getnfsargs.c revision 1.7 1 1.7 yamt /* $NetBSD: getnfsargs.c,v 1.7 2006/12/27 12:13:55 yamt Exp $ */
2 1.1 dsl
3 1.1 dsl /*
4 1.1 dsl * Copyright (c) 1992, 1993, 1994
5 1.1 dsl * The Regents of the University of California. All rights reserved.
6 1.1 dsl *
7 1.1 dsl * This code is derived from software contributed to Berkeley by
8 1.1 dsl * Rick Macklem at The University of Guelph.
9 1.1 dsl *
10 1.1 dsl * Redistribution and use in source and binary forms, with or without
11 1.1 dsl * modification, are permitted provided that the following conditions
12 1.1 dsl * are met:
13 1.1 dsl * 1. Redistributions of source code must retain the above copyright
14 1.1 dsl * notice, this list of conditions and the following disclaimer.
15 1.1 dsl * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 dsl * notice, this list of conditions and the following disclaimer in the
17 1.1 dsl * documentation and/or other materials provided with the distribution.
18 1.1 dsl * 3. Neither the name of the University nor the names of its contributors
19 1.1 dsl * may be used to endorse or promote products derived from this software
20 1.1 dsl * without specific prior written permission.
21 1.1 dsl *
22 1.1 dsl * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23 1.1 dsl * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 1.1 dsl * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 1.1 dsl * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 1.1 dsl * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 1.1 dsl * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 1.1 dsl * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 1.1 dsl * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 1.1 dsl * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 1.1 dsl * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 1.1 dsl * SUCH DAMAGE.
33 1.1 dsl */
34 1.1 dsl
35 1.1 dsl #include <sys/cdefs.h>
36 1.1 dsl #ifndef lint
37 1.1 dsl __COPYRIGHT("@(#) Copyright (c) 1992, 1993, 1994\n\
38 1.1 dsl The Regents of the University of California. All rights reserved.\n");
39 1.1 dsl #endif /* not lint */
40 1.1 dsl
41 1.1 dsl #ifndef lint
42 1.1 dsl #if 0
43 1.1 dsl static char sccsid[] = "@(#)mount_nfs.c 8.11 (Berkeley) 5/4/95";
44 1.1 dsl #else
45 1.7 yamt __RCSID("$NetBSD: getnfsargs.c,v 1.7 2006/12/27 12:13:55 yamt Exp $");
46 1.1 dsl #endif
47 1.1 dsl #endif /* not lint */
48 1.1 dsl
49 1.1 dsl #include <sys/param.h>
50 1.1 dsl #include <sys/mount.h>
51 1.1 dsl #include <sys/socket.h>
52 1.1 dsl #include <sys/stat.h>
53 1.1 dsl #include <syslog.h>
54 1.1 dsl
55 1.1 dsl #include <rpc/rpc.h>
56 1.1 dsl #include <rpc/pmap_clnt.h>
57 1.1 dsl #include <rpc/pmap_prot.h>
58 1.1 dsl
59 1.1 dsl #ifdef ISO
60 1.1 dsl #include <netiso/iso.h>
61 1.1 dsl #endif
62 1.1 dsl
63 1.1 dsl
64 1.1 dsl #include <nfs/rpcv2.h>
65 1.1 dsl #include <nfs/nfsproto.h>
66 1.1 dsl #include <nfs/nfs.h>
67 1.1 dsl #include <nfs/nfsmount.h>
68 1.1 dsl
69 1.1 dsl #include <arpa/inet.h>
70 1.1 dsl
71 1.1 dsl #include <ctype.h>
72 1.1 dsl #include <err.h>
