xref: /minix/tests/fs/nfs/nfsservice/rpcbind/pmap_svc.c (revision 84d9c625)
1 /*	$NetBSD: pmap_svc.c,v 1.2 2013/10/19 17:45:00 christos Exp $	*/
2 
3 /*
4  * Sun RPC is a product of Sun Microsystems, Inc. and is provided for
5  * unrestricted use provided that this legend is included on all tape
6  * media and as a part of the software program in whole or part.  Users
7  * may copy or modify Sun RPC without charge, but are not authorized
8  * to license or distribute it to anyone else except as part of a product or
9  * program developed by the user.
10  *
11  * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
12  * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
13  * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
14  *
15  * Sun RPC is provided with no support and without any obligation on the
16  * part of Sun Microsystems, Inc. to assist in its use, correction,
17  * modification or enhancement.
18  *
19  * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
20  * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
21  * OR ANY PART THEREOF.
22  *
23  * In no event will Sun Microsystems, Inc. be liable for any lost revenue
24  * or profits or other special, indirect and consequential damages, even if
25  * Sun has been advised of the possibility of such damages.
26  *
27  * Sun Microsystems, Inc.
28  * 2550 Garcia Avenue
29  * Mountain View, California  94043
30  */
31 /*
32  * Copyright (c) 1984 - 1991 by Sun Microsystems, Inc.
33  */
34 
35 /* #ident	"@(#)pmap_svc.c	1.14	93/07/05 SMI" */
36 
37 #if 0
38 #ifndef lint
39 static	char sccsid[] = "@(#)pmap_svc.c 1.23 89/04/05 Copyr 1984 Sun Micro";
40 #endif
41 #endif
42 
43 /*
44  * pmap_svc.c
45  * The server procedure for the version 2 portmapper.
46  * All the portmapper related interface from the portmap side.
47  */
48 
49 #ifdef PORTMAP
50 #include <sys/types.h>
51 #include <sys/socket.h>
52 #include <stdio.h>
53 #include <rpc/rpc.h>
54 #include <rpc/pmap_prot.h>
55 #include <rpc/rpcb_prot.h>
56 #ifdef RPCBIND_DEBUG
57 #include <stdlib.h>
58 #endif
59 #include "rpcbind.h"
60 
61 static struct pmaplist *find_service_pmap(rpcprog_t, rpcvers_t, rpcprot_t);
62 static bool_t pmapproc_change(struct svc_req *, SVCXPRT *, u_long);
63 static bool_t pmapproc_getport(struct svc_req *, SVCXPRT *);
64 static bool_t pmapproc_dump(struct svc_req *, SVCXPRT *);
65 
66 /*
67  * Called for all the version 2 inquiries.
68  */
69 void
pmap_service(struct svc_req * rqstp,SVCXPRT * xprt)70 pmap_service(struct svc_req *rqstp, SVCXPRT *xprt)
71 {
72 	rpcbs_procinfo(RPCBVERS_2_STAT, rqstp->rq_proc);
73 	switch (rqstp->rq_proc) {
74 	case PMAPPROC_NULL:
75 		/*
76 		 * Null proc call
77 		 */
78 #ifdef RPCBIND_DEBUG
79 		if (debugging)
80 			fprintf(stderr, "PMAPPROC_NULL\n");
81 #endif
82 		check_access(xprt, rqstp->rq_proc, NULL, PMAPVERS);
83 		if ((!svc_sendreply(xprt, (xdrproc_t) xdr_void, NULL)) &&
84 			debugging) {
85 			if (doabort) {
86 				rpcbind_abort();
87 			}
88 		}
89 		break;
90 
91 	case PMAPPROC_SET:
92 		/*
93 		 * Set a program, version to port mapping
94 		 */
95 		pmapproc_change(rqstp, xprt, rqstp->rq_proc);
96 		break;
97 
98 	case PMAPPROC_UNSET:
99 		/*
100 		 * Remove a program, version to port mapping.
101 		 */
102 		pmapproc_change(rqstp, xprt, rqstp->rq_proc);
103 		break;
104 
105 	case PMAPPROC_GETPORT:
106 		/*
107 		 * Lookup the mapping for a program, version and return its
108 		 * port number.
109 		 */
110 		pmapproc_getport(rqstp, xprt);
111 		break;
112 
113 	case PMAPPROC_DUMP:
114 		/*
115 		 * Return the current set of mapped program, version
116 		 */
117 #ifdef RPCBIND_DEBUG
118 		if (debugging)
119 			fprintf(stderr, "PMAPPROC_DUMP\n");
120 #endif
121 		pmapproc_dump(rqstp, xprt);
122 		break;
123 
124 	case PMAPPROC_CALLIT:
125 		/*
126 		 * Calls a procedure on the local machine. If the requested
127 		 * procedure is not registered this procedure does not return
128 		 * error information!!
129 		 * This procedure is only supported on rpc/udp and calls via
130 		 * rpc/udp. It passes null authentication parameters.
