xref: /netbsd-src/sys/nfs/nfs_export.c (revision 5b8c1df03b667cf5192014221cef3e7201b24c74)
1*5b8c1df0Shannken /*	$NetBSD: nfs_export.c,v 1.63 2021/06/04 10:44:58 hannken Exp $	*/
22a3e5eebSjmmv 
32a3e5eebSjmmv /*-
47d06f330Sad  * Copyright (c) 1997, 1998, 2004, 2005, 2008, 2019 The NetBSD Foundation, Inc.
52a3e5eebSjmmv  * All rights reserved.
62a3e5eebSjmmv  *
72a3e5eebSjmmv  * This code is derived from software contributed to The NetBSD Foundation
82a3e5eebSjmmv  * by Jason R. Thorpe of the Numerical Aerospace Simulation Facility,
92a3e5eebSjmmv  * NASA Ames Research Center.
102a3e5eebSjmmv  * This code is derived from software contributed to The NetBSD Foundation
112a3e5eebSjmmv  * by Charles M. Hannum.
122a3e5eebSjmmv  * This code is derived from software contributed to The NetBSD Foundation
132a3e5eebSjmmv  * by Julio M. Merino Vidal.
142a3e5eebSjmmv  *
152a3e5eebSjmmv  * Redistribution and use in source and binary forms, with or without
162a3e5eebSjmmv  * modification, are permitted provided that the following conditions
172a3e5eebSjmmv  * are met:
182a3e5eebSjmmv  * 1. Redistributions of source code must retain the above copyright
192a3e5eebSjmmv  *    notice, this list of conditions and the following disclaimer.
202a3e5eebSjmmv  * 2. Redistributions in binary form must reproduce the above copyright
212a3e5eebSjmmv  *    notice, this list of conditions and the following disclaimer in the
222a3e5eebSjmmv  *    documentation and/or other materials provided with the distribution.
232a3e5eebSjmmv  *
242a3e5eebSjmmv  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
252a3e5eebSjmmv  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
262a3e5eebSjmmv  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
272a3e5eebSjmmv  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
282a3e5eebSjmmv  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
292a3e5eebSjmmv  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
302a3e5eebSjmmv  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
312a3e5eebSjmmv  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
322a3e5eebSjmmv  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
332a3e5eebSjmmv  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
342a3e5eebSjmmv  * POSSIBILITY OF SUCH DAMAGE.
352a3e5eebSjmmv  */
362a3e5eebSjmmv 
372a3e5eebSjmmv /*
382a3e5eebSjmmv  * Copyright (c) 1989, 1993
392a3e5eebSjmmv  *	The Regents of the University of California.  All rights reserved.
402a3e5eebSjmmv  * (c) UNIX System Laboratories, Inc.
412a3e5eebSjmmv  * All or some portions of this file are derived from material licensed
422a3e5eebSjmmv  * to the University of California by American Telephone and Telegraph
432a3e5eebSjmmv  * Co. or Unix System Laboratories, Inc. and are reproduced herein with
442a3e5eebSjmmv  * the permission of UNIX System Laboratories, Inc.
452a3e5eebSjmmv  *
462a3e5eebSjmmv  * Redistribution and use in source and binary forms, with or without
472a3e5eebSjmmv  * modification, are permitted provided that the following conditions
482a3e5eebSjmmv  * are met:
492a3e5eebSjmmv  * 1. Redistributions of source code must retain the above copyright
502a3e5eebSjmmv  *    notice, this list of conditions and the following disclaimer.
512a3e5eebSjmmv  * 2. Redistributions in binary form must reproduce the above copyright
522a3e5eebSjmmv  *    notice, this list of conditions and the following disclaimer in the
532a3e5eebSjmmv  *    documentation and/or other materials provided with the distribution.
542a3e5eebSjmmv  * 3. Neither the name of the University nor the names of its contributors
552a3e5eebSjmmv  *    may be used to endorse or promote products derived from this software
562a3e5eebSjmmv  *    without specific prior written permission.
572a3e5eebSjmmv  *
582a3e5eebSjmmv  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
592a3e5eebSjmmv  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
602a3e5eebSjmmv  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
612a3e5eebSjmmv  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
622a3e5eebSjmmv  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
632a3e5eebSjmmv  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
642a3e5eebSjmmv  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
652a3e5eebSjmmv  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
662a3e5eebSjmmv  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
672a3e5eebSjmmv  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
682a3e5eebSjmmv  * SUCH DAMAGE.
692a3e5eebSjmmv  *
702a3e5eebSjmmv  *	@(#)vfs_subr.c	8.13 (Berkeley) 4/18/94
712a3e5eebSjmmv  */
722a3e5eebSjmmv 
732a3e5eebSjmmv /*
742a3e5eebSjmmv  * VFS exports list management.
75a742b7d3Sad  *
76a742b7d3Sad  * Lock order: vfs_busy -> mnt_updating -> netexport_lock.
772a3e5eebSjmmv  */
782a3e5eebSjmmv 
792a3e5eebSjmmv #include <sys/cdefs.h>
80*5b8c1df0Shannken __KERNEL_RCSID(0, "$NetBSD: nfs_export.c,v 1.63 2021/06/04 10:44:58 hannken Exp $");
812a3e5eebSjmmv 
822a3e5eebSjmmv #include <sys/param.h>
832a3e5eebSjmmv #include <sys/systm.h>
84d4b01cb0Sad #include <sys/kernel.h>
852a3e5eebSjmmv #include <sys/queue.h>
862a3e5eebSjmmv #include <sys/proc.h>
872a3e5eebSjmmv #include <sys/mount.h>
882a3e5eebSjmmv #include <sys/vnode.h>
892a3e5eebSjmmv #include <sys/namei.h>
902a3e5eebSjmmv #include <sys/errno.h>
912a3e5eebSjmmv #include <sys/malloc.h>
922a3e5eebSjmmv #include <sys/domain.h>
932a3e5eebSjmmv #include <sys/mbuf.h>
942a3e5eebSjmmv #include <sys/dirent.h>
952a3e5eebSjmmv #include <sys/socket.h>		/* XXX for AF_MAX */
96fc9422c9Selad #include <sys/kauth.h>
972a3e5eebSjmmv 
982a3e5eebSjmmv #include <net/radix.h>
992a3e5eebSjmmv 
1002a3e5eebSjmmv #include <netinet/in.h>
1012a3e5eebSjmmv 
1022a3e5eebSjmmv #include <nfs/rpcv2.h>
1032a3e5eebSjmmv #include <nfs/nfsproto.h>
1042a3e5eebSjmmv #include <nfs/nfs.h>
1052a3e5eebSjmmv #include <nfs/nfs_var.h>
1062a3e5eebSjmmv 
1072a3e5eebSjmmv /*
1082a3e5eebSjmmv  * Network address lookup element.
