59#include <rpc/rpc.h> 60#include <rpc/nettype.h> 61 62#include <rpc/rpc_com.h> 63 64#if __FreeBSD_version < 700000 65#define strrchr rindex 66#endif 67 68struct handle { 69 NCONF_HANDLE *nhandle; 70 int nflag; /* Whether NETPATH or NETCONFIG */ 71 int nettype; 72}; 73 74static const struct _rpcnettype { 75 const char *name; 76 const int type; 77} _rpctypelist[] = { 78 { "netpath", _RPC_NETPATH }, 79 { "visible", _RPC_VISIBLE }, 80 { "circuit_v", _RPC_CIRCUIT_V }, 81 { "datagram_v", _RPC_DATAGRAM_V }, 82 { "circuit_n", _RPC_CIRCUIT_N }, 83 { "datagram_n", _RPC_DATAGRAM_N }, 84 { "tcp", _RPC_TCP }, 85 { "udp", _RPC_UDP }, 86 { 0, _RPC_NONE } 87}; 88 89struct netid_af { 90 const char *netid; 91 int af; 92 int protocol; 93}; 94 95static const struct netid_af na_cvt[] = { 96 { "udp", AF_INET, IPPROTO_UDP }, 97 { "tcp", AF_INET, IPPROTO_TCP }, 98#ifdef INET6 99 { "udp6", AF_INET6, IPPROTO_UDP }, 100 { "tcp6", AF_INET6, IPPROTO_TCP }, 101#endif 102 { "local", AF_LOCAL, 0 } 103}; 104 105struct rpc_createerr rpc_createerr; 106 107/* 108 * Find the appropriate buffer size 109 */ 110u_int 111/*ARGSUSED*/ 112__rpc_get_t_size(int af, int proto, int size) 113{ 114 int maxsize, defsize; 115 116 maxsize = 256 * 1024; /* XXX */ 117 switch (proto) { 118 case IPPROTO_TCP: 119 defsize = 64 * 1024; /* XXX */ 120 break; 121 case IPPROTO_UDP: 122 defsize = UDPMSGSIZE; 123 break; 124 default: 125 defsize = RPC_MAXDATASIZE; 126 break; 127 } 128 if (size == 0) 129 return defsize; 130 131 /* Check whether the value is within the upper max limit */ 132 return (size > maxsize ? (u_int)maxsize : (u_int)size); 133} 134 135/* 136 * Find the appropriate address buffer size 137 */ 138u_int 139__rpc_get_a_size(af) 140 int af; 141{ 142 switch (af) { 143 case AF_INET: 144 return sizeof (struct sockaddr_in); 145#ifdef INET6 146 case AF_INET6: 147 return sizeof (struct sockaddr_in6); 148#endif 149 case AF_LOCAL: 150 return sizeof (struct sockaddr_un); 151 default: 152 break; 153 } 154 return ((u_int)RPC_MAXADDRSIZE); 155} 156 157#if 0 158 159/* 160 * Used to ping the NULL procedure for clnt handle. 161 * Returns NULL if fails, else a non-NULL pointer. 162 */ 163void * 164rpc_nullproc(clnt) 165 CLIENT *clnt; 166{ 167 struct timeval TIMEOUT = {25, 0}; 168 169 if (clnt_call(clnt, NULLPROC, (xdrproc_t) xdr_void, NULL, 170 (xdrproc_t) xdr_void, NULL, TIMEOUT) != RPC_SUCCESS) { 171 return (NULL); 172 } 173 return ((void *) clnt); 174} 175 176#endif 177 178int 179__rpc_socket2sockinfo(struct socket *so, struct __rpc_sockinfo *sip) 180{ 181 int type, proto; 182 struct sockaddr *sa; 183 sa_family_t family; 184 struct sockopt opt; 185 int error; 186 187 error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa); 188 if (error) 189 return 0; 190 191 sip->si_alen = sa->sa_len; 192 family = sa->sa_family; 193 free(sa, M_SONAME); 194 195 opt.sopt_dir = SOPT_GET; 196 opt.sopt_level = SOL_SOCKET; 197 opt.sopt_name = SO_TYPE; 198 opt.sopt_val = &type; 199 opt.sopt_valsize = sizeof type; 200 opt.sopt_td = NULL; 201 error = sogetopt(so, &opt); 202 if (error) 203 return 0; 204 205 /* XXX */ 206 if (family != AF_LOCAL) { 207 if (type == SOCK_STREAM) 208 proto = IPPROTO_TCP; 209 else if (type == SOCK_DGRAM) 210 proto = IPPROTO_UDP; 211 else 212 return 0; 213 } else 214 proto = 0; 215 216 sip->si_af = family; 217 sip->si_proto = proto; 218 sip->si_socktype = type; 219 220 return 1; 221} 222 223/* 224 * Linear search, but the number of entries is small. 225 */ 226int 227__rpc_nconf2sockinfo(const struct netconfig *nconf, struct __rpc_sockinfo *sip) 228{ 229 int i; 230 231 for (i = 0; i < (sizeof na_cvt) / (sizeof (struct netid_af)); i++) 232 if (strcmp(na_cvt[i].netid, nconf->nc_netid) == 0 || ( 233 strcmp(nconf->nc_netid, "unix") == 0 && 234 strcmp(na_cvt[i].netid, "local") == 0)) { 235 sip->si_af = na_cvt[i].af; 236 sip->si_proto = na_cvt[i].protocol; 237 sip->si_socktype = 238 __rpc_seman2socktype((int)nconf->nc_semantics); 239 if (sip->si_socktype == -1) 240 return 0; 241 sip->si_alen = __rpc_get_a_size(sip->si_af); 242 return 1; 243 } 244 245 return 0; 246} 247 248struct socket * 249__rpc_nconf2socket(const struct netconfig *nconf) 250{ 251 struct __rpc_sockinfo si; 252 struct socket *so; 253 int error; 254 255 if (!