xref: /netbsd-src/sbin/mount_nfs/getnfsargs.c (revision fad4c9f71477ae11cea2ee75ec82151ac770a534)
1 /*	$NetBSD: getnfsargs.c,v 1.5 2006/05/20 08:06:48 yamt Exp $	*/
2 
3 /*
4  * Copyright (c) 1992, 1993, 1994
5  *	The Regents of the University of California.  All rights reserved.
6  *
7  * This code is derived from software contributed to Berkeley by
8  * Rick Macklem at The University of Guelph.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  * 1. Redistributions of source code must retain the above copyright
14  *    notice, this list of conditions and the following disclaimer.
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  * 3. Neither the name of the University nor the names of its contributors
19  *    may be used to endorse or promote products derived from this software
20  *    without specific prior written permission.
21  *
22  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32  * SUCH DAMAGE.
33  */
34 
35 #include <sys/cdefs.h>
36 #ifndef lint
37 __COPYRIGHT("@(#) Copyright (c) 1992, 1993, 1994\n\
38 	The Regents of the University of California.  All rights reserved.\n");
39 #endif /* not lint */
40 
41 #ifndef lint
42 #if 0
43 static char sccsid[] = "@(#)mount_nfs.c	8.11 (Berkeley) 5/4/95";
44 #else
45 __RCSID("$NetBSD: getnfsargs.c,v 1.5 2006/05/20 08:06:48 yamt Exp $");
46 #endif
47 #endif /* not lint */
48 
49 #include <sys/param.h>
50 #include <sys/mount.h>
51 #include <sys/socket.h>
52 #include <sys/stat.h>
53 #include <syslog.h>
54 
55 #include <rpc/rpc.h>
56 #include <rpc/pmap_clnt.h>
57 #include <rpc/pmap_prot.h>
58 
59 #ifdef ISO
60 #include <netiso/iso.h>
61 #endif
62 
63 
64 #include <nfs/rpcv2.h>
65 #include <nfs/nfsproto.h>
66 #include <nfs/nfs.h>
67 #include <nfs/nqnfs.h>
68 #include <nfs/nfsmount.h>
69 
70 #include <arpa/inet.h>
71 
72 #include <ctype.h>
73 #include <err.h>
74 #include <errno.h>
75 #include <fcntl.h>
76 #include <netdb.h>
77 #include <signal.h>
78 #include <stdio.h>
79 #include <stdlib.h>
80 #include <string.h>
81 #include <unistd.h>
82 #include <util.h>
83 
84 #include "mount_nfs.h"
85 
86 struct nfhret {
87 	u_long		stat;
88 	long		vers;
89 	long		auth;
90 	long		fhsize;
91 	u_char		nfh[NFSX_V3FHMAX];
92 };
93 
94 static int	xdr_dir(XDR *, char *);
95 static int	xdr_fh(XDR *, struct nfhret *);
96 
97 int
98 getnfsargs(char *spec, struct nfs_args *nfsargsp)
99 {
100 	CLIENT *clp;
101 	struct addrinfo hints, *ai_nfs, *ai;
102 	int ecode;
103 	char host[NI_MAXHOST], serv[NI_MAXSERV];
104 	static struct netbuf nfs_nb;
105 	static struct sockaddr_storage nfs_ss;
106 	struct netconfig *nconf;
107 	const char *netid;
108 #ifdef ISO
109 	static struct sockaddr_iso isoaddr;
110 	struct iso_addr *isop;
111 	int isoflag = 0;
112 #endif
113 	struct timeval pertry, try;
114 	enum clnt_stat clnt_stat;
115 	int i, nfsvers, mntvers;
116 	int retryleft;
117 	char *hostp, *delimp;
118 	static struct nfhret nfhret;
119 	static char nam[MNAMELEN + 1];
120 
121 	strncpy(nam, spec, MNAMELEN);
122 	nam[MNAMELEN] = '\0';
123 	if ((delimp = strchr(spec, '@')) != NULL) {
124 		hostp = delimp + 1;
125 	} else if ((delimp = strrchr(spec, ':')) != NULL) {
126 		hostp = spec;
127 		spec = delimp + 1;
128 	} else {
129 		warnx("no <host>:<dirpath> or <dirpath>@<host> spec");
130 		return (0);
131 	}
132 	*delimp = '\0';
133 	/*
134 	 * DUMB!! Until the mount protocol works on iso transport, we must
135 	 * supply both an iso and an inet address for the host.
