X-Git-Url: https://git.decadent.org.uk/gitweb/?p=nfs-utils.git;a=blobdiff_plain;f=utils%2Fstatd%2Fsm-notify.c;h=5a023949191ad160e1edb8f57a06f97b7cf445df;hp=7af0ceacd0c68957fd47a2e095d39d938f13e6f2;hb=37130ec4041bd703d706207d77b4398ea252be5a;hpb=33cfd406a19a38bc10a977109bd2baaed1228a79 diff --git a/utils/statd/sm-notify.c b/utils/statd/sm-notify.c index 7af0cea..5a02394 100644 --- a/utils/statd/sm-notify.c +++ b/utils/statd/sm-notify.c @@ -4,6 +4,10 @@ * Copyright (C) 2004-2006 Olaf Kirch */ +#ifdef HAVE_CONFIG_H +#include +#endif + #include #include #include @@ -22,14 +26,24 @@ #include #include #include +#include #ifndef BASEDIR -#define BASEDIR "/var/lib/nfs" +# ifdef NFS_STATEDIR +# define BASEDIR NFS_STATEDIR +# else +# define BASEDIR "/var/lib/nfs" +# endif #endif -#define _SM_STATE_PATH BASEDIR "/state" -#define _SM_DIR_PATH BASEDIR "/sm" -#define _SM_BAK_PATH _SM_DIR_PATH ".bak" +#define DEFAULT_SM_STATE_PATH BASEDIR "/state" +#define DEFAULT_SM_DIR_PATH BASEDIR "/sm" +#define DEFAULT_SM_BAK_PATH DEFAULT_SM_DIR_PATH ".bak" + +char *_SM_BASE_PATH = BASEDIR; +char *_SM_STATE_PATH = DEFAULT_SM_STATE_PATH; +char *_SM_DIR_PATH = DEFAULT_SM_DIR_PATH; +char *_SM_BAK_PATH = DEFAULT_SM_BAK_PATH; #define NSM_PROG 100024 #define NSM_PROGRAM 100024 @@ -46,6 +60,7 @@ struct nsm_host { char * name; char * path; nsm_address addr; + struct addrinfo *ai; time_t last_used; time_t send_next; unsigned int timeout; @@ -65,17 +80,19 @@ static int log_syslog = 0; static unsigned int nsm_get_state(int); static void notify(void); -static void notify_host(int, struct nsm_host *); +static int notify_host(int, struct nsm_host *); static void recv_reply(int); static void backup_hosts(const char *, const char *); static void get_hosts(const char *); static void insert_host(struct nsm_host *); struct nsm_host * find_host(uint32_t); -static int addr_parse(int, const char *, nsm_address *); static int addr_get_port(nsm_address *); static void addr_set_port(nsm_address *, int); -static int host_lookup(int, const char *, nsm_address *); +static struct addrinfo *host_lookup(int, const char *); void nsm_log(int fac, const char *fmt, ...); +static int record_pid(void); +static void drop_privs(void); +static void set_kernel_nsm_state(int state); static struct nsm_host * hosts = NULL; @@ -83,9 +100,13 @@ int main(int argc, char **argv) { int c; + int force = 0; - while ((c = getopt(argc, argv, "dm:np:v:q")) != -1) { + while ((c = getopt(argc, argv, "dm:np:v:qP:f")) != -1) { switch (c) { + case 'f': + force = 1; + break; case 'd': opt_debug++; break; @@ -104,16 +125,41 @@ main(int argc, char **argv) case 'q': opt_quiet = 1; break; + case 'P': + _SM_BASE_PATH = strdup(optarg); + _SM_STATE_PATH = malloc(strlen(optarg)+1+sizeof("state")); + _SM_DIR_PATH = malloc(strlen(optarg)+1+sizeof("sm")); + _SM_BAK_PATH = malloc(strlen(optarg)+1+sizeof("sm.bak")); + if (_SM_BASE_PATH == NULL || + _SM_STATE_PATH == NULL || + _SM_DIR_PATH == NULL || + _SM_BAK_PATH == NULL) { + nsm_log(LOG_WARNING, "unable to allocate memory"); + exit(1); + } + strcat(strcpy(_SM_STATE_PATH, _SM_BASE_PATH), "/state"); + strcat(strcpy(_SM_DIR_PATH, _SM_BASE_PATH), "/sm"); + strcat(strcpy(_SM_BAK_PATH, _SM_BASE_PATH), "/sm.bak"); + break; + default: goto usage; } } if (optind < argc) { -usage: fprintf(stderr, "sm-notify [-d]\n"); +usage: fprintf(stderr, + "Usage: sm-notify [-dfq] [-m max-retry-minutes] [-p srcport]\n" + " [-P /path/to/state/directory] [-v my_host_name]\n"); return 1; } + if (strcmp(_SM_BASE_PATH, BASEDIR) == 0) { + if (record_pid() == 0 && force == 0 && opt_update_state == 1) + /* already run, don't try again */ + exit(0); + } + if (opt_srcaddr) { strncpy(nsm_hostname, opt_srcaddr, sizeof(nsm_hostname)-1); } else @@ -125,6 +171,10 @@ usage: fprintf(stderr, "sm-notify [-d]\n"); backup_hosts(_SM_DIR_PATH, _SM_BAK_PATH); get_hosts(_SM_BAK_PATH); + /* Get and update the NSM state. This will call sync() */ + nsm_state = nsm_get_state(opt_update_state); + set_kernel_nsm_state(nsm_state); + if (!opt_debug) { if (!opt_quiet) printf("Backgrounding to notify hosts...