1 /* $NetBSD: rpc_generic.c,v 1.4 2000/09/28 09:07:04 kleink Exp $ */ 2 3 /* 4 * Sun RPC is a product of Sun Microsystems, Inc. and is provided for 5 * unrestricted use provided that this legend is included on all tape 6 * media and as a part of the software program in whole or part. Users 7 * may copy or modify Sun RPC without charge, but are not authorized 8 * to license or distribute it to anyone else except as part of a product or 9 * program developed by the user. 10 * 11 * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE 12 * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR 13 * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE. 14 * 15 * Sun RPC is provided with no support and without any obligation on the 16 * part of Sun Microsystems, Inc. to assist in its use, correction, 17 * modification or enhancement. 18 * 19 * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE 20 * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC 21 * OR ANY PART THEREOF. 22 * 23 * In no event will Sun Microsystems, Inc. be liable for any lost revenue 24 * or profits or other special, indirect and consequential damages, even if 25 * Sun has been advised of the possibility of such damages. 26 * 27 * Sun Microsystems, Inc. 28 * 2550 Garcia Avenue 29 * Mountain View, California 94043 30 */ 31 /* 32 * Copyright (c) 1986-1991 by Sun Microsystems Inc. 33 */ 34 35 /* #pragma ident "@(#)rpc_generic.c 1.17 94/04/24 SMI" */ 36 #include <sys/cdefs.h> 37 __FBSDID("$FreeBSD$"); 38 39 /* 40 * rpc_generic.c, Miscl routines for RPC. 41 * 42 */ 43 44 #include "opt_inet6.h" 45 46 #include <sys/param.h> 47 #include <sys/kernel.h> 48 #include <sys/malloc.h> 49 #include <sys/mbuf.h> 50 #include <sys/module.h> 51 #include <sys/proc.h> 52 #include <sys/protosw.h> 53 #include <sys/sbuf.h> 54 #include <sys/systm.h> 55 #include <sys/socket.h> 56 #include <sys/socketvar.h> 57 #include <sys/syslog.h> 58 59 #include <rpc/rpc.h> 60 #include <rpc/nettype.h> 61 62 #include <rpc/rpc_com.h> 63 64 #if __FreeBSD_version < 700000 65 #define strrchr rindex 66 #endif 67 68 struct handle { 69 NCONF_HANDLE *nhandle; 70 int nflag; /* Whether NETPATH or NETCONFIG */ 71 int nettype; 72 }; 73 74 static const struct _rpcnettype { 75 const char *name; 76 const int type; 77 } _rpctypelist[] = { 78 { "netpath", _RPC_NETPATH }, 79 { "visible", _RPC_VISIBLE }, 80 { "circuit_v", _RPC_CIRCUIT_V }, 81 { "datagram_v", _RPC_DATAGRAM_V }, 82 { "circuit_n", _RPC_CIRCUIT_N }, 83 { "datagram_n", _RPC_DATAGRAM_N }, 84 { "tcp", _RPC_TCP }, 85 { "udp", _RPC_UDP }, 86 { 0, _RPC_NONE } 87 }; 88 89 struct netid_af { 90 const char *netid; 91 int af; 92 int protocol; 93 }; 94 95 static const struct netid_af na_cvt[] = { 96 { "udp", AF_INET, IPPROTO_UDP }, 97 { "tcp", AF_INET, IPPROTO_TCP }, 98 #ifdef INET6 99 { "udp6", AF_INET6, IPPROTO_UDP }, 100 { "tcp6", AF_INET6, IPPROTO_TCP }, 101 #endif 102 { "local", AF_LOCAL, 0 } 103 }; 104 