258efc53df
* Fix some misused types. * Encapsulate the protocols better. * Rearrange the RPC stuff to work more like the kernel. (Needs more work.) * Remove a bunch of extra hair when reading a file over NFS. * Use RPCAUTH_UNIX when talking to the NFS server.
282 lines
7.5 KiB
C
282 lines
7.5 KiB
C
/* $NetBSD: rpc.c,v 1.4 1995/02/20 11:04:18 mycroft Exp $ */
|
|
|
|
/*
|
|
* Copyright (c) 1992 Regents of the University of California.
|
|
* All rights reserved.
|
|
*
|
|
* This software was developed by the Computer Systems Engineering group
|
|
* at Lawrence Berkeley Laboratory under DARPA contract BG 91-66 and
|
|
* contributed to Berkeley.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
* must display the following acknowledgement:
|
|
* This product includes software developed by the University of
|
|
* California, Lawrence Berkeley Laboratory and its contributors.
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*
|
|
* @(#) Header: rpc.c,v 1.12 93/09/28 08:31:56 leres Exp (LBL)
|
|
*/
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/socket.h>
|
|
|
|
#include <netinet/in.h>
|
|
#include <netinet/in_systm.h>
|
|
|
|
#include <nfs/rpcv2.h>
|
|
#include <nfs/nfsv2.h>
|
|
#include <nfs/xdr_subs.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include "stand.h"
|
|
#include "net.h"
|
|
#include "netif.h"
|
|
#include "rpc.h"
|
|
|
|
/* XXX Data part of nfs rpc reply (also the largest thing we receive) */
|
|
struct nfs_reply_data {
|
|
u_long errno;
|
|
u_char fa[NFSX_FATTR(0)];
|
|
u_long count;
|
|
u_char data[1200];
|
|
};
|
|
#define NFSREAD_SIZE sizeof(((struct nfs_reply_data *)0)->data)
|
|
|
|
/* Cache stuff */
|
|
#define PMAP_NUM 8 /* need at most 5 pmap entries */
|
|
|
|
static struct pmap_list {
|
|
u_long addr; /* address of server */
|
|
u_long prog;
|
|
u_long vers;
|
|
u_short port; /* cached port for service */
|
|
} pmap_list[PMAP_NUM] = {
|
|
{ 0, PMAPPROG, PMAPVERS, PMAPPORT }
|
|
};
|
|
static int pmap_num = 1;
|
|
|
|
/* Local forwards */
|
|
static size_t recvrpc __P((struct iodesc *, void *, size_t, time_t));
|
|
|
|
/* Make a rpc call; return length of answer */
|
|
size_t
|
|
callrpc(d, prog, vers, proc, sdata, slen, rdata, rlen)
|
|
register struct iodesc *d;
|
|
register u_long prog, vers, proc;
|
|
register void *sdata;
|
|
register size_t slen;
|
|
register void *rdata;
|
|
register size_t rlen;
|
|
{
|
|
register size_t cc;
|
|
register u_long *tl;
|
|
struct {
|
|
u_char header[HEADER_SIZE];
|
|
u_long data[96]; /* XXX */
|
|
} wbuf;
|
|
struct {
|
|
u_char header[HEADER_SIZE];
|
|
struct rpc_reply rrpc;
|
|
union {
|
|
u_long errno;
|
|
u_char data[sizeof(struct nfs_reply_data)];
|
|
} ru;
|
|
} rbuf;
|
|
|
|
#ifdef RPC_DEBUG
|
|
if (debug)
|
|
printf("callrpc: called\n");
|
|
#endif
|
|
if (rlen > sizeof(rbuf.ru.data))
|
|
panic("callrpc: huge read (%d > %d)",
|
|
rlen, sizeof(rbuf.ru.data));
|
|
|
|
d->destport = getport(d, prog, vers);
|
|
|
|
tl = wbuf.data;
|
|
|
|
/* Fill in RPC call structure. */
|
|
*tl++ = txdr_unsigned(d->xid);
|
|
*tl++ = txdr_unsigned(RPC_CALL);
|
|
*tl++ = txdr_unsigned(RPC_VER2);
|
|
*tl++ = txdr_unsigned(prog);
|
|
*tl++ = txdr_unsigned(vers);
|
|
*tl++ = txdr_unsigned(proc);
|
|
|
|
/* Fill in authorization info. */
|
|
if (prog != NFS_PROG) {
|
|
*tl++ = txdr_unsigned(RPCAUTH_NULL);
|
|
*tl++ = txdr_unsigned(0);
|
|
} else {
|
|
*tl++ = txdr_unsigned(RPCAUTH_UNIX);
|
|
*tl++ = txdr_unsigned(3*NFSX_UNSIGNED);
|
|
*tl++ = txdr_unsigned(0); /* time */
|
|
*tl++ = txdr_unsigned(0); /* host name length */
|
|
*tl++ = txdr_unsigned(0); /* uid */
|
|