\n"); @@ -143,9 +193,6 @@ usage: fprintf(stderr, "sm-notify [-d]\n"); close(2); } - /* Get and update the NSM state. This will call sync() */ - nsm_state = nsm_get_state(opt_update_state); - notify(); if (hosts) { @@ -172,7 +219,9 @@ notify(void) nsm_address local_addr; time_t failtime = 0; int sock = -1; + int retry_cnt = 0; + retry: sock = socket(AF_INET, SOCK_DGRAM, 0); if (sock < 0) { perror("socket"); @@ -185,13 +234,14 @@ notify(void) /* Bind source IP if provided on command line */ if (opt_srcaddr) { - if (!addr_parse(AF_INET, opt_srcaddr, &local_addr) - && !host_lookup(AF_INET, opt_srcaddr, &local_addr)) { + struct addrinfo *ai = host_lookup(AF_INET, opt_srcaddr); + if (!ai) { nsm_log(LOG_WARNING, "Not a valid hostname or address: \"%s\"\n", opt_srcaddr); exit(1); } + memcpy(&local_addr, ai->ai_addr, ai->ai_addrlen); /* We know it's IPv4 at this point */ } @@ -204,12 +254,23 @@ notify(void) exit(1); } } else { - (void) bindresvport(sock, (struct sockaddr_in *) &local_addr); + struct servent *se; + struct sockaddr_in *sin = (struct sockaddr_in *)&local_addr; + (void) bindresvport(sock, sin); + /* try to avoid known ports */ + se = getservbyport(sin->sin_port, "udp"); + if (se && retry_cnt < 100) { + retry_cnt++; + close(sock); + goto retry; + } } if (opt_max_retry) failtime = time(NULL) + opt_max_retry; + drop_privs(); + while (hosts) { struct pollfd pfd; time_t now = time(NULL); @@ -220,7 +281,7 @@ notify(void) if (failtime && now >= failtime) break; - while ((wait = hosts->send_next - now) <= 0) { + while (hosts && ((wait = hosts->send_next - now) <= 0)) { /* Never send more than 10 packets at once */ if (sent++ >= 10) break; @@ -229,7 +290,13 @@ notify(void) hp = hosts; hosts = hp->next; - notify_host(sock, hp); + if (notify_host(sock, hp)){ + unlink(hp->path); + free(hp->name); + free(hp->path); + free(hp); + continue; + } /* Set the timeout for this call, using an exponential timeout strategy */ @@ -241,6 +308,8 @@ notify(void) insert_host(hp); } + if (hosts == NULL) + return; nsm_log(LOG_DEBUG, "Host %s due in %ld seconds", hosts->name, wait); @@ -261,7 +330,7 @@ notify(void) /* * Send notification to a single host */ -void +int notify_host(int sock, struct nsm_host *host) { static unsigned int xid = 0; @@ -274,6 +343,16 @@ notify_host(int sock, struct nsm_host *host) if (!host->xid) host->xid = xid++; + if (host->ai == NULL) { + host->ai = host_lookup(AF_UNSPEC, host->name); + if (host->ai == NULL) { + nsm_log(LOG_WARNING, + "%s doesn't seem to be a valid address," + " skipped", host->name); + return 1; + } + } + memset(msgbuf, 0, sizeof(msgbuf)); p = msgbuf; *p++ = htonl(host->xid); @@ -281,9 +360,24 @@ notify_host(int sock, struct nsm_host *host) *p++ = htonl(2); /* If we retransmitted 4 times, reset the port to force - * a new portmap lookup (in case statd was restarted) + * a new portmap lookup (in case statd was restarted). + * We also rotate through multiple IP addresses at this + * point. */ if (host->retries >= 4) { + struct addrinfo *first = host->ai; + struct addrinfo **next = &host->ai; + + /* remove the first entry from the list */ + host->ai = first->ai_next; + first->ai_next = NULL; + /* find the end of the list */ + next = &first->ai_next; + while ( *next ) + next = & (*next)->ai_next; + /* put first entry at end */ + *next = first; + memcpy(&host->addr, first->ai_addr, first->ai_addrlen); addr_set_port(&host->addr, 0); host->retries = 0; } @@ -327,7 +421,11 @@ notify_host(int