xref: /netbsd-src/usr.sbin/nfsd/nfsd.c (revision cac8e449158efc7261bebc8657cbb0125a2cfdde)
1 /*	$NetBSD: nfsd.c,v 1.54 2008/07/21 13:36:59 lukem Exp $	*/
2 
3 /*
4  * Copyright (c) 1989, 1993, 1994
5  *	The Regents of the University of California.  All rights reserved.
6  *
7  * This code is derived from software contributed to Berkeley by
8  * Rick Macklem at The University of Guelph.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  * 1. Redistributions of source code must retain the above copyright
14  *    notice, this list of conditions and the following disclaimer.
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  * 3. Neither the name of the University nor the names of its contributors
19  *    may be used to endorse or promote products derived from this software
20  *    without specific prior written permission.
21  *
22  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32  * SUCH DAMAGE.
33  */
34 
35 #include <sys/cdefs.h>
36 #ifndef lint
37 __COPYRIGHT("@(#) Copyright (c) 1989, 1993, 1994\
38  The Regents of the University of California.  All rights reserved.");
39 #endif /* not lint */
40 
41 #ifndef lint
42 #if 0
43 static char sccsid[] = "@(#)nfsd.c	8.9 (Berkeley) 3/29/95";
44 #else
45 __RCSID("$NetBSD: nfsd.c,v 1.54 2008/07/21 13:36:59 lukem Exp $");
46 #endif
47 #endif /* not lint */
48 
49 #include <sys/param.h>
50 #include <sys/ioctl.h>
51 #include <sys/stat.h>
52 #include <sys/wait.h>
53 #include <sys/uio.h>
54 #include <sys/ucred.h>
55 #include <sys/mount.h>
56 #include <sys/socket.h>
57 #include <sys/socketvar.h>
58 #include <poll.h>
59 
60 #include <rpc/rpc.h>
61 #include <rpc/pmap_clnt.h>
62 #include <rpc/pmap_prot.h>
63 
64 #include <nfs/rpcv2.h>
65 #include <nfs/nfsproto.h>
66 #include <nfs/nfs.h>
67 
68 #include <err.h>
69 #include <errno.h>
70 #include <fcntl.h>
71 #include <grp.h>
72 #include <pwd.h>
73 #include <pthread.h>
74 #include <signal.h>
75 #include <stdio.h>
76 #include <stdlib.h>
77 #include <string.h>
78 #include <syslog.h>
79 #include <unistd.h>
80 #include <netdb.h>
81 
82 /* Global defs */
83 #ifdef DEBUG
84 #define	syslog(e, s)	fprintf(stderr,(s))
85 int	debug = 1;
86 #else
87 int	debug = 0;
88 #endif
89 
90 int	main __P((int, char **));
91 void	nonfs __P((int));
92 void	usage __P((void));
93 
94 static void *
95 child(void *dummy)
96 {
97 	struct	nfsd_srvargs nsd;
98 	int nfssvc_flag;
99 
100 	pthread_setname_np(pthread_self(), "slave", NULL);
101 	nfssvc_flag = NFSSVC_NFSD;
102 	memset(&nsd, 0, sizeof(nsd));
103 	while (nfssvc(nfssvc_flag, &nsd) < 0) {
104 		if (errno != ENEEDAUTH) {
105 			syslog(LOG_ERR, "nfssvc: %m");
106 			exit(1);
107 		}
108 		nfssvc_flag = NFSSVC_NFSD | NFSSVC_AUTHINFAIL;
109 	}
110 
111 	return NULL;
112 }
113 
114 /*
115  * Nfs server daemon mostly just a user context for nfssvc()
116  *
117  * 1 - do file descriptor and signal cleanup
118  * 2 - create the nfsd thread(s)
119  * 3 - create server socket(s)
120  * 4 - register socket with portmap
121  *
122  * For connectionless protocols, just pass the socket into the kernel via
123  * nfssvc().
124  * For connection based sockets, loop doing accepts. When you get a new
125  * socket from accept, pass the msgsock into the kernel via nfssvc().
