2 * Copyright (c) 2000-2007 Apple Inc. All rights reserved.
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
28 /* Copyright (c) 1995 NeXT Computer, Inc. All Rights Reserved */
30 * Copyright (c) 1989, 1993
31 * The Regents of the University of California. All rights reserved.
33 * This code is derived from software contributed to Berkeley by
34 * Rick Macklem at The University of Guelph.
36 * Redistribution and use in source and binary forms, with or without
37 * modification, are permitted provided that the following conditions
39 * 1. Redistributions of source code must retain the above copyright
40 * notice, this list of conditions and the following disclaimer.
41 * 2. Redistributions in binary form must reproduce the above copyright
42 * notice, this list of conditions and the following disclaimer in the
43 * documentation and/or other materials provided with the distribution.
44 * 3. All advertising materials mentioning features or use of this software
45 * must display the following acknowledgement:
46 * This product includes software developed by the University of
47 * California, Berkeley and its contributors.
48 * 4. Neither the name of the University nor the names of its contributors
49 * may be used to endorse or promote products derived from this software
50 * without specific prior written permission.
52 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
53 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
54 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
55 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
56 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
57 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
58 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
59 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
60 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
61 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
64 * @(#)nfs_syscalls.c 8.5 (Berkeley) 3/30/95
65 * FreeBSD-Id: nfs_syscalls.c,v 1.32 1997/11/07 08:53:25 phk Exp $
68 * NOTICE: This file was modified by SPARTA, Inc. in 2005 to introduce
69 * support for mandatory and extensible security protections. This notice
70 * is included in support of clause 2.2 (b) of the Apple Public License,
74 #include <sys/param.h>
75 #include <sys/systm.h>
76 #include <sys/kernel.h>
77 #include <sys/file_internal.h>
78 #include <sys/filedesc.h>
80 #include <sys/vnode_internal.h>
81 #include <sys/mount_internal.h>
82 #include <sys/proc_internal.h> /* for fdflags */
83 #include <sys/kauth.h>
84 #include <sys/sysctl.h>
87 #include <sys/malloc.h>
88 #include <sys/kpi_mbuf.h>
89 #include <sys/socket.h>
90 #include <sys/socketvar.h>
91 #include <sys/domain.h>
92 #include <sys/protosw.h>
93 #include <sys/fcntl.h>
94 #include <sys/lockf.h>
95 #include <sys/syslog.h>
97 #include <sys/sysproto.h>
98 #include <sys/kpi_socket.h>
99 #include <sys/fsevents.h>
100 #include <libkern/OSAtomic.h>
101 #include <kern/thread_call.h>
102 #include <kern/task.h>
104 #include <bsm/audit_kernel.h>
106 #include <netinet/in.h>
107 #include <netinet/tcp.h>
108 #include <nfs/xdr_subs.h>
109 #include <nfs/rpcv2.h>
110 #include <nfs/nfsproto.h>
112 #include <nfs/nfsm_subs.h>
113 #include <nfs/nfsrvcache.h>
114 #include <nfs/nfs_gss.h>
115 #include <nfs/nfsmount.h>
116 #include <nfs/nfsnode.h>
117 #include <nfs/nfs_lock.h>
119 #include <security/mac_framework.h>
122 kern_return_t
thread_terminate(thread_t
); /* XXX */
126 extern int (*nfsrv_procs
[NFS_NPROCS
])(struct nfsrv_descript
*nd
,
127 struct nfsrv_sock
*slp
,
130 extern int nfsrv_wg_delay
;
131 extern int nfsrv_wg_delay_v3
;
133 static int nfsrv_require_resv_port
= 0;
134 static int nfsrv_deadsock_timer_on
= 0;
136 static int nfssvc_addsock(socket_t
, mbuf_t
);
137 static int nfssvc_nfsd(void);
138 static int nfssvc_export(user_addr_t
);
140 static void nfsrv_zapsock(struct nfsrv_sock
*slp
);
141 static void nfsrv_slpderef(struct nfsrv_sock
*);
142 static void nfsrv_slpfree(struct nfsrv_sock
*);
144 #endif /* NFSSERVER */
149 SYSCTL_DECL(_vfs_generic
);
150 SYSCTL_NODE(_vfs_generic
, OID_AUTO
, nfs
, CTLFLAG_RW
|CTLFLAG_LOCKED
, 0, "nfs hinge");
153 SYSCTL_NODE(_vfs_generic_nfs
, OID_AUTO
, client
, CTLFLAG_RW
|CTLFLAG_LOCKED
, 0, "nfs client hinge");
154 SYSCTL_INT(_vfs_generic_nfs_client
, OID_AUTO
, initialdowndelay
, CTLFLAG_RW
, &nfs_tprintf_initial_delay
, 0, "");
155 SYSCTL_INT(_vfs_generic_nfs_client
, OID_AUTO
, nextdowndelay
, CTLFLAG_RW
, &nfs_tprintf_delay
, 0, "");
156 SYSCTL_INT(_vfs_generic_nfs_client
, OID_AUTO
, iosize
, CTLFLAG_RW
, &nfs_iosize
, 0, "");
157 SYSCTL_INT(_vfs_generic_nfs_client
, OID_AUTO
, access_cache_timeout
, CTLFLAG_RW
, &nfs_access_cache_timeout
, 0, "");
158 SYSCTL_INT(_vfs_generic_nfs_client
, OID_AUTO
, allow_async
, CTLFLAG_RW
, &nfs_allow_async
, 0, "");
159 SYSCTL_INT(_vfs_generic_nfs_client
, OID_AUTO
, statfs_rate_limit
, CTLFLAG_RW
, &nfs_statfs_rate_limit
, 0, "");
160 SYSCTL_INT(_vfs_generic_nfs_client
, OID_AUTO
, nfsiod_thread_max
, CTLFLAG_RW
, &nfsiod_thread_max
, 0, "");
161 SYSCTL_INT(_vfs_generic_nfs_client
, OID_AUTO
, nfsiod_thread_count
, CTLFLAG_RD
, &nfsiod_thread_count
, 0, "");
162 SYSCTL_INT(_vfs_generic_nfs_client
, OID_AUTO
