Annotation of sys/lib/libsa/rpc.c, Revision 1.1.1.1
1.1 nbrk 1: /* $OpenBSD: rpc.c,v 1.13 2003/08/11 06:23:09 deraadt Exp $ */
2: /* $NetBSD: rpc.c,v 1.16 1996/10/13 02:29:06 christos Exp $ */
3:
4: /*
5: * Copyright (c) 1992 Regents of the University of California.
6: * All rights reserved.
7: *
8: * This software was developed by the Computer Systems Engineering group
9: * at Lawrence Berkeley Laboratory under DARPA contract BG 91-66 and
10: * contributed to Berkeley.
11: *
12: * Redistribution and use in source and binary forms, with or without
13: * modification, are permitted provided that the following conditions
14: * are met:
15: * 1. Redistributions of source code must retain the above copyright
16: * notice, this list of conditions and the following disclaimer.
17: * 2. Redistributions in binary form must reproduce the above copyright
18: * notice, this list of conditions and the following disclaimer in the
19: * documentation and/or other materials provided with the distribution.
20: * 3. All advertising materials mentioning features or use of this software
21: * must display the following acknowledgement:
22: * This product includes software developed by the University of
23: * California, Lawrence Berkeley Laboratory and its contributors.
24: * 4. Neither the name of the University nor the names of its contributors
25: * may be used to endorse or promote products derived from this software
26: * without specific prior written permission.
27: *
28: * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
29: * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
30: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
31: * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
32: * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
33: * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
34: * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
35: * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
36: * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
37: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
38: * SUCH DAMAGE.
39: *
40: * @(#) Header: rpc.c,v 1.12 93/09/28 08:31:56 leres Exp (LBL)
41: */
42:
43: /*
44: * RPC functions used by NFS and bootparams.
45: * Note that bootparams requires the ability to find out the
46: * address of the server from which its response has come.
47: * This is supported by keeping the IP/UDP headers in the
48: * buffer space provided by the caller. (See rpc_fromaddr)
49: */
50:
51: #include <sys/param.h>
52: #include <sys/socket.h>
53:
54: #include <netinet/in.h>
55: #include <netinet/in_systm.h>
56:
57: #include <nfs/rpcv2.h>
58:
59: #include "stand.h"
60: #include "net.h"
61: #include "netif.h"
62: #include "rpc.h"
63:
64: struct auth_info {
65: int32_t authtype; /* auth type */
66: u_int32_t authlen; /* auth length */
67: };
68:
69: struct auth_unix {
70: int32_t ua_time;
71: int32_t ua_hostname; /* null */
72: int32_t ua_uid;
73: int32_t ua_gid;
74: int32_t ua_gidlist; /* null */
75: };
76:
77: struct rpc_call {
78: u_int32_t rp_xid; /* request transaction id */
79: int32_t rp_direction; /* call direction (0) */
80: u_int32_t rp_rpcvers; /* rpc version (2) */
81: u_int32_t rp_prog; /* program */
82: u_int32_t rp_vers; /* version */
83: u_int32_t rp_proc; /* procedure */
84: };
85:
86: struct rpc_reply {
87: u_int32_t rp_xid; /* request transaction id */
88: int32_t rp_direction; /* call direction (1) */
89: int32_t rp_astatus; /* accept status (0: accepted) */
90: union {
91: u_int32_t rpu_errno;
92: struct {
93: struct auth_info rok_auth;
94: u_int32_t rok_status;
95: } rpu_rok;
96: } rp_u;
97: };
98:
99: /* Local forwards */
100: static ssize_t recvrpc(struct iodesc *, void *, size_t, time_t);
101: static int rpc_getport(struct iodesc *, n_long, n_long);
102:
103: int rpc_xid;
104: int rpc_port = 0x400; /* predecrement */
105:
106: /*
107: * Make a rpc call; return length of answer
108: * Note: Caller must leave room for headers.
109: */
110: ssize_t
111: rpc_call(struct iodesc *d, n_long prog, n_long vers, n_long proc, void *sdata,
112: size_t slen, void *rdata, size_t rlen)
113: {
114: ssize_t cc;
115: struct auth_info *auth;
116: struct rpc_call *call;
117: struct rpc_reply *reply;
118: char *send_head, *send_tail;
119: char *recv_head, *recv_tail;
120: n_long x;
121: int port; /* host order */
122:
123: #ifdef RPC_DEBUG
124: if (debug)
125: printf("rpc_call: prog=0x%x vers=%d proc=%d\n",
126: prog, vers, proc);
127: #endif
128:
129: port = rpc_getport(d, prog, vers);
130: if (port == -1)
131: return (-1);
132:
133: d->destport = htons(port);
134:
135: /*
136: * Prepend authorization stuff and headers.