126  * The arguments are:
127  *	-c - support iso cltp clients
128  *	-r - reregister with portmapper
129  *	-t - support tcp nfs clients
130  *	-u - support udp nfs clients
131  * followed by "n" which is the number of nfsd threads to create
132  */
133 int
134 main(argc, argv)
135 	int argc;
136 	char *argv[];
137 {
138 	struct nfsd_args nfsdargs;
139 	struct addrinfo *ai_udp, *ai_tcp, *ai_udp6, *ai_tcp6, hints;
140 	struct netconfig *nconf_udp, *nconf_tcp, *nconf_udp6, *nconf_tcp6;
141 	struct netbuf nb_udp, nb_tcp, nb_udp6, nb_tcp6;
142 	struct sockaddr_in inetpeer;
143 	struct sockaddr_in6 inet6peer;
144 	struct pollfd set[4];
145 	socklen_t len;
146 	int ch, cltpflag, connect_type_cnt, i, maxsock, msgsock;
147 	int nfsdcnt, on = 1, reregister, sock, tcpflag, tcpsock;
148 	int tcp6sock, ip6flag;
149 	int tp4cnt, tp4flag, tpipcnt, tpipflag, udpflag, ecode, s;
150 
151 #define	DEFNFSDCNT	 4
152 	nfsdcnt = DEFNFSDCNT;
153 	cltpflag = reregister = tcpflag = tp4cnt = tp4flag = tpipcnt = 0;
154 	tpipflag = udpflag = ip6flag = 0;
155 	nconf_udp = nconf_tcp = nconf_udp6 = nconf_tcp6 = NULL;
156 	maxsock = 0;
157 	tcpsock = tcp6sock = -1;
158 #define	GETOPT	"6n:rtu"
159 #define	USAGE	"[-rtu] [-n num_servers]"
160 	while ((ch = getopt(argc, argv, GETOPT)) != -1) {
161 		switch (ch) {
162 		case '6':
163 			ip6flag = 1;
164 			s = socket(PF_INET6, SOCK_DGRAM, IPPROTO_UDP);
165 			if (s < 0 && (errno == EPROTONOSUPPORT ||
166 			    errno == EPFNOSUPPORT || errno == EAFNOSUPPORT))
167 				ip6flag = 0;
168 			else
169 				close(s);
170 			break;
171 		case 'n':
172 			nfsdcnt = atoi(optarg);
173 			if (nfsdcnt < 1) {
174 				warnx("nfsd count %d; reset to %d", nfsdcnt, DEFNFSDCNT);
175 				nfsdcnt = DEFNFSDCNT;
176 			}
177 			break;
178 		case 'r':
179 			reregister = 1;
180 			break;
181 		case 't':
182 			tcpflag = 1;
183 			break;
184 		case 'u':
185 			udpflag = 1;
186 			break;
187 		default:
188 		case '?':
189 			usage();
190 		};
191 	}
192 	argv += optind;
193 	argc -= optind;
194 
195 	/*
196 	 * XXX
197 	 * Backward compatibility, trailing number is the count of daemons.
198 	 */
199 	if (argc > 1)
200 		usage();
201 	if (argc == 1) {
202 		nfsdcnt = atoi(argv[0]);
203 		if (nfsdcnt < 1) {
204 			warnx("nfsd count %d; reset to %d", nfsdcnt, DEFNFSDCNT);
205 			nfsdcnt = DEFNFSDCNT;
206 		}
207 	}
208 
209 	/*
210 	 * If none of TCP or UDP are specified, default to UDP only.
