1 /* 2 * Copyright (c) 1995 3 * A.R. Gordon (andrew.gordon@net-tel.co.uk). All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed for the FreeBSD project 16 * 4. Neither the name of the author nor the names of any co-contributors 17 * may be used to endorse or promote products derived from this software 18 * without specific prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY ANDREW GORDON AND CONTRIBUTORS ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30 * SUCH DAMAGE. 31 * 32 * $NetBSD: lockd.c,v 1.7 2000/08/12 18:08:44 thorpej Exp $ 33 * $FreeBSD: src/usr.sbin/rpc.lockd/lockd.c,v 1.6 2001/03/19 12:50:09 alfred Exp $ 34 * $DragonFly: src/usr.sbin/rpc.lockd/lockd.c,v 1.5 2005/11/25 00:32:49 swildner Exp $ 35 */ 36 37 /* 38 * main() function for NFS lock daemon. Most of the code in this 39 * file was generated by running rpcgen /usr/include/rpcsvc/nlm_prot.x. 40 * 41 * The actual program logic is in the file lock_proc.c 42 */ 43 44 #include <sys/types.h> 45 #include <sys/socket.h> 46 47 #include <netinet/in.h> 48 #include <arpa/inet.h> 49 50 #include <err.h> 51 #include <stdio.h> 52 #include <stdlib.h> 53 #include <errno.h> 54 #include <syslog.h> 55 #include <signal.h> 56 #include <string.h> 57 #include <unistd.h> 58 #include <libutil.h> 59 #include <netconfig.h> 60 #include <netdb.h> 61 62 #include <rpc/rpc.h> 63 #include <rpc/rpc_com.h> 64 #include <rpcsvc/sm_inter.h> 65 66 #include "lockd.h" 67 #include <rpcsvc/nlm_prot.h> 68 69 int debug_level = 0; /* 0 = no debugging syslog() calls */ 70 int _rpcsvcdirty = 0; 71 72 int grace_expired; 73 char **hosts, *svcport_str = NULL; 74 int nhosts = 0; 75 int xcreated = 0; 76 77 #ifndef IPPORT_MAX 78 #define IPPORT_MAX 65535 79 #endif 80 81 void create_service(struct netconfig *); 82 83 void nlm_prog_0(struct svc_req *, SVCXPRT *); 84 void nlm_prog_1(struct svc_req *, SVCXPRT *); 85 void nlm_prog_3(struct svc_req *, SVCXPRT *); 86 void nlm_prog_4(struct svc_req *, SVCXPRT *); 87 void out_of_mem(void); 88 89 static void usage(void); 90 91 void sigalarm_handler(void); 92 93 int 94 main(int argc, char **argv) 95 { 96 int ch, i, s; 97 void *nc_handle; 98 char *endptr, **hosts_bak; 99 struct sigaction sigalarm; 100 int grace_period = 30; 101 struct netconfig *nconf; 102 int have_v6 = 1; 103 int maxrec = RPC_MAXDATASIZE; 104 in_port_t svcport = 0; 105 106 while ((ch = getopt(argc, argv, "d:g:h:p:")) != (-1)) { 107 switch (ch) { 108 case 'd': 109 debug_level = atoi(optarg); 110 if (!debug_level) { 111 usage(); 112 /* NOTREACHED */ 113 } 114 break; 115 case 'g': 116 grace_period = atoi(optarg); 117 if (!grace_period) { 118 usage(); 119 /* NOTREACHED */ 120 } 121 break; 122 case 'h': 123 ++nhosts; 124 hosts_bak = hosts; 125 hosts_bak = realloc(hosts, nhosts * sizeof(char *)); 126 if (hosts_bak == NULL) { 127 if (hosts != NULL) { 128 for (i = 0; i < nhosts; i++) 129 free(hosts[i]); 130 free(hosts); 131 out_of_mem(); 132 } 133 } 134 hosts = hosts_bak; 135 hosts[nhosts - 1] = strdup(optarg); 136 if (hosts[nhosts - 1] == NULL) { 137 for (i = 0; i < (nhosts - 1); i++) 138 free(hosts[i]); 139 free(hosts); 140 out_of_mem(); 