1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 22 /* 23 * Copyright 2015 Nexenta Systems, Inc. All rights reserved. 24 */ 25 26 /* 27 * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 28 * Use is subject to license terms. 29 */ 30 31 #include <sys/param.h> 32 #include <sys/types.h> 33 #include <sys/systm.h> 34 #include <sys/cred.h> 35 #include <sys/buf.h> 36 #include <sys/vfs.h> 37 #include <sys/vnode.h> 38 #include <sys/uio.h> 39 #include <sys/errno.h> 40 #include <sys/sysmacros.h> 41 #include <sys/statvfs.h> 42 #include <sys/kmem.h> 43 #include <sys/dirent.h> 44 #include <rpc/types.h> 45 #include <rpc/auth.h> 46 #include <rpc/rpcsec_gss.h> 47 #include <rpc/svc.h> 48 #include <sys/strsubr.h> 49 #include <sys/strsun.h> 50 #include <sys/sdt.h> 51 52 #include <nfs/nfs.h> 53 #include <nfs/export.h> 54 #include <nfs/nfs4.h> 55 #include <nfs/nfs_cmd.h> 56 57 58 /* 59 * RFS4_MINLEN_ENTRY4: XDR-encoded size of smallest possible dirent. 60 * This is used to return NFS4ERR_TOOSMALL when clients specify 61 * maxcount that isn't large enough to hold the smallest possible 62 * XDR encoded dirent. 63 * 64 * sizeof cookie (8 bytes) + 65 * sizeof name_len (4 bytes) + 66 * sizeof smallest (padded) name (4 bytes) + 67 * sizeof bitmap4_len (12 bytes) + NOTE: we always encode len=2 bm4 68 * sizeof attrlist4_len (4 bytes) + 69 * sizeof next boolean (4 bytes) 70 * 71 * RFS4_MINLEN_RDDIR4: XDR-encoded size of READDIR op reply containing 72 * the smallest possible entry4 (assumes no attrs requested). 73 * sizeof nfsstat4 (4 bytes) + 74 * sizeof verifier4 (8 bytes) + 75 * sizeof entsecond_to_ry4list bool (4 bytes) + 76 * sizeof entry4 (36 bytes) + 77 * sizeof eof bool (4 bytes) 78 * 79 * RFS4_MINLEN_RDDIR_BUF: minimum length of buffer server will provide to 80 * VOP_READDIR. Its value is the size of the maximum possible dirent 81 * for solaris. The DIRENT64_RECLEN macro returns the size of dirent 82 * required for a given name length. MAXNAMELEN is the maximum 83 * filename length allowed in Solaris. The first two DIRENT64_RECLEN() 84 * macros are to allow for . and .. entries -- just a minor tweak to try 85 * and guarantee that buffer we give to VOP_READDIR will be large enough 86 * to hold ., .., and the largest possible solaris dirent64. 87 */ 88 #define RFS4_MINLEN_ENTRY4 36 89 #define RFS4_MINLEN_RDDIR4 (4 + NFS4_VERIFIER_SIZE + 4 + RFS4_MINLEN_ENTRY4 + 4) 90 #define RFS4_MINLEN_RDDIR_BUF \ 91 (DIRENT64_RECLEN(1) + DIRENT64_RECLEN(2) + DIRENT64_RECLEN(MAXNAMELEN)) 92 93 94 #ifdef nextdp 95 #undef nextdp 96 #endif 97 #define nextdp(dp) ((struct dirent64 *)((char *)(dp) + (dp)->d_reclen)) 98 99 verifier4 Readdir4verf = 0x0; 100 101 static nfs_ftype4 vt_to_nf4[] = { 102 0, NF4REG, NF4DIR, NF4BLK, NF4CHR, NF4LNK, NF4FIFO, 0, 0, NF4SOCK, 0 103 }; 104 105 int 106 nfs4_readdir_getvp(vnode_t *dvp, char *d_name, vnode_t **vpp, 107 struct exportinfo **exi, struct svc_req *req, 108 struct compound_state *cs, int expseudo) 109 { 110 int error; 111 int ismntpt; 112 fid_t fid; 113 vnode_t *vp, *pre_tvp; 114 nfsstat4 status; 115 struct exportinfo *newexi, *saveexi; 116 cred_t *scr; 117 118 *vpp = vp = NULL; 119 120 if (error = VOP_LOOKUP(dvp, d_name, &vp, NULL, 0, NULL, cs->cr, 121 NULL, NULL, NULL)) 122 return (error); 123 124 /* 125 * If the directory is a referral point, don't return the 126 * attrs, instead set rdattr_error to MOVED. 127 */ 128 if (vn_is_nfs_reparse(vp, cs->cr) && !client_is_downrev(req)) { 129 VN_RELE(vp); 130 DTRACE_PROBE2(nfs4serv__func__referral__moved, 131 vnode_t *, vp, char *, "nfs4_readdir_getvp"); 132 return (NFS4ERR_MOVED); 133 } 134 135 /* Is this object mounted upon? */ 136 ismntpt = vn_ismntpt(vp); 137 138 /* 139 * Nothing more to do if object is not a mount point or 140 * a possible LOFS shadow of an LOFS mount (which won't 141 * have v_vfsmountedhere set) 142 */ 143 if (ismntpt == 0 && dvp->v_vfsp == vp->v_vfsp && expseudo == 0) { 144 *vpp = vp; 145 return (0); 146 } 147 148 if (ismntpt) { 149 /* 150 * Something is mounted here. Traverse and manage the 151 * namespace 152 */ 153 pre_tvp = vp; 154 VN_HOLD(pre_tvp); 155 156 if ((error = traverse(&vp)) != 0) { 157 VN_RELE(vp); 158 VN_RELE(pre_tvp); 159 return (error); 160 } 161 if (vn_is_nfs_reparse(vp, cs->cr)) { 162 VN_RELE(vp); 163 VN_RELE(pre_tvp); 164 DTRACE_PROBE2(nfs4serv__func__referral__moved, 165 vnode_t *, vp, char *, "nfs4_readdir_getvp"); 166 return (NFS4ERR_MOVED); 167 } 168 } 169 170 bzero(&fid, sizeof (fid)); 171 fid.fid_len = MAXFIDSZ; 172 173 /* 174 * If VOP_FID not supported by underlying fs (mntfs, procfs, 175 * etc.), then return attrs for stub instead of VROOT object. 176 * If it fails for any other reason, then return the error. 