1 /* $NetBSD: rpc_generic.c,v 1.22 2006/06/22 19:35:34 christos Exp $ */
4 * Sun RPC is a product of Sun Microsystems, Inc. and is provided for
5 * unrestricted use provided that this legend is included on all tape
6 * media and as a part of the software program in whole or part. Users
7 * may copy or modify Sun RPC without charge, but are not authorized
8 * to license or distribute it to anyone else except as part of a product or
9 * program developed by the user.
11 * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
12 * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
13 * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
15 * Sun RPC is provided with no support and without any obligation on the
16 * part of Sun Microsystems, Inc. to assist in its use, correction,
17 * modification or enhancement.
19 * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
20 * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
21 * OR ANY PART THEREOF.
23 * In no event will Sun Microsystems, Inc. be liable for any lost revenue
24 * or profits or other special, indirect and consequential damages, even if
25 * Sun has been advised of the possibility of such damages.
27 * Sun Microsystems, Inc.
29 * Mountain View, California 94043
32 * Copyright (c) 1986-1991 by Sun Microsystems Inc.
35 /* #pragma ident "@(#)rpc_generic.c 1.17 94/04/24 SMI" */
38 * rpc_generic.c, Miscl routines for RPC.
42 #include <sys/cdefs.h>
43 #if defined(LIBC_SCCS) && !defined(lint)
44 __RCSID("$NetBSD: rpc_generic.c,v 1.22 2006/06/22 19:35:34 christos Exp $");
47 #include "namespace.h"
48 #include "reentrant.h"
49 #include <sys/types.h>
50 #include <sys/param.h>
51 #include <sys/socket.h>
53 #include <sys/resource.h>
54 #include <netinet/in.h>
55 #include <netinet/tcp.h>
56 #include <arpa/inet.h>
62 #include <netconfig.h>
66 #include <rpc/nettype.h>
67 #include "rpc_internal.h"
70 __weak_alias(taddr2uaddr
,_taddr2uaddr
)
71 __weak_alias(uaddr2taddr
,_uaddr2taddr
)
75 NCONF_HANDLE
*nhandle
;
76 int nflag
; /* Whether NETPATH or NETCONFIG */
80 static const struct _rpcnettype
{
84 { "netpath", _RPC_NETPATH
},
85 { "visible", _RPC_VISIBLE
},
86 { "circuit_v", _RPC_CIRCUIT_V
},
87 { "datagram_v", _RPC_DATAGRAM_V
},
88 { "circuit_n", _RPC_CIRCUIT_N
},
89 { "datagram_n", _RPC_DATAGRAM_N
},
101 static const struct netid_af na_cvt
[] = {
102 { "udp", AF_INET
, IPPROTO_UDP
},
103 { "tcp", AF_INET
, IPPROTO_TCP
},
105 { "udp6", AF_INET6
, IPPROTO_UDP
},
106 { "tcp6", AF_INET6
, IPPROTO_TCP
},
108 { "local", AF_LOCAL
, 0 }
112 static char *strlocase
__P((char *));
114 static int getnettype
__P((const char *));
117 * Cache the result of getrlimit(), so we don't have to do an
118 * expensive call every time.
129 if (getrlimit(RLIMIT_NOFILE
, &rl
) == 0) {
130 return (tbsize
= (int)rl
.rlim_max
);
133 * Something wrong. I'll try to save face by returning a
134 * pessimistic number.
141 * Find the appropriate buffer size
145 __rpc_get_t_size(af
, proto
, size
)
147 int size
; /* Size requested */
149 int maxsize
, defsize
;
151 maxsize
= 256 * 1024; /* XXX */
154 defsize
= 64 * 1024; /* XXX */
157 defsize
= UDPMSGSIZE
;
160 defsize
= RPC_MAXDATASIZE
;
166 /* Check whether the value is within the upper max limit */
167 return (size
> maxsize
? (u_int
)maxsize
: (u_int
)size
);
171 * Find the appropriate address buffer size
179 return sizeof (struct sockaddr_in
);
182 return sizeof (struct sockaddr_in6
);
185 return sizeof (struct sockaddr_un
);
189 return ((u_int
)RPC_MAXADDRSIZE
);
199 _DIAGASSERT(p
!= NULL
);
209 * Returns the type of the network as defined in <rpc/nettype.h>
210 * If nettype is NULL, it defaults to NETPATH.
