2 * network.c -- Provide common network functions for NFS mount/umount
4 * Copyright (C) 2007 Oracle. All rights reserved.
5 * Copyright (C) 2007 Chuck Lever <chuck.lever@oracle.com>
7 * This program is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU General Public
9 * License as published by the Free Software Foundation; either
10 * version 2 of the License, or (at your option) any later version.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License for more details.
17 * You should have received a copy of the GNU General Public
18 * License along with this program; if not, write to the
19 * Free Software Foundation, Inc., 59 Temple Place - Suite 330,
20 * Boston, MA 021110-1307, USA.
33 #include <rpc/pmap_prot.h>
34 #include <rpc/pmap_clnt.h>
35 #include <sys/socket.h>
41 #include "nfs_mount.h"
42 #include "mount_constants.h"
45 #ifdef HAVE_RPCSVC_NFS_PROT_H
46 #include <rpcsvc/nfs_prot.h>
48 #include <linux/nfs.h>
49 #define nfsstat nfs_stat
56 #if SIZEOF_SOCKLEN_T - 0 == 0
57 #define socklen_t unsigned int
60 extern int nfs_mount_data_version;
61 extern char *progname;
64 static const unsigned long nfs_to_mnt[] = {
71 static const unsigned long mnt_to_nfs[] = {
79 * Map an NFS version into the corresponding Mountd version
81 unsigned long nfsvers_to_mnt(const unsigned long vers)
84 return nfs_to_mnt[vers];
89 * Map a Mountd version into the corresponding NFS version
91 static unsigned long mntvers_to_nfs(const unsigned long vers)
94 return mnt_to_nfs[vers];
98 static const unsigned int probe_udp_only[] = {
103 static const unsigned int probe_udp_first[] = {
109 static const unsigned int probe_tcp_first[] = {
115 static const unsigned long probe_nfs2_only[] = {
120 static const unsigned long probe_nfs3_first[] = {
126 static const unsigned long probe_mnt1_first[] = {
132 static const unsigned long probe_mnt3_first[] = {
139 int nfs_gethostbyname(const char *hostname, struct sockaddr_in *saddr)
143 saddr->sin_family = AF_INET;
144 if (!inet_aton(hostname, &saddr->sin_addr)) {
145 if ((hp = gethostbyname(hostname)) == NULL) {
146 nfs_error(_("%s: can't get address for %s\n"),
150 if (hp->h_length > sizeof(*saddr)) {
151 nfs_error(_("%s: got bad hp->h_length\n"),
153 hp->h_length = sizeof(*saddr);
155 memcpy(&saddr->sin_addr, hp->h_addr, hp->h_length);
162 * getport() is very similar to pmap_getport() with the exception that
163 * this version tries to use an ephemeral port, since reserved ports are
164 * not needed for GETPORT queries. This conserves the very limited
165 * reserved port space, which helps reduce failed socket binds
166 * during mount storms.
168 * A side effect of calling this function is that rpccreateerr is set.
170 static unsigned short getport(struct sockaddr_in *saddr,
171 unsigned long program,
172 unsigned long version,
175 unsigned short port = 0;
180 saddr->sin_port = htons(PMAPPORT);
183 * Try to get a socket with a non-privileged port.
184 * clnt*create() will create one anyway if this
187 socket = get_socket(saddr, proto, FALSE, FALSE);
188 if (socket == RPC_ANYSOCK) {
189 if (proto == IPPROTO_TCP && errno == ETIMEDOUT) {
191 * TCP SYN timed out, so exit now.
193 rpc_createerr.cf_stat = RPC_TIMEDOUT;
200 clnt = clntudp_bufcreate(saddr,
202 RETRY_TIMEOUT, &socket,
207 clnt = clnttcp_create(saddr, PMAPPROG, PMAPVERS, &socket,
208 RPCSMALLMSGSIZE, RPCSMALLMSGSIZE);
212 struct pmap parms = {
218 stat = clnt_call(clnt, PMAPPROC_GETPORT,
219 (xdrproc_t)xdr_pmap, (caddr_t)&parms,
220 (xdrproc_t)xdr_u_short, (caddr_t)&port,
223 clnt_geterr(clnt, &rpc_createerr.cf_error);
224 rpc_createerr.cf_stat = stat;
227 if (stat != RPC_SUCCESS)
230 rpc_createerr.cf_stat = RPC_PROGNOTREGISTERED;
239 * Use the portmapper to discover whether or not the service we want is
240 * available. The lists 'versions' and 'protos' define ordered sequences
241 * of service versions and udp/tcp protocols to probe for.