177 */ 178 if (error = VOP_FID(vp, &fid, NULL)) { 179 if (ismntpt == 0) { 180 VN_RELE(vp); 181 return (error); 182 } 183 184 if (error != ENOSYS && error != ENOTSUP) { 185 VN_RELE(vp); 186 VN_RELE(pre_tvp); 187 return (error); 188 } 189 /* go back to vnode that is "under" mount */ 190 VN_RELE(vp); 191 *vpp = pre_tvp; 192 return (0); 193 } 194 195 newexi = checkexport4(&vp->v_vfsp->vfs_fsid, &fid, vp); 196 if (newexi == NULL) { 197 if (ismntpt == 0) { 198 *vpp = vp; 199 } else { 200 VN_RELE(vp); 201 *vpp = pre_tvp; 202 } 203 return (0); 204 } 205 206 if (ismntpt) 207 VN_RELE(pre_tvp); 208 209 /* Save the exi and present the new one to checkauth4() */ 210 saveexi = cs->exi; 211 cs->exi = newexi; 212 213 /* Get the right cred like lookup does */ 214 scr = cs->cr; 215 cs->cr = crdup(cs->basecr); 216 217 status = call_checkauth4(cs, req); 218 219 crfree(cs->cr); 220 cs->cr = scr; 221 cs->exi = saveexi; 222 223 /* Reset what call_checkauth4() may have set */ 224 *cs->statusp = NFS4_OK; 225 226 if (status != NFS4_OK) { 227 VN_RELE(vp); 228 if (status == NFS4ERR_DELAY) 229 status = NFS4ERR_ACCESS; 230 return (status); 231 } 232 *vpp = vp; 233 *exi = newexi; 234 235 return (0); 236 } 237 238 /* This is the set of pathconf data for vfs */ 239 typedef struct { 240 uint64_t maxfilesize; 241 uint32_t maxlink; 242 uint32_t maxname; 243 } rfs4_pc_encode_t; 244 245 246 static int 247 rfs4_get_pc_encode(vnode_t *vp, rfs4_pc_encode_t *pce, bitmap4 ar, cred_t *cr) 248 { 249 int error; 250 ulong_t pc_val; 251 252 pce->maxfilesize = 0; 253 pce->maxlink = 0; 254 pce->maxname = 0; 255 256 if (ar & FATTR4_MAXFILESIZE_MASK) { 257 /* Maximum File Size */ 258 error = VOP_PATHCONF(vp, _PC_FILESIZEBITS, &pc_val, cr, NULL); 259 if (error) 260 return (error); 261 262 /* 263 * If the underlying file system does not support 264 * _PC_FILESIZEBITS, return a reasonable default. Note that 265 * error code on VOP_PATHCONF will be 0, even if the underlying 266 * file system does not support _PC_FILESIZEBITS. 267 */ 268 if (pc_val == (ulong_t)-1) { 269 pce->maxfilesize = MAXOFF32_T; 270 } else { 271 if (pc_val >= (sizeof (uint64_t) * 8)) 272 pce->maxfilesize = INT64_MAX; 273 else 274 pce->maxfilesize = ((1LL << (pc_val - 1)) - 1); 275 } 276 } 277 278 if (ar & FATTR4_MAXLINK_MASK) { 279 /* Maximum Link Count */ 280 error = VOP_PATHCONF(vp, _PC_LINK_MAX, &pc_val, cr, NULL); 281 if (error) 282 return (error); 283 284 pce->maxlink = pc_val; 285 } 286 287 if (ar & FATTR4_MAXNAME_MASK) { 288 /* Maximum Name Length */ 289 error = VOP_PATHCONF(vp, _PC_NAME_MAX, &pc_val, cr, NULL); 290 if (error) 291 return (error); 292 293 pce->maxname = pc_val; 294 } 295 296 return (0); 297 } 298 299 /* This is the set of statvfs data that is ready for encoding */ 300 typedef struct { 301 uint64_t space_avail; 302 uint64_t space_free; 303 uint64_t space_total; 304 u_longlong_t fa; 305 u_longlong_t ff; 306 u_longlong_t ft; 307 } rfs4_sb_encode_t; 308 309 static int 310 rfs4_get_sb_encode(vfs_t *vfsp, rfs4_sb_encode_t *psbe) 311 { 312 int error; 313 struct statvfs64 sb; 314 315 /* Grab the per filesystem info */ 316 if (error = VFS_STATVFS(vfsp, &sb)) { 317 return (error); 318 } 319 320 /* Calculate space available */ 321 if (sb.f_bavail != (fsblkcnt64_t)-1) { 322 psbe->space_avail = 323 (fattr4_space_avail) sb.f_frsize * 324 (fattr4_space_avail) sb.f_bavail; 325 } else { 326 psbe->space_avail = 327 (fattr4_space_avail) sb.f_bavail; 328 } 329 330 /* Calculate space free */ 331 if (sb.f_bfree != (fsblkcnt64_t)-1) { 332 psbe->space_free = 333 (fattr4_space_free) sb.f_frsize * 334 (fattr4_space_free) sb.f_bfree; 335 } else { 336 psbe->space_free = 337 (fattr4_space_free) sb.f_bfree; 338 } 339 340 /* Calculate space total */ 341 if (sb.f_blocks != (fsblkcnt64_t)-1) { 342 psbe->space_total = 343 (fattr4_space_total) sb.f_frsize * 344 (fattr4_space_total) sb.f_blocks; 345 } else { 346 psbe->space_total = 347 (fattr4_space_total) sb.f_blocks; 348 } 349 350 /* For use later on attr encode */ 351 psbe->fa = sb.f_favail; 352 psbe->ff = sb.f_ffree; 353 psbe->ft = sb.f_files; 354 355 return (0); 356 } 357 358 /* 359 * Macros to handle if we have don't have enough space for the requested 360 * attributes and this is the first entry and the 361 * requested attributes are more than the minimal useful 362 * set, reset the attributes to the minimal set and 363 * retry the encoding. If the client has asked for both 364 * mounted_on_fileid and fileid, prefer mounted_on_fileid. 365 */ 366 #define MINIMAL_RD_ATTRS \ 367 (FATTR4_MOUNTED_ON_FILEID_MASK| \ 368 FATTR4_FILEID_MASK| \ 369 FATTR4_RDATTR_ERROR_MASK) 370 371 #define MINIMIZE_ATTR_MASK(m) { \ 372 if ((m) & FATTR4_MOUNTED_ON_FILEID_MASK) \ 373 (m) &= FATTR4_RDATTR_ERROR_MASK|FATTR4_MOUNTED_ON_FILEID_MASK;\ 374 else \ 375 (m) &= FATTR4_RDATTR_ERROR_MASK|FATTR4_FILEID_MASK; \ 376 } 377 378 #define IS_MIN_ATTR_MASK(m) (((m) & ~MINIMAL_RD_ATTRS) == 0) 379 /* 380 * If readdir only needs to return FILEID, we can take it from the 381 * dirent struct and save doing the lookup. 