1994-05-26 06:35:07 +00:00
|
|
|
/*
|
|
|
|
* Copyright (c) 1992, 1993, 1994
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* This code is derived from software contributed to Berkeley by
|
|
|
|
* Rick Macklem at The University of Guelph.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
|
|
* must display the following acknowledgement:
|
|
|
|
* This product includes software developed by the University of
|
|
|
|
* California, Berkeley and its contributors.
|
|
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef lint
|
1998-07-06 07:15:53 +00:00
|
|
|
static const char copyright[] =
|
1994-05-26 06:35:07 +00:00
|
|
|
"@(#) Copyright (c) 1992, 1993, 1994\n\
|
|
|
|
The Regents of the University of California. All rights reserved.\n";
|
|
|
|
#endif /* not lint */
|
|
|
|
|
|
|
|
#ifndef lint
|
1998-07-06 07:15:53 +00:00
|
|
|
#if 0
|
1997-03-11 12:40:45 +00:00
|
|
|
static char sccsid[] = "@(#)mount_nfs.c 8.11 (Berkeley) 5/4/95";
|
1998-07-06 07:15:53 +00:00
|
|
|
#endif
|
1996-05-13 17:43:19 +00:00
|
|
|
static const char rcsid[] =
|
1999-08-28 00:22:10 +00:00
|
|
|
"$FreeBSD$";
|
1994-05-26 06:35:07 +00:00
|
|
|
#endif /* not lint */
|
|
|
|
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/mount.h>
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
#include <sys/socket.h>
|
1994-05-26 06:35:07 +00:00
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/syslog.h>
|
|
|
|
|
|
|
|
#include <rpc/rpc.h>
|
|
|
|
#include <rpc/pmap_clnt.h>
|
|
|
|
#include <rpc/pmap_prot.h>
|
|
|
|
|
1995-06-27 11:07:30 +00:00
|
|
|
#ifdef NFSKERB
|
1997-03-11 12:40:45 +00:00
|
|
|
#include <kerberosIV/des.h>
|
1994-05-26 06:35:07 +00:00
|
|
|
#include <kerberosIV/krb.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include <nfs/rpcv2.h>
|
1995-06-27 11:07:30 +00:00
|
|
|
#include <nfs/nfsproto.h>
|
1994-05-26 06:35:07 +00:00
|
|
|
#include <nfs/nfs.h>
|
|
|
|
#include <nfs/nqnfs.h>
|
|
|
|
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
|
|
|
|
#include <ctype.h>
|
|
|
|
#include <err.h>
|
|
|
|
#include <errno.h>
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
#include <fcntl.h>
|
1994-05-26 06:35:07 +00:00
|
|
|
#include <netdb.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <strings.h>
|
1996-05-13 17:43:19 +00:00
|
|
|
#include <sysexits.h>
|
1994-05-26 06:35:07 +00:00
|
|
|
#include <unistd.h>
|
|
|
|
|
|
|
|
#include "mntopts.h"
|
1999-11-22 04:23:11 +00:00
|
|
|
#include "mounttab.h"
|
1994-05-26 06:35:07 +00:00
|
|
|
|
1994-11-01 23:51:53 +00:00
|
|
|
#define ALTF_BG 0x1
|
|
|
|
#define ALTF_NOCONN 0x2
|
|
|
|
#define ALTF_DUMBTIMR 0x4
|
|
|
|
#define ALTF_INTR 0x8
|
|
|
|
#define ALTF_KERB 0x10
|
1995-06-27 11:07:30 +00:00
|
|
|
#define ALTF_NFSV3 0x20
|
|
|
|
#define ALTF_RDIRPLUS 0x40
|
|
|
|
#define ALTF_MNTUDP 0x80
|
1994-11-01 23:51:53 +00:00
|
|
|
#define ALTF_RESVPORT 0x100
|
|
|
|
#define ALTF_SEQPACKET 0x200
|
|
|
|
#define ALTF_NQNFS 0x400
|
|
|
|
#define ALTF_SOFT 0x800
|
|
|
|
#define ALTF_TCP 0x1000
|
1995-06-14 17:41:04 +00:00
|
|
|
#define ALTF_PORT 0x2000
|
1997-04-18 16:23:10 +00:00
|
|
|
#define ALTF_NFSV2 0x4000
|
1998-05-19 07:18:28 +00:00
|
|
|
#define ALTF_ACREGMIN 0x8000
|
|
|
|
#define ALTF_ACREGMAX 0x10000
|
|
|
|
#define ALTF_ACDIRMIN 0x20000
|
|
|
|
#define ALTF_ACDIRMAX 0x40000
|
1994-11-01 23:51:53 +00:00
|
|
|
|
1994-05-26 06:35:07 +00:00
|
|
|
struct mntopt mopts[] = {
|
|
|
|
MOPT_STDOPTS,
|
|
|
|
MOPT_FORCE,
|
|
|
|
MOPT_UPDATE,
|
1997-06-03 13:49:26 +00:00
|
|
|
MOPT_ASYNC,
|
1994-11-01 23:51:53 +00:00
|
|
|
{ "bg", 0, ALTF_BG, 1 },
|
|
|
|
{ "conn", 1, ALTF_NOCONN, 1 },
|
|
|
|
{ "dumbtimer", 0, ALTF_DUMBTIMR, 1 },
|
|
|
|
{ "intr", 0, ALTF_INTR, 1 },
|
1995-06-27 11:07:30 +00:00
|
|
|
#ifdef NFSKERB
|
1994-11-01 23:51:53 +00:00
|
|
|
{ "kerb", 0, ALTF_KERB, 1 },
|
|
|
|
#endif
|
1995-06-27 11:07:30 +00:00
|
|
|
{ "nfsv3", 0, ALTF_NFSV3, 1 },
|
|
|
|
{ "rdirplus", 0, ALTF_RDIRPLUS, 1 },
|
|
|
|
{ "mntudp", 0, ALTF_MNTUDP, 1 },
|
1994-11-01 23:51:53 +00:00
|
|
|
{ "resvport", 0, ALTF_RESVPORT, 1 },
|
|
|
|
{ "nqnfs", 0, ALTF_NQNFS, 1 },
|
|
|
|
{ "soft", 0, ALTF_SOFT, 1 },
|
|
|
|
{ "tcp", 0, ALTF_TCP, 1 },
|
1995-06-14 17:41:04 +00:00
|
|
|
{ "port=", 0, ALTF_PORT, 1 },
|
1997-04-18 16:23:10 +00:00
|
|
|
{ "nfsv2", 0, ALTF_NFSV2, 1 },
|
1998-05-19 07:18:28 +00:00
|
|
|
{ "acregmin=", 0, ALTF_ACREGMIN, 1 },
|
|
|
|
{ "acregmax=", 0, ALTF_ACREGMAX, 1 },
|
|
|
|
{ "acdirmin=", 0, ALTF_ACDIRMIN, 1 },
|
|
|
|
{ "acdirmax=", 0, ALTF_ACDIRMAX, 1 },
|
1994-05-26 06:35:07 +00:00
|
|
|
{ NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
struct nfs_args nfsdefargs = {
|
1997-03-11 12:40:45 +00:00
|
|
|
NFS_ARGSVERSION,
|
1994-05-26 06:35:07 +00:00
|
|
|
(struct sockaddr *)0,
|
|
|
|
sizeof (struct sockaddr_in),
|
|
|
|
SOCK_DGRAM,
|
|
|
|
0,
|
