/* * support/nfs/export.c * * Parse the exports file. Derived from the unfsd implementation. * * Authors: Donald J. Becker, * Rick Sladkey, * Fred N. van Kempen, * Olaf Kirch, * Alexander O. Yuriev, * * This software maybe be used for any purpose provided * the above copyright notice is retained. It is supplied * as is, with no warranty expressed or implied. */ #ifdef HAVE_CONFIG_H #include #endif #include #include #include #include #include #include #include #include "nfslib.h" #include "exportfs.h" #include "xmalloc.h" #include "xlog.h" #include "xio.h" #include "pseudoflavors.h" #include "reexport.h" #define EXPORT_DEFAULT_FLAGS \ (NFSEXP_READONLY|NFSEXP_ROOTSQUASH|NFSEXP_GATHERED_WRITES|NFSEXP_NOSUBTREECHECK) struct flav_info flav_map[] = { { "krb5", RPC_AUTH_GSS_KRB5, 1}, { "krb5i", RPC_AUTH_GSS_KRB5I, 1}, { "krb5p", RPC_AUTH_GSS_KRB5P, 1}, { "unix", AUTH_UNIX, 0}, { "sys", AUTH_SYS, 0}, { "null", AUTH_NULL, 0}, { "none", AUTH_NONE, 0}, }; const int flav_map_size = sizeof(flav_map)/sizeof(flav_map[0]); int default_ttl = 30 * 60; static char *efname = NULL; static XFILE *efp = NULL; static int first; static int has_default_opts, has_default_subtree_opts; static int *squids = NULL, nsquids = 0, *sqgids = NULL, nsqgids = 0; static int getexport(char *exp, int len); static int getpath(char *path, int len); static int parseopts(char *cp, struct exportent *ep, int warn, int *had_subtree_opt_ptr); static int parsesquash(char *list, int **idp, int *lenp, char **ep); static int parsenum(char **cpp); static void freesquash(void); static void syntaxerr(char *msg); static struct flav_info *find_flavor(char *name); void setexportent(char *fname, char *type) { if (efp) endexportent(); if (!fname) fname = _PATH_EXPORTS; if (!(efp = xfopen(fname, type))) xlog(L_ERROR, "can't open %s for %sing", fname, strcmp(type, "r")? "writ" : "read"); efname = strdup(fname); first = 1; } static void init_exportent (struct exportent *ee, int fromkernel) { ee->e_flags = EXPORT_DEFAULT_FLAGS; /* some kernels assume the default is sync rather than * async. More recent kernels always report one or other, * but this test makes sure we assume same as kernel * Ditto for wgather */ if (fromkernel) { ee->e_flags &= ~NFSEXP_ASYNC; ee->e_flags &= ~NFSEXP_GATHERED_WRITES; } ee->e_anonuid = 65534; ee->e_anongid = 65534; ee->e_squids = NULL; ee->e_sqgids = NULL; ee->e_mountpoint = NULL; ee->e_fslocmethod = FSLOC_NONE; ee->e_fslocdata = NULL; ee->e_secinfo[0].flav = NULL; ee->e_xprtsec[0].info = NULL; ee->e_nsquids = 0; ee->e_nsqgids = 0; ee->e_uuid = NULL; ee->e_ttl = default_ttl; ee->e_reexport = REEXP_NONE; } struct exportent * getexportent(int fromkernel, int fromexports) { static struct exportent ee, def_ee; char exp[512], *hostname; char rpath[MAXPATHLEN+1]; char *opt, *sp; int ok; if (!efp) return NULL; freesquash(); if (first || (ok = getexport(exp, sizeof(exp))) == 0) { has_default_opts = 0; has_default_subtree_opts = 0; init_exportent(&def_ee, fromkernel); ok = getpath(def_ee.e_path, sizeof(def_ee.e_path)); if (ok <= 0) return NULL; ok = getexport(exp, sizeof(exp)); } if (ok < 0) { xlog(L_ERROR, "expected client(options...)"); return NULL; } first = 0; /* * Check for default options. The