243 static int probe_port(clnt_addr_t *server, const unsigned long *versions,
244 const unsigned int *protos)
246 struct sockaddr_in *saddr = &server->saddr;
247 struct pmap *pmap = &server->pmap;
248 const unsigned long prog = pmap->pm_prog, *p_vers;
249 const unsigned int prot = (u_int)pmap->pm_prot, *p_prot;
250 const u_short port = (u_short) pmap->pm_port;
251 unsigned long vers = pmap->pm_vers;
252 unsigned short p_port;
254 p_prot = prot ? &prot : protos;
255 p_vers = vers ? &vers : versions;
256 rpc_createerr.cf_stat = 0;
258 saddr->sin_port = htons(PMAPPORT);
259 p_port = getport(saddr, prog, *p_vers, *p_prot);
261 if (!port || port == p_port) {
262 saddr->sin_port = htons(p_port);
264 printf(_("%s: trying %s prog %ld vers "
265 "%ld prot %s port %d\n"),
267 inet_ntoa(saddr->sin_addr),
269 *p_prot == IPPROTO_UDP ?
273 if (clnt_ping(saddr, prog, *p_vers, *p_prot, NULL))
275 if (rpc_createerr.cf_stat == RPC_TIMEDOUT)
279 if (rpc_createerr.cf_stat != RPC_PROGNOTREGISTERED)
287 if (vers == pmap->pm_vers) {
291 if (vers || !*++p_vers)
300 pmap->pm_vers = *p_vers;
302 pmap->pm_prot = *p_prot;
304 pmap->pm_port = p_port;
305 rpc_createerr.cf_stat = 0;
309 static int probe_nfsport(clnt_addr_t *nfs_server)
311 struct pmap *pmap = &nfs_server->pmap;
313 if (pmap->pm_vers && pmap->pm_prot && pmap->pm_port)
316 if (nfs_mount_data_version >= 4)
317 return probe_port(nfs_server, probe_nfs3_first, probe_tcp_first);
319 return probe_port(nfs_server, probe_nfs2_only, probe_udp_only);
322 static int probe_mntport(clnt_addr_t *mnt_server)
324 struct pmap *pmap = &mnt_server->pmap;
326 if (pmap->pm_vers && pmap->pm_prot && pmap->pm_port)
329 if (nfs_mount_data_version >= 4)
330 return probe_port(mnt_server, probe_mnt3_first, probe_udp_first);
332 return probe_port(mnt_server, probe_mnt1_first, probe_udp_only);
335 int probe_bothports(clnt_addr_t *mnt_server, clnt_addr_t *nfs_server)
337 struct pmap *nfs_pmap = &nfs_server->pmap;
338 struct pmap *mnt_pmap = &mnt_server->pmap;
339 struct pmap save_nfs, save_mnt;
341 const unsigned long *probe_vers;
343 if (mnt_pmap->pm_vers && !nfs_pmap->pm_vers)
344 nfs_pmap->pm_vers = mntvers_to_nfs(mnt_pmap->pm_vers);
345 else if (nfs_pmap->pm_vers && !mnt_pmap->pm_vers)
346 mnt_pmap->pm_vers = nfsvers_to_mnt(nfs_pmap->pm_vers);
347 if (nfs_pmap->pm_vers)
350 memcpy(&save_nfs, nfs_pmap, sizeof(save_nfs));
351 memcpy(&save_mnt, mnt_pmap, sizeof(save_mnt));
352 probe_vers = (nfs_mount_data_version >= 4) ?
353 probe_mnt3_first : probe_mnt1_first;
355 for (; *probe_vers; probe_vers++) {
356 nfs_pmap->pm_vers = mntvers_to_nfs(*probe_vers);
357 if ((res = probe_nfsport(nfs_server) != 0)) {
358 mnt_pmap->pm_vers = nfsvers_to_mnt(nfs_pmap->pm_vers);
359 if ((res = probe_mntport(mnt_server)) != 0)
361 memcpy(mnt_pmap, &save_mnt, sizeof(*mnt_pmap));
363 switch (rpc_createerr.cf_stat) {
364 case RPC_PROGVERSMISMATCH:
365 case RPC_PROGNOTREGISTERED:
370 memcpy(nfs_pmap, &save_nfs, sizeof(*nfs_pmap));
377 if (!probe_nfsport(nfs_server))
379 return probe_mntport(mnt_server);
382 static int probe_statd(void)
384 struct sockaddr_in addr;
387 memset(&addr, 0, sizeof(addr));
388 addr.sin_family = AF_INET;
389 addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
390 port = getport(&addr, 100024, 1, IPPROTO_UDP);
394 addr.sin_port = htons(port);
396 if (clnt_ping(&addr, 100024, 1, IPPROTO_UDP, NULL) <= 0)
403 * Attempt to start rpc.statd
405 int start_statd(void)
415 if (stat(START_STATD, &stb) == 0) {
416 if (S_ISREG(stb.st_mode) && (stb.st_mode & S_IXUSR)) {
428 * nfs_call_umount - ask the server to remove a share from it's rmtab
429 * @mnt_server: address of RPC MNT program server
430 * @argp: directory path of share to "unmount"
432 * Returns one if the unmount call succeeded; zero if the unmount
433 * failed for any reason.
