NetBSD/sbin/mount_nfs/getnfsargs.c
dsl 9abd2f5605 Split getnfsargs() out into its own file, it drags in 70kB of rpc code.
I might manage to write a version that doesn't pull in all the crud.
(Which will give a load of space in the install floppy images)
2005-05-15 21:18:34 +00:00

413 lines
10 KiB
C

/* $NetBSD: getnfsargs.c,v 1.1 2005/05/15 21:18:34 dsl Exp $ */
/*
* Copyright (c) 1992, 1993, 1994
* The Regents of the University of California. All rights reserved.
*
* This code is derived from software contributed to Berkeley by
* Rick Macklem at The University of Guelph.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. Neither the name of the University nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
#include <sys/cdefs.h>
#ifndef lint
__COPYRIGHT("@(#) Copyright (c) 1992, 1993, 1994\n\
The Regents of the University of California. All rights reserved.\n");
#endif /* not lint */
#ifndef lint
#if 0
static char sccsid[] = "@(#)mount_nfs.c 8.11 (Berkeley) 5/4/95";
#else
__RCSID("$NetBSD: getnfsargs.c,v 1.1 2005/05/15 21:18:34 dsl Exp $");
#endif
#endif /* not lint */
#include <sys/param.h>
#include <sys/mount.h>
#include <sys/socket.h>
#include <sys/stat.h>
#include <syslog.h>
#include <rpc/rpc.h>
#include <rpc/pmap_clnt.h>
#include <rpc/pmap_prot.h>
#ifdef ISO
#include <netiso/iso.h>
#endif
#ifdef NFSKERB
#include <des.h>
#include <kerberosIV/krb.h>
#endif
#include <nfs/rpcv2.h>
#include <nfs/nfsproto.h>
#include <nfs/nfs.h>
#include <nfs/nqnfs.h>
#include <nfs/nfsmount.h>
#include <arpa/inet.h>
#include <ctype.h>
#include <err.h>
#include <errno.h>
#include <fcntl.h>
#include <netdb.h>
#include <signal.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <util.h>
#include "mount_nfs.h"
struct nfhret {
u_long stat;
long vers;
long auth;
long fhsize;
u_char nfh[NFSX_V3FHMAX];
};
static int xdr_dir(XDR *, char *);
static int xdr_fh(XDR *, struct nfhret *);
int
getnfsargs(char *spec, struct nfs_args *nfsargsp)
{
CLIENT *clp;
struct addrinfo hints, *ai_nfs, *ai;
int ecode;
char host[NI_MAXHOST], serv[NI_MAXSERV];
static struct netbuf nfs_nb;
static struct sockaddr_storage nfs_ss;
struct netconfig *nconf;
const char *netid;
#ifdef ISO
static struct sockaddr_iso isoaddr;
struct iso_addr *isop;
int isoflag = 0;
#endif
struct timeval pertry, try;
enum clnt_stat clnt_stat;
int i, nfsvers, mntvers, orgcnt;
char *hostp, *delimp;
#ifdef NFSKERB
char *cp;
#endif
static struct nfhret nfhret;
static char nam[MNAMELEN + 1];
strncpy(nam, spec, MNAMELEN);
nam[MNAMELEN] = '\0';
if ((delimp = strchr(spec, '@')) != NULL) {
hostp = delimp + 1;
} else if ((delimp = strrchr(spec, ':')) != NULL) {
hostp = spec;
spec = delimp + 1;
} else {
warnx("no <host>:<dirpath> or <dirpath>@<host> spec");
return (0);
}
*delimp = '\0';
/*
* DUMB!! Until the mount protocol works on iso transport, we must
* supply both an iso and an inet address for the host.
