FreeBSD/Linux Kernel Cross Reference
sys/rpc/rpc_generic.c
1 /* $NetBSD: rpc_generic.c,v 1.4 2000/09/28 09:07:04 kleink Exp $ */
2
3 /*-
4 * SPDX-License-Identifier: BSD-3-Clause
5 *
6 * Copyright (c) 2009, Sun Microsystems, Inc.
7 * All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions are met:
11 * - Redistributions of source code must retain the above copyright notice,
12 * this list of conditions and the following disclaimer.
13 * - Redistributions in binary form must reproduce the above copyright notice,
14 * this list of conditions and the following disclaimer in the documentation
15 * and/or other materials provided with the distribution.
16 * - Neither the name of Sun Microsystems, Inc. nor the names of its
17 * contributors may be used to endorse or promote products derived
18 * from this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
24 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
25 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
27 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
31 */
32 /*
33 * Copyright (c) 1986-1991 by Sun Microsystems Inc.
34 */
35
36 /* #pragma ident "@(#)rpc_generic.c 1.17 94/04/24 SMI" */
37 #include <sys/cdefs.h>
38 __FBSDID("$FreeBSD$");
39
40 /*
41 * rpc_generic.c, Miscl routines for RPC.
42 *
43 */
44
45 #include "opt_inet6.h"
46
47 #include <sys/param.h>
48 #include <sys/kernel.h>
49 #include <sys/malloc.h>
50 #include <sys/mbuf.h>
51 #include <sys/module.h>
52 #include <sys/proc.h>
53 #include <sys/protosw.h>
54 #include <sys/sbuf.h>
55 #include <sys/systm.h>
56 #include <sys/socket.h>
57 #include <sys/socketvar.h>
58 #include <sys/syslog.h>
59
60 #include <net/vnet.h>
61
62 #include <rpc/rpc.h>
63 #include <rpc/nettype.h>
64 #include <rpc/rpcsec_gss.h>
65
66 #include <rpc/rpc_com.h>
67
68 extern u_long sb_max_adj; /* not defined in socketvar.h */
69
70 #if __FreeBSD_version < 700000
71 #define strrchr rindex
72 #endif
73
74 /* Provide an entry point hook for the rpcsec_gss module. */
75 struct rpc_gss_entries rpc_gss_entries;
76
77 struct handle {
78 NCONF_HANDLE *nhandle;
79 int nflag; /* Whether NETPATH or NETCONFIG */
80 int nettype;
81 };
82
83 static const struct _rpcnettype {
84 const char *name;
85 const int type;
86 } _rpctypelist[] = {
87 { "netpath", _RPC_NETPATH },
88 { "visible", _RPC_VISIBLE },
89 { "circuit_v", _RPC_CIRCUIT_V },
90 { "datagram_v", _RPC_DATAGRAM_V },
91 { "circuit_n", _RPC_CIRCUIT_N },
92 { "datagram_n", _RPC_DATAGRAM_N },
93 { "tcp", _RPC_TCP },
94 { "udp", _RPC_UDP },
95 { 0, _RPC_NONE }
96 };
97
98 struct netid_af {
99 const char *netid;
100 int af;
101 int protocol;
102 };
103
104 static const struct netid_af na_cvt[] = {
105 { "udp", AF_INET, IPPROTO_UDP },
106 { "tcp", AF_INET, IPPROTO_TCP },
107 #ifdef INET6
108 { "udp6", AF_INET6, IPPROTO_UDP },
109 { "tcp6", AF_INET6, IPPROTO_TCP },
110 #endif
111 { "local", AF_LOCAL, 0 }
112 };
113
114 struct rpc_createerr rpc_createerr;
115
116 /*
117 * Find the appropriate buffer size
118 */
119 u_int
120 /*ARGSUSED*/
121 __rpc_get_t_size(int af, int proto, int size)
122 {
123 int defsize;
124
125 switch (proto) {
126 case IPPROTO_TCP:
127 defsize = 64 * 1024; /* XXX */
128 break;
129 case IPPROTO_UDP:
130 defsize = UDPMSGSIZE;
131 break;
132 default:
133 defsize = RPC_MAXDATASIZE;
134 break;
135 }
136 if (size == 0)
137 return defsize;
138
139 /* Check whether the value is within the upper max limit */
140 return (size > sb_max_adj ? (u_int)sb_max_adj : (u_int)size);
141 }
142
143 /*
144 * Find the appropriate address buffer size
145 */
146 u_int
147 __rpc_get_a_size(af)
148 int af;
149 {
150 switch (af) {
151 case AF_INET:
152 return sizeof (struct sockaddr_in);
153 #ifdef INET6
154 case AF_INET6:
155 return sizeof (struct sockaddr_in6);
156 #endif
157 case AF_LOCAL:
158 return sizeof (struct sockaddr_un);
159 default:
160 break;
161 }
162 return ((u_int)RPC_MAXADDRSIZE);
163 }
164
165 #if 0
166
167 /*
168 * Used to ping the NULL procedure for clnt handle.