73 1.1 dsl #include <errno.h>
74 1.1 dsl #include <fcntl.h>
75 1.1 dsl #include <netdb.h>
76 1.1 dsl #include <signal.h>
77 1.1 dsl #include <stdio.h>
78 1.1 dsl #include <stdlib.h>
79 1.1 dsl #include <string.h>
80 1.1 dsl #include <unistd.h>
81 1.1 dsl #include <util.h>
82 1.1 dsl
83 1.1 dsl #include "mount_nfs.h"
84 1.1 dsl
85 1.1 dsl struct nfhret {
86 1.1 dsl u_long stat;
87 1.1 dsl long vers;
88 1.1 dsl long auth;
89 1.1 dsl long fhsize;
90 1.1 dsl u_char nfh[NFSX_V3FHMAX];
91 1.1 dsl };
92 1.1 dsl
93 1.1 dsl static int xdr_dir(XDR *, char *);
94 1.1 dsl static int xdr_fh(XDR *, struct nfhret *);
95 1.1 dsl
96 1.1 dsl int
97 1.1 dsl getnfsargs(char *spec, struct nfs_args *nfsargsp)
98 1.1 dsl {
99 1.1 dsl CLIENT *clp;
100 1.1 dsl struct addrinfo hints, *ai_nfs, *ai;
101 1.1 dsl int ecode;
102 1.1 dsl char host[NI_MAXHOST], serv[NI_MAXSERV];
103 1.1 dsl static struct netbuf nfs_nb;
104 1.1 dsl static struct sockaddr_storage nfs_ss;
105 1.1 dsl struct netconfig *nconf;
106 1.1 dsl const char *netid;
107 1.1 dsl #ifdef ISO
108 1.1 dsl static struct sockaddr_iso isoaddr;
109 1.1 dsl struct iso_addr *isop;
110 1.1 dsl int isoflag = 0;
111 1.1 dsl #endif
112 1.1 dsl struct timeval pertry, try;
113 1.1 dsl enum clnt_stat clnt_stat;
114 1.5 yamt int i, nfsvers, mntvers;
115 1.5 yamt int retryleft;
116 1.1 dsl char *hostp, *delimp;
117 1.1 dsl static struct nfhret nfhret;
118 1.1 dsl static char nam[MNAMELEN + 1];
119 1.1 dsl
120 1.6 hubertf strlcpy(nam, spec, sizeof(nam));
121 1.1 dsl if ((delimp = strchr(spec, '@')) != NULL) {
122 1.1 dsl hostp = delimp + 1;
123 1.1 dsl } else if ((delimp = strrchr(spec, ':')) != NULL) {
124 1.1 dsl hostp = spec;
125 1.1 dsl spec = delimp + 1;
126 1.1 dsl } else {
127 1.1 dsl warnx("no <host>:<dirpath> or <dirpath>@<host> spec");
128 1.1 dsl return (0);
129 1.1 dsl }
130 1.1 dsl *delimp = '\0';
131 1.1 dsl /*
132 1.1 dsl * DUMB!! Until the mount protocol works on iso transport, we must
133 1.1 dsl * supply both an iso and an inet address for the host.
134 1.1 dsl */
135 1.1 dsl #ifdef ISO
136 1.1 dsl if (!strncmp(hostp, "iso=", 4)) {
137 1.1 dsl u_short isoport;
138 1.1 dsl
139 1.1 dsl hostp += 4;
140 1.1 dsl isoflag++;
141 1.1 dsl if ((delimp = strchr(hostp, '+')) == NULL) {
142 1.1 dsl warnx("no iso+inet address");
143 1.1 dsl return (0);
144 1.1 dsl }
145 1.1 dsl *delimp = '\0';
146 1.1 dsl if ((isop = iso_addr(hostp)) == NULL) {
147 1.1 dsl warnx("bad ISO address");
148 1.1 dsl return (0);
149 1.1 dsl }
150 1.1 dsl memset(&isoaddr, 0, sizeof (isoaddr));
151 1.1 dsl memcpy(&isoaddr.siso_addr, isop, sizeof (struct iso_addr));
152 1.1 dsl isoaddr.siso_len = sizeof (isoaddr);
153 1.1 dsl isoaddr.siso_family = AF_ISO;
154 1.1 dsl isoaddr.siso_tlen = 2;
155 1.1 dsl isoport = htons(NFS_PORT);
156 1.1 dsl memcpy(TSEL(&isoaddr), &isoport, isoaddr.siso_tlen);
157 1.1 dsl hostp = delimp + 1;
158 1.1 dsl }
159 1.1 dsl #endif /* ISO */
160 1.1 dsl
161 1.1 dsl /*
162 1.1 dsl * Handle an internet host address and reverse resolve it if
163 1.1 dsl * doing Kerberos.
