrlen + argp->ex_masklen;
526 	np = malloc(i, M_NETADDR, M_WAITOK | M_ZERO);
527 	np->netc_anon = kauth_cred_alloc();
528 	saddr = (struct sockaddr *)(np + 1);
529 	error = copyin(argp->ex_addr, saddr, argp->ex_addrlen);
530 	if (error)
531 		goto out;
532 	if (saddr->sa_len > argp->ex_addrlen)
533 		saddr->sa_len = argp->ex_addrlen;
534 	if (sacheck(saddr) == -1) {
535 		error = EINVAL;
536 		goto out;
537 	}
538 	if (argp->ex_masklen) {
539 		smask = (struct sockaddr *)((char *)saddr + argp->ex_addrlen);
540 		error = copyin(argp->ex_mask, smask, argp->ex_masklen);
541 		if (error)
542 			goto out;
543 		if (smask->sa_len > argp->ex_masklen)
544 			smask->sa_len = argp->ex_masklen;
545 		if (smask->sa_family != saddr->sa_family) {
546 			error = EINVAL;
547 			goto out;
548 		}
549 		if (sacheck(smask) == -1) {
550 			error = EINVAL;
551 			goto out;
552 		}
553 	}
554 	i = saddr->sa_family;
555 	if ((rnh = nep->ne_rtable[i]) == 0) {
556 		/*
557 		 * Seems silly to initialize every AF when most are not
558 		 * used, do so on demand here.
559 		 */
560 		DOMAIN_FOREACH(dom) {
561 			if (dom->dom_family == i && dom->dom_rtattach) {
562 				rn_inithead((void **)&nep->ne_rtable[i],
563 					dom->dom_rtoffset);
564 				break;
565 			}
566 		}
567 		if ((rnh = nep->ne_rtable[i]) == 0) {
568 			error = ENOBUFS;
569 			goto out;
570 		}
571 	}
572 
573 	enp = (struct netcred *)(*rnh->rnh_addaddr)(saddr, smask, rnh,
574 	    np->netc_rnodes);
575 	if (enp != np) {
576 		if (enp == NULL) {
577 			enp = (struct netcred *)(*rnh->rnh_lookup)(saddr,
578 			    smask, rnh);
579 			if (enp == NULL) {
580 				error = EPERM;
581 				goto out;
582 			}
583 		} else
584 			enp->netc_refcnt++;
585 
586 		goto check;
587 	} else
588 		enp->netc_refcnt = 1;
589 
590 	np->netc_exflags = argp->ex_flags;
591 	kauth_uucred_to_cred(np->netc_anon, &argp->ex_anon);
592 	return 0;
593 check:
594 	if (enp->netc_exflags != argp->ex_flags ||
595 	    kauth_cred_uucmp(enp->netc_anon, &argp->ex_anon) != 0)
596 		error = EPERM;
597 	else
598 		error = 0;
599 out:
600 	KASSERT(np->netc_anon != NULL);
601 	kauth_cred_free(np->netc_anon);
602 	free(np, M_NETADDR);
603 	return error;
604 }
605 
606 /*
607  * Ensure that the address stored in 'sa' is valid.
608  * Returns zero on success, otherwise -1.
609  */
610 static int
sacheck(struct sockaddr * sa)611 sacheck(struct sockaddr *sa)
612 {
613 
614 	switch (sa->sa_family) {
615 	case AF_INET: {
616 		struct sockaddr_in *sin = (struct sockaddr_in *)sa;
617 		char *p = (char *)sin->sin_zero;
618 		size_t i;
619 
620 		if (sin->sin_len != sizeof(*sin))
621 			return -1;
622 		if (sin->sin_port != 0)
623 			return -1;
624 		for (i = 0; i < sizeof(sin->sin_zero); i++)
625 			if (*p++ != '\0')
626 				return -1;
627 		return 0;
628 	}
629 	case AF_INET6: {
630 		struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sa;
631 
632 		if (sin6->sin6_len != sizeof(*sin6))
633 			return -1;
634 		if (sin6->sin6_port != 0)
635 			return -1;
636 		return 0;
637 	}
638 	default:
639 		return -1;
640 	}
641 }
642 
643 /*
644  * Free the netcred object pointed to by the 'rn' radix node.