__rpc_nconf2sockinfo(nconf, &si)) 256 return 0; 257 258 so = NULL; 259 error = socreate(si.si_af, &so, si.si_socktype, si.si_proto, 260 curthread->td_ucred, curthread); 261 262 if (error) 263 return NULL; 264 else 265 return so; 266} 267 268char * 269taddr2uaddr(const struct netconfig *nconf, const struct netbuf *nbuf) 270{ 271 struct __rpc_sockinfo si; 272 273 if (!__rpc_nconf2sockinfo(nconf, &si)) 274 return NULL; 275 return __rpc_taddr2uaddr_af(si.si_af, nbuf); 276} 277 278struct netbuf * 279uaddr2taddr(const struct netconfig *nconf, const char *uaddr) 280{ 281 struct __rpc_sockinfo si; 282 283 if (!__rpc_nconf2sockinfo(nconf, &si)) 284 return NULL; 285 return __rpc_uaddr2taddr_af(si.si_af, uaddr); 286} 287 288char * 289__rpc_taddr2uaddr_af(int af, const struct netbuf *nbuf) 290{ 291 char *ret; 292 struct sbuf sb; 293 struct sockaddr_in *sin; 294 struct sockaddr_un *sun; 295 char namebuf[INET_ADDRSTRLEN]; 296#ifdef INET6 297 struct sockaddr_in6 *sin6; 298 char namebuf6[INET6_ADDRSTRLEN]; 299#endif 300 u_int16_t port; 301 302 sbuf_new(&sb, NULL, 0, SBUF_AUTOEXTEND); 303 304 switch (af) { 305 case AF_INET: 306 sin = nbuf->buf; 307 if (__rpc_inet_ntop(af, &sin->sin_addr, namebuf, sizeof namebuf) 308 == NULL) 309 return NULL; 310 port = ntohs(sin->sin_port); 311 if (sbuf_printf(&sb, "%s.%u.%u", namebuf, 312 ((uint32_t)port) >> 8, 313 port & 0xff) < 0) 314 return NULL; 315 break; 316#ifdef INET6 317 case AF_INET6: 318 sin6 = nbuf->buf; 319 if (__rpc_inet_ntop(af, &sin6->sin6_addr, namebuf6, sizeof namebuf6) 320 == NULL) 321 return NULL; 322 port = ntohs(sin6->sin6_port); 323 if (sbuf_printf(&sb, "%s.%u.%u", namebuf6, 324 ((uint32_t)port) >> 8, 325 port & 0xff) < 0) 326 return NULL; 327 break; 328#endif 329 case AF_LOCAL: 330 sun = nbuf->buf; 331 if (sbuf_printf(&sb, "%.*s", (int)(sun->sun_len - 332 offsetof(struct sockaddr_un, sun_path)), 333 sun->sun_path) < 0) 334 return (NULL); 335 break; 336 default: 337 return NULL; 338 } 339 340 sbuf_finish(&sb); 341 ret = strdup(sbuf_data(&sb), M_RPC); 342 sbuf_delete(&sb); 343 344 return ret; 345} 346 347struct netbuf * 348__rpc_uaddr2taddr_af(int af, const char *uaddr) 349{ 350 struct netbuf *ret = NULL; 351 char *addrstr, *p; 352 unsigned port, portlo, porthi; 353 struct sockaddr_in *sin; 354#ifdef INET6 355 struct sockaddr_in6 *sin6; 356#endif 357 struct sockaddr_un *sun; 358 359 port = 0; 360 sin = NULL; 361 addrstr = strdup(uaddr, M_RPC); 362 if (addrstr == NULL) 363 return NULL; 364 365 /* 366 * AF_LOCAL addresses are expected to be absolute 367 * pathnames, anything else will be AF_INET or AF_INET6. 368 */ 369 if (*addrstr != '/') { 370 p = strrchr(addrstr, '.'); 371 if (p == NULL) 372 goto out; 373 portlo = (unsigned)strtol(p + 1, NULL, 10); 374 *p = '\0'; 375 376 p = strrchr(addrstr, '.'); 377 if (p == NULL) 378 goto out; 379 porthi = (unsigned)strtol(p + 1, NULL, 10); 380 *p = '\0'; 381 port = (porthi << 8) | portlo; 382 } 383 384 ret = (struct netbuf *)malloc(sizeof *ret, M_RPC, M_WAITOK); 385 if (ret == NULL) 386 goto out; 387 388 switch (af) { 389 case AF_INET: 390 sin = (struct sockaddr_in *)malloc(sizeof *sin, M_RPC, 391 M_WAITOK); 392 if (sin == NULL) 393 goto out; 394 memset(sin, 0, sizeof *sin); 395 sin->sin_family = AF_INET; 396 sin->sin_port = htons(port); 397 if (__rpc_inet_pton(AF_INET, addrstr, &sin->sin_addr) <= 0) { 398 free(sin, M_RPC); 399 free(ret, M_RPC); 400 ret = NULL; 401 goto out; 402 } 403 sin->sin_len = ret->maxlen = ret->len = sizeof *sin; 404 ret->buf = sin; 405 break; 406#ifdef INET6 407 case AF_INET6: 408 sin6 = (struct sockaddr_in6 *)malloc(sizeof *sin6, M_RPC, 409 M_WAITOK); 410 if (sin6 == NULL) 411 goto out; 412 memset(sin6, 0, sizeof *sin6); 413 sin6->sin6_family = AF_INET6; 414 sin6->sin6_port = htons(port); 415 if (__rpc_inet_pton(AF_INET6, addrstr, &sin6->sin6_addr) <= 0) { 416 free(sin6, M_RPC); 417 free(ret, M_RPC); 418 ret = NULL; 419 goto out; 420 } 421 sin6->sin6_len = ret->maxlen = ret->len = sizeof *sin6; 422 ret->buf = sin6; 423 break; 424#endif 425 case AF_LOCAL: 426 sun = (struct sockaddr_un *)malloc(sizeof *sun, M_RPC, 427 M_WAITOK); 428 if (sun == NULL) 429 goto out; 430 memset(sun, 0, sizeof *sun); 431 sun->sun_family = AF_LOCAL; 432 strncpy(sun->sun_path, addrstr, sizeof(sun->sun_path) - 1); 433 ret->len = ret->maxlen = sun->sun_len = SUN_LEN(sun); 434 ret->buf = sun; 435 break; 436 default: 437 break; 438 } 439out: 440 free(addrstr, M_RPC); 441 return ret; 442} 443 