136 	 */
137 #ifdef ISO
138 	if (!strncmp(hostp, "iso=", 4)) {
139 		u_short isoport;
140 
141 		hostp += 4;
142 		isoflag++;
143 		if ((delimp = strchr(hostp, '+')) == NULL) {
144 			warnx("no iso+inet address");
145 			return (0);
146 		}
147 		*delimp = '\0';
148 		if ((isop = iso_addr(hostp)) == NULL) {
149 			warnx("bad ISO address");
150 			return (0);
151 		}
152 		memset(&isoaddr, 0, sizeof (isoaddr));
153 		memcpy(&isoaddr.siso_addr, isop, sizeof (struct iso_addr));
154 		isoaddr.siso_len = sizeof (isoaddr);
155 		isoaddr.siso_family = AF_ISO;
156 		isoaddr.siso_tlen = 2;
157 		isoport = htons(NFS_PORT);
158 		memcpy(TSEL(&isoaddr), &isoport, isoaddr.siso_tlen);
159 		hostp = delimp + 1;
160 	}
161 #endif /* ISO */
162 
163 	/*
164 	 * Handle an internet host address and reverse resolve it if
165 	 * doing Kerberos.
166 	 */
167 	memset(&hints, 0, sizeof hints);
168 	hints.ai_flags = AI_NUMERICHOST;
169 	hints.ai_socktype = nfsargsp->sotype;
170 	if (getaddrinfo(hostp, "nfs", &hints, &ai_nfs) == 0) {
171 		if ((nfsargsp->flags & NFSMNT_KERB)) {
172 			hints.ai_flags = 0;
173 			if ((ecode = getnameinfo(ai_nfs->ai_addr,
174 			    ai_nfs->ai_addrlen, host, sizeof(host),
175 			    serv, sizeof serv, 0)) != 0) {
176 				warnx("can't reverse resolve net address for "
177 				    "host \"%s\": %s", hostp,
178 				    gai_strerror(ecode));
179 				return (0);
180 			}
181 			hostp = host;
182 		}
183 	} else {
184 		hints.ai_flags = 0;
185 		if ((ecode = getaddrinfo(hostp, "nfs", &hints, &ai_nfs)) != 0) {
186 			warnx("can't get net id for host \"%s\": %s", hostp,
187 			    gai_strerror(ecode));
188 			return (0);
189 		}
190 	}
191 
192 	if ((nfsargsp->flags & NFSMNT_NFSV3) != 0) {
193 		nfsvers = NFS_VER3;
194 		mntvers = RPCMNT_VER3;
195 	} else {
196 		nfsvers = NFS_VER2;
197 		mntvers = RPCMNT_VER1;
198 	}
199 	nfhret.stat = EACCES;	/* Mark not yet successful */
200 
201     for (ai = ai_nfs; ai; ai = ai->ai_next) {
202 	/*
203 	 * XXX. Nead a generic (family, type, proto) -> nconf interface.
204 	 * __rpc_*2nconf exist, maybe they should be exported.
205 	 */
206 	if (nfsargsp->sotype == SOCK_STREAM) {
207 		if (ai->ai_family == AF_INET6)
208 			netid = "tcp6";
209 		else
210 			netid = "tcp";
211 	} else {
212 		if (ai->ai_family == AF_INET6)
213 			netid = "udp6";
214 		else
215 			netid = "udp";
216 	}
217 
218 	nconf = getnetconfigent(netid);
219 
220 tryagain:
221 	retryleft = retrycnt;
222 
223 	while (retryleft > 0) {
224 		nfs_nb.buf = &nfs_ss;
225 		nfs_nb.maxlen = sizeof nfs_ss;
226 		if (!rpcb_getaddr(RPCPROG_NFS, nfsvers, nconf, &nfs_nb, hostp)){
227 			if (rpc_createerr.cf_stat == RPC_SYSTEMERROR) {
228 				nfhret.stat = rpc_createerr.cf_error.re_errno;
229 				break;
230 			}
231 			if (rpc_createerr.cf_stat == RPC_UNKNOWNPROTO) {
232 				nfhret.stat = EPROTONOSUPPORT;
233 				break;
234 			}
235 			if ((opflags & ISBGRND) == 0)
236 				clnt_pcreateerror(
237 				    "mount_nfs: rpcbind to nfs on server");
238 		} else {
239 			pertry.tv_sec = 10;
240 			pertry.tv_usec = 0;
241 			/*
242 			 * XXX relies on clnt_tcp_create to bind to a reserved
243 			 * socket.