1092a3e5eebSjmmv  */
1102a3e5eebSjmmv struct netcred {
1112a3e5eebSjmmv 	struct	radix_node netc_rnodes[2];
1122a3e5eebSjmmv 	int	netc_refcnt;
1132a3e5eebSjmmv 	int	netc_exflags;
114fc9422c9Selad 	kauth_cred_t netc_anon;
1152a3e5eebSjmmv };
1162a3e5eebSjmmv 
1172a3e5eebSjmmv /*
1182a3e5eebSjmmv  * Network export information.
1192a3e5eebSjmmv  */
1202a3e5eebSjmmv struct netexport {
1218f0dbf30Schristos 	TAILQ_ENTRY(netexport) ne_list;
122b0cf681aSyamt 	struct mount *ne_mount;
1232a3e5eebSjmmv 	struct netcred ne_defexported;		      /* Default export */
1242a3e5eebSjmmv 	struct radix_node_head *ne_rtable[AF_MAX+1]; /* Individual exports */
1252a3e5eebSjmmv };
1268f0dbf30Schristos TAILQ_HEAD(, netexport) netexport_list =
1278f0dbf30Schristos     TAILQ_HEAD_INITIALIZER(netexport_list);
1282a3e5eebSjmmv 
1292a3e5eebSjmmv /* Publicly exported file system. */
1302a3e5eebSjmmv struct nfs_public nfs_pub;
1312a3e5eebSjmmv 
1322a3e5eebSjmmv /*
1332a3e5eebSjmmv  * Local prototypes.
1342a3e5eebSjmmv  */
135b0cf681aSyamt static int init_exports(struct mount *, struct netexport **);
1362a3e5eebSjmmv static int hang_addrlist(struct mount *, struct netexport *,
1372a3e5eebSjmmv     const struct export_args *);
1382a3e5eebSjmmv static int sacheck(struct sockaddr *);
1392a3e5eebSjmmv static int free_netcred(struct radix_node *, void *);
140b0cf681aSyamt static int export(struct netexport *, const struct export_args *);
1412a3e5eebSjmmv static int setpublicfs(struct mount *, struct netexport *,
1422a3e5eebSjmmv     const struct export_args *);
143b0cf681aSyamt static struct netcred *netcred_lookup(struct netexport *, struct mbuf *);
144b0cf681aSyamt static struct netexport *netexport_lookup(const struct mount *);
145b0cf681aSyamt static struct netexport *netexport_lookup_byfsid(const fsid_t *);
146635dba44Syamt static void netexport_clear(struct netexport *);
147b0cf681aSyamt static void netexport_insert(struct netexport *);
148b0cf681aSyamt static void netexport_remove(struct netexport *);
14928b96a0bSyamt static void netexport_wrlock(void);
15028b96a0bSyamt static void netexport_wrunlock(void);
15192ce8c6aSad static int nfs_export_update_30(struct mount *mp, const char *path, void *);
15292ce8c6aSad 
153d4b01cb0Sad static krwlock_t netexport_lock;
1542a3e5eebSjmmv 
1552a3e5eebSjmmv /*
1562a3e5eebSjmmv  * PUBLIC INTERFACE
1572a3e5eebSjmmv  */
1582a3e5eebSjmmv 
1592a3e5eebSjmmv /*
1602a3e5eebSjmmv  * Declare and initialize the file system export hooks.
1612a3e5eebSjmmv  */
162d4b01cb0Sad static void netexport_unmount(struct mount *);
1632a3e5eebSjmmv 
1642a3e5eebSjmmv struct vfs_hooks nfs_export_hooks = {
16592ce8c6aSad 	{ NULL, NULL },
166d4b01cb0Sad 	.vh_unmount = netexport_unmount,
16792ce8c6aSad 	.vh_reexport = nfs_export_update_30,
1682a3e5eebSjmmv };
1692a3e5eebSjmmv 
1702a3e5eebSjmmv /*
1712a3e5eebSjmmv  * VFS unmount hook for NFS exports.
1722a3e5eebSjmmv  *
1732a3e5eebSjmmv  * Releases NFS exports list resources if the given mount point has some.
17413106e31Sdholland  * As allocation happens lazily, it may be that it doesn't have this
17599c51e18Sdholland  * information, although it theoretically should.
1762a3e5eebSjmmv  */
1772a3e5eebSjmmv static void
netexport_unmount(struct mount * mp)178d4b01cb0Sad netexport_unmount(struct mount *mp)
1792a3e5eebSjmmv {
180b0cf681aSyamt 	struct netexport *ne;
1812a3e5eebSjmmv 
1822a3e5eebSjmmv 	KASSERT(mp != NULL);
1832a3e5eebSjmmv 
18428b96a0bSyamt 	netexport_wrlock();
185b0cf681aSyamt 	ne = netexport_lookup(mp);
186b0cf681aSyamt 	if (ne == NULL) {
18728b96a0bSyamt 		netexport_wrunlock();
188b0cf681aSyamt 		return;
1892a3e5eebSjmmv 	}
190635dba44Syamt 	netexport_clear(ne);
191b0cf681aSyamt 	netexport_remove(ne);
19228b96a0bSyamt 	netexport_wrunlock();
1930fa0158cSpooka 	kmem_free(ne, sizeof(*ne));
1942a3e5eebSjmmv }
1952a3e5eebSjmmv 
196d4b01cb0Sad void
netexport_init(void)197d4b01cb0Sad netexport_init(void)
198d4b01cb0Sad {
199d4b01cb0Sad 
200d4b01cb0Sad 	rw_init(&netexport_lock);
201d4b01cb0Sad }
202d4b01cb0Sad 
203d4b01cb0Sad void
netexport_fini(void)204d4b01cb0Sad netexport_fini(void)
205d4b01cb0Sad {
206d4b01cb0Sad 	struct netexport *ne;
207d4b01cb0Sad 	struct mount *mp;
208d4b01cb0Sad 	int error;
209d4b01cb0Sad 
2108f0dbf30Schristos 	while (!TAILQ_EMPTY(&netexport_list)) {
211d4b01cb0Sad 		netexport_wrlock();
2128f0dbf30Schristos 		ne = TAILQ_FIRST(&netexport_list);
213d4b01cb0Sad 		mp = ne->ne_mount;
21420bb034fShannken 		error = vfs_busy(mp);
215d4b01cb0Sad 		netexport_wrunlock();
216d4b01cb0Sad 		if (error != 0) {
217d4b01cb0Sad 			kpause("nfsfini", false, hz, NULL);
218d4b01cb0Sad 			continue;
219d4b01cb0Sad 		}
2207d06f330Sad 		mutex_enter(mp->mnt_updating);	/* mnt_flag */
221d4b01cb0Sad 		netexport_unmount(mp);
2227d06f330Sad 		mutex_exit(mp->mnt_updating);	/* mnt_flag */
22320bb034fShannken 		vfs_unbusy(mp);
224d4b01cb0Sad 	}
225d4b01cb0Sad 	rw_destroy(&netexport_lock);
226d4b01cb0Sad }
227d4b01cb0Sad 
228d4b01cb0Sad 
2292a3e5eebSjmmv /*
2302a3e5eebSjmmv  * Atomically set the NFS exports list of the given file system, replacing
2312a3e5eebSjmmv  * it with a new list of entries.