1995-06-27 11:07:30 +00:00
|
|
|
(u_char *)0,
|
|
|
|
0,
|
1997-04-01 17:20:17 +00:00
|
|
|
NFSMNT_RESVPORT,
|
1994-05-26 06:35:07 +00:00
|
|
|
NFS_WSIZE,
|
|
|
|
NFS_RSIZE,
|
1995-06-27 11:07:30 +00:00
|
|
|
NFS_READDIRSIZE,
|
|
|
|
10,
|
1994-05-26 06:35:07 +00:00
|
|
|
NFS_RETRANS,
|
|
|
|
NFS_MAXGRPS,
|
|
|
|
NFS_DEFRAHEAD,
|
|
|
|
NQ_DEFLEASE,
|
|
|
|
NQ_DEADTHRESH,
|
|
|
|
(char *)0,
|
1998-05-19 07:18:28 +00:00
|
|
|
/* args version 4 */
|
|
|
|
NFS_MINATTRTIMO,
|
|
|
|
NFS_MAXATTRTIMO,
|
|
|
|
NFS_MINDIRATTRTIMO,
|
|
|
|
NFS_MAXDIRATTRTIMO,
|
1994-05-26 06:35:07 +00:00
|
|
|
};
|
|
|
|
|
2001-05-13 00:07:03 +00:00
|
|
|
/* Table for af,sotype -> netid conversions. */
|
|
|
|
struct nc_protos {
|
|
|
|
char *netid;
|
|
|
|
int af;
|
|
|
|
int sotype;
|
|
|
|
} nc_protos[] = {
|
|
|
|
{"udp", AF_INET, SOCK_DGRAM},
|
|
|
|
{"tcp", AF_INET, SOCK_STREAM},
|
|
|
|
{"udp6", AF_INET6, SOCK_DGRAM},
|
|
|
|
{"tcp6", AF_INET6, SOCK_STREAM},
|
|
|
|
{NULL}
|
|
|
|
};
|
|
|
|
|
1994-05-26 06:35:07 +00:00
|
|
|
struct nfhret {
|
1995-06-27 11:07:30 +00:00
|
|
|
u_long stat;
|
|
|
|
long vers;
|
|
|
|
long auth;
|
|
|
|
long fhsize;
|
|
|
|
u_char nfh[NFSX_V3FHMAX];
|
1994-05-26 06:35:07 +00:00
|
|
|
};
|
|
|
|
#define DEF_RETRY 10000
|
|
|
|
#define BGRND 1
|
|
|
|
#define ISBGRND 2
|
|
|
|
int retrycnt = DEF_RETRY;
|
|
|
|
int opflags = 0;
|
1995-06-27 11:07:30 +00:00
|
|
|
int nfsproto = IPPROTO_UDP;
|
|
|
|
int mnttcp_ok = 1;
|
2001-04-10 22:05:47 +00:00
|
|
|
char *portspec = NULL; /* Server nfs port; NULL means look up via rpcbind. */
|
|
|
|
enum mountmode {
|
1997-04-18 16:23:10 +00:00
|
|
|
ANY,
|
|
|
|
V2,
|
|
|
|
V3
|
|
|
|
} mountmode = ANY;
|
1994-05-26 06:35:07 +00:00
|
|
|
|
1995-06-27 11:07:30 +00:00
|
|
|
#ifdef NFSKERB
|
1994-05-26 06:35:07 +00:00
|
|
|
char inst[INST_SZ];
|
|
|
|
char realm[REALM_SZ];
|
1995-06-27 11:07:30 +00:00
|
|
|
struct {
|
|
|
|
u_long kind;
|
|
|
|
KTEXT_ST kt;
|
|
|
|
} ktick;
|
|
|
|
struct nfsrpc_nickverf kverf;
|
|
|
|
struct nfsrpc_fullblock kin, kout;
|
|
|
|
NFSKERBKEY_T kivec;
|
|
|
|
CREDENTIALS kcr;
|
|
|
|
struct timeval ktv;
|
|
|
|
NFSKERBKEYSCHED_T kerb_keysched;
|
1994-05-26 06:35:07 +00:00
|
|
|
#endif
|
|
|
|
|
2001-04-10 22:05:47 +00:00
|
|
|
/* Return codes for nfs_tryproto. */
|
|
|
|
enum tryret {
|
|
|
|
TRYRET_SUCCESS,
|
|
|
|
TRYRET_TIMEOUT, /* No response received. */
|
|
|
|
TRYRET_REMOTEERR, /* Error received from remote server. */
|
|
|
|
TRYRET_LOCALERR /* Local failure. */
|
|
|
|
};
|
|
|
|
|
1994-05-26 06:35:07 +00:00
|
|
|
int getnfsargs __P((char *, struct nfs_args *));
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
/* void set_rpc_maxgrouplist __P((int)); */
|
2001-05-13 00:07:03 +00:00
|
|
|
struct netconfig *getnetconf_cached(const char *netid);
|
|
|
|
char *netidbytype(int af, int sotype);
|
1996-09-14 03:00:32 +00:00
|
|
|
void usage __P((void)) __dead2;
|
1994-05-26 06:35:07 +00:00
|
|
|
int xdr_dir __P((XDR *, char *));
|
|
|
|
int xdr_fh __P((XDR *, struct nfhret *));
|
2001-04-10 22:05:47 +00:00
|
|
|
enum tryret nfs_tryproto(struct nfs_args *nfsargsp, struct addrinfo *ai,
|
|
|
|
char *hostp, char *spec, char **errstr);
|
|
|
|
enum tryret returncode(enum clnt_stat stat, struct rpc_err *rpcerr);
|
1994-05-26 06:35:07 +00:00
|
|
|
|
1997-04-02 11:30:44 +00:00
|
|
|
/*
|
|
|
|
* Used to set mount flags with getmntopts. Call with dir=TRUE to
|
1998-07-06 07:15:53 +00:00
|
|
|
* initialize altflags from the current mount flags. Call with
|
1997-04-02 11:30:44 +00:00
|
|
|
* dir=FALSE to update mount flags with the new value of altflags after
|
|
|
|
* the call to getmntopts.
|
|
|
|
*/
|
|
|
|
static void
|
2000-01-28 12:44:50 +00:00
|
|
|
set_flags(int* altflags, int* nfsflags, int dir)
|
1997-04-02 11:30:44 +00:00
|
|
|
{
|
|
|
|
#define F2(af, nf) \
|
|
|
|
if (dir) { \
|
|
|
|
if (*nfsflags & NFSMNT_##nf) \
|
|
|
|
*altflags |= ALTF_##af; \
|
|
|
|
else \
|
|
|
|
*altflags &= ~ALTF_##af; \
|
|
|
|
} else { \
|
|
|
|
if (*altflags & ALTF_##af) \
|
|
|
|
*nfsflags |= NFSMNT_##nf; \
|
|
|
|
else \
|
|
|
|
*nfsflags &= ~NFSMNT_##nf; \
|
|
|
|
}
|
|
|
|
#define F(f) F2(f,f)
|
|
|
|
|
|
|
|
F(NOCONN);
|
|
|
|
F(DUMBTIMR);
|
|
|
|
F2(INTR, INT);
|
|
|
|
#ifdef NFSKERB
|
|
|
|
F(KERB);
|
|
|
|
#endif
|
|
|
|
F(RDIRPLUS);
|
|
|
|
F(RESVPORT);
|
|
|
|
F(NQNFS);
|
|
|
|
F(SOFT);
|
|
|
|
|
|
|
|
#undef F
|
|
|
|
#undef F2
|
|
|
|
}
|
|
|
|
|
1994-05-26 06:35:07 +00:00
|
|
|
int
|
|
|
|
main(argc, argv)
|
|
|
|
int argc;
|
|
|
|
char *argv[];
|
|
|
|
{
|
|
|
|
register int c;
|
|
|
|
register struct nfs_args *nfsargsp;
|
|
|
|
struct nfs_args nfsargs;
|
|
|
|
struct nfsd_cargs ncd;
|
2001-04-10 22:05:47 +00:00
|
|
|
int mntflags, altflags, nfssvc_flag, num;
|
1994-05-26 06:35:07 +00:00
|
|
|
char *name, *p, *spec;
|
1999-10-09 11:54:14 +00:00