435 * Note that a side effect of calling this function is that rpccreateerr
438 int nfs_call_umount(clnt_addr_t *mnt_server, dirpath *argp)
441 enum clnt_stat res = 0;
444 switch (mnt_server->pmap.pm_vers) {
448 if (!probe_mntport(mnt_server))
450 clnt = mnt_openclnt(mnt_server, &msock);
453 res = clnt_call(clnt, MOUNTPROC_UMNT,
454 (xdrproc_t)xdr_dirpath, (caddr_t)argp,
455 (xdrproc_t)xdr_void, NULL,
457 mnt_closeclnt(clnt, msock);
458 if (res == RPC_SUCCESS)
466 if (res == RPC_SUCCESS)
471 CLIENT *mnt_openclnt(clnt_addr_t *mnt_server, int *msock)
473 struct sockaddr_in *mnt_saddr = &mnt_server->saddr;
474 struct pmap *mnt_pmap = &mnt_server->pmap;
477 mnt_saddr->sin_port = htons((u_short)mnt_pmap->pm_port);
478 *msock = get_socket(mnt_saddr, mnt_pmap->pm_prot, TRUE, FALSE);
479 if (*msock == RPC_ANYSOCK) {
480 if (rpc_createerr.cf_error.re_errno == EADDRINUSE)
482 * Probably in-use by a TIME_WAIT connection,
483 * It is worth waiting a while and trying again.
485 rpc_createerr.cf_stat = RPC_TIMEDOUT;
489 switch (mnt_pmap->pm_prot) {
491 clnt = clntudp_bufcreate(mnt_saddr,
492 mnt_pmap->pm_prog, mnt_pmap->pm_vers,
493 RETRY_TIMEOUT, msock,
494 MNT_SENDBUFSIZE, MNT_RECVBUFSIZE);
497 clnt = clnttcp_create(mnt_saddr,
498 mnt_pmap->pm_prog, mnt_pmap->pm_vers,
500 MNT_SENDBUFSIZE, MNT_RECVBUFSIZE);
504 /* try to mount hostname:dirname */
505 clnt->cl_auth = authunix_create_default();
511 void mnt_closeclnt(CLIENT *clnt, int msock)
513 auth_destroy(clnt->cl_auth);
519 * Sigh... getport() doesn't actually check the version number.
520 * In order to make sure that the server actually supports the service
521 * we're requesting, we open and RPC client, and fire off a NULL
524 int clnt_ping(struct sockaddr_in *saddr, const unsigned long prog,
525 const unsigned long vers, const unsigned int prot,
526 struct sockaddr_in *caddr)
530 static char clnt_res;
531 struct sockaddr dissolve;
533 rpc_createerr.cf_stat = stat = errno = 0;
534 sock = get_socket(saddr, prot, FALSE, TRUE);
535 if (sock == RPC_ANYSOCK) {
536 if (errno == ETIMEDOUT) {
538 * TCP timeout. Bubble up the error to see
539 * how it should be handled.
541 rpc_createerr.cf_stat = RPC_TIMEDOUT;
547 /* Get the address of our end of this connection */
548 socklen_t len = sizeof(*caddr);
549 if (getsockname(sock, caddr, &len) != 0)
550 caddr->sin_family = 0;
555 /* The socket is connected (so we could getsockname successfully),
556 * but some servers on multi-homed hosts reply from
557 * the wrong address, so if we stay connected, we lose the reply.
559 dissolve.sa_family = AF_UNSPEC;
560 connect(sock, &dissolve, sizeof(dissolve));
562 clnt = clntudp_bufcreate(saddr, prog, vers,
563 RETRY_TIMEOUT, &sock,
564 RPCSMALLMSGSIZE, RPCSMALLMSGSIZE);
567 clnt = clnttcp_create(saddr, prog, vers, &sock,
568 RPCSMALLMSGSIZE, RPCSMALLMSGSIZE);
575 memset(&clnt_res, 0, sizeof(clnt_res));
576 stat = clnt_call(clnt, NULLPROC,
577 (xdrproc_t)xdr_void, (caddr_t)NULL,
578 (xdrproc_t)xdr_void, (caddr_t)&clnt_res,
581 clnt_geterr(clnt, &rpc_createerr.cf_error);
582 rpc_createerr.cf_stat = stat;
587 if (stat == RPC_SUCCESS)