169 * Returns NULL if fails, else a non-NULL pointer.
170 */
171 void *
172 rpc_nullproc(clnt)
173 CLIENT *clnt;
174 {
175 struct timeval TIMEOUT = {25, 0};
176
177 if (clnt_call(clnt, NULLPROC, (xdrproc_t) xdr_void, NULL,
178 (xdrproc_t) xdr_void, NULL, TIMEOUT) != RPC_SUCCESS) {
179 return (NULL);
180 }
181 return ((void *) clnt);
182 }
183
184 #endif
185
186 int
187 __rpc_socket2sockinfo(struct socket *so, struct __rpc_sockinfo *sip)
188 {
189 int type, proto;
190 struct sockaddr *sa;
191 sa_family_t family;
192 struct sockopt opt;
193 int error;
194
195 CURVNET_SET(so->so_vnet);
196 error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa);
197 CURVNET_RESTORE();
198 if (error)
199 return 0;
200
201 sip->si_alen = sa->sa_len;
202 family = sa->sa_family;
203 free(sa, M_SONAME);
204
205 opt.sopt_dir = SOPT_GET;
206 opt.sopt_level = SOL_SOCKET;
207 opt.sopt_name = SO_TYPE;
208 opt.sopt_val = &type;
209 opt.sopt_valsize = sizeof type;
210 opt.sopt_td = NULL;
211 error = sogetopt(so, &opt);
212 if (error)
213 return 0;
214
215 /* XXX */
216 if (family != AF_LOCAL) {
217 if (type == SOCK_STREAM)
218 proto = IPPROTO_TCP;
219 else if (type == SOCK_DGRAM)
220 proto = IPPROTO_UDP;
221 else
222 return 0;
223 } else
224 proto = 0;
225
226 sip->si_af = family;
227 sip->si_proto = proto;
228 sip->si_socktype = type;
229
230 return 1;
231 }
232
233 /*
234 * Linear search, but the number of entries is small.