382 */ 383 /* ARGSUSED */ 384 void 385 rfs4_op_readdir(nfs_argop4 *argop, nfs_resop4 *resop, 386 struct svc_req *req, struct compound_state *cs) 387 { 388 READDIR4args *args = &argop->nfs_argop4_u.opreaddir; 389 READDIR4res *resp = &resop->nfs_resop4_u.opreaddir; 390 struct exportinfo *newexi = NULL; 391 int error; 392 mblk_t *mp; 393 uint_t mpcount; 394 int alloc_err = 0; 395 vnode_t *dvp = cs->vp; 396 vnode_t *vp; 397 vattr_t va; 398 struct dirent64 *dp; 399 rfs4_sb_encode_t dsbe, sbe; 400 int vfs_different; 401 int rddir_data_len, rddir_result_size; 402 caddr_t rddir_data; 403 offset_t rddir_next_offset; 404 int dircount; 405 int no_space; 406 int iseofdir; 407 uint_t eof; 408 struct iovec iov; 409 struct uio uio; 410 int tsize; 411 int check_visible; 412 int expseudo = 0; 413 414 uint32_t *ptr, *ptr_redzone; 415 uint32_t *beginning_ptr; 416 uint32_t *lastentry_ptr; 417 uint32_t *attrmask_ptr; 418 uint32_t *attr_offset_ptr; 419 uint32_t attr_length; 420 uint32_t rndup; 421 uint32_t namelen; 422 uint32_t rddirattr_error = 0; 423 int nents; 424 bitmap4 ar = args->attr_request & NFS4_SRV_RDDIR_SUPPORTED_ATTRS; 425 bitmap4 ae; 426 rfs4_pc_encode_t dpce, pce; 427 ulong_t pc_val; 428 uint64_t maxread; 429 uint64_t maxwrite; 430 uint_t true = TRUE; 431 uint_t false = FALSE; 432 uid_t lastuid; 433 gid_t lastgid; 434 int lu_set, lg_set; 435 utf8string owner, group; 436 int owner_error, group_error; 437 struct sockaddr *ca; 438 char *name = NULL; 439 440 DTRACE_NFSV4_2(op__readdir__start, struct compound_state *, cs, 441 READDIR4args *, args); 442 443 lu_set = lg_set = 0; 444 owner.utf8string_len = group.utf8string_len = 0; 445 owner.utf8string_val = group.utf8string_val = NULL; 446 447 resp->mblk = NULL; 448 449 /* Maximum read and write size */ 450 maxread = maxwrite = rfs4_tsize(req); 451 452 if (dvp == NULL) { 453 *cs->statusp = resp->status = NFS4ERR_NOFILEHANDLE; 454 goto out; 455 } 456 457 /* 458 * If there is an unshared filesystem mounted on this vnode, 459 * do not allow readdir in this directory. 460 */ 461 if (vn_ismntpt(dvp)) { 462 *cs->statusp = resp->status = NFS4ERR_ACCESS; 463 goto out; 464 } 465 466 if (dvp->v_type != VDIR) { 467 *cs->statusp = resp->status = NFS4ERR_NOTDIR; 468 goto out; 469 } 470 471 if (args->maxcount <= RFS4_MINLEN_RDDIR4) { 472 *cs->statusp = resp->status = NFS4ERR_TOOSMALL; 473 goto out; 474 } 475 476 /* 477 * If write-only attrs are requested, then fail the readdir op 478 */ 479 if (args->attr_request & 480 (FATTR4_TIME_MODIFY_SET_MASK | FATTR4_TIME_ACCESS_SET_MASK)) { 481 *cs->statusp = resp->status = NFS4ERR_INVAL; 482 goto out; 483 } 484 485 error = VOP_ACCESS(dvp, VREAD, 0, cs->cr, NULL); 486 if (error) { 487 *cs->statusp = resp->status = puterrno4(error); 488 goto out; 489 } 490 491 if (args->cookieverf != Readdir4verf) { 492 *cs->statusp = resp->status = NFS4ERR_NOT_SAME; 493 goto out; 494 } 495 496 /* Is there pseudo-fs work that is needed for this readdir? */ 497 check_visible = PSEUDO(cs->exi) || 498 ! is_exported_sec(cs->nfsflavor, cs->exi) || 499 cs->access & CS_ACCESS_LIMITED; 500 501 /* Check the requested attributes and only do the work if needed */ 502 503 if (ar & (FATTR4_MAXFILESIZE_MASK | 504 FATTR4_MAXLINK_MASK | 505 FATTR4_MAXNAME_MASK)) { 506 if (error = rfs4_get_pc_encode(cs->vp, &dpce, ar, cs->cr)) { 507 *cs->statusp = resp->status = puterrno4(error); 508 goto out; 509 } 510 pce = dpce; 511 } 512 513 /* If there is statvfs data requested, pick it up once */ 514 if (ar & 515 (FATTR4_FILES_AVAIL_MASK | 516 FATTR4_FILES_FREE_MASK | 517 FATTR4_FILES_TOTAL_MASK | 518 FATTR4_FILES_AVAIL_MASK | 519 FATTR4_FILES_FREE_MASK | 520 FATTR4_FILES_TOTAL_MASK)) { 521 if (error = rfs4_get_sb_encode(dvp->v_vfsp, &dsbe)) { 522 *cs->statusp = resp->status = puterrno4(error); 523 goto out; 524 } 525 sbe = dsbe; 526 } 527 528 /* 529 * Max transfer size of the server is the absolute limite. 530 * If the client has decided to max out with something really 531 * tiny, then return toosmall. Otherwise, move forward and 532 * see if a single entry can be encoded. 533 */ 534 tsize = rfs4_tsize(req); 535 if (args->maxcount > tsize) 536 args->maxcount = tsize; 537 else if (args->maxcount < RFS4_MINLEN_RDDIR_BUF) { 538 if (args->maxcount < RFS4_MINLEN_ENTRY4) { 539 *cs->statusp = resp->status = NFS4ERR_TOOSMALL; 540 goto out; 541 } 542 } 543 544 /* 545 * How large should the mblk be for outgoing encoding. 546 */ 547 if (args->maxcount < MAXBSIZE) 548 mpcount = MAXBSIZE; 549 else 550 mpcount = args->maxcount; 551 552 /* 553 * mp will contain the data to be sent out in the readdir reply. 554 * It will be freed after the reply has been sent. 555 * Let's roundup the data to a BYTES_PER_XDR_UNIX multiple, 556 * so that the call to xdrmblk_putmblk() never fails. 557 */ 558 mp = allocb(RNDUP(mpcount), BPRI_MED); 559 560 if (mp == NULL) { 561 /* 562 * The allocation of the client's requested size has 563 * failed. It may be that the size is too large for 564 * current system utilization; step down to a "common" 565 * size and wait for the allocation to occur. 566 */ 567 if (mpcount > MAXBSIZE) 568 args->maxcount = mpcount = MAXBSIZE; 569 mp = allocb_wait(RNDUP(mpcount), BPRI_MED, 570 STR_NOSIG, &alloc_err); 571 } 572 573 ASSERT(mp != NULL); 574 ASSERT(alloc_err == 0); 575 576 resp->mblk = mp; 577 578 ptr = beginning_ptr = (uint32_t *)mp->b_datap->db_base; 579 580 /* 581 * The "redzone" at the end of the encoding buffer is used 582 * to deal with xdr encoding length. Instead of checking 583 * each encoding of an attribute value before it is done, 584 * make the assumption that it will fit into the buffer and 585 * check occasionally. 