211 	 */
212 	if (tcpflag == 0 && udpflag == 0)
213 		udpflag = 1;
214 
215 	if (debug == 0) {
216 		daemon(0, 0);
217 		(void)signal(SIGHUP, SIG_IGN);
218 		(void)signal(SIGINT, SIG_IGN);
219 		(void)signal(SIGQUIT, SIG_IGN);
220 		(void)signal(SIGSYS, nonfs);
221 	}
222 
223 	if (udpflag) {
224 		memset(&hints, 0, sizeof hints);
225 		hints.ai_flags = AI_PASSIVE;
226 		hints.ai_family = PF_INET;
227 		hints.ai_socktype = SOCK_DGRAM;
228 		hints.ai_protocol = IPPROTO_UDP;
229 
230 		ecode = getaddrinfo(NULL, "nfs", &hints, &ai_udp);
231 		if (ecode != 0) {
232 			syslog(LOG_ERR, "getaddrinfo udp: %s",
233 			    gai_strerror(ecode));
234 			exit(1);
235 		}
236 
237 		nconf_udp = getnetconfigent("udp");
238 
239 		if (nconf_udp == NULL)
240 			err(1, "getnetconfigent udp failed");
241 
242 		nb_udp.buf = ai_udp->ai_addr;
243 		nb_udp.len = nb_udp.maxlen = ai_udp->ai_addrlen;
244 		if (reregister)
245 			if (!rpcb_set(RPCPROG_NFS, 2, nconf_udp, &nb_udp))
246 				err(1, "rpcb_set udp failed");
247 	}
248 
249 	if (tcpflag) {
250 		memset(&hints, 0, sizeof hints);
251 		hints.ai_flags = AI_PASSIVE;
252 		hints.ai_family = PF_INET;
253 		hints.ai_socktype = SOCK_STREAM;
254 		hints.ai_protocol = IPPROTO_TCP;
255 
256 		ecode = getaddrinfo(NULL, "nfs", &hints, &ai_tcp);
257 		if (ecode != 0) {
258 			syslog(LOG_ERR, "getaddrinfo tcp: %s",
259 			    gai_strerror(ecode));
260 			exit(1);
261 		}
262 
263 		nconf_tcp = getnetconfigent("tcp");
264 
265 		if (nconf_tcp == NULL)
266 			err(1, "getnetconfigent tcp failed");
267 
268 		nb_tcp.buf = ai_tcp->ai_addr;
269 		nb_tcp.len = nb_tcp.maxlen = ai_tcp->ai_addrlen;
270 		if (reregister)
271 			if (!rpcb_set(RPCPROG_NFS, 2, nconf_tcp, &nb_tcp))
272 				err(1, "rpcb_set tcp failed");
273 	}
274 
275 	if (udpflag && ip6flag) {
276 		memset(&hints, 0, sizeof hints);
277 		hints.ai_flags = AI_PASSIVE;
278 		hints.ai_family = PF_INET6;
279 		hints.ai_socktype = SOCK_DGRAM;
280 		hints.ai_protocol = IPPROTO_UDP;
281 
282 		ecode = getaddrinfo(NULL, "nfs", &hints, &ai_udp6);
283 		if (ecode != 0) {
284 			syslog(LOG_ERR, "getaddrinfo udp: %s",
285 			    gai_strerror(ecode));
286 			exit(1);
287 		}
288 
289 		nconf_udp6 = getnetconfigent("udp6");
290 
291 		if (nconf_udp6 == NULL)
292 			err(1, "getnetconfigent udp6 failed");
293 
294 		nb_udp6.buf = ai_udp6->ai_addr;
295 		nb_udp6.len = nb_udp6.maxlen = ai_udp6->ai_addrlen;
296 		if (reregister)
297 			if (!rpcb_set(RPCPROG_NFS, 2, nconf_udp6, &nb_udp6))
298 				err(1, "rpcb_set udp6 failed");
299 	}
300 
301 	if (tcpflag && ip6flag) {
302 		memset(&hints, 0, sizeof hints);
303 		hints.ai_flags = AI_PASSIVE;