105 struct rpc_createerr rpc_createerr; 106 107 /* 108 * Find the appropriate buffer size 109 */ 110 u_int 111 /*ARGSUSED*/ 112 __rpc_get_t_size(int af, int proto, int size) 113 { 114 int maxsize, defsize; 115 116 maxsize = 256 * 1024; /* XXX */ 117 switch (proto) { 118 case IPPROTO_TCP: 119 defsize = 64 * 1024; /* XXX */ 120 break; 121 case IPPROTO_UDP: 122 defsize = UDPMSGSIZE; 123 break; 124 default: 125 defsize = RPC_MAXDATASIZE; 126 break; 127 } 128 if (size == 0) 129 return defsize; 130 131 /* Check whether the value is within the upper max limit */ 132 return (size > maxsize ? (u_int)maxsize : (u_int)size); 133 } 134 135 /* 136 * Find the appropriate address buffer size 137 */ 138 u_int 139 __rpc_get_a_size(af) 140 int af; 141 { 142 switch (af) { 143 case AF_INET: 144 return sizeof (struct sockaddr_in); 145 #ifdef INET6 146 case AF_INET6: 147 return sizeof (struct sockaddr_in6); 148 #endif 149 case AF_LOCAL: 150 return sizeof (struct sockaddr_un); 151 default: 152 break; 153 } 154 return ((u_int)RPC_MAXADDRSIZE); 155 } 156 157 #if 0 158 159 /* 160 * Used to ping the NULL procedure for clnt handle. 161 * Returns NULL if fails, else a non-NULL pointer. 162 */ 163 void * 164 rpc_nullproc(clnt) 165 CLIENT *clnt; 166 { 167 struct timeval TIMEOUT = {25, 0}; 168 169 if (clnt_call(clnt, NULLPROC, (xdrproc_t) xdr_void, NULL, 170 (xdrproc_t) xdr_void, NULL, TIMEOUT) != RPC_SUCCESS) { 171 return (NULL); 172 } 173 return ((void *) clnt); 174 } 175 176 #endif 177 178 int 179 __rpc_socket2sockinfo(struct socket *so, struct __rpc_sockinfo *sip) 180 { 181 int type, proto; 182 struct sockaddr *sa; 183 sa_family_t family; 184 struct sockopt opt; 185 int error; 186 187 error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa); 188 if (error) 189 return 0; 190 191 sip->si_alen = sa->sa_len; 192 family = sa->sa_family; 193 free(sa, M_SONAME); 194 195 opt.sopt_dir = SOPT_GET; 196 opt.sopt_level = SOL_SOCKET; 197 opt.sopt_name = SO_TYPE; 198 opt.sopt_val = &type; 199 opt.sopt_valsize = sizeof type; 200 opt.sopt_td = NULL; 201 error = sogetopt(so, &opt); 202 if (error) 203 return 0; 204 205 /* XXX */ 206 if (family != AF_LOCAL) { 207 if (type == SOCK_STREAM) 208 proto = IPPROTO_TCP; 209 else if (type == SOCK_DGRAM) 210 proto = IPPROTO_UDP; 211 else 212 return 0; 213 } else 214 proto = 0; 215 216 sip->si_af = family; 217 sip->si_proto = proto; 218 sip->si_socktype = type; 219 220 return 1; 221 } 222 223 /* 224 * Linear search, but the number of entries is small. 225 */ 226 int 227 __rpc_nconf2sockinfo(const struct netconfig *nconf, struct __rpc_sockinfo *sip) 228 { 229 int i; 230 231 for (i = 0; i < (sizeof na_cvt) / (sizeof (struct netid_af)); i++) 232 if (strcmp(na_cvt[i].netid, nconf->nc_netid) == 0 || ( 233 strcmp(nconf->nc_netid, "unix") == 0 && 234 strcmp(na_cvt[i].netid, "local") == 0)) { 235 sip->si_af = na_cvt[i].af; 236 sip->si_proto = na_cvt[i].protocol; 237 sip->si_socktype = 238 __rpc_seman2socktype((int)nconf->nc_semantics); 239 if (sip->si_socktype == -1) 240 return 0; 241 sip->si_alen = __rpc_get_a_size(sip->si_af); 242 return 1; 243 } 244 245 return 0; 246 } 247 248 struct socket * 249 __rpc_nconf2socket(const struct netconfig *nconf) 250 { 251 struct __rpc_sockinfo si; 252 struct socket *so; 253 int error; 254 255 if (!