, lockd_mounts
, CTLFLAG_RD
, &nfs_lockd_mounts
, 0, "");
163 SYSCTL_INT(_vfs_generic_nfs_client
, OID_AUTO
, max_async_writes
, CTLFLAG_RW
, &nfs_max_async_writes
, 0, "");
164 #endif /* NFSCLIENT */
167 SYSCTL_NODE(_vfs_generic_nfs
, OID_AUTO
, server
, CTLFLAG_RW
|CTLFLAG_LOCKED
, 0, "nfs server hinge");
168 SYSCTL_INT(_vfs_generic_nfs_server
, OID_AUTO
, wg_delay
, CTLFLAG_RW
, &nfsrv_wg_delay
, 0, "");
169 SYSCTL_INT(_vfs_generic_nfs_server
, OID_AUTO
, wg_delay_v3
, CTLFLAG_RW
, &nfsrv_wg_delay_v3
, 0, "");
170 SYSCTL_INT(_vfs_generic_nfs_server
, OID_AUTO
, require_resv_port
, CTLFLAG_RW
, &nfsrv_require_resv_port
, 0, "");
171 SYSCTL_INT(_vfs_generic_nfs_server
, OID_AUTO
, async
, CTLFLAG_RW
, &nfsrv_async
, 0, "");
172 SYSCTL_INT(_vfs_generic_nfs_server
, OID_AUTO
, reqcache_size
, CTLFLAG_RW
, &nfsrv_reqcache_size
, 0, "");
173 SYSCTL_INT(_vfs_generic_nfs_server
, OID_AUTO
, request_queue_length
, CTLFLAG_RW
, &nfsrv_sock_max_rec_queue_length
, 0, "");
174 SYSCTL_INT(_vfs_generic_nfs_server
, OID_AUTO
, user_stats
, CTLFLAG_RW
, &nfsrv_user_stat_enabled
, 0, "");
175 SYSCTL_INT(_vfs_generic_nfs_server
, OID_AUTO
, fsevents
, CTLFLAG_RW
, &nfsrv_fsevents_enabled
, 0, "");
176 SYSCTL_INT(_vfs_generic_nfs_server
, OID_AUTO
, nfsd_thread_max
, CTLFLAG_RW
, &nfsd_thread_max
, 0, "");
177 SYSCTL_INT(_vfs_generic_nfs_server
, OID_AUTO
, nfsd_thread_count
, CTLFLAG_RD
, &nfsd_thread_count
, 0, "");
178 #endif /* NFSSERVER */
184 nfsclnt(proc_t p
, struct nfsclnt_args
*uap
, __unused
int *retval
)
189 if (uap
->flag
== NFSCLNT_LOCKDANS
) {
190 error
= copyin(uap
->argp
, &la
, sizeof(la
));
191 return (error
!= 0 ? error
: nfslockdans(p
, &la
));
197 * Asynchronous I/O threads for client NFS.
198 * They do read-ahead and write-behind operations on the block I/O cache.
200 * The pool of up to nfsiod_thread_max threads is launched on demand and exit
201 * when unused for a while. There are as many nfsiod structs as there are
202 * nfsiod threads; however there's no strict tie between a thread and a struct.
203 * Each thread puts an nfsiod on the free list and sleeps on it. When it wakes
204 * up, it removes the next struct nfsiod from the queue and services it. Then
205 * it will put the struct at the head of free list and sleep on it.
206 * Async requests will pull the next struct nfsiod from the head of the free list,
207 * put it on the work queue, and wake whatever thread is waiting on that struct.
209 static int nfsiod_continue(int);
212 * nfsiod thread exit routine
214 * Must be called with nfsiod_mutex held so that the
215 * decision to terminate is atomic with the termination.
218 nfsiod_terminate(struct nfsiod
*niod
)
220 nfsiod_thread_count
--;
221 lck_mtx_unlock(nfsiod_mutex
);
225 printf("nfsiod: terminating without niod\n");
226 thread_terminate(current_thread());
230 /* nfsiod thread startup routine */
237 MALLOC(niod
, struct nfsiod
*, sizeof(struct nfsiod
), M_TEMP
, M_WAITOK
);
239 lck_mtx_lock(nfsiod_mutex
);
240 nfsiod_thread_count
--;
241 lck_mtx_unlock(nfsiod_mutex
);
242 thread_terminate(current_thread());
245 bzero(niod
, sizeof(*niod
));
246 lck_mtx_lock(nfsiod_mutex
);
247 TAILQ_INSERT_HEAD(&nfsiodfree
, niod
, niod_link
);
248 wakeup(current_thread());
249 error
= msleep0(niod
, nfsiod_mutex
, PWAIT
| PDROP
, "nfsiod", NFS_ASYNCTHREADMAXIDLE
*hz
, nfsiod_continue
);
250 /* shouldn't return... so we have an error */
251 /* remove an old nfsiod struct and terminate */
252 lck_mtx_lock(nfsiod_mutex
);
253 if ((niod
= TAILQ_LAST(&nfsiodfree
, nfsiodlist
)))
254 TAILQ_REMOVE(&nfsiodfree
, niod
, niod_link
);
255 nfsiod_terminate(niod
);
260 * Start up another nfsiod thread.
261 * (unless we're already maxed out and there are nfsiods running)
268 lck_mtx_lock(nfsiod_mutex
);
269 if ((nfsiod_thread_count
>= NFSIOD_MAX
) && (nfsiod_thread_count
> 0)) {
270 lck_mtx_unlock(nfsiod_mutex
);
273 nfsiod_thread_count
++;
274 thd
= kernel_thread(kernel_task
, nfsiod_thread
);
275 /* wait for the thread to complete startup */
276 msleep(thd
, nfsiod_mutex
, PWAIT
| PDROP
, "nfsiodw", NULL
);
281 * Continuation for Asynchronous I/O threads for NFS client.
283 * Grab an nfsiod struct to work on, do some work, then drop it
286 nfsiod_continue(int error
)
289 struct nfsmount
*nmp
;
290 struct nfsreq
*req
, *treq
;
291 struct nfs_reqqhead iodq
;
294 lck_mtx_lock(nfsiod_mutex
);
295 niod
= TAILQ_FIRST(&nfsiodwork
);
297 /* there's no work queued up */
298 if (error
!= EWOULDBLOCK
)
299 printf("nfsiod: error %d work %p\n", error
, niod
);
300 /* remove an old nfsiod struct and terminate */
301 if ((niod
= TAILQ_LAST(&nfsiodfree
, nfsiodlist
)))
302 TAILQ_REMOVE(&nfsiodfree
, niod
, niod_link
);
303 nfsiod_terminate(niod
);
306 TAILQ_REMOVE(&nfsiodwork
, niod
, niod_link
);
309 while ((nmp
= niod
->niod_nmp
)) {
311 * Service this mount's async I/O queue.
313 * In order to ensure some level of fairness between mounts,
314 * we grab all the work up front before processing it so any
315 * new work that arrives will be serviced on a subsequent
316 * iteration - and we have a chance to see if other work needs
317 * to be done (e.g. the delayed write queue needs to be pushed
318 * or other mounts are waiting for an nfsiod).