235 */
236 int
237 __rpc_nconf2sockinfo(const struct netconfig *nconf, struct __rpc_sockinfo *sip)
238 {
239 int i;
240
241 for (i = 0; i < (sizeof na_cvt) / (sizeof (struct netid_af)); i++)
242 if (strcmp(na_cvt[i].netid, nconf->nc_netid) == 0 || (
243 strcmp(nconf->nc_netid, "unix") == 0 &&
244 strcmp(na_cvt[i].netid, "local") == 0)) {
245 sip->si_af = na_cvt[i].af;
246 sip->si_proto = na_cvt[i].protocol;
247 sip->si_socktype =
248 __rpc_seman2socktype((int)nconf->nc_semantics);
249 if (sip->si_socktype == -1)
250 return 0;
251 sip->si_alen = __rpc_get_a_size(sip->si_af);
252 return 1;
253 }
254
255 return 0;
256 }
257
258 struct socket *
259 __rpc_nconf2socket(const struct netconfig *nconf)
260 {
261 struct __rpc_sockinfo si;
262 struct socket *so;
263 int error;
264
265 if (!__rpc_nconf2sockinfo(nconf, &si))
266 return 0;
267
268 so = NULL;
269 error = socreate(si.si_af, &so, si.si_socktype, si.si_proto,
270 curthread->td_ucred, curthread);
271
272 if (error)
273 return NULL;
274 else
275 return so;
276 }
277
278 char *
279 taddr2uaddr(const struct netconfig *nconf, const struct netbuf *nbuf)
280 {
281 struct __rpc_sockinfo si;
282
283 if (!__rpc_nconf2sockinfo(nconf, &si))
284 return NULL;
285 return __rpc_taddr2uaddr_af(si.si_af, nbuf);
286 }
287
288 struct netbuf *
289 uaddr2taddr(const struct netconfig *nconf, const char *uaddr)
290 {
291 struct __rpc_sockinfo si;
292
293 if (!__rpc_nconf2sockinfo(nconf, &si))
294 return NULL;
295 return __rpc_uaddr2taddr_af(si.si_af, uaddr);
296 }
297
298 char *
299 __rpc_taddr2uaddr_af(int af, const struct netbuf *nbuf)
300 {
301 char *ret;
302 struct sbuf sb;
303 struct sockaddr_in *sin;
304 struct sockaddr_un *sun;
305 char namebuf[INET_ADDRSTRLEN];
306 #ifdef INET6
307 struct sockaddr_in6 *sin6;
308 char namebuf6[INET6_ADDRSTRLEN];
309 #endif
310 u_int16_t port;
311
312 sbuf_new(&sb, NULL, 0, SBUF_AUTOEXTEND);
313
314 switch (af) {
315 case AF_INET:
316 if (nbuf->len < sizeof(*sin))
317 return NULL;
318 sin = nbuf->buf;
319 if (inet_ntop(af, &sin->sin_addr, namebuf, sizeof namebuf)
320 == NULL)
321 return NULL;
322 port = ntohs(sin->sin_port);
323 if (sbuf_printf(&sb, "%s.%u.%u", namebuf,
324 ((uint32_t)port) >> 8,
325 port & 0xff) < 0)
326 return NULL;
327 break;
328 #ifdef INET6
329 case AF_INET6:
330 if (nbuf->len < sizeof(*sin6))
331 return NULL;
332 sin6 = nbuf->buf;
333 if (inet_ntop(af, &sin6->sin6_addr, namebuf6, sizeof namebuf6)
334 == NULL)
335 return NULL;
336 port = ntohs(sin6->sin6_port);
337 if (sbuf_printf(&sb, "%s.%u.%u", namebuf6,
338 ((uint32_t)port) >> 8,
339 port & 0xff) < 0)
340 return NULL;
341 break;
342 #endif
343 case AF_LOCAL:
344 sun = nbuf->buf;
345 if (sbuf_printf(&sb, "%.*s", (int)(sun->sun_len -
346 offsetof(struct sockaddr_un, sun_path)),
347 sun->sun_path) < 0)
348 return (NULL);
349 break;
350 default:
351 return NULL;
352 }
353
354 sbuf_finish(&sb);
355 ret = strdup(sbuf_data(&sb), M_RPC);
356 sbuf_delete(&sb);
357
358 return ret;
359 }
360
361 struct netbuf *
362 __rpc_uaddr2taddr_af(int af, const char *uaddr)
363 {
364 struct netbuf *ret = NULL;
365 char *addrstr, *p;
366 unsigned port, portlo, porthi;
367 struct sockaddr_in *sin;
368 #ifdef INET6
369 struct sockaddr_in6 *sin6;
370 #endif
371 struct sockaddr_un *sun;
372
373 port = 0;
374 sin = NULL;
375
376 if (uaddr == NULL)
377 return NULL;
378
379 addrstr = strdup(uaddr, M_RPC);
380 if (addrstr == NULL)
381 return NULL;
382
383 /*
384 * AF_LOCAL addresses are expected to be absolute
385 * pathnames, anything else will be AF_INET or AF_INET6.