164 1.1 dsl */
165 1.1 dsl memset(&hints, 0, sizeof hints);
166 1.1 dsl hints.ai_flags = AI_NUMERICHOST;
167 1.1 dsl hints.ai_socktype = nfsargsp->sotype;
168 1.1 dsl if (getaddrinfo(hostp, "nfs", &hints, &ai_nfs) == 0) {
169 1.1 dsl if ((nfsargsp->flags & NFSMNT_KERB)) {
170 1.1 dsl hints.ai_flags = 0;
171 1.2 lukem if ((ecode = getnameinfo(ai_nfs->ai_addr,
172 1.2 lukem ai_nfs->ai_addrlen, host, sizeof(host),
173 1.2 lukem serv, sizeof serv, 0)) != 0) {
174 1.1 dsl warnx("can't reverse resolve net address for "
175 1.1 dsl "host \"%s\": %s", hostp,
176 1.1 dsl gai_strerror(ecode));
177 1.1 dsl return (0);
178 1.1 dsl }
179 1.1 dsl hostp = host;
180 1.1 dsl }
181 1.1 dsl } else {
182 1.1 dsl hints.ai_flags = 0;
183 1.1 dsl if ((ecode = getaddrinfo(hostp, "nfs", &hints, &ai_nfs)) != 0) {
184 1.1 dsl warnx("can't get net id for host \"%s\": %s", hostp,
185 1.1 dsl gai_strerror(ecode));
186 1.1 dsl return (0);
187 1.1 dsl }
188 1.1 dsl }
189 1.1 dsl
190 1.5 yamt if ((nfsargsp->flags & NFSMNT_NFSV3) != 0) {
191 1.5 yamt nfsvers = NFS_VER3;
192 1.5 yamt mntvers = RPCMNT_VER3;
193 1.5 yamt } else {
194 1.1 dsl nfsvers = NFS_VER2;
195 1.1 dsl mntvers = RPCMNT_VER1;
196 1.1 dsl }
197 1.1 dsl nfhret.stat = EACCES; /* Mark not yet successful */
198 1.1 dsl
199 1.1 dsl for (ai = ai_nfs; ai; ai = ai->ai_next) {
200 1.1 dsl /*
201 1.1 dsl * XXX. Nead a generic (family, type, proto) -> nconf interface.
202 1.1 dsl * __rpc_*2nconf exist, maybe they should be exported.
203 1.1 dsl */
204 1.1 dsl if (nfsargsp->sotype == SOCK_STREAM) {
205 1.1 dsl if (ai->ai_family == AF_INET6)
206 1.1 dsl netid = "tcp6";
207 1.1 dsl else
208 1.1 dsl netid = "tcp";
209 1.1 dsl } else {
210 1.1 dsl if (ai->ai_family == AF_INET6)
211 1.1 dsl netid = "udp6";
212 1.1 dsl else
213 1.1 dsl netid = "udp";
214 1.1 dsl }
215 1.1 dsl
216 1.1 dsl nconf = getnetconfigent(netid);
217 1.1 dsl
218 1.1 dsl tryagain:
219 1.5 yamt retryleft = retrycnt;
220 1.1 dsl
221 1.5 yamt while (retryleft > 0) {
222 1.1 dsl nfs_nb.buf = &nfs_ss;
223 1.1 dsl nfs_nb.maxlen = sizeof nfs_ss;
224 1.1 dsl if (!rpcb_getaddr(RPCPROG_NFS, nfsvers, nconf, &nfs_nb, hostp)){
225 1.1 dsl if (rpc_createerr.cf_stat == RPC_SYSTEMERROR) {
226 1.1 dsl nfhret.stat = rpc_createerr.cf_error.re_errno;
227 1.1 dsl break;
228 1.1 dsl }
229 1.1 dsl if (rpc_createerr.cf_stat == RPC_UNKNOWNPROTO) {
230 1.1 dsl nfhret.stat = EPROTONOSUPPORT;
231 1.1 dsl break;
232 1.1 dsl }
233 1.1 dsl if ((opflags & ISBGRND) == 0)
234 1.1 dsl clnt_pcreateerror(
235 1.1 dsl "mount_nfs: rpcbind to nfs on server");
236 1.1 dsl } else {
237 1.1 dsl pertry.tv_sec = 10;
238 1.1 dsl pertry.tv_usec = 0;
239 1.1 dsl /*
240 1.1 dsl * XXX relies on clnt_tcp_create to bind to a reserved
241 1.1 dsl * socket.
