xref: /illumos-gate/usr/src/cmd/cmd-inet/usr.lib/inetd/tlx.c (revision 6a604193b70017bd933cd973200b3f13803674b2)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 /*
27  * Contains routines that deal with TLI/XTI endpoints and rpc services.
28  */
29 
30 #include <sys/types.h>
31 #include <string.h>
32 #include <fcntl.h>
33 #include <stdlib.h>
34 #include <libintl.h>
35 #include <unistd.h>
36 #include <sys/sysmacros.h>
37 #include <netconfig.h>
38 #include <errno.h>
39 #include <sys/sockio.h>
40 #include "inetd_impl.h"
41 
42 uu_list_pool_t *conn_ind_pool = NULL;
43 
44 /*
45  * RPC functions.
46  */
47 
48 /*
49  * Returns B_TRUE if the non-address components of the 2 rpc_info_t structures
50  * are equivalent, else B_FALSE.
51  */
52 boolean_t
53 rpc_info_equal(const rpc_info_t *ri, const rpc_info_t *ri2)
54 {
55 	return ((ri->prognum == ri2->prognum) &&
56 	    (ri->lowver == ri2->lowver) &&
57 	    (ri->highver == ri2->highver) &&
58 	    (strcmp(ri->netid, ri2->netid) == 0));
59 }
60 
61 /*
62  * Determine if we have a configured interface for the specified address
63  * family. This code is a mirror of libnsl's __can_use_af(). We mirror
64  * it because we need an exact duplicate of its behavior, yet the
65  * function isn't exported by libnsl, and this fix is considered short-
66  * term, so it's not worth exporting it.
67  *
68  * We need to duplicate __can_use_af() so we can accurately determine
69  * when getnetconfigent() returns failure for a v6 netid due to no IPv6
70  * interfaces being configured: getnetconfigent() returns failure
71  * if a netid is either 'tcp6' or 'udp6' and __can_use_af() returns 0,
72  * but it doesn't return a return code to uniquely determine this
73  * failure. If we don't accurately determine these failures, we could
74  * output error messages in a case when they weren't justified.
75  */
76 static int
77 can_use_af(sa_family_t af)
78 {
79 	struct lifnum	lifn;
80 	int		fd;
81 
82 	if ((fd =  open("/dev/udp", O_RDONLY)) < 0) {
83 		return (0);
84 	}
85 	lifn.lifn_family = af;
86 	/* LINTED ECONST_EXPR */
87 	lifn.lifn_flags = IFF_UP & !(IFF_NOXMIT | IFF_DEPRECATED);
88 	if (ioctl(fd, SIOCGLIFNUM, &lifn, sizeof (lifn)) < 0) {
89 		lifn.lifn_count = 0;
90 	}
91 
92 	(void) close(fd);
93 	return (lifn.lifn_count);
94 }
95 
96 static boolean_t
97 is_v6_netid(const char *netid)
98 {
99 	return ((strcmp(netid, SOCKET_PROTO_TCP6) == 0) ||
100 	    (strcmp(netid, SOCKET_PROTO_UDP6) == 0));
101 }
102 
103 /*
104  * Registers with rpcbind the program number with all versions, from low to
105  * high, with the netid, all specified in 'rpc'. If registration fails,
106  * returns -1, else 0.
107  */
108 int
109 register_rpc_service(const char *fmri, const rpc_info_t *rpc)
110 {
111 	struct netconfig	*nconf;
112 	int			ver;
113 
114 	if ((nconf = getnetconfigent(rpc->netid)) == NULL) {
115 		/*
116 		 * Check whether getnetconfigent() failed as a result of
117 		 * having no IPv6 interfaces configured for a v6 netid, or
118 		 * as a result of a 'real' error, and output an appropriate
119 		 * message with an appropriate severity.