*/
#ifdef ISO
if (!strncmp(hostp, "iso=", 4)) {
u_short isoport;
hostp += 4;
isoflag++;
if ((delimp = strchr(hostp, '+')) == NULL) {
warnx("no iso+inet address");
return (0);
}
*delimp = '\0';
if ((isop = iso_addr(hostp)) == NULL) {
warnx("bad ISO address");
return (0);
}
memset(&isoaddr, 0, sizeof (isoaddr));
memcpy(&isoaddr.siso_addr, isop, sizeof (struct iso_addr));
isoaddr.siso_len = sizeof (isoaddr);
isoaddr.siso_family = AF_ISO;
isoaddr.siso_tlen = 2;
isoport = htons(NFS_PORT);
memcpy(TSEL(&isoaddr), &isoport, isoaddr.siso_tlen);
hostp = delimp + 1;
}
#endif /* ISO */
/*
* Handle an internet host address and reverse resolve it if
* doing Kerberos.
*/
memset(&hints, 0, sizeof hints);
hints.ai_flags = AI_NUMERICHOST;
hints.ai_socktype = nfsargsp->sotype;
if (getaddrinfo(hostp, "nfs", &hints, &ai_nfs) == 0) {
if ((nfsargsp->flags & NFSMNT_KERB)) {
hints.ai_flags = 0;
if (getnameinfo(ai->ai_addr, ai->ai_addrlen, host,
sizeof host, serv, sizeof serv, 0) != 0) {
warnx("can't reverse resolve net address for "
"host \"%s\": %s", hostp,
gai_strerror(ecode));
return (0);
}
hostp = host;
}
} else {
hints.ai_flags = 0;
if ((ecode = getaddrinfo(hostp, "nfs", &hints, &ai_nfs)) != 0) {
warnx("can't get net id for host \"%s\": %s", hostp,
gai_strerror(ecode));
return (0);
}
}
#ifdef NFSKERB
if (nfsargsp->flags & NFSMNT_KERB) {
strncpy(inst, hp->h_name, INST_SZ);
inst[INST_SZ - 1] = '\0';
if (cp = strchr(inst, '.'))
*cp = '\0';
}
#endif /* NFSKERB */
if (force2) {
nfsvers = NFS_VER2;
mntvers = RPCMNT_VER1;
} else {
nfsvers = NFS_VER3;
mntvers = RPCMNT_VER3;
}
orgcnt = retrycnt;
nfhret.stat = EACCES; /* Mark not yet successful */
for (ai = ai_nfs; ai; ai = ai->ai_next) {
/*
* XXX. Nead a generic (family, type, proto) -> nconf interface.
* __rpc_*2nconf exist, maybe they should be exported.
*/
if (nfsargsp->sotype == SOCK_STREAM) {
if (ai->ai_family == AF_INET6)
netid = "tcp6";
else
netid = "tcp";
} else {
if (ai->ai_family == AF_INET6)
netid = "udp6";
else
netid = "udp";
}
nconf = getnetconfigent(netid);
tryagain:
retrycnt = orgcnt;
while (retrycnt > 0) {
nfs_nb.buf = &nfs_ss;
nfs_nb.maxlen = sizeof nfs_ss;
if (!rpcb_getaddr(RPCPROG_NFS, nfsvers, nconf, &nfs_nb, hostp)){
if (rpc_createerr.cf_stat == RPC_SYSTEMERROR) {
nfhret.stat = rpc_createerr.cf_error.re_errno;
break;
}
if (rpc_createerr.cf_stat == RPC_UNKNOWNPROTO) {
nfhret.stat = EPROTONOSUPPORT;
break;
}
if ((opflags & ISBGRND) == 0)
clnt_pcreateerror(
"mount_nfs: rpcbind to nfs on server");
} else {
pertry.tv_sec = 10;
pertry.tv_usec = 0;
/*
* XXX relies on clnt_tcp_create to bind to a reserved
* socket.