386 */
387 if (*addrstr != '/') {
388 p = strrchr(addrstr, '.');
389 if (p == NULL)
390 goto out;
391 portlo = (unsigned)strtol(p + 1, NULL, 10);
392 *p = '\0';
393
394 p = strrchr(addrstr, '.');
395 if (p == NULL)
396 goto out;
397 porthi = (unsigned)strtol(p + 1, NULL, 10);
398 *p = '\0';
399 port = (porthi << 8) | portlo;
400 }
401
402 ret = (struct netbuf *)malloc(sizeof *ret, M_RPC, M_WAITOK);
403
404 switch (af) {
405 case AF_INET:
406 sin = (struct sockaddr_in *)malloc(sizeof *sin, M_RPC,
407 M_WAITOK);
408 memset(sin, 0, sizeof *sin);
409 sin->sin_family = AF_INET;
410 sin->sin_port = htons(port);
411 if (inet_pton(AF_INET, addrstr, &sin->sin_addr) <= 0) {
412 free(sin, M_RPC);
413 free(ret, M_RPC);
414 ret = NULL;
415 goto out;
416 }
417 sin->sin_len = ret->maxlen = ret->len = sizeof *sin;
418 ret->buf = sin;
419 break;
420 #ifdef INET6
421 case AF_INET6:
422 sin6 = (struct sockaddr_in6 *)malloc(sizeof *sin6, M_RPC,
423 M_WAITOK);
424 memset(sin6, 0, sizeof *sin6);
425 sin6->sin6_family = AF_INET6;
426 sin6->sin6_port = htons(port);
427 if (inet_pton(AF_INET6, addrstr, &sin6->sin6_addr) <= 0) {
428 free(sin6, M_RPC);
429 free(ret, M_RPC);
430 ret = NULL;
431 goto out;
432 }
433 sin6->sin6_len = ret->maxlen = ret->len = sizeof *sin6;
434 ret->buf = sin6;
435 break;
436 #endif
437 case AF_LOCAL:
438 sun = (struct sockaddr_un *)malloc(sizeof *sun, M_RPC,
439 M_WAITOK);
440 memset(sun, 0, sizeof *sun);
441 sun->sun_family = AF_LOCAL;
442 strncpy(sun->sun_path, addrstr, sizeof(sun->sun_path) - 1);
443 ret->len = ret->maxlen = sun->sun_len = SUN_LEN(sun);
444 ret->buf = sun;
445 break;
446 default:
447 break;
448 }
449 out:
450 free(addrstr, M_RPC);
451 return ret;
452 }
453
454 int
455 __rpc_seman2socktype(int semantics)
456 {
457 switch (semantics) {
458 case NC_TPI_CLTS:
459 return SOCK_DGRAM;
460 case NC_TPI_COTS_ORD:
461 return SOCK_STREAM;
462 case NC_TPI_RAW:
463 return SOCK_RAW;
464 default:
465 break;
466 }
467
468 return -1;
469 }
470
471 int
472 __rpc_socktype2seman(int socktype)
473 {
474 switch (socktype) {
475 case SOCK_DGRAM:
476 return NC_TPI_CLTS;
477 case SOCK_STREAM:
478 return NC_TPI_COTS_ORD;
479 case SOCK_RAW:
480 return NC_TPI_RAW;
481 default:
482 break;
483 }
484
485 return -1;
486 }
487
488 /*
489 * Returns the type of the network as defined in <rpc/nettype.h>
490 * If nettype is NULL, it defaults to NETPATH.
491 */
492 static int
493 getnettype(const char *nettype)
494 {
495 int i;
496
497 if ((nettype == NULL) || (nettype[0] == 0)) {
498 return (_RPC_NETPATH); /* Default */
499 }
500
501 #if 0
502 nettype = strlocase(nettype);
503 #endif
504 for (i = 0; _rpctypelist[i].name; i++)
505 if (strcasecmp(nettype, _rpctypelist[i].name) == 0) {
506 return (_rpctypelist[i].type);
507 }
508 return (_rpctypelist[i].type);
509 }
510
511 /*
512 * For the given nettype (tcp or udp only), return the first structure found.