586 * 587 * The largest block of attributes that are encoded without 588 * checking the redzone is 18 * BYTES_PER_XDR_UNIT (72 bytes) 589 * "round" to 128 as the redzone size. 590 */ 591 if (args->maxcount < (mpcount - 128)) 592 ptr_redzone = 593 (uint32_t *)(((char *)ptr) + RNDUP(args->maxcount)); 594 else 595 ptr_redzone = 596 (uint32_t *)((((char *)ptr) + RNDUP(mpcount)) - 128); 597 598 /* 599 * Set the dircount; this will be used as the size for the 600 * readdir of the underlying filesystem. First make sure 601 * that it is large enough to do a reasonable readdir (client 602 * may have short changed us - it is an advisory number); 603 * then make sure that it isn't too large. 604 * After all of that, if maxcount is "small" then just use 605 * that for the dircount number. 606 */ 607 dircount = (args->dircount < MAXBSIZE) ? MAXBSIZE : args->dircount; 608 dircount = (dircount > tsize) ? tsize : dircount; 609 if (dircount > args->maxcount) 610 dircount = args->maxcount; 611 if (args->maxcount <= MAXBSIZE) { 612 if (args->maxcount < RFS4_MINLEN_RDDIR_BUF) 613 dircount = RFS4_MINLEN_RDDIR_BUF; 614 else 615 dircount = args->maxcount; 616 } 617 618 /* number of entries fully encoded in outgoing buffer */ 619 nents = 0; 620 621 /* ENCODE READDIR4res.cookieverf */ 622 IXDR_PUT_HYPER(ptr, Readdir4verf); 623 624 rddir_data_len = dircount; 625 rddir_data = kmem_alloc(rddir_data_len, KM_NOSLEEP); 626 if (rddir_data == NULL) { 627 /* The allocation failed; downsize and wait for it this time */ 628 if (rddir_data_len > MAXBSIZE) 629 rddir_data_len = dircount = MAXBSIZE; 630 rddir_data = kmem_alloc(rddir_data_len, KM_SLEEP); 631 } 632 633 rddir_next_offset = (offset_t)args->cookie; 634 635 ca = (struct sockaddr *)svc_getrpccaller(req->rq_xprt)->buf; 636 637 readagain: 638 639 no_space = FALSE; 640 iseofdir = FALSE; 641 642 vp = NULL; 643 644 /* Move on to reading the directory contents */ 645 iov.iov_base = rddir_data; 646 iov.iov_len = rddir_data_len; 647 uio.uio_iov = &iov; 648 uio.uio_iovcnt = 1; 649 uio.uio_segflg = UIO_SYSSPACE; 650 uio.uio_extflg = UIO_COPY_CACHED; 651 uio.uio_loffset = rddir_next_offset; 652 uio.uio_resid = rddir_data_len; 653 654 (void) VOP_RWLOCK(dvp, V_WRITELOCK_FALSE, NULL); 655 656 error = VOP_READDIR(dvp, &uio, cs->cr, &iseofdir, NULL, 0); 657 658 VOP_RWUNLOCK(dvp, V_WRITELOCK_FALSE, NULL); 659 660 if (error) { 661 kmem_free((caddr_t)rddir_data, rddir_data_len); 662 freeb(resp->mblk); 663 resp->mblk = NULL; 664 resp->data_len = 0; 665 *cs->statusp = resp->status = puterrno4(error); 666 goto out; 667 } 668 669 670 rddir_result_size = rddir_data_len - uio.uio_resid; 671 672 /* No data were read. Check if we reached the end of the directory. */ 673 if (rddir_result_size == 0) { 674 /* encode the BOOLEAN marking no further entries */ 675 IXDR_PUT_U_INT32(ptr, false); 676 /* encode the BOOLEAN signifying end of directory */ 677 IXDR_PUT_U_INT32(ptr, iseofdir ? true : false); 678 resp->data_len = (char *)ptr - (char *)beginning_ptr; 679 resp->mblk->b_wptr += resp->data_len; 680 kmem_free((caddr_t)rddir_data, rddir_data_len); 681 *cs->statusp = resp->status = NFS4_OK; 682 goto out; 683 } 684 685 lastentry_ptr = ptr; 686 no_space = 0; 687 for (dp = (struct dirent64 *)rddir_data; 688 !no_space && rddir_result_size > 0; dp = nextdp(dp)) { 689 690 /* reset expseudo */ 691 expseudo = 0; 692 693 if (vp) { 694 VN_RELE(vp); 695 vp = NULL; 696 } 697 698 if (newexi) 699 newexi = NULL; 700 701 rddir_result_size -= dp->d_reclen; 702 703 /* skip "." and ".." entries */ 704 if (dp->d_ino == 0 || NFS_IS_DOTNAME(dp->d_name)) { 705 rddir_next_offset = dp->d_off; 706 continue; 707 } 708 709 if (check_visible && 710 !nfs_visible_inode(cs->exi, dp->d_ino, &expseudo)) { 711 rddir_next_offset = dp->d_off; 712 continue; 713 } 714 715 /* 716 * Only if the client requested attributes... 717 * If the VOP_LOOKUP fails ENOENT, then skip this entry 718 * for the readdir response. If there was another error, 719 * then set the rddirattr_error and the error will be 720 * encoded later in the "attributes" section. 721 */ 722 ae = ar; 723 if (ar == 0) 724 goto reencode_attrs; 725 726 error = nfs4_readdir_getvp(dvp, dp->d_name, 727 &vp, &newexi, req, cs, expseudo); 728 if (error == ENOENT) { 729 rddir_next_offset = dp->d_off; 730 continue; 731 } 732 733 rddirattr_error = error; 734 735 /* 736 * The vp obtained from above may be from a 737 * different filesystem mount and the vfs-like 738 * attributes should be obtained from that 739 * different vfs; only do this if appropriate. 