444int 445__rpc_seman2socktype(int semantics) 446{ 447 switch (semantics) { 448 case NC_TPI_CLTS: 449 return SOCK_DGRAM; 450 case NC_TPI_COTS_ORD: 451 return SOCK_STREAM; 452 case NC_TPI_RAW: 453 return SOCK_RAW; 454 default: 455 break; 456 } 457 458 return -1; 459} 460 461int 462__rpc_socktype2seman(int socktype) 463{ 464 switch (socktype) { 465 case SOCK_DGRAM: 466 return NC_TPI_CLTS; 467 case SOCK_STREAM: 468 return NC_TPI_COTS_ORD; 469 case SOCK_RAW: 470 return NC_TPI_RAW; 471 default: 472 break; 473 } 474 475 return -1; 476} 477 478/* 479 * Returns the type of the network as defined in <rpc/nettype.h> 480 * If nettype is NULL, it defaults to NETPATH. 481 */ 482static int 483getnettype(const char *nettype) 484{ 485 int i; 486 487 if ((nettype == NULL) || (nettype[0] == 0)) { 488 return (_RPC_NETPATH); /* Default */ 489 } 490 491#if 0 492 nettype = strlocase(nettype); 493#endif 494 for (i = 0; _rpctypelist[i].name; i++) 495 if (strcasecmp(nettype, _rpctypelist[i].name) == 0) { 496 return (_rpctypelist[i].type); 497 } 498 return (_rpctypelist[i].type); 499} 500 501/* 502 * For the given nettype (tcp or udp only), return the first structure found. 503 * This should be freed by calling freenetconfigent() 504 */ 505struct netconfig * 506__rpc_getconfip(const char *nettype) 507{ 508 char *netid; 509 static char *netid_tcp = (char *) NULL; 510 static char *netid_udp = (char *) NULL; 511 struct netconfig *dummy; 512 513 if (!netid_udp && !netid_tcp) { 514 struct netconfig *nconf; 515 void *confighandle; 516 517 if (!(confighandle = setnetconfig())) { 518 log(LOG_ERR, "rpc: failed to open " NETCONFIG); 519 return (NULL); 520 } 521 while ((nconf = getnetconfig(confighandle)) != NULL) { 522 if (strcmp(nconf->nc_protofmly, NC_INET) == 0) { 523 if (strcmp(nconf->nc_proto, NC_TCP) == 0) { 524 netid_tcp = strdup(nconf->nc_netid, 525 M_RPC); 526 } else 527 if (strcmp(nconf->nc_proto, NC_UDP) == 0) { 528 netid_udp = strdup(nconf->nc_netid, 529 M_RPC); 530 } 531 } 532 } 533 endnetconfig(confighandle); 534 } 535 if (strcmp(nettype, "udp") == 0) 536 netid = netid_udp; 537 else if (strcmp(nettype, "tcp") == 0) 538 netid = netid_tcp; 539 else { 540 return (NULL); 541 } 542 if ((netid == NULL) || (netid[0] == 0)) { 543 return (NULL); 544 } 545 dummy = getnetconfigent(netid); 546 return (dummy); 547} 548 549/* 550 * Returns the type of the nettype, which should then be used with 551 * __rpc_getconf(). 552 * 553 * For simplicity in the kernel, we don't support the NETPATH 554 * environment variable. We behave as userland would then NETPATH is 555 * unset, i.e. iterate over all visible entries in netconfig. 556 */ 557void * 558__rpc_setconf(nettype) 559 const char *nettype; 560{ 561 struct handle *handle; 562 563 handle = (struct handle *) malloc(sizeof (struct handle), 564 M_RPC, M_WAITOK); 565 switch (handle->nettype = getnettype(nettype)) { 566 case _RPC_NETPATH: 567 case _RPC_CIRCUIT_N: 568 case _RPC_DATAGRAM_N: 569 if (!(handle->nhandle = setnetconfig())) 570 goto failed; 571 handle->nflag = TRUE; 572 break; 573 case _RPC_VISIBLE: 574 case _RPC_CIRCUIT_V: 575 case _RPC_DATAGRAM_V: 576 case _RPC_TCP: 577 case _RPC_UDP: 578 if (!(handle->nhandle = setnetconfig())) { 579 log(LOG_ERR, "rpc: failed to open " NETCONFIG); 580 goto failed; 581 } 582 handle->nflag = FALSE; 583 break; 584 default: 585 goto failed; 586 } 587 588 return (handle); 589 590failed: 591 free(handle, M_RPC); 592 return (NULL); 593} 594 595/* 596 * Returns the next netconfig struct for the given "net" type. 597 * __rpc_setconf() should have been called previously. 598 */ 599struct netconfig * 600__rpc_getconf(void *vhandle) 601{ 602 struct handle *handle; 603 struct netconfig *nconf; 604 605 handle = (struct handle *)vhandle; 606 if (handle == NULL) { 607 return (NULL); 608 } 609 for (;;) { 610 if (handle->nflag) { 611 nconf = getnetconfig(handle->nhandle); 612 if (nconf && !(nconf->nc_flag & NC_VISIBLE)) 613 continue; 614 } else { 615 nconf = getnetconfig(handle->nhandle); 616 } 617 if (nconf == NULL) 618 break; 619 if ((nconf->nc_semantics != NC_TPI_CLTS) && 620 (nconf->nc_semantics != NC_TPI_COTS) && 621 (nconf->nc_semantics != NC_TPI_COTS_ORD)) 622 continue; 623 switch (handle->nettype) { 624 case _RPC_VISIBLE: 625 if (!(nconf->nc_flag & NC_VISIBLE)) 626 continue; 627 /* FALLTHROUGH */ 628 case _RPC_NETPATH: /* Be happy */ 629 break; 630 case _RPC_CIRCUIT_V: 631 if (!