218 if ((nettype
== NULL
) || (nettype
[0] == 0)) {
219 return (_RPC_NETPATH
); /* Default */
223 nettype
= strlocase(nettype
);
225 for (i
= 0; _rpctypelist
[i
].name
; i
++)
226 if (strcasecmp(nettype
, _rpctypelist
[i
].name
) == 0) {
227 return (_rpctypelist
[i
].type
);
229 return (_rpctypelist
[i
].type
);
233 * For the given nettype (tcp or udp only), return the first structure found.
234 * This should be freed by calling freenetconfigent()
238 static thread_key_t tcp_key
, udp_key
;
239 static once_t __rpc_getconfigp_once
= ONCE_INITIALIZER
;
242 __rpc_getconfigp_setup(void)
245 thr_keycreate(&tcp_key
, free
);
246 thr_keycreate(&udp_key
, free
);
251 __rpc_getconfip(nettype
)
255 char *netid_tcp
= NULL
;
256 char *netid_udp
= NULL
;
257 static char *netid_tcp_main
;
258 static char *netid_udp_main
;
259 struct netconfig
*dummy
;
261 extern int __isthreaded
;
263 if (__isthreaded
== 0) {
264 netid_udp
= netid_udp_main
;
265 netid_tcp
= netid_tcp_main
;
267 thr_once(&__rpc_getconfigp_once
, __rpc_getconfigp_setup
);
268 netid_tcp
= thr_getspecific(tcp_key
);
269 netid_udp
= thr_getspecific(udp_key
);
272 netid_udp
= netid_udp_main
;
273 netid_tcp
= netid_tcp_main
;
276 _DIAGASSERT(nettype
!= NULL
);
278 if (!netid_udp
&& !netid_tcp
) {
279 struct netconfig
*nconf
;
282 if (!(confighandle
= setnetconfig())) {
283 syslog (LOG_ERR
, "rpc: failed to open " NETCONFIG
);
286 while ((nconf
= getnetconfig(confighandle
)) != NULL
) {
287 if (strcmp(nconf
->nc_protofmly
, NC_INET
) == 0) {
288 if (strcmp(nconf
->nc_proto
, NC_TCP
) == 0) {
289 netid_tcp
= strdup(nconf
->nc_netid
);
290 if (netid_tcp
== NULL
)
293 if (__isthreaded
== 0)
294 netid_tcp_main
= netid_tcp
;
296 thr_setspecific(tcp_key
,
299 netid_tcp_main
= netid_tcp
;
302 if (strcmp(nconf
->nc_proto
, NC_UDP
) == 0) {
303 netid_udp
= strdup(nconf
->nc_netid
);
304 if (netid_udp
== NULL
)
307 if (__isthreaded
== 0)
308 netid_udp_main
= netid_udp
;
310 thr_setspecific(udp_key
,
313 netid_udp_main
= netid_udp
;
318 endnetconfig(confighandle
);
320 if (strcmp(nettype
, "udp") == 0)
322 else if (strcmp(nettype
, "tcp") == 0)
327 if ((netid
== NULL
) || (netid
[0] == 0)) {
330 dummy
= getnetconfigent(netid
);
335 * Returns the type of the nettype, which should then be used with
339 __rpc_setconf(nettype
)
342 struct handle
*handle
;
344 /* nettype may be NULL; getnettype() supports that */
346 handle
= malloc(sizeof(*handle
));
347 if (handle
== NULL
) {
350 switch (handle
->nettype
= getnettype(nettype
)) {
353 case _RPC_DATAGRAM_N
:
354 if (!(handle
->nhandle
= setnetpath())) {
358 handle
->nflag
= TRUE
;
362 case _RPC_DATAGRAM_V
:
365 if (!(handle
->nhandle
= setnetconfig())) {
366 syslog (LOG_ERR
, "rpc: failed to open " NETCONFIG
);
370 handle
->nflag
= FALSE
;
381 * Returns the next netconfig struct for the given "net" type.
382 * __rpc_setconf() should have been called previously.
