xref: /openbsd/sbin/nfsd/nfsd.c (revision db3296cf)
1 /*	$OpenBSD: nfsd.c,v 1.21 2003/06/02 20:06:16 millert Exp $	*/
2 /*	$NetBSD: nfsd.c,v 1.19 1996/02/18 23:18:56 mycroft Exp $	*/
3 
4 /*
5  * Copyright (c) 1989, 1993, 1994
6  *	The Regents of the University of California.  All rights reserved.
7  *
8  * This code is derived from software contributed to Berkeley by
9  * Rick Macklem at The University of Guelph.
10  *
11  * Redistribution and use in source and binary forms, with or without
12  * modification, are permitted provided that the following conditions
13  * are met:
14  * 1. Redistributions of source code must retain the above copyright
15  *    notice, this list of conditions and the following disclaimer.
16  * 2. Redistributions in binary form must reproduce the above copyright
17  *    notice, this list of conditions and the following disclaimer in the
18  *    documentation and/or other materials provided with the distribution.
19  * 3. Neither the name of the University nor the names of its contributors
20  *    may be used to endorse or promote products derived from this software
21  *    without specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  */
35 
36 #ifndef lint
37 static char copyright[] =
38 "@(#) Copyright (c) 1989, 1993, 1994\n\
39 	The Regents of the University of California.  All rights reserved.\n";
40 #endif /* not lint */
41 
42 #ifndef lint
43 #if 0
44 static char sccsid[] = "@(#)nfsd.c	8.9 (Berkeley) 3/29/95";
45 #else
46 static char rcsid[] = "$NetBSD: nfsd.c,v 1.19 1996/02/18 23:18:56 mycroft Exp $";
47 #endif
48 #endif /* not lint */
49 
50 #include <sys/param.h>
51 #include <sys/ioctl.h>
52 #include <sys/stat.h>
53 #include <sys/wait.h>
54 #include <sys/uio.h>
55 #include <sys/ucred.h>
56 #include <sys/mount.h>
57 #include <sys/socket.h>
58 #include <sys/socketvar.h>
59 
60 #include <rpc/rpc.h>
61 #include <rpc/pmap_clnt.h>
62 #include <rpc/pmap_prot.h>
63 
64 #ifdef ISO
65 #include <netiso/iso.h>
66 #endif
67 #include <nfs/rpcv2.h>
68 #include <nfs/nfsproto.h>
69 #include <nfs/nfs.h>
70 
71 #include <err.h>
72 #include <errno.h>
73 #include <fcntl.h>
74 #include <grp.h>
75 #include <pwd.h>
76 #include <signal.h>
77 #include <stdio.h>
78 #include <stdlib.h>
79 #include <string.h>
80 #include <syslog.h>
81 #include <unistd.h>
82 
83 /* Global defs */
84 #ifdef DEBUG
85 #define	syslog(e, s)	fprintf(stderr,(s))
86 int	debug = 1;
87 #else
88 int	debug = 0;
89 #endif
90 
91 struct	nfsd_srvargs nsd;
92 
93 void	nonfs(int);
94 void	reapchild(int);
95 void	usage(void);
96 
97 /*
98  * Nfs server daemon mostly just a user context for nfssvc()
99  *
100  * 1 - do file descriptor and signal cleanup
101  * 2 - fork the nfsd(s)
102  * 3 - create server socket(s)
103  * 4 - register socket with portmap
104  *
105  * For connectionless protocols, just pass the socket into the kernel via.
106  * nfssvc().
107  * For connection based sockets, loop doing accepts. When you get a new
108  * socket from accept, pass the msgsock into the kernel via. nfssvc().