kernel will never have default * options in /proc/fs/nfs/exports, however due to the initial '-' in * the -test-client- string from the test export we have to check that * we're not reading from the kernel. */ if (exp[0] == '-' && !fromkernel) { if (parseopts(exp + 1, &def_ee, 0, &has_default_subtree_opts) < 0) return NULL; has_default_opts = 1; ok = getexport(exp, sizeof(exp)); if (ok < 0) { xlog(L_ERROR, "expected client(options...)"); return NULL; } } xfree(ee.e_hostname); xfree(ee.e_realpath); ee = def_ee; /* Check for default client */ if (ok == 0) exp[0] = '\0'; hostname = exp; if ((opt = strchr(exp, '(')) != NULL) { if (opt == exp) { xlog(L_WARNING, "No host name given with %s %s, suggest *%s to avoid warning", ee.e_path, exp, exp); hostname = "*"; } *opt++ = '\0'; if (!(sp = strchr(opt, ')')) || sp[1] != '\0') { syntaxerr("bad option list"); return NULL; } *sp = '\0'; } else { if (!has_default_opts) xlog(L_WARNING, "No options for %s %s: suggest %s(sync) to avoid warning", ee.e_path, exp, exp); } ee.e_hostname = xstrdup(hostname); if (parseopts(opt, &ee, fromexports && !has_default_subtree_opts, NULL) < 0) { if(ee.e_hostname) { xfree(ee.e_hostname); ee.e_hostname=NULL; } if(ee.e_uuid) { xfree(ee.e_uuid); ee.e_uuid=NULL; } return NULL; } /* resolve symlinks */ if (realpath(ee.e_path, rpath) != NULL) { rpath[sizeof (rpath) - 1] = '\0'; strncpy(ee.e_path, rpath, sizeof (ee.e_path) - 1); ee.e_path[sizeof (ee.e_path) - 1] = '\0'; } return ⅇ } static const struct secinfo_flag_displaymap { unsigned int flag; const char *set; const char *unset; } secinfo_flag_displaymap[] = { { NFSEXP_READONLY, "ro", "rw" }, { NFSEXP_INSECURE_PORT, "insecure", "secure" }, { NFSEXP_ROOTSQUASH, "root_squash", "no_root_squash" }, { NFSEXP_ALLSQUASH, "all_squash", "no_all_squash" }, { 0, NULL, NULL } }; static void secinfo_flags_show(FILE *fp, unsigned int flags, unsigned int mask) { const struct secinfo_flag_displaymap *p; for (p = &secinfo_flag_displaymap[0]; p->flag != 0; p++) { if (!(mask & p->flag)) continue; fprintf(fp, ",%s", (flags & p->flag) ? p->set : p->unset); } } void secinfo_show(FILE *fp, struct exportent *ep) { const struct export_features *ef; struct sec_entry *p1, *p2; ef = get_export_features(); if (ep->e_secinfo[0].flav == NULL) secinfo_addflavor(find_flavor("sys"), ep); for (p1=ep->e_secinfo; p1->flav; p1=p2) { fprintf(fp, ",sec=%s", p1->flav->flavour); for (p2=p1+1; (p2->flav != NULL) && (p1->flags == p2->flags); p2++) { fprintf(fp, ":%s", p2->flav->flavour); } secinfo_flags_show(fp, p1->flags, ef->secinfo_flags); } } void xprtsecinfo_show(FILE *fp, struct exportent *ep) { struct xprtsec_entry *p1, *p2; for (p1 = ep->e_xprtsec; p1->info; p1 = p2) { fprintf(fp, ",xprtsec=%s", p1->info->name); for (p2 = p1 + 1; p2->info && (p1->flags == p2->flags); p2++) fprintf(fp, ":%s", p2->info->name); } } static void fprintpath(FILE *fp, const char *path) { int i; for (i=0; path[i]; i++) if (iscntrl(path[i]) || path[i] == '"' || path[i] == '\\' || path[i] == '#' || isspace(path[i])) fprintf(fp, "\\%03o", path[i]); else fprintf(fp, "%c", path[i]); } void putexportent(struct exportent *ep) { FILE *fp; int *id, i; if (!efp) return; fp = efp->x_fp; fprintpath(fp, ep->e_path); fprintf(fp, "\t%s(", ep->e_hostname); fprintf(fp, "%s,", (ep->e_flags & NFSEXP_READONLY)? "ro" : "rw"); fprintf(fp, "%ssync,", (ep->e_flags & NFSEXP_ASYNC)? "a" : ""); fprintf(fp, "%swdelay,", (ep->e_flags & NFSEXP_GATHERED_WRITES)? "" : "no_"); fprintf(fp, "%shide,", (ep->e_flags & NFSEXP_NOHIDE)? "no" : ""); fprintf(fp, "%scrossmnt,", (ep->e_flags & NFSEXP_CROSSMOUNT)? "" : "no"); fprintf(fp, "%ssecure,", (ep->e_flags & NFSEXP_INSECURE_PORT)? "in" : ""); fprintf(fp, "%sroot_squash,", (ep->e_flags & NFSEXP_ROOTSQUASH)? "" : "no_"); fprintf(fp, "%sall_squash,", (ep->e_flags & NFSEXP_ALLSQUASH)? "" : "no_"); fprintf(fp, "%ssubtree_check,", (ep->e_flags & NFSEXP_NOSUBTREECHECK)? "no_" : ""); fprintf(fp, "%ssecure_locks,", (ep->e_flags & NFSEXP_NOAUTHNLM)? "in" : ""); fprintf(fp, "%sacl,", (ep->e_flags & NFSEXP_NOACL)? "no_" : ""); if (ep->e_flags & NFSEXP_NOREADDIRPLUS) fprintf(fp, "nordirplus,"); if (ep->e_flags & NFSEXP_SECURITY_LABEL) fprintf(fp, "security_label,"); fprintf(fp, "%spnfs,", (ep->e_flags & NFSEXP_PNFS)? "" : "no_"); if (ep->e_flags & NFSEXP_FSID) { fprintf(fp, "fsid=%d,", ep->e_fsid); } if (ep->e_uuid) fprintf(fp, "fsid=%s,", ep->e_uuid); if (ep->e_reexport) { fprintf(fp, "reexport="); switch (ep->e_reexport) { case REEXP_AUTO_FSIDNUM: fprintf(fp, "auto-fsidnum"); break; case REEXP_PREDEFINED_FSIDNUM: fprintf(fp, "predefined-fsidnum"); break; default: xlog(L_ERROR, "unknown reexport method %i", ep->e_reexport); fprintf(fp, "none"); } fprintf(fp, ","); } if (ep->e_mountpoint) fprintf(fp, "mountpoint%s%s,", ep->e_mountpoint[0]?"=":"", ep->e_mountpoint); switch (ep->e_fslocmethod) { case FSLOC_NONE: break; case FSLOC_REFER: fprintf(fp, "refer="); fprintpath(fp, ep->e_fslocdata); fprintf(fp, ","); break; case FSLOC_REPLICA: fprintf(fp, "replicas="); fprintpath(fp, ep->e_fslocdata); fprintf(fp, ","); break; #ifdef DEBUG case FSLOC_STUB: fprintf(fp, "fsloc=stub,"); break; #endif default: xlog(L_ERROR, "unknown fsloc method for %s:%s", ep->e_hostname, ep->e_path); } if ((id = ep->e_squids) != NULL) { fprintf(fp, "squash_uids="); for (i = 0; i < ep->e_nsquids; i += 2) if (id[i] != id[i+1]) fprintf(fp, "%d-%d,", id[i], id[i+1]); else fprintf(fp, "%d,", id[i]); } if ((id = ep->e_sqgids) != NULL) { fprintf(fp, "squash_gids="); for (i = 0; i < ep->e_nsquids; i += 2) if (id[i] != id[i+1]) fprintf(fp, "%d-%d,", id[i], id[i+1]); else fprintf(fp, "%d,", id[i]); } fprintf(fp, "anonuid=%d,anongid=%d", ep->e_anonuid, ep->e_anongid); secinfo_show(fp, ep); xprtsecinfo_show(fp, ep); fprintf(fp, ")\n"); } void endexportent(void) { if (efp) xfclose(efp); efp = NULL; if (efname) free(efname); efname = NULL; freesquash(); } void dupexportent(struct exportent *dst, struct exportent *src) { int n; *dst = *src; if ((n = src->e_nsquids) != 0) { dst->e_squids = (int *) xmalloc(n * sizeof(int)); memcpy(dst->e_squids, src->e_squids, n * sizeof(int)); } if ((n = src->e_nsqgids) != 0) { dst->e_sqgids = (int *) xmalloc(n * sizeof(int)); memcpy(dst->e_sqgids, src->e_sqgids, n * sizeof(int)); } if (src->e_mountpoint) dst->e_mountpoint = strdup(src->e_mountpoint); if (src->e_fslocdata) dst->e_fslocdata = strdup(src->e_fslocdata); if (src->e_uuid) dst->e_uuid = strdup(src->e_uuid); dst->e_hostname = NULL; dst->e_realpath = NULL; } struct exportent * mkexportent(char *hname, char *path, char *options) { static struct exportent ee; init_exportent(&ee, 0); xfree(ee.e_hostname); ee.e_hostname = xstrdup(hname); xfree(ee.e_realpath); ee.e_realpath = NULL; if (strlen(path) >= sizeof(ee.e_path)) { xlog(L_ERROR, "path name %s too long", path); return NULL; } strncpy(ee.e_path, path, sizeof (ee.e_path)); ee.e_path[sizeof (ee.e_path) - 1] = '\0'; if (parseopts(options, &ee, 0, NULL) < 0) return NULL; return ⅇ } int updateexportent(struct exportent *eep, char *options) { if (parseopts(options, eep, 0, NULL) < 0) return 0; return 1; } static int valid_uuid(char *uuid) { /* must have 32 hex digits */ int cnt; for (cnt = 0 ; *uuid; uuid++) if (isxdigit(*uuid)) cnt++; return cnt == 32; } /* * Append the given flavor to the exportent's e_secinfo array, or * do nothing if it's already there. Returns the index of flavor * in the resulting array in any case. */ int secinfo_addflavor(struct flav_info *flav, struct exportent *ep) { struct sec_entry *p; for (p=ep->e_secinfo; p->flav; p++) { if (p->flav == flav || p->flav->fnum == flav->fnum) return p - ep->e_secinfo; } if (p - ep->e_secinfo >= SECFLAVOR_COUNT) { xlog(L_ERROR, "more than %d security flavors on an export\n", SECFLAVOR_COUNT); return -1; } p->flav = flav; p->flags = ep->e_flags; (p+1)->flav = NULL; return p - ep->e_secinfo; } static struct flav_info *find_flavor(char *name) { struct flav_info *flav; for (flav = flav_map; flav < flav_map + flav_map_size; flav++) if (strcmp(flav->flavour, name) == 0) return flav; return NULL; } /* @str is a colon seperated list of security flavors. Their order * is recorded in @ep, and a bitmap corresponding to the list is returned. * A zero return indicates an error. */ static unsigned int parse_flavors(char *str, struct exportent *ep) { unsigned int out=0; char *flavor; int bit; while ( (flavor=strsep(&str, ":")) ) { struct flav_info *flav = find_flavor(flavor); if (flav == NULL) { xlog(L_ERROR, "unknown flavor %s\n", flavor); return 0; } bit = secinfo_addflavor(flav, ep); if (bit < 0) return 0; out |= 1<name; info++) if (strcmp(info->name, name) == 0) return info; return NULL; } /* * Append the given xprtsec mode to the exportent's e_xprtsec array, * or do nothing if it's already there. Returns the index of flavor in * the resulting array in any case. */ static int xprtsec_addmode(const struct xprtsec_info *info, struct exportent *ep) { struct xprtsec_entry *p; for (p = ep->e_xprtsec; p->info; p++) if (p->info == info || p->info->number == info->number) return p - ep->e_xprtsec; if (p - ep->e_xprtsec >= XPRTSECMODE_COUNT) { xlog(L_ERROR, "more than %d xprtsec modes on an export\n", XPRTSECMODE_COUNT); return -1; } p->info = info; p->flags = ep->e_flags; (p + 1)->info = NULL; return p - ep->e_xprtsec; } /* * @str is a colon seperated list of transport layer security modes. * Their order is recorded in @ep, and a bitmap corresponding to the * list is returned. * * A zero return indicates an error. */ static unsigned int parse_xprtsec(char *str, struct exportent *ep) { unsigned int out = 0; char *name; while ((name = strsep(&str, ":"))) { const struct xprtsec_info *info = find_xprtsec_info(name); int bit; if (!info) { xlog(L_ERROR, "unknown xprtsec mode %s\n", name); return 0; } bit = xprtsec_addmode(info, ep); if (bit < 0) return 0; out |= 1 << bit; } return out; } /* Sets the bits in @mask for the appropriate security flavor flags. */ static void setflags(int mask, unsigned int active, struct exportent *ep) { int bit=0; ep->e_flags |= mask; while (active) { if (active & 1) ep->e_secinfo[bit].flags |= mask; bit++; active >>= 1; } } /* Clears the bits in @mask for the appropriate security flavor flags. */ static void clearflags(int mask, unsigned int active, struct exportent *ep) { int bit=0; ep->e_flags &= ~mask; while (active) { if (active & 1) ep->e_secinfo[bit].flags &= ~mask; bit++; active >>= 1; } } /* * For those flags which are not allowed to vary by pseudoflavor, * ensure that the export flags agree with the flags on each * pseudoflavor: */ void fix_pseudoflavor_flags(struct exportent *ep) { struct export_features *ef; struct sec_entry *p; ef = get_export_features(); for (p = ep->e_secinfo; p->flav; p++) p->flags |= ep->e_flags & ~ef->secinfo_flags; } /* * Parse option string pointed to by cp and set mount options accordingly. */ static int parseopts(char *cp, struct exportent *ep, int warn, int *had_subtree_opt_ptr) { int had_subtree_opt = 0; char *flname = efname?efname:"command line"; int flline = efp?efp->x_line:0; unsigned int active = 0; int saw_reexport = 0; squids = ep->e_squids; nsquids = ep->e_nsquids; sqgids = ep->e_sqgids; nsqgids = ep->e_nsqgids; if (!cp) goto out; while (isblank(*cp)) cp++; while (*cp) { char *opt = strdup(cp); char *optstart = cp; while (*cp && *cp != ',') cp++; if (*cp) { opt[cp-optstart] = '\0'; cp++; } /* process keyword */ if (strcmp(opt, "ro") == 0) setflags(NFSEXP_READONLY, active, ep); else if (strcmp(opt, "rw") == 0) clearflags(NFSEXP_READONLY, active, ep); else if (!strcmp(opt, "secure")) clearflags(NFSEXP_INSECURE_PORT, active, ep); else if (!strcmp(opt, "insecure")) setflags(NFSEXP_INSECURE_PORT, active, ep); else if (!strcmp(opt, "sync")) clearflags(NFSEXP_ASYNC, active, ep); else if (!strcmp(opt, "async")) setflags(NFSEXP_ASYNC, active, ep); else if (!strcmp(opt, "nordirplus")) setflags(NFSEXP_NOREADDIRPLUS, active, ep); else if (!strcmp(opt, "security_label")) setflags(NFSEXP_SECURITY_LABEL, active, ep); else if (!strcmp(opt, "nohide")) setflags(NFSEXP_NOHIDE, active, ep); else if (!strcmp(opt, "hide")) clearflags(NFSEXP_NOHIDE, active, ep); else if (!strcmp(opt, "crossmnt")) setflags(NFSEXP_CROSSMOUNT, active, ep); else if (!strcmp(opt, "nocrossmnt")) clearflags(NFSEXP_CROSSMOUNT, active, ep); else if (!strcmp(opt, "wdelay")) setflags(NFSEXP_GATHERED_WRITES, active, ep); else if (!strcmp(opt, "no_wdelay")) clearflags(NFSEXP_GATHERED_WRITES, active, ep); else if (strcmp(opt, "root_squash") == 0) setflags(NFSEXP_ROOTSQUASH, active, ep); else if (!strcmp(opt, "no_root_squash")) clearflags(NFSEXP_ROOTSQUASH, active, ep); else if (strcmp(opt, "all_squash") == 0) setflags(NFSEXP_ALLSQUASH, active, ep); else if (strcmp(opt, "no_all_squash") == 0) clearflags(NFSEXP_ALLSQUASH, active, ep); else if (strcmp(opt, "subtree_check") == 0) { had_subtree_opt = 