*tl++ = txdr_unsigned(0); /* gid */
|
|
*tl++ = txdr_unsigned(0); /* gid list length */
|
|
}
|
|
*tl++ = txdr_unsigned(RPCAUTH_NULL);
|
|
*tl++ = txdr_unsigned(0);
|
|
|
|
/* Fill in RPC call arguments. */
|
|
bcopy(sdata, tl, slen);
|
|
|
|
cc = sendrecv(d,
|
|
sendudp, wbuf.data,
|
|
(tl - wbuf.data) * NFSX_UNSIGNED + slen,
|
|
recvrpc, &rbuf.rrpc,
|
|
sizeof(struct rpc_reply) + sizeof(struct nfs_reply_data));
|
|
|
|
#ifdef RPC_DEBUG
|
|
if (debug)
|
|
printf("callrpc: cc=%d rlen=%d, rp_stat=%d\n", cc, rlen,
|
|
rbuf.rrpc.rp_stat);
|
|
#endif
|
|
|
|
/* Bump xid so next request will be unique. */
|
|
++d->xid;
|
|
|
|
if (cc == -1)
|
|
return (-1);
|
|
if (cc < rlen) {
|
|
/* Check for an error return */
|
|
if (cc >= sizeof(rbuf.ru.errno) && rbuf.ru.errno != 0) {
|
|
errno = ntohl(rbuf.ru.errno);
|
|
return (-1);
|
|
}
|
|
panic("callrpc: missing data (%d < %d)", cc, rlen);
|
|
}
|
|
if (cc > sizeof(rbuf.ru.data))
|
|
panic("callrpc: huge return (%d > %d)",
|
|
cc, sizeof(rbuf.ru.data));
|
|
bcopy(rbuf.ru.data, rdata, cc);
|
|
return (cc);
|
|
}
|
|
|
|
/* Returns true if packet is the one we're waiting for */
|
|
static size_t
|
|
recvrpc(d, pkt, len, tleft)
|
|
register struct iodesc *d;
|
|
register void *pkt;
|
|
register size_t len;
|
|
time_t tleft;
|
|
{
|
|
register struct rpc_reply *rpc;
|
|
|
|
errno = 0;
|
|
#ifdef RPC_DEBUG
|
|
if (debug)
|
|
printf("recvrpc: called len=%d\n", len);
|
|
#endif
|
|
|
|
len = readudp(d, pkt, len, tleft);
|
|
if (len == -1 || len < sizeof(struct rpc_reply))
|
|
goto bad;
|
|
|
|
rpc = (struct rpc_reply *)pkt;
|
|
NTOHL(rpc->rp_xid);
|
|
NTOHL(rpc->rp_direction);
|
|
NTOHL(rpc->rp_stat);
|
|
|
|
if (rpc->rp_xid != d->xid ||
|
|
rpc->rp_direction != RPC_REPLY ||
|
|
rpc->rp_stat != RPC_MSGACCEPTED) {
|
|
#ifdef RPC_DEBUG
|
|
if (debug) {
|
|
if (rpc->rp_xid != d->xid)
|
|
printf("recvrpc: rp_xid %d != xid %d\n",
|
|
rpc->rp_xid, d->xid);
|
|
if (rpc->rp_direction != RPC_REPLY)
|
|
printf("recvrpc: rp_direction %d != RPC_REPLY\n",
|
|
rpc->rp_direction);
|
|
if (rpc->rp_stat != RPC_MSGACCEPTED)
|
|
printf("recvrpc: rp_stat %d != RPC_MSGACCEPTED\n",
|
|
rpc->rp_stat);
|
|
}
|
|
#endif
|
|
goto bad;
|
|
}
|
|
|
|
/* Return data count (thus indicating success) */
|
|
return (len - sizeof(*rpc));
|
|
|
|
bad:
|
|
return (-1);
|
|
}
|
|
|
|
/* Request a port number from the port mapper */
|
|
u_short
|
|
getport(d, prog, vers)
|
|
register struct iodesc *d;
|
|
u_long prog;
|
|
u_long vers;
|
|
{
|
|
register int i;
|
|
register struct pmap_list *pl;
|
|
u_long port;
|
|
struct {
|
|
u_long prog; /* call program */
|
|
u_long vers; /* call version */
|
|
u_long proto; /* call protocol */
|
|
u_long port; /* call port (unused) */
|
|
} sdata;
|
|
|
|
#ifdef RPC_DEBUG
|
|
if (debug)
|
|
printf("getport: called\n");
|
|
#endif
|
|
/* Try for cached answer first */
|
|
for (i = 0, pl = pmap_list; i < pmap_num; ++i, ++pl)
|
|
if ((pl->addr == d->destip || pl->addr == 0) &&
|
|
pl->prog == prog && pl->vers == vers)
|
|
return (pl->port);
|
|
|
|
/* Don't overflow cache */
|
|
if (pmap_num > PMAP_NUM - 1)
|
|
panic("getport: overflowed pmap_list!");
|
|
|
|
sdata.prog = htonl(prog);
|
|
sdata.vers = htonl(vers);
|
|
sdata.proto = htonl(IPPROTO_UDP);
|
|
sdata.port = 0;
|
|
|
|
if (callrpc(d, PMAPPROG, PMAPVERS, PMAPPROC_GETPORT,
|
|
&sdata, sizeof(sdata), &port, sizeof(port)) < 0) {
|
|
printf("getport: %s", strerror(errno));
|
|
return(-1);
|
|
}
|
|
|
|
/* Cache answer */
|
|
pl->addr = d->destip;
|
|
pl->prog = prog;
|
|
pl->vers = vers;
|
|
pl->port = port;
|
|
++pmap_num;
|
|
|
|
return ((u_short)port);
|
|
}
|