(nconf->nc_flag & NC_VISIBLE)) 632 continue; 633 /* FALLTHROUGH */ 634 case _RPC_CIRCUIT_N: 635 if ((nconf->nc_semantics != NC_TPI_COTS) && 636 (nconf->nc_semantics != NC_TPI_COTS_ORD)) 637 continue; 638 break; 639 case _RPC_DATAGRAM_V: 640 if (!(nconf->nc_flag & NC_VISIBLE)) 641 continue; 642 /* FALLTHROUGH */ 643 case _RPC_DATAGRAM_N: 644 if (nconf->nc_semantics != NC_TPI_CLTS) 645 continue; 646 break; 647 case _RPC_TCP: 648 if (((nconf->nc_semantics != NC_TPI_COTS) && 649 (nconf->nc_semantics != NC_TPI_COTS_ORD)) || 650 (strcmp(nconf->nc_protofmly, NC_INET) 651#ifdef INET6 652 && strcmp(nconf->nc_protofmly, NC_INET6)) 653#else 654 ) 655#endif 656 || 657 strcmp(nconf->nc_proto, NC_TCP)) 658 continue; 659 break; 660 case _RPC_UDP: 661 if ((nconf->nc_semantics != NC_TPI_CLTS) || 662 (strcmp(nconf->nc_protofmly, NC_INET) 663#ifdef INET6 664 && strcmp(nconf->nc_protofmly, NC_INET6)) 665#else 666 ) 667#endif 668 || 669 strcmp(nconf->nc_proto, NC_UDP)) 670 continue; 671 break; 672 } 673 break; 674 } 675 return (nconf); 676} 677 678void 679__rpc_endconf(vhandle) 680 void * vhandle; 681{ 682 struct handle *handle; 683 684 handle = (struct handle *) vhandle; 685 if (handle == NULL) { 686 return; 687 } 688 endnetconfig(handle->nhandle); 689 free(handle, M_RPC); 690} 691 692int 693__rpc_sockisbound(struct socket *so) 694{ 695 struct sockaddr *sa; 696 int error, bound; 697 698 error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa); 699 if (error) 700 return (0); 701 702 switch (sa->sa_family) { 703 case AF_INET: 704 bound = (((struct sockaddr_in *) sa)->sin_port != 0); 705 break; 706#ifdef INET6 707 case AF_INET6: 708 bound = (((struct sockaddr_in6 *) sa)->sin6_port != 0); 709 break; 710#endif 711 case AF_LOCAL: 712 /* XXX check this */ 713 bound = (((struct sockaddr_un *) sa)->sun_path[0] != '\0'); 714 break; 715 default: 716 bound = FALSE; 717 break; 718 } 719 720 free(sa, M_SONAME); 721 722 return bound; 723} 724 725/* 726 * Implement XDR-style API for RPC call. 727 */ 728enum clnt_stat 729clnt_call_private( 730 CLIENT *cl, /* client handle */ 731 struct rpc_callextra *ext, /* call metadata */ 732 rpcproc_t proc, /* procedure number */ 733 xdrproc_t xargs, /* xdr routine for args */ 734 void *argsp, /* pointer to args */ 735 xdrproc_t xresults, /* xdr routine for results */ 736 void *resultsp, /* pointer to results */ 737 struct timeval utimeout) /* seconds to wait before giving up */ 738{ 739 XDR xdrs; 740 struct mbuf *mreq; 741 struct mbuf *mrep; 742 enum clnt_stat stat; 743 744 MGET(mreq, M_WAIT, MT_DATA); 745 MCLGET(mreq, M_WAIT); 746 mreq->m_len = 0; 747 748 xdrmbuf_create(&xdrs, mreq, XDR_ENCODE); 749 if (!xargs(&xdrs, argsp)) { 750 m_freem(mreq); 751 return (RPC_CANTENCODEARGS); 752 } 753 XDR_DESTROY(&xdrs); 754 755 stat = CLNT_CALL_MBUF(cl, ext, proc, mreq, &mrep, utimeout); 756 m_freem(mreq); 757 758 if (stat == RPC_SUCCESS) { 759 xdrmbuf_create(&xdrs, mrep, XDR_DECODE); 760 if (!xresults(&xdrs, resultsp)) { 761 XDR_DESTROY(&xdrs); 762 return (RPC_CANTDECODERES); 763 } 764 XDR_DESTROY(&xdrs); 765 } 766 767 return (stat); 768} 769 770/* 771 * Bind a socket to a privileged IP port 772 */ 773int 774bindresvport(struct socket *so, struct sockaddr *sa) 775{ 776 int old, error, af; 777 bool_t freesa = FALSE; 778 struct sockaddr_in *sin; 779#ifdef INET6 780 struct sockaddr_in6 *sin6; 781#endif 782 struct sockopt opt; 783 int proto, portrange, portlow; 784 u_int16_t *portp; 785 socklen_t salen; 786 787 if (sa == NULL) { 788 error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa); 789 if (error) 790 return (error); 791 freesa = TRUE; 792 af = sa->sa_family; 793 salen = sa->sa_len; 794 memset(sa, 0, sa->sa_len); 795 } else { 796 af = sa->sa_family; 797 salen = sa->sa_len; 798 } 799 800 switch (af) { 801 case AF_INET: 802 proto = IPPROTO_IP; 803 portrange = IP_PORTRANGE; 804 portlow = IP_PORTRANGE_LOW; 805 sin = (struct sockaddr_in *)sa; 806 portp = &sin->sin_port; 807 break; 808#ifdef INET6 809 case AF_INET6: 810 proto = IPPROTO_IPV6; 811 portrange = IPV6_PORTRANGE; 812 portlow = IPV6_PORTRANGE_LOW; 813 sin6 = (struct sockaddr_in6 *)sa; 814 portp = &sin6->sin6_port; 815 break; 816#endif 817 default: 818 return (EPFNOSUPPORT); 819 } 820 821 sa->sa_family = af; 822 sa->sa_len = salen; 823 824 if (*portp == 0) {