2322a3e5eebSjmmv  *
2332a3e5eebSjmmv  * Returns zero on success or an appropriate error code otherwise.
2342a3e5eebSjmmv  *
2352a3e5eebSjmmv  * Helper function for the nfssvc(2) system call (NFSSVC_SETEXPORTSLIST
236*5b8c1df0Shannken  * and NFSSVC_REPLACEEXPORTSLIST command).
2372a3e5eebSjmmv  */
2382a3e5eebSjmmv int
mountd_set_exports_list(const struct mountd_exports_list * mel,struct lwp * l,struct mount * nmp,int cmd)239e234b387Schristos mountd_set_exports_list(const struct mountd_exports_list *mel, struct lwp *l,
240*5b8c1df0Shannken     struct mount *nmp, int cmd)
2412a3e5eebSjmmv {
2422a3e5eebSjmmv 	int error;
2432a3e5eebSjmmv 	size_t i;
2442a3e5eebSjmmv 	struct mount *mp;
245b0cf681aSyamt 	struct netexport *ne;
2468f6ed30dSdholland 	struct pathbuf *pb;
2472a3e5eebSjmmv 	struct nameidata nd;
2482a3e5eebSjmmv 	struct vnode *vp;
249a3b5baedSmartin 	size_t fid_size;
2502a3e5eebSjmmv 
251cd05a6eeSelad 	if (kauth_authorize_network(l->l_cred, KAUTH_NETWORK_NFS,
252cd05a6eeSelad 	    KAUTH_REQ_NETWORK_NFS_EXPORT, NULL, NULL, NULL) != 0)
2532a3e5eebSjmmv 		return EPERM;
2542a3e5eebSjmmv 
2552a3e5eebSjmmv 	/* Look up the file system path. */
2568f6ed30dSdholland 	error = pathbuf_copyin(mel->mel_path, &pb);
2578f6ed30dSdholland 	if (error) {
2582a3e5eebSjmmv 		return error;
2598f6ed30dSdholland 	}
2608f6ed30dSdholland 	NDINIT(&nd, LOOKUP, FOLLOW | LOCKLEAF, pb);
2618f6ed30dSdholland 	error = namei(&nd);
2628f6ed30dSdholland 	if (error != 0) {
2638f6ed30dSdholland 		pathbuf_destroy(pb);
2648f6ed30dSdholland 		return error;
2658f6ed30dSdholland 	}
266b0cf681aSyamt 	vp = nd.ni_vp;
267b0cf681aSyamt 	mp = vp->v_mount;
268e234b387Schristos 	KASSERT(nmp == NULL || nmp == mp);
2698f6ed30dSdholland 	pathbuf_destroy(pb);
2702a3e5eebSjmmv 
271ad71247aSpooka 	/*
272ad71247aSpooka 	 * Make sure the file system can do vptofh.  If the file system
273ad71247aSpooka 	 * knows the handle's size, just trust it's able to do the
274ad71247aSpooka 	 * actual translation also (otherwise we should check fhtovp
275ad71247aSpooka 	 * also, and that's getting a wee bit ridiculous).
276ad71247aSpooka 	 */
277a3b5baedSmartin 	fid_size = 0;
278ad71247aSpooka 	if ((error = VFS_VPTOFH(vp, NULL, &fid_size)) != E2BIG) {
279f0cdf39dSchs 		vput(vp);
28005077472Schs 		return EOPNOTSUPP;
281a3b5baedSmartin 	}
2822a3e5eebSjmmv 
2832a3e5eebSjmmv 	/* Mark the file system busy. */
28420bb034fShannken 	error = vfs_busy(mp);
28505077472Schs 	vput(vp);
2862a3e5eebSjmmv 	if (error != 0)
28705077472Schs 		return error;
288e234b387Schristos 	if (nmp == NULL)
2897d06f330Sad 		mutex_enter(mp->mnt_updating);	/* mnt_flag */
29028b96a0bSyamt 	netexport_wrlock();
291b0cf681aSyamt 	ne = netexport_lookup(mp);
292b0cf681aSyamt 	if (ne == NULL) {
293b0cf681aSyamt 		error = init_exports(mp, &ne);
2942a3e5eebSjmmv 		if (error != 0) {
29505077472Schs 			goto out;
2962a3e5eebSjmmv 		}
2972a3e5eebSjmmv 	}
2982a3e5eebSjmmv 
299b0cf681aSyamt 	KASSERT(ne != NULL);
300b0cf681aSyamt 	KASSERT(ne->ne_mount == mp);
301b0cf681aSyamt 
302*5b8c1df0Shannken 	if (cmd == NFSSVC_SETEXPORTSLIST) {
3032a3e5eebSjmmv 		if (mel->mel_nexports == 0)
304635dba44Syamt 			netexport_clear(ne);
3052a3e5eebSjmmv 		else if (mel->mel_nexports == 1)
306b0cf681aSyamt 			error = export(ne, &mel->mel_exports[0]);
3072a3e5eebSjmmv 		else {
308e234b387Schristos 			printf("%s: Cannot set more than one "
309e234b387Schristos 			    "entry at once (unimplemented)\n", __func__);
3102a3e5eebSjmmv 			error = EOPNOTSUPP;
3112a3e5eebSjmmv 		}
312*5b8c1df0Shannken 	} else if (cmd == NFSSVC_REPLACEEXPORTSLIST) {
313*5b8c1df0Shannken 		netexport_clear(ne);
314*5b8c1df0Shannken 		for (i = 0; error == 0 && i < mel->mel_nexports; i++)
315*5b8c1df0Shannken 			error = export(ne, &mel->mel_exports[i]);
316*5b8c1df0Shannken 	} else {
317*5b8c1df0Shannken 		printf("%s: Command %#x not implemented\n", __func__, cmd);
318*5b8c1df0Shannken 		error = EOPNOTSUPP;
319*5b8c1df0Shannken 	}
3202a3e5eebSjmmv 
32105077472Schs out:
32228b96a0bSyamt 	netexport_wrunlock();
323e234b387Schristos 	if (nmp == NULL)
3247d06f330Sad 		mutex_exit(mp->mnt_updating);	/* mnt_flag */
32520bb034fShannken 	vfs_unbusy(mp);
3266e0ca2f3Syamt 	return error;
3272a3e5eebSjmmv }
3282a3e5eebSjmmv 
329b0cf681aSyamt static void
netexport_insert(struct netexport * ne)330b0cf681aSyamt netexport_insert(struct netexport *ne)
331b0cf681aSyamt {
332b0cf681aSyamt 
3338f0dbf30Schristos 	TAILQ_INSERT_HEAD(&netexport_list, ne, ne_list);
334b0cf681aSyamt }
335b0cf681aSyamt 
336b0cf681aSyamt static void