304 		hints.ai_family = PF_INET6;
305 		hints.ai_socktype = SOCK_STREAM;
306 		hints.ai_protocol = IPPROTO_TCP;
307 
308 		ecode = getaddrinfo(NULL, "nfs", &hints, &ai_tcp6);
309 		if (ecode != 0) {
310 			syslog(LOG_ERR, "getaddrinfo tcp: %s",
311 			    gai_strerror(ecode));
312 			exit(1);
313 		}
314 
315 		nconf_tcp6 = getnetconfigent("tcp6");
316 
317 		if (nconf_tcp6 == NULL)
318 			err(1, "getnetconfigent tcp6 failed");
319 
320 		nb_tcp6.buf = ai_tcp6->ai_addr;
321 		nb_tcp6.len = nb_tcp6.maxlen = ai_tcp6->ai_addrlen;
322 		if (reregister)
323 			if (!rpcb_set(RPCPROG_NFS, 2, nconf_tcp6, &nb_tcp6))
324 				err(1, "rpcb_set tcp6 failed");
325 	}
326 
327 	openlog("nfsd", LOG_PID, LOG_DAEMON);
328 
329 	for (i = 0; i < nfsdcnt; i++) {
330 		pthread_t t;
331 		int error;
332 
333 		error = pthread_create(&t, NULL, child, NULL);
334 		if (error) {
335 			errno = error;
336 			syslog(LOG_ERR, "pthread_create: %m");
337 			exit (1);
338 		}
339 	}
340 
341 	/* If we are serving udp, set up the socket. */
342 	if (udpflag) {
343 		if ((sock = socket(ai_udp->ai_family, ai_udp->ai_socktype,
344 		    ai_udp->ai_protocol)) < 0) {
345 			syslog(LOG_ERR, "can't create udp socket");
346 			exit(1);
347 		}
348 		if (bind(sock, ai_udp->ai_addr, ai_udp->ai_addrlen) < 0) {
349 			syslog(LOG_ERR, "can't bind udp addr");
350 			exit(1);
351 		}
352 		if (!rpcb_set(RPCPROG_NFS, 2, nconf_udp, &nb_udp) ||
353 		    !rpcb_set(RPCPROG_NFS, 3, nconf_udp, &nb_udp)) {
354 			syslog(LOG_ERR, "can't register with udp portmap");
355 			exit(1);
356 		}
357 		nfsdargs.sock = sock;
358 		nfsdargs.name = NULL;
359 		nfsdargs.namelen = 0;
360 		if (nfssvc(NFSSVC_ADDSOCK, &nfsdargs) < 0) {
361 			syslog(LOG_ERR, "can't add UDP socket");
362 			exit(1);
363 		}
364 		(void)close(sock);
365 	}
366 
367 	if (udpflag &&ip6flag) {
368 		if ((sock = socket(ai_udp6->ai_family, ai_udp6->ai_socktype,
369 		    ai_udp6->ai_protocol)) < 0) {
370 			syslog(LOG_ERR, "can't create udp socket");
371 			exit(1);
372 		}
373 		if (setsockopt(sock, IPPROTO_IPV6, IPV6_V6ONLY,
374 		    &on, sizeof on) < 0) {
375 			syslog(LOG_ERR, "can't set v6-only binding for udp6 "
376 					"socket: %m");
377 			exit(1);
378 		}
379 		if (bind(sock, ai_udp6->ai_addr, ai_udp6->ai_addrlen) < 0) {
380 			syslog(LOG_ERR, "can't bind udp addr");
381 			exit(1);
382 		}
383 		if (!rpcb_set(RPCPROG_NFS, 2, nconf_udp6, &nb_udp6) ||
384 		    !rpcb_set(RPCPROG_NFS, 3, nconf_udp6, &nb_udp6)) {
385 			syslog(LOG_ERR, "can't register with udp portmap");
386 			exit(1);
387 		}
388 		nfsdargs.sock = sock;
389 		nfsdargs.name = NULL;