__rpc_nconf2sockinfo(nconf, &si)) 256 return 0; 257 258 so = NULL; 259 error = socreate(si.si_af, &so, si.si_socktype, si.si_proto, 260 curthread->td_ucred, curthread); 261 262 if (error) 263 return NULL; 264 else 265 return so; 266 } 267 268 char * 269 taddr2uaddr(const struct netconfig *nconf, const struct netbuf *nbuf) 270 { 271 struct __rpc_sockinfo si; 272 273 if (!__rpc_nconf2sockinfo(nconf, &si)) 274 return NULL; 275 return __rpc_taddr2uaddr_af(si.si_af, nbuf); 276 } 277 278 struct netbuf * 279 uaddr2taddr(const struct netconfig *nconf, const char *uaddr) 280 { 281 struct __rpc_sockinfo si; 282 283 if (!__rpc_nconf2sockinfo(nconf, &si)) 284 return NULL; 285 return __rpc_uaddr2taddr_af(si.si_af, uaddr); 286 } 287 288 char * 289 __rpc_taddr2uaddr_af(int af, const struct netbuf *nbuf) 290 { 291 char *ret; 292 struct sbuf sb; 293 struct sockaddr_in *sin; 294 struct sockaddr_un *sun; 295 char namebuf[INET_ADDRSTRLEN]; 296 #ifdef INET6 297 struct sockaddr_in6 *sin6; 298 char namebuf6[INET6_ADDRSTRLEN]; 299 #endif 300 u_int16_t port; 301 302 sbuf_new(&sb, NULL, 0, SBUF_AUTOEXTEND); 303 304 switch (af) { 305 case AF_INET: 306 sin = nbuf->buf; 307 if (__rpc_inet_ntop(af, &sin->sin_addr, namebuf, sizeof namebuf) 308 == NULL) 309 return NULL; 310 port = ntohs(sin->sin_port); 311 if (sbuf_printf(&sb, "%s.%u.%u", namebuf, 312 ((uint32_t)port) >> 8, 313 port & 0xff) < 0) 314 return NULL; 315 break; 316 #ifdef INET6 317 case AF_INET6: 318 sin6 = nbuf->buf; 319 if (__rpc_inet_ntop(af, &sin6->sin6_addr, namebuf6, sizeof namebuf6) 320 == NULL) 321 return NULL; 322 port = ntohs(sin6->sin6_port); 323 if (sbuf_printf(&sb, "%s.%u.%u", namebuf6, 324 ((uint32_t)port) >> 8, 325 port & 0xff) < 0) 326 return NULL; 327 break; 328 #endif 329 case AF_LOCAL: 330 sun = nbuf->buf; 331 if (sbuf_printf(&sb, "%.*s", (int)(sun->sun_len - 332 offsetof(struct sockaddr_un, sun_path)), 333 sun->sun_path) < 0) 334 return (NULL); 335 break; 336 default: 337 return NULL; 338 } 339 340 sbuf_finish(&sb); 341 ret = strdup(sbuf_data(&sb), M_RPC); 342 sbuf_delete(&sb); 343 344 return ret; 345 } 346 347 struct netbuf * 348 __rpc_uaddr2taddr_af(int af, const char *uaddr) 349 { 350 struct netbuf *ret = NULL; 351 char *addrstr, *p; 352 unsigned port, portlo, porthi; 353 struct sockaddr_in *sin; 354 #ifdef INET6 355 struct sockaddr_in6 *sin6; 356 #endif 357 struct sockaddr_un *sun; 358 359 port = 0; 360 sin = NULL; 361 addrstr = strdup(uaddr, M_RPC); 362 if (addrstr == NULL) 363 return NULL; 364 365 /* 366 * AF_LOCAL addresses are expected to be absolute 367 * pathnames, anything else will be AF_INET or AF_INET6. 