SUNRPC: rpcb_getport_sync() should use built-in hostname generator
[GitHub/moto-9609/android_kernel_motorola_exynos9610.git] / net / sunrpc / rpcb_clnt.c
1 /*
2 * In-kernel rpcbind client supporting versions 2, 3, and 4 of the rpcbind
3 * protocol
4 *
5 * Based on RFC 1833: "Binding Protocols for ONC RPC Version 2" and
6 * RFC 3530: "Network File System (NFS) version 4 Protocol"
7 *
8 * Original: Gilles Quillard, Bull Open Source, 2005 <gilles.quillard@bull.net>
9 * Updated: Chuck Lever, Oracle Corporation, 2007 <chuck.lever@oracle.com>
10 *
11 * Descended from net/sunrpc/pmap_clnt.c,
12 * Copyright (C) 1996, Olaf Kirch <okir@monad.swb.de>
13 */
14
15 #include <linux/module.h>
16
17 #include <linux/types.h>
18 #include <linux/socket.h>
19 #include <linux/in.h>
20 #include <linux/in6.h>
21 #include <linux/kernel.h>
22 #include <linux/errno.h>
23
24 #include <linux/sunrpc/clnt.h>
25 #include <linux/sunrpc/sched.h>
26 #include <linux/sunrpc/xprtsock.h>
27
28 #ifdef RPC_DEBUG
29 # define RPCDBG_FACILITY RPCDBG_BIND
30 #endif
31
32 #define RPCBIND_PROGRAM (100000u)
33 #define RPCBIND_PORT (111u)
34
35 enum {
36 RPCBPROC_NULL,
37 RPCBPROC_SET,
38 RPCBPROC_UNSET,
39 RPCBPROC_GETPORT,
40 RPCBPROC_GETADDR = 3, /* alias for GETPORT */
41 RPCBPROC_DUMP,
42 RPCBPROC_CALLIT,
43 RPCBPROC_BCAST = 5, /* alias for CALLIT */
44 RPCBPROC_GETTIME,
45 RPCBPROC_UADDR2TADDR,
46 RPCBPROC_TADDR2UADDR,
47 RPCBPROC_GETVERSADDR,
48 RPCBPROC_INDIRECT,
49 RPCBPROC_GETADDRLIST,
50 RPCBPROC_GETSTAT,
51 };
52
53 #define RPCB_HIGHPROC_2 RPCBPROC_CALLIT
54 #define RPCB_HIGHPROC_3 RPCBPROC_TADDR2UADDR
55 #define RPCB_HIGHPROC_4 RPCBPROC_GETSTAT
56
57 /*
58 * r_owner
59 *
60 * The "owner" is allowed to unset a service in the rpcbind database.
61 * We always use the following (arbitrary) fixed string.
62 */
63 #define RPCB_OWNER_STRING "rpcb"
64 #define RPCB_MAXOWNERLEN sizeof(RPCB_OWNER_STRING)
65
66 static void rpcb_getport_done(struct rpc_task *, void *);
67 static struct rpc_program rpcb_program;
68
69 struct rpcbind_args {
70 struct rpc_xprt * r_xprt;
71
72 u32 r_prog;
73 u32 r_vers;
74 u32 r_prot;
75 unsigned short r_port;
76 const char * r_netid;
77 const char * r_addr;
78 const char * r_owner;
79 };
80
81 static struct rpc_procinfo rpcb_procedures2[];
82 static struct rpc_procinfo rpcb_procedures3[];
83
84 struct rpcb_info {
85 int rpc_vers;
86 struct rpc_procinfo * rpc_proc;
87 };
88
89 static struct rpcb_info rpcb_next_version[];
90 static struct rpcb_info rpcb_next_version6[];
91
92 static void rpcb_map_release(void *data)
93 {
94 struct rpcbind_args *map = data;
95
96 xprt_put(map->r_xprt);
97 kfree(map);
98 }
99
100 static const struct rpc_call_ops rpcb_getport_ops = {
101 .rpc_call_done = rpcb_getport_done,
102 .rpc_release = rpcb_map_release,
103 };
104
105 static void rpcb_wake_rpcbind_waiters(struct rpc_xprt *xprt, int status)
106 {