| 61#include <rpc/rpc.h> 62#include <rpc/nettype.h> 63 64#include <rpc/rpc_com.h> 65 66#if __FreeBSD_version < 700000 67#define strrchr rindex 68#endif 69 70struct handle { 71 NCONF_HANDLE *nhandle; 72 int nflag; /* Whether NETPATH or NETCONFIG */ 73 int nettype; 74}; 75 76static const struct _rpcnettype { 77 const char *name; 78 const int type; 79} _rpctypelist[] = { 80 { "netpath", _RPC_NETPATH }, 81 { "visible", _RPC_VISIBLE }, 82 { "circuit_v", _RPC_CIRCUIT_V }, 83 { "datagram_v", _RPC_DATAGRAM_V }, 84 { "circuit_n", _RPC_CIRCUIT_N }, 85 { "datagram_n", _RPC_DATAGRAM_N }, 86 { "tcp", _RPC_TCP }, 87 { "udp", _RPC_UDP }, 88 { 0, _RPC_NONE } 89}; 90 91struct netid_af { 92 const char *netid; 93 int af; 94 int protocol; 95}; 96 97static const struct netid_af na_cvt[] = { 98 { "udp", AF_INET, IPPROTO_UDP }, 99 { "tcp", AF_INET, IPPROTO_TCP }, 100#ifdef INET6 101 { "udp6", AF_INET6, IPPROTO_UDP }, 102 { "tcp6", AF_INET6, IPPROTO_TCP }, 103#endif 104 { "local", AF_LOCAL, 0 } 105}; 106 107struct rpc_createerr rpc_createerr; 108 109/* 110 * Find the appropriate buffer size 111 */ 112u_int 113/*ARGSUSED*/ 114__rpc_get_t_size(int af, int proto, int size) 115{ 116 int maxsize, defsize; 117 118 maxsize = 256 * 1024; /* XXX */ 119 switch (proto) { 120 case IPPROTO_TCP: 121 defsize = 64 * 1024; /* XXX */ 122 break; 123 case IPPROTO_UDP: 124 defsize = UDPMSGSIZE; 125 break; 126 default: 127 defsize = RPC_MAXDATASIZE; 128 break; 129 } 130 if (size == 0) 131 return defsize; 132 133 /* Check whether the value is within the upper max limit */ 134 return (size > maxsize ? (u_int)maxsize : (u_int)size); 135} 136 137/* 138 * Find the appropriate address buffer size 139 */ 140u_int 141__rpc_get_a_size(af) 142 int af; 143{ 144 switch (af) { 145 case AF_INET: 146 return sizeof (struct sockaddr_in); 147#ifdef INET6 148 case AF_INET6: 149 return sizeof (struct sockaddr_in6); 150#endif 151 case AF_LOCAL: 152 return sizeof (struct sockaddr_un); 153 default: 154 break; 155 } 156 return ((u_int)RPC_MAXADDRSIZE); 157} 158 159#if 0 160 161/* 162 * Used to ping the NULL procedure for clnt handle. 163 * Returns NULL if fails, else a non-NULL pointer. 164 */ 165void * 166rpc_nullproc(clnt) 167 CLIENT *clnt; 168{ 169 struct timeval TIMEOUT = {25, 0}; 170 171 if (clnt_call(clnt, NULLPROC, (xdrproc_t) xdr_void, NULL, 172 (xdrproc_t) xdr_void, NULL, TIMEOUT) != RPC_SUCCESS) { 173 return (NULL); 174 } 175 return ((void *) clnt); 176} 177 178#endif 179 180int 181__rpc_socket2sockinfo(struct socket *so, struct __rpc_sockinfo *sip) 182{ 183 int type, proto; 184 struct sockaddr *sa; 185 sa_family_t family; 186 struct sockopt opt; 187 int error; 188 189 error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa); 190 if (error) 191 return 0; 192 193 sip->si_alen = sa->sa_len; 194 family = sa->sa_family; 195 free(sa, M_SONAME); 196 197 opt.sopt_dir = SOPT_GET; 198 opt.sopt_level = SOL_SOCKET; 199 opt.sopt_name = SO_TYPE; 200 opt.sopt_val = &type; 201 opt.sopt_valsize = sizeof type; 202 opt.sopt_td = NULL; 203 error = sogetopt(so, &opt); 204 if (error) 205 return 0; 206 207 /* XXX */ 208 if (family != AF_LOCAL) { 209 if (type == SOCK_STREAM) 210 proto = IPPROTO_TCP; 211 else if (type == SOCK_DGRAM) 212 proto = IPPROTO_UDP; 213 else 214 return 0; 215 } else 216 proto = 0; 217 218 sip->si_af = family; 219 sip->si_proto = proto; 220 sip->si_socktype = type; 221 222 return 1; 223} 224 225/* 226 * Linear search, but the number of entries is small. 227 */ 228int 229__rpc_nconf2sockinfo(const struct netconfig *nconf, struct __rpc_sockinfo *sip) 230{ 231 int i; 232 233 for (i = 0; i < (sizeof na_cvt) / (sizeof (struct netid_af)); i++) 234 if (strcmp(na_cvt[i].netid, nconf->nc_netid) == 0 || ( 235 strcmp(nconf->nc_netid, "unix") == 0 && 236 strcmp(na_cvt[i].netid, "local") == 0)) { 237 sip->si_af = na_cvt[i].af; 238 sip->si_proto = na_cvt[i].protocol; 239 sip->si_socktype = 240 __rpc_seman2socktype((int)nconf->nc_semantics); 241 if (sip->si_socktype == -1) 242 return 0; 243 sip->si_alen = __rpc_get_a_size(sip->si_af); 244 return 1; 245 } 246 247 return 0; 248} 249 250struct socket * 251__rpc_nconf2socket(const struct netconfig *nconf) 252{ 253 struct __rpc_sockinfo si; 254 struct socket *so; 255 int error; 256 257 if (!