513 * This should be freed by calling freenetconfigent()
514 */
515 struct netconfig *
516 __rpc_getconfip(const char *nettype)
517 {
518 char *netid;
519 static char *netid_tcp = (char *) NULL;
520 static char *netid_udp = (char *) NULL;
521 struct netconfig *dummy;
522
523 if (!netid_udp && !netid_tcp) {
524 struct netconfig *nconf;
525 void *confighandle;
526
527 if (!(confighandle = setnetconfig())) {
528 log(LOG_ERR, "rpc: failed to open " NETCONFIG);
529 return (NULL);
530 }
531 while ((nconf = getnetconfig(confighandle)) != NULL) {
532 if (strcmp(nconf->nc_protofmly, NC_INET) == 0) {
533 if (strcmp(nconf->nc_proto, NC_TCP) == 0) {
534 netid_tcp = strdup(nconf->nc_netid,
535 M_RPC);
536 } else
537 if (strcmp(nconf->nc_proto, NC_UDP) == 0) {
538 netid_udp = strdup(nconf->nc_netid,
539 M_RPC);
540 }
541 }
542 }
543 endnetconfig(confighandle);
544 }
545 if (strcmp(nettype, "udp") == 0)
546 netid = netid_udp;
547 else if (strcmp(nettype, "tcp") == 0)
548 netid = netid_tcp;
549 else {
550 return (NULL);
551 }
552 if ((netid == NULL) || (netid[0] == 0)) {
553 return (NULL);
554 }
555 dummy = getnetconfigent(netid);
556 return (dummy);
557 }
558
559 /*
560 * Returns the type of the nettype, which should then be used with
561 * __rpc_getconf().
562 *
563 * For simplicity in the kernel, we don't support the NETPATH
564 * environment variable. We behave as userland would then NETPATH is
565 * unset, i.e. iterate over all visible entries in netconfig.
566 */
567 void *
568 __rpc_setconf(nettype)
569 const char *nettype;
570 {
571 struct handle *handle;
572
573 handle = (struct handle *) malloc(sizeof (struct handle),
574 M_RPC, M_WAITOK);
575 switch (handle->nettype = getnettype(nettype)) {
576 case _RPC_NETPATH:
577 case _RPC_CIRCUIT_N:
578 case _RPC_DATAGRAM_N:
579 if (!(handle->nhandle = setnetconfig()))
580 goto failed;
581 handle->nflag = TRUE;
582 break;
583 case _RPC_VISIBLE:
584 case _RPC_CIRCUIT_V:
585 case _RPC_DATAGRAM_V:
586 case _RPC_TCP:
587 case _RPC_UDP:
588 if (!(handle->nhandle = setnetconfig())) {
589 log(LOG_ERR, "rpc: failed to open " NETCONFIG);
590 goto failed;
591 }
592 handle->nflag = FALSE;
593 break;
594 default:
595 goto failed;
596 }
597
598 return (handle);
599
600 failed:
601 free(handle, M_RPC);
602 return (NULL);
603 }
604
605 /*
606 * Returns the next netconfig struct for the given "net" type.
607 * __rpc_setconf() should have been called previously.