|
|
|
char mntpath[MAXPATHLEN];
|
1997-03-11 12:40:45 +00:00
|
|
|
struct vfsconf vfc;
|
|
|
|
int error = 0;
|
1995-06-27 11:07:30 +00:00
|
|
|
#ifdef NFSKERB
|
1994-05-26 06:35:07 +00:00
|
|
|
uid_t last_ruid;
|
|
|
|
|
|
|
|
last_ruid = -1;
|
|
|
|
(void)strcpy(realm, KRB_REALM);
|
1995-06-27 11:07:30 +00:00
|
|
|
if (sizeof (struct nfsrpc_nickverf) != RPCX_NICKVERF ||
|
|
|
|
sizeof (struct nfsrpc_fullblock) != RPCX_FULLBLOCK ||
|
|
|
|
((char *)&ktick.kt) - ((char *)&ktick) != NFSX_UNSIGNED ||
|
|
|
|
((char *)ktick.kt.dat) - ((char *)&ktick) != 2 * NFSX_UNSIGNED)
|
|
|
|
fprintf(stderr, "Yikes! NFSKERB structs not packed!!\n");
|
|
|
|
#endif /* NFSKERB */
|
1994-05-26 06:35:07 +00:00
|
|
|
retrycnt = DEF_RETRY;
|
|
|
|
|
|
|
|
mntflags = 0;
|
1994-11-01 23:51:53 +00:00
|
|
|
altflags = 0;
|
1994-05-26 06:35:07 +00:00
|
|
|
nfsargs = nfsdefargs;
|
|
|
|
nfsargsp = &nfsargs;
|
|
|
|
while ((c = getopt(argc, argv,
|
1997-10-19 16:40:01 +00:00
|
|
|
"23a:bcdD:g:I:iKL:lm:No:PpqR:r:sTt:w:x:U")) != -1)
|
1994-05-26 06:35:07 +00:00
|
|
|
switch (c) {
|
1997-04-18 16:23:10 +00:00
|
|
|
case '2':
|
|
|
|
mountmode = V2;
|
|
|
|
break;
|
1995-06-27 11:07:30 +00:00
|
|
|
case '3':
|
1997-04-18 16:23:10 +00:00
|
|
|
mountmode = V3;
|
1995-06-27 11:07:30 +00:00
|
|
|
break;
|
1994-05-26 06:35:07 +00:00
|
|
|
case 'a':
|
|
|
|
num = strtol(optarg, &p, 10);
|
|
|
|
if (*p || num < 0)
|
|
|
|
errx(1, "illegal -a value -- %s", optarg);
|
|
|
|
nfsargsp->readahead = num;
|
|
|
|
nfsargsp->flags |= NFSMNT_READAHEAD;
|
|
|
|
break;
|
|
|
|
case 'b':
|
|
|
|
opflags |= BGRND;
|
|
|
|
break;
|
|
|
|
case 'c':
|
|
|
|
nfsargsp->flags |= NFSMNT_NOCONN;
|
|
|
|
break;
|
|
|
|
case 'D':
|
|
|
|
num = strtol(optarg, &p, 10);
|
|
|
|
if (*p || num <= 0)
|
|
|
|
errx(1, "illegal -D value -- %s", optarg);
|
|
|
|
nfsargsp->deadthresh = num;
|
|
|
|
nfsargsp->flags |= NFSMNT_DEADTHRESH;
|
|
|
|
break;
|
|
|
|
case 'd':
|
|
|
|
nfsargsp->flags |= NFSMNT_DUMBTIMR;
|
|
|
|
break;
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
#if 0 /* XXXX */
|
1994-05-26 06:35:07 +00:00
|
|
|
case 'g':
|
|
|
|
num = strtol(optarg, &p, 10);
|
|
|
|
if (*p || num <= 0)
|
|
|
|
errx(1, "illegal -g value -- %s", optarg);
|
|
|
|
set_rpc_maxgrouplist(num);
|
|
|
|
nfsargsp->maxgrouplist = num;
|
|
|
|
nfsargsp->flags |= NFSMNT_MAXGRPS;
|
|
|
|
break;
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
#endif
|
1995-06-27 11:07:30 +00:00
|
|
|
case 'I':
|
|
|
|
num = strtol(optarg, &p, 10);
|
|
|
|
if (*p || num <= 0)
|
|
|
|
errx(1, "illegal -I value -- %s", optarg);
|
|
|
|
nfsargsp->readdirsize = num;
|
|
|
|
nfsargsp->flags |= NFSMNT_READDIRSIZE;
|
|
|
|
break;
|
1994-05-26 06:35:07 +00:00
|
|
|
case 'i':
|
|
|
|
nfsargsp->flags |= NFSMNT_INT;
|
|
|
|
break;
|
1995-06-27 11:07:30 +00:00
|
|
|
#ifdef NFSKERB
|
1994-05-26 06:35:07 +00:00
|
|
|
case 'K':
|
|
|
|
nfsargsp->flags |= NFSMNT_KERB;
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
case 'L':
|
|
|
|
num = strtol(optarg, &p, 10);
|
|
|
|
if (*p || num < 2)
|
|
|
|
errx(1, "illegal -L value -- %s", optarg);
|
|
|
|
nfsargsp->leaseterm = num;
|
|
|
|
nfsargsp->flags |= NFSMNT_LEASETERM;
|
|
|
|
break;
|
|
|
|
case 'l':
|
1995-06-27 11:07:30 +00:00
|
|
|
nfsargsp->flags |= NFSMNT_RDIRPLUS;
|
1994-05-26 06:35:07 +00:00
|
|
|
break;
|
1995-06-27 11:07:30 +00:00
|
|
|
#ifdef NFSKERB
|
1994-05-26 06:35:07 +00:00
|
|
|
case 'm':
|
|
|
|
(void)strncpy(realm, optarg, REALM_SZ - 1);
|
|
|
|
realm[REALM_SZ - 1] = '\0';
|
|
|
|
break;
|
|
|
|
#endif
|
1997-10-19 16:40:01 +00:00
|
|
|
case 'N':
|
|
|
|
nfsargsp->flags &= ~NFSMNT_RESVPORT;
|
|
|
|
break;
|
1994-05-26 06:35:07 +00:00
|
|
|
case 'o':
|
1997-04-02 11:30:44 +00:00
|
|
|
altflags = 0;
|
2000-01-28 12:44:50 +00:00
|
|
|
set_flags(&altflags, &nfsargsp->flags, TRUE);
|
1997-04-18 16:23:10 +00:00
|
|
|
if (mountmode == V2)
|
|
|
|
altflags |= ALTF_NFSV2;
|
|
|
|
else if (mountmode == V3)
|
|
|
|
altflags |= ALTF_NFSV3;
|
1994-11-01 23:51:53 +00:00
|
|
|
getmntopts(optarg, mopts, &mntflags, &altflags);
|
2000-01-28 12:44:50 +00:00
|
|
|
set_flags(&altflags, &nfsargsp->flags, FALSE);
|
1997-04-02 11:30:44 +00:00
|
|
|
/*
|
|
|
|
* Handle altflags which don't map directly to
|
|
|
|
* mount flags.
|
|
|
|
*/
|
1994-11-01 23:51:53 +00:00
|
|
|
if(altflags & ALTF_BG)
|
|
|
|
opflags |= BGRND;
|
1995-06-27 11:07:30 +00:00
|
|
|
if(altflags & ALTF_MNTUDP)
|
|
|
|
mnttcp_ok = 0;
|
|
|
|
if(altflags & ALTF_TCP) {
|
1994-11-01 23:51:53 +00:00
|
|
|
nfsargsp->sotype = SOCK_STREAM;
|
1995-06-27 11:07:30 +00:00
|
|
|
nfsproto = IPPROTO_TCP;
|
|
|
|
}
|
2001-04-10 22:05:47 +00:00
|
|
|
if(altflags & ALTF_PORT) {
|
|
|
|
/*
|
|
|
|
* XXX Converting from a string to an int
|
|
|
|
* and back again is silly, and we should
|
|
|
|
* allow /etc/services names.