385 __rpc_getconf(vhandle
)
388 struct handle
*handle
;
389 struct netconfig
*nconf
;
391 handle
= (struct handle
*)vhandle
;
392 if (handle
== NULL
) {
397 nconf
= getnetpath(handle
->nhandle
);
399 nconf
= getnetconfig(handle
->nhandle
);
402 if ((nconf
->nc_semantics
!= NC_TPI_CLTS
) &&
403 (nconf
->nc_semantics
!= NC_TPI_COTS
) &&
404 (nconf
->nc_semantics
!= NC_TPI_COTS_ORD
))
406 switch (handle
->nettype
) {
408 if (!(nconf
->nc_flag
& NC_VISIBLE
))
411 case _RPC_NETPATH
: /* Be happy */
414 if (!(nconf
->nc_flag
& NC_VISIBLE
))
418 if ((nconf
->nc_semantics
!= NC_TPI_COTS
) &&
419 (nconf
->nc_semantics
!= NC_TPI_COTS_ORD
))
422 case _RPC_DATAGRAM_V
:
423 if (!(nconf
->nc_flag
& NC_VISIBLE
))
426 case _RPC_DATAGRAM_N
:
427 if (nconf
->nc_semantics
!= NC_TPI_CLTS
)
431 if (((nconf
->nc_semantics
!= NC_TPI_COTS
) &&
432 (nconf
->nc_semantics
!= NC_TPI_COTS_ORD
)) ||
433 (strcmp(nconf
->nc_protofmly
, NC_INET
)
435 && strcmp(nconf
->nc_protofmly
, NC_INET6
))
440 strcmp(nconf
->nc_proto
, NC_TCP
))
444 if ((nconf
->nc_semantics
!= NC_TPI_CLTS
) ||
445 (strcmp(nconf
->nc_protofmly
, NC_INET
)
447 && strcmp(nconf
->nc_protofmly
, NC_INET6
))
452 strcmp(nconf
->nc_proto
, NC_UDP
))
462 __rpc_endconf(vhandle
)
465 struct handle
*handle
;
467 handle
= (struct handle
*) vhandle
;
468 if (handle
== NULL
) {
472 endnetpath(handle
->nhandle
);
474 endnetconfig(handle
->nhandle
);
480 * Used to ping the NULL procedure for clnt handle.
481 * Returns NULL if fails, else a non-NULL pointer.
487 struct timeval TIMEOUT
= {25, 0};
489 if (clnt_call(clnt
, NULLPROC
, (xdrproc_t
) xdr_void
, NULL
,
490 (xdrproc_t
) xdr_void
, NULL
, TIMEOUT
) != RPC_SUCCESS
) {
493 return ((void *) clnt
);
497 * Try all possible transports until
498 * one succeeds in finding the netconf for the given fd.
505 struct __rpc_sockinfo si
;
507 if (!__rpc_fd2sockinfo(fd
, &si
))
510 if (!__rpc_sockinfo2netid(&si
, &netid
))
513 return getnetconfigent(__UNCONST(netid
));
517 __rpc_fd2sockinfo(int fd
, struct __rpc_sockinfo
*sip
)
521 struct sockaddr_storage ss
;
523 _DIAGASSERT(sip
!= NULL
);
526 if (getsockname(fd
, (struct sockaddr
*)(void *)&ss
, &len
) < 0)
531 if (getsockopt(fd
, SOL_SOCKET
, SO_TYPE
, &type
, &len
) < 0)
535 if (ss
.ss_family
!= AF_LOCAL
) {
536 if (type
== SOCK_STREAM
)
538 else if (type
== SOCK_DGRAM
)
545 sip
->si_af
= ss
.ss_family
;
546 sip
->si_proto
= proto
;
547 sip
->si_socktype
= type
;
553 * Linear search, but the number of entries is small.