608 */
609 struct netconfig *
610 __rpc_getconf(void *vhandle)
611 {
612 struct handle *handle;
613 struct netconfig *nconf;
614
615 handle = (struct handle *)vhandle;
616 if (handle == NULL) {
617 return (NULL);
618 }
619 for (;;) {
620 if (handle->nflag) {
621 nconf = getnetconfig(handle->nhandle);
622 if (nconf && !(nconf->nc_flag & NC_VISIBLE))
623 continue;
624 } else {
625 nconf = getnetconfig(handle->nhandle);
626 }
627 if (nconf == NULL)
628 break;
629 if ((nconf->nc_semantics != NC_TPI_CLTS) &&
630 (nconf->nc_semantics != NC_TPI_COTS) &&
631 (nconf->nc_semantics != NC_TPI_COTS_ORD))
632 continue;
633 switch (handle->nettype) {
634 case _RPC_VISIBLE:
635 if (!(nconf->nc_flag & NC_VISIBLE))
636 continue;
637 /* FALLTHROUGH */
638 case _RPC_NETPATH: /* Be happy */
639 break;
640 case _RPC_CIRCUIT_V:
641 if (!(nconf->nc_flag & NC_VISIBLE))
642 continue;
643 /* FALLTHROUGH */
644 case _RPC_CIRCUIT_N:
645 if ((nconf->nc_semantics != NC_TPI_COTS) &&
646 (nconf->nc_semantics != NC_TPI_COTS_ORD))
647 continue;
648 break;
649 case _RPC_DATAGRAM_V:
650 if (!(nconf->nc_flag & NC_VISIBLE))
651 continue;
652 /* FALLTHROUGH */
653 case _RPC_DATAGRAM_N:
654 if (nconf->nc_semantics != NC_TPI_CLTS)
655 continue;
656 break;
657 case _RPC_TCP:
658 if (((nconf->nc_semantics != NC_TPI_COTS) &&
659 (nconf->nc_semantics != NC_TPI_COTS_ORD)) ||
660 (strcmp(nconf->nc_protofmly, NC_INET)
661 #ifdef INET6
662 && strcmp(nconf->nc_protofmly, NC_INET6))
663 #else
664 )
665 #endif
666 ||
667 strcmp(nconf->nc_proto, NC_TCP))
668 continue;
669 break;
670 case _RPC_UDP:
671 if ((nconf->nc_semantics != NC_TPI_CLTS) ||
672 (strcmp(nconf->nc_protofmly, NC_INET)
673 #ifdef INET6
674 && strcmp(nconf->nc_protofmly, NC_INET6))
675 #else
676 )
677 #endif
678 ||
679 strcmp(nconf->nc_proto, NC_UDP))
680 continue;
681 break;
682 }
683 break;
684 }
685 return (nconf);
686 }
687
688 void
689 __rpc_endconf(vhandle)
690 void * vhandle;
691 {
692 struct handle *handle;
693
694 handle = (struct handle *) vhandle;
695 if (handle == NULL) {
696 return;
697 }
698 endnetconfig(handle->nhandle);
699 free(handle, M_RPC);
700 }
701
702 int
703 __rpc_sockisbound(struct socket *so)
704 {
705 struct sockaddr *sa;
706 int error, bound;
707
708 CURVNET_SET(so->so_vnet);
709 error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa);
710 CURVNET_RESTORE();
711 if (error)
712 return (0);
713
714 switch (sa->sa_family) {
715 case AF_INET:
716 bound = (((struct sockaddr_in *) sa)->sin_port != 0);
717 break;
718 #ifdef INET6
719 case AF_INET6:
720 bound = (((struct sockaddr_in6 *) sa)->sin6_port != 0);
721 break;
722 #endif
723 case AF_LOCAL:
724 /* XXX check this */
725 bound = (((struct sockaddr_un *) sa)->sun_path[0] != '\0');
726 break;
727 default:
728 bound = FALSE;
729 break;
730 }
731
732 free(sa, M_SONAME);
733
734 return bound;
735 }
736
737 /*
738 * Implement XDR-style API for RPC call.