|
|
|
|
*/
|
|
|
|
asprintf(&portspec, "%d",
|
|
|
|
atoi(strstr(optarg, "port=") + 5));
|
|
|
|
if (portspec == NULL)
|
|
|
|
err(1, "asprintf");
|
|
|
|
}
|
1997-04-18 16:23:10 +00:00
|
|
|
mountmode = ANY;
|
|
|
|
if(altflags & ALTF_NFSV2)
|
|
|
|
mountmode = V2;
|
|
|
|
if(altflags & ALTF_NFSV3)
|
|
|
|
mountmode = V3;
|
1998-05-19 07:18:28 +00:00
|
|
|
if(altflags & ALTF_ACREGMIN)
|
|
|
|
nfsargsp->acregmin = atoi(strstr(optarg,
|
|
|
|
"acregmin=") + 9);
|
|
|
|
if(altflags & ALTF_ACREGMAX)
|
|
|
|
nfsargsp->acregmax = atoi(strstr(optarg,
|
|
|
|
"acregmax=") + 9);
|
|
|
|
if(altflags & ALTF_ACDIRMIN)
|
|
|
|
nfsargsp->acdirmin = atoi(strstr(optarg,
|
|
|
|
"acdirmin=") + 9);
|
|
|
|
if(altflags & ALTF_ACDIRMAX)
|
|
|
|
nfsargsp->acdirmax = atoi(strstr(optarg,
|
|
|
|
"acdirmax=") + 9);
|
1994-05-26 06:35:07 +00:00
|
|
|
break;
|
|
|
|
case 'P':
|
1997-10-19 16:40:01 +00:00
|
|
|
/* obsolete for NFSMNT_RESVPORT, now default */
|
1994-05-26 06:35:07 +00:00
|
|
|
break;
|
|
|
|
case 'q':
|
1997-04-18 16:23:10 +00:00
|
|
|
mountmode = V3;
|
|
|
|
nfsargsp->flags |= NFSMNT_NQNFS;
|
1994-05-26 06:35:07 +00:00
|
|
|
break;
|
|
|
|
case 'R':
|
|
|
|
num = strtol(optarg, &p, 10);
|
|
|
|
if (*p || num <= 0)
|
|
|
|
errx(1, "illegal -R value -- %s", optarg);
|
|
|
|
retrycnt = num;
|
|
|
|
break;
|
|
|
|
case 'r':
|
|
|
|
num = strtol(optarg, &p, 10);
|
|
|
|
if (*p || num <= 0)
|
|
|
|
errx(1, "illegal -r value -- %s", optarg);
|
|
|
|
nfsargsp->rsize = num;
|
|
|
|
nfsargsp->flags |= NFSMNT_RSIZE;
|
|
|
|
break;
|
|
|
|
case 's':
|
|
|
|
nfsargsp->flags |= NFSMNT_SOFT;
|
|
|
|
break;
|
|
|
|
case 'T':
|
|
|
|
nfsargsp->sotype = SOCK_STREAM;
|
1995-06-27 11:07:30 +00:00
|
|
|
nfsproto = IPPROTO_TCP;
|
1994-05-26 06:35:07 +00:00
|
|
|
break;
|
|
|
|
case 't':
|
|
|
|
num = strtol(optarg, &p, 10);
|
|
|
|
if (*p || num <= 0)
|
|
|
|
errx(1, "illegal -t value -- %s", optarg);
|
|
|
|
nfsargsp->timeo = num;
|
|
|
|
nfsargsp->flags |= NFSMNT_TIMEO;
|
|
|
|
break;
|
|
|
|
case 'w':
|
|
|
|
num = strtol(optarg, &p, 10);
|
|
|
|
if (*p || num <= 0)
|
|
|
|
errx(1, "illegal -w value -- %s", optarg);
|
|
|
|
nfsargsp->wsize = num;
|
|
|
|
nfsargsp->flags |= NFSMNT_WSIZE;
|
|
|
|
break;
|
|
|
|
case 'x':
|
|
|
|
num = strtol(optarg, &p, 10);
|
|
|
|
if (*p || num <= 0)
|
|
|
|
errx(1, "illegal -x value -- %s", optarg);
|
|
|
|
nfsargsp->retrans = num;
|
|
|
|
nfsargsp->flags |= NFSMNT_RETRANS;
|
|
|
|
break;
|
1995-06-27 11:07:30 +00:00
|
|
|
case 'U':
|
|
|
|
mnttcp_ok = 0;
|
|
|
|
break;
|
1994-05-26 06:35:07 +00:00
|
|
|
default:
|
|
|
|
usage();
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
argc -= optind;
|
|
|
|
argv += optind;
|
|
|
|
|
1997-03-11 12:40:45 +00:00
|
|
|
if (argc != 2) {
|
1995-01-27 23:24:33 +00:00
|
|
|
usage();
|
1997-03-11 12:40:45 +00:00
|
|
|
/* NOTREACHED */
|
|
|
|
}
|
1994-05-26 06:35:07 +00:00
|
|
|
|
|
|
|
spec = *argv++;
|
|
|
|
name = *argv;
|
|
|
|
|
|
|
|
if (!getnfsargs(spec, nfsargsp))
|
|
|
|
exit(1);
|
1994-09-22 22:17:02 +00:00
|
|
|
|
1999-10-09 11:54:14 +00:00
|
|
|
/* resolve the mountpoint with realpath(3) */
|
|
|
|
(void)checkpath(name, mntpath);
|
|
|
|
|
1997-03-11 12:40:45 +00:00
|
|
|
error = getvfsbyname("nfs", &vfc);
|
|
|
|
if (error && vfsisloadable("nfs")) {
|
1994-09-22 22:17:02 +00:00
|
|
|
if(vfsload("nfs"))
|
1996-05-13 17:43:19 +00:00
|
|
|
err(EX_OSERR, "vfsload(nfs)");
|
1997-03-11 12:40:45 +00:00
|
|
|
endvfsent(); /* clear cache */
|
|
|
|
error = getvfsbyname("nfs", &vfc);
|
1994-09-22 22:17:02 +00:00
|
|
|
}
|
1997-03-11 12:40:45 +00:00
|
|
|
if (error)
|
|
|
|
errx(EX_OSERR, "nfs filesystem is not available");
|
1994-09-22 22:17:02 +00:00
|
|
|
|
1999-10-09 11:54:14 +00:00
|
|
|
if (mount(vfc.vfc_name, mntpath, mntflags, nfsargsp))
|
|
|
|
err(1, "%s", mntpath);
|
1994-05-26 06:35:07 +00:00
|
|
|
if (nfsargsp->flags & (NFSMNT_NQNFS | NFSMNT_KERB)) {
|
|
|
|
if ((opflags & ISBGRND) == 0) {
|
2001-04-10 22:05:47 +00:00
|
|
|
if (daemon(0, 0) != 0)
|
|
|
|
err(1, "daemon");
|
1994-05-26 06:35:07 +00:00
|
|
|
}
|
2001-03-31 20:45:21 +00:00
|
|
|
openlog("mount_nfs", LOG_PID, LOG_DAEMON);
|
1994-05-26 06:35:07 +00:00
|
|
|
nfssvc_flag = NFSSVC_MNTD;
|
1999-10-09 11:54:14 +00:00
|
|
|
ncd.ncd_dirp = mntpath;
|
1994-05-26 06:35:07 +00:00
|
|
|
while (nfssvc(nfssvc_flag, (caddr_t)&ncd) < 0) {
|
|
|
|
if (errno != ENEEDAUTH) {
|
|
|
|
syslog(LOG_ERR, "nfssvc err %m");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
nfssvc_flag =
|
|
|
|
NFSSVC_MNTD | NFSSVC_GOTAUTH | NFSSVC_AUTHINFAIL;
|
1995-06-27 11:07:30 +00:00
|
|
|
#ifdef NFSKERB
|
1994-05-26 06:35:07 +00:00
|
|
|
/*
|
|
|
|
* Set up as ncd_authuid for the kerberos call.
|
|
|
|
* Must set ruid to ncd_authuid and reset the
|
|
|
|
* ticket name iff ncd_authuid is not the same
|
|
|
|
* as last time, so that the right ticket file
|
|
|
|
* is found.
|
1995-06-27 11:07:30 +00:00
|
|
|
* Get the Kerberos credential structure so that
|
1998-07-06 07:15:53 +00:00
|
|
|
* we have the session key and get a ticket for
|
1995-06-27 11:07:30 +00:00
|
|
|
* this uid.
|
|
|
|
* For more info see the IETF Draft "Authentication
|
|
|
|
* in ONC RPC".