120 		 */
121 		if (is_v6_netid(rpc->netid) && !can_use_af(AF_INET6)) {
122 			warn_msg(gettext(
123 			    "Couldn't register netid %s for RPC instance %s "
124 			    "because no IPv6 interfaces are plumbed"),
125 			    rpc->netid, fmri);
126 		} else {
127 			error_msg(gettext(
128 			    "Failed to lookup netid '%s' for instance %s: %s"),
129 			    rpc->netid, fmri, nc_sperror());
130 		}
131 		return (-1);
132 	}
133 
134 	for (ver = rpc->lowver; ver <= rpc->highver; ver++) {
135 		if (!rpcb_set(rpc->prognum, ver, nconf, &(rpc->netbuf))) {
136 			error_msg(gettext("Failed to register version %d "
137 			    "of RPC service instance %s, netid %s"), ver,
138 			    fmri, rpc->netid);
139 
140 			for (ver--; ver >= rpc->lowver; ver--)
141 				(void) rpcb_unset(rpc->prognum, ver, nconf);
142 
143 			freenetconfigent(nconf);
144 			return (-1);
145 		}
146 	}
147 
148 	freenetconfigent(nconf);
149 	return (0);
150 }
151 
152 /* Unregister all the registrations done by register_rpc_service */
153 void
154 unregister_rpc_service(const char *fmri, const rpc_info_t *rpc)
155 {
156 	int			ver;
157 	struct netconfig	*nconf;
158 
159 	if ((nconf = getnetconfigent(rpc->netid)) == NULL) {
160 		/*
161 		 * Don't output an error message if getnetconfigent() fails for
162 		 * a v6 netid when an IPv6 interface isn't configured.
163 		 */
164 		if (!(is_v6_netid(rpc->netid) && !can_use_af(AF_INET6))) {
165 			error_msg(gettext(
166 			    "Failed to lookup netid '%s' for instance %s: %s"),
167 			    rpc->netid, fmri, nc_sperror());
168 		}
169 		return;
170 	}
171 
172 	for (ver = rpc->lowver; ver <= rpc->highver; ver++)
173 		(void) rpcb_unset(rpc->prognum, ver, nconf);
174 
175 	freenetconfigent(nconf);
176 }
177 
178 /*
179  * TLI/XTI functions.
180  */
181 
182 int
183 tlx_init(void)
184 {
185 	if ((conn_ind_pool = uu_list_pool_create("conn_ind_pool",
186 	    sizeof (tlx_conn_ind_t), offsetof(tlx_conn_ind_t, link),
187 	    NULL, UU_LIST_POOL_DEBUG)) == NULL) {
188 		error_msg("%s: %s", gettext("Failed to create uu pool"),
189 		    uu_strerror(uu_error()));
190 		return (-1);
191 	}
192 
193 	return (0);
194 }
195 
196 void
197 tlx_fini(void)
198 {
199 	if (conn_ind_pool != NULL) {
200 		uu_list_pool_destroy(conn_ind_pool);
201 		conn_ind_pool = NULL;
202 	}
203 }
204 
205 /*
206  * Checks if the contents of the 2 tlx_info_t structures are equivalent.
207  * If 'isrpc' is false, the address components of the two structures are
208  * compared for equality as part of this. If the two structures are
209  * equivalent B_TRUE is returned, else B_FALSE.
210  */
211 boolean_t
212 tlx_info_equal(const tlx_info_t *ti, const tlx_info_t *ti2, boolean_t isrpc)
213 {
214 	return ((isrpc || (memcmp(ti->local_addr.buf, ti2->local_addr.buf,
215 	    sizeof (struct sockaddr_storage)) == 0)) &&
216 	    (strcmp(ti->dev_name, ti2->dev_name) == 0));
217 }
218 
219 /*
220  * Attempts to bind an address to the network fd 'fd'. If 'reqaddr' is non-NULL,
221  * it attempts to bind to that requested address, else it binds to a kernel
222  * selected address. In the former case, the function returning success
223  * doesn't guarantee that the requested address was bound (the caller needs to
224  * check). If 'retaddr' is non-NULL, the bound address is returned in it. The
225  * 'qlen' parameter is used to set the connection backlog. If the bind
226  * succeeds 0 is returned, else -1.
