1 /* $NetBSD: getnfsargs.c,v 1.5 2006/05/20 08:06:48 yamt Exp $ */ 2 3 /* 4 * Copyright (c) 1992, 1993, 1994 5 * The Regents of the University of California. All rights reserved. 6 * 7 * This code is derived from software contributed to Berkeley by 8 * Rick Macklem at The University of Guelph. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 3. Neither the name of the University nor the names of its contributors 19 * may be used to endorse or promote products derived from this software 20 * without specific prior written permission. 21 * 22 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 23 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 24 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 25 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 26 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 27 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 28 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 29 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 30 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 31 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 32 * SUCH DAMAGE. 33 */ 34 35 #include <sys/cdefs.h> 36 #ifndef lint 37 __COPYRIGHT("@(#) Copyright (c) 1992, 1993, 1994\n\ 38 The Regents of the University of California. All rights reserved.\n"); 39 #endif /* not lint */ 40 41 #ifndef lint 42 #if 0 43 static char sccsid[] = "@(#)mount_nfs.c 8.11 (Berkeley) 5/4/95"; 44 #else 45 __RCSID("$NetBSD: getnfsargs.c,v 1.5 2006/05/20 08:06:48 yamt Exp $"); 46 #endif 47 #endif /* not lint */ 48 49 #include <sys/param.h> 50 #include <sys/mount.h> 51 #include <sys/socket.h> 52 #include <sys/stat.h> 53 #include <syslog.h> 54 55 #include <rpc/rpc.h> 56 #include <rpc/pmap_clnt.h> 57 #include <rpc/pmap_prot.h> 58 59 #ifdef ISO 60 #include <netiso/iso.h> 61 #endif 62 63 64 #include <nfs/rpcv2.h> 65 #include <nfs/nfsproto.h> 66 #include <nfs/nfs.h> 67 #include <nfs/nqnfs.h> 68 #include <nfs/nfsmount.h> 69 70 #include <arpa/inet.h> 71 72 #include <ctype.h> 73 #include <err.h> 74 #include <errno.h> 75 #include <fcntl.h> 76 #include <netdb.h> 77 #include <signal.h> 78 #include <stdio.h> 79 #include <stdlib.h> 80 #include <string.h> 81 #include <unistd.h> 82 #include <util.h> 83 84 #include "mount_nfs.h" 85 86 struct nfhret { 87 u_long stat; 88 long vers; 89 long auth; 90 long fhsize; 91 u_char nfh[NFSX_V3FHMAX]; 92 }; 93 94 static int xdr_dir(XDR *, char *); 95 static int xdr_fh(XDR *, struct nfhret *); 96 97 int 98 getnfsargs(char *spec, struct nfs_args *nfsargsp) 99 { 100 CLIENT *clp; 101 struct addrinfo hints, *ai_nfs, *ai; 102 int ecode; 103 char host[NI_MAXHOST], serv[NI_MAXSERV]; 104 static struct netbuf nfs_nb; 105 static struct sockaddr_storage nfs_ss; 106 struct netconfig *nconf; 107 const char *netid; 108 #ifdef ISO 109 static struct sockaddr_iso isoaddr; 110 struct iso_addr *isop; 111 int isoflag = 0; 112 #endif 113 struct timeval pertry, try; 114 enum clnt_stat clnt_stat; 115 int i, nfsvers, mntvers; 116 int retryleft; 117 char *hostp, *delimp; 118 static struct nfhret nfhret; 119 static char nam[MNAMELEN + 1]; 120 121 strncpy(nam, spec, MNAMELEN); 122 nam[MNAMELEN] = '\0'; 123 if ((delimp = strchr(spec, '@')) != NULL) { 124 hostp = delimp + 1; 125 } else if ((delimp = strrchr(spec, ':')) != NULL) { 126 hostp = spec; 127 spec = delimp + 1; 128 } else { 129 warnx("no <host>:<dirpath> or <dirpath>@<host> spec"); 130 return (0); 131 } 132 *delimp = '\0'; 133 /* 134 * DUMB!! Until the mount protocol works on iso transport, we must 135 * supply both an iso and an inet address for the host. 136 */ 137 #ifdef ISO 138 if (!strncmp(hostp, "iso=", 4)) { 139 u_short isoport; 140 141 hostp += 4; 142 isoflag++; 143 if ((delimp = strchr(hostp, '+')) == NULL) { 144 warnx("no iso+inet address"); 145 return (0); 146 } 147 *delimp = '\0'; 148 if ((isop = iso_addr(hostp)) == NULL) { 149 warnx("bad ISO address"); 150 return (0); 151 } 152 memset(&isoaddr, 0, sizeof (isoaddr)); 153 memcpy(&isoaddr.siso_addr, isop, sizeof (struct iso_addr)); 154 isoaddr.siso_len = sizeof (isoaddr); 155 isoaddr.siso_family = AF_ISO; 156 isoaddr.siso_tlen = 2; 157 isoport = htons(NFS_PORT); 158 memcpy(TSEL(&isoaddr), &isoport, isoaddr.siso_tlen); 159 hostp = delimp + 1; 160 } 161 #endif /* ISO */ 162 163 /* 164 * Handle an internet host address and reverse resolve it if 165 * doing Kerberos. 166 */ 167 memset(&hints, 0, sizeof hints); 168 hints.ai_flags = AI_NUMERICHOST; 169 hints.ai_socktype = nfsargsp->sotype; 170 if (getaddrinfo(hostp, "nfs", &hints, &ai_nfs) == 0) { 171 if ((nfsargsp->flags & NFSMNT_KERB)) { 172 hints.ai_flags = 0; 173 if ((ecode = getnameinfo(ai_nfs->ai_addr, 174 ai_nfs->ai_addrlen, host, sizeof(host), 175 serv, sizeof serv, 0)) != 0) { 176 warnx("can't reverse resolve net address for " 177 "host \"%s\": %s", hostp, 178 gai_strerror(ecode)); 179 return (0); 180 } 181 hostp = host; 182 } 183 } else { 184 hints.ai_flags = 0; 185 if ((ecode = getaddrinfo(hostp, "nfs", &hints, &ai_nfs)) != 0) { 186 warnx("can't get net id for host \"%s\": %s", hostp, 187 gai_strerror(ecode)); 188 return (0); 189 } 190 } 191 192 if ((nfsargsp->flags & NFSMNT_NFSV3) != 0) { 193 nfsvers = NFS_VER3; 194 mntvers = RPCMNT_VER3; 195 } else { 196 nfsvers = NFS_VER2; 197 mntvers = RPCMNT_VER1; 198 } 199 nfhret.stat = EACCES; /* Mark not yet successful */ 200 201 for (ai = ai_nfs; ai; ai = ai->ai_next) { 202 /* 203 * XXX. Nead a generic (family, type, proto) -> nconf interface. 204 * __rpc_*2nconf exist, maybe they should be exported. 205 */ 206 if (nfsargsp->sotype == SOCK_STREAM) { 207 if (ai->ai_family == AF_INET6) 208 netid = "tcp6"; 209 else 210 netid = "tcp"; 211 } else { 212 if (ai->ai_family == AF_INET6) 213 netid = "udp6"; 214 else 215 netid = "udp"; 216 } 217 218 nconf = getnetconfigent(netid); 219 220 tryagain: 221 retryleft = retrycnt; 222 223 while (retryleft > 0) { 224 nfs_nb.buf = &nfs_ss; 225 nfs_nb.maxlen = sizeof nfs_ss; 226 if (!rpcb_getaddr(RPCPROG_NFS, nfsvers, nconf, &nfs_nb, hostp)){ 227 if (rpc_createerr.cf_stat == RPC_SYSTEMERROR) { 228 nfhret.stat = rpc_createerr.cf_error.re_errno; 229 break; 230 } 231 if (rpc_createerr.cf_stat == RPC_UNKNOWNPROTO) { 232 nfhret.stat = EPROTONOSUPPORT; 233 break; 234 } 235 if ((opflags & ISBGRND) == 0) 236 clnt_pcreateerror( 237 "mount_nfs: rpcbind to nfs on server"); 238 } else { 239 pertry.tv_sec = 10; 240 pertry.tv_usec = 0; 241 /* 242 * XXX relies on clnt_tcp_create to bind to a reserved 243 * socket. 