141 } 142 break; 143 case 'p': 144 endptr = NULL; 145 svcport = (in_port_t)strtoul(optarg, &endptr, 10); 146 if (endptr == NULL || *endptr != '\0' || 147 svcport == 0 || svcport >= IPPORT_MAX) 148 usage(); 149 svcport_str = strdup(optarg); 150 break; 151 default: 152 case '?': 153 usage(); 154 /* NOTREACHED */ 155 } 156 } 157 if (geteuid()) { /* This command allowed only to root */ 158 fprintf(stderr, "Sorry. You are not superuser\n"); 159 exit(1); 160 } 161 162 rpcb_unset(NLM_PROG, NLM_SM, NULL); 163 rpcb_unset(NLM_PROG, NLM_VERS, NULL); 164 rpcb_unset(NLM_PROG, NLM_VERSX, NULL); 165 rpcb_unset(NLM_PROG, NLM_VERS4, NULL); 166 167 /* 168 * Check if IPv6 support is present. 169 */ 170 s = socket(AF_INET6, SOCK_DGRAM, IPPROTO_UDP); 171 if (s < 0) 172 have_v6 = 0; 173 else 174 close(s); 175 176 rpc_control(RPC_SVC_CONNMAXREC_SET, &maxrec); 177 178 /* 179 * If no hosts were specified, add a wildcard entry to bind to 180 * INADDR_ANY. Otherwise make sure 127.0.0.1 and ::1 are added to the 181 * list. 182 */ 183 if (nhosts == 0) { 184 hosts = malloc(sizeof(char**)); 185 if (hosts == NULL) 186 out_of_mem(); 187 188 hosts[0] = "*"; 189 nhosts = 1; 190 } else { 191 hosts_bak = hosts; 192 if (have_v6) { 193 hosts_bak = realloc(hosts, (nhosts + 2) * 194 sizeof(char *)); 195 if (hosts_bak == NULL) { 196 for (i = 0; i < nhosts; i++) 197 free(hosts[i]); 198 free(hosts); 199 out_of_mem(); 200 } else 201 hosts = hosts_bak; 202 203 nhosts += 2; 204 hosts[nhosts - 2] = "::1"; 205 } else { 206 hosts_bak = realloc(hosts, (nhosts + 1) * sizeof(char *)); 207 if (hosts_bak == NULL) { 208 for (i = 0; i < nhosts; i++) 209 free(hosts[i]); 210 211 free(hosts); 212 out_of_mem(); 213 } else { 214 nhosts += 1; 215 hosts = hosts_bak; 216 } 217 } 218 hosts[nhosts - 1] = "127.0.0.1"; 219 } 220 221 nc_handle = setnetconfig(); 222 while ((nconf = getnetconfig(nc_handle))) { 223 /* We want to listen only on udp6, tcp6, udp, tcp transports */ 224 if (nconf->nc_flag & NC_VISIBLE) { 225 /* Skip if there's no IPv6 support */ 226 if (have_v6 == 0 && strcmp(nconf->nc_protofmly, "inet6") == 0) { 227 /* DO NOTHING */ 228 } else { 229 create_service(nconf); 230 } 231 } 232 } 233 endnetconfig(nc_handle); 234 235 /* 236 * Note that it is NOT sensible to run this program from inetd - the 237 * protocol assumes that it will run immediately at boot time. 238 */ 239 if (daemon(0, debug_level > 0)) { 240 err(1, "cannot fork"); 241 /* NOTREACHED */ 242 } 243 244 openlog("rpc.lockd", 0, LOG_DAEMON); 245 if (debug_level) 246 syslog(LOG_INFO, "Starting, debug level %d", debug_level); 247 else 248 syslog(LOG_INFO, "Starting"); 249 250 sigalarm.sa_handler = (sig_t) sigalarm_handler; 251 sigemptyset(&sigalarm.sa_mask); 252 sigalarm.sa_flags = SA_RESETHAND; /* should only happen once */ 253 sigalarm.sa_flags |= SA_RESTART; 254 if (sigaction(SIGALRM, &sigalarm, NULL) != 0) { 255 syslog(LOG_WARNING, "sigaction(SIGALRM) failed: %s", 256 strerror(errno)); 257 exit(1); 258 } 259 grace_expired = 0; 260 alarm(grace_period); 261 262 svc_run(); /* Should never return */ 263 exit(1); 264 } 265 266 /* 267 * This routine creates and binds sockets on the appropriate 268 * addresses. It gets called one time for each transport and 269 * registrates the service with rpcbind on that trasport. 