|
1994-05-26 06:35:07 +00:00
|
|
|
*/
|
|
|
|
if (ncd.ncd_authuid != last_ruid) {
|
1995-01-30 19:18:11 +00:00
|
|
|
char buf[512];
|
|
|
|
(void)sprintf(buf, "%s%d",
|
|
|
|
TKT_ROOT, ncd.ncd_authuid);
|
|
|
|
krb_set_tkt_string(buf);
|
1994-05-26 06:35:07 +00:00
|
|
|
last_ruid = ncd.ncd_authuid;
|
|
|
|
}
|
1995-06-27 11:07:30 +00:00
|
|
|
setreuid(ncd.ncd_authuid, 0);
|
|
|
|
kret = krb_get_cred(NFS_KERBSRV, inst, realm, &kcr);
|
|
|
|
if (kret == RET_NOTKT) {
|
|
|
|
kret = get_ad_tkt(NFS_KERBSRV, inst, realm,
|
|
|
|
DEFAULT_TKT_LIFE);
|
|
|
|
if (kret == KSUCCESS)
|
|
|
|
kret = krb_get_cred(NFS_KERBSRV, inst, realm,
|
|
|
|
&kcr);
|
1994-05-26 06:35:07 +00:00
|
|
|
}
|
1995-06-27 11:07:30 +00:00
|
|
|
if (kret == KSUCCESS)
|
|
|
|
kret = krb_mk_req(&ktick.kt, NFS_KERBSRV, inst,
|
|
|
|
realm, 0);
|
|
|
|
|
|
|
|
/*
|
1998-07-06 07:15:53 +00:00
|
|
|
* Fill in the AKN_FULLNAME authenticator and verifier.
|
1995-06-27 11:07:30 +00:00
|
|
|
* Along with the Kerberos ticket, we need to build
|
|
|
|
* the timestamp verifier and encrypt it in CBC mode.
|
|
|
|
*/
|
|
|
|
if (kret == KSUCCESS &&
|
|
|
|
ktick.kt.length <= (RPCAUTH_MAXSIZ-3*NFSX_UNSIGNED)
|
|
|
|
&& gettimeofday(&ktv, (struct timezone *)0) == 0) {
|
|
|
|
ncd.ncd_authtype = RPCAUTH_KERB4;
|
|
|
|
ncd.ncd_authstr = (u_char *)&ktick;
|
|
|
|
ncd.ncd_authlen = nfsm_rndup(ktick.kt.length) +
|
|
|
|
3 * NFSX_UNSIGNED;
|
|
|
|
ncd.ncd_verfstr = (u_char *)&kverf;
|
|
|
|
ncd.ncd_verflen = sizeof (kverf);
|
1997-03-11 12:40:45 +00:00
|
|
|
memmove(ncd.ncd_key, kcr.session,
|
1995-06-27 11:07:30 +00:00
|
|
|
sizeof (kcr.session));
|
|
|
|
kin.t1 = htonl(ktv.tv_sec);
|
|
|
|
kin.t2 = htonl(ktv.tv_usec);
|
|
|
|
kin.w1 = htonl(NFS_KERBTTL);
|
|
|
|
kin.w2 = htonl(NFS_KERBTTL - 1);
|
|
|
|
bzero((caddr_t)kivec, sizeof (kivec));
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Encrypt kin in CBC mode using the session
|
|
|
|
* key in kcr.
|
|
|
|
*/
|
|
|
|
XXX
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Finally, fill the timestamp verifier into the
|
|
|
|
* authenticator and verifier.
|
|
|
|
*/
|
|
|
|
ktick.kind = htonl(RPCAKN_FULLNAME);
|
|
|
|
kverf.kind = htonl(RPCAKN_FULLNAME);
|
|
|
|
NFS_KERBW1(ktick.kt) = kout.w1;
|
|
|
|
ktick.kt.length = htonl(ktick.kt.length);
|
|
|
|
kverf.verf.t1 = kout.t1;
|
|
|
|
kverf.verf.t2 = kout.t2;
|
|
|
|
kverf.verf.w2 = kout.w2;
|
|
|
|
nfssvc_flag = NFSSVC_MNTD | NFSSVC_GOTAUTH;
|
|
|
|
}
|
|
|
|
setreuid(0, 0);
|
|
|
|
#endif /* NFSKERB */
|
1994-05-26 06:35:07 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
getnfsargs(spec, nfsargsp)
|
|
|
|
char *spec;
|
|
|
|
struct nfs_args *nfsargsp;
|
|
|
|
{
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
struct addrinfo hints, *ai_nfs, *ai;
|
2001-03-31 20:45:21 +00:00
|
|
|
#ifdef NFSKERB
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
char host[NI_MAXHOST], serv[NI_MAXSERV];
|
2001-03-31 20:45:21 +00:00
|
|
|
#endif
|
2001-04-10 22:05:47 +00:00
|
|
|
enum tryret ret;
|
|
|
|
int ecode, speclen, remoteerr;
|
|
|
|
char *hostp, *delimp, *errstr;
|
1995-06-27 11:07:30 +00:00
|
|
|
#ifdef NFSKERB
|
1994-05-26 06:35:07 +00:00
|
|
|
char *cp;
|
|
|
|
#endif
|
1999-10-30 17:56:47 +00:00
|
|
|
size_t len;
|
1994-05-26 06:35:07 +00:00
|
|
|
static char nam[MNAMELEN + 1];
|
|
|
|
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
if ((delimp = strrchr(spec, ':')) != NULL) {
|
1994-05-26 06:35:07 +00:00
|
|
|
hostp = spec;
|
|
|
|
spec = delimp + 1;
|
1999-10-09 11:54:14 +00:00
|
|
|
} else if ((delimp = strrchr(spec, '@')) != NULL) {
|
|
|
|
warnx("path@server syntax is deprecated, use server:path");
|
|
|
|
hostp = delimp + 1;
|
1994-05-26 06:35:07 +00:00
|
|
|
} else {
|
1999-10-09 11:54:14 +00:00
|
|
|
warnx("no <host>:<dirpath> nfs-name");
|
1994-05-26 06:35:07 +00:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
*delimp = '\0';
|
1999-10-09 11:54:14 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If there has been a trailing slash at mounttime it seems
|
|
|
|
* that some mountd implementations fail to remove the mount
|
|
|
|
* entries from their mountlist while unmounting.
|
|
|
|
*/
|
1999-10-30 17:56:47 +00:00
|
|
|
for (speclen = strlen(spec);
|
|
|
|
speclen > 1 && spec[speclen - 1] == '/';
|
|
|
|
speclen--)
|
1999-10-09 11:54:14 +00:00
|
|
|
spec[speclen - 1] = '\0';
|
|
|
|
if (strlen(hostp) + strlen(spec) + 1 > MNAMELEN) {
|
|
|
|
warnx("%s:%s: %s", hostp, spec, strerror(ENAMETOOLONG));
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
/* Make both '@' and ':' notations equal */
|
1999-10-30 17:56:47 +00:00
|
|
|
if (*hostp != '\0') {
|
|
|
|
len = strlen(hostp);
|
|
|
|
memmove(nam, hostp, len);
|
|
|
|
nam[len] = ':';
|
|
|
|
memmove(nam + len + 1, spec, speclen);
|
|
|
|
nam[len + speclen + 1] = '\0';
|
|
|
|
}
|
1994-05-26 06:35:07 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Handle an internet host address and reverse resolve it if
|
|
|
|
* doing Kerberos.