368 */ 369 if (*addrstr != '/') { 370 p = strrchr(addrstr, '.'); 371 if (p == NULL) 372 goto out; 373 portlo = (unsigned)strtol(p + 1, NULL, 10); 374 *p = '\0'; 375 376 p = strrchr(addrstr, '.'); 377 if (p == NULL) 378 goto out; 379 porthi = (unsigned)strtol(p + 1, NULL, 10); 380 *p = '\0'; 381 port = (porthi << 8) | portlo; 382 } 383 384 ret = (struct netbuf *)malloc(sizeof *ret, M_RPC, M_WAITOK); 385 if (ret == NULL) 386 goto out; 387 388 switch (af) { 389 case AF_INET: 390 sin = (struct sockaddr_in *)malloc(sizeof *sin, M_RPC, 391 M_WAITOK); 392 if (sin == NULL) 393 goto out; 394 memset(sin, 0, sizeof *sin); 395 sin->sin_family = AF_INET; 396 sin->sin_port = htons(port); 397 if (__rpc_inet_pton(AF_INET, addrstr, &sin->sin_addr) <= 0) { 398 free(sin, M_RPC); 399 free(ret, M_RPC); 400 ret = NULL; 401 goto out; 402 } 403 sin->sin_len = ret->maxlen = ret->len = sizeof *sin; 404 ret->buf = sin; 405 break; 406 #ifdef INET6 407 case AF_INET6: 408 sin6 = (struct sockaddr_in6 *)malloc(sizeof *sin6, M_RPC, 409 M_WAITOK); 410 if (sin6 == NULL) 411 goto out; 412 memset(sin6, 0, sizeof *sin6); 413 sin6->sin6_family = AF_INET6; 414 sin6->sin6_port = htons(port); 415 if (__rpc_inet_pton(AF_INET6, addrstr, &sin6->sin6_addr) <= 0) { 416 free(sin6, M_RPC); 417 free(ret, M_RPC); 418 ret = NULL; 419 goto out; 420 } 421 sin6->sin6_len = ret->maxlen = ret->len = sizeof *sin6; 422 ret->buf = sin6; 423 break; 424 #endif 425 case AF_LOCAL: 426 sun = (struct sockaddr_un *)malloc(sizeof *sun, M_RPC, 427 M_WAITOK); 428 if (sun == NULL) 429 goto out; 430 memset(sun, 0, sizeof *sun); 431 sun->sun_family = AF_LOCAL; 432 strncpy(sun->sun_path, addrstr, sizeof(sun->sun_path) - 1); 433 ret->len = ret->maxlen = sun->sun_len = SUN_LEN(sun); 434 ret->buf = sun; 435 break; 436 default: 437 break; 438 } 439 out: 440 free(addrstr, M_RPC); 441 return ret; 442 } 443 444 int 445 __rpc_seman2socktype(int semantics) 446 { 447 switch (semantics) { 448 case NC_TPI_CLTS: 449 return SOCK_DGRAM; 450 case NC_TPI_COTS_ORD: 451 return SOCK_STREAM; 452 case NC_TPI_RAW: 453 return SOCK_RAW; 454 default: 455 break; 456 } 457 458 return -1; 459 } 460 461 int 462 __rpc_socktype2seman(int socktype) 463 { 464 switch (socktype) { 465 case SOCK_DGRAM: 466 return NC_TPI_CLTS; 467 case SOCK_STREAM: 468 return NC_TPI_COTS_ORD; 469 case SOCK_RAW: 470 return NC_TPI_RAW; 471 default: 472 break; 473 } 474 475 return -1; 476 } 477 478 /* 479 * Returns the type of the network as defined in <rpc/nettype.h> 480 * If nettype is NULL, it defaults to NETPATH. 481 */ 482 static int 483 getnettype(const char *nettype) 484 { 485 int i; 486 487 if ((nettype == NULL) || (nettype[0] == 0)) { 488 return (_RPC_NETPATH); /* Default */ 489 } 490 491 #if 0 492 nettype = strlocase(nettype); 493 #endif 494 for (i = 0; _rpctypelist[i].name; i++) 495 if (strcasecmp(nettype, _rpctypelist[i].name) == 0) { 496 return (_rpctypelist[i].type); 497 } 498 return (_rpctypelist[i].type); 499 } 500 501 /* 502 * For the given nettype (tcp or udp only), return the first structure found. 