244 			 */
245 			clp = clnt_tp_create(hostp, RPCPROG_MNT, mntvers,
246 			     mnttcp_ok ? nconf : getnetconfigent("udp"));
247 			if (clp == NULL) {
248 				if ((opflags & ISBGRND) == 0) {
249 					clnt_pcreateerror(
250 					    "Cannot MNT RPC (mountd)");
251 				}
252 			} else {
253 				CLNT_CONTROL(clp, CLSET_RETRY_TIMEOUT,
254 				    (char *)&pertry);
255 				clp->cl_auth = authsys_create_default();
256 				try.tv_sec = 10;
257 				try.tv_usec = 0;
258 				if (nfsargsp->flags & NFSMNT_KERB)
259 				    nfhret.auth = RPCAUTH_KERB4;
260 				else
261 				    nfhret.auth = RPCAUTH_UNIX;
262 				nfhret.vers = mntvers;
263 				clnt_stat = clnt_call(clp, RPCMNT_MOUNT,
264 				    xdr_dir, spec, xdr_fh, &nfhret, try);
265 				switch (clnt_stat) {
266 				case RPC_PROGVERSMISMATCH:
267 					if (nfsvers == NFS_VER3 && !force3) {
268 						nfsvers = NFS_VER2;
269 						mntvers = RPCMNT_VER1;
270 						nfsargsp->flags &=
271 							~NFSMNT_NFSV3;
272 						goto tryagain;
273 					} else {
274 						errx(1, "%s", clnt_sperror(clp,
275 							"MNT RPC"));
276 					}
277 				case RPC_SUCCESS:
278 					auth_destroy(clp->cl_auth);
279 					clnt_destroy(clp);
280 					retryleft = 0;
281 					break;
282 				default:
283 					/* XXX should give up on some errors */
284 					if ((opflags & ISBGRND) == 0)
285 						warnx("%s", clnt_sperror(clp,
286 						    "bad MNT RPC"));
287 					break;
288 				}
289 			}
290 		}
291 		if (--retryleft > 0) {
292 			if (opflags & BGRND) {
293 				opflags &= ~BGRND;
294 				if ((i = fork()) != 0) {
295 					if (i == -1)
296 						err(1, "nqnfs 2");
297 					exit(0);
298 				}
299 				(void) setsid();
300 				(void) close(STDIN_FILENO);
301 				(void) close(STDOUT_FILENO);
302 				(void) close(STDERR_FILENO);
303 				(void) chdir("/");
304 				opflags |= ISBGRND;
305 			}
306 			sleep(60);
307 		}
308 	}
309 	if (nfhret.stat == 0)
310 		break;
311     }
312 	freeaddrinfo(ai_nfs);
313 	if (nfhret.stat) {
314 		if (opflags & ISBGRND)
315 			exit(1);
316 		errno = nfhret.stat;
317 		warnx("can't access %s: %s", spec, strerror(nfhret.stat));
318 		return (0);
319 	}
320 #ifdef ISO
321 	if (isoflag) {
322 		nfsargsp->addr = (struct sockaddr *) &isoaddr;
323 		nfsargsp->addrlen = sizeof (isoaddr);
324 	} else
325 #endif /* ISO */
326 	{
327 		nfsargsp->addr = (struct sockaddr *) nfs_nb.buf;
328 		nfsargsp->addrlen = nfs_nb.len;
329 		if (port != 0) {
330 			struct sockaddr *sa = nfsargsp->addr;
331 			switch (sa->sa_family) {
332 			case AF_INET:
333 				((struct sockaddr_in *)sa)->sin_port = port;
334 				break;
335 #ifdef INET6
336 			case AF_INET6:
337 				((struct sockaddr_in6 *)sa)->sin6_port = port;
338 				break;
339 #endif
340 			default:
341 				errx(1, "Unsupported socket family %d",
342 				    sa->sa_family);
343 			}
344 		}
345 	}
346 	nfsargsp->fh = nfhret.nfh;
347 	nfsargsp->fhsize = nfhret.fhsize;
348 	nfsargsp->hostname = nam;
349 	return (1);
350 }
351 
352 /*
353  * xdr routines for mount rpc's
354  */
355 static int
356 xdr_dir(XDR *xdrsp, char *dirp)
357 {
358 	return (xdr_string(xdrsp, &dirp, RPCMNT_PATHLEN));
359 }
360 
361 static int
362 xdr_fh(XDR *xdrsp, struct nfhret *np)
363 {
364 	int i;
365 	long auth, authcnt, authfnd = 0;
366 
367 	if (!xdr_u_long(xdrsp, &np->stat))
368 		return (0);
369 	if (np->stat)
370 		return (1);
371 	switch (np->vers) {
372 	case 1:
373 		np->fhsize = NFSX_V2FH;
374 		return (xdr_opaque(xdrsp, (caddr_t)np->nfh, NFSX_V2FH));
375 	case 3:
376 		if (!xdr_long(xdrsp, &np->fhsize))
377 			return (0);
378 		if (np->fhsize <= 0 || np->fhsize > NFSX_V3FHMAX)
379 			return (0);
380 		if (!xdr_opaque(xdrsp, (caddr_t)np->nfh, np->fhsize))
381 			return (0);
382 		if (!xdr_long(xdrsp, &authcnt))
383 			return (0);
384 		for (i = 0; i < authcnt; i++) {
385 			if (!xdr_long(xdrsp, &auth))
386 				return (0);
387 			if (auth == np->auth)
388 				authfnd++;
389 		}
390 		/*
391 		 * Some servers, such as DEC's OSF/1 return a nil authenticator
392 		 * list to indicate RPCAUTH_UNIX.
393 		 */
394 		if (!authfnd && (authcnt > 0 || np->auth != RPCAUTH_UNIX))
395 			np->stat = EAUTH;
396 		return (1);
397 	};
398 	return (0);
399 }
400