109  * The arguments are:
110  *	-c - support iso cltp clients
111  *	-r - reregister with portmapper
112  *	-t - support tcp nfs clients
113  *	-u - support udp nfs clients
114  * followed by "n" which is the number of nfsds' to fork off
115  */
116 int
117 main(int argc, char *argv[])
118 {
119 	struct nfsd_args nfsdargs;
120 	struct sockaddr_in inetaddr, inetpeer;
121 #ifdef ISO
122 	struct sockaddr_iso isoaddr, isopeer;
123 #endif
124 	fd_set ready, sockbits;
125 	int ch, cltpflag, connect_type_cnt, i, maxsock = 0, msgsock;
126 	int nfsdcnt, nfssvc_flag, on, reregister, sock, tcpflag, tcpsock;
127 	int tp4cnt, tpipcnt, udpflag;
128 	socklen_t len;
129 
130 #define	MAXNFSDCNT	20
131 #define	DEFNFSDCNT	 4
132 	nfsdcnt = DEFNFSDCNT;
133 	cltpflag = reregister = tcpflag = tp4cnt = tpipcnt = 0;
134 	tcpsock = udpflag = 0;
135 #ifdef ISO
136 #define	GETOPT	"cn:rtu"
137 #define	USAGE	"[-crtu] [-n num_servers]"
138 #else
139 #define	GETOPT	"n:rtu"
140 #define	USAGE	"[-rtu] [-n num_servers]"
141 #endif
142 	while ((ch = getopt(argc, argv, GETOPT)) != -1)
143 		switch (ch) {
144 		case 'n':
145 			nfsdcnt = atoi(optarg);
146 			if (nfsdcnt < 1 || nfsdcnt > MAXNFSDCNT) {
147 				warnx("nfsd count %d; reset to %d",
148 				    nfsdcnt, DEFNFSDCNT);
149 				nfsdcnt = DEFNFSDCNT;
150 			}
151 			break;
152 		case 'r':
153 			reregister = 1;
154 			break;
155 		case 't':
156 			tcpflag = 1;
157 			break;
158 		case 'u':
159 			udpflag = 1;
160 			break;
161 #ifdef ISO
162 		case 'c':
163 			cltpflag = 1;
164 			break;
165 #ifdef notyet
166 		case 'i':
167 			tp4cnt = 1;
168 			break;
169 		case 'p':
170 			tpipcnt = 1;
171 			break;
172 #endif /* notyet */
173 #endif /* ISO */
174 		default:
175 		case '?':
176 			usage();
177 		};
178 	argv += optind;
179 	argc -= optind;
180 
181 	/*
182 	 * XXX
183 	 * Backward compatibility, trailing number is the count of daemons.
184 	 */
185 	if (argc > 1)
186 		usage();
187 	if (argc == 1) {
188 		nfsdcnt = atoi(argv[0]);
189 		if (nfsdcnt < 1 || nfsdcnt > MAXNFSDCNT) {
190 			warnx("nfsd count %d; reset to %d",
191 			    nfsdcnt, DEFNFSDCNT);
192 			nfsdcnt = DEFNFSDCNT;
193 		}
194 	}
195 
196 	if (debug == 0) {
197 		daemon(0, 0);
198 		(void)signal(SIGHUP, SIG_IGN);
199 		(void)signal(SIGINT, SIG_IGN);
200 		(void)signal(SIGQUIT, SIG_IGN);
201 		(void)signal(SIGSYS, nonfs);
202 	}
203 	(void)signal(SIGCHLD, reapchild);
204 
205 	if (reregister) {
206 		if (udpflag &&
207 		    (!pmap_set(RPCPROG_NFS, 2, IPPROTO_UDP, NFS_PORT) ||
208 		     !pmap_set(RPCPROG_NFS, 3, IPPROTO_UDP, NFS_PORT)))
209 			err(1, "can't register with portmap for UDP.");
210 		if (tcpflag &&
211 		    (!pmap_set(RPCPROG_NFS, 2, IPPROTO_TCP, NFS_PORT) ||
212 		     !pmap_set(RPCPROG_NFS, 3, IPPROTO_TCP, NFS_PORT)))
213 			err(1, "can't register with portmap for TCP.");
214 		return (0);
215 	}
216 	openlog("nfsd:", LOG_PID, LOG_DAEMON);
217 
218 	for (i = 0; i < nfsdcnt; i++) {
219 		switch (fork()) {
220 		case -1:
221 			syslog(LOG_ERR, "fork: %m");
222 			return (1);
223 		case 0:
224 			break;