1; clearflags(NFSEXP_NOSUBTREECHECK, active, ep); } else if (strcmp(opt, "no_subtree_check") == 0) { had_subtree_opt = 1; setflags(NFSEXP_NOSUBTREECHECK, active, ep); } else if (strcmp(opt, "auth_nlm") == 0) clearflags(NFSEXP_NOAUTHNLM, active, ep); else if (strcmp(opt, "no_auth_nlm") == 0) setflags(NFSEXP_NOAUTHNLM, active, ep); else if (strcmp(opt, "secure_locks") == 0) clearflags(NFSEXP_NOAUTHNLM, active, ep); else if (strcmp(opt, "insecure_locks") == 0) setflags(NFSEXP_NOAUTHNLM, active, ep); else if (strcmp(opt, "acl") == 0) clearflags(NFSEXP_NOACL, active, ep); else if (strcmp(opt, "no_acl") == 0) setflags(NFSEXP_NOACL, active, ep); else if (!strcmp(opt, "pnfs")) setflags(NFSEXP_PNFS, active, ep); else if (!strcmp(opt, "no_pnfs")) clearflags(NFSEXP_PNFS, active, ep); else if (strncmp(opt, "anonuid=", 8) == 0) { char *oe; ep->e_anonuid = strtol(opt+8, &oe, 10); if (opt[8]=='\0' || *oe != '\0') { xlog(L_ERROR, "%s: %d: bad anonuid \"%s\"\n", flname, flline, opt); bad_option: free(opt); return -1; } } else if (strncmp(opt, "anongid=", 8) == 0) { char *oe; ep->e_anongid = strtol(opt+8, &oe, 10); if (opt[8]=='\0' || *oe != '\0') { xlog(L_ERROR, "%s: %d: bad anongid \"%s\"\n", flname, flline, opt); goto bad_option; } } else if (strncmp(opt, "squash_uids=", 12) == 0) { if (parsesquash(opt+12, &squids, &nsquids, &cp) < 0) { goto bad_option; } } else if (strncmp(opt, "squash_gids=", 12) == 0) { if (parsesquash(opt+12, &sqgids, &nsqgids, &cp) < 0) { goto bad_option; } } else if (strncmp(opt, "fsid=", 5) == 0) { char *oe; if (saw_reexport) { xlog(L_ERROR, "%s:%d: 'fsid=' has to be before 'reexport=' %s\n", flname, flline, opt); goto bad_option; } if (strcmp(opt+5, "root") == 0) { ep->e_fsid = 0; setflags(NFSEXP_FSID, active, ep); } else { ep->e_fsid = strtoul(opt+5, &oe, 0); if (opt[5]!='\0' && *oe == '\0') setflags(NFSEXP_FSID, active, ep); else if (valid_uuid(opt+5)) ep->e_uuid = strdup(opt+5); else { xlog(L_ERROR, "%s: %d: bad fsid \"%s\"\n", flname, flline, opt); goto bad_option; } } } else if (strcmp(opt, "mountpoint")==0 || strcmp(opt, "mp") == 0 || strncmp(opt, "mountpoint=", 11)==0 || strncmp(opt, "mp=", 3) == 0) { char * mp = strchr(opt, '='); if (mp) ep->e_mountpoint = strdup(mp+1); else ep->e_mountpoint = strdup(""); #ifdef DEBUG } else if (strncmp(opt, "fsloc=", 6) == 0) { if (strcmp(opt+6, "stub") == 0) ep->e_fslocmethod = FSLOC_STUB; else { xlog(L_ERROR, "%s:%d: bad option %s\n", flname, flline, opt); goto bad_option; } #endif } else if (strncmp(opt, "refer=", 6) == 0) { ep->e_fslocmethod = FSLOC_REFER; ep->e_fslocdata = strdup(opt+6); } else if (strncmp(opt, "replicas=", 9) == 0) { ep->e_fslocmethod = FSLOC_REPLICA; ep->e_fslocdata = strdup(opt+9); } else if (strncmp(opt, "sec=", 4) == 0) { active = parse_flavors(opt+4, ep); if (!active) goto bad_option; } else if (strncmp(opt, "xprtsec=", 8) == 0) { if (!parse_xprtsec(opt + 8, ep)) goto bad_option; } else if (strncmp(opt, "reexport=", 9) == 0) { char *strategy = strchr(opt, '='); if (!strategy) { xlog(L_ERROR, "%s:%d: bad option %s\n", flname, flline, opt); goto bad_option; } strategy++; if (saw_reexport) { xlog(L_ERROR, "%s:%d: only one 'reexport=' is allowed%s\n", flname, flline, opt); goto bad_option; } if (strcmp(strategy, "auto-fsidnum") == 0) { ep->e_reexport = REEXP_AUTO_FSIDNUM; } else if (strcmp(strategy, "predefined-fsidnum") == 0) { ep->e_reexport = REEXP_PREDEFINED_FSIDNUM; } else if (strcmp(strategy, "none") == 0) { ep->e_reexport = REEXP_NONE; } else { xlog(L_ERROR, "%s:%d: bad option %s\n", flname, flline, strategy); goto bad_option; } if (reexpdb_apply_reexport_settings(ep, flname, flline) != 0) goto bad_option; if (ep->e_fsid) setflags(NFSEXP_FSID, active, ep); saw_reexport = 1; } else { xlog(L_ERROR, "%s:%d: unknown keyword \"%s\"\n", flname, flline, opt); setflags(NFSEXP_ALLSQUASH | NFSEXP_READONLY, active, ep); goto bad_option; } free(opt); while (isblank(*cp)) cp++; } fix_pseudoflavor_flags(ep); ep->e_squids = squids; ep->e_sqgids = sqgids; ep->e_nsquids = nsquids; ep->e_nsqgids = nsqgids; out: if (warn && !had_subtree_opt) xlog(L_WARNING, "%s [%d]: Neither 'subtree_check' or 'no_subtree_check' specified for export \"%s:%s\".\n" " Assuming default behaviour ('no_subtree_check').\n" " NOTE: this default has changed since nfs-utils version 1.0.x\n", flname, flline, ep->e_hostname, ep->e_path); if (had_subtree_opt_ptr) *had_subtree_opt_ptr = had_subtree_opt; return 1; } static int parsesquash(char *list, int **idp, int *lenp, char **ep) { char *cp = list; int id0, id1; int len = *lenp; int *id = *idp; if (**ep) *--(*ep) = ','; do { id0 = parsenum(&cp); if (*cp == '-') { cp++; id1 = parsenum(&cp); } else { id1 = id0; } if (id0 == -1 || id1 == -1) { syntaxerr("uid/gid -1 not permitted"); xfree(id); return -1; } if ((len % 8) == 0) id = (int *) xrealloc(id, (len + 8) * sizeof(*id)); id[len++] = id0; id[len++] = id1; if (!*cp || *cp == ')' || (*cp == ',' && !isdigit(cp[1]))) break; if (*cp != ',') { syntaxerr("bad uid/gid list"); xfree(id); return -1; } cp++; } while(1); if (**ep == ',') (*ep)++; *lenp = len; *idp = id; return 1; } static void freesquash(void) { if (squids) { xfree (squids); squids = NULL; nsquids = 0; } if (sqgids) { xfree (sqgids); sqgids = NULL; nsqgids = 0; } } static int parsenum(char **cpp) { char *cp = *cpp, c; int num = 0; if (**cpp == '-') (*cpp)++; while (isdigit(**cpp)) (*cpp)++; c = **cpp; **cpp = '\0'; num = atoi(cp); **cpp = c; return num; } static int getpath(char *path, int len) { xskip(efp, " \t\n"); return xgettok(efp, 0, path, len); } static int getexport(char *exp, int len) { int ok; xskip(efp, " \t"); if ((ok = xgettok(efp, 0, exp, len)) < 0) xlog(L_ERROR, "%s:%d: syntax error", efname?"command line":efname, efp->x_line); return ok; } static void syntaxerr(char *msg) { xlog(L_ERROR, "%s:%d: syntax error: %s", efname, efp?efp->x_line:0, msg); } struct export_features *get_export_features(void) { static char *path = "/proc/fs/nfsd/export_features"; static struct export_features ef; static int cached = 0; char buf[50]; int c; int fd; if (cached) return &ef; ef.flags = NFSEXP_OLDFLAGS; ef.secinfo_flags = NFSEXP_OLD_SECINFO_FLAGS; fd = open(path, O_RDONLY); if (fd == -1) goto good; c = read(fd, buf, 50); close(fd); if (c == -1) goto err; buf[c] = 0; c = sscanf(buf, "%x %x", &ef.flags, &ef.secinfo_flags); if (c != 2) goto err; good: cached = 1; return &ef; err: xlog(L_WARNING, "unexpected error reading %s", path); return &ef; }