*/
clp = clnt_tp_create(hostp, RPCPROG_MNT, mntvers,
mnttcp_ok ? nconf : getnetconfigent("udp"));
if (clp == NULL) {
if ((opflags & ISBGRND) == 0) {
clnt_pcreateerror(
"Cannot MNT RPC (mountd)");
}
} else {
CLNT_CONTROL(clp, CLSET_RETRY_TIMEOUT,
(char *)&pertry);
clp->cl_auth = authsys_create_default();
try.tv_sec = 10;
try.tv_usec = 0;
if (nfsargsp->flags & NFSMNT_KERB)
nfhret.auth = RPCAUTH_KERB4;
else
nfhret.auth = RPCAUTH_UNIX;
nfhret.vers = mntvers;
clnt_stat = clnt_call(clp, RPCMNT_MOUNT,
xdr_dir, spec, xdr_fh, &nfhret, try);
switch (clnt_stat) {
case RPC_PROGVERSMISMATCH:
if (nfsvers == NFS_VER3 && !force3) {
nfsvers = NFS_VER2;
mntvers = RPCMNT_VER1;
nfsargsp->flags &=
~NFSMNT_NFSV3;
goto tryagain;
} else {
errx(1, "%s", clnt_sperror(clp,
"MNT RPC"));
}
case RPC_SUCCESS:
auth_destroy(clp->cl_auth);
clnt_destroy(clp);
retrycnt = 0;
break;
default:
/* XXX should give up on some errors */
if ((opflags & ISBGRND) == 0)
warnx("%s", clnt_sperror(clp,
"bad MNT RPC"));
break;
}
}
}
if (--retrycnt > 0) {
if (opflags & BGRND) {
opflags &= ~BGRND;
if ((i = fork()) != 0) {
if (i == -1)
err(1, "nqnfs 2");
exit(0);
}
(void) setsid();
(void) close(STDIN_FILENO);
(void) close(STDOUT_FILENO);
(void) close(STDERR_FILENO);
(void) chdir("/");
opflags |= ISBGRND;
}
sleep(60);
}
}
if (nfhret.stat == 0)
break;
}
freeaddrinfo(ai_nfs);
if (nfhret.stat) {
if (opflags & ISBGRND)
exit(1);
errno = nfhret.stat;
warnx("can't access %s: %s", spec, strerror(nfhret.stat));
return (0);
}
#ifdef ISO
if (isoflag) {
nfsargsp->addr = (struct sockaddr *) &isoaddr;
nfsargsp->addrlen = sizeof (isoaddr);
} else
#endif /* ISO */
{
nfsargsp->addr = (struct sockaddr *) nfs_nb.buf;
nfsargsp->addrlen = nfs_nb.len;
if (port != 0) {
struct sockaddr *sa = nfsargsp->addr;
switch (sa->sa_family) {
case AF_INET:
((struct sockaddr_in *)sa)->sin_port = port;
#ifdef INET6
case AF_INET6:
((struct sockaddr_in6 *)sa)->sin6_port = port;
break;
#endif
default:
errx(1, "Unsupported socket family %d",
sa->sa_family);
}
}
}
nfsargsp->fh = nfhret.nfh;
nfsargsp->fhsize = nfhret.fhsize;
nfsargsp->hostname = nam;
return (1);
}
/*
* xdr routines for mount rpc's
*/
static int
xdr_dir(XDR *xdrsp, char *dirp)
{
return (xdr_string(xdrsp, &dirp, RPCMNT_PATHLEN));
}
static int
xdr_fh(XDR *xdrsp, struct nfhret *np)
{
int i;
long auth, authcnt, authfnd = 0;
if (!xdr_u_long(xdrsp, &np->stat))
return (0);
if (np->stat)
return (1);
switch (np->vers) {
case 1:
np->fhsize = NFSX_V2FH;
return (xdr_opaque(xdrsp, (caddr_t)np->nfh, NFSX_V2FH));
case 3:
if (!xdr_long(xdrsp, &np->fhsize))
return (0);
if (np->fhsize <= 0 || np->fhsize > NFSX_V3FHMAX)
return (0);
if (!xdr_opaque(xdrsp, (caddr_t)np->nfh, np->fhsize))
return (0);
if (!xdr_long(xdrsp, &authcnt))
return (0);
for (i = 0; i < authcnt; i++) {
if (!xdr_long(xdrsp, &auth))
return (0);
if (auth == np->auth)
authfnd++;
}
/*
* Some servers, such as DEC's OSF/1 return a nil authenticator
* list to indicate RPCAUTH_UNIX.
*/
if (!authfnd && (authcnt > 0 || np->auth != RPCAUTH_UNIX))
np->stat = EAUTH;
return (1);
};
return (0);
}