242 1.1 dsl */
243 1.1 dsl clp = clnt_tp_create(hostp, RPCPROG_MNT, mntvers,
244 1.1 dsl mnttcp_ok ? nconf : getnetconfigent("udp"));
245 1.1 dsl if (clp == NULL) {
246 1.1 dsl if ((opflags & ISBGRND) == 0) {
247 1.1 dsl clnt_pcreateerror(
248 1.1 dsl "Cannot MNT RPC (mountd)");
249 1.1 dsl }
250 1.1 dsl } else {
251 1.1 dsl CLNT_CONTROL(clp, CLSET_RETRY_TIMEOUT,
252 1.1 dsl (char *)&pertry);
253 1.1 dsl clp->cl_auth = authsys_create_default();
254 1.1 dsl try.tv_sec = 10;
255 1.1 dsl try.tv_usec = 0;
256 1.1 dsl if (nfsargsp->flags & NFSMNT_KERB)
257 1.1 dsl nfhret.auth = RPCAUTH_KERB4;
258 1.1 dsl else
259 1.1 dsl nfhret.auth = RPCAUTH_UNIX;
260 1.1 dsl nfhret.vers = mntvers;
261 1.1 dsl clnt_stat = clnt_call(clp, RPCMNT_MOUNT,
262 1.1 dsl xdr_dir, spec, xdr_fh, &nfhret, try);
263 1.1 dsl switch (clnt_stat) {
264 1.1 dsl case RPC_PROGVERSMISMATCH:
265 1.1 dsl if (nfsvers == NFS_VER3 && !force3) {
266 1.1 dsl nfsvers = NFS_VER2;
267 1.1 dsl mntvers = RPCMNT_VER1;
268 1.1 dsl nfsargsp->flags &=
269 1.1 dsl ~NFSMNT_NFSV3;
270 1.1 dsl goto tryagain;
271 1.1 dsl } else {
272 1.1 dsl errx(1, "%s", clnt_sperror(clp,
273 1.1 dsl "MNT RPC"));
274 1.1 dsl }
275 1.1 dsl case RPC_SUCCESS:
276 1.1 dsl auth_destroy(clp->cl_auth);
277 1.1 dsl clnt_destroy(clp);
278 1.5 yamt retryleft = 0;
279 1.1 dsl break;
280 1.1 dsl default:
281 1.1 dsl /* XXX should give up on some errors */
282 1.1 dsl if ((opflags & ISBGRND) == 0)
283 1.1 dsl warnx("%s", clnt_sperror(clp,
284 1.1 dsl "bad MNT RPC"));
285 1.1 dsl break;
286 1.1 dsl }
287 1.1 dsl }
288 1.1 dsl }
289 1.5 yamt if (--retryleft > 0) {
290 1.1 dsl if (opflags & BGRND) {
291 1.1 dsl opflags &= ~BGRND;
292 1.1 dsl if ((i = fork()) != 0) {
293 1.1 dsl if (i == -1)
294 1.1 dsl err(1, "nqnfs 2");
295 1.1 dsl exit(0);
296 1.1 dsl }
297 1.1 dsl (void) setsid();
298 1.1 dsl (void) close(STDIN_FILENO);
299 1.1 dsl (void) close(STDOUT_FILENO);
300 1.1 dsl (void) close(STDERR_FILENO);
301 1.1 dsl (void) chdir("/");
302 1.1 dsl opflags |= ISBGRND;
303 1.1 dsl }
304 1.1 dsl sleep(60);
305 1.1 dsl }
306 1.1 dsl }
307 1.1 dsl if (nfhret.stat == 0)
308 1.1 dsl break;
309 1.1 dsl }
310 1.1 dsl freeaddrinfo(ai_nfs);
311 1.1 dsl if (nfhret.stat) {
312 1.1 dsl if (opflags & ISBGRND)
313 1.1 dsl exit(1);
314 1.1 dsl errno = nfhret.stat;
315 1.1 dsl warnx("can't access %s: %s", spec, strerror(nfhret.stat));
316 1.1 dsl return (0);
317 1.1 dsl }
318 1.1 dsl #ifdef ISO
319 1.1 dsl if (isoflag) {