739 */
740 enum clnt_stat
741 clnt_call_private(
742 CLIENT *cl, /* client handle */
743 struct rpc_callextra *ext, /* call metadata */
744 rpcproc_t proc, /* procedure number */
745 xdrproc_t xargs, /* xdr routine for args */
746 void *argsp, /* pointer to args */
747 xdrproc_t xresults, /* xdr routine for results */
748 void *resultsp, /* pointer to results */
749 struct timeval utimeout) /* seconds to wait before giving up */
750 {
751 XDR xdrs;
752 struct mbuf *mreq;
753 struct mbuf *mrep;
754 enum clnt_stat stat;
755
756 mreq = m_getcl(M_WAITOK, MT_DATA, 0);
757
758 xdrmbuf_create(&xdrs, mreq, XDR_ENCODE);
759 if (!xargs(&xdrs, argsp)) {
760 m_freem(mreq);
761 return (RPC_CANTENCODEARGS);
762 }
763 XDR_DESTROY(&xdrs);
764
765 stat = CLNT_CALL_MBUF(cl, ext, proc, mreq, &mrep, utimeout);
766 m_freem(mreq);
767
768 if (stat == RPC_SUCCESS) {
769 xdrmbuf_create(&xdrs, mrep, XDR_DECODE);
770 if (!xresults(&xdrs, resultsp)) {
771 XDR_DESTROY(&xdrs);
772 return (RPC_CANTDECODERES);
773 }
774 XDR_DESTROY(&xdrs);
775 }
776
777 return (stat);
778 }
779
780 /*
781 * Bind a socket to a privileged IP port
782 */
783 int
784 bindresvport(struct socket *so, struct sockaddr *sa)
785 {
786 int old, error, af;
787 bool_t freesa = FALSE;
788 struct sockaddr_in *sin;
789 #ifdef INET6
790 struct sockaddr_in6 *sin6;
791 #endif
792 struct sockopt opt;
793 int proto, portrange, portlow;
794 u_int16_t *portp;
795 socklen_t salen;
796
797 if (sa == NULL) {
798 CURVNET_SET(so->so_vnet);
799 error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa);
800 CURVNET_RESTORE();
801 if (error)
802 return (error);
803 freesa = TRUE;
804 af = sa->sa_family;
805 salen = sa->sa_len;
806 memset(sa, 0, sa->sa_len);
807 } else {
808 af = sa->sa_family;
809 salen = sa->sa_len;
810 }
811
812 switch (af) {
813 case AF_INET:
814 proto = IPPROTO_IP;
815 portrange = IP_PORTRANGE;
816 portlow = IP_PORTRANGE_LOW;
817 sin = (struct sockaddr_in *)sa;
818 portp = &sin->sin_port;
819 break;
820 #ifdef INET6
821 case AF_INET6:
822 proto = IPPROTO_IPV6;
823 portrange = IPV6_PORTRANGE;
824 portlow = IPV6_PORTRANGE_LOW;
825 sin6 = (struct sockaddr_in6 *)sa;
826 portp = &sin6->sin6_port;
827 break;
828 #endif
829 default:
830 return (EPFNOSUPPORT);
831 }
832
833 sa->sa_family = af;
834 sa->sa_len = salen;
835
836 if (*portp == 0) {
837 bzero(&opt, sizeof(opt));
838 opt.sopt_dir = SOPT_GET;
839 opt.sopt_level = proto;
840 opt.sopt_name = portrange;
841 opt.sopt_val = &old;
842 opt.sopt_valsize = sizeof(old);
843 error = sogetopt(so, &opt);
844 if (error) {
845 goto out;
846 }
847
848 opt.sopt_dir = SOPT_SET;
849 opt.sopt_val = &portlow;
850 error = sosetopt(so, &opt);
851 if (error)
852 goto out;
853 }
854
855 error = sobind(so, sa, curthread);
856
857 if (*portp == 0) {
858 if (error) {
859 opt.sopt_dir = SOPT_SET;
860 opt.sopt_val = &old;
861 sosetopt(so, &opt);
862 }
863 }
864 out:
865 if (freesa)
866 free(sa, M_SONAME);
867
868 return (error);
869 }
870
871 /*
872 * Kernel module glue
873 */
874 static int
875 krpc_modevent(module_t mod, int type, void *data)
876 {
877
878 return (0);
879 }
880 static moduledata_t krpc_mod = {
881 "krpc",
882 krpc_modevent,
883 NULL,
884 };
885 DECLARE_MODULE(krpc, krpc_mod, SI_SUB_VFS, SI_ORDER_ANY);
886
887 /* So that loader and kldload(2) can find us, wherever we are.. */
888 MODULE_VERSION(krpc, 1);
889 MODULE_DEPEND(krpc, xdr, 1, 1, 1);
Cache object: 8210280e1ad10ecf6a4a89d6e1379bc5
|