503 * This should be freed by calling freenetconfigent() 504 */ 505 struct netconfig * 506 __rpc_getconfip(const char *nettype) 507 { 508 char *netid; 509 static char *netid_tcp = (char *) NULL; 510 static char *netid_udp = (char *) NULL; 511 struct netconfig *dummy; 512 513 if (!netid_udp && !netid_tcp) { 514 struct netconfig *nconf; 515 void *confighandle; 516 517 if (!(confighandle = setnetconfig())) { 518 log(LOG_ERR, "rpc: failed to open " NETCONFIG); 519 return (NULL); 520 } 521 while ((nconf = getnetconfig(confighandle)) != NULL) { 522 if (strcmp(nconf->nc_protofmly, NC_INET) == 0) { 523 if (strcmp(nconf->nc_proto, NC_TCP) == 0) { 524 netid_tcp = strdup(nconf->nc_netid, 525 M_RPC); 526 } else 527 if (strcmp(nconf->nc_proto, NC_UDP) == 0) { 528 netid_udp = strdup(nconf->nc_netid, 529 M_RPC); 530 } 531 } 532 } 533 endnetconfig(confighandle); 534 } 535 if (strcmp(nettype, "udp") == 0) 536 netid = netid_udp; 537 else if (strcmp(nettype, "tcp") == 0) 538 netid = netid_tcp; 539 else { 540 return (NULL); 541 } 542 if ((netid == NULL) || (netid[0] == 0)) { 543 return (NULL); 544 } 545 dummy = getnetconfigent(netid); 546 return (dummy); 547 } 548 549 /* 550 * Returns the type of the nettype, which should then be used with 551 * __rpc_getconf(). 552 * 553 * For simplicity in the kernel, we don't support the NETPATH 554 * environment variable. We behave as userland would then NETPATH is 555 * unset, i.e. iterate over all visible entries in netconfig. 556 */ 557 void * 558 __rpc_setconf(nettype) 559 const char *nettype; 560 { 561 struct handle *handle; 562 563 handle = (struct handle *) malloc(sizeof (struct handle), 564 M_RPC, M_WAITOK); 565 switch (handle->nettype = getnettype(nettype)) { 566 case _RPC_NETPATH: 567 case _RPC_CIRCUIT_N: 568 case _RPC_DATAGRAM_N: 569 if (!(handle->nhandle = setnetconfig())) 570 goto failed; 571 handle->nflag = TRUE; 572 break; 573 case _RPC_VISIBLE: 574 case _RPC_CIRCUIT_V: 575 case _RPC_DATAGRAM_V: 576 case _RPC_TCP: 577 case _RPC_UDP: 578 if (!(handle->nhandle = setnetconfig())) { 579 log(LOG_ERR, "rpc: failed to open " NETCONFIG); 580 goto failed; 581 } 582 handle->nflag = FALSE; 583 break; 584 default: 585 goto failed; 586 } 587 588 return (handle); 589 590 failed: 591 free(handle, M_RPC); 592 return (NULL); 593 } 594 595 /* 596 * Returns the next netconfig struct for the given "net" type. 597 * __rpc_setconf() should have been called previously. 598 */ 599 struct netconfig * 600 __rpc_getconf(void *vhandle) 601 { 602 struct handle *handle; 603 struct netconfig *nconf; 604 605 handle = (struct handle *)vhandle; 606 if (handle == NULL) { 607 return (NULL); 608 } 609 for (;;) { 610 if (handle->nflag) { 611 nconf = getnetconfig(handle->nhandle); 612 if (nconf && !