645  * 'w' holds a pointer to the radix tree head.
646  */
647 static int
free_netcred(struct radix_node * rn,void * w)648 free_netcred(struct radix_node *rn, void *w)
649 {
650 	struct radix_node_head *rnh = (struct radix_node_head *)w;
651 	struct netcred *np = (struct netcred *)(void *)rn;
652 
653 	(*rnh->rnh_deladdr)(rn->rn_key, rn->rn_mask, rnh);
654 	if (--(np->netc_refcnt) <= 0) {
655 		KASSERT(np->netc_anon != NULL);
656 		kauth_cred_free(np->netc_anon);
657 		free(np, M_NETADDR);
658 	}
659 	return 0;
660 }
661 
662 /*
663  * Clears the exports list for a given file system.
664  */
665 static void
netexport_clear(struct netexport * ne)666 netexport_clear(struct netexport *ne)
667 {
668 	struct radix_node_head *rnh;
669 	struct mount *mp = ne->ne_mount;
670 	int i;
671 
672 	if (mp->mnt_flag & MNT_EXPUBLIC) {
673 		setpublicfs(NULL, NULL, NULL);
674 		mp->mnt_flag &= ~MNT_EXPUBLIC;
675 	}
676 
677 	for (i = 0; i <= AF_MAX; i++) {
678 		if ((rnh = ne->ne_rtable[i]) != NULL) {
679 			rn_walktree(rnh, free_netcred, rnh);
680 			free(rnh, M_RTABLE);
681 			ne->ne_rtable[i] = NULL;
682 		}
683 	}
684 
685 	if ((mp->mnt_flag & MNT_DEFEXPORTED) != 0) {
686 		struct netcred *np = &ne->ne_defexported;
687 
688 		KASSERT(np->netc_anon != NULL);
689 		kauth_cred_free(np->netc_anon);
690 		np->netc_anon = NULL;
691 	} else {
692 		KASSERT(ne->ne_defexported.netc_anon == NULL);
693 	}
694 
695 	mp->mnt_flag &= ~(MNT_EXPORTED | MNT_DEFEXPORTED);
696 }
697 
698 /*
699  * Add a new export entry (described by an export_args structure) to the
700  * given file system.
701  */
702 static int
export(struct netexport * nep,const struct export_args * argp)703 export(struct netexport *nep, const struct export_args *argp)
704 {
705 	struct mount *mp = nep->ne_mount;
706 	int error;
707 
708 	if (argp->ex_flags & MNT_EXPORTED) {
709 		if (argp->ex_flags & MNT_EXPUBLIC) {
710 			if ((error = setpublicfs(mp, nep, argp)) != 0)
711 				return error;
712 			mp->mnt_flag |= MNT_EXPUBLIC;
713 		}
714 		if ((error = hang_addrlist(mp, nep, argp)) != 0)
715 			return error;
716 		mp->mnt_flag |= MNT_EXPORTED;
717 	}
718 	return 0;
719 }
720 
721 /*
722  * Set the publicly exported filesystem (WebNFS).  Currently, only
723  * one public filesystem is possible in the spec (RFC 2054 and 2055)
724  */
725 static int
setpublicfs(struct mount * mp,struct netexport * nep,const struct export_args * argp)726 setpublicfs(struct mount *mp, struct netexport *nep,
727     const struct export_args *argp)
728 {
729 	char *cp;
730 	int error;
731 	struct vnode *rvp;
732 	size_t fhsize;
733 
734 	/*
735 	 * mp == NULL --> invalidate the current info; the FS is
736 	 * no longer exported. May be called from either export
737 	 * or unmount, so check if it hasn't already been done.
738 	 */
739 	if (mp == NULL) {
740 		if (nfs_pub.np_valid) {
741 			nfs_pub.np_valid = 0;
742 			if (nfs_pub.np_handle != NULL) {
743 				free(nfs_pub.np_handle, M_TEMP);
744 				nfs_pub.np_handle = NULL;
745 			}
746 			if (nfs_pub.np_index != NULL) {
747 				free(nfs_pub.np_index, M_TEMP);
748 				nfs_pub.np_index = NULL;
749 			}
750 		}
751 		return 0;
752 	}
753 
754 	/*
755 	 * Only one allowed at a time.