227  */
228 static int
229 tlx_bind(int fd, const struct netbuf *reqaddr, struct netbuf *retaddr, int qlen)
230 {
231 	struct t_bind breq;
232 	struct t_bind bret;
233 
234 	if (retaddr != NULL) {	/* caller requests bound address be returned */
235 		bret.addr.buf = retaddr->buf;
236 		bret.addr.maxlen = retaddr->maxlen;
237 	}
238 
239 	if (reqaddr != NULL) {  /* caller requests specific address */
240 		breq.addr.buf = reqaddr->buf;
241 		breq.addr.len = reqaddr->len;
242 	} else {
243 		breq.addr.len = 0;
244 	}
245 	breq.qlen = qlen;
246 
247 	if (t_bind(fd, &breq, retaddr != NULL ? &bret : NULL) < 0)
248 		return (-1);
249 
250 	if (retaddr != NULL)
251 		retaddr->len = bret.addr.len;
252 
253 	return (0);
254 }
255 
256 static int
257 tlx_setsockopt(int fd, int level, int optname, const void *optval,
258     socklen_t optlen)
259 {
260 	struct t_optmgmt request, reply;
261 	struct {
262 		struct opthdr sockopt;
263 		char data[256];
264 	} optbuf;
265 
266 	if (optlen > sizeof (optbuf.data)) {
267 		error_msg(gettext("t_optmgmt request too long"));
268 		return (-1);
269 	}
270 
271 	optbuf.sockopt.level = level;
272 	optbuf.sockopt.name = optname;
273 	optbuf.sockopt.len = optlen;
274 	(void) memcpy(optbuf.data, optval, optlen);
275 
276 	request.opt.len = sizeof (struct opthdr) + optlen;
277 	request.opt.buf = (char *)&optbuf;
278 	request.flags = T_NEGOTIATE;
279 
280 	reply.opt.maxlen = sizeof (struct opthdr) + optlen;
281 	reply.opt.buf = (char *)&optbuf;
282 	reply.flags = 0;
283 
284 	if ((t_optmgmt(fd, &request, &reply) == -1) ||
285 	    (reply.flags != T_SUCCESS)) {
286 		error_msg("t_optmgmt: %s", t_strerror(t_errno));
287 		return (-1);
288 	}
289 	return (0);
290 }
291 
292 /*
293  * Compare contents of netbuf for equality. Return B_TRUE on a match and
294  * B_FALSE for mismatch.
295  */
296 static boolean_t
297 netbufs_equal(struct netbuf *n1, struct netbuf *n2)
298 {
299 	return ((n1->len == n2->len) &&
300 	    (memcmp(n1->buf, n2->buf, (size_t)n1->len) == 0));
301 }
302 
303 /*
304  * Create a tli/xti endpoint, either bound to the address specified in
305  * 'instance' for non-RPC services, else a kernel chosen address.
306  * Returns -1 on failure, else 0.
307  */
308 int
309 create_bound_endpoint(const instance_t *inst, tlx_info_t *tlx_info)
310 {
311 	int			fd;
312 	int			qlen;
313 	const char		*fmri = inst->fmri;
314 	struct netbuf		*reqaddr;
315 	struct netbuf		*retaddr;
316 	struct netbuf		netbuf;
317 	struct sockaddr_storage	ss;
318 	rpc_info_t		*rpc = tlx_info->pr_info.ri;
319 
320 	if ((fd = t_open(tlx_info->dev_name, O_RDWR, NULL)) == -1) {
321 		error_msg(gettext("Failed to open transport %s for "
322 		    "instance %s, proto %s: %s"), tlx_info->dev_name,
323 		    fmri, tlx_info->pr_info.proto, t_strerror(t_errno));
324 		return (-1);
325 	}
326 
327 	if (tlx_info->pr_info.v6only) {
328 		int	on = 1;
329 
330 		/* restrict to IPv6 communications only */
331 		if (tlx_setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, &on,
332 		    sizeof (on)) == -1) {
333 			(void) t_close(fd);
334 			return (-1);
335 		}
336 	}
337 
338 	/*
339 	 * Negotiate for the returning of the remote uid for loopback
340 	 * transports for RPC services. This needs to be done before the
341 	 * endpoint is bound using t_bind(), so that any requests to it
342 	 * contain the uid.