(nconf->nc_flag & NC_VISIBLE)) 613 continue; 614 } else { 615 nconf = getnetconfig(handle->nhandle); 616 } 617 if (nconf == NULL) 618 break; 619 if ((nconf->nc_semantics != NC_TPI_CLTS) && 620 (nconf->nc_semantics != NC_TPI_COTS) && 621 (nconf->nc_semantics != NC_TPI_COTS_ORD)) 622 continue; 623 switch (handle->nettype) { 624 case _RPC_VISIBLE: 625 if (!(nconf->nc_flag & NC_VISIBLE)) 626 continue; 627 /* FALLTHROUGH */ 628 case _RPC_NETPATH: /* Be happy */ 629 break; 630 case _RPC_CIRCUIT_V: 631 if (!(nconf->nc_flag & NC_VISIBLE)) 632 continue; 633 /* FALLTHROUGH */ 634 case _RPC_CIRCUIT_N: 635 if ((nconf->nc_semantics != NC_TPI_COTS) && 636 (nconf->nc_semantics != NC_TPI_COTS_ORD)) 637 continue; 638 break; 639 case _RPC_DATAGRAM_V: 640 if (!(nconf->nc_flag & NC_VISIBLE)) 641 continue; 642 /* FALLTHROUGH */ 643 case _RPC_DATAGRAM_N: 644 if (nconf->nc_semantics != NC_TPI_CLTS) 645 continue; 646 break; 647 case _RPC_TCP: 648 if (((nconf->nc_semantics != NC_TPI_COTS) && 649 (nconf->nc_semantics != NC_TPI_COTS_ORD)) || 650 (strcmp(nconf->nc_protofmly, NC_INET) 651 #ifdef INET6 652 && strcmp(nconf->nc_protofmly, NC_INET6)) 653 #else 654 ) 655 #endif 656 || 657 strcmp(nconf->nc_proto, NC_TCP)) 658 continue; 659 break; 660 case _RPC_UDP: 661 if ((nconf->nc_semantics != NC_TPI_CLTS) || 662 (strcmp(nconf->nc_protofmly, NC_INET) 663 #ifdef INET6 664 && strcmp(nconf->nc_protofmly, NC_INET6)) 665 #else 666 ) 667 #endif 668 || 669 strcmp(nconf->nc_proto, NC_UDP)) 670 continue; 671 break; 672 } 673 break; 674 } 675 return (nconf); 676 } 677 678 void 679 __rpc_endconf(vhandle) 680 void * vhandle; 681 { 682 struct handle *handle; 683 684 handle = (struct handle *) vhandle; 685 if (handle == NULL) { 686 return; 687 } 688 endnetconfig(handle->nhandle); 689 free(handle, M_RPC); 690 } 691 692 int 693 __rpc_sockisbound(struct socket *so) 694 { 695 struct sockaddr *sa; 696 int error, bound; 697 698 error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa); 699 if (error) 700 return (0); 701 702 switch (sa->sa_family) { 703 case AF_INET: 704 bound = (((struct sockaddr_in *) sa)->sin_port != 0); 705 break; 706 #ifdef INET6 707 case AF_INET6: 708 bound = (((struct sockaddr_in6 *) sa)->sin6_port != 0); 709 break; 710 #endif 711 case AF_LOCAL: 712 /* XXX check this */ 713 bound = (((struct sockaddr_un *) sa)->sun_path[0] != '\0'); 714 break; 715 default: 716 bound = FALSE; 717 break; 718 } 719 720 free(sa, M_SONAME); 721 722 return bound; 723 } 724 725 /* 726 * Implement XDR-style API for RPC call. 727 */ 728 enum clnt_stat 729 clnt_call_private( 730 CLIENT *cl, /* client handle */ 731 struct rpc_callextra *ext, /* call metadata */ 732 rpcproc_t proc, /* procedure number */ 733 xdrproc_t xargs, /* xdr routine for args */ 734 void *argsp, /* pointer to args */ 735 xdrproc_t xresults, /* xdr routine for results */ 736 void *resultsp, /* pointer to results */ 737 struct timeval utimeout) /* seconds to