107 xprt_clear_binding(xprt);
108 rpc_wake_up_status(&xprt->binding, status);
109 }
110
111 static struct rpc_clnt *rpcb_create(char *hostname, struct sockaddr *srvaddr,
112 size_t salen, int proto, u32 version,
113 int privileged)
114 {
115 struct rpc_create_args args = {
116 .protocol = proto,
117 .address = srvaddr,
118 .addrsize = salen,
119 .servername = hostname,
120 .program = &rpcb_program,
121 .version = version,
122 .authflavor = RPC_AUTH_UNIX,
123 .flags = (RPC_CLNT_CREATE_NOPING |
124 RPC_CLNT_CREATE_INTR),
125 };
126
127 switch (srvaddr->sa_family) {
128 case AF_INET:
129 ((struct sockaddr_in *)srvaddr)->sin_port = htons(RPCBIND_PORT);
130 break;
131 case AF_INET6:
132 ((struct sockaddr_in6 *)srvaddr)->sin6_port = htons(RPCBIND_PORT);
133 break;
134 default:
135 return NULL;
136 }
137
138 if (!privileged)
139 args.flags |= RPC_CLNT_CREATE_NONPRIVPORT;
140 return rpc_create(&args);
141 }
142
143 /**
144 * rpcb_register - set or unset a port registration with the local rpcbind svc
145 * @prog: RPC program number to bind
146 * @vers: RPC version number to bind
147 * @prot: transport protocol to use to make this request
148 * @port: port value to register
149 * @okay: result code
150 *
151 * port == 0 means unregister, port != 0 means register.
152 *
153 * This routine supports only rpcbind version 2.
154 */
155 int rpcb_register(u32 prog, u32 vers, int prot, unsigned short port, int *okay)
156 {
157 struct sockaddr_in sin = {
158 .sin_family = AF_INET,
159 .sin_addr.s_addr = htonl(INADDR_LOOPBACK),
160 };
161 struct rpcbind_args map = {
162 .r_prog = prog,
163 .r_vers = vers,
164 .r_prot = prot,
165 .r_port = port,
166 };
167 struct rpc_message msg = {
168 .rpc_proc = &rpcb_procedures2[port ?
169 RPCBPROC_SET : RPCBPROC_UNSET],
170 .rpc_argp = &map,
171 .rpc_resp = okay,
172 };
173 struct rpc_clnt *rpcb_clnt;
174 int error = 0;
175
176 dprintk("RPC: %sregistering (%u, %u, %d, %u) with local "
177 "rpcbind\n", (port ? "" : "un"),
178 prog, vers, prot, port);
179
180 rpcb_clnt = rpcb_create("localhost", (struct sockaddr *) &sin,
181 sizeof(sin), XPRT_TRANSPORT_UDP, 2, 1);
182 if (IS_ERR(rpcb_clnt))
183 return PTR_ERR(rpcb_clnt);
184
185 error = rpc_call_sync(rpcb_clnt, &msg, 0);
186
187 rpc_shutdown_client(rpcb_clnt);
188 if (error < 0)
189 printk(KERN_WARNING "RPC: failed to contact local rpcbind "
190 "server (errno %d).\n", -error);
191 dprintk("RPC: registration status %d/%d\n", error, *okay);
192
193 return error;
194 }
195
196 /**
197 * rpcb_getport_sync - obtain the port for an RPC service on a given host
198 * @sin: address of remote peer
199 * @prog: RPC program number to bind
200 * @vers: RPC version number to bind
201 * @prot: transport protocol to use to make this request
202 *
203 * Called from outside the RPC client in a synchronous task context.
204 * Uses default timeout parameters specified by underlying transport.