320 1.1 dsl nfsargsp->addr = (struct sockaddr *) &isoaddr;
321 1.1 dsl nfsargsp->addrlen = sizeof (isoaddr);
322 1.1 dsl } else
323 1.1 dsl #endif /* ISO */
324 1.1 dsl {
325 1.1 dsl nfsargsp->addr = (struct sockaddr *) nfs_nb.buf;
326 1.1 dsl nfsargsp->addrlen = nfs_nb.len;
327 1.1 dsl if (port != 0) {
328 1.1 dsl struct sockaddr *sa = nfsargsp->addr;
329 1.1 dsl switch (sa->sa_family) {
330 1.1 dsl case AF_INET:
331 1.1 dsl ((struct sockaddr_in *)sa)->sin_port = port;
332 1.3 dsl break;
333 1.1 dsl #ifdef INET6
334 1.1 dsl case AF_INET6:
335 1.1 dsl ((struct sockaddr_in6 *)sa)->sin6_port = port;
336 1.1 dsl break;
337 1.1 dsl #endif
338 1.1 dsl default:
339 1.1 dsl errx(1, "Unsupported socket family %d",
340 1.1 dsl sa->sa_family);
341 1.1 dsl }
342 1.1 dsl }
343 1.1 dsl }
344 1.1 dsl nfsargsp->fh = nfhret.nfh;
345 1.1 dsl nfsargsp->fhsize = nfhret.fhsize;
346 1.1 dsl nfsargsp->hostname = nam;
347 1.1 dsl return (1);
348 1.1 dsl }
349 1.1 dsl
350 1.1 dsl /*
351 1.1 dsl * xdr routines for mount rpc's
352 1.1 dsl */
353 1.1 dsl static int
354 1.1 dsl xdr_dir(XDR *xdrsp, char *dirp)
355 1.1 dsl {
356 1.1 dsl return (xdr_string(xdrsp, &dirp, RPCMNT_PATHLEN));
357 1.1 dsl }
358 1.1 dsl
359 1.1 dsl static int
360 1.1 dsl xdr_fh(XDR *xdrsp, struct nfhret *np)
361 1.1 dsl {
362 1.1 dsl int i;
363 1.1 dsl long auth, authcnt, authfnd = 0;
364 1.1 dsl
365 1.1 dsl if (!xdr_u_long(xdrsp, &np->stat))
366 1.1 dsl return (0);
367 1.1 dsl if (np->stat)
368 1.1 dsl return (1);
369 1.1 dsl switch (np->vers) {
370 1.1 dsl case 1:
371 1.1 dsl np->fhsize = NFSX_V2FH;
372 1.1 dsl return (xdr_opaque(xdrsp, (caddr_t)np->nfh, NFSX_V2FH));
373 1.1 dsl case 3:
374 1.1 dsl if (!xdr_long(xdrsp, &np->fhsize))
375 1.1 dsl return (0);
376 1.1 dsl if (np->fhsize <= 0 || np->fhsize > NFSX_V3FHMAX)
377 1.1 dsl return (0);
378 1.1 dsl if (!xdr_opaque(xdrsp, (caddr_t)np->nfh, np->fhsize))
379 1.1 dsl return (0);
380 1.1 dsl if (!xdr_long(xdrsp, &authcnt))
381 1.1 dsl return (0);
382 1.1 dsl for (i = 0; i < authcnt; i++) {
383 1.1 dsl if (!xdr_long(xdrsp, &auth))
384 1.1 dsl return (0);
385 1.1 dsl if (auth == np->auth)
386 1.1 dsl authfnd++;
387 1.1 dsl }
388 1.1 dsl /*
389 1.1 dsl * Some servers, such as DEC's OSF/1 return a nil authenticator
390 1.1 dsl * list to indicate RPCAUTH_UNIX.
391 1.1 dsl */
392 1.1 dsl if (!authfnd && (authcnt > 0 || np->auth != RPCAUTH_UNIX))
393 1.1 dsl np->stat = EAUTH;
394 1.1 dsl return (1);
395 1.1 dsl };
396 1.1 dsl return (0);
397 1.1 dsl }
398