740 */ 741 if (vp && 742 (vfs_different = (dvp->v_vfsp != vp->v_vfsp))) { 743 if (ar & (FATTR4_FILES_AVAIL_MASK | 744 FATTR4_FILES_FREE_MASK | 745 FATTR4_FILES_TOTAL_MASK | 746 FATTR4_FILES_AVAIL_MASK | 747 FATTR4_FILES_FREE_MASK | 748 FATTR4_FILES_TOTAL_MASK)) { 749 if (error = 750 rfs4_get_sb_encode(dvp->v_vfsp, 751 &sbe)) { 752 /* Remove attrs from encode */ 753 ae &= ~(FATTR4_FILES_AVAIL_MASK | 754 FATTR4_FILES_FREE_MASK | 755 FATTR4_FILES_TOTAL_MASK | 756 FATTR4_FILES_AVAIL_MASK | 757 FATTR4_FILES_FREE_MASK | 758 FATTR4_FILES_TOTAL_MASK); 759 rddirattr_error = error; 760 } 761 } 762 if (ar & (FATTR4_MAXFILESIZE_MASK | 763 FATTR4_MAXLINK_MASK | 764 FATTR4_MAXNAME_MASK)) { 765 if (error = rfs4_get_pc_encode(cs->vp, 766 &pce, ar, cs->cr)) { 767 ar &= ~(FATTR4_MAXFILESIZE_MASK | 768 FATTR4_MAXLINK_MASK | 769 FATTR4_MAXNAME_MASK); 770 rddirattr_error = error; 771 } 772 } 773 } 774 775 reencode_attrs: 776 /* encode the BOOLEAN for the existence of the next entry */ 777 IXDR_PUT_U_INT32(ptr, true); 778 /* encode the COOKIE for the entry */ 779 IXDR_PUT_U_HYPER(ptr, dp->d_off); 780 781 name = nfscmd_convname(ca, cs->exi, dp->d_name, 782 NFSCMD_CONV_OUTBOUND, MAXPATHLEN + 1); 783 784 if (name == NULL) { 785 rddir_next_offset = dp->d_off; 786 continue; 787 } 788 /* Calculate the dirent name length */ 789 namelen = strlen(name); 790 791 rndup = RNDUP(namelen) / BYTES_PER_XDR_UNIT; 792 793 /* room for LENGTH + string ? */ 794 if ((ptr + (1 + rndup)) > ptr_redzone) { 795 no_space = TRUE; 796 continue; 797 } 798 799 /* encode the LENGTH of the name */ 800 IXDR_PUT_U_INT32(ptr, namelen); 801 /* encode the RNDUP FILL first */ 802 ptr[rndup - 1] = 0; 803 /* encode the NAME of the entry */ 804 bcopy(name, (char *)ptr, namelen); 805 /* now bump the ptr after... */ 806 ptr += rndup; 807 808 if (name != dp->d_name) 809 kmem_free(name, MAXPATHLEN + 1); 810 811 /* 812 * Keep checking on the dircount to see if we have 813 * reached the limit; from the RFC, dircount is to be 814 * the XDR encoded limit of the cookie plus name. 815 * So the count is the name, XDR_UNIT of length for 816 * that name and 2 * XDR_UNIT bytes of cookie; 817 * However, use the regular DIRENT64 to match most 818 * client's APIs. 819 */ 820 dircount -= DIRENT64_RECLEN(namelen); 821 if (nents != 0 && dircount < 0) { 822 no_space = TRUE; 823 continue; 824 } 825 826 /* 827 * Attributes requested? 828 * Gather up the attribute info and the previous VOP_LOOKUP() 829 * succeeded; if an error occurs on the VOP_GETATTR() then 830 * return just the error (again if it is requested). 831 * Note that the previous VOP_LOOKUP() could have failed 832 * itself which leaves this code without anything for 833 * a VOP_GETATTR(). 834 * Also note that the readdir_attr_error is left in the 835 * encoding mask if requested and so is the mounted_on_fileid. 836 */ 837 if (ae != 0) { 838 if (!vp) { 839 ae = ar & (FATTR4_RDATTR_ERROR_MASK | 840 FATTR4_MOUNTED_ON_FILEID_MASK); 841 } else { 842 va.va_mask = AT_ALL; 843 rddirattr_error = 844 VOP_GETATTR(vp, &va, 0, cs->cr, NULL); 845 if (rddirattr_error) { 846 ae = ar & (FATTR4_RDATTR_ERROR_MASK | 847 FATTR4_MOUNTED_ON_FILEID_MASK); 848 } else { 849 /* 850 * We may lie about the object 851 * type for a referral 852 */ 853 if (vn_is_nfs_reparse(vp, cs->cr) && 854 client_is_downrev(req)) 855 va.va_type = VLNK; 856 } 857 } 858 } 859 860 /* START OF ATTRIBUTE ENCODING */ 861 862 /* encode the LENGTH of the BITMAP4 array */ 863 IXDR_PUT_U_INT32(ptr, 2); 864 /* encode the BITMAP4 */ 865 attrmask_ptr = ptr; 866 IXDR_PUT_HYPER(ptr, ae); 867 attr_offset_ptr = ptr; 868 /* encode the default LENGTH of the attributes for entry */ 869 IXDR_PUT_U_INT32(ptr, 0); 870 871 if (ptr > ptr_redzone) { 872 no_space = TRUE; 873 continue; 874 } 875 876 /* Check if any of the first 32 attributes are being encoded */ 877 if (ae & 0xffffffff00000000) { 878 /* 879 * Redzone check is done at the end of this section. 880 * This particular section will encode a maximum of 881 * 18 * BYTES_PER_XDR_UNIT of data 882 */ 883 if (ae & 884 (FATTR4_SUPPORTED_ATTRS_MASK | 885 FATTR4_TYPE_MASK | 886 FATTR4_FH_EXPIRE_TYPE_MASK | 887 FATTR4_CHANGE_MASK | 888 FATTR4_SIZE_MASK | 889 FATTR4_LINK_SUPPORT_MASK | 890 FATTR4_SYMLINK_SUPPORT_MASK | 891 FATTR4_NAMED_ATTR_MASK | 892 FATTR4_FSID_MASK | 893 FATTR4_UNIQUE_HANDLES_MASK | 894 FATTR4_LEASE_TIME_MASK | 895 FATTR4_RDATTR_ERROR_MASK)) { 896 897 if (ae & FATTR4_SUPPORTED_ATTRS_MASK) { 898 IXDR_PUT_INT32(ptr, 2); 899 IXDR_PUT_HYPER(ptr, 900 rfs4_supported_attrs); 901 } 902 if (ae & FATTR4_TYPE_MASK) { 903 uint_t ftype = vt_to_nf4[va.va_type]; 904 if (dvp->v_flag & V_XATTRDIR) { 905 if (va.va_type == VDIR) 906 ftype = NF4ATTRDIR; 907 else 908 ftype = NF4NAMEDATTR; 909 } 910 IXDR_PUT_U_INT32(ptr, ftype); 911 } 912 if (ae & FATTR4_FH_EXPIRE_TYPE_MASK) { 913 uint_t expire_type = FH4_PERSISTENT; 914 IXDR_PUT_U_INT32(ptr, expire_type); 915 } 916 if (ae & FATTR4_CHANGE_MASK) { 917 u_longlong_t change; 918 NFS4_SET_FATTR4_CHANGE(change, 919 va.va_ctime); 920 IXDR_PUT_HYPER(ptr, change); 921 } 922 if (ae & FATTR4_SIZE_MASK) { 923 u_longlong_t size = va.va_size; 924 IXDR_PUT_HYPER(ptr, size); 925 } 926 if (ae & FATTR4_LINK_SUPPORT_MASK) { 927 IXDR_PUT_U_INT32(ptr, true); 928 } 929 if (ae & FATTR4_SYMLINK_SUPPORT_MASK) { 930 IXDR_PUT_U_INT32(ptr, true); 931 } 932 if (ae & FATTR4_NAMED_ATTR_MASK) { 933 uint_t isit; 934 pc_val = FALSE; 935 int sattr_error; 936 937 if (!