320 /* grab the current contents of the queue */
322 TAILQ_CONCAT(&iodq
, &nmp
->nm_iodq
, r_achain
);
323 lck_mtx_unlock(nfsiod_mutex
);
325 /* process the queue */
326 TAILQ_FOREACH_SAFE(req
, &iodq
, r_achain
, treq
) {
327 TAILQ_REMOVE(&iodq
, req
, r_achain
);
328 req
->r_achain
.tqe_next
= NFSREQNOLIST
;
329 req
->r_callback
.rcb_func(req
);
332 /* now check if there's more/other work to be done */
333 lck_mtx_lock(nfsiod_mutex
);
334 morework
= !TAILQ_EMPTY(&nmp
->nm_iodq
);
335 if (!morework
|| !TAILQ_EMPTY(&nfsiodmounts
)) {
336 /* we're going to stop working on this mount */
337 if (morework
) /* mount still needs more work so queue it up */
338 TAILQ_INSERT_TAIL(&nfsiodmounts
, nmp
, nm_iodlink
);
340 niod
->niod_nmp
= NULL
;
344 /* loop if there's still a mount to work on */
345 if (!niod
->niod_nmp
&& !TAILQ_EMPTY(&nfsiodmounts
)) {
346 niod
->niod_nmp
= TAILQ_FIRST(&nfsiodmounts
);
347 TAILQ_REMOVE(&nfsiodmounts
, niod
->niod_nmp
, nm_iodlink
);
352 /* queue ourselves back up - if there aren't too many threads running */
353 if (nfsiod_thread_count
<= NFSIOD_MAX
) {
354 TAILQ_INSERT_HEAD(&nfsiodfree
, niod
, niod_link
);
355 error
= msleep0(niod
, nfsiod_mutex
, PWAIT
| PDROP
, "nfsiod", NFS_ASYNCTHREADMAXIDLE
*hz
, nfsiod_continue
);
356 /* shouldn't return... so we have an error */
357 /* remove an old nfsiod struct and terminate */
358 lck_mtx_lock(nfsiod_mutex
);
359 if ((niod
= TAILQ_LAST(&nfsiodfree
, nfsiodlist
)))
360 TAILQ_REMOVE(&nfsiodfree
, niod
, niod_link
);
362 nfsiod_terminate(niod
);
367 #endif /* NFSCLIENT */
373 * NFS server system calls
374 * getfh() lives here too, but maybe should move to kern/vfs_syscalls.c
378 * Get file handle system call
381 getfh(proc_t p
, struct getfh_args
*uap
, __unused
int *retval
)
384 struct nfs_filehandle nfh
;
387 char path
[MAXPATHLEN
], *ptr
;
389 struct nfs_exportfs
*nxfs
;
390 struct nfs_export
*nx
;
395 error
= proc_suser(p
);
399 error
= copyinstr(uap
->fname
, path
, MAXPATHLEN
, (size_t *)&pathlen
);
403 if (!nfsrv_is_initialized())
406 NDINIT(&nd
, LOOKUP
, FOLLOW
| LOCKLEAF
| AUDITVNPATH1
,
407 UIO_SYSSPACE
, CAST_USER_ADDR_T(path
), vfs_context_current());
415 // find exportfs that matches f_mntonname
416 lck_rw_lock_shared(&nfsrv_export_rwlock
);
417 ptr
= vnode_mount(vp
)->mnt_vfsstat
.f_mntonname
;
418 LIST_FOREACH(nxfs
, &nfsrv_exports
, nxfs_next
) {
419 if (!strncmp(nxfs
->nxfs_path
, ptr
, MAXPATHLEN
))
422 if (!nxfs
|| strncmp(nxfs
->nxfs_path
, path
, strlen(nxfs
->nxfs_path
))) {
426 // find export that best matches remainder of path
427 ptr
= path
+ strlen(nxfs
->nxfs_path
);
428 while (*ptr
&& (*ptr
== '/'))
430 LIST_FOREACH(nx
, &nxfs
->nxfs_exports
, nx_next
) {
431 int len
= strlen(nx
->nx_path
);
432 if (len
== 0) // we've hit the export entry for the root directory
434 if (!strncmp(nx
->nx_path
, ptr
, len
))
442 bzero(&nfh
, sizeof(nfh
));
443 nfh
.nfh_xh
.nxh_version
= htonl(NFS_FH_VERSION
);
444 nfh
.nfh_xh
.nxh_fsid
= htonl(nxfs
->nxfs_id
);
445 nfh
.nfh_xh
.nxh_expid
= htonl(nx
->nx_id
);
446 nfh
.nfh_xh
.nxh_flags
= 0;
447 nfh
.nfh_xh
.nxh_reserved
= 0;
448 nfh
.nfh_len
= NFSV3_MAX_FID_SIZE
;
449 error
= VFS_VPTOFH(vp
, (int*)&nfh
.nfh_len
, &nfh
.nfh_fid
[0], NULL
);
450 if (nfh
.nfh_len
> (int)NFSV3_MAX_FID_SIZE
)
452 nfh
.nfh_xh
.nxh_fidlen
= nfh
.nfh_len
;
453 nfh
.nfh_len
+= sizeof(nfh
.nfh_xh
);
454 nfh
.nfh_fhp
= (u_char
*)&nfh
.nfh_xh
;
457 lck_rw_done(&nfsrv_export_rwlock
);
461 error
= copyout((caddr_t
)&nfh
, uap
->fhp
, sizeof(nfh
));
465 extern struct fileops vnops
;
468 * syscall for the rpc.lockd to use to translate a NFS file handle into
469 * an open descriptor.
471 * warning: do not remove the suser() call or this becomes one giant
476 struct fhopen_args
*uap
,
480 struct nfs_filehandle nfh
;
481 struct nfs_export
*nx
;
482 struct nfs_export_options
*nxo
;
484 struct fileproc
*fp
, *nfp
;
485 int fmode
, error
, type
;
487 vfs_context_t ctx
= vfs_context_current();
488 kauth_action_t action
;
493 error
= suser(vfs_context_ucred(ctx
), 0);
498 if (!nfsrv_is_initialized()) {
502 fmode
= FFLAGS(uap
->flags
);
503 /* why not allow a non-read/write open for our lockd? */
504 if (((fmode
& (FREAD
| FWRITE
)) == 0) || (fmode
& O_CREAT
))
507 error
= copyin(uap
->u_fhp
, &nfh
.nfh_len
, sizeof(nfh
.nfh_len
));
510 if ((nfh
.nfh_len
< (int)sizeof(struct nfs_exphandle
)) ||
511 (nfh
.nfh_len
> (int)NFSV3_MAX_FH_SIZE
))
513 error
= copyin(uap
->u_fhp
, &nfh
, sizeof(nfh
.nfh_len
) + nfh
.nfh_len
);
516 nfh
.nfh_fhp
= (u_char
*)&nfh
.nfh_xh
;
518 lck_rw_lock_shared(&nfsrv_export_rwlock
);
519 /* now give me my vnode, it gets returned to me with a reference */
520 error
= nfsrv_fhtovp(&nfh
, NULL
, &vp
, &nx
, &nxo
);
521 lck_rw_done(&nfsrv_export_rwlock
);
523 if (error
== NFSERR_TRYLATER
)
524 error
= EAGAIN
; // XXX EBUSY? Or just leave as TRYLATER?