netexport_remove(struct netexport * ne)337b0cf681aSyamt netexport_remove(struct netexport *ne)
338b0cf681aSyamt {
339b0cf681aSyamt 
3408f0dbf30Schristos 	TAILQ_REMOVE(&netexport_list, ne, ne_list);
341b0cf681aSyamt }
342b0cf681aSyamt 
343b0cf681aSyamt static struct netexport *
netexport_lookup(const struct mount * mp)344b0cf681aSyamt netexport_lookup(const struct mount *mp)
345b0cf681aSyamt {
346b0cf681aSyamt 	struct netexport *ne;
347b0cf681aSyamt 
3488f0dbf30Schristos 	TAILQ_FOREACH(ne, &netexport_list, ne_list) {
349b0cf681aSyamt 		if (ne->ne_mount == mp) {
350b0cf681aSyamt 			goto done;
351b0cf681aSyamt 		}
352b0cf681aSyamt 	}
353b0cf681aSyamt 	ne = NULL;
354b0cf681aSyamt done:
355b0cf681aSyamt 	return ne;
356b0cf681aSyamt }
357b0cf681aSyamt 
358b0cf681aSyamt static struct netexport *
netexport_lookup_byfsid(const fsid_t * fsid)359b0cf681aSyamt netexport_lookup_byfsid(const fsid_t *fsid)
360b0cf681aSyamt {
361b0cf681aSyamt 	struct netexport *ne;
362b0cf681aSyamt 
3638f0dbf30Schristos 	TAILQ_FOREACH(ne, &netexport_list, ne_list) {
364b0cf681aSyamt 		const struct mount *mp = ne->ne_mount;
365b0cf681aSyamt 
366b0cf681aSyamt 		if (mp->mnt_stat.f_fsidx.__fsid_val[0] == fsid->__fsid_val[0] &&
367b0cf681aSyamt 		    mp->mnt_stat.f_fsidx.__fsid_val[1] == fsid->__fsid_val[1]) {
368b0cf681aSyamt 			goto done;
369b0cf681aSyamt 		}
370b0cf681aSyamt 	}
371b0cf681aSyamt 	ne = NULL;
372b0cf681aSyamt done:
373b0cf681aSyamt 
374b0cf681aSyamt 	return ne;
375b0cf681aSyamt }
376b0cf681aSyamt 
3772a3e5eebSjmmv /*
3782a3e5eebSjmmv  * Check if the file system specified by the 'mp' mount structure is
3792a3e5eebSjmmv  * exported to a client with 'anon' anonymous credentials.  The 'mb'
3802a3e5eebSjmmv  * argument is an mbuf containing the network address of the client.
3812a3e5eebSjmmv  * The return parameters for the export flags for the client are returned
3822a3e5eebSjmmv  * in the address specified by 'wh'.
3832a3e5eebSjmmv  *
3842a3e5eebSjmmv  * This function is used exclusively by the NFS server.  It is generally
38513106e31Sdholland  * invoked before VFS_FHTOVP to validate that a client has access to the
3862a3e5eebSjmmv  * file system.
3872a3e5eebSjmmv  */
388b0cf681aSyamt 
3892a3e5eebSjmmv int
netexport_check(const fsid_t * fsid,struct mbuf * mb,struct mount ** mpp,int * wh,kauth_cred_t * anon)390b0cf681aSyamt netexport_check(const fsid_t *fsid, struct mbuf *mb, struct mount **mpp,
391fc9422c9Selad     int *wh, kauth_cred_t *anon)
3922a3e5eebSjmmv {
393b0cf681aSyamt 	struct netexport *ne;
3942a3e5eebSjmmv 	struct netcred *np;
3952a3e5eebSjmmv 
396b0cf681aSyamt 	ne = netexport_lookup_byfsid(fsid);
397b0cf681aSyamt 	if (ne == NULL) {
3982a3e5eebSjmmv 		return EACCES;
399b0cf681aSyamt 	}
400b0cf681aSyamt 	np = netcred_lookup(ne, mb);
401b0cf681aSyamt 	if (np == NULL) {
402b0cf681aSyamt 		return EACCES;
403b0cf681aSyamt 	}
4042a3e5eebSjmmv 
405b0cf681aSyamt 	*mpp = ne->ne_mount;
4062a3e5eebSjmmv 	*wh = np->netc_exflags;
407fc9422c9Selad 	*anon = np->netc_anon;
4082a3e5eebSjmmv 
409b0cf681aSyamt 	return 0;
4102a3e5eebSjmmv }
4112a3e5eebSjmmv 
4123955cf65Sjmmv /*
4133955cf65Sjmmv  * Handles legacy export requests.  In this case, the export information
4143955cf65Sjmmv  * is hardcoded in a specific place of the mount arguments structure (given
4153955cf65Sjmmv  * in data); the request for an update is given through the fspec field
4163955cf65Sjmmv  * (also in a known location), which must be a null pointer.
4173955cf65Sjmmv  *
4183955cf65Sjmmv  * Returns EJUSTRETURN if the given command was not a export request.
4193955cf65Sjmmv  * Otherwise, returns 0 on success or an appropriate error code otherwise.
4203955cf65Sjmmv  */
42192ce8c6aSad static int
nfs_export_update_30(struct mount * mp,const char * path,void * data)42292ce8c6aSad nfs_export_update_30(struct mount *mp, const char *path, void *data)
4233955cf65Sjmmv {
4243955cf65Sjmmv 	struct mountd_exports_list mel;
42592ce8c6aSad 	struct mnt_export_args30 *args;
4263955cf65Sjmmv 
42792ce8c6aSad 	args = data;
4283955cf65Sjmmv 	mel.mel_path = path;
4293955cf65Sjmmv 
4302721ab6cSdsl 	if (args->fspec != NULL)
4313955cf65Sjmmv 		return EJUSTRETURN;
4323955cf65Sjmmv 
4332721ab6cSdsl 	if (args->eargs.ex_flags & 0x00020000) {
4343955cf65Sjmmv 		/* Request to delete exports.  The mask above holds the
4353955cf65Sjmmv 		 * value that used to be in MNT_DELEXPORT. */
4363955cf65Sjmmv 		mel.mel_nexports = 0;
4373955cf65Sjmmv 	} else {
4380a509694Sdholland 		/*
4390a509694Sdholland 		 * The following code assumes export_args has not
4400a509694Sdholland 		 * changed since export_args30, so check that.