(vp->v_vfsp->vfs_flag & 938 VFS_XATTR)) { 939 isit = FALSE; 940 } else { 941 sattr_error = VOP_PATHCONF(vp, 942 _PC_SATTR_EXISTS, 943 &pc_val, cs->cr, NULL); 944 if (sattr_error || pc_val == 0) 945 (void) VOP_PATHCONF(vp, 946 _PC_XATTR_EXISTS, 947 &pc_val, 948 cs->cr, NULL); 949 } 950 isit = (pc_val ? TRUE : FALSE); 951 IXDR_PUT_U_INT32(ptr, isit); 952 } 953 if (ae & FATTR4_FSID_MASK) { 954 u_longlong_t major, minor; 955 struct exportinfo *exi; 956 957 exi = newexi ? newexi : cs->exi; 958 if (exi->exi_volatile_dev) { 959 int *pmaj = (int *)&major; 960 961 pmaj[0] = exi->exi_fsid.val[0]; 962 pmaj[1] = exi->exi_fsid.val[1]; 963 minor = 0; 964 } else { 965 major = getmajor(va.va_fsid); 966 minor = getminor(va.va_fsid); 967 } 968 IXDR_PUT_HYPER(ptr, major); 969 IXDR_PUT_HYPER(ptr, minor); 970 } 971 if (ae & FATTR4_UNIQUE_HANDLES_MASK) { 972 IXDR_PUT_U_INT32(ptr, false); 973 } 974 if (ae & FATTR4_LEASE_TIME_MASK) { 975 uint_t lt = rfs4_lease_time; 976 IXDR_PUT_U_INT32(ptr, lt); 977 } 978 if (ae & FATTR4_RDATTR_ERROR_MASK) { 979 rddirattr_error = 980 (rddirattr_error == 0 ? 981 0 : puterrno4(rddirattr_error)); 982 IXDR_PUT_U_INT32(ptr, rddirattr_error); 983 } 984 985 /* Check the redzone boundary */ 986 if (ptr > ptr_redzone) { 987 if (nents || IS_MIN_ATTR_MASK(ar)) { 988 no_space = TRUE; 989 continue; 990 } 991 MINIMIZE_ATTR_MASK(ar); 992 ae = ar; 993 ptr = lastentry_ptr; 994 goto reencode_attrs; 995 } 996 } 997 /* 998 * Redzone check is done at the end of this section. 999 * This particular section will encode a maximum of 1000 * 4 * BYTES_PER_XDR_UNIT of data. 1001 * NOTE: that if ACLs are supported that the 1002 * redzone calculations will need to change. 1003 */ 1004 if (ae & 1005 (FATTR4_ACL_MASK | 1006 FATTR4_ACLSUPPORT_MASK | 1007 FATTR4_ARCHIVE_MASK | 1008 FATTR4_CANSETTIME_MASK | 1009 FATTR4_CASE_INSENSITIVE_MASK | 1010 FATTR4_CASE_PRESERVING_MASK | 1011 FATTR4_CHOWN_RESTRICTED_MASK)) { 1012 1013 if (ae & FATTR4_ACL_MASK) { 1014 ASSERT(0); 1015 } 1016 if (ae & FATTR4_ACLSUPPORT_MASK) { 1017 ASSERT(0); 1018 } 1019 if (ae & FATTR4_ARCHIVE_MASK) { 1020 ASSERT(0); 1021 } 1022 if (ae & FATTR4_CANSETTIME_MASK) { 1023 IXDR_PUT_U_INT32(ptr, true); 1024 } 1025 if (ae & FATTR4_CASE_INSENSITIVE_MASK) { 1026 IXDR_PUT_U_INT32(ptr, false); 1027 } 1028 if (ae & FATTR4_CASE_PRESERVING_MASK) { 1029 IXDR_PUT_U_INT32(ptr, true); 1030 } 1031 if (ae & FATTR4_CHOWN_RESTRICTED_MASK) { 1032 uint_t isit; 1033 pc_val = FALSE; 1034 (void) VOP_PATHCONF(vp, 1035 _PC_CHOWN_RESTRICTED, 1036 &pc_val, cs->cr, NULL); 1037 isit = (pc_val ? TRUE : FALSE); 1038 IXDR_PUT_U_INT32(ptr, isit); 1039 } 1040 /* Check the redzone boundary */ 1041 if (ptr > ptr_redzone) { 1042 if (nents || IS_MIN_ATTR_MASK(ar)) { 1043 no_space = TRUE; 1044 continue; 1045 } 1046 MINIMIZE_ATTR_MASK(ar); 1047 ae = ar; 1048 ptr = lastentry_ptr; 1049 goto reencode_attrs; 1050 } 1051 } 1052 /* 1053 * Redzone check is done before the filehandle 1054 * is encoded. 1055 */ 1056 if (ae & 1057 (FATTR4_FILEHANDLE_MASK | 1058 FATTR4_FILEID_MASK)) { 1059 1060 if (ae & FATTR4_FILEHANDLE_MASK) { 1061 struct { 1062 uint_t len; 1063 char *val; 1064 char fh[NFS_FH4_LEN]; 1065 } fh; 1066 fh.len = 0; 1067 fh.val = fh.fh; 1068 (void) makefh4((nfs_fh4 *)&fh, vp, 1069 (newexi ? newexi : cs->exi)); 1070 1071 if (dvp->v_flag & V_XATTRDIR) 1072 set_fh4_flag((nfs_fh4 *)&fh, 1073 FH4_NAMEDATTR); 1074 1075 if (!xdr_inline_encode_nfs_fh4( 1076 &ptr, ptr_redzone, 1077 (nfs_fh4_fmt_t *)fh.val)) { 1078 if (nents || 1079 IS_MIN_ATTR_MASK(ar)) { 1080 no_space = TRUE; 1081 continue; 1082 } 1083 MINIMIZE_ATTR_MASK(ar); 1084 ae = ar; 1085 ptr = lastentry_ptr; 1086 goto reencode_attrs; 1087 } 1088 } 1089 if (ae & FATTR4_FILEID_MASK) { 1090 IXDR_PUT_HYPER(ptr, va.va_nodeid); 1091 } 1092 /* Check the redzone boundary */ 1093 if (ptr > ptr_redzone) { 1094 if (nents || IS_MIN_ATTR_MASK(ar)) { 1095 no_space = TRUE; 1096 continue; 1097 } 1098 MINIMIZE_ATTR_MASK(ar); 1099 ae = ar; 1100 ptr = lastentry_ptr; 1101 goto reencode_attrs; 1102 } 1103 } 1104 /* 1105 * Redzone check is done at the end of this section. 1106 * This particular section will encode a maximum of 1107 * 15 * BYTES_PER_XDR_UNIT of data. 1108 */ 1109 if (ae & 1110 (FATTR4_FILES_AVAIL_MASK | 1111 FATTR4_FILES_FREE_MASK | 1112 FATTR4_FILES_TOTAL_MASK | 1113 FATTR4_FS_LOCATIONS_MASK | 1114 FATTR4_HIDDEN_MASK | 1115 FATTR4_HOMOGENEOUS_MASK | 1116 FATTR4_MAXFILESIZE_MASK | 1117 FATTR4_MAXLINK_MASK | 1118 FATTR4_MAXNAME_MASK | 1119 FATTR4_MAXREAD_MASK | 1120 FATTR4_MAXWRITE_MASK)) { 1121 1122 if (ae & FATTR4_FILES_AVAIL_MASK) { 1123 IXDR_PUT_HYPER(ptr, sbe.fa); 1124 } 1125 if (ae & FATTR4_FILES_FREE_MASK) { 1126 IXDR_PUT_HYPER(ptr, sbe.ff); 1127 } 1128 if (ae & FATTR4_FILES_TOTAL_MASK) { 1129 IXDR_PUT_HYPER(ptr, sbe.ft); 1130 } 1131 if (ae & FATTR4_FS_LOCATIONS_MASK) { 1132 ASSERT(0); 1133 } 1134 if (ae & FATTR4_HIDDEN_MASK) { 1135 ASSERT(0); 1136 } 1137 if (ae & FATTR4_HOMOGENEOUS_MASK) { 1138 IXDR_PUT_U_INT32(ptr, true); 1139 } 1140 if (ae & FATTR4_MAXFILESIZE_MASK) { 1141 IXDR_PUT_HYPER(ptr, pce.maxfilesize); 1142 } 1143 if (ae & FATTR4_MAXLINK_MASK) { 1144 IXDR_PUT_U_INT32(ptr, pce.maxlink); 1145 } 1146 if (ae & FATTR4_MAXNAME_MASK) { 1147 IXDR_PUT_U_INT32(ptr, pce.maxname); 1148 } 1149 if (ae & FATTR4_MAXREAD_MASK) { 1150 IXDR_PUT_HYPER(ptr, maxread); 1151 } 1152 if (ae & FATTR4_MAXWRITE_MASK) { 1153 IXDR_PUT_HYPER(ptr, maxwrite); 1154 } 1155 /* Check the redzone boundary */ 1156 if (ptr > ptr_redzone) { 1157 if (nents || IS_MIN_ATTR_MASK(ar)) { 1158 no_space = TRUE; 1159 continue; 1160 } 1161 MINIMIZE_ATTR_MASK(ar); 1162 ae = ar; 1163 ptr = lastentry_ptr; 1164 goto reencode_attrs; 1165 } 1166 } 1167 } 1168 if (ae & 0x00000000ffffffff) { 1169 /* 1170 * Redzone check is done at the end of this section. 