__rpc_nconf2sockinfo(nconf, &si)) 258 return 0; 259 260 so = NULL; 261 error = socreate(si.si_af, &so, si.si_socktype, si.si_proto, 262 curthread->td_ucred, curthread); 263 264 if (error) 265 return NULL; 266 else 267 return so; 268} 269 270char * 271taddr2uaddr(const struct netconfig *nconf, const struct netbuf *nbuf) 272{ 273 struct __rpc_sockinfo si; 274 275 if (!__rpc_nconf2sockinfo(nconf, &si)) 276 return NULL; 277 return __rpc_taddr2uaddr_af(si.si_af, nbuf); 278} 279 280struct netbuf * 281uaddr2taddr(const struct netconfig *nconf, const char *uaddr) 282{ 283 struct __rpc_sockinfo si; 284 285 if (!__rpc_nconf2sockinfo(nconf, &si)) 286 return NULL; 287 return __rpc_uaddr2taddr_af(si.si_af, uaddr); 288} 289 290char * 291__rpc_taddr2uaddr_af(int af, const struct netbuf *nbuf) 292{ 293 char *ret; 294 struct sbuf sb; 295 struct sockaddr_in *sin; 296 struct sockaddr_un *sun; 297 char namebuf[INET_ADDRSTRLEN]; 298#ifdef INET6 299 struct sockaddr_in6 *sin6; 300 char namebuf6[INET6_ADDRSTRLEN]; 301#endif 302 u_int16_t port; 303 304 sbuf_new(&sb, NULL, 0, SBUF_AUTOEXTEND); 305 306 switch (af) { 307 case AF_INET: 308 sin = nbuf->buf; 309 if (__rpc_inet_ntop(af, &sin->sin_addr, namebuf, sizeof namebuf) 310 == NULL) 311 return NULL; 312 port = ntohs(sin->sin_port); 313 if (sbuf_printf(&sb, "%s.%u.%u", namebuf, 314 ((uint32_t)port) >> 8, 315 port & 0xff) < 0) 316 return NULL; 317 break; 318#ifdef INET6 319 case AF_INET6: 320 sin6 = nbuf->buf; 321 if (__rpc_inet_ntop(af, &sin6->sin6_addr, namebuf6, sizeof namebuf6) 322 == NULL) 323 return NULL; 324 port = ntohs(sin6->sin6_port); 325 if (sbuf_printf(&sb, "%s.%u.%u", namebuf6, 326 ((uint32_t)port) >> 8, 327 port & 0xff) < 0) 328 return NULL; 329 break; 330#endif 331 case AF_LOCAL: 332 sun = nbuf->buf; 333 if (sbuf_printf(&sb, "%.*s", (int)(sun->sun_len - 334 offsetof(struct sockaddr_un, sun_path)), 335 sun->sun_path) < 0) 336 return (NULL); 337 break; 338 default: 339 return NULL; 340 } 341 342 sbuf_finish(&sb); 343 ret = strdup(sbuf_data(&sb), M_RPC); 344 sbuf_delete(&sb); 345 346 return ret; 347} 348 349struct netbuf * 350__rpc_uaddr2taddr_af(int af, const char *uaddr) 351{ 352 struct netbuf *ret = NULL; 353 char *addrstr, *p; 354 unsigned port, portlo, porthi; 355 struct sockaddr_in *sin; 356#ifdef INET6 357 struct sockaddr_in6 *sin6; 358#endif 359 struct sockaddr_un *sun; 360 361 port = 0; 362 sin = NULL; 363 addrstr = strdup(uaddr, M_RPC); 364 if (addrstr == NULL) 365 return NULL; 366 367 /* 368 * AF_LOCAL addresses are expected to be absolute 369 * pathnames, anything else will be AF_INET or AF_INET6. 370 */ 371 if (*addrstr != '/') { 372 p = strrchr(addrstr, '.'); 373 if (p == NULL) 374 goto out; 375 portlo = (unsigned)strtol(p + 1, NULL, 10); 376 *p = '\0'; 377 378 p = strrchr(addrstr, '.'); 379 if (p == NULL) 380 goto out; 381 porthi = (unsigned)strtol(p + 1, NULL, 10); 382 *p = '\0'; 383 port = (porthi << 8) | portlo; 384 } 385 386 ret = (struct netbuf *)malloc(sizeof *ret, M_RPC, M_WAITOK); 387 if (ret == NULL) 388 goto out; 389 390 switch (af) { 391 case AF_INET: 392 sin = (struct sockaddr_in *)malloc(sizeof *sin, M_RPC, 393 M_WAITOK); 394 if (sin == NULL) 395 goto out; 396 memset(sin, 0, sizeof *sin); 397 sin->sin_family = AF_INET; 398 sin->sin_port = htons(port); 399 if (__rpc_inet_pton(AF_INET, addrstr, &sin->sin_addr) <= 0) { 400 free(sin, M_RPC); 401 free(ret, M_RPC); 402 ret = NULL; 403 goto out; 404 } 405 sin->sin_len = ret->maxlen = ret->len = sizeof *sin; 406 ret->buf = sin; 407 break; 408#ifdef INET6 409 case AF_INET6: 410 sin6 = (struct sockaddr_in6 *)malloc(sizeof *sin6, M_RPC, 411 M_WAITOK); 412 if (sin6 == NULL) 413 goto out; 414 memset(sin6, 0, sizeof *sin6); 415 sin6->sin6_family = AF_INET6; 416 sin6->sin6_port = htons(port); 417 if (__rpc_inet_pton(AF_INET6, addrstr, &sin6->sin6_addr) <= 0) { 418 free(sin6, M_RPC); 419 free(ret, M_RPC); 420 ret = NULL; 421 goto out; 422 } 423 sin6->sin6_len = ret->maxlen = ret->len = sizeof *sin6; 424 ret->buf = sin6; 425 break; 426#endif 427 case AF_LOCAL: 428 sun = (struct sockaddr_un *)malloc(sizeof *sun, M_RPC, 429 M_WAITOK); 430 if (sun == NULL) 431 goto out; 432 memset(sun, 0, sizeof *sun); 433 sun->sun_family = AF_LOCAL; 434 strncpy(sun->sun_path, addrstr, sizeof(sun->sun_path) - 1); 435 ret->len = ret->maxlen = sun->sun_len = SUN_LEN(sun); 436 ret->buf = sun; 437 break; 438 default: 439 break; 440 } 441out: 442 free(addrstr, M_RPC); 443 return ret; 444} 445 