4410a509694Sdholland 		 */
4420a509694Sdholland 		__CTASSERT(sizeof(args->eargs) == sizeof(*mel.mel_exports));
4433955cf65Sjmmv 
4443955cf65Sjmmv 		mel.mel_nexports = 1;
4452721ab6cSdsl 		mel.mel_exports = (void *)&args->eargs;
4463955cf65Sjmmv 	}
4473955cf65Sjmmv 
448*5b8c1df0Shannken 	return mountd_set_exports_list(&mel, curlwp, mp, NFSSVC_SETEXPORTSLIST);
4493955cf65Sjmmv }
4503955cf65Sjmmv 
4512a3e5eebSjmmv /*
4522a3e5eebSjmmv  * INTERNAL FUNCTIONS
4532a3e5eebSjmmv  */
4542a3e5eebSjmmv 
4552a3e5eebSjmmv /*
4561ba9363dSpooka  * Initializes NFS exports for the mountpoint given in 'mp'.
4571ba9363dSpooka  * If successful, returns 0 and sets *nep to the address of the new
4581ba9363dSpooka  * netexport item; otherwise returns an appropriate error code
4591ba9363dSpooka  * and *nep remains unmodified.
4602a3e5eebSjmmv  */
4612a3e5eebSjmmv static int
init_exports(struct mount * mp,struct netexport ** nep)462b0cf681aSyamt init_exports(struct mount *mp, struct netexport **nep)
4632a3e5eebSjmmv {
4642a3e5eebSjmmv 	int error;
4652a3e5eebSjmmv 	struct export_args ea;
466b0cf681aSyamt 	struct netexport *ne;
4672a3e5eebSjmmv 
4682a3e5eebSjmmv 	KASSERT(mp != NULL);
4692a3e5eebSjmmv 
4702a3e5eebSjmmv 	/* Ensure that we do not already have this mount point. */
471b0cf681aSyamt 	KASSERT(netexport_lookup(mp) == NULL);
4722a3e5eebSjmmv 
4730fa0158cSpooka 	ne = kmem_zalloc(sizeof(*ne), KM_SLEEP);
474b0cf681aSyamt 	ne->ne_mount = mp;
4752a3e5eebSjmmv 
4762a3e5eebSjmmv 	/* Set the default export entry.  Handled internally by export upon
4772a3e5eebSjmmv 	 * first call. */
4782a3e5eebSjmmv 	memset(&ea, 0, sizeof(ea));
4792a3e5eebSjmmv 	ea.ex_root = -2;
4802a3e5eebSjmmv 	if (mp->mnt_flag & MNT_RDONLY)
4812a3e5eebSjmmv 		ea.ex_flags |= MNT_EXRDONLY;
482b0cf681aSyamt 	error = export(ne, &ea);
483b0cf681aSyamt 	if (error != 0) {
4840fa0158cSpooka 		kmem_free(ne, sizeof(*ne));
485b0cf681aSyamt 	} else {
486b0cf681aSyamt 		netexport_insert(ne);
487b0cf681aSyamt 		*nep = ne;
4882a3e5eebSjmmv 	}
4892a3e5eebSjmmv 
4902a3e5eebSjmmv 	return error;
4912a3e5eebSjmmv }
4922a3e5eebSjmmv 
4932a3e5eebSjmmv /*
4942a3e5eebSjmmv  * Build hash lists of net addresses and hang them off the mount point.
4952a3e5eebSjmmv  * Called by export() to set up a new entry in the lists of export
4962a3e5eebSjmmv  * addresses.
4972a3e5eebSjmmv  */
4982a3e5eebSjmmv static int
hang_addrlist(struct mount * mp,struct netexport * nep,const struct export_args * argp)4992a3e5eebSjmmv hang_addrlist(struct mount *mp, struct netexport *nep,
5002a3e5eebSjmmv     const struct export_args *argp)
5012a3e5eebSjmmv {
5022a3e5eebSjmmv 	int error, i;
5032a3e5eebSjmmv 	struct netcred *np, *enp;
5042a3e5eebSjmmv 	struct radix_node_head *rnh;
5052a3e5eebSjmmv 	struct sockaddr *saddr, *smask;
5062a3e5eebSjmmv 	struct domain *dom;
5072a3e5eebSjmmv 
5082a3e5eebSjmmv 	smask = NULL;
5092a3e5eebSjmmv 
5102a3e5eebSjmmv 	if (argp->ex_addrlen == 0) {
5112a3e5eebSjmmv 		if (mp->mnt_flag & MNT_DEFEXPORTED)
5122a3e5eebSjmmv 			return EPERM;
5132a3e5eebSjmmv 		np = &nep->ne_defexported;
514b861e24cSyamt 		KASSERT(np->netc_anon == NULL);
515fc9422c9Selad 		np->netc_anon = kauth_cred_alloc();
516b861e24cSyamt 		np->netc_exflags = argp->ex_flags;
51796d83359Spooka 		kauth_uucred_to_cred(np->netc_anon, &argp->ex_anon);
5182a3e5eebSjmmv 		mp->mnt_flag |= MNT_DEFEXPORTED;
5192a3e5eebSjmmv 		return 0;
5202a3e5eebSjmmv 	}
5212a3e5eebSjmmv 
5222a3e5eebSjmmv 	if (argp->ex_addrlen > MLEN || argp->ex_masklen > MLEN)
5232a3e5eebSjmmv 		return EINVAL;
5242a3e5eebSjmmv 
5252a3e5eebSjmmv 	i = sizeof(struct netcred) + argp->ex_addrlen + argp->ex_masklen;
526b0cf681aSyamt 	np = malloc(i, M_NETADDR, M_WAITOK | M_ZERO);
527b861e24cSyamt 	np->netc_anon = kauth_cred_alloc();
5282a3e5eebSjmmv 	saddr = (struct sockaddr *)(np + 1);
529b0cf681aSyamt 	error = copyin(argp->ex_addr, saddr, argp->ex_addrlen);
5302a3e5eebSjmmv 	if (error)
5312a3e5eebSjmmv 		goto out;
5322a3e5eebSjmmv 	if (saddr->sa_len > argp->ex_addrlen)
5332a3e5eebSjmmv 		saddr->sa_len = argp->ex_addrlen;
534cc31ef23Smaxv 	if (sacheck(saddr) == -1) {
535cc31ef23Smaxv 		error = EINVAL;
536cc31ef23Smaxv 		goto out;
537cc31ef23Smaxv 	}
5382a3e5eebSjmmv 	if (argp->ex_masklen) {
53953524e44Schristos 		smask = (struct sockaddr *)((char *)saddr + argp->ex_addrlen);
540b0cf681aSyamt 		error = copyin(argp->ex_mask, smask, argp->ex_masklen);
5412a3e5eebSjmmv 		if (error)
5422a3e5eebSjmmv 			goto out;
5432a3e5eebSjmmv 		if (smask->sa_len > argp->ex_masklen)
5442a3e5eebSjmmv 			smask->sa_len = argp->ex_masklen;
545cc31ef23Smaxv 		if (smask->sa_family != saddr->sa_family) {
546cc31ef23Smaxv 			error = EINVAL;
547cc31ef23Smaxv 			goto out;
548cc31ef23Smaxv 		}
549cc31ef23Smaxv 		if (sacheck(smask) == -1) {
550cc31ef23Smaxv 			error = EINVAL;
551cc31ef23Smaxv 			goto out;
552cc31ef23Smaxv 		}
5532a3e5eebSjmmv 	}
5542a3e5eebSjmmv 	i = saddr->sa_family;
5552a3e5eebSjmmv 	if ((rnh = nep->ne_rtable[i]) == 0) {
5562a3e5eebSjmmv 		/*
5572a3e5eebSjmmv 		 * Seems silly to initialize every AF when most are not
55813106e31Sdholland 		 * used, do so on demand here.