225 		default:
226 			continue;
227 		}
228 
229 		setproctitle("server");
230 		nfssvc_flag = NFSSVC_NFSD;
231 		nsd.nsd_nfsd = NULL;
232 		while (nfssvc(nfssvc_flag, &nsd) < 0) {
233 			if (errno != ENEEDAUTH) {
234 				syslog(LOG_ERR, "nfssvc: %m");
235 				return (1);
236 			}
237 			nfssvc_flag = NFSSVC_NFSD | NFSSVC_AUTHINFAIL;
238 		}
239 		return (0);
240 	}
241 
242 	/* If we are serving udp, set up the socket. */
243 	if (udpflag) {
244 		if ((sock = socket(AF_INET, SOCK_DGRAM, 0)) < 0) {
245 			syslog(LOG_ERR, "can't create udp socket");
246 			return (1);
247 		}
248 		memset(&inetaddr, 0, sizeof inetaddr);
249 		inetaddr.sin_family = AF_INET;
250 		inetaddr.sin_addr.s_addr = INADDR_ANY;
251 		inetaddr.sin_port = htons(NFS_PORT);
252 		inetaddr.sin_len = sizeof(inetaddr);
253 		if (bind(sock,
254 		    (struct sockaddr *)&inetaddr, sizeof(inetaddr)) < 0) {
255 			syslog(LOG_ERR, "can't bind udp addr");
256 			return (1);
257 		}
258 		if (!pmap_set(RPCPROG_NFS, 2, IPPROTO_UDP, NFS_PORT) ||
259 		    !pmap_set(RPCPROG_NFS, 3, IPPROTO_UDP, NFS_PORT)) {
260 			syslog(LOG_ERR, "can't register with udp portmap");
261 			return (1);
262 		}
263 		nfsdargs.sock = sock;
264 		nfsdargs.name = NULL;
265 		nfsdargs.namelen = 0;
266 		if (nfssvc(NFSSVC_ADDSOCK, &nfsdargs) < 0) {
267 			syslog(LOG_ERR, "can't Add UDP socket");
268 			return (1);
269 		}
270 		(void)close(sock);
271 	}
272 
273 #ifdef ISO
274 	/* If we are serving cltp, set up the socket. */
275 	if (cltpflag) {
276 		if ((sock = socket(AF_ISO, SOCK_DGRAM, 0)) < 0) {
277 			syslog(LOG_ERR, "can't create cltp socket");
278 			return (1);
279 		}
280 		memset(&isoaddr, 0, sizeof(isoaddr));
281 		isoaddr.siso_family = AF_ISO;
282 		isoaddr.siso_tlen = 2;
283 		cp = TSEL(&isoaddr);
284 		*cp++ = (NFS_PORT >> 8);
285 		*cp = (NFS_PORT & 0xff);
286 		isoaddr.siso_len = sizeof(isoaddr);
287 		if (bind(sock,
288 		    (struct sockaddr *)&isoaddr, sizeof(isoaddr)) < 0) {
289 			syslog(LOG_ERR, "can't bind cltp addr");
290 			return (1);
291 		}
292 #ifdef notyet
293 		/*
294 		 * XXX
295 		 * Someday this should probably use "rpcbind", the son of
296 		 * portmap.
297 		 */
298 		if (!pmap_set(RPCPROG_NFS, NFS_VER2, IPPROTO_UDP, NFS_PORT)) {
299 			syslog(LOG_ERR, "can't register with udp portmap");
300 			return (1);
301 		}
302 #endif /* notyet */
303 		nfsdargs.sock = sock;
304 		nfsdargs.name = NULL;
305 		nfsdargs.namelen = 0;
306 		if (nfssvc(NFSSVC_ADDSOCK, &nfsdargs) < 0) {
307 			syslog(LOG_ERR, "can't add UDP socket");
308 			return (1);
309 		}
310 		close(sock);
311 	}
312 #endif /* ISO */
313 
314 	/* Now set up the master server socket waiting for tcp connections. */
315 	on = 1;
316 	FD_ZERO(&sockbits);
317 	connect_type_cnt = 0;
318 	if (tcpflag) {
319 		if ((tcpsock = socket(AF_INET, SOCK_STREAM, 0)) < 0) {
320 			syslog(LOG_ERR, "can't create tcp socket");
321 			return (1);
322 		}
323 		if (setsockopt(tcpsock,
324 		    SOL_SOCKET, SO_REUSEADDR, (char *)&on, sizeof(on)) < 0)
325 			syslog(LOG_ERR, "setsockopt SO_REUSEADDR: %m");
