1 /*-
2 * Copyright (c) 2000-2001 Boris Popov
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 *
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24 * SUCH DAMAGE.
25 */
26
27 #include <sys/cdefs.h>
28 __FBSDID("$FreeBSD: releng/11.2/sys/netsmb/smb_trantcp.c 257841 2013-11-08 08:44:09Z glebius $");
29
30 #include <sys/param.h>
31 #include <sys/condvar.h>
32 #include <sys/kernel.h>
33 #include <sys/lock.h>
34 #include <sys/malloc.h>
35 #include <sys/mbuf.h>
36 #include <sys/poll.h>
37 #include <sys/proc.h>
38 #include <sys/protosw.h>
39 #include <sys/signalvar.h>
40 #include <sys/socket.h>
41 #include <sys/socketvar.h>
42 #include <sys/sx.h>
43 #include <sys/sysctl.h>
44 #include <sys/systm.h>
45 #include <sys/uio.h>
46
47 #include <net/if.h>
48 #include <net/route.h>
49 #include <net/vnet.h>
50
51 #include <netinet/in.h>
52 #include <netinet/tcp.h>
53
54 #include <sys/mchain.h>
55
56 #include <netsmb/netbios.h>
57
58 #include <netsmb/smb.h>
59 #include <netsmb/smb_conn.h>
60 #include <netsmb/smb_tran.h>
61 #include <netsmb/smb_trantcp.h>
62 #include <netsmb/smb_subr.h>
63
64 #define M_NBDATA M_PCB
65
66 static int smb_tcpsndbuf = NB_SNDQ - 1;
67 static int smb_tcprcvbuf = NB_RCVQ - 1;
68
69 SYSCTL_DECL(_net_smb);
70 SYSCTL_INT(_net_smb, OID_AUTO, tcpsndbuf, CTLFLAG_RW, &smb_tcpsndbuf, 0, "");
71 SYSCTL_INT(_net_smb, OID_AUTO, tcprcvbuf, CTLFLAG_RW, &smb_tcprcvbuf, 0, "");
72
73 #define nb_sosend(so,m,flags,td) sosend(so, NULL, 0, m, 0, flags, td)
74
75 static int nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
76 u_int8_t *rpcodep, struct thread *td);
77 static int smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td);
78
79 static int
80 nb_setsockopt_int(struct socket *so, int level, int name, int val)
81 {
82 struct sockopt sopt;
83 int error;
84
85 bzero(&sopt, sizeof(sopt));
86 sopt.sopt_level = level;
87 sopt.sopt_name = name;
88 sopt.sopt_val = &val;
89 sopt.sopt_valsize = sizeof(val);
90 CURVNET_SET(so->so_vnet);
91 error = sosetopt(so, &sopt);
92 CURVNET_RESTORE();
93 return error;
94 }
95
96 static int
97 nb_intr(struct nbpcb *nbp, struct proc *p)
98 {
99 return 0;
100 }
101
102 static int
103 nb_upcall(struct socket *so, void *arg, int waitflag)
104 {
105 struct nbpcb *nbp = arg;
106
107 if (arg == NULL || nbp->nbp_selectid == NULL)
108 return (SU_OK);
109 wakeup(nbp->nbp_selectid);
110 return (SU_OK);
111 }
112
113 static int
114 nb_sethdr(struct mbuf *m, u_int8_t type, u_int32_t len)
115 {
116 u_int32_t *p = mtod(m, u_int32_t *);
117
118 *p = htonl((len & 0x1FFFF) | (type << 24));
119 return 0;
120 }
121
122 static int
123 nb_put_name(struct mbchain *mbp, struct sockaddr_nb *snb)
124 {
125 int error;
126 u_char seglen, *cp;
127
128 cp = snb->snb_name;