529 * From now on we have to make sure not
530 * to forget about the vnode.
531 * Any error that causes an abort must vnode_put(vp).
532 * Just set error = err and 'goto bad;'.
538 if (vnode_vtype(vp
) == VSOCK
) {
543 /* disallow write operations on directories */
544 if (vnode_isdir(vp
) && (fmode
& (FWRITE
| O_TRUNC
))) {
549 /* compute action to be authorized */
552 action
|= KAUTH_VNODE_READ_DATA
;
553 if (fmode
& (FWRITE
| O_TRUNC
))
554 action
|= KAUTH_VNODE_WRITE_DATA
;
555 if ((error
= vnode_authorize(vp
, NULL
, action
, ctx
)) != 0)
558 if ((error
= VNOP_OPEN(vp
, fmode
, ctx
)))
560 if ((error
= vnode_ref_ext(vp
, fmode
)))
564 * end of vn_open code
567 // starting here... error paths should call vn_close/vnode_put
568 if ((error
= falloc(p
, &nfp
, &indx
, ctx
)) != 0) {
569 vn_close(vp
, fmode
& FMASK
, ctx
);
574 fp
->f_fglob
->fg_flag
= fmode
& FMASK
;
575 fp
->f_fglob
->fg_type
= DTYPE_VNODE
;
576 fp
->f_fglob
->fg_ops
= &vnops
;
577 fp
->f_fglob
->fg_data
= (caddr_t
)vp
;
579 // XXX do we really need to support this with fhopen()?
580 if (fmode
& (O_EXLOCK
| O_SHLOCK
)) {
581 lf
.l_whence
= SEEK_SET
;
584 if (fmode
& O_EXLOCK
)
589 if ((fmode
& FNONBLOCK
) == 0)
591 if ((error
= VNOP_ADVLOCK(vp
, (caddr_t
)fp
->f_fglob
, F_SETLK
, &lf
, type
, ctx
))) {
592 struct vfs_context context
= *vfs_context_current();
593 /* Modify local copy (to not damage thread copy) */
594 context
.vc_ucred
= fp
->f_fglob
->fg_cred
;
596 vn_close(vp
, fp
->f_fglob
->fg_flag
, &context
);
597 fp_free(p
, indx
, fp
);
600 fp
->f_fglob
->fg_flag
|= FHASLOCK
;
606 procfdtbl_releasefd(p
, indx
, NULL
);
607 fp_drop(p
, indx
, fp
, 1);
619 * NFS server pseudo system call
622 nfssvc(proc_t p
, struct nfssvc_args
*uap
, __unused
int *retval
)
625 struct user_nfsd_args user_nfsdarg
;
629 AUDIT_ARG(cmd
, uap
->flag
);
634 error
= proc_suser(p
);
638 error
= mac_system_check_nfsd(kauth_cred_get());
643 /* make sure NFS server data structures have been initialized */
646 if (uap
->flag
& NFSSVC_ADDSOCK
) {
647 if (IS_64BIT_PROCESS(p
)) {
648 error
= copyin(uap
->argp
, (caddr_t
)&user_nfsdarg
, sizeof(user_nfsdarg
));
650 struct nfsd_args tmp_args
;
651 error
= copyin(uap
->argp
, (caddr_t
)&tmp_args
, sizeof(tmp_args
));
653 user_nfsdarg
.sock
= tmp_args
.sock
;
654 user_nfsdarg
.name
= CAST_USER_ADDR_T(tmp_args
.name
);
655 user_nfsdarg
.namelen
= tmp_args
.namelen
;
661 error
= file_socket(user_nfsdarg
.sock
, &so
);
664 /* Get the client address for connected sockets. */
665 if (user_nfsdarg
.name
== USER_ADDR_NULL
|| user_nfsdarg
.namelen
== 0) {
668 error
= sockargs(&nam
, user_nfsdarg
.name
, user_nfsdarg
.namelen
, MBUF_TYPE_SONAME
);
670 /* drop the iocount file_socket() grabbed on the file descriptor */
671 file_drop(user_nfsdarg
.sock
);
676 * nfssvc_addsock() will grab a retain count on the socket
677 * to keep the socket from being closed when nfsd closes its
678 * file descriptor for it.
680 error
= nfssvc_addsock(so
, nam
);
681 /* drop the iocount file_socket() grabbed on the file descriptor */
682 file_drop(user_nfsdarg
.sock
);
683 } else if (uap
->flag
& NFSSVC_NFSD
) {
684 error
= nfssvc_nfsd();
685 } else if (uap
->flag
& NFSSVC_EXPORT
) {
686 error
= nfssvc_export(uap
->argp
);
690 if (error
== EINTR
|| error
== ERESTART
)
696 * Adds a socket to the list for servicing by nfsds.
699 nfssvc_addsock(socket_t so
, mbuf_t mynam
)
701 struct nfsrv_sock
*slp
;
702 int error
= 0, sodomain
, sotype
, soprotocol
, on
= 1;
703 struct timeval timeo
;
705 /* make sure mbuf constants are set up */
709 sock_gettype(so
, &sodomain
, &sotype
, &soprotocol
);
711 /* There should be only one UDP socket */
712 if ((soprotocol
== IPPROTO_UDP
) && nfsrv_udpsock
) {
717 /* Set protocol options and reserve some space (for UDP). */
718 if (sotype
== SOCK_STREAM
)
719 sock_setsockopt(so
, SOL_SOCKET
, SO_KEEPALIVE
, &on
, sizeof(on
));
720 if ((sodomain
== AF_INET
) && (soprotocol
== IPPROTO_TCP
))
721 sock_setsockopt(so
, IPPROTO_TCP
, TCP_NODELAY
, &on
, sizeof(on
));
722 if (sotype
== SOCK_DGRAM
) { /* set socket buffer sizes for UDP */
723 int reserve
= NFS_UDPSOCKBUF
;
724 error
|= sock_setsockopt(so
, SOL_SOCKET
, SO_SNDBUF
, &reserve
, sizeof(reserve
));
725 error
|= sock_setsockopt(so
, SOL_SOCKET
, SO_RCVBUF
, &reserve
, sizeof(reserve
));
727 log(LOG_INFO
, "nfssvc_addsock: UDP socket buffer setting error(s) %d\n", error
);
731 sock_nointerrupt(so
, 0);
734 * Set socket send/receive timeouts.
735 * Receive timeout shouldn't matter, but setting the send timeout
736 * will make sure that an unresponsive client can't hang the server.