1171 * This particular section will encode a maximum of 1172 * 3 * BYTES_PER_XDR_UNIT of data. 1173 */ 1174 if (ae & 1175 (FATTR4_MIMETYPE_MASK | 1176 FATTR4_MODE_MASK | 1177 FATTR4_NO_TRUNC_MASK | 1178 FATTR4_NUMLINKS_MASK)) { 1179 1180 if (ae & FATTR4_MIMETYPE_MASK) { 1181 ASSERT(0); 1182 } 1183 if (ae & FATTR4_MODE_MASK) { 1184 uint_t m = va.va_mode; 1185 IXDR_PUT_U_INT32(ptr, m); 1186 } 1187 if (ae & FATTR4_NO_TRUNC_MASK) { 1188 IXDR_PUT_U_INT32(ptr, true); 1189 } 1190 if (ae & FATTR4_NUMLINKS_MASK) { 1191 IXDR_PUT_U_INT32(ptr, va.va_nlink); 1192 } 1193 /* Check the redzone boundary */ 1194 if (ptr > ptr_redzone) { 1195 if (nents || IS_MIN_ATTR_MASK(ar)) { 1196 no_space = TRUE; 1197 continue; 1198 } 1199 MINIMIZE_ATTR_MASK(ar); 1200 ae = ar; 1201 ptr = lastentry_ptr; 1202 goto reencode_attrs; 1203 } 1204 } 1205 /* 1206 * Redzone check is done before the encoding of the 1207 * owner string since the length is indeterminate. 1208 */ 1209 if (ae & FATTR4_OWNER_MASK) { 1210 if (!lu_set) { 1211 owner_error = nfs_idmap_uid_str( 1212 va.va_uid, &owner, TRUE); 1213 if (!owner_error) { 1214 lu_set = TRUE; 1215 lastuid = va.va_uid; 1216 } 1217 } else if (va.va_uid != lastuid) { 1218 if (owner.utf8string_len != 0) { 1219 kmem_free(owner.utf8string_val, 1220 owner.utf8string_len); 1221 owner.utf8string_len = 0; 1222 owner.utf8string_val = NULL; 1223 } 1224 owner_error = nfs_idmap_uid_str( 1225 va.va_uid, &owner, TRUE); 1226 if (!owner_error) { 1227 lastuid = va.va_uid; 1228 } else { 1229 lu_set = FALSE; 1230 } 1231 } 1232 if (!owner_error) { 1233 if ((ptr + 1234 (owner.utf8string_len / 1235 BYTES_PER_XDR_UNIT) 1236 + 2) > ptr_redzone) { 1237 if (nents || 1238 IS_MIN_ATTR_MASK(ar)) { 1239 no_space = TRUE; 1240 continue; 1241 } 1242 MINIMIZE_ATTR_MASK(ar); 1243 ae = ar; 1244 ptr = lastentry_ptr; 1245 goto reencode_attrs; 1246 } 1247 /* encode the LENGTH of owner string */ 1248 IXDR_PUT_U_INT32(ptr, 1249 owner.utf8string_len); 1250 /* encode the RNDUP FILL first */ 1251 rndup = RNDUP(owner.utf8string_len) / 1252 BYTES_PER_XDR_UNIT; 1253 ptr[rndup - 1] = 0; 1254 /* encode the OWNER */ 1255 bcopy(owner.utf8string_val, ptr, 1256 owner.utf8string_len); 1257 ptr += rndup; 1258 } 1259 } 1260 /* 1261 * Redzone check is done before the encoding of the 1262 * group string since the length is indeterminate. 1263 */ 1264 if (ae & FATTR4_OWNER_GROUP_MASK) { 1265 if (!lg_set) { 1266 group_error = 1267 nfs_idmap_gid_str(va.va_gid, 1268 &group, TRUE); 1269 if (!group_error) { 1270 lg_set = TRUE; 1271 lastgid = va.va_gid; 1272 } 1273 } else if (va.va_gid != lastgid) { 1274 if (group.utf8string_len != 0) { 1275 kmem_free( 1276 group.utf8string_val, 1277 group.utf8string_len); 1278 group.utf8string_len = 0; 1279 group.utf8string_val = NULL; 1280 } 1281 group_error = 1282 nfs_idmap_gid_str(va.va_gid, 1283 &group, TRUE); 1284 if (!group_error) 1285 lastgid = va.va_gid; 1286 else 1287 lg_set = FALSE; 1288 } 1289 if (!group_error) { 1290 if ((ptr + 1291 (group.utf8string_len / 1292 BYTES_PER_XDR_UNIT) 1293 + 2) > ptr_redzone) { 1294 if (nents || 1295 IS_MIN_ATTR_MASK(ar)) { 1296 no_space = TRUE; 1297 continue; 1298 } 1299 MINIMIZE_ATTR_MASK(ar); 1300 ae = ar; 1301 ptr = lastentry_ptr; 1302 goto reencode_attrs; 1303 } 1304 /* encode the LENGTH of owner string */ 1305 IXDR_PUT_U_INT32(ptr, 1306 group.utf8string_len); 1307 /* encode the RNDUP FILL first */ 1308 rndup = RNDUP(group.utf8string_len) / 1309 BYTES_PER_XDR_UNIT; 1310 ptr[rndup - 1] = 0; 1311 /* encode the OWNER */ 1312 bcopy(group.utf8string_val, ptr, 1313 group.utf8string_len); 1314 ptr += rndup; 1315 } 1316 } 1317 if (ae & 1318 (FATTR4_QUOTA_AVAIL_HARD_MASK | 1319 FATTR4_QUOTA_AVAIL_SOFT_MASK | 1320 FATTR4_QUOTA_USED_MASK)) { 1321 if (ae & FATTR4_QUOTA_AVAIL_HARD_MASK) { 1322 ASSERT(0); 1323 } 1324 if (ae & FATTR4_QUOTA_AVAIL_SOFT_MASK) { 1325 ASSERT(0); 1326 } 1327 if (ae & FATTR4_QUOTA_USED_MASK) { 1328 ASSERT(0); 1329 } 1330 } 1331 /* 1332 * Redzone check is done at the end of this section. 1333 * This particular section will encode a maximum of 1334 * 10 * BYTES_PER_XDR_UNIT of data. 1335 */ 1336 if (ae & 1337 (FATTR4_RAWDEV_MASK | 1338 FATTR4_SPACE_AVAIL_MASK | 1339 FATTR4_SPACE_FREE_MASK | 1340 FATTR4_SPACE_TOTAL_MASK | 1341 FATTR4_SPACE_USED_MASK | 1342 FATTR4_SYSTEM_MASK)) { 1343 1344 if (ae & FATTR4_RAWDEV_MASK) { 1345 fattr4_rawdev rd; 1346 rd.specdata1 = 1347 (uint32)getmajor(va.va_rdev); 1348 rd.specdata2 = 1349 (uint32)getminor(va.va_rdev); 1350 IXDR_PUT_U_INT32(ptr, rd.specdata1); 1351 IXDR_PUT_U_INT32(ptr, rd.specdata2); 1352 } 1353 if (ae & FATTR4_SPACE_AVAIL_MASK) { 1354 IXDR_PUT_HYPER(ptr, sbe.space_avail); 1355 } 1356 if (ae & FATTR4_SPACE_FREE_MASK) { 1357 IXDR_PUT_HYPER(ptr, sbe.space_free); 1358 } 1359 if (ae & FATTR4_SPACE_TOTAL_MASK) { 1360 IXDR_PUT_HYPER(ptr, sbe.space_total); 1361 } 1362 if (ae & FATTR4_SPACE_USED_MASK) { 1363 u_longlong_t su; 1364 su = (fattr4_space_used) DEV_BSIZE * 1365 (fattr4_space_used) va.va_nblocks; 1366 IXDR_PUT_HYPER(ptr, su); 1367 } 1368 if (ae & FATTR4_SYSTEM_MASK) { 1369 ASSERT(0); 1370 } 1371 /* Check the redzone boundary */ 1372 if (ptr > ptr_redzone) { 1373 if (nents || IS_MIN_ATTR_MASK(ar)) { 1374 no_space = TRUE; 1375 continue; 1376 } 1377 MINIMIZE_ATTR_MASK(ar); 1378 ae = ar; 1379 ptr = lastentry_ptr; 1380 goto reencode_attrs; 1381 } 1382 } 1383 /* 1384 * Redzone check is done at the end of this section. 