270 */ 271 void 272 create_service(struct netconfig *nconf) 273 { 274 struct addrinfo hints, *res = NULL; 275 struct sockaddr_in *sin; 276 struct sockaddr_in6 *sin6; 277 struct __rpc_sockinfo si; 278 struct netbuf servaddr; 279 SVCXPRT *transp = NULL; 280 int aicode; 281 int fd; 282 int nhostsbak; 283 int r; 284 int registered = 0; 285 u_int32_t host_addr[4]; /* IPv4 or IPv6 */ 286 287 if ((nconf->nc_semantics != NC_TPI_CLTS) && 288 (nconf->nc_semantics != NC_TPI_COTS) && 289 (nconf->nc_semantics != NC_TPI_COTS_ORD)) 290 return; /* not my type */ 291 292 /* 293 * XXX - using RPC library internal functions. 294 */ 295 if (!__rpc_nconf2sockinfo(nconf, &si)) { 296 syslog(LOG_ERR, "cannot get information for %s", 297 nconf->nc_netid); 298 return; 299 } 300 301 /* Get rpc.statd's address on this transport */ 302 memset(&hints, 0, sizeof hints); 303 hints.ai_flags = AI_PASSIVE; 304 hints.ai_family = si.si_af; 305 hints.ai_socktype = si.si_socktype; 306 hints.ai_protocol = si.si_proto; 307 308 /* 309 * Bind to specific IPs if asked to 310 */ 311 nhostsbak = nhosts; 312 while (nhostsbak > 0) { 313 --nhostsbak; 314 315 /* 316 * XXX - using RPC library internal functions. 317 */ 318 if ((fd = __rpc_nconf2fd(nconf)) < 0) { 319 syslog(LOG_ERR, "cannot create socket for %s", 320 nconf->nc_netid); 321 continue; 322 } 323 324 switch (hints.ai_family) { 325 case AF_INET: 326 if (inet_pton(AF_INET, hosts[nhostsbak], 327 host_addr) == 1) { 328 hints.ai_flags &= AI_NUMERICHOST; 329 } else { 330 /* 331 * Skip if we have an AF_INET6 address. 332 */ 333 if (inet_pton(AF_INET6, hosts[nhostsbak], 334 host_addr) == 1) { 335 close(fd); 336 continue; 337 } 338 } 339 break; 340 case AF_INET6: 341 if (inet_pton(AF_INET6, hosts[nhostsbak], 342 host_addr) == 1) { 343 hints.ai_flags &= AI_NUMERICHOST; 344 } else { 345 /* 346 * Skip if we have an AF_INET address. 347 */ 348 if (inet_pton(AF_INET, hosts[nhostsbak], 349 host_addr) == 1) { 350 close(fd); 351 continue; 352 } 353 } 354 break; 355 default: 356 break; 357 } 358 359 /* 360 * If no hosts were specified, just bind to INADDR_ANY 361 */ 362 if (strcmp("*", hosts[nhostsbak]) == 0) { 363 if (svcport_str == NULL) { 364 res = malloc(sizeof(struct addrinfo)); 365 if (res == NULL) 366 out_of_mem(); 367 res->ai_flags = hints.ai_flags; 368 res->ai_family = hints.ai_family; 369 res->ai_protocol = hints.ai_protocol; 370 switch (res->ai_family) { 371 case AF_INET: 372 sin = malloc(sizeof(struct sockaddr_in)); 373 if (sin == NULL) 374 out_of_mem(); 375 sin->sin_family = AF_INET; 376 sin->sin_port = htons(0); 377 sin->sin_addr.s_addr = htonl(INADDR_ANY); 378 res->ai_addr = (struct sockaddr*) sin; 379 res->ai_addrlen = (socklen_t) 380 sizeof(res->ai_addr); 381 break; 382 case AF_INET6: 383 sin6 = malloc(sizeof(struct sockaddr_in6)); 384 if (sin6 == NULL) 385 out_of_mem(); 386 sin6->sin6_family = AF_INET6; 387 sin6->sin6_port = htons(0); 388 sin6->sin6_addr = in6addr_any; 389 res->ai_addr = (struct sockaddr*) sin6; 