740 error
|= sock_setsockopt(so
, SOL_SOCKET
, SO_RCVTIMEO
, &timeo
, sizeof(timeo
));
742 error
|= sock_setsockopt(so
, SOL_SOCKET
, SO_SNDTIMEO
, &timeo
, sizeof(timeo
));
744 log(LOG_INFO
, "nfssvc_addsock: socket timeout setting error(s) %d\n", error
);
748 MALLOC(slp
, struct nfsrv_sock
*, sizeof(struct nfsrv_sock
), M_NFSSVC
, M_WAITOK
);
753 bzero((caddr_t
)slp
, sizeof (struct nfsrv_sock
));
754 lck_rw_init(&slp
->ns_rwlock
, nfsrv_slp_rwlock_group
, LCK_ATTR_NULL
);
755 lck_mtx_init(&slp
->ns_wgmutex
, nfsrv_slp_mutex_group
, LCK_ATTR_NULL
);
757 lck_mtx_lock(nfsd_mutex
);
759 if (soprotocol
== IPPROTO_UDP
) {
760 /* There should be only one UDP socket */
762 lck_mtx_unlock(nfsd_mutex
);
770 /* add the socket to the list */
771 TAILQ_INSERT_TAIL(&nfsrv_socklist
, slp
, ns_chain
);
773 sock_retain(so
); /* grab a retain count on the socket */
775 slp
->ns_sotype
= sotype
;
778 /* set up the socket upcall */
780 so
->so_upcallarg
= (caddr_t
)slp
;
781 so
->so_upcall
= nfsrv_rcv
;
782 so
->so_rcv
.sb_flags
|= SB_UPCALL
;
783 socket_unlock(so
, 1);
784 /* just playin' it safe */
785 sock_setsockopt(so
, SOL_SOCKET
, SO_UPCALLCLOSEWAIT
, &on
, sizeof(on
));
787 /* mark that the socket is not in the nfsrv_sockwg list */
788 slp
->ns_wgq
.tqe_next
= SLPNOLIST
;
790 slp
->ns_flag
= SLP_VALID
| SLP_NEEDQ
;
793 lck_mtx_unlock(nfsd_mutex
);
801 * nfsd theory of operation:
803 * The first nfsd thread stays in user mode accepting new TCP connections
804 * which are then added via the "addsock" call. The rest of the nfsd threads
805 * simply call into the kernel and remain there in a loop handling NFS
806 * requests until killed by a signal.
808 * There's a list of nfsd threads (nfsd_head).
809 * There's an nfsd queue that contains only those nfsds that are
810 * waiting for work to do (nfsd_queue).
812 * There's a list of all NFS sockets (nfsrv_socklist) and two queues for
813 * managing the work on the sockets:
814 * nfsrv_sockwait - sockets w/new data waiting to be worked on
815 * nfsrv_sockwork - sockets being worked on which may have more work to do
816 * nfsrv_sockwg -- sockets which have pending write gather data
817 * When a socket receives data, if it is not currently queued, it
818 * will be placed at the end of the "wait" queue.
819 * Whenever a socket needs servicing we make sure it is queued and
820 * wake up a waiting nfsd (if there is one).
822 * nfsds will service at most 8 requests from the same socket before
823 * defecting to work on another socket.
824 * nfsds will defect immediately if there are any sockets in the "wait" queue
825 * nfsds looking for a socket to work on check the "wait" queue first and
826 * then check the "work" queue.
827 * When an nfsd starts working on a socket, it removes it from the head of
828 * the queue it's currently on and moves it to the end of the "work" queue.
829 * When nfsds are checking the queues for work, any sockets found not to
830 * have any work are simply dropped from the queue.
837 struct nfsrv_sock
*slp
;
839 struct nfsrv_descript
*nd
= NULL
;
840 int error
= 0, cacherep
, writes_todo
;
841 int siz
, procrastinate
, opcnt
= 0;
844 struct vfs_context context
;
851 MALLOC(nfsd
, struct nfsd
*, sizeof(struct nfsd
), M_NFSD
, M_WAITOK
);
854 bzero(nfsd
, sizeof(struct nfsd
));
855 lck_mtx_lock(nfsd_mutex
);
856 if (nfsd_thread_count
++ == 0)
857 nfsrv_initcache(); /* Init the server request cache */
858 TAILQ_INSERT_TAIL(&nfsd_head
, nfsd
, nfsd_chain
);
859 lck_mtx_unlock(nfsd_mutex
);
861 context
.vc_thread
= current_thread();
864 * Loop getting rpc requests until SIGKILL.
867 if (nfsd_thread_max
<= 0) {
868 /* NFS server shutting down, get out ASAP */
870 slp
= nfsd
->nfsd_slp
;
871 } else if (nfsd
->nfsd_flag
& NFSD_REQINPROG
) {
872 /* already have some work to do */
874 slp
= nfsd
->nfsd_slp
;
876 /* need to find work to do */
878 lck_mtx_lock(nfsd_mutex
);
879 while (!nfsd
->nfsd_slp
&& TAILQ_EMPTY(&nfsrv_sockwait
) && TAILQ_EMPTY(&nfsrv_sockwork
)) {
880 if (nfsd_thread_count
> nfsd_thread_max
) {
882 * If we have no socket and there are more
883 * nfsd threads than configured, let's exit.