1385 * This particular section will encode a maximum of 1386 * 14 * BYTES_PER_XDR_UNIT of data. 1387 */ 1388 if (ae & 1389 (FATTR4_TIME_ACCESS_MASK | 1390 FATTR4_TIME_ACCESS_SET_MASK | 1391 FATTR4_TIME_BACKUP_MASK | 1392 FATTR4_TIME_CREATE_MASK | 1393 FATTR4_TIME_DELTA_MASK | 1394 FATTR4_TIME_METADATA_MASK | 1395 FATTR4_TIME_MODIFY_MASK | 1396 FATTR4_TIME_MODIFY_SET_MASK | 1397 FATTR4_MOUNTED_ON_FILEID_MASK)) { 1398 1399 if (ae & FATTR4_TIME_ACCESS_MASK) { 1400 u_longlong_t sec = 1401 (u_longlong_t)va.va_atime.tv_sec; 1402 uint_t nsec = 1403 (uint_t)va.va_atime.tv_nsec; 1404 IXDR_PUT_HYPER(ptr, sec); 1405 IXDR_PUT_INT32(ptr, nsec); 1406 } 1407 if (ae & FATTR4_TIME_ACCESS_SET_MASK) { 1408 ASSERT(0); 1409 } 1410 if (ae & FATTR4_TIME_BACKUP_MASK) { 1411 ASSERT(0); 1412 } 1413 if (ae & FATTR4_TIME_CREATE_MASK) { 1414 ASSERT(0); 1415 } 1416 if (ae & FATTR4_TIME_DELTA_MASK) { 1417 u_longlong_t sec = 0; 1418 uint_t nsec = 1000; 1419 IXDR_PUT_HYPER(ptr, sec); 1420 IXDR_PUT_INT32(ptr, nsec); 1421 } 1422 if (ae & FATTR4_TIME_METADATA_MASK) { 1423 u_longlong_t sec = 1424 (u_longlong_t)va.va_ctime.tv_sec; 1425 uint_t nsec = 1426 (uint_t)va.va_ctime.tv_nsec; 1427 IXDR_PUT_HYPER(ptr, sec); 1428 IXDR_PUT_INT32(ptr, nsec); 1429 } 1430 if (ae & FATTR4_TIME_MODIFY_MASK) { 1431 u_longlong_t sec = 1432 (u_longlong_t)va.va_mtime.tv_sec; 1433 uint_t nsec = 1434 (uint_t)va.va_mtime.tv_nsec; 1435 IXDR_PUT_HYPER(ptr, sec); 1436 IXDR_PUT_INT32(ptr, nsec); 1437 } 1438 if (ae & FATTR4_TIME_MODIFY_SET_MASK) { 1439 ASSERT(0); 1440 } 1441 if (ae & FATTR4_MOUNTED_ON_FILEID_MASK) { 1442 IXDR_PUT_HYPER(ptr, dp->d_ino); 1443 } 1444 /* Check the redzone boundary */ 1445 if (ptr > ptr_redzone) { 1446 if (nents || IS_MIN_ATTR_MASK(ar)) { 1447 no_space = TRUE; 1448 continue; 1449 } 1450 MINIMIZE_ATTR_MASK(ar); 1451 ae = ar; 1452 ptr = lastentry_ptr; 1453 goto reencode_attrs; 1454 } 1455 } 1456 } 1457 1458 /* Reset to directory's vfs info when encoding complete */ 1459 if (vfs_different) { 1460 dsbe = sbe; 1461 dpce = pce; 1462 vfs_different = 0; 1463 } 1464 1465 /* "go back" and encode the attributes' length */ 1466 attr_length = 1467 (char *)ptr - 1468 (char *)attr_offset_ptr - 1469 BYTES_PER_XDR_UNIT; 1470 IXDR_PUT_U_INT32(attr_offset_ptr, attr_length); 1471 1472 /* 1473 * If there was trouble obtaining a mapping for either 1474 * the owner or group attributes, then remove them from 1475 * bitmap4 for this entry and reset the bitmap value 1476 * in the data stream. 1477 */ 1478 if (owner_error || group_error) { 1479 if (owner_error) 1480 ae &= ~FATTR4_OWNER_MASK; 1481 if (group_error) 1482 ae &= ~FATTR4_OWNER_GROUP_MASK; 1483 IXDR_PUT_HYPER(attrmask_ptr, ae); 1484 } 1485 1486 /* END OF ATTRIBUTE ENCODING */ 1487 1488 lastentry_ptr = ptr; 1489 nents++; 1490 rddir_next_offset = dp->d_off; 1491 } 1492 1493 /* 1494 * Check for the case that another VOP_READDIR() has to be done. 1495 * - no space encoding error 1496 * - no entry successfully encoded 1497 * - still more directory to read 1498 */ 1499 if (!no_space && nents == 0 && !iseofdir) 1500 goto readagain; 1501 1502 *cs->statusp = resp->status = NFS4_OK; 1503 1504 /* 1505 * If no_space is set then we terminated prematurely, 1506 * rewind to the last entry and this can never be EOF. 1507 */ 1508 if (no_space) { 1509 ptr = lastentry_ptr; 1510 eof = FALSE; /* ended encoded prematurely */ 1511 } else { 1512 eof = (iseofdir ? TRUE : FALSE); 1513 } 1514 1515 /* 1516 * If we have entries, always return them, otherwise only error 1517 * if we ran out of space. 1518 */ 1519 if (nents || !no_space) { 1520 ASSERT(ptr != NULL); 1521 /* encode the BOOLEAN marking no further entries */ 1522 IXDR_PUT_U_INT32(ptr, false); 1523 /* encode the BOOLEAN signifying end of directory */ 1524 IXDR_PUT_U_INT32(ptr, eof); 1525 1526 resp->data_len = (char *)ptr - (char *)beginning_ptr; 1527 resp->mblk->b_wptr += resp->data_len; 1528 } else { 1529 freeb(mp); 1530 resp->mblk = NULL; 1531 resp->data_len = 0; 1532 *cs->statusp = resp->status = NFS4ERR_TOOSMALL; 1533 } 1534 1535 kmem_free((caddr_t)rddir_data, rddir_data_len); 1536 if (vp) 1537 VN_RELE(vp); 1538 if (owner.utf8string_len != 0) 1539 kmem_free(owner.utf8string_val, owner.utf8string_len); 1540 if (group.utf8string_len != 0) 1541 kmem_free(group.utf8string_val, group.utf8string_len); 1542 1543 out: 1544 DTRACE_NFSV4_2(op__readdir__done, struct compound_state *, cs, 1545 READDIR4res *, resp); 1546 }