390 res->ai_addrlen = (socklen_t) sizeof(res->ai_addr); 391 break; 392 default: 393 break; 394 } 395 } else { 396 if ((aicode = getaddrinfo(NULL, svcport_str, 397 &hints, &res)) != 0) { 398 syslog(LOG_ERR, 399 "cannot get local address for %s: %s", 400 nconf->nc_netid, 401 gai_strerror(aicode)); 402 continue; 403 } 404 } 405 } else { 406 if ((aicode = getaddrinfo(hosts[nhostsbak], svcport_str, 407 &hints, &res)) != 0) { 408 syslog(LOG_ERR, 409 "cannot get local address for %s: %s", 410 nconf->nc_netid, gai_strerror(aicode)); 411 continue; 412 } 413 } 414 415 r = bindresvport_sa(fd, res->ai_addr); 416 if (r != 0) { 417 syslog(LOG_ERR, "bindresvport_sa: %m"); 418 exit(1); 419 } 420 421 transp = svc_tli_create(fd, nconf, NULL, 422 RPC_MAXDATASIZE, RPC_MAXDATASIZE); 423 424 if (transp != (SVCXPRT *) NULL) { 425 if (!svc_reg(transp, NLM_PROG, NLM_SM, nlm_prog_0, 426 NULL)) 427 syslog(LOG_ERR, 428 "can't register %s NLM_PROG, NLM_SM service", 429 nconf->nc_netid); 430 431 if (!svc_reg(transp, NLM_PROG, NLM_VERS, nlm_prog_1, 432 NULL)) 433 syslog(LOG_ERR, 434 "can't register %s NLM_PROG, NLM_VERS service", 435 nconf->nc_netid); 436 437 if (!svc_reg(transp, NLM_PROG, NLM_VERSX, nlm_prog_3, 438 NULL)) 439 syslog(LOG_ERR, 440 "can't register %s NLM_PROG, NLM_VERSX service", 441 nconf->nc_netid); 442 443 if (!svc_reg(transp, NLM_PROG, NLM_VERS4, nlm_prog_4, 444 NULL)) 445 syslog(LOG_ERR, 446 "can't register %s NLM_PROG, NLM_VERS4 service", 447 nconf->nc_netid); 448 449 } else 450 syslog(LOG_WARNING, "can't create %s services", 451 nconf->nc_netid); 452 453 if (registered == 0) { 454 registered = 1; 455 memset(&hints, 0, sizeof hints); 456 hints.ai_flags = AI_PASSIVE; 457 hints.ai_family = si.si_af; 458 hints.ai_socktype = si.si_socktype; 459 hints.ai_protocol = si.si_proto; 460 461 if (svcport_str == NULL) { 462 svcport_str = malloc(NI_MAXSERV * sizeof(char)); 463 if (svcport_str == NULL) 464 out_of_mem(); 465 466 if (getnameinfo(res->ai_addr, 467 res->ai_addr->sa_len, NULL, NI_MAXHOST, 468 svcport_str, NI_MAXSERV * sizeof(char), 469 NI_NUMERICHOST | NI_NUMERICSERV)) 470 errx(1, "Cannot get port number"); 471 } 472 473 if((aicode = getaddrinfo(NULL, svcport_str, &hints, 474 &res)) != 0) { 475 syslog(LOG_ERR, "cannot get local address: %s", 476 gai_strerror(aicode)); 477 exit(1); 478 } 479 480 servaddr.buf = malloc(res->ai_addrlen); 481 memcpy(servaddr.buf, res->ai_addr, res->ai_addrlen); 482 servaddr.len = res->ai_addrlen; 483 484 rpcb_set(NLM_PROG, NLM_SM, nconf, &servaddr); 485 rpcb_set(NLM_PROG, NLM_VERS, nconf, &servaddr); 486 rpcb_set(NLM_PROG, NLM_VERSX, nconf, &servaddr); 487 rpcb_set(NLM_PROG, NLM_VERS4, nconf, &servaddr); 488 489 xcreated++; 490 freeaddrinfo(res); 491 } 492 } /* end while */ 493 } 494 495 void 496 sigalarm_handler(void) 497 { 498 499 grace_expired = 1; 500 } 501 502 static void 503 usage(void) 504 { 505 errx(1, "usage: rpc.lockd [-d <debuglevel>]" 506 " [-g <grace period>] [-h <bindip>] [-p <port>]"); 507 } 508 509 /* 510 * Out of memory, fatal 511 */ 512 void 513 out_of_mem(void) 514 { 515 syslog(LOG_ERR, "out of memory"); 516 exit(2); 517 } 518