888 nfsd
->nfsd_flag
|= NFSD_WAITING
;
889 TAILQ_INSERT_HEAD(&nfsd_queue
, nfsd
, nfsd_queue
);
890 error
= msleep(nfsd
, nfsd_mutex
, PSOCK
| PCATCH
, "nfsd", NULL
);
892 if (nfsd
->nfsd_flag
& NFSD_WAITING
) {
893 TAILQ_REMOVE(&nfsd_queue
, nfsd
, nfsd_queue
);
894 nfsd
->nfsd_flag
&= ~NFSD_WAITING
;
899 slp
= nfsd
->nfsd_slp
;
900 if (!slp
&& !TAILQ_EMPTY(&nfsrv_sockwait
)) {
901 /* look for a socket to work on in the wait queue */
902 while ((slp
= TAILQ_FIRST(&nfsrv_sockwait
))) {
903 lck_rw_lock_exclusive(&slp
->ns_rwlock
);
904 /* remove from the head of the queue */
905 TAILQ_REMOVE(&nfsrv_sockwait
, slp
, ns_svcq
);
906 slp
->ns_flag
&= ~SLP_WAITQ
;
907 if ((slp
->ns_flag
& SLP_VALID
) && (slp
->ns_flag
& SLP_WORKTODO
))
909 /* nothing to do, so skip this socket */
910 lck_rw_done(&slp
->ns_rwlock
);
913 if (!slp
&& !TAILQ_EMPTY(&nfsrv_sockwork
)) {
914 /* look for a socket to work on in the work queue */
915 while ((slp
= TAILQ_FIRST(&nfsrv_sockwork
))) {
916 lck_rw_lock_exclusive(&slp
->ns_rwlock
);
917 /* remove from the head of the queue */
918 TAILQ_REMOVE(&nfsrv_sockwork
, slp
, ns_svcq
);
919 slp
->ns_flag
&= ~SLP_WORKQ
;
920 if ((slp
->ns_flag
& SLP_VALID
) && (slp
->ns_flag
& SLP_WORKTODO
))
922 /* nothing to do, so skip this socket */
923 lck_rw_done(&slp
->ns_rwlock
);
926 if (!nfsd
->nfsd_slp
&& slp
) {
927 /* we found a socket to work on, grab a reference */
929 nfsd
->nfsd_slp
= slp
;
931 /* and put it at the back of the work queue */
932 TAILQ_INSERT_TAIL(&nfsrv_sockwork
, slp
, ns_svcq
);
933 slp
->ns_flag
|= SLP_WORKQ
;
934 lck_rw_done(&slp
->ns_rwlock
);
936 lck_mtx_unlock(nfsd_mutex
);
939 lck_rw_lock_exclusive(&slp
->ns_rwlock
);
940 if (slp
->ns_flag
& SLP_VALID
) {
941 if ((slp
->ns_flag
& (SLP_NEEDQ
|SLP_DISCONN
)) == SLP_NEEDQ
) {
942 slp
->ns_flag
&= ~SLP_NEEDQ
;
943 nfsrv_rcv_locked(slp
->ns_so
, slp
, MBUF_WAITOK
);
945 if (slp
->ns_flag
& SLP_DISCONN
)
947 error
= nfsrv_dorec(slp
, nfsd
, &nd
);
948 if (error
== EINVAL
) { // RPCSEC_GSS drop
949 if (slp
->ns_sotype
== SOCK_STREAM
)
950 nfsrv_zapsock(slp
); // drop connection
953 if (error
&& (slp
->ns_wgtime
|| (slp
->ns_flag
& SLP_DOWRITES
))) {
955 cur_usec
= (u_quad_t
)now
.tv_sec
* 1000000 +
956 (u_quad_t
)now
.tv_usec
;
957 if (slp
->ns_wgtime
<= cur_usec
) {
962 slp
->ns_flag
&= ~SLP_DOWRITES
;
964 nfsd
->nfsd_flag
|= NFSD_REQINPROG
;
966 lck_rw_done(&slp
->ns_rwlock
);
968 if (error
|| (slp
&& !(slp
->ns_flag
& SLP_VALID
))) {
970 nfsm_chain_cleanup(&nd
->nd_nmreq
);
972 mbuf_freem(nd
->nd_nam2
);
973 if (IS_VALID_CRED(nd
->nd_cr
))
974 kauth_cred_unref(&nd
->nd_cr
);
975 FREE_ZONE(nd
, sizeof(*nd
), M_NFSRVDESC
);
978 nfsd
->nfsd_slp
= NULL
;
979 nfsd
->nfsd_flag
&= ~NFSD_REQINPROG
;
982 if (nfsd_thread_max
<= 0)
987 microuptime(&nd
->nd_starttime
);
989 nd
->nd_nam
= nd
->nd_nam2
;
991 nd
->nd_nam
= slp
->ns_nam
;
993 cacherep
= nfsrv_getcache(nd
, slp
, &mrep
);
995 if (nfsrv_require_resv_port
) {
996 /* Check if source port is a reserved port */
998 struct sockaddr
*nam
= mbuf_data(nd
->nd_nam
);
999 struct sockaddr_in
*sin
;
1001 sin
= (struct sockaddr_in
*)nam
;
1002 port
= ntohs(sin
->sin_port
);
1003 if (port
>= IPPORT_RESERVED
&&
1004 nd
->nd_procnum
!= NFSPROC_NULL
) {
1005 char strbuf
[MAX_IPv4_STR_LEN
];
1006 nd
->nd_procnum
= NFSPROC_NOOP
;
1007 nd
->nd_repstat
= (NFSERR_AUTHERR
| AUTH_TOOWEAK
);
1009 printf("NFS request from unprivileged port (%s:%d)\n",
1010 inet_ntop(AF_INET
, &sin
->sin_addr
, strbuf
, sizeof(strbuf
)),
1018 * Loop to get all the write RPC replies that have been
1019 * gathered together.
1024 if (nd
&& (nd
->nd_vers
== NFS_VER3
))
1025 procrastinate
= nfsrv_wg_delay_v3
;
1027 procrastinate
= nfsrv_wg_delay
;
1028 lck_rw_lock_shared(&nfsrv_export_rwlock
);
1029 context
.vc_ucred
= NULL
;
1030 if (writes_todo
|| ((nd
->nd_procnum
== NFSPROC_WRITE
) && (procrastinate
> 0)))
1031 error
= nfsrv_writegather(&nd
, slp
, &context
, &mrep
);
1033 error
= (*(nfsrv_procs
[nd
->nd_procnum
]))(nd
, slp
, &context
, &mrep
);
1034 lck_rw_done(&nfsrv_export_rwlock
);
1037 * If this is a stream socket and we are not going
1038 * to send a reply we better close the connection
1039 * so the client doesn't hang.
1041 if (error
&& slp
->ns_sotype
== SOCK_STREAM
) {
1042 lck_rw_lock_exclusive(&slp
->ns_rwlock
);
1044 lck_rw_done(&slp
->ns_rwlock
);
1045 printf("NFS server: NULL reply from proc = %d error = %d\n",
1046 nd
->nd_procnum
, error
);
1052 OSAddAtomic(1, (SInt32
*)&nfsstats
.srv_errs
);
1053 nfsrv_updatecache(nd
, FALSE
, mrep
);
1055 mbuf_freem(nd
->nd_nam2
);
1060 OSAddAtomic(1, (SInt32
*)&nfsstats
.srvrpccnt
[nd
->nd_procnum
]);
1061 nfsrv_updatecache(nd
, TRUE
, mrep
);
1065 if (nd
->nd_gss_mb
!= NULL
) { // It's RPCSEC_GSS
1067 * Need to checksum or encrypt the reply
1069 error
= nfs_gss_svc_protect_reply(nd
, mrep
);
1077 * Get the total size of the reply
1085 if (siz
<= 0 || siz
> NFS_MAXPACKET
) {
1086 printf("mbuf siz=%d\n",siz
);
1087 panic("Bad nfs svc reply");
1090 mbuf_pkthdr_setlen(m
, siz
);
1091 error
= mbuf_pkthdr_setrcvif(m
, NULL
);
1093 panic("nfsd setrcvif failed: %d", error
);
1095 * For stream protocols, prepend a Sun RPC
1098 if (slp
->ns_sotype
== SOCK_STREAM
) {
1099 error
= mbuf_prepend(&m
, NFSX_UNSIGNED
, MBUF_WAITOK
);
1101 *(u_long
*)mbuf_data(m
) = htonl(0x80000000 | siz
);
1104 if (slp
->ns_flag
& SLP_VALID
) {
1105 error
= nfsrv_send(slp
, nd
->nd_nam2
, m
);
1115 mbuf_freem(nd
->nd_nam2
);
1118 if (error
== EPIPE
) {
1119 lck_rw_lock_exclusive(&slp
->ns_rwlock
);
1121 lck_rw_done(&slp
->ns_rwlock
);
1123 if (error
== EINTR
|| error
== ERESTART
) {
1124 nfsm_chain_cleanup(&nd
->nd_nmreq
);
1125 if (IS_VALID_CRED(nd
->nd_cr
))
1126 kauth_cred_unref(&nd
->nd_cr
);
1127 FREE_ZONE(nd
, sizeof(*nd
), M_NFSRVDESC
);
1128 nfsrv_slpderef(slp
);
1129 lck_mtx_lock(nfsd_mutex
);
1134 mbuf_freem(nd
->nd_nam2
);
1140 nfsm_chain_cleanup(&nd
->nd_nmreq
);
1142 mbuf_freem(nd
->nd_nam2
);
1143 if (IS_VALID_CRED(nd
->nd_cr
))
1144 kauth_cred_unref(&nd
->nd_cr
);
1145 FREE_ZONE(nd
, sizeof(*nd
), M_NFSRVDESC
);
1150 * Check to see if there are outstanding writes that
1151 * need to be serviced.