137: * Note, must prepend things in reverse order.
138: */
139: send_head = sdata;
140: send_tail = (char *)sdata + slen;
141:
142: /* Auth verifier is always auth_null */
143: send_head -= sizeof(*auth);
144: auth = (struct auth_info *)send_head;
145: auth->authtype = htonl(RPCAUTH_NULL);
146: auth->authlen = 0;
147:
148: #if 1
149: /* Auth credentials: always auth unix (as root) */
150: send_head -= sizeof(struct auth_unix);
151: bzero(send_head, sizeof(struct auth_unix));
152: send_head -= sizeof(*auth);
153: auth = (struct auth_info *)send_head;
154: auth->authtype = htonl(RPCAUTH_UNIX);
155: auth->authlen = htonl(sizeof(struct auth_unix));
156: #else
157: /* Auth credentials: always auth_null (XXX OK?) */
158: send_head -= sizeof(*auth);
159: auth = send_head;
160: auth->authtype = htonl(RPCAUTH_NULL);
161: auth->authlen = 0;
162: #endif
163:
164: /* RPC call structure. */
165: send_head -= sizeof(*call);
166: call = (struct rpc_call *)send_head;
167: rpc_xid++;
168: call->rp_xid = htonl(rpc_xid);
169: call->rp_direction = htonl(RPC_CALL);
170: call->rp_rpcvers = htonl(RPC_VER2);
171: call->rp_prog = htonl(prog);
172: call->rp_vers = htonl(vers);
173: call->rp_proc = htonl(proc);
174:
175: /* Make room for the rpc_reply header. */
176: recv_head = rdata;
177: recv_tail = (char *)rdata + rlen;
178: recv_head -= sizeof(*reply);
179:
180: cc = sendrecv(d,
181: sendudp, send_head, send_tail - send_head,
182: recvrpc, recv_head, recv_tail - recv_head);
183:
184: #ifdef RPC_DEBUG
185: if (debug)
186: printf("callrpc: cc=%d rlen=%d\n", cc, rlen);
187: #endif
188: if (cc < -1)
189: return (-1);
190:
191: if ((size_t)cc <= sizeof(*reply)) {
192: errno = EBADRPC;
193: return (-1);
194: }
195:
196: recv_tail = recv_head + cc;
197:
198: /*
199: * Check the RPC reply status.
200: * The xid, dir, astatus were already checked.
201: */
202: reply = (struct rpc_reply *)recv_head;
203: auth = &reply->rp_u.rpu_rok.rok_auth;
204: x = ntohl(auth->authlen);
205: if (x != 0) {
206: #ifdef RPC_DEBUG
207: if (debug)
208: printf("callrpc: reply auth != NULL\n");
209: #endif
210: errno = EBADRPC;
211: return(-1);
212: }
213: x = ntohl(reply->rp_u.rpu_rok.rok_status);
214: if (x != 0) {
215: printf("callrpc: error = %d\n", x);
216: errno = EBADRPC;
217: return(-1);
218: }
219: recv_head += sizeof(*reply);
220:
221: return (ssize_t)(recv_tail - recv_head);
222: }
223:
224: /*
225: * Returns true if packet is the one we're waiting for.
226: * This just checks the XID, direction, acceptance.
227: * Remaining checks are done by callrpc
228: */
229: static ssize_t
230: recvrpc(struct iodesc *d, void *pkt, size_t len, time_t tleft)
231: {
232: struct rpc_reply *reply;
233: ssize_t n;
234: int x;
235:
236: errno = 0;
237: #ifdef RPC_DEBUG
238: if (debug)
239: printf("recvrpc: called len=%d\n", len);
240: #endif
241:
242: n = readudp(d, pkt, len, tleft);
243: if (n <= (4 * 4))
244: return -1;
245:
246: reply = (struct rpc_reply *)pkt;
247:
248: x = ntohl(reply->rp_xid);
249: if (x != rpc_xid) {
250: #ifdef RPC_DEBUG
251: if (debug)
252: printf("recvrpc: rp_xid %d != xid %d\n", x, rpc_xid);
253: #endif
254: return -1;
255: }
256:
257: x = ntohl(reply->rp_direction);
258: if (x != RPC_REPLY) {
259: #ifdef RPC_DEBUG
260: if (debug)
261: printf("recvrpc: rp_direction %d != REPLY\n", x);
262: #endif
263: return -1;
264: }
265:
266: x = ntohl(reply->rp_astatus);
267: if (x != RPC_MSGACCEPTED) {
268: errno = ntohl(reply->rp_u.rpu_errno);
269: printf("recvrpc: reject, astat=%d, errno=%d\n", x, errno);
270: return -1;
271: }
272:
273: /* Return data count (thus indicating success) */
274: return (n);
275: }
276:
277: /*
278: * Given a pointer to a reply just received,
279: * dig out the IP address/port from the headers.