5592a3e5eebSjmmv 		 */
5602a3e5eebSjmmv 		DOMAIN_FOREACH(dom) {
5612a3e5eebSjmmv 			if (dom->dom_family == i && dom->dom_rtattach) {
562060522deSdyoung 				rn_inithead((void **)&nep->ne_rtable[i],
5632a3e5eebSjmmv 					dom->dom_rtoffset);
5642a3e5eebSjmmv 				break;
5652a3e5eebSjmmv 			}
5662a3e5eebSjmmv 		}
5672a3e5eebSjmmv 		if ((rnh = nep->ne_rtable[i]) == 0) {
5682a3e5eebSjmmv 			error = ENOBUFS;
5692a3e5eebSjmmv 			goto out;
5702a3e5eebSjmmv 		}
5712a3e5eebSjmmv 	}
5722a3e5eebSjmmv 
5732a3e5eebSjmmv 	enp = (struct netcred *)(*rnh->rnh_addaddr)(saddr, smask, rnh,
5742a3e5eebSjmmv 	    np->netc_rnodes);
5752a3e5eebSjmmv 	if (enp != np) {
5762a3e5eebSjmmv 		if (enp == NULL) {
5772a3e5eebSjmmv 			enp = (struct netcred *)(*rnh->rnh_lookup)(saddr,
5782a3e5eebSjmmv 			    smask, rnh);
5792a3e5eebSjmmv 			if (enp == NULL) {
5802a3e5eebSjmmv 				error = EPERM;
5812a3e5eebSjmmv 				goto out;
5822a3e5eebSjmmv 			}
5832a3e5eebSjmmv 		} else
5842a3e5eebSjmmv 			enp->netc_refcnt++;
5852a3e5eebSjmmv 
5862a3e5eebSjmmv 		goto check;
5872a3e5eebSjmmv 	} else
5882a3e5eebSjmmv 		enp->netc_refcnt = 1;
5892a3e5eebSjmmv 
5902a3e5eebSjmmv 	np->netc_exflags = argp->ex_flags;
59196d83359Spooka 	kauth_uucred_to_cred(np->netc_anon, &argp->ex_anon);
5922a3e5eebSjmmv 	return 0;
5932a3e5eebSjmmv check:
5942a3e5eebSjmmv 	if (enp->netc_exflags != argp->ex_flags ||
595fc9422c9Selad 	    kauth_cred_uucmp(enp->netc_anon, &argp->ex_anon) != 0)
5962a3e5eebSjmmv 		error = EPERM;
5972a3e5eebSjmmv 	else
5982a3e5eebSjmmv 		error = 0;
5992a3e5eebSjmmv out:
600b861e24cSyamt 	KASSERT(np->netc_anon != NULL);
601b861e24cSyamt 	kauth_cred_free(np->netc_anon);
6022a3e5eebSjmmv 	free(np, M_NETADDR);
6032a3e5eebSjmmv 	return error;
6042a3e5eebSjmmv }
6052a3e5eebSjmmv 
6062a3e5eebSjmmv /*
6072a3e5eebSjmmv  * Ensure that the address stored in 'sa' is valid.
6082a3e5eebSjmmv  * Returns zero on success, otherwise -1.
6092a3e5eebSjmmv  */
6102a3e5eebSjmmv static int
sacheck(struct sockaddr * sa)6112a3e5eebSjmmv sacheck(struct sockaddr *sa)
6122a3e5eebSjmmv {
6132a3e5eebSjmmv 
6142a3e5eebSjmmv 	switch (sa->sa_family) {
6152a3e5eebSjmmv 	case AF_INET: {
6162a3e5eebSjmmv 		struct sockaddr_in *sin = (struct sockaddr_in *)sa;
6172a3e5eebSjmmv 		char *p = (char *)sin->sin_zero;
6182a3e5eebSjmmv 		size_t i;
6192a3e5eebSjmmv 
6202a3e5eebSjmmv 		if (sin->sin_len != sizeof(*sin))
6212a3e5eebSjmmv 			return -1;
6222a3e5eebSjmmv 		if (sin->sin_port != 0)
6232a3e5eebSjmmv 			return -1;
6242a3e5eebSjmmv 		for (i = 0; i < sizeof(sin->sin_zero); i++)
6252a3e5eebSjmmv 			if (*p++ != '\0')
6262a3e5eebSjmmv 				return -1;
6272a3e5eebSjmmv 		return 0;
6282a3e5eebSjmmv 	}
6292a3e5eebSjmmv 	case AF_INET6: {
6302a3e5eebSjmmv 		struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sa;
6312a3e5eebSjmmv 
6322a3e5eebSjmmv 		if (sin6->sin6_len != sizeof(*sin6))
6332a3e5eebSjmmv 			return -1;
6342a3e5eebSjmmv 		if (sin6->sin6_port != 0)
6352a3e5eebSjmmv 			return -1;
6362a3e5eebSjmmv 		return 0;
6372a3e5eebSjmmv 	}
6382a3e5eebSjmmv 	default:
6392a3e5eebSjmmv 		return -1;
6402a3e5eebSjmmv 	}
6412a3e5eebSjmmv }
6422a3e5eebSjmmv 
6432a3e5eebSjmmv /*
6442a3e5eebSjmmv  * Free the netcred object pointed to by the 'rn' radix node.
6452a3e5eebSjmmv  * 'w' holds a pointer to the radix tree head.
6462a3e5eebSjmmv  */
6472a3e5eebSjmmv static int
free_netcred(struct radix_node * rn,void * w)6482a3e5eebSjmmv free_netcred(struct radix_node *rn, void *w)
6492a3e5eebSjmmv {
6502a3e5eebSjmmv 	struct radix_node_head *rnh = (struct radix_node_head *)w;
6512a3e5eebSjmmv 	struct netcred *np = (struct netcred *)(void *)rn;
6522a3e5eebSjmmv 
6532a3e5eebSjmmv 	(*rnh->rnh_deladdr)(rn->rn_key, rn->rn_mask, rnh);
654b861e24cSyamt 	if (--(np->netc_refcnt) <= 0) {
655b861e24cSyamt 		KASSERT(np->netc_anon != NULL);
656b861e24cSyamt 		kauth_cred_free(np->netc_anon);
6572a3e5eebSjmmv 		free(np, M_NETADDR);
658b861e24cSyamt 	}
6592a3e5eebSjmmv 	return 0;
6602a3e5eebSjmmv }
6612a3e5eebSjmmv 
6622a3e5eebSjmmv /*
6632a3e5eebSjmmv  * Clears the exports list for a given file system.