556 __rpc_nconf2sockinfo(const struct netconfig
*nconf
, struct __rpc_sockinfo
*sip
)
560 _DIAGASSERT(nconf
!= NULL
);
561 _DIAGASSERT(sip
!= NULL
);
563 for (i
= 0; i
< (sizeof na_cvt
) / (sizeof (struct netid_af
)); i
++)
564 if (!strcmp(na_cvt
[i
].netid
, nconf
->nc_netid
)) {
565 sip
->si_af
= na_cvt
[i
].af
;
566 sip
->si_proto
= na_cvt
[i
].protocol
;
568 __rpc_seman2socktype((int)nconf
->nc_semantics
);
569 if (sip
->si_socktype
== -1)
571 sip
->si_alen
= __rpc_get_a_size(sip
->si_af
);
579 __rpc_nconf2fd(const struct netconfig
*nconf
)
581 struct __rpc_sockinfo si
;
583 _DIAGASSERT(nconf
!= NULL
);
585 if (!__rpc_nconf2sockinfo(nconf
, &si
))
588 return socket(si
.si_af
, si
.si_socktype
, si
.si_proto
);
592 __rpc_sockinfo2netid(struct __rpc_sockinfo
*sip
, const char **netid
)
596 _DIAGASSERT(sip
!= NULL
);
597 /* netid may be NULL */
599 for (i
= 0; i
< (sizeof na_cvt
) / (sizeof (struct netid_af
)); i
++)
600 if (na_cvt
[i
].af
== sip
->si_af
&&
601 na_cvt
[i
].protocol
== sip
->si_proto
) {
603 *netid
= na_cvt
[i
].netid
;
611 taddr2uaddr(const struct netconfig
*nconf
, const struct netbuf
*nbuf
)
613 struct __rpc_sockinfo si
;
615 _DIAGASSERT(nconf
!= NULL
);
616 _DIAGASSERT(nbuf
!= NULL
);
618 if (!__rpc_nconf2sockinfo(nconf
, &si
))
620 return __rpc_taddr2uaddr_af(si
.si_af
, nbuf
);
624 uaddr2taddr(const struct netconfig
*nconf
, const char *uaddr
)
626 struct __rpc_sockinfo si
;
628 _DIAGASSERT(nconf
!= NULL
);
629 _DIAGASSERT(uaddr
!= NULL
);
631 if (!__rpc_nconf2sockinfo(nconf
, &si
))
633 return __rpc_uaddr2taddr_af(si
.si_af
, uaddr
);
637 __rpc_taddr2uaddr_af(int af
, const struct netbuf
*nbuf
)
640 struct sockaddr_in
*sinp
;
641 struct sockaddr_un
*sun
;
642 char namebuf
[INET_ADDRSTRLEN
];
644 struct sockaddr_in6
*sin6
;
645 char namebuf6
[INET6_ADDRSTRLEN
];
649 _DIAGASSERT(nbuf
!= NULL
);
654 if (inet_ntop(af
, &sinp
->sin_addr
, namebuf
, sizeof namebuf
)
657 port
= ntohs(sinp
->sin_port
);
658 if (asprintf(&ret
, "%s.%u.%u", namebuf
, ((u_int32_t
)port
) >> 8,
665 if (inet_ntop(af
, &sin6
->sin6_addr
, namebuf6
, sizeof namebuf6
)
668 port
= ntohs(sin6
->sin6_port
);
669 if (asprintf(&ret
, "%s.%u.%u", namebuf6
, ((u_int32_t
)port
) >> 8,
676 sun
->sun_path
[sizeof(sun
->sun_path
) - 1] = '\0'; /* safety */
677 ret
= strdup(sun
->sun_path
);
687 __rpc_uaddr2taddr_af(int af
, const char *uaddr
)
689 struct netbuf
*ret
= NULL
;
691 unsigned port
, portlo
, porthi
;
692 struct sockaddr_in
*sinp
;
694 struct sockaddr_in6
*sin6
;
696 struct sockaddr_un
*sun
;
698 _DIAGASSERT(uaddr
!= NULL
);
700 addrstr
= strdup(uaddr
);
705 * AF_LOCAL addresses are expected to be absolute
706 * pathnames, anything else will be AF_INET or AF_INET6.