280: */
281: void
282: rpc_fromaddr(void *pkt, struct in_addr *addr, u_short *port)
283: {
284: struct hackhdr {
285: /* Tail of IP header: just IP addresses */
286: n_long ip_src;
287: n_long ip_dst;
288: /* UDP header: */
289: u_int16_t uh_sport; /* source port */
290: u_int16_t uh_dport; /* destination port */
291: int16_t uh_ulen; /* udp length */
292: u_int16_t uh_sum; /* udp checksum */
293: /* RPC reply header: */
294: struct rpc_reply rpc;
295: } *hhdr;
296:
297: hhdr = ((struct hackhdr *)pkt) - 1;
298: addr->s_addr = hhdr->ip_src;
299: *port = hhdr->uh_sport;
300: }
301:
302: /*
303: * RPC Portmapper cache
304: */
305: #define PMAP_NUM 8 /* need at most 5 pmap entries */
306:
307: int rpc_pmap_num;
308: struct pmap_list {
309: struct in_addr addr; /* server, net order */
310: u_int prog; /* host order */
311: u_int vers; /* host order */
312: int port; /* host order */
313: } rpc_pmap_list[PMAP_NUM];
314:
315: /* return port number in host order, or -1 */
316: int
317: rpc_pmap_getcache(struct in_addr addr, u_int prog, u_int vers)
318: {
319: struct pmap_list *pl;
320:
321: for (pl = rpc_pmap_list; pl < &rpc_pmap_list[rpc_pmap_num]; pl++) {
322: if (pl->addr.s_addr == addr.s_addr &&
323: pl->prog == prog && pl->vers == vers)
324: return (pl->port);
325: }
326: return (-1);
327: }
328:
329: void
330: rpc_pmap_putcache(struct in_addr addr, u_int prog, u_int vers, int port)
331: {
332: struct pmap_list *pl;
333:
334: /* Don't overflow cache... */
335: if (rpc_pmap_num >= PMAP_NUM) {
336: /* ... just re-use the last entry. */
337: rpc_pmap_num = PMAP_NUM - 1;
338: #ifdef RPC_DEBUG
339: printf("rpc_pmap_putcache: cache overflow\n");
340: #endif
341: }
342:
343: pl = &rpc_pmap_list[rpc_pmap_num];
344: rpc_pmap_num++;
345:
346: /* Cache answer */
347: pl->addr = addr;
348: pl->prog = prog;
349: pl->vers = vers;
350: pl->port = port;
351: }
352:
353:
354: /*
355: * Request a port number from the port mapper.
356: * Returns the port in host order.
357: */
358: int
359: rpc_getport(struct iodesc *d, n_long prog, n_long vers)
360: {
361: struct args {
362: n_long prog; /* call program */
363: n_long vers; /* call version */
364: n_long proto; /* call protocol */
365: n_long port; /* call port (unused) */
366: } *args;
367: struct res {
368: n_long port;
369: } *res;
370: struct {
371: n_long h[RPC_HEADER_WORDS];
372: struct args d;
373: } sdata;
374: struct {
375: n_long h[RPC_HEADER_WORDS];
376: struct res d;
377: n_long pad;
378: } rdata;
379: ssize_t cc;
380: int port;
381:
382: #ifdef RPC_DEBUG
383: if (debug)
384: printf("getport: prog=0x%x vers=%d\n", prog, vers);
385: #endif
386:
387: /* This one is fixed forever. */
388: if (prog == PMAPPROG)
389: return (PMAPPORT);
390:
391: /* Try for cached answer first */
392: port = rpc_pmap_getcache(d->destip, prog, vers);
393: if (port != -1)
394: return (port);
395:
396: args = &sdata.d;
397: args->prog = htonl(prog);
398: args->vers = htonl(vers);
399: args->proto = htonl(IPPROTO_UDP);
400: args->port = 0;
401: res = &rdata.d;
402:
403: cc = rpc_call(d, PMAPPROG, PMAPVERS, PMAPPROC_GETPORT,
404: args, sizeof(*args), res, sizeof(*res));
405: if (cc < 0 || (size_t)cc < sizeof(*res)) {
406: printf("getport: %s", strerror(errno));
407: errno = EBADRPC;
408: return (-1);
409: }
410: port = (int)ntohl(res->port);
411:
412: rpc_pmap_putcache(d->destip, prog, vers, port);
413:
414: return (port);
415: }
CVSweb