129 if (*cp == 0)
130 return EINVAL;
131 NBDEBUG("[%s]\n", cp);
132 for (;;) {
133 seglen = (*cp) + 1;
134 error = mb_put_mem(mbp, cp, seglen, MB_MSYSTEM);
135 if (error)
136 return error;
137 if (seglen == 1)
138 break;
139 cp += seglen;
140 }
141 return 0;
142 }
143
144 static int
145 nb_connect_in(struct nbpcb *nbp, struct sockaddr_in *to, struct thread *td)
146 {
147 struct socket *so;
148 int error, s;
149
150 error = socreate(AF_INET, &so, SOCK_STREAM, IPPROTO_TCP,
151 td->td_ucred, td);
152 if (error)
153 return error;
154 nbp->nbp_tso = so;
155 SOCKBUF_LOCK(&so->so_rcv);
156 soupcall_set(so, SO_RCV, nb_upcall, nbp);
157 SOCKBUF_UNLOCK(&so->so_rcv);
158 so->so_rcv.sb_timeo = (5 * SBT_1S);
159 so->so_snd.sb_timeo = (5 * SBT_1S);
160 error = soreserve(so, nbp->nbp_sndbuf, nbp->nbp_rcvbuf);
161 if (error)
162 goto bad;
163 nb_setsockopt_int(so, SOL_SOCKET, SO_KEEPALIVE, 1);
164 nb_setsockopt_int(so, IPPROTO_TCP, TCP_NODELAY, 1);
165 SOCKBUF_LOCK(&so->so_rcv);
166 so->so_rcv.sb_flags &= ~SB_NOINTR;
167 SOCKBUF_UNLOCK(&so->so_rcv);
168 SOCKBUF_LOCK(&so->so_snd);
169 so->so_snd.sb_flags &= ~SB_NOINTR;
170 SOCKBUF_UNLOCK(&so->so_snd);
171 error = soconnect(so, (struct sockaddr*)to, td);
172 if (error)
173 goto bad;
174 s = splnet();
175 while ((so->so_state & SS_ISCONNECTING) && so->so_error == 0) {
176 tsleep(&so->so_timeo, PSOCK, "nbcon", 2 * hz);
177 if ((so->so_state & SS_ISCONNECTING) && so->so_error == 0 &&
178 (error = nb_intr(nbp, td->td_proc)) != 0) {
179 so->so_state &= ~SS_ISCONNECTING;
180 splx(s);
181 goto bad;
182 }
183 }
184 if (so->so_error) {
185 error = so->so_error;
186 so->so_error = 0;
187 splx(s);
188 goto bad;
189 }
190 splx(s);
191 return 0;
192 bad:
193 smb_nbst_disconnect(nbp->nbp_vc, td);
194 return error;
195 }
196
197 static int
198 nbssn_rq_request(struct nbpcb *nbp, struct thread *td)
199 {
200 struct mbchain *mbp;
201 struct mdchain *mdp;
202 struct mbuf *m0;
203 struct timeval tv;
204 struct sockaddr_in sin;
205 u_short port;
206 u_int8_t rpcode;
207 int error, rplen;
208
209 mbp = malloc(sizeof(struct mbchain), M_NBDATA, M_WAITOK);
210 mdp = malloc(sizeof(struct mbchain), M_NBDATA, M_WAITOK);
211 error = mb_init(mbp);
212 if (error) {
213 free(mbp, M_NBDATA);
214 free(mdp, M_NBDATA);
215 return error;
216 }
217 mb_put_uint32le(mbp, 0);
218 nb_put_name(mbp, nbp->nbp_paddr);
219 nb_put_name(mbp, nbp->nbp_laddr);
220 nb_sethdr(mbp->mb_top, NB_SSN_REQUEST, mb_fixhdr(mbp) - 4);
221 error = nb_sosend(nbp->nbp_tso, mbp->mb_top, 0, td);
222 if (!error) {
223 nbp->nbp_state = NBST_RQSENT;
224 }
225 mb_detach(mbp);
226 mb_done(mbp);
227 free(mbp, M_NBDATA);
228 if (error) {
229 free(mdp, M_NBDATA);
230 return error;
231 }
232 TIMESPEC_TO_TIMEVAL(&tv, &nbp->nbp_timo);