sock, struct nsm_host *host) } len = (p - msgbuf) << 2; - sendto(sock, msgbuf, len, 0, (struct sockaddr *) &dest, sizeof(dest)); + if (sendto(sock, msgbuf, len, 0, (struct sockaddr *) &dest, sizeof(dest)) < 0) + nsm_log(LOG_WARNING, "Sending Reboot Notification to " + "'%s' failed: errno %d (%s)", host->name, errno, strerror(errno)); + + return 0; } /* @@ -396,6 +494,7 @@ recv_reply(int sock) free(hp->name); free(hp->path); free(hp); + freeaddrinfo(hp->ai); return; } } @@ -436,7 +535,7 @@ backup_hosts(const char *dirname, const char *bakname) } /* - * Get all entries from sm.bak and convert them to host names + * Get all entries from sm.bak and convert them to host entries */ static void get_hosts(const char *dirname) @@ -461,22 +560,14 @@ get_hosts(const char *dirname) host = calloc(1, sizeof(*host)); snprintf(path, sizeof(path), "%s/%s", dirname, de->d_name); - if (!addr_parse(AF_INET, de->d_name, &host->addr) - && !addr_parse(AF_INET6, de->d_name, &host->addr) - && !host_lookup(AF_INET, de->d_name, &host->addr)) { - nsm_log(LOG_WARNING, - "%s doesn't seem to be a valid address, skipped", - de->d_name); - unlink(path); - continue; - } - if (stat(path, &stb) < 0) continue; + host->last_used = stb.st_mtime; host->timeout = NSM_TIMEOUT; host->path = strdup(path); host->name = strdup(de->d_name); + host->retries = 100; /* force address retry */ insert_host(host); host = NULL; @@ -594,22 +685,6 @@ nsm_get_state(int update) /* * Address handling utilities */ -static int -addr_parse(int af, const char *name, nsm_address *addr) -{ - void *ptr; - - if (af == AF_INET) - ptr = &((struct sockaddr_in *) addr)->sin_addr; - else if (af == AF_INET6) - ptr = &((struct sockaddr_in6 *) addr)->sin6_addr; - else - return 0; - if (inet_pton(af, name, ptr) <= 0) - return 0; - ((struct sockaddr *) addr)->sa_family = af; - return 1; -} int addr_get_port(nsm_address *addr) @@ -635,25 +710,19 @@ addr_set_port(nsm_address *addr, int port) } } -static int -host_lookup(int af, const char *name, nsm_address *addr) +static struct addrinfo * +host_lookup(int af, const char *name) { struct addrinfo hints, *ai; - int okay = 0; memset(&hints, 0, sizeof(hints)); hints.ai_family = af; + hints.ai_protocol = IPPROTO_UDP; if (getaddrinfo(name, NULL, &hints, &ai) != 0) - return 0; + return NULL; - if (ai->ai_addrlen < sizeof(*addr)) { - memcpy(addr, ai->ai_addr, ai->ai_addrlen); - okay = 1; - } - - freeaddrinfo(ai); - return okay; + return ai; } /* @@ -676,3 +745,64 @@ nsm_log(int fac, const char *fmt, ...) } va_end(ap); } + +/* + * Record pid in /var/run/sm-notify.pid + * This file should remain until a reboot, even if the + * program exits. + * If file already exists, fail. + */ +static int record_pid(void) +{ + char pid[20]; + int fd; + + snprintf(pid, 20, "%d\n", getpid()); + fd = open("/var/run/sm-notify.pid", O_CREAT|O_EXCL|O_WRONLY, 0600); + if (fd < 0) + return 0; + write(fd, pid, strlen(pid)); + close(fd); + return 1; +} + +/* Drop privileges to match owner of state-directory + * (in case a reply triggers some unknown bug). + */ +static void drop_privs(void) +{ + struct stat st; + + if (stat(_SM_DIR_PATH, &st) == -1 && + stat(_SM_BASE_PATH, &st) == -1) { + st.st_uid = 0; + st.st_gid = 0; + } + + if (st.st_uid == 0) { + nsm_log(LOG_WARNING, + "sm-notify running as root. chown %s to choose different user\n", + _SM_DIR_PATH); + return; + } + + setgroups(0, NULL); + if (setgid(st.st_gid) == -1 + || setuid(st.st_uid) == -1) { + nsm_log(LOG_ERR, "Fail to drop privileges"); + exit(1); + } +} + +static void set_kernel_nsm_state(int state) +{ + int fd; + + fd = open("/proc/sys/fs/nfs/nsm_local_state",O_WRONLY); + if (fd >= 0) { + char buf[20]; + snprintf(buf, sizeof(buf), "%d", state); + write(fd, buf, strlen(buf)); + close(fd); + } +}