709 if (*addrstr
!= '/') {
710 p
= strrchr(addrstr
, '.');
713 portlo
= (unsigned)atoi(p
+ 1);
716 p
= strrchr(addrstr
, '.');
719 porthi
= (unsigned)atoi(p
+ 1);
721 port
= (porthi
<< 8) | portlo
;
724 ret
= malloc(sizeof(*ret
));
730 sinp
= malloc(sizeof(*sinp
));
733 memset(sinp
, 0, sizeof *sinp
);
734 sinp
->sin_family
= AF_INET
;
735 sinp
->sin_port
= htons(port
);
736 if (inet_pton(AF_INET
, addrstr
, &sinp
->sin_addr
) <= 0) {
742 sinp
->sin_len
= ret
->maxlen
= ret
->len
= sizeof *sinp
;
747 sin6
= malloc(sizeof(*sin6
));
750 memset(sin6
, 0, sizeof *sin6
);
751 sin6
->sin6_family
= AF_INET6
;
752 sin6
->sin6_port
= htons(port
);
753 if (inet_pton(AF_INET6
, addrstr
, &sin6
->sin6_addr
) <= 0) {
759 sin6
->sin6_len
= ret
->maxlen
= ret
->len
= sizeof *sin6
;
764 sun
= malloc(sizeof(*sun
));
767 memset(sun
, 0, sizeof *sun
);
768 sun
->sun_family
= AF_LOCAL
;
769 strncpy(sun
->sun_path
, addrstr
, sizeof(sun
->sun_path
) - 1);
770 ret
->len
= ret
->maxlen
= sun
->sun_len
= SUN_LEN(sun
);
782 __rpc_seman2socktype(int semantics
)
787 case NC_TPI_COTS_ORD
:
799 __rpc_socktype2seman(int socktype
)
805 return NC_TPI_COTS_ORD
;
816 * XXXX - IPv6 scope IDs can't be handled in universal addresses.
817 * Here, we compare the original server address to that of the RPC
818 * service we just received back from a call to rpcbind on the remote
819 * machine. If they are both "link local" or "site local", copy
820 * the scope id of the server address over to the service address.
824 __rpc_fixup_addr(struct netbuf
*new, const struct netbuf
*svc
)
827 struct sockaddr
*sa_new
, *sa_svc
;
828 struct sockaddr_in6
*sin6_new
, *sin6_svc
;
830 _DIAGASSERT(new != NULL
);
831 _DIAGASSERT(svc
!= NULL
);
833 sa_svc
= (struct sockaddr
*)svc
->buf
;
834 sa_new
= (struct sockaddr
*)new->buf
;
836 if (sa_new
->sa_family
== sa_svc
->sa_family
&&
837 sa_new
->sa_family
== AF_INET6
) {
838 sin6_new
= (struct sockaddr_in6
*)new->buf
;
839 sin6_svc
= (struct sockaddr_in6
*)svc
->buf
;
841 if ((IN6_IS_ADDR_LINKLOCAL(&sin6_new
->sin6_addr
) &&
842 IN6_IS_ADDR_LINKLOCAL(&sin6_svc
->sin6_addr
)) ||
843 (IN6_IS_ADDR_SITELOCAL(&sin6_new
->sin6_addr
) &&
844 IN6_IS_ADDR_SITELOCAL(&sin6_svc
->sin6_addr
))) {
845 sin6_new
->sin6_scope_id
= sin6_svc
->sin6_scope_id
;
853 __rpc_sockisbound(int fd
)
855 struct sockaddr_storage ss
;
858 slen
= sizeof (struct sockaddr_storage
);
859 if (getsockname(fd
, (struct sockaddr
*)(void *)&ss
, &slen
) < 0)
862 switch (ss
.ss_family
) {
864 return (((struct sockaddr_in
*)
865 (void *)&ss
)->sin_port
!= 0);
868 return (((struct sockaddr_in6
*)
869 (void *)&ss
)->sin6_port
!= 0);
873 return (((struct sockaddr_un
*)
874 (void *)&ss
)->sun_path
[0] != '\0');
883 * For TCP transport, Host Requirements RFCs mandate
884 * Nagle (RFC-896) processing. But for RPC, Nagle
885 * processing adds adds unwanted latency to the last,
886 * partial TCP segment of each RPC message. See:
887 * R. W. Scheifler and J. Gettys, The X Window System,
888 * ACM Transactions on Graphics 16:8 (Aug. 1983), pp. 57-69.
889 * So for TCP transport, disable Nagle via TCP_NODELAY.
890 * XXX: moral equivalent for non-TCP protocols?
893 __rpc_setnodelay(int fd
, const struct __rpc_sockinfo
*si
)
896 if (si
->si_proto
!= IPPROTO_TCP
)
898 return setsockopt(fd
, si
->si_proto
, TCP_NODELAY
, &one
, sizeof(one
));