1154 if (slp
->ns_wgtime
) {
1156 cur_usec
= (u_quad_t
)now
.tv_sec
* 1000000 +
1157 (u_quad_t
)now
.tv_usec
;
1158 if (slp
->ns_wgtime
<= cur_usec
) {
1163 } while (writes_todo
);
1166 if (TAILQ_EMPTY(&nfsrv_sockwait
) && (opcnt
< 8)) {
1167 lck_rw_lock_exclusive(&slp
->ns_rwlock
);
1168 error
= nfsrv_dorec(slp
, nfsd
, &nd
);
1169 if (error
== EINVAL
) { // RPCSEC_GSS drop
1170 if (slp
->ns_sotype
== SOCK_STREAM
)
1171 nfsrv_zapsock(slp
); // drop connection
1173 lck_rw_done(&slp
->ns_rwlock
);
1176 /* drop our reference on the socket */
1177 nfsd
->nfsd_flag
&= ~NFSD_REQINPROG
;
1178 nfsd
->nfsd_slp
= NULL
;
1179 nfsrv_slpderef(slp
);
1182 lck_mtx_lock(nfsd_mutex
);
1184 TAILQ_REMOVE(&nfsd_head
, nfsd
, nfsd_chain
);
1186 if (--nfsd_thread_count
== 0)
1188 lck_mtx_unlock(nfsd_mutex
);
1193 nfssvc_export(user_addr_t argp
)
1195 int error
= 0, is_64bit
;
1196 struct user_nfs_export_args unxa
;
1197 vfs_context_t ctx
= vfs_context_current();
1199 is_64bit
= IS_64BIT_PROCESS(vfs_context_proc(ctx
));
1201 /* copy in pointers to path and export args */
1203 error
= copyin(argp
, (caddr_t
)&unxa
, sizeof(unxa
));
1205 struct nfs_export_args tnxa
;
1206 error
= copyin(argp
, (caddr_t
)&tnxa
, sizeof(tnxa
));
1208 /* munge into LP64 version of nfs_export_args structure */
1209 unxa
.nxa_fsid
= tnxa
.nxa_fsid
;
1210 unxa
.nxa_expid
= tnxa
.nxa_expid
;
1211 unxa
.nxa_fspath
= CAST_USER_ADDR_T(tnxa
.nxa_fspath
);
1212 unxa
.nxa_exppath
= CAST_USER_ADDR_T(tnxa
.nxa_exppath
);
1213 unxa
.nxa_flags
= tnxa
.nxa_flags
;
1214 unxa
.nxa_netcount
= tnxa
.nxa_netcount
;
1215 unxa
.nxa_nets
= CAST_USER_ADDR_T(tnxa
.nxa_nets
);
1221 error
= nfsrv_export(&unxa
, ctx
);
1227 * Shut down a socket associated with an nfsrv_sock structure.
1228 * Should be called with the send lock set, if required.
1229 * The trick here is to increment the sref at the start, so that the nfsds
1230 * will stop using it and clear ns_flag at the end so that it will not be
1231 * reassigned during cleanup.
1234 nfsrv_zapsock(struct nfsrv_sock
*slp
)
1238 if ((slp
->ns_flag
& SLP_VALID
) == 0)
1240 slp
->ns_flag
&= ~SLP_ALLFLAGS
;
1247 * Attempt to deter future upcalls, but leave the
1248 * upcall info in place to avoid a race with the
1252 so
->so_rcv
.sb_flags
&= ~SB_UPCALL
;
1253 socket_unlock(so
, 1);
1255 sock_shutdown(so
, SHUT_RDWR
);
1259 * cleanup and release a server socket structure.
1262 nfsrv_slpfree(struct nfsrv_sock
*slp
)
1264 struct nfsrv_descript
*nwp
, *nnwp
;
1267 sock_release(slp
->ns_so
);
1271 mbuf_free(slp
->ns_nam
);
1273 mbuf_freem(slp
->ns_raw
);
1275 mbuf_freem(slp
->ns_rec
);
1277 mbuf_freem(slp
->ns_frag
);
1278 slp
->ns_nam
= slp
->ns_raw
= slp
->ns_rec
= slp
->ns_frag
= NULL
;
1281 for (nwp
= slp
->ns_tq
.lh_first
; nwp
; nwp
= nnwp
) {
1282 nnwp
= nwp
->nd_tq
.le_next
;
1283 LIST_REMOVE(nwp
, nd_tq
);
1284 nfsm_chain_cleanup(&nwp
->nd_nmreq
);
1286 mbuf_freem(nwp
->nd_mrep
);
1288 mbuf_freem(nwp
->nd_nam2
);
1289 if (IS_VALID_CRED(nwp
->nd_cr
))
1290 kauth_cred_unref(&nwp
->nd_cr
);
1291 FREE_ZONE(nwp
, sizeof(*nwp
), M_NFSRVDESC
);
1293 LIST_INIT(&slp
->ns_tq
);
1295 lck_rw_destroy(&slp
->ns_rwlock
, nfsrv_slp_rwlock_group
);
1296 lck_mtx_destroy(&slp
->ns_wgmutex
, nfsrv_slp_mutex_group
);
1297 FREE(slp
, M_NFSSVC
);
1301 * Derefence a server socket structure. If it has no more references and
1302 * is no longer valid, you can throw it away.