|
|
|
|
*/
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
memset(&hints, 0, sizeof hints);
|
|
|
|
hints.ai_flags = AI_NUMERICHOST;
|
|
|
|
hints.ai_socktype = nfsargsp->sotype;
|
2001-04-10 22:05:47 +00:00
|
|
|
if (getaddrinfo(hostp, portspec, &hints, &ai_nfs) == 0) {
|
2001-03-31 20:45:21 +00:00
|
|
|
#ifdef NFSKERB
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
if ((nfsargsp->flags & NFSMNT_KERB)) {
|
|
|
|
hints.ai_flags = 0;
|
2001-03-31 20:45:21 +00:00
|
|
|
if (getnameinfo(ai_nfs->ai_addr, ai_nfs->ai_addrlen,
|
|
|
|
host, sizeof host, serv, sizeof serv, 0) != 0) {
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
warnx("can't reverse resolve net address");
|
|
|
|
return (0);
|
|
|
|
}
|
2001-03-31 20:45:21 +00:00
|
|
|
hostp = host;
|
1994-05-26 06:35:07 +00:00
|
|
|
}
|
2001-03-31 20:45:21 +00:00
|
|
|
#endif /* NFSKERB */
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
} else {
|
|
|
|
hints.ai_flags = 0;
|
2001-04-10 22:05:47 +00:00
|
|
|
if ((ecode = getaddrinfo(hostp, portspec, &hints, &ai_nfs))
|
|
|
|
!= 0) {
|
|
|
|
if (portspec == NULL)
|
|
|
|
errx(1, "%s: %s", hostp, gai_strerror(ecode));
|
|
|
|
else
|
|
|
|
errx(1, "%s:%s: %s", hostp, portspec,
|
|
|
|
gai_strerror(ecode));
|
1994-05-26 06:35:07 +00:00
|
|
|
return (0);
|
|
|
|
}
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
}
|
|
|
|
#ifdef NFSKERB
|
|
|
|
if (nfsargsp->flags & NFSMNT_KERB) {
|
1994-05-26 06:35:07 +00:00
|
|
|
strncpy(inst, hp->h_name, INST_SZ);
|
|
|
|
inst[INST_SZ - 1] = '\0';
|
|
|
|
if (cp = strchr(inst, '.'))
|
|
|
|
*cp = '\0';
|
|
|
|
}
|
1995-06-27 11:07:30 +00:00
|
|
|
#endif /* NFSKERB */
|
1994-05-26 06:35:07 +00:00
|
|
|
|
2001-04-10 22:05:47 +00:00
|
|
|
ret = TRYRET_LOCALERR;
|
|
|
|
while (retrycnt > 0) {
|
|
|
|
/*
|
|
|
|
* Try each entry returned by getaddrinfo(). Note the
|
|
|
|
* occurence of remote errors by setting `remoteerr'.
|
|
|
|
*/
|
|
|
|
remoteerr = 0;
|
|
|
|
for (ai = ai_nfs; ai != NULL; ai = ai->ai_next) {
|
|
|
|
ret = nfs_tryproto(nfsargsp, ai, hostp, spec, &errstr);
|
|
|
|
if (ret == TRYRET_SUCCESS)
|
|
|
|
break;
|
|
|
|
if (ret != TRYRET_LOCALERR)
|
|
|
|
remoteerr = 1;
|
|
|
|
if ((opflags & ISBGRND) == 0)
|
|
|
|
fprintf(stderr, "%s\n", errstr);
|
|
|
|
}
|
|
|
|
if (ret == TRYRET_SUCCESS)
|
|
|
|
break;
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
|
|
|
|
/*
|
2001-04-10 22:05:47 +00:00
|
|
|
* Exit on failures if not BGRND mode, or if all errors
|
|
|
|
* were local.
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
*/
|
2001-04-10 22:05:47 +00:00
|
|
|
if ((opflags & BGRND) == 0 || !remoteerr)
|
|
|
|
exit(1);
|
|
|
|
|
|
|
|
if (--retrycnt <= 0)
|
|
|
|
exit(1);
|
|
|
|
|
|
|
|
if ((opflags & (BGRND | ISBGRND)) == BGRND) {
|
|
|
|
warnx("Cannot immediately mount %s:%s, backgrounding",
|
|
|
|
hostp, spec);
|
|
|
|
opflags |= ISBGRND;
|
|
|
|
if (daemon(0, 0) != 0)
|
|
|
|
err(1, "daemon");
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
}
|
2001-04-10 22:05:47 +00:00
|
|
|
sleep(60);
|
|
|
|
}
|
|
|
|
freeaddrinfo(ai_nfs);
|
|
|
|
nfsargsp->hostname = nam;
|
|
|
|
/* Add mounted filesystem to PATH_MOUNTTAB */
|
|
|
|
if (!add_mtab(hostp, spec))
|
|
|
|
warnx("can't update %s for %s:%s", PATH_MOUNTTAB, hostp, spec);
|
|
|
|
return (1);
|
|
|
|
}
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
|
2001-04-10 22:05:47 +00:00
|
|
|
/*
|
|
|
|
* Try to set up the NFS arguments according to the address
|
|
|
|
* family, protocol (and possibly port) specified in `ai'.
|
|
|
|
*
|
|
|
|
* Returns TRYRET_SUCCESS if successful, or:
|
|
|
|
* TRYRET_TIMEOUT The server did not respond.
|
|
|
|
* TRYRET_REMOTEERR The server reported an error.
|
|
|
|
* TRYRET_LOCALERR Local failure.
|
|
|
|
*
|
|
|
|
* In all error cases, *errstr will be set to a statically-allocated string
|
|
|
|
* describing the error.
|
|
|
|
*/
|
|
|
|
enum tryret
|
|
|
|
nfs_tryproto(struct nfs_args *nfsargsp, struct addrinfo *ai, char *hostp,
|
|
|
|
char *spec, char **errstr)
|
|
|
|
{
|
|
|
|
static char errbuf[256];
|
|
|
|
struct sockaddr_storage nfs_ss;
|
|
|
|
struct netbuf nfs_nb;
|
|
|
|
struct nfhret nfhret;
|
|
|
|
struct timeval try;
|
|
|
|
struct rpc_err rpcerr;
|
|
|
|
CLIENT *clp;
|
|
|
|
struct netconfig *nconf, *nconf_mnt;
|
|
|
|
char *netid, *netid_mnt;
|
2001-06-23 19:57:20 +00:00
|
|
|
int doconnect, nfsvers, mntvers;
|
2001-04-10 22:05:47 +00:00
|
|
|
enum clnt_stat stat;
|
|
|
|
enum mountmode trymntmode;
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
|
2001-04-10 22:05:47 +00:00
|
|
|
trymntmode = mountmode;
|
|
|
|
errbuf[0] = '\0';
|
|
|
|
*errstr = errbuf;
|
|
|
|
|
2001-05-13 00:07:03 +00:00
|
|
|
if ((netid = netidbytype(ai->ai_family, nfsargsp->sotype)) == NULL) {
|
|
|
|
snprintf(errbuf, sizeof errbuf,
|
|
|
|
"af %d sotype %d not supported", ai->ai_family,
|
|
|
|
nfsargsp->sotype);
|
|
|
|
return (TRYRET_LOCALERR);
|
|
|
|
}
|
|
|
|
if ((nconf = getnetconf_cached(netid)) == NULL) {
|
2001-04-10 22:05:47 +00:00
|
|
|
snprintf(errbuf, sizeof errbuf, "%s: %s", netid, nc_sperror());
|
|
|
|
return (TRYRET_LOCALERR);
|
|
|
|
}
|
|
|
|
/* The RPCPROG_MNT netid may be different. */
|
|
|
|
if (mnttcp_ok) {
|
2001-04-11 00:21:16 +00:00
|
|
|
netid_mnt = netid;
|
2001-04-10 22:05:47 +00:00
|
|
|
nconf_mnt = nconf;
|
|
|
|
} else {
|
2001-05-13 00:07:03 +00:00