244 */ 245 clp = clnt_tp_create(hostp, RPCPROG_MNT, mntvers, 246 mnttcp_ok ? nconf : getnetconfigent("udp")); 247 if (clp == NULL) { 248 if ((opflags & ISBGRND) == 0) { 249 clnt_pcreateerror( 250 "Cannot MNT RPC (mountd)"); 251 } 252 } else { 253 CLNT_CONTROL(clp, CLSET_RETRY_TIMEOUT, 254 (char *)&pertry); 255 clp->cl_auth = authsys_create_default(); 256 try.tv_sec = 10; 257 try.tv_usec = 0; 258 if (nfsargsp->flags & NFSMNT_KERB) 259 nfhret.auth = RPCAUTH_KERB4; 260 else 261 nfhret.auth = RPCAUTH_UNIX; 262 nfhret.vers = mntvers; 263 clnt_stat = clnt_call(clp, RPCMNT_MOUNT, 264 xdr_dir, spec, xdr_fh, &nfhret, try); 265 switch (clnt_stat) { 266 case RPC_PROGVERSMISMATCH: 267 if (nfsvers == NFS_VER3 && !force3) { 268 nfsvers = NFS_VER2; 269 mntvers = RPCMNT_VER1; 270 nfsargsp->flags &= 271 ~NFSMNT_NFSV3; 272 goto tryagain; 273 } else { 274 errx(1, "%s", clnt_sperror(clp, 275 "MNT RPC")); 276 } 277 case RPC_SUCCESS: 278 auth_destroy(clp->cl_auth); 279 clnt_destroy(clp); 280 retryleft = 0; 281 break; 282 default: 283 /* XXX should give up on some errors */ 284 if ((opflags & ISBGRND) == 0) 285 warnx("%s", clnt_sperror(clp, 286 "bad MNT RPC")); 287 break; 288 } 289 } 290 } 291 if (--retryleft > 0) { 292 if (opflags & BGRND) { 293 opflags &= ~BGRND; 294 if ((i = fork()) != 0) { 295 if (i == -1) 296 err(1, "nqnfs 2"); 297 exit(0); 298 } 299 (void) setsid(); 300 (void) close(STDIN_FILENO); 301 (void) close(STDOUT_FILENO); 302 (void) close(STDERR_FILENO); 303 (void) chdir("/"); 304 opflags |= ISBGRND; 305 } 306 sleep(60); 307 } 308 } 309 if (nfhret.stat == 0) 310 break; 311 } 312 freeaddrinfo(ai_nfs); 313 if (nfhret.stat) { 314 if (opflags & ISBGRND) 315 exit(1); 316 errno = nfhret.stat; 317 warnx("can't access %s: %s", spec, strerror(nfhret.stat)); 318 return (0); 319 } 320 #ifdef ISO 321 if (isoflag) { 322 nfsargsp->addr = (struct sockaddr *) &isoaddr; 323 nfsargsp->addrlen = sizeof (isoaddr); 324 } else 325 #endif /* ISO */ 326 { 327 nfsargsp->addr = (struct sockaddr *) nfs_nb.buf; 328 nfsargsp->addrlen = nfs_nb.len; 329 if (port != 0) { 330 struct sockaddr *sa = nfsargsp->addr; 331 switch (sa->sa_family) { 332 case AF_INET: 333 ((struct sockaddr_in *)sa)->sin_port = port; 334 break; 335 #ifdef INET6 336 case AF_INET6: 337 ((struct sockaddr_in6 *)sa)->sin6_port = port; 338 break; 339 #endif 340 default: 341 errx(1, "Unsupported socket family %d", 342 sa->sa_family); 343 } 344 } 345 } 346 nfsargsp->fh = nfhret.nfh; 347 nfsargsp->fhsize = nfhret.fhsize; 348 nfsargsp->hostname = nam; 349 return (1); 350 } 351 352 /* 353 * xdr routines for mount rpc's 354 */ 355 static int 356 xdr_dir(XDR *xdrsp, char *dirp) 357 { 358 return (xdr_string(xdrsp, &dirp, RPCMNT_PATHLEN)); 359 } 360 361 static int 362 xdr_fh(XDR *xdrsp, struct nfhret *np) 363 { 364 int i; 365 long auth, authcnt, authfnd = 0; 366 367 if (!xdr_u_long(xdrsp, &np->stat)) 368 return (0); 369 if (np->stat) 370 return (1); 371 switch (np->vers) { 372 case 1: 373 np->fhsize = NFSX_V2FH; 374 return (xdr_opaque(xdrsp, (caddr_t)np->nfh, NFSX_V2FH)); 375 case 3: 376 if (!xdr_long(xdrsp, &np->fhsize)) 377 return (0); 378 if (np->fhsize <= 0 || np->fhsize > NFSX_V3FHMAX) 379 return (0); 380 if (!xdr_opaque(xdrsp, (caddr_t)np->nfh, np->fhsize)) 381 return (0); 382 if (!xdr_long(xdrsp, &authcnt)) 383 return (0); 384 for (i = 0; i < authcnt; i++) { 385 if (!xdr_long(xdrsp, &auth)) 386 return (0); 387 if (auth == np->auth) 388 authfnd++; 389 } 390 /* 391 * Some servers, such as DEC's OSF/1 return a nil authenticator 392 * list to indicate RPCAUTH_UNIX. 393 */ 394 if (!authfnd && (authcnt > 0 || np->auth != RPCAUTH_UNIX)) 395 np->stat = EAUTH; 396 return (1); 397 }; 398 return (0); 399 } 400