326 		memset(&inetaddr, 0, sizeof inetaddr);
327 		inetaddr.sin_family = AF_INET;
328 		inetaddr.sin_addr.s_addr = INADDR_ANY;
329 		inetaddr.sin_port = htons(NFS_PORT);
330 		inetaddr.sin_len = sizeof(inetaddr);
331 		if (bind(tcpsock,
332 		    (struct sockaddr *)&inetaddr, sizeof (inetaddr)) < 0) {
333 			syslog(LOG_ERR, "can't bind tcp addr");
334 			return (1);
335 		}
336 		if (listen(tcpsock, 5) < 0) {
337 			syslog(LOG_ERR, "listen failed");
338 			return (1);
339 		}
340 		if (!pmap_set(RPCPROG_NFS, 2, IPPROTO_TCP, NFS_PORT) ||
341 		    !pmap_set(RPCPROG_NFS, 3, IPPROTO_TCP, NFS_PORT)) {
342 			syslog(LOG_ERR, "can't register tcp with portmap");
343 			return (1);
344 		}
345 		FD_SET(tcpsock, &sockbits);
346 		maxsock = tcpsock;
347 		connect_type_cnt++;
348 	}
349 
350 #ifdef notyet
351 	/* Now set up the master server socket waiting for tp4 connections. */
352 	if (tp4flag) {
353 		if ((tp4sock = socket(AF_ISO, SOCK_SEQPACKET, 0)) < 0) {
354 			syslog(LOG_ERR, "can't create tp4 socket");
355 			return (1);
356 		}
357 		if (setsockopt(tp4sock,
358 		    SOL_SOCKET, SO_REUSEADDR, (char *)&on, sizeof(on)) < 0)
359 			syslog(LOG_ERR, "setsockopt SO_REUSEADDR: %m");
360 		memset(&isoaddr, 0, sizeof(isoaddr));
361 		isoaddr.siso_family = AF_ISO;
362 		isoaddr.siso_tlen = 2;
363 		cp = TSEL(&isoaddr);
364 		*cp++ = (NFS_PORT >> 8);
365 		*cp = (NFS_PORT & 0xff);
366 		isoaddr.siso_len = sizeof(isoaddr);
367 		if (bind(tp4sock,
368 		    (struct sockaddr *)&isoaddr, sizeof(isoaddr)) < 0) {
369 			syslog(LOG_ERR, "can't bind tp4 addr");
370 			return (1);
371 		}
372 		if (listen(tp4sock, 5) < 0) {
373 			syslog(LOG_ERR, "listen failed");
374 			return (1);
375 		}
376 		/*
377 		 * XXX
378 		 * Someday this should probably use "rpcbind", the son of
379 		 * portmap.
380 		 */
381 		if (!pmap_set(RPCPROG_NFS, NFS_VER2, IPPROTO_TCP, NFS_PORT)) {
382 			syslog(LOG_ERR, "can't register tcp with portmap");
383 			return (1);
384 		}
385 		FD_SET(tp4sock, &sockbits);
386 		maxsock = tp4sock;
387 		connect_type_cnt++;
388 	}
389 
390 	/* Now set up the master server socket waiting for tpip connections. */
391 	if (tpipflag) {
392 		if ((tpipsock = socket(AF_INET, SOCK_SEQPACKET, 0)) < 0) {
393 			syslog(LOG_ERR, "can't create tpip socket");
394 			return (1);
395 		}
396 		if (setsockopt(tpipsock,
397 		    SOL_SOCKET, SO_REUSEADDR, (char *)&on, sizeof(on)) < 0)
398 			syslog(LOG_ERR, "setsockopt SO_REUSEADDR: %m");
399 		memset(&inetaddr, 0, sizeof inetaddr);
400 		inetaddr.sin_family = AF_INET;
401 		inetaddr.sin_addr.s_addr = INADDR_ANY;
402 		inetaddr.sin_port = htons(NFS_PORT);
403 		inetaddr.sin_len = sizeof(inetaddr);
404 		if (bind(tpipsock,
405 		    (struct sockaddr *)&inetaddr, sizeof (inetaddr)) < 0) {
406 			syslog(LOG_ERR, "can't bind tcp addr");
407 			return (1);
408 		}
409 		if (listen(tpipsock, 5) < 0) {
410 			syslog(LOG_ERR, "listen failed");
411 			return (1);
412 		}
413 		/*
414 		 * XXX
415 		 * Someday this should probably use "rpcbind", the son of
416 		 * portmap.