756 	 */
757 	if (nfs_pub.np_valid != 0 && mp != nfs_pub.np_mount)
758 		return EBUSY;
759 
760 	/*
761 	 * Get real filehandle for root of exported FS.
762 	 */
763 	if ((error = VFS_ROOT(mp, LK_EXCLUSIVE, &rvp)))
764 		return error;
765 
766 	fhsize = 0;
767 	error = vfs_composefh(rvp, NULL, &fhsize);
768 	if (error != E2BIG)
769 		return error;
770 	nfs_pub.np_handle = malloc(fhsize, M_TEMP, M_NOWAIT);
771 	if (nfs_pub.np_handle == NULL)
772 		error = ENOMEM;
773 	else
774 		error = vfs_composefh(rvp, nfs_pub.np_handle, &fhsize);
775 	if (error)
776 		return error;
777 
778 	vput(rvp);
779 
780 	/*
781 	 * If an indexfile was specified, pull it in.
782 	 */
783 	if (argp->ex_indexfile != NULL) {
784 		nfs_pub.np_index = malloc(NFS_MAXNAMLEN + 1, M_TEMP, M_WAITOK);
785 		error = copyinstr(argp->ex_indexfile, nfs_pub.np_index,
786 		    NFS_MAXNAMLEN, (size_t *)0);
787 		if (!error) {
788 			/*
789 			 * Check for illegal filenames.
790 			 */
791 			for (cp = nfs_pub.np_index; *cp; cp++) {
792 				if (*cp == '/') {
793 					error = EINVAL;
794 					break;
795 				}
796 			}
797 		}
798 		if (error) {
799 			free(nfs_pub.np_index, M_TEMP);
800 			return error;
801 		}
802 	}
803 
804 	nfs_pub.np_mount = mp;
805 	nfs_pub.np_valid = 1;
806 	return 0;
807 }
808 
809 /*
810  * Look up an export entry in the exports list that matches the address
811  * stored in 'nam'.  If no entry is found, the default one is used instead
812  * (if available).
813  */
814 static struct netcred *
netcred_lookup(struct netexport * ne,struct mbuf * nam)815 netcred_lookup(struct netexport *ne, struct mbuf *nam)
816 {
817 	struct netcred *np;
818 	struct radix_node_head *rnh;
819 	struct sockaddr *saddr;
820 
821 	if ((ne->ne_mount->mnt_flag & MNT_EXPORTED) == 0) {
822 		return NULL;
823 	}
824 
825 	/*
826 	 * Look in the export list first.
827 	 */
828 	np = NULL;
829 	if (nam != NULL) {
830 		saddr = mtod(nam, struct sockaddr *);
831 		rnh = ne->ne_rtable[saddr->sa_family];
832 		if (rnh != NULL) {
833 			np = (struct netcred *)
834 				(*rnh->rnh_matchaddr)((void *)saddr,
835 						      rnh);
836 			if (np && np->netc_rnodes->rn_flags & RNF_ROOT)
837 				np = NULL;
838 		}
839 	}
840 	/*
841 	 * If no address match, use the default if it exists.
842 	 */
843 	if (np == NULL && ne->ne_mount->mnt_flag & MNT_DEFEXPORTED)
844 		np = &ne->ne_defexported;
845 
846 	return np;
847 }
848 
849 void
netexport_rdlock(void)850 netexport_rdlock(void)
851 {
852 
853 	rw_enter(&netexport_lock, RW_READER);
854 }
855 
856 void
netexport_rdunlock(void)857 netexport_rdunlock(void)
858 {
859 
860 	rw_exit(&netexport_lock);
861 }
862 
863 static void
netexport_wrlock(void)864 netexport_wrlock(void)
865 {
866 
867 	rw_enter(&netexport_lock, RW_WRITER);
868 }
869 
870 static void
netexport_wrunlock(void)871 netexport_wrunlock(void)
872 {
873 
874 	rw_exit(&netexport_lock);
875 }
876 
877 bool
netexport_hasexports(void)878 netexport_hasexports(void)
879 {
880 
881 	return nfs_pub.np_valid || !TAILQ_EMPTY(&netexport_list);
882 }
883