390 		nfsdargs.namelen = 0;
391 		if (nfssvc(NFSSVC_ADDSOCK, &nfsdargs) < 0) {
392 			syslog(LOG_ERR, "can't add UDP6 socket");
393 			exit(1);
394 		}
395 		(void)close(sock);
396 	}
397 
398 	/* Now set up the master server socket waiting for tcp connections. */
399 	on = 1;
400 	connect_type_cnt = 0;
401 	if (tcpflag) {
402 		if ((tcpsock = socket(ai_tcp->ai_family, ai_tcp->ai_socktype,
403 		    ai_tcp->ai_protocol)) < 0) {
404 			syslog(LOG_ERR, "can't create tcp socket");
405 			exit(1);
406 		}
407 		if (setsockopt(tcpsock,
408 		    SOL_SOCKET, SO_REUSEADDR, (char *)&on, sizeof(on)) < 0)
409 			syslog(LOG_ERR, "setsockopt SO_REUSEADDR: %m");
410 		if (bind(tcpsock, ai_tcp->ai_addr, ai_tcp->ai_addrlen) < 0) {
411 			syslog(LOG_ERR, "can't bind tcp addr");
412 			exit(1);
413 		}
414 		if (listen(tcpsock, 5) < 0) {
415 			syslog(LOG_ERR, "listen failed");
416 			exit(1);
417 		}
418 		if (!rpcb_set(RPCPROG_NFS, 2, nconf_tcp, &nb_tcp) ||
419 		    !rpcb_set(RPCPROG_NFS, 3, nconf_tcp, &nb_tcp)) {
420 			syslog(LOG_ERR, "can't register tcp with rpcbind");
421 			exit(1);
422 		}
423 		set[0].fd = tcpsock;
424 		set[0].events = POLLIN;
425 		connect_type_cnt++;
426 	} else
427 		set[0].fd = -1;
428 
429 	if (tcpflag && ip6flag) {
430 		if ((tcp6sock = socket(ai_tcp6->ai_family, ai_tcp6->ai_socktype,
431 		    ai_tcp6->ai_protocol)) < 0) {
432 			syslog(LOG_ERR, "can't create tcp socket");
433 			exit(1);
434 		}
435 		if (setsockopt(tcp6sock,
436 		    SOL_SOCKET, SO_REUSEADDR, (char *)&on, sizeof(on)) < 0)
437 			syslog(LOG_ERR, "setsockopt SO_REUSEADDR: %m");
438 		if (setsockopt(tcp6sock, IPPROTO_IPV6, IPV6_V6ONLY,
439 		    &on, sizeof on) < 0) {
440 			syslog(LOG_ERR, "can't set v6-only binding for tcp6 "
441 					"socket: %m");
442 			exit(1);
443 		}
444 		if (bind(tcp6sock, ai_tcp6->ai_addr, ai_tcp6->ai_addrlen) < 0) {
445 			syslog(LOG_ERR, "can't bind tcp6 addr");
446 			exit(1);
447 		}
448 		if (listen(tcp6sock, 5) < 0) {
449 			syslog(LOG_ERR, "listen failed");
450 			exit(1);
451 		}
452 		if (!rpcb_set(RPCPROG_NFS, 2, nconf_tcp6, &nb_tcp6) ||
453 		    !rpcb_set(RPCPROG_NFS, 3, nconf_tcp6, &nb_tcp6)) {
454 			syslog(LOG_ERR, "can't register tcp6 with rpcbind");
455 			exit(1);
456 		}
457 		set[1].fd = tcp6sock;
458 		set[1].events = POLLIN;
459 		connect_type_cnt++;
460 	} else
461 		set[1].fd = -1;
462 
463 	set[2].fd = -1;
464 	set[3].fd = -1;
465 
466 	if (connect_type_cnt == 0)
467 		exit(0);
468 
469 	pthread_setname_np(pthread_self(), "master", NULL);
470 
471 	/*
472 	 * Loop forever accepting connections and passing the sockets
473 	 * into the kernel for the mounts.