233 error = selsocket(nbp->nbp_tso, POLLIN, &tv, td);
234 if (error == EWOULDBLOCK) { /* Timeout */
235 NBDEBUG("initial request timeout\n");
236 free(mdp, M_NBDATA);
237 return ETIMEDOUT;
238 }
239 if (error) { /* restart or interrupt */
240 free(mdp, M_NBDATA);
241 return error;
242 }
243 error = nbssn_recv(nbp, &m0, &rplen, &rpcode, td);
244 if (error) {
245 NBDEBUG("recv() error %d\n", error);
246 free(mdp, M_NBDATA);
247 return error;
248 }
249 /*
250 * Process NETBIOS reply
251 */
252 if (m0)
253 md_initm(mdp, m0);
254 error = 0;
255 do {
256 if (rpcode == NB_SSN_POSRESP) {
257 nbp->nbp_state = NBST_SESSION;
258 nbp->nbp_flags |= NBF_CONNECTED;
259 break;
260 }
261 if (rpcode != NB_SSN_RTGRESP) {
262 error = ECONNABORTED;
263 break;
264 }
265 if (rplen != 6) {
266 error = ECONNABORTED;
267 break;
268 }
269 md_get_mem(mdp, (caddr_t)&sin.sin_addr, 4, MB_MSYSTEM);
270 md_get_uint16(mdp, &port);
271 sin.sin_port = port;
272 nbp->nbp_state = NBST_RETARGET;
273 smb_nbst_disconnect(nbp->nbp_vc, td);
274 error = nb_connect_in(nbp, &sin, td);
275 if (!error)
276 error = nbssn_rq_request(nbp, td);
277 if (error) {
278 smb_nbst_disconnect(nbp->nbp_vc, td);
279 break;
280 }
281 } while(0);
282 if (m0)
283 md_done(mdp);
284 free(mdp, M_NBDATA);
285 return error;
286 }
287
288 static int
289 nbssn_recvhdr(struct nbpcb *nbp, int *lenp,
290 u_int8_t *rpcodep, int flags, struct thread *td)
291 {
292 struct socket *so = nbp->nbp_tso;
293 struct uio auio;
294 struct iovec aio;
295 u_int32_t len;
296 int error;
297
298 aio.iov_base = (caddr_t)&len;
299 aio.iov_len = sizeof(len);
300 auio.uio_iov = &aio;
301 auio.uio_iovcnt = 1;
302 auio.uio_segflg = UIO_SYSSPACE;
303 auio.uio_rw = UIO_READ;
304 auio.uio_offset = 0;
305 auio.uio_resid = sizeof(len);
306 auio.uio_td = td;
307 CURVNET_SET(so->so_vnet);
308 error = soreceive(so, (struct sockaddr **)NULL, &auio,
309 (struct mbuf **)NULL, (struct mbuf **)NULL, &flags);
310 CURVNET_RESTORE();
311 if (error)
312 return error;
313 if (auio.uio_resid > 0) {
314 SMBSDEBUG("short reply\n");
315 return EPIPE;
316 }
317 len = ntohl(len);
318 *rpcodep = (len >> 24) & 0xFF;
319 len &= 0x1ffff;
320 if (len > SMB_MAXPKTLEN) {
321 SMBERROR("packet too long (%d)\n", len);
322 return EFBIG;
323 }
324 *lenp = len;
325 return 0;
326 }
327
328 static int
329 nbssn_recv(struct nbpcb *nbp, struct mbuf **mpp, int *lenp,
330 u_int8_t *rpcodep, struct thread *td)
331 {
332 struct socket *so = nbp->nbp_tso;
333 struct uio auio;
334 struct mbuf *m, *tm, *im;
335 u_int8_t rpcode;
336 int len, resid;
337 int error, rcvflg;
338
339 if (so == NULL)
340 return ENOTCONN;
341
342 if (mpp)
343 *mpp = NULL;
344 m = NULL;
345 for(;;) {
346 /*
347 * Poll for a response header.