131 		 */
132 		rpcbproc_callit_com(rqstp, xprt, PMAPPROC_CALLIT, PMAPVERS);
133 		break;
134 
135 	default:
136 		svcerr_noproc(xprt);
137 		break;
138 	}
139 }
140 
141 /*
142  * returns the item with the given program, version number. If that version
143  * number is not found, it returns the item with that program number, so that
144  * the port number is now returned to the caller. The caller when makes a
145  * call to this program, version number, the call will fail and it will
146  * return with PROGVERS_MISMATCH. The user can then determine the highest
147  * and the lowest version number for this program using clnt_geterr() and
148  * use those program version numbers.
149  */
150 static struct pmaplist *
find_service_pmap(rpcprog_t prog,rpcvers_t vers,rpcprot_t prot)151 find_service_pmap(rpcprog_t prog, rpcvers_t vers, rpcprot_t prot)
152 {
153 	register struct pmaplist *hit = NULL;
154 	register struct pmaplist *pml;
155 
156 	for (pml = list_pml; pml != NULL; pml = pml->pml_next) {
157 		if ((pml->pml_map.pm_prog != prog) ||
158 			(pml->pml_map.pm_prot != prot))
159 			continue;
160 		hit = pml;
161 		if (pml->pml_map.pm_vers == vers)
162 			break;
163 	}
164 	return (hit);
165 }
166 
167 static bool_t
pmapproc_change(struct svc_req * rqstp,SVCXPRT * xprt,unsigned long op)168 pmapproc_change(struct svc_req *rqstp, SVCXPRT *xprt, unsigned long op)
169 {
170 	struct pmap reg;
171 	RPCB rpcbreg;
172 	long ans;
173 	struct sockcred *sc;
174 	char uidbuf[32];
175 
176 #ifdef RPCBIND_DEBUG
177 	if (debugging)
178 		fprintf(stderr, "%s request for (%lu, %lu) : ",
179 		    op == PMAPPROC_SET ? "PMAP_SET" : "PMAP_UNSET",
180 		    reg.pm_prog, reg.pm_vers);
181 #endif
182 
183 	if (!svc_getargs(xprt, (xdrproc_t) xdr_pmap, (char *)&reg)) {
184 		svcerr_decode(xprt);
185 		return (FALSE);
186 	}
187 
188 	if (!check_access(xprt, op, &reg, PMAPVERS)) {
189 		svcerr_weakauth(xprt);
190 		return FALSE;
191 	}
192 
193 	(void)svc_getcaller(xprt);
194 	sc = __svc_getcallercreds(xprt);
195 
196 	/*
197 	 * Can't use getpwnam here. We might end up calling ourselves
198 	 * and looping.
199 	 */
200 	if (sc == NULL)
201 		rpcbreg.r_owner = __UNCONST(rpcbind_unknown);
202 	else if (sc->sc_uid == 0)
203 		rpcbreg.r_owner = __UNCONST(rpcbind_superuser);
204 	else {
205 		/* r_owner will be strdup-ed later */
206 		snprintf(uidbuf, sizeof uidbuf, "%d", sc->sc_uid);
207 		rpcbreg.r_owner = uidbuf;
208 	}
209 
210 	rpcbreg.r_prog = reg.pm_prog;
211 	rpcbreg.r_vers = reg.pm_vers;
212 
213 	if (op == PMAPPROC_SET) {
214 		char buf[32];
215 
216 		snprintf(buf, sizeof(buf), "0.0.0.0.%d.%d",
217 		    (int)((reg.pm_port >> 8) & 0xff),
218 		    (int)(reg.pm_port & 0xff));
219 		rpcbreg.r_addr = buf;
220 		if (reg.pm_prot == IPPROTO_UDP) {
221 			rpcbreg.r_netid = __UNCONST(udptrans);
222 		} else if (reg.pm_prot == IPPROTO_TCP) {
223 			rpcbreg.r_netid = __UNCONST(tcptrans);
224 		} else {
225 			ans = FALSE;
226 			goto done_change;
227 		}
228 		ans = map_set(&rpcbreg, rpcbreg.r_owner);
229 	} else if (op == PMAPPROC_UNSET) {
230 		bool_t ans1, ans2;
231 
232 		rpcbreg.r_addr = NULL;
233 		rpcbreg.r_netid = __UNCONST(tcptrans);
234 		ans1 = map_unset(&rpcbreg, rpcbreg.r_owner);
235 		rpcbreg.r_netid = __UNCONST(udptrans);
236 		ans2 = map_unset(&rpcbreg, rpcbreg.r_owner);
237 		ans = ans1 || ans2;
238 	} else {
239 		ans = FALSE;
240 	}
241 done_change:
242 	if ((!svc_sendreply(xprt, (xdrproc_t) xdr_long, (caddr_t) &ans)) &&