343 	 */
344 	if ((rpc != NULL) && (rpc->is_loopback))
345 		svc_fd_negotiate_ucred(fd);
346 
347 	/*
348 	 * Bind the service's address to the endpoint and setup connection
349 	 * backlog. In the case of RPC services, we specify a NULL requested
350 	 * address and accept what we're given, storing the returned address
351 	 * for later RPC binding. In the case of non-RPC services we specify
352 	 * the service's associated address.
353 	 */
354 	if (rpc != NULL) {
355 		reqaddr = NULL;
356 		retaddr =  &(rpc->netbuf);
357 	} else {
358 		reqaddr = &(tlx_info->local_addr);
359 		netbuf.buf = (char *)&ss;
360 		netbuf.maxlen = sizeof (ss);
361 		retaddr = &netbuf;
362 	}
363 
364 	/* ignored for conn/less services */
365 	qlen = inst->config->basic->conn_backlog;
366 
367 	if ((tlx_bind(fd, reqaddr, retaddr, qlen) == -1) ||
368 	    ((reqaddr != NULL) && !netbufs_equal(reqaddr, retaddr))) {
369 		error_msg(gettext("Failed to bind to the requested address "
370 		    "for instance %s, proto %s"), fmri,
371 		    tlx_info->pr_info.proto);
372 		(void) t_close(fd);
373 		return (-1);
374 	}
375 
376 	return (fd);
377 }
378 
379 /*
380  * Takes a connection request off 'fd' in the form of a t_call structure
381  * and returns a pointer to it.
382  * Returns NULL on failure, else pointer to t_call structure on success.
383  */
384 static struct t_call *
385 get_new_conind(int fd)
386 {
387 	struct t_call *call;
388 
389 	/* LINTED E_BAD_PTR_CAST_ALIGN */
390 	if ((call = (struct t_call *)t_alloc(fd, T_CALL, T_ALL)) == NULL) {
391 		error_msg("t_alloc: %s", t_strerror(t_errno));
392 		return (NULL);
393 	}
394 	if (t_listen(fd, call) < 0) {
395 		error_msg("t_listen: %s", t_strerror(t_errno));
396 		(void) t_free((char *)call, T_CALL);
397 		return (NULL);
398 	}
399 
400 	return (call);
401 }
402 
403 /* Add 'call' to the connection indication queue 'queue'. */
404 int
405 queue_conind(uu_list_t *queue, struct t_call *call)
406 {
407 	tlx_conn_ind_t *ci;
408 
409 	if ((ci = malloc(sizeof (tlx_conn_ind_t))) == NULL) {
410 		error_msg(strerror(errno));
411 		return (-1);
412 	}
413 
414 	ci->call = call;
415 	uu_list_node_init(ci, &ci->link, conn_ind_pool);
416 	(void) uu_list_insert_after(queue, NULL, ci);
417 
418 	return (0);
419 }
420 
421 /*
422  * Remove and return a pointer to the first call on queue 'queue'. However,
423  * if the queue is empty returns NULL.
424  */
425 struct t_call *
426 dequeue_conind(uu_list_t *queue)
427 {
428 	struct t_call   *ret;
429 	tlx_conn_ind_t	*ci = uu_list_first(queue);
430 
431 	if (ci == NULL)
432 		return (NULL);
433 
434 	ret = ci->call;
435 	uu_list_remove(queue, ci);
436 	free(ci);
437 
438 	return (ret);
439 }
440 
441 /*
442  * Handle a TLOOK notification received during a t_accept() call.