1305 nfsrv_slpderef(struct nfsrv_sock
*slp
)
1309 lck_mtx_lock(nfsd_mutex
);
1310 lck_rw_lock_exclusive(&slp
->ns_rwlock
);
1313 if (slp
->ns_sref
|| (slp
->ns_flag
& SLP_VALID
)) {
1314 if ((slp
->ns_flag
& SLP_QUEUED
) && !(slp
->ns_flag
& SLP_WORKTODO
)) {
1315 /* remove socket from queue since there's no work */
1316 if (slp
->ns_flag
& SLP_WAITQ
)
1317 TAILQ_REMOVE(&nfsrv_sockwait
, slp
, ns_svcq
);
1319 TAILQ_REMOVE(&nfsrv_sockwork
, slp
, ns_svcq
);
1320 slp
->ns_flag
&= ~SLP_QUEUED
;
1322 lck_rw_done(&slp
->ns_rwlock
);
1323 lck_mtx_unlock(nfsd_mutex
);
1327 /* This socket is no longer valid, so we'll get rid of it */
1329 if (slp
->ns_flag
& SLP_QUEUED
) {
1330 if (slp
->ns_flag
& SLP_WAITQ
)
1331 TAILQ_REMOVE(&nfsrv_sockwait
, slp
, ns_svcq
);
1333 TAILQ_REMOVE(&nfsrv_sockwork
, slp
, ns_svcq
);
1334 slp
->ns_flag
&= ~SLP_QUEUED
;
1338 * Queue the socket up for deletion
1339 * and start the timer to delete it
1340 * after it has been in limbo for
1344 slp
->ns_timestamp
= now
.tv_sec
;
1345 TAILQ_REMOVE(&nfsrv_socklist
, slp
, ns_chain
);
1346 TAILQ_INSERT_TAIL(&nfsrv_deadsocklist
, slp
, ns_chain
);
1347 if (!nfsrv_deadsock_timer_on
) {
1348 nfsrv_deadsock_timer_on
= 1;
1349 nfs_interval_timer_start(nfsrv_deadsock_timer_call
,
1350 NFSRV_DEADSOCKDELAY
* 1000);
1353 lck_rw_done(&slp
->ns_rwlock
);
1354 /* now remove from the write gather socket list */
1355 if (slp
->ns_wgq
.tqe_next
!= SLPNOLIST
) {
1356 TAILQ_REMOVE(&nfsrv_sockwg
, slp
, ns_wgq
);
1357 slp
->ns_wgq
.tqe_next
= SLPNOLIST
;
1359 lck_mtx_unlock(nfsd_mutex
);
1363 * Check periodically for dead sockets pending delete.
1364 * If a socket has been dead for more than NFSRV_DEADSOCKDELAY
1365 * seconds then we assume it's safe to free.
1368 nfsrv_deadsock_timer(__unused
void *param0
, __unused
void *param1
)
1370 struct nfsrv_sock
*slp
;
1372 time_t time_to_wait
;
1375 lck_mtx_lock(nfsd_mutex
);
1377 while ((slp
= TAILQ_FIRST(&nfsrv_deadsocklist
))) {
1378 if ((slp
->ns_timestamp
+ NFSRV_DEADSOCKDELAY
) > now
.tv_sec
)
1380 TAILQ_REMOVE(&nfsrv_deadsocklist
, slp
, ns_chain
);
1383 if (TAILQ_EMPTY(&nfsrv_deadsocklist
)) {
1384 nfsrv_deadsock_timer_on
= 0;
1385 lck_mtx_unlock(nfsd_mutex
);
1388 time_to_wait
= (slp
->ns_timestamp
+ NFSRV_DEADSOCKDELAY
) - now
.tv_sec
;
1389 if (time_to_wait
< 1)
1392 lck_mtx_unlock(nfsd_mutex
);
1394 nfs_interval_timer_start(nfsrv_deadsock_timer_call
,
1395 time_to_wait
* 1000);
1399 * Clean up the data structures for the server.
1404 struct nfsrv_sock
*slp
, *nslp
;
1406 struct nfsrv_fmod
*fp
, *nfp
;
1410 for (slp
= TAILQ_FIRST(&nfsrv_socklist
); slp
!= 0; slp
= nslp
) {
1411 nslp
= TAILQ_NEXT(slp
, ns_chain
);
1412 if (slp
->ns_flag
& SLP_VALID
) {
1413 lck_rw_lock_exclusive(&slp
->ns_rwlock
);
1415 lck_rw_done(&slp
->ns_rwlock
);
1417 if (slp
->ns_flag
& SLP_QUEUED
) {
1418 if (slp
->ns_flag
& SLP_WAITQ
)
1419 TAILQ_REMOVE(&nfsrv_sockwait
, slp
, ns_svcq
);
1421 TAILQ_REMOVE(&nfsrv_sockwork
, slp
, ns_svcq
);
1422 slp
->ns_flag
&= ~SLP_QUEUED
;
1424 if (slp
->ns_wgq
.tqe_next
!= SLPNOLIST
) {
1425 TAILQ_REMOVE(&nfsrv_sockwg
, slp
, ns_wgq
);
1426 slp
->ns_wgq
.tqe_next
= SLPNOLIST
;
1428 /* queue the socket up for deletion */
1429 slp
->ns_timestamp
= now
.tv_sec
;
1430 TAILQ_REMOVE(&nfsrv_socklist
, slp
, ns_chain
);
1431 TAILQ_INSERT_TAIL(&nfsrv_deadsocklist
, slp
, ns_chain
);
1432 if (!nfsrv_deadsock_timer_on
) {
1433 nfsrv_deadsock_timer_on
= 1;
1434 nfs_interval_timer_start(nfsrv_deadsock_timer_call
,
1435 NFSRV_DEADSOCKDELAY
* 1000);
1440 * Flush pending file write fsevents
1442 lck_mtx_lock(nfsrv_fmod_mutex
);
1443 for (i
= 0; i
< NFSRVFMODHASHSZ
; i
++) {
1444 for (fp
= LIST_FIRST(&nfsrv_fmod_hashtbl
[i
]); fp
; fp
= nfp
) {
1446 * Fire off the content modified fsevent for each
1447 * entry, remove it from the list, and free it.
1450 if (nfsrv_fsevents_enabled
)
1451 add_fsevent(FSE_CONTENT_MODIFIED
, &fp
->fm_context
,
1452 FSE_ARG_VNODE
, fp
->fm_vp
,
1455 vnode_put(fp
->fm_vp
);
1456 kauth_cred_unref(&fp
->fm_context
.vc_ucred
);
1457 nfp
= LIST_NEXT(fp
, fm_link
);
1458 LIST_REMOVE(fp
, fm_link
);
1462 nfsrv_fmod_pending
= 0;
1463 lck_mtx_unlock(nfsrv_fmod_mutex
);
1465 nfs_gss_svc_cleanup(); /* Remove any RPCSEC_GSS contexts */
1467 nfsrv_cleancache(); /* And clear out server cache */
1469 nfsrv_udpsock
= NULL
;
1472 #endif /* NFS_NOSERVER */