474 	 */
475 	for (;;) {
476 		if (poll(set, 4, INFTIM) < 1) {
477 			syslog(LOG_ERR, "poll failed: %m");
478 			exit(1);
479 		}
480 
481 		if (set[0].revents & POLLIN) {
482 			len = sizeof(inetpeer);
483 			if ((msgsock = accept(tcpsock,
484 			    (struct sockaddr *)&inetpeer, &len)) < 0) {
485 				syslog(LOG_ERR, "accept failed: %m");
486 				exit(1);
487 			}
488 			memset(inetpeer.sin_zero, 0, sizeof(inetpeer.sin_zero));
489 			if (setsockopt(msgsock, SOL_SOCKET,
490 			    SO_KEEPALIVE, (char *)&on, sizeof(on)) < 0)
491 				syslog(LOG_ERR,
492 				    "setsockopt SO_KEEPALIVE: %m");
493 			nfsdargs.sock = msgsock;
494 			nfsdargs.name = (caddr_t)&inetpeer;
495 			nfsdargs.namelen = sizeof(inetpeer);
496 			nfssvc(NFSSVC_ADDSOCK, &nfsdargs);
497 			(void)close(msgsock);
498 		}
499 
500 		if (set[1].revents & POLLIN) {
501 			len = sizeof(inet6peer);
502 			if ((msgsock = accept(tcp6sock,
503 			    (struct sockaddr *)&inet6peer, &len)) < 0) {
504 				syslog(LOG_ERR, "accept failed: %m");
505 				exit(1);
506 			}
507 			if (setsockopt(msgsock, SOL_SOCKET,
508 			    SO_KEEPALIVE, (char *)&on, sizeof(on)) < 0)
509 				syslog(LOG_ERR,
510 				    "setsockopt SO_KEEPALIVE: %m");
511 			nfsdargs.sock = msgsock;
512 			nfsdargs.name = (caddr_t)&inet6peer;
513 			nfsdargs.namelen = sizeof(inet6peer);
514 			nfssvc(NFSSVC_ADDSOCK, &nfsdargs);
515 			(void)close(msgsock);
516 		}
517 
518 #ifdef notyet
519 		if (set[2].revents & POLLIN) {
520 			len = sizeof(isopeer);
521 			if ((msgsock = accept(tp4sock,
522 			    (struct sockaddr *)&isopeer, &len)) < 0) {
523 				syslog(LOG_ERR, "accept failed: %m");
524 				exit(1);
525 			}
526 			if (setsockopt(msgsock, SOL_SOCKET,
527 			    SO_KEEPALIVE, (char *)&on, sizeof(on)) < 0)
528 				syslog(LOG_ERR,
529 				    "setsockopt SO_KEEPALIVE: %m");
530 			nfsdargs.sock = msgsock;
531 			nfsdargs.name = (caddr_t)&isopeer;
532 			nfsdargs.namelen = len;
533 			nfssvc(NFSSVC_ADDSOCK, &nfsdargs);
534 			(void)close(msgsock);
535 		}
536 
537 		if (set[3].revents & POLLIN) {
538 			len = sizeof(inetpeer);
539 			if ((msgsock = accept(tpipsock,
540 			    (struct sockaddr *)&inetpeer, &len)) < 0) {
541 				syslog(LOG_ERR, "accept failed: %m");
542 				exit(1);
543 			}
544 			if (setsockopt(msgsock, SOL_SOCKET,
545 			    SO_KEEPALIVE, (char *)&on, sizeof(on)) < 0)
546 				syslog(LOG_ERR, "setsockopt SO_KEEPALIVE: %m");
547 			nfsdargs.sock = msgsock;
548 			nfsdargs.name = (caddr_t)&inetpeer;
549 			nfsdargs.namelen = len;
550 			nfssvc(NFSSVC_ADDSOCK, &nfsdargs);
551 			(void)close(msgsock);
552 		}
553 #endif /* notyet */
554 	}
555 }
556 
557 void
558 usage()
559 {
560 	(void)fprintf(stderr, "usage: nfsd %s\n", USAGE);
561 	exit(1);
562 }
563 
564 void
565 nonfs(signo)
566 	int signo;
567 {
568 	syslog(LOG_ERR, "missing system call: NFS not available.");
569 }
570