|
|
|
if ((netid_mnt = netidbytype(ai->ai_family, SOCK_DGRAM))
|
|
|
|
== NULL) {
|
|
|
|
snprintf(errbuf, sizeof errbuf,
|
|
|
|
"af %d sotype SOCK_DGRAM not supported",
|
|
|
|
ai->ai_family);
|
|
|
|
return (TRYRET_LOCALERR);
|
|
|
|
}
|
|
|
|
if ((nconf_mnt = getnetconf_cached(netid_mnt)) == NULL) {
|
2001-04-11 00:21:16 +00:00
|
|
|
snprintf(errbuf, sizeof errbuf, "%s: %s", netid_mnt,
|
2001-04-10 22:05:47 +00:00
|
|
|
nc_sperror());
|
|
|
|
return (TRYRET_LOCALERR);
|
2001-03-31 20:45:21 +00:00
|
|
|
}
|
2001-04-10 22:05:47 +00:00
|
|
|
}
|
2001-04-11 00:21:16 +00:00
|
|
|
|
2001-04-10 22:05:47 +00:00
|
|
|
tryagain:
|
|
|
|
if (trymntmode == V2) {
|
|
|
|
nfsvers = 2;
|
|
|
|
mntvers = 1;
|
|
|
|
} else {
|
|
|
|
nfsvers = 3;
|
|
|
|
mntvers = 3;
|
|
|
|
}
|
2001-03-31 20:45:21 +00:00
|
|
|
|
2001-04-10 22:05:47 +00:00
|
|
|
if (portspec != NULL) {
|
|
|
|
/* `ai' contains the complete nfsd sockaddr. */
|
|
|
|
nfs_nb.buf = ai->ai_addr;
|
|
|
|
nfs_nb.len = nfs_nb.maxlen = ai->ai_addrlen;
|
|
|
|
} else {
|
|
|
|
/* Ask the remote rpcbind. */
|
|
|
|
nfs_nb.buf = &nfs_ss;
|
|
|
|
nfs_nb.len = nfs_nb.maxlen = sizeof nfs_ss;
|
|
|
|
|
|
|
|
if (!rpcb_getaddr(RPCPROG_NFS, nfsvers, nconf, &nfs_nb,
|
|
|
|
hostp)) {
|
|
|
|
if (rpc_createerr.cf_stat == RPC_PROGVERSMISMATCH &&
|
|
|
|
trymntmode == ANY) {
|
|
|
|
trymntmode = V2;
|
|
|
|
goto tryagain;
|
1994-05-26 06:35:07 +00:00
|
|
|
}
|
2001-04-10 22:05:47 +00:00
|
|
|
snprintf(errbuf, sizeof errbuf, "[%s] %s:%s: %s",
|
|
|
|
netid, hostp, spec,
|
|
|
|
clnt_spcreateerror("RPCPROG_NFS"));
|
|
|
|
return (returncode(rpc_createerr.cf_stat,
|
|
|
|
&rpc_createerr.cf_error));
|
2001-03-31 20:45:21 +00:00
|
|
|
}
|
2001-04-10 22:05:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Check that the server (nfsd) responds on the port we have chosen. */
|
|
|
|
clp = clnt_tli_create(RPC_ANYFD, nconf, &nfs_nb, RPCPROG_NFS, nfsvers,
|
|
|
|
0, 0);
|
|
|
|
if (clp == NULL) {
|
|
|
|
snprintf(errbuf, sizeof errbuf, "[%s] %s:%s: %s", netid,
|
|
|
|
hostp, spec, clnt_spcreateerror("nfsd: RPCPROG_NFS"));
|
|
|
|
return (returncode(rpc_createerr.cf_stat,
|
|
|
|
&rpc_createerr.cf_error));
|
|
|
|
}
|
2001-06-23 19:57:20 +00:00
|
|
|
if (nfsargsp->sotype == SOCK_DGRAM) {
|
|
|
|
/*
|
|
|
|
* Use connect(), to match what the kernel does. This
|
|
|
|
* catches cases where the server responds from the
|
|
|
|
* wrong source address.
|
|
|
|
*/
|
|
|
|
doconnect = 1;
|
|
|
|
if (!clnt_control(clp, CLSET_CONNECT, (char *)&doconnect)) {
|
|
|
|
clnt_destroy(clp);
|
|
|
|
snprintf(errbuf, sizeof errbuf,
|
|
|
|
"[%s] %s:%s: CLSET_CONNECT failed", netid, hostp,
|
|
|
|
spec);
|
|
|
|
return (TRYRET_LOCALERR);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2001-04-10 22:05:47 +00:00
|
|
|
try.tv_sec = 10;
|
|
|
|
try.tv_usec = 0;
|
|
|
|
stat = clnt_call(clp, NFSPROC_NULL, xdr_void, NULL, xdr_void, NULL,
|
|
|
|
try);
|
|
|
|
if (stat != RPC_SUCCESS) {
|
|
|
|
if (stat == RPC_PROGVERSMISMATCH && trymntmode == ANY) {
|
|
|
|
clnt_destroy(clp);
|
|
|
|
trymntmode = V2;
|
|
|
|
goto tryagain;
|
1994-05-26 06:35:07 +00:00
|
|
|
}
|
2001-04-10 22:05:47 +00:00
|
|
|
clnt_geterr(clp, &rpcerr);
|
|
|
|
snprintf(errbuf, sizeof errbuf, "[%s] %s:%s: %s", netid,
|
|
|
|
hostp, spec, clnt_sperror(clp, "NFSPROC_NULL"));
|
|
|
|
clnt_destroy(clp);
|
|
|
|
return (returncode(stat, &rpcerr));
|
1994-05-26 06:35:07 +00:00
|
|
|
}
|
2001-04-10 22:05:47 +00:00
|
|
|
clnt_destroy(clp);
|
|
|
|
|
|
|
|
/* Send the RPCMNT_MOUNT RPC to get the root filehandle. */
|
|
|
|
try.tv_sec = 10;
|
|
|
|
try.tv_usec = 0;
|
|
|
|
clp = clnt_tp_create(hostp, RPCPROG_MNT, mntvers, nconf_mnt);
|
|
|
|
if (clp == NULL) {
|
2001-04-11 00:21:16 +00:00
|
|
|
snprintf(errbuf, sizeof errbuf, "[%s] %s:%s: %s", netid_mnt,
|
2001-04-10 22:05:47 +00:00
|
|
|
hostp, spec, clnt_spcreateerror("RPCMNT: clnt_create"));
|
|
|
|
return (returncode(rpc_createerr.cf_stat,
|
|
|
|
&rpc_createerr.cf_error));
|
1994-05-26 06:35:07 +00:00
|
|
|
}
|
2001-04-10 22:05:47 +00:00
|
|
|
clp->cl_auth = authsys_create_default();
|
|
|
|
if (nfsargsp->flags & NFSMNT_KERB)
|
|
|
|
nfhret.auth = RPCAUTH_KERB4;
|
|
|
|
else
|
|
|
|
nfhret.auth = RPCAUTH_UNIX;
|
|
|
|
nfhret.vers = mntvers;
|
|
|
|
stat = clnt_call(clp, RPCMNT_MOUNT, xdr_dir, spec, xdr_fh, &nfhret,
|
|
|
|
try);
|
|
|
|
auth_destroy(clp->cl_auth);
|
|
|
|
if (stat != RPC_SUCCESS) {
|
|
|
|
if (stat == RPC_PROGVERSMISMATCH && trymntmode == ANY) {
|
|
|
|
clnt_destroy(clp);
|
|
|
|
trymntmode = V2;
|
|
|
|
goto tryagain;
|
|
|
|
}
|
|
|
|
clnt_geterr(clp, &rpcerr);
|
2001-04-11 00:21:16 +00:00
|
|
|
snprintf(errbuf, sizeof errbuf, "[%s] %s:%s: %s", netid_mnt,
|
2001-04-10 22:05:47 +00:00
|
|
|
hostp, spec, clnt_sperror(clp, "RPCPROG_MNT"));
|
|
|
|
clnt_destroy(clp);
|
|
|
|
return (returncode(stat, &rpcerr));
|
1994-05-26 06:35:07 +00:00
|
|
|
}
|
2001-04-10 22:05:47 +00:00
|
|
|
clnt_destroy(clp);
|
|
|
|
|
|
|
|
if (nfhret.stat != 0) {
|
2001-04-11 00:21:16 +00:00
|
|
|
snprintf(errbuf, sizeof errbuf, "[%s] %s:%s: %s", netid_mnt,
|
2001-04-10 22:05:47 +00:00
|
|
|
hostp, spec, strerror(nfhret.stat));
|
|
|
|
return (TRYRET_REMOTEERR);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Store the filehandle and server address in nfsargsp, making
|
|
|
|
* sure to copy any locally allocated structures.