443  * Returns -1 on failure, else 0.
444  */
445 static int
446 process_tlook(const char *fmri, tlx_info_t *tlx_info)
447 {
448 	int	event;
449 	int	fd = tlx_info->pr_info.listen_fd;
450 
451 	switch (event = t_look(fd)) {
452 	case T_LISTEN: {
453 		struct t_call *call;
454 
455 		debug_msg("process_tlook: T_LISTEN event");
456 		if ((call = get_new_conind(fd)) == NULL)
457 			return (-1);
458 		if (queue_conind(tlx_info->conn_ind_queue, call) == -1) {
459 			error_msg(gettext("Failed to queue connection "
460 			    "indication for instance %s"), fmri);
461 			(void) t_free((char *)call, T_CALL);
462 			return (-1);
463 		}
464 		break;
465 	}
466 	case T_DISCONNECT: {
467 		/*
468 		 * Note: In Solaris 2.X (SunOS 5.X) bundled
469 		 * connection-oriented transport drivers
470 		 * [ e.g /dev/tcp and /dev/ticots and
471 		 * /dev/ticotsord (tl)] we do not send disconnect
472 		 * indications to listening endpoints.
473 		 * So this will not be seen with endpoints on Solaris
474 		 * bundled transport devices. However, Streams TPI
475 		 * allows for this (broken?) behavior and so we account
476 		 * for it here because of the possibility of unbundled
477 		 * transport drivers causing this.
478 		 */
479 		tlx_conn_ind_t	*cip;
480 		struct t_discon	*discon;
481 
482 		debug_msg("process_tlook: T_DISCONNECT event");
483 
484 		/* LINTED */
485 		if ((discon = (struct t_discon *)
486 		    t_alloc(fd, T_DIS, T_ALL)) == NULL) {
487 			error_msg("t_alloc: %s", t_strerror(t_errno));
488 			return (-1);
489 		}
490 		if (t_rcvdis(fd, discon) < 0) {
491 			error_msg("t_rcvdis: %s", t_strerror(t_errno));
492 			(void) t_free((char *)discon, T_DIS);
493 			return (-1);
494 		}
495 
496 		/*
497 		 * Find any queued connection pending that matches this
498 		 * disconnect notice and remove from the pending queue.
499 		 */
500 		cip = uu_list_first(tlx_info->conn_ind_queue);
501 		while ((cip != NULL) &&
502 		    (cip->call->sequence != discon->sequence)) {
503 			cip = uu_list_next(tlx_info->conn_ind_queue, cip);
504 		}
505 		if (cip != NULL) {	/* match found */
506 			uu_list_remove(tlx_info->conn_ind_queue, cip);
507 			(void) t_free((char *)cip->call, T_CALL);
508 			free(cip);
509 		}
510 
511 		(void) t_free((char *)discon, T_DIS);
512 		break;
513 	}
514 	case -1:
515 		error_msg("t_look: %s", t_strerror(t_errno));
516 		return (-1);
517 	default:
518 		error_msg(gettext("do_tlook: unexpected t_look event: %d"),
519 		    event);
520 		return (-1);
521 	}
522 
523 	return (0);
524 }
525 
526 /*
527  * This call attempts to t_accept() an incoming/pending TLI connection.
528  * If it is thwarted by a TLOOK, it is deferred and whatever is on the
529  * file descriptor, removed after a t_look. (Incoming connect indications
530  * get queued for later processing and disconnect indications remove a
531  * a queued connection request if a match found).
532  * Returns -1 on failure, else 0.