446int 447__rpc_seman2socktype(int semantics) 448{ 449 switch (semantics) { 450 case NC_TPI_CLTS: 451 return SOCK_DGRAM; 452 case NC_TPI_COTS_ORD: 453 return SOCK_STREAM; 454 case NC_TPI_RAW: 455 return SOCK_RAW; 456 default: 457 break; 458 } 459 460 return -1; 461} 462 463int 464__rpc_socktype2seman(int socktype) 465{ 466 switch (socktype) { 467 case SOCK_DGRAM: 468 return NC_TPI_CLTS; 469 case SOCK_STREAM: 470 return NC_TPI_COTS_ORD; 471 case SOCK_RAW: 472 return NC_TPI_RAW; 473 default: 474 break; 475 } 476 477 return -1; 478} 479 480/* 481 * Returns the type of the network as defined in <rpc/nettype.h> 482 * If nettype is NULL, it defaults to NETPATH. 483 */ 484static int 485getnettype(const char *nettype) 486{ 487 int i; 488 489 if ((nettype == NULL) || (nettype[0] == 0)) { 490 return (_RPC_NETPATH); /* Default */ 491 } 492 493#if 0 494 nettype = strlocase(nettype); 495#endif 496 for (i = 0; _rpctypelist[i].name; i++) 497 if (strcasecmp(nettype, _rpctypelist[i].name) == 0) { 498 return (_rpctypelist[i].type); 499 } 500 return (_rpctypelist[i].type); 501} 502 503/* 504 * For the given nettype (tcp or udp only), return the first structure found. 505 * This should be freed by calling freenetconfigent() 506 */ 507struct netconfig * 508__rpc_getconfip(const char *nettype) 509{ 510 char *netid; 511 static char *netid_tcp = (char *) NULL; 512 static char *netid_udp = (char *) NULL; 513 struct netconfig *dummy; 514 515 if (!netid_udp && !netid_tcp) { 516 struct netconfig *nconf; 517 void *confighandle; 518 519 if (!(confighandle = setnetconfig())) { 520 log(LOG_ERR, "rpc: failed to open " NETCONFIG); 521 return (NULL); 522 } 523 while ((nconf = getnetconfig(confighandle)) != NULL) { 524 if (strcmp(nconf->nc_protofmly, NC_INET) == 0) { 525 if (strcmp(nconf->nc_proto, NC_TCP) == 0) { 526 netid_tcp = strdup(nconf->nc_netid, 527 M_RPC); 528 } else 529 if (strcmp(nconf->nc_proto, NC_UDP) == 0) { 530 netid_udp = strdup(nconf->nc_netid, 531 M_RPC); 532 } 533 } 534 } 535 endnetconfig(confighandle); 536 } 537 if (strcmp(nettype, "udp") == 0) 538 netid = netid_udp; 539 else if (strcmp(nettype, "tcp") == 0) 540 netid = netid_tcp; 541 else { 542 return (NULL); 543 } 544 if ((netid == NULL) || (netid[0] == 0)) { 545 return (NULL); 546 } 547 dummy = getnetconfigent(netid); 548 return (dummy); 549} 550 551/* 552 * Returns the type of the nettype, which should then be used with 553 * __rpc_getconf(). 554 * 555 * For simplicity in the kernel, we don't support the NETPATH 556 * environment variable. We behave as userland would then NETPATH is 557 * unset, i.e. iterate over all visible entries in netconfig. 558 */ 559void * 560__rpc_setconf(nettype) 561 const char *nettype; 562{ 563 struct handle *handle; 564 565 handle = (struct handle *) malloc(sizeof (struct handle), 566 M_RPC, M_WAITOK); 567 switch (handle->nettype = getnettype(nettype)) { 568 case _RPC_NETPATH: 569 case _RPC_CIRCUIT_N: 570 case _RPC_DATAGRAM_N: 571 if (!(handle->nhandle = setnetconfig())) 572 goto failed; 573 handle->nflag = TRUE; 574 break; 575 case _RPC_VISIBLE: 576 case _RPC_CIRCUIT_V: 577 case _RPC_DATAGRAM_V: 578 case _RPC_TCP: 579 case _RPC_UDP: 580 if (!(handle->nhandle = setnetconfig())) { 581 log(LOG_ERR, "rpc: failed to open " NETCONFIG); 582 goto failed; 583 } 584 handle->nflag = FALSE; 585 break; 586 default: 587 goto failed; 588 } 589 590 return (handle); 591 592failed: 593 free(handle, M_RPC); 594 return (NULL); 595} 596 597/* 598 * Returns the next netconfig struct for the given "net" type. 599 * __rpc_setconf() should have been called previously. 600 */ 601struct netconfig * 602__rpc_getconf(void *vhandle) 603{ 604 struct handle *handle; 605 struct netconfig *nconf; 606 607 handle = (struct handle *)vhandle; 608 if (handle == NULL) { 609 return (NULL); 610 } 611 for (;;) { 612 if (handle->nflag) { 613 nconf = getnetconfig(handle->nhandle); 614 if (nconf && !(nconf->nc_flag & NC_VISIBLE)) 615 continue; 616 } else { 617 nconf = getnetconfig(handle->nhandle); 618 } 619 if (nconf == NULL) 620 break; 621 if ((nconf->nc_semantics != NC_TPI_CLTS) && 622 (nconf->nc_semantics != NC_TPI_COTS) && 623 (nconf->nc_semantics != NC_TPI_COTS_ORD)) 624 continue; 625 switch (handle->nettype) { 626 case _RPC_VISIBLE: 627 if (!(nconf->nc_flag & NC_VISIBLE)) 628 continue; 629 /* FALLTHROUGH */ 630 case _RPC_NETPATH: /* Be happy */ 631 break; 632 case _RPC_CIRCUIT_V: 633 if (!