6642a3e5eebSjmmv  */
6652a3e5eebSjmmv static void
netexport_clear(struct netexport * ne)666635dba44Syamt netexport_clear(struct netexport *ne)
6672a3e5eebSjmmv {
6682a3e5eebSjmmv 	struct radix_node_head *rnh;
669b0cf681aSyamt 	struct mount *mp = ne->ne_mount;
670b0cf681aSyamt 	int i;
6712a3e5eebSjmmv 
6722a3e5eebSjmmv 	if (mp->mnt_flag & MNT_EXPUBLIC) {
6732a3e5eebSjmmv 		setpublicfs(NULL, NULL, NULL);
6742a3e5eebSjmmv 		mp->mnt_flag &= ~MNT_EXPUBLIC;
6752a3e5eebSjmmv 	}
6762a3e5eebSjmmv 
6772a3e5eebSjmmv 	for (i = 0; i <= AF_MAX; i++) {
678b0cf681aSyamt 		if ((rnh = ne->ne_rtable[i]) != NULL) {
679a8fef725Sdyoung 			rn_walktree(rnh, free_netcred, rnh);
680b0cf681aSyamt 			free(rnh, M_RTABLE);
681b0cf681aSyamt 			ne->ne_rtable[i] = NULL;
6822a3e5eebSjmmv 		}
6832a3e5eebSjmmv 	}
6842a3e5eebSjmmv 
685b861e24cSyamt 	if ((mp->mnt_flag & MNT_DEFEXPORTED) != 0) {
686b861e24cSyamt 		struct netcred *np = &ne->ne_defexported;
687b861e24cSyamt 
688b861e24cSyamt 		KASSERT(np->netc_anon != NULL);
689b861e24cSyamt 		kauth_cred_free(np->netc_anon);
690b861e24cSyamt 		np->netc_anon = NULL;
691b861e24cSyamt 	} else {
692b861e24cSyamt 		KASSERT(ne->ne_defexported.netc_anon == NULL);
693b861e24cSyamt 	}
694b861e24cSyamt 
6952a3e5eebSjmmv 	mp->mnt_flag &= ~(MNT_EXPORTED | MNT_DEFEXPORTED);
6962a3e5eebSjmmv }
6972a3e5eebSjmmv 
6982a3e5eebSjmmv /*
6992a3e5eebSjmmv  * Add a new export entry (described by an export_args structure) to the
7002a3e5eebSjmmv  * given file system.
7012a3e5eebSjmmv  */
7022a3e5eebSjmmv static int
export(struct netexport * nep,const struct export_args * argp)703b0cf681aSyamt export(struct netexport *nep, const struct export_args *argp)
7042a3e5eebSjmmv {
705b0cf681aSyamt 	struct mount *mp = nep->ne_mount;
7062a3e5eebSjmmv 	int error;
7072a3e5eebSjmmv 
7082a3e5eebSjmmv 	if (argp->ex_flags & MNT_EXPORTED) {
7092a3e5eebSjmmv 		if (argp->ex_flags & MNT_EXPUBLIC) {
7102a3e5eebSjmmv 			if ((error = setpublicfs(mp, nep, argp)) != 0)
7112a3e5eebSjmmv 				return error;
7122a3e5eebSjmmv 			mp->mnt_flag |= MNT_EXPUBLIC;
7132a3e5eebSjmmv 		}
7142a3e5eebSjmmv 		if ((error = hang_addrlist(mp, nep, argp)) != 0)
7152a3e5eebSjmmv 			return error;
7162a3e5eebSjmmv 		mp->mnt_flag |= MNT_EXPORTED;
7172a3e5eebSjmmv 	}
7182a3e5eebSjmmv 	return 0;
7192a3e5eebSjmmv }
7202a3e5eebSjmmv 
7212a3e5eebSjmmv /*
7222a3e5eebSjmmv  * Set the publicly exported filesystem (WebNFS).  Currently, only
7232a3e5eebSjmmv  * one public filesystem is possible in the spec (RFC 2054 and 2055)
7242a3e5eebSjmmv  */
7252a3e5eebSjmmv static int
setpublicfs(struct mount * mp,struct netexport * nep,const struct export_args * argp)72689682b24Syamt setpublicfs(struct mount *mp, struct netexport *nep,
7272a3e5eebSjmmv     const struct export_args *argp)
7282a3e5eebSjmmv {
7292a3e5eebSjmmv 	char *cp;
7302a3e5eebSjmmv 	int error;
7312a3e5eebSjmmv 	struct vnode *rvp;
732a3b5baedSmartin 	size_t fhsize;
7332a3e5eebSjmmv 
7342a3e5eebSjmmv 	/*
73513106e31Sdholland 	 * mp == NULL --> invalidate the current info; the FS is
7362a3e5eebSjmmv 	 * no longer exported. May be called from either export
7372a3e5eebSjmmv 	 * or unmount, so check if it hasn't already been done.
7382a3e5eebSjmmv 	 */
7392a3e5eebSjmmv 	if (mp == NULL) {
7402a3e5eebSjmmv 		if (nfs_pub.np_valid) {
7412a3e5eebSjmmv 			nfs_pub.np_valid = 0;
742a3b5baedSmartin 			if (nfs_pub.np_handle != NULL) {
743a3b5baedSmartin 				free(nfs_pub.np_handle, M_TEMP);
744a3b5baedSmartin 				nfs_pub.np_handle = NULL;
745a3b5baedSmartin 			}
7462a3e5eebSjmmv 			if (nfs_pub.np_index != NULL) {
7479b87d582Scegger 				free(nfs_pub.np_index, M_TEMP);
7482a3e5eebSjmmv 				nfs_pub.np_index = NULL;
7492a3e5eebSjmmv 			}
7502a3e5eebSjmmv 		}
7512a3e5eebSjmmv 		return 0;
7522a3e5eebSjmmv 	}
7532a3e5eebSjmmv 
7542a3e5eebSjmmv 	/*
7552a3e5eebSjmmv 	 * Only one allowed at a time.
7562a3e5eebSjmmv 	 */
7572a3e5eebSjmmv 	if (nfs_pub.np_valid != 0 && mp != nfs_pub.np_mount)
7582a3e5eebSjmmv 		return EBUSY;
7592a3e5eebSjmmv 
7602a3e5eebSjmmv 	/*
7612a3e5eebSjmmv 	 * Get real filehandle for root of exported FS.