417 		 */
418 		if (!pmap_set(RPCPROG_NFS, NFS_VER2, IPPROTO_TCP, NFS_PORT)) {
419 			syslog(LOG_ERR, "can't register tcp with portmap");
420 			return (1);
421 		}
422 		FD_SET(tpipsock, &sockbits);
423 		maxsock = tpipsock;
424 		connect_type_cnt++;
425 	}
426 #endif /* notyet */
427 
428 	if (connect_type_cnt == 0)
429 		return (0);
430 
431 	setproctitle("master");
432 
433 	/*
434 	 * Loop forever accepting connections and passing the sockets
435 	 * into the kernel for the mounts.
436 	 */
437 	for (;;) {
438 		ready = sockbits;
439 		if (connect_type_cnt > 1) {
440 			if (select(maxsock + 1,
441 			    &ready, NULL, NULL, NULL) < 1) {
442 				syslog(LOG_ERR, "select failed: %m");
443 				return (1);
444 			}
445 		}
446 		if (tcpflag && FD_ISSET(tcpsock, &ready)) {
447 			len = sizeof(inetpeer);
448 			if ((msgsock = accept(tcpsock,
449 			    (struct sockaddr *)&inetpeer, &len)) < 0) {
450 				syslog(LOG_ERR, "accept failed: %m");
451 				return (1);
452 			}
453 			memset(inetpeer.sin_zero, 0, sizeof(inetpeer.sin_zero));
454 			if (setsockopt(msgsock, SOL_SOCKET,
455 			    SO_KEEPALIVE, (char *)&on, sizeof(on)) < 0)
456 				syslog(LOG_ERR,
457 				    "setsockopt SO_KEEPALIVE: %m");
458 			nfsdargs.sock = msgsock;
459 			nfsdargs.name = (caddr_t)&inetpeer;
460 			nfsdargs.namelen = sizeof(inetpeer);
461 			nfssvc(NFSSVC_ADDSOCK, &nfsdargs);
462 			(void)close(msgsock);
463 		}
464 #ifdef notyet
465 		if (tp4flag && FD_ISSET(tp4sock, &ready)) {
466 			len = sizeof(isopeer);
467 			if ((msgsock = accept(tp4sock,
468 			    (struct sockaddr *)&isopeer, &len)) < 0) {
469 				syslog(LOG_ERR, "accept failed: %m");
470 				return (1);
471 			}
472 			if (setsockopt(msgsock, SOL_SOCKET,
473 			    SO_KEEPALIVE, (char *)&on, sizeof(on)) < 0)
474 				syslog(LOG_ERR,
475 				    "setsockopt SO_KEEPALIVE: %m");
476 			nfsdargs.sock = msgsock;
477 			nfsdargs.name = (caddr_t)&isopeer;
478 			nfsdargs.namelen = len;
479 			nfssvc(NFSSVC_ADDSOCK, &nfsdargs);
480 			(void)close(msgsock);
481 		}
482 		if (tpipflag && FD_ISSET(tpipsock, &ready)) {
483 			len = sizeof(inetpeer);
484 			if ((msgsock = accept(tpipsock,
485 			    (struct sockaddr *)&inetpeer, &len)) < 0) {
486 				syslog(LOG_ERR, "Accept failed: %m");
487 				return (1);
488 			}
489 			if (setsockopt(msgsock, SOL_SOCKET,
490 			    SO_KEEPALIVE, (char *)&on, sizeof(on)) < 0)
491 				syslog(LOG_ERR, "setsockopt SO_KEEPALIVE: %m");
492 			nfsdargs.sock = msgsock;
493 			nfsdargs.name = (caddr_t)&inetpeer;
494 			nfsdargs.namelen = len;
495 			nfssvc(NFSSVC_ADDSOCK, &nfsdargs);
496 			(void)close(msgsock);
497 		}
498 #endif /* notyet */
499 	}
500 }
501 
502 void
503 usage(void)
504 {
505 	(void)fprintf(stderr, "usage: nfsd %s\n", USAGE);
506 	exit(1);
507 }
508 
509 void
510 nonfs(int signo)
511 {
512 	int save_errno = errno;
513 	struct syslog_data sdata = SYSLOG_DATA_INIT;
514 
515 	syslog_r(LOG_ERR, &sdata, "missing system call: NFS not available.");
516 	errno = save_errno;
517 }
518 
519 void
520 reapchild(int signo)
521 {
522 	int save_errno = errno;
523 
524 	while (wait3(NULL, WNOHANG, NULL) > 0)
525 		;
526 	errno = save_errno;
527 }
528