348 * If we don't have one waiting, return.
349 */
350 len = 0;
351 rpcode = 0;
352 error = nbssn_recvhdr(nbp, &len, &rpcode, MSG_DONTWAIT, td);
353 if ((so->so_state & (SS_ISDISCONNECTING | SS_ISDISCONNECTED)) ||
354 (so->so_rcv.sb_state & SBS_CANTRCVMORE)) {
355 nbp->nbp_state = NBST_CLOSED;
356 NBDEBUG("session closed by peer\n");
357 return ECONNRESET;
358 }
359 if (error)
360 return error;
361 if (len == 0 && nbp->nbp_state != NBST_SESSION)
362 break;
363 /* no data, try again */
364 if (rpcode == NB_SSN_KEEPALIVE)
365 continue;
366
367 /*
368 * Loop, blocking, for data following the response header.
369 *
370 * Note that we can't simply block here with MSG_WAITALL for the
371 * entire response size, as it may be larger than the TCP
372 * slow-start window that the sender employs. This will result
373 * in the sender stalling until the delayed ACK is sent, then
374 * resuming slow-start, resulting in very poor performance.
375 *
376 * Instead, we never request more than NB_SORECEIVE_CHUNK
377 * bytes at a time, resulting in an ack being pushed by
378 * the TCP code at the completion of each call.
379 */
380 resid = len;
381 while (resid > 0) {
382 tm = NULL;
383 rcvflg = MSG_WAITALL;
384 bzero(&auio, sizeof(auio));
385 auio.uio_resid = min(resid, NB_SORECEIVE_CHUNK);
386 auio.uio_td = td;
387 resid -= auio.uio_resid;
388 /*
389 * Spin until we have collected everything in
390 * this chunk.
391 */
392 do {
393 rcvflg = MSG_WAITALL;
394 CURVNET_SET(so->so_vnet);
395 error = soreceive(so, (struct sockaddr **)NULL,
396 &auio, &tm, (struct mbuf **)NULL, &rcvflg);
397 CURVNET_RESTORE();
398 } while (error == EWOULDBLOCK || error == EINTR ||
399 error == ERESTART);
400 if (error)
401 goto out;
402 /* short return guarantees unhappiness */
403 if (auio.uio_resid > 0) {
404 SMBERROR("packet is shorter than expected\n");
405 error = EPIPE;
406 goto out;
407 }
408 /* append received chunk to previous chunk(s) */
409 if (m == NULL) {
410 m = tm;
411 } else {
412 /*
413 * Just glue the new chain on the end.
414 * Consumer will pullup as required.
415 */
416 for (im = m; im->m_next != NULL; im = im->m_next)
417 ;
418 im->m_next = tm;
419 }
420 }
421 /* got a session/message packet? */
422 if (nbp->nbp_state == NBST_SESSION &&
423 rpcode == NB_SSN_MESSAGE)
424 break;
425 /* drop packet and try for another */
426 NBDEBUG("non-session packet %x\n", rpcode);
427 if (m) {
428 m_freem(m);
429 m = NULL;
430 }
431 }
432
433 out:
434 if (error) {
435 if (m)
436 m_freem(m);
437 return error;
438 }
439 if (mpp)
440 *mpp = m;
441 else
442 m_freem(m);
443 *lenp = len;
444 *rpcodep = rpcode;
445 return 0;
446 }
447
448 /*
449 * SMB transport interface
450 */
451 static int
452 smb_nbst_create(struct smb_vc *vcp, struct thread *td)
453 {