7622a3e5eebSjmmv 	 */
763c2e9cb94Sad 	if ((error = VFS_ROOT(mp, LK_EXCLUSIVE, &rvp)))
7642a3e5eebSjmmv 		return error;
7652a3e5eebSjmmv 
766a3b5baedSmartin 	fhsize = 0;
767a3b5baedSmartin 	error = vfs_composefh(rvp, NULL, &fhsize);
768a3b5baedSmartin 	if (error != E2BIG)
769a3b5baedSmartin 		return error;
770a3b5baedSmartin 	nfs_pub.np_handle = malloc(fhsize, M_TEMP, M_NOWAIT);
771a3b5baedSmartin 	if (nfs_pub.np_handle == NULL)
772a3b5baedSmartin 		error = ENOMEM;
773a3b5baedSmartin 	else
774a3b5baedSmartin 		error = vfs_composefh(rvp, nfs_pub.np_handle, &fhsize);
7757d3142aaSyamt 	if (error)
7762a3e5eebSjmmv 		return error;
7772a3e5eebSjmmv 
7782a3e5eebSjmmv 	vput(rvp);
7792a3e5eebSjmmv 
7802a3e5eebSjmmv 	/*
7812a3e5eebSjmmv 	 * If an indexfile was specified, pull it in.
7822a3e5eebSjmmv 	 */
7832a3e5eebSjmmv 	if (argp->ex_indexfile != NULL) {
784ba2fe870Schristos 		nfs_pub.np_index = malloc(NFS_MAXNAMLEN + 1, M_TEMP, M_WAITOK);
7852a3e5eebSjmmv 		error = copyinstr(argp->ex_indexfile, nfs_pub.np_index,
786ba2fe870Schristos 		    NFS_MAXNAMLEN, (size_t *)0);
7872a3e5eebSjmmv 		if (!error) {
7882a3e5eebSjmmv 			/*
7892a3e5eebSjmmv 			 * Check for illegal filenames.
7902a3e5eebSjmmv 			 */
7912a3e5eebSjmmv 			for (cp = nfs_pub.np_index; *cp; cp++) {
7922a3e5eebSjmmv 				if (*cp == '/') {
7932a3e5eebSjmmv 					error = EINVAL;
7942a3e5eebSjmmv 					break;
7952a3e5eebSjmmv 				}
7962a3e5eebSjmmv 			}
7972a3e5eebSjmmv 		}
7982a3e5eebSjmmv 		if (error) {
7999b87d582Scegger 			free(nfs_pub.np_index, M_TEMP);
8002a3e5eebSjmmv 			return error;
8012a3e5eebSjmmv 		}
8022a3e5eebSjmmv 	}
8032a3e5eebSjmmv 
8042a3e5eebSjmmv 	nfs_pub.np_mount = mp;
8052a3e5eebSjmmv 	nfs_pub.np_valid = 1;
8062a3e5eebSjmmv 	return 0;
8072a3e5eebSjmmv }
8082a3e5eebSjmmv 
8092a3e5eebSjmmv /*
8102a3e5eebSjmmv  * Look up an export entry in the exports list that matches the address
8112a3e5eebSjmmv  * stored in 'nam'.  If no entry is found, the default one is used instead
8122a3e5eebSjmmv  * (if available).
8132a3e5eebSjmmv  */
8142a3e5eebSjmmv static struct netcred *
netcred_lookup(struct netexport * ne,struct mbuf * nam)815b0cf681aSyamt netcred_lookup(struct netexport *ne, struct mbuf *nam)
8162a3e5eebSjmmv {
8172a3e5eebSjmmv 	struct netcred *np;
8182a3e5eebSjmmv 	struct radix_node_head *rnh;
8192a3e5eebSjmmv 	struct sockaddr *saddr;
8202a3e5eebSjmmv 
821d085790aSyamt 	if ((ne->ne_mount->mnt_flag & MNT_EXPORTED) == 0) {
822d085790aSyamt 		return NULL;
823d085790aSyamt 	}
824b0cf681aSyamt 
8252a3e5eebSjmmv 	/*
82613106e31Sdholland 	 * Look in the export list first.
8272a3e5eebSjmmv 	 */
828b0cf681aSyamt 	np = NULL;
8292a3e5eebSjmmv 	if (nam != NULL) {
8302a3e5eebSjmmv 		saddr = mtod(nam, struct sockaddr *);
831b0cf681aSyamt 		rnh = ne->ne_rtable[saddr->sa_family];
8322a3e5eebSjmmv 		if (rnh != NULL) {
8332a3e5eebSjmmv 			np = (struct netcred *)
83453524e44Schristos 				(*rnh->rnh_matchaddr)((void *)saddr,
8352a3e5eebSjmmv 						      rnh);
8362a3e5eebSjmmv 			if (np && np->netc_rnodes->rn_flags & RNF_ROOT)
8372a3e5eebSjmmv 				np = NULL;
8382a3e5eebSjmmv 		}
8392a3e5eebSjmmv 	}
8402a3e5eebSjmmv 	/*
8412a3e5eebSjmmv 	 * If no address match, use the default if it exists.
8422a3e5eebSjmmv 	 */
843b0cf681aSyamt 	if (np == NULL && ne->ne_mount->mnt_flag & MNT_DEFEXPORTED)
844b0cf681aSyamt 		np = &ne->ne_defexported;
845b0cf681aSyamt 
8462a3e5eebSjmmv 	return np;
8472a3e5eebSjmmv }
84828b96a0bSyamt 
84928b96a0bSyamt void
netexport_rdlock(void)85028b96a0bSyamt netexport_rdlock(void)
85128b96a0bSyamt {
85228b96a0bSyamt 
85388ab7da9Sad 	rw_enter(&netexport_lock, RW_READER);
85428b96a0bSyamt }
85528b96a0bSyamt 
85628b96a0bSyamt void
netexport_rdunlock(void)85728b96a0bSyamt netexport_rdunlock(void)
85828b96a0bSyamt {
85928b96a0bSyamt 
86088ab7da9Sad 	rw_exit(&netexport_lock);
86128b96a0bSyamt }
86228b96a0bSyamt 
86328b96a0bSyamt static void
netexport_wrlock(void)86428b96a0bSyamt netexport_wrlock(void)
86528b96a0bSyamt {
86628b96a0bSyamt 
86788ab7da9Sad 	rw_enter(&netexport_lock, RW_WRITER);
86828b96a0bSyamt }
86928b96a0bSyamt 
87028b96a0bSyamt static void
netexport_wrunlock(void)87128b96a0bSyamt netexport_wrunlock(void)
87228b96a0bSyamt {
87328b96a0bSyamt 
87488ab7da9Sad 	rw_exit(&netexport_lock);
87528b96a0bSyamt }
876d956cedcSchristos 
877d956cedcSchristos bool
netexport_hasexports(void)878d956cedcSchristos netexport_hasexports(void)
879d956cedcSchristos {
880d956cedcSchristos 
881d956cedcSchristos 	return nfs_pub.np_valid || !TAILQ_EMPTY(&netexport_list);
882d956cedcSchristos }
883