wait before giving up */ 738 { 739 XDR xdrs; 740 struct mbuf *mreq; 741 struct mbuf *mrep; 742 enum clnt_stat stat; 743 744 MGET(mreq, M_WAIT, MT_DATA); 745 MCLGET(mreq, M_WAIT); 746 mreq->m_len = 0; 747 748 xdrmbuf_create(&xdrs, mreq, XDR_ENCODE); 749 if (!xargs(&xdrs, argsp)) { 750 m_freem(mreq); 751 return (RPC_CANTENCODEARGS); 752 } 753 XDR_DESTROY(&xdrs); 754 755 stat = CLNT_CALL_MBUF(cl, ext, proc, mreq, &mrep, utimeout); 756 m_freem(mreq); 757 758 if (stat == RPC_SUCCESS) { 759 xdrmbuf_create(&xdrs, mrep, XDR_DECODE); 760 if (!xresults(&xdrs, resultsp)) { 761 XDR_DESTROY(&xdrs); 762 return (RPC_CANTDECODERES); 763 } 764 XDR_DESTROY(&xdrs); 765 } 766 767 return (stat); 768 } 769 770 /* 771 * Bind a socket to a privileged IP port 772 */ 773 int 774 bindresvport(struct socket *so, struct sockaddr *sa) 775 { 776 int old, error, af; 777 bool_t freesa = FALSE; 778 struct sockaddr_in *sin; 779 #ifdef INET6 780 struct sockaddr_in6 *sin6; 781 #endif 782 struct sockopt opt; 783 int proto, portrange, portlow; 784 u_int16_t *portp; 785 socklen_t salen; 786 787 if (sa == NULL) { 788 error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa); 789 if (error) 790 return (error); 791 freesa = TRUE; 792 af = sa->sa_family; 793 salen = sa->sa_len; 794 memset(sa, 0, sa->sa_len); 795 } else { 796 af = sa->sa_family; 797 salen = sa->sa_len; 798 } 799 800 switch (af) { 801 case AF_INET: 802 proto = IPPROTO_IP; 803 portrange = IP_PORTRANGE; 804 portlow = IP_PORTRANGE_LOW; 805 sin = (struct sockaddr_in *)sa; 806 portp = &sin->sin_port; 807 break; 808 #ifdef INET6 809 case AF_INET6: 810 proto = IPPROTO_IPV6; 811 portrange = IPV6_PORTRANGE; 812 portlow = IPV6_PORTRANGE_LOW; 813 sin6 = (struct sockaddr_in6 *)sa; 814 portp = &sin6->sin6_port; 815 break; 816 #endif 817 default: 818 return (EPFNOSUPPORT); 819 } 820 821 sa->sa_family = af; 822 sa->sa_len = salen; 823 824 if (*portp == 0) { 825 bzero(&opt, sizeof(opt)); 826 opt.sopt_dir = SOPT_GET; 827 opt.sopt_level = proto; 828 opt.sopt_name = portrange; 829 opt.sopt_val = &old; 830 opt.sopt_valsize = sizeof(old); 831 error = sogetopt(so, &opt); 832 if (error) 833 goto out; 834 835 opt.sopt_dir = SOPT_SET; 836 opt.sopt_val = &portlow; 837 error = sosetopt(so, &opt); 838 if (error) 839 goto out; 840 } 841 842 error = sobind(so, sa, curthread); 843 844 if (*portp == 0) { 845 if (error) { 846 opt.sopt_dir = SOPT_SET; 847 opt.sopt_val = &old; 848 sosetopt(so, &opt); 849 } 850 } 851 out: 852 if (freesa) 853 free(sa, M_SONAME); 854 855 return (error); 856 } 857 858 /* 859 * Kernel module glue 860 */ 861 static int 862 krpc_modevent(module_t mod, int type, void *data) 863 { 864 865 return (0); 866 } 867 static moduledata_t krpc_mod = { 868 "krpc", 869 krpc_modevent, 870 NULL, 871 }; 872 DECLARE_MODULE(krpc, krpc_mod, SI_SUB_VFS, SI_ORDER_ANY); 873 874 /* So that loader and kldload(2) can find us, wherever we are.. */ 875 MODULE_VERSION(krpc, 1); 876