243 	    debugging) {
244 		fprintf(stderr, "portmap: svc_sendreply\n");
245 		if (doabort) {
246 			rpcbind_abort();
247 		}
248 	}
249 #ifdef RPCBIND_DEBUG
250 	if (debugging)
251 		fprintf(stderr, "%s\n", ans == TRUE ? "succeeded" : "failed");
252 #endif
253 	if (op == PMAPPROC_SET)
254 		rpcbs_set(RPCBVERS_2_STAT, ans);
255 	else
256 		rpcbs_unset(RPCBVERS_2_STAT, ans);
257 	return (TRUE);
258 }
259 
260 /* ARGSUSED */
261 static bool_t
pmapproc_getport(struct svc_req * rqstp,SVCXPRT * xprt)262 pmapproc_getport(struct svc_req *rqstp, SVCXPRT *xprt)
263 {
264 	struct pmap reg;
265 	long lport;
266 	int port = 0;
267 	struct pmaplist *fnd;
268 #ifdef RPCBIND_DEBUG
269 	char *uaddr;
270 #endif
271 
272 	if (!svc_getargs(xprt, (xdrproc_t) xdr_pmap, (char *)&reg)) {
273 		svcerr_decode(xprt);
274 		return (FALSE);
275 	}
276 
277 	if (!check_access(xprt, PMAPPROC_GETPORT, &reg, PMAPVERS)) {
278 		svcerr_weakauth(xprt);
279 		return FALSE;
280 	}
281 
282 #ifdef RPCBIND_DEBUG
283 	if (debugging) {
284 		uaddr =  taddr2uaddr(rpcbind_get_conf(xprt->xp_netid),
285 			    svc_getrpccaller(xprt));
286 		fprintf(stderr, "PMAP_GETPORT req for (%lu, %lu, %s) from %s :",
287 			reg.pm_prog, reg.pm_vers,
288 			reg.pm_prot == IPPROTO_UDP ? "udp" : "tcp", uaddr);
289 		free(uaddr);
290 	}
291 #endif
292 	fnd = find_service_pmap(reg.pm_prog, reg.pm_vers, reg.pm_prot);
293 	if (fnd) {
294 		char serveuaddr[32];
295 		int h1, h2, h3, h4, p1, p2;
296 		const char *netid, *ua;
297 
298 		if (reg.pm_prot == IPPROTO_UDP) {
299 			ua = udp_uaddr;
300 			netid = udptrans;
301 		} else {
302 			ua = tcp_uaddr; /* To get the len */
303 			netid = tcptrans;
304 		}
305 		if (ua == NULL) {
306 			goto sendreply;
307 		}
308 		if (sscanf(ua, "%d.%d.%d.%d.%d.%d", &h1, &h2, &h3,
309 				&h4, &p1, &p2) == 6) {
310 			p1 = (fnd->pml_map.pm_port >> 8) & 0xff;
311 			p2 = (fnd->pml_map.pm_port) & 0xff;
312 			snprintf(serveuaddr, sizeof(serveuaddr),
313 			    "%d.%d.%d.%d.%d.%d", h1, h2, h3, h4, p1, p2);
314 			if (is_bound(netid, serveuaddr)) {
315 				port = fnd->pml_map.pm_port;
316 			} else { /* this service is dead; delete it */
317 				delete_prog(reg.pm_prog);
318 			}
319 		}
320 	}
321 sendreply:
322 	lport = port;
323 	if ((!svc_sendreply(xprt, (xdrproc_t) xdr_long, (caddr_t)&lport)) &&
324 			debugging) {
325 		(void) fprintf(stderr, "portmap: svc_sendreply\n");
326 		if (doabort) {
327 			rpcbind_abort();
328 		}
329 	}
330 #ifdef RPCBIND_DEBUG
331 	if (debugging)
332 		fprintf(stderr, "port = %d\n", port);
333 #endif
334 	rpcbs_getaddr(RPCBVERS_2_STAT, reg.pm_prog, reg.pm_vers,
335 		reg.pm_prot == IPPROTO_UDP ? udptrans : tcptrans,
336 		port ? udptrans : "");
337 
338 	return (TRUE);
339 }
340 
341 /* ARGSUSED */
342 static bool_t
pmapproc_dump(struct svc_req * rqstp,SVCXPRT * xprt)343 pmapproc_dump(struct svc_req *rqstp, SVCXPRT *xprt)
344 {
345 	if (!svc_getargs(xprt, (xdrproc_t)xdr_void, NULL)) {
346 		svcerr_decode(xprt);
347 		return (FALSE);
348 	}
349 
350 	if (!check_access(xprt, PMAPPROC_DUMP, NULL, PMAPVERS)) {
351 		svcerr_weakauth(xprt);
352 		return FALSE;
353 	}
354 
355 	if ((!svc_sendreply(xprt, (xdrproc_t) xdr_pmaplist_ptr,
356 			(caddr_t)&list_pml)) && debugging) {
357 		if (debugging)
358 			(void) fprintf(stderr, "portmap: svc_sendreply\n");
359 		if (doabort) {
360 			rpcbind_abort();
361 		}
362 	}
363 	return (TRUE);
364 }
365 
366 #endif /* PORTMAP */
367