533  */
534 int
535 tlx_accept(const char *fmri, tlx_info_t *tlx_info,
536     struct sockaddr_storage *remote_addr)
537 {
538 	tlx_conn_ind_t	*conind;
539 	struct t_call	*call;
540 	int		fd;
541 	int		listen_fd = tlx_info->pr_info.listen_fd;
542 
543 	if ((fd = t_open(tlx_info->dev_name, O_RDWR, NULL)) == -1) {
544 		error_msg("t_open: %s", t_strerror(t_errno));
545 		return (-1);
546 	}
547 
548 	if (tlx_info->pr_info.v6only) {
549 		int	on = 1;
550 
551 		/* restrict to IPv6 communications only */
552 		if (tlx_setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, &on,
553 		    sizeof (on)) == -1) {
554 			(void) t_close(fd);
555 			return (-1);
556 		}
557 	}
558 
559 	if (t_bind(fd, NULL, NULL) == -1) {
560 		error_msg("t_bind: %s", t_strerror(t_errno));
561 		(void) t_close(fd);
562 		return (-1);
563 	}
564 
565 	/*
566 	 * Get the next connection indication - first try the pending
567 	 * queue, then, if none there, get a new one from the file descriptor.
568 	 */
569 	if ((conind = uu_list_first(tlx_info->conn_ind_queue)) != NULL) {
570 		debug_msg("taking con off queue");
571 		call = conind->call;
572 	} else if ((call = get_new_conind(listen_fd)) == NULL) {
573 		(void) t_close(fd);
574 		return (-1);
575 	}
576 
577 	/*
578 	 * Accept the connection indication on the newly created endpoint.
579 	 * If we fail, and it's the result of a tlook, queue the indication
580 	 * if it isn't already, and go and process the t_look.
581 	 */
582 	if (t_accept(listen_fd, fd, call) == -1) {
583 		if (t_errno == TLOOK) {
584 			if (uu_list_first(tlx_info->conn_ind_queue) == NULL) {
585 				/*
586 				 * We are first one to have to defer accepting
587 				 * and start the pending connections list.
588 				 */
589 				if (queue_conind(tlx_info->conn_ind_queue,
590 				    call) == -1) {
591 					error_msg(gettext(
592 					    "Failed to queue connection "
593 					    "indication for instance %s"),
594 					    fmri);
595 					(void) t_free((char *)call, T_CALL);
596 					return (-1);
597 				}
598 			}
599 			(void) process_tlook(fmri, tlx_info);
600 		} else {		  /* non-TLOOK accept failure */
601 			error_msg("%s: %s", "t_accept failed",
602 			    t_strerror(t_errno));
603 			/*
604 			 * If we were accepting a queued connection, dequeue
605 			 * it.
606 			 */
607 			if (uu_list_first(tlx_info->conn_ind_queue) != NULL)
608 				(void) dequeue_conind(tlx_info->conn_ind_queue);
609 			(void) t_free((char *)call, T_CALL);
610 		}
611 
612 		(void) t_close(fd);
613 		return (-1);
614 	}
615 
616 	/* Copy remote address into address parameter */
617 	(void) memcpy(remote_addr, call->addr.buf,
618 	    MIN(call->addr.len, sizeof (*remote_addr)));
619 
620 	/* If we were accepting a queued connection, dequeue it. */
621 	if (uu_list_first(tlx_info->conn_ind_queue) != NULL)
622 		(void) dequeue_conind(tlx_info->conn_ind_queue);
623 	(void) t_free((char *)call, T_CALL);
624 
625 	return (fd);
626 }
627 
628 /* protocol independent network fd close routine */
629 void
630 close_net_fd(instance_t *inst, int fd)
631 {
632 	if (inst->config->basic->istlx) {
633 		(void) t_close(fd);
634 	} else {
635 		(void) close(fd);
636 	}
637 }
638 
639 /*
640  * Consume some data from the given endpoint of the given wait-based instance.
641  */
642 void
643 consume_wait_data(instance_t *inst, int fd)
644 {
645 	int	flag;
646 	char	buf[50];	/* same arbitrary size as old inetd */
647 
648 	if (inst->config->basic->istlx) {
649 		(void) t_rcv(fd, buf, sizeof (buf), &flag);
650 	} else {
651 		(void) recv(fd, buf, sizeof (buf), 0);
652 	}
653 }
654