454 struct nbpcb *nbp;
455
456 nbp = malloc(sizeof *nbp, M_NBDATA, M_WAITOK);
457 bzero(nbp, sizeof *nbp);
458 nbp->nbp_timo.tv_sec = 15; /* XXX: sysctl ? */
459 nbp->nbp_state = NBST_CLOSED;
460 nbp->nbp_vc = vcp;
461 nbp->nbp_sndbuf = smb_tcpsndbuf;
462 nbp->nbp_rcvbuf = smb_tcprcvbuf;
463 vcp->vc_tdata = nbp;
464 return 0;
465 }
466
467 static int
468 smb_nbst_done(struct smb_vc *vcp, struct thread *td)
469 {
470 struct nbpcb *nbp = vcp->vc_tdata;
471
472 if (nbp == NULL)
473 return ENOTCONN;
474 smb_nbst_disconnect(vcp, td);
475 if (nbp->nbp_laddr)
476 free(nbp->nbp_laddr, M_SONAME);
477 if (nbp->nbp_paddr)
478 free(nbp->nbp_paddr, M_SONAME);
479 free(nbp, M_NBDATA);
480 return 0;
481 }
482
483 static int
484 smb_nbst_bind(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
485 {
486 struct nbpcb *nbp = vcp->vc_tdata;
487 struct sockaddr_nb *snb;
488 int error, slen;
489
490 NBDEBUG("\n");
491 error = EINVAL;
492 do {
493 if (nbp->nbp_flags & NBF_LOCADDR)
494 break;
495 /*
496 * It is possible to create NETBIOS name in the kernel,
497 * but nothing prevents us to do it in the user space.
498 */
499 if (sap == NULL)
500 break;
501 slen = sap->sa_len;
502 if (slen < NB_MINSALEN)
503 break;
504 snb = (struct sockaddr_nb*)sodupsockaddr(sap, M_WAITOK);
505 if (snb == NULL) {
506 error = ENOMEM;
507 break;
508 }
509 nbp->nbp_laddr = snb;
510 nbp->nbp_flags |= NBF_LOCADDR;
511 error = 0;
512 } while(0);
513 return error;
514 }
515
516 static int
517 smb_nbst_connect(struct smb_vc *vcp, struct sockaddr *sap, struct thread *td)
518 {
519 struct nbpcb *nbp = vcp->vc_tdata;
520 struct sockaddr_in sin;
521 struct sockaddr_nb *snb;
522 struct timespec ts1, ts2;
523 int error, slen;
524
525 NBDEBUG("\n");
526 if (nbp->nbp_tso != NULL)
527 return EISCONN;
528 if (nbp->nbp_laddr == NULL)
529 return EINVAL;
530 slen = sap->sa_len;
531 if (slen < NB_MINSALEN)
532 return EINVAL;
533 if (nbp->nbp_paddr) {
534 free(nbp->nbp_paddr, M_SONAME);
535 nbp->nbp_paddr = NULL;
536 }
537 snb = (struct sockaddr_nb*)sodupsockaddr(sap, M_WAITOK);
538 if (snb == NULL)
539 return ENOMEM;
540 nbp->nbp_paddr = snb;
541 sin = snb->snb_addrin;
542 getnanotime(&ts1);
543 error = nb_connect_in(nbp, &sin, td);
544 if (error)
545 return error;
546 getnanotime(&ts2);
547 timespecsub(&ts2, &ts1);
548 if (ts2.tv_sec == 0) {
549 ts2.tv_sec = 1;
550 ts2.tv_nsec = 0;
551 }
552 nbp->nbp_timo = ts2;
553 timespecadd(&nbp->nbp_timo, &ts2);
554 timespecadd(&nbp->nbp_timo, &ts2);
555 timespecadd(&nbp->nbp_timo, &ts2); /* * 4 */
556 error = nbssn_rq_request(nbp, td);
557 if (error)
558 smb_nbst_disconnect(vcp, td);
559 return error;
560 }
561
562 static int
563 smb_nbst_disconnect(struct smb_vc *vcp, struct thread *td)
564 {
565 struct nbpcb *nbp = vcp->vc_tdata;