(nconf->nc_flag & NC_VISIBLE)) 634 continue; 635 /* FALLTHROUGH */ 636 case _RPC_CIRCUIT_N: 637 if ((nconf->nc_semantics != NC_TPI_COTS) && 638 (nconf->nc_semantics != NC_TPI_COTS_ORD)) 639 continue; 640 break; 641 case _RPC_DATAGRAM_V: 642 if (!(nconf->nc_flag & NC_VISIBLE)) 643 continue; 644 /* FALLTHROUGH */ 645 case _RPC_DATAGRAM_N: 646 if (nconf->nc_semantics != NC_TPI_CLTS) 647 continue; 648 break; 649 case _RPC_TCP: 650 if (((nconf->nc_semantics != NC_TPI_COTS) && 651 (nconf->nc_semantics != NC_TPI_COTS_ORD)) || 652 (strcmp(nconf->nc_protofmly, NC_INET) 653#ifdef INET6 654 && strcmp(nconf->nc_protofmly, NC_INET6)) 655#else 656 ) 657#endif 658 || 659 strcmp(nconf->nc_proto, NC_TCP)) 660 continue; 661 break; 662 case _RPC_UDP: 663 if ((nconf->nc_semantics != NC_TPI_CLTS) || 664 (strcmp(nconf->nc_protofmly, NC_INET) 665#ifdef INET6 666 && strcmp(nconf->nc_protofmly, NC_INET6)) 667#else 668 ) 669#endif 670 || 671 strcmp(nconf->nc_proto, NC_UDP)) 672 continue; 673 break; 674 } 675 break; 676 } 677 return (nconf); 678} 679 680void 681__rpc_endconf(vhandle) 682 void * vhandle; 683{ 684 struct handle *handle; 685 686 handle = (struct handle *) vhandle; 687 if (handle == NULL) { 688 return; 689 } 690 endnetconfig(handle->nhandle); 691 free(handle, M_RPC); 692} 693 694int 695__rpc_sockisbound(struct socket *so) 696{ 697 struct sockaddr *sa; 698 int error, bound; 699 700 error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa); 701 if (error) 702 return (0); 703 704 switch (sa->sa_family) { 705 case AF_INET: 706 bound = (((struct sockaddr_in *) sa)->sin_port != 0); 707 break; 708#ifdef INET6 709 case AF_INET6: 710 bound = (((struct sockaddr_in6 *) sa)->sin6_port != 0); 711 break; 712#endif 713 case AF_LOCAL: 714 /* XXX check this */ 715 bound = (((struct sockaddr_un *) sa)->sun_path[0] != '\0'); 716 break; 717 default: 718 bound = FALSE; 719 break; 720 } 721 722 free(sa, M_SONAME); 723 724 return bound; 725} 726 727/* 728 * Implement XDR-style API for RPC call. 729 */ 730enum clnt_stat 731clnt_call_private( 732 CLIENT *cl, /* client handle */ 733 struct rpc_callextra *ext, /* call metadata */ 734 rpcproc_t proc, /* procedure number */ 735 xdrproc_t xargs, /* xdr routine for args */ 736 void *argsp, /* pointer to args */ 737 xdrproc_t xresults, /* xdr routine for results */ 738 void *resultsp, /* pointer to results */ 739 struct timeval utimeout) /* seconds to wait before giving up */ 740{ 741 XDR xdrs; 742 struct mbuf *mreq; 743 struct mbuf *mrep; 744 enum clnt_stat stat; 745 746 MGET(mreq, M_WAIT, MT_DATA); 747 MCLGET(mreq, M_WAIT); 748 mreq->m_len = 0; 749 750 xdrmbuf_create(&xdrs, mreq, XDR_ENCODE); 751 if (!xargs(&xdrs, argsp)) { 752 m_freem(mreq); 753 return (RPC_CANTENCODEARGS); 754 } 755 XDR_DESTROY(&xdrs); 756 757 stat = CLNT_CALL_MBUF(cl, ext, proc, mreq, &mrep, utimeout); 758 m_freem(mreq); 759 760 if (stat == RPC_SUCCESS) { 761 xdrmbuf_create(&xdrs, mrep, XDR_DECODE); 762 if (!xresults(&xdrs, resultsp)) { 763 XDR_DESTROY(&xdrs); 764 return (RPC_CANTDECODERES); 765 } 766 XDR_DESTROY(&xdrs); 767 } 768 769 return (stat); 770} 771 772/* 773 * Bind a socket to a privileged IP port 774 */ 775int 776bindresvport(struct socket *so, struct sockaddr *sa) 777{ 778 int old, error, af; 779 bool_t freesa = FALSE; 780 struct sockaddr_in *sin; 781#ifdef INET6 782 struct sockaddr_in6 *sin6; 783#endif 784 struct sockopt opt; 785 int proto, portrange, portlow; 786 u_int16_t *portp; 787 socklen_t salen; 788 789 if (sa == NULL) { 790 error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa); 791 if (error) 792 return (error); 793 freesa = TRUE; 794 af = sa->sa_family; 795 salen = sa->sa_len; 796 memset(sa, 0, sa->sa_len); 797 } else { 798 af = sa->sa_family; 799 salen = sa->sa_len; 800 } 801 802 switch (af) { 803 case AF_INET: 804 proto = IPPROTO_IP; 805 portrange = IP_PORTRANGE; 806 portlow = IP_PORTRANGE_LOW; 807 sin = (struct sockaddr_in *)sa; 808 portp = &sin->sin_port; 809 break; 810#ifdef INET6 811 case AF_INET6: 812 proto = IPPROTO_IPV6; 813 portrange = IPV6_PORTRANGE; 814 portlow = IPV6_PORTRANGE_LOW; 815 sin6 = (struct sockaddr_in6 *)sa; 816 portp = &sin6->sin6_port; 817 break; 818#endif 819 default: 820 return (EPFNOSUPPORT); 821 } 822 823 sa->sa_family = af; 824 sa->sa_len = salen; 825 826 if (*portp == 0) {
|