|
|
|
|
*/
|
|
|
|
nfsargsp->addrlen = nfs_nb.len;
|
|
|
|
nfsargsp->addr = malloc(nfsargsp->addrlen);
|
1995-06-27 11:07:30 +00:00
|
|
|
nfsargsp->fhsize = nfhret.fhsize;
|
2001-04-10 22:05:47 +00:00
|
|
|
nfsargsp->fh = malloc(nfsargsp->fhsize);
|
|
|
|
if (nfsargsp->addr == NULL || nfsargsp->fh == NULL)
|
|
|
|
err(1, "malloc");
|
|
|
|
bcopy(nfs_nb.buf, nfsargsp->addr, nfsargsp->addrlen);
|
|
|
|
bcopy(nfhret.nfh, nfsargsp->fh, nfsargsp->fhsize);
|
|
|
|
|
|
|
|
if (nfsvers == 3)
|
|
|
|
nfsargsp->flags |= NFSMNT_NFSV3;
|
|
|
|
else
|
|
|
|
nfsargsp->flags &= ~NFSMNT_NFSV3;
|
|
|
|
|
|
|
|
return (TRYRET_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Catagorise a RPC return status and error into an `enum tryret'
|
|
|
|
* return code.
|
|
|
|
*/
|
|
|
|
enum tryret
|
|
|
|
returncode(enum clnt_stat stat, struct rpc_err *rpcerr)
|
|
|
|
{
|
|
|
|
switch (stat) {
|
|
|
|
case RPC_TIMEDOUT:
|
|
|
|
return (TRYRET_TIMEOUT);
|
|
|
|
case RPC_PMAPFAILURE:
|
|
|
|
case RPC_PROGNOTREGISTERED:
|
|
|
|
case RPC_PROGVERSMISMATCH:
|
2001-06-23 19:57:20 +00:00
|
|
|
/* XXX, these can be local or remote. */
|
|
|
|
case RPC_CANTSEND:
|
|
|
|
case RPC_CANTRECV:
|
2001-04-10 22:05:47 +00:00
|
|
|
return (TRYRET_REMOTEERR);
|
|
|
|
case RPC_SYSTEMERROR:
|
|
|
|
switch (rpcerr->re_errno) {
|
|
|
|
case ETIMEDOUT:
|
|
|
|
return (TRYRET_TIMEOUT);
|
|
|
|
case ENOMEM:
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return (TRYRET_REMOTEERR);
|
|
|
|
}
|
|
|
|
/* FALLTHROUGH */
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return (TRYRET_LOCALERR);
|
1994-05-26 06:35:07 +00:00
|
|
|
}
|
|
|
|
|
2001-05-13 00:07:03 +00:00
|
|
|
/*
|
|
|
|
* Look up a netid based on an address family and socket type.
|
|
|
|
* `af' is the address family, and `sotype' is SOCK_DGRAM or SOCK_STREAM.
|
|
|
|
*
|
|
|
|
* XXX there should be a library function for this.
|
|
|
|
*/
|
|
|
|
char *
|
|
|
|
netidbytype(int af, int sotype) {
|
|
|
|
struct nc_protos *p;
|
|
|
|
|
|
|
|
for (p = nc_protos; p->netid != NULL; p++) {
|
|
|
|
if (af != p->af || sotype != p->sotype)
|
|
|
|
continue;
|
|
|
|
return (p->netid);
|
|
|
|
}
|
|
|
|
return (NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Look up a netconfig entry based on a netid, and cache the result so
|
|
|
|
* that we don't need to remember to call freenetconfigent().
|
|
|
|
*
|
|
|
|
* Otherwise it behaves just like getnetconfigent(), so nc_*error()
|
|
|
|
* work on failure.
|
|
|
|
*/
|
|
|
|
struct netconfig *
|
|
|
|
getnetconf_cached(const char *netid) {
|
|
|
|
static struct nc_entry {
|
|
|
|
struct netconfig *nconf;
|
|
|
|
struct nc_entry *next;
|
|
|
|
} *head;
|
|
|
|
struct nc_entry *p;
|
|
|
|
struct netconfig *nconf;
|
|
|
|
|
|
|
|
for (p = head; p != NULL; p = p->next)
|
|
|
|
if (strcmp(netid, p->nconf->nc_netid) == 0)
|
|
|
|
return (p->nconf);
|
|
|
|
|
|
|
|
if ((nconf = getnetconfigent(netid)) == NULL)
|
|
|
|
return (NULL);
|
|
|
|
if ((p = malloc(sizeof(*p))) == NULL)
|
|
|
|
err(1, "malloc");
|
|
|
|
p->nconf = nconf;
|
|
|
|
p->next = head;
|
|
|
|
head = p;
|
|
|
|
|
|
|
|
return (p->nconf);
|
|
|
|
}
|
|
|
|
|
1994-05-26 06:35:07 +00:00
|
|
|
/*
|
|
|
|
* xdr routines for mount rpc's
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
xdr_dir(xdrsp, dirp)
|
|
|
|
XDR *xdrsp;
|
|
|
|
char *dirp;
|
|
|
|
{
|
|
|
|
return (xdr_string(xdrsp, &dirp, RPCMNT_PATHLEN));
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
xdr_fh(xdrsp, np)
|
|
|
|
XDR *xdrsp;
|
1995-06-27 11:07:30 +00:00
|
|
|
register struct nfhret *np;
|
1994-05-26 06:35:07 +00:00
|
|
|
{
|
1995-06-27 11:07:30 +00:00
|
|
|
register int i;
|
|
|
|
long auth, authcnt, authfnd = 0;
|
|
|
|
|
|
|
|
if (!xdr_u_long(xdrsp, &np->stat))
|
1994-05-26 06:35:07 +00:00
|
|
|
return (0);
|
|
|
|
if (np->stat)
|
|
|
|
return (1);
|
1995-06-27 11:07:30 +00:00
|
|
|
switch (np->vers) {
|
|
|
|
case 1:
|
|
|
|
np->fhsize = NFSX_V2FH;
|
|
|
|
return (xdr_opaque(xdrsp, (caddr_t)np->nfh, NFSX_V2FH));
|
|
|
|
case 3:
|
|
|
|
if (!xdr_long(xdrsp, &np->fhsize))
|
|
|
|
return (0);
|
|
|
|
if (np->fhsize <= 0 || np->fhsize > NFSX_V3FHMAX)
|
|
|
|
return (0);
|
|
|
|
if (!xdr_opaque(xdrsp, (caddr_t)np->nfh, np->fhsize))
|
|
|
|
return (0);
|
|
|
|
if (!xdr_long(xdrsp, &authcnt))
|
|
|
|
return (0);
|
|
|
|
for (i = 0; i < authcnt; i++) {
|
|
|
|
if (!xdr_long(xdrsp, &auth))
|
|
|
|
return (0);
|
|
|
|
if (auth == np->auth)
|
|
|
|
authfnd++;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Some servers, such as DEC's OSF/1 return a nil authenticator
|
|
|
|
* list to indicate RPCAUTH_UNIX.
|
|
|
|
*/
|
|
|
|
if (!authfnd && (authcnt > 0 || np->auth != RPCAUTH_UNIX))
|
|
|
|
np->stat = EAUTH;
|
|
|
|
return (1);
|
|
|
|
};
|
|
|
|
return (0);
|
1994-05-26 06:35:07 +00:00
|
|
|
}
|
|
|
|
|
1996-09-14 03:00:32 +00:00
|
|
|
void
|
1994-05-26 06:35:07 +00:00
|
|
|
usage()
|
|
|
|
{
|
1998-07-06 07:15:53 +00:00
|
|
|
(void)fprintf(stderr, "%s\n%s\n%s\n%s\n",
|
|
|
|
"usage: mount_nfs [-23KNPTUbcdilqs] [-D deadthresh] [-I readdirsize]",
|
|
|
|
" [-L leaseterm] [-R retrycnt] [-a maxreadahead]",
|
|
|
|
" [-g maxgroups] [-m realm] [-o options] [-r readsize]",
|
|
|
|
" [-t timeout] [-w writesize] [-x retrans] rhost:path node");
|
1994-05-26 06:35:07 +00:00
|
|
|
exit(1);
|
|
|
|
}
|