566 struct socket *so;
567
568 if (nbp == NULL || nbp->nbp_tso == NULL)
569 return ENOTCONN;
570 if ((so = nbp->nbp_tso) != NULL) {
571 nbp->nbp_flags &= ~NBF_CONNECTED;
572 nbp->nbp_tso = (struct socket *)NULL;
573 soshutdown(so, 2);
574 soclose(so);
575 }
576 if (nbp->nbp_state != NBST_RETARGET) {
577 nbp->nbp_state = NBST_CLOSED;
578 }
579 return 0;
580 }
581
582 static int
583 smb_nbst_send(struct smb_vc *vcp, struct mbuf *m0, struct thread *td)
584 {
585 struct nbpcb *nbp = vcp->vc_tdata;
586 int error;
587
588 if (nbp->nbp_state != NBST_SESSION) {
589 error = ENOTCONN;
590 goto abort;
591 }
592 M_PREPEND(m0, 4, M_WAITOK);
593 nb_sethdr(m0, NB_SSN_MESSAGE, m_fixhdr(m0) - 4);
594 error = nb_sosend(nbp->nbp_tso, m0, 0, td);
595 return error;
596 abort:
597 if (m0)
598 m_freem(m0);
599 return error;
600 }
601
602
603 static int
604 smb_nbst_recv(struct smb_vc *vcp, struct mbuf **mpp, struct thread *td)
605 {
606 struct nbpcb *nbp = vcp->vc_tdata;
607 u_int8_t rpcode;
608 int error, rplen;
609
610 nbp->nbp_flags |= NBF_RECVLOCK;
611 error = nbssn_recv(nbp, mpp, &rplen, &rpcode, td);
612 nbp->nbp_flags &= ~NBF_RECVLOCK;
613 return error;
614 }
615
616 static void
617 smb_nbst_timo(struct smb_vc *vcp)
618 {
619 return;
620 }
621
622 static void
623 smb_nbst_intr(struct smb_vc *vcp)
624 {
625 struct nbpcb *nbp = vcp->vc_tdata;
626
627 if (nbp == NULL || nbp->nbp_tso == NULL)
628 return;
629 sorwakeup(nbp->nbp_tso);
630 sowwakeup(nbp->nbp_tso);
631 }
632
633 static int
634 smb_nbst_getparam(struct smb_vc *vcp, int param, void *data)
635 {
636 struct nbpcb *nbp = vcp->vc_tdata;
637
638 switch (param) {
639 case SMBTP_SNDSZ:
640 *(int*)data = nbp->nbp_sndbuf;
641 break;
642 case SMBTP_RCVSZ:
643 *(int*)data = nbp->nbp_rcvbuf;
644 break;
645 case SMBTP_TIMEOUT:
646 *(struct timespec*)data = nbp->nbp_timo;
647 break;
648 default:
649 return EINVAL;
650 }
651 return 0;
652 }
653
654 static int
655 smb_nbst_setparam(struct smb_vc *vcp, int param, void *data)
656 {
657 struct nbpcb *nbp = vcp->vc_tdata;
658
659 switch (param) {
660 case SMBTP_SELECTID:
661 nbp->nbp_selectid = data;
662 break;
663 default:
664 return EINVAL;
665 }
666 return 0;
667 }
668
669 /*
670 * Check for fatal errors
671 */
672 static int
673 smb_nbst_fatal(struct smb_vc *vcp, int error)
674 {
675 switch (error) {
676 case ENOTCONN:
677 case ENETRESET:
678 case ECONNABORTED:
679 return 1;
680 }
681 return 0;
682 }
683
684
685 struct smb_tran_desc smb_tran_nbtcp_desc = {
686 SMBT_NBTCP,
687 smb_nbst_create, smb_nbst_done,
688 smb_nbst_bind, smb_nbst_connect, smb_nbst_disconnect,
689 smb_nbst_send, smb_nbst_recv,
690 smb_nbst_timo, smb_nbst_intr,
691 smb_nbst_getparam, smb_nbst_setparam,
692 smb_nbst_fatal
693 };
694
Cache object: 72ab06233b6cd4032d5ba78199f42561
|