205 *
206 * XXX: Needs to support IPv6, and rpcbind versions 3 and 4
207 */
208 int rpcb_getport_sync(struct sockaddr_in *sin, __u32 prog,
209 __u32 vers, int prot)
210 {
211 struct rpcbind_args map = {
212 .r_prog = prog,
213 .r_vers = vers,
214 .r_prot = prot,
215 .r_port = 0,
216 };
217 struct rpc_message msg = {
218 .rpc_proc = &rpcb_procedures2[RPCBPROC_GETPORT],
219 .rpc_argp = &map,
220 .rpc_resp = &map.r_port,
221 };
222 struct rpc_clnt *rpcb_clnt;
223 int status;
224
225 dprintk("RPC: %s(" NIPQUAD_FMT ", %u, %u, %d)\n",
226 __FUNCTION__, NIPQUAD(sin->sin_addr.s_addr), prog, vers, prot);
227
228 rpcb_clnt = rpcb_create(NULL, (struct sockaddr *)sin,
229 sizeof(sin), prot, 2, 0);
230 if (IS_ERR(rpcb_clnt))
231 return PTR_ERR(rpcb_clnt);
232
233 status = rpc_call_sync(rpcb_clnt, &msg, 0);
234 rpc_shutdown_client(rpcb_clnt);
235
236 if (status >= 0) {
237 if (map.r_port != 0)
238 return map.r_port;
239 status = -EACCES;
240 }
241 return status;
242 }
243 EXPORT_SYMBOL_GPL(rpcb_getport_sync);
244
245 static struct rpc_task *rpcb_call_async(struct rpc_clnt *rpcb_clnt, struct rpcbind_args *map, int version)
246 {
247 struct rpc_message msg = {
248 .rpc_proc = rpcb_next_version[version].rpc_proc,
249 .rpc_argp = map,
250 .rpc_resp = &map->r_port,
251 };
252 struct rpc_task_setup task_setup_data = {
253 .rpc_client = rpcb_clnt,
254 .rpc_message = &msg,
255 .callback_ops = &rpcb_getport_ops,
256 .callback_data = map,
257 .flags = RPC_TASK_ASYNC,
258 };
259
260 return rpc_run_task(&task_setup_data);
261 }
262
263 /**
264 * rpcb_getport_async - obtain the port for a given RPC service on a given host
265 * @task: task that is waiting for portmapper request
266 *
267 * This one can be called for an ongoing RPC request, and can be used in
268 * an async (rpciod) context.
269 */
270 void rpcb_getport_async(struct rpc_task *task)
271 {
272 struct rpc_clnt *clnt = task->tk_client;
273 u32 bind_version;
274 struct rpc_xprt *xprt = task->tk_xprt;
275 struct rpc_clnt *rpcb_clnt;
276 static struct rpcbind_args *map;
277 struct rpc_task *child;
278 struct sockaddr_storage addr;
279 struct sockaddr *sap = (struct sockaddr *)&addr;
280 size_t salen;
281 int status;
282 struct rpcb_info *info;
283
284 dprintk("RPC: %5u %s(%s, %u, %u, %d)\n",
285 task->tk_pid, __FUNCTION__,
286 clnt->cl_server, clnt->cl_prog, clnt->cl_vers, xprt->prot);
287
288 /* Autobind on cloned rpc clients is discouraged */
289 BUG_ON(clnt->cl_parent != clnt);
290
291 if (xprt_test_and_set_binding(xprt)) {
292 status = -EAGAIN; /* tell caller to check again */
293 dprintk("RPC: %5u %s: waiting for another binder\n",
294 task->tk_pid, __FUNCTION__);
295 goto bailout_nowake;
296 }
297
298 /* Put self on queue before sending rpcbind request, in case
299 * rpcb_getport_done completes before we return from rpc_run_task */
300 rpc_sleep_on(&xprt->binding, task, NULL, NULL);
301
302 /* Someone else may have bound if we slept */
303 if (xprt_bound(xprt)) {
304 status = 0;
305 dprintk("RPC: %5u %s: already bound\n",
306 task->tk_pid, __FUNCTION__);
307 goto bailout_nofree;
308 }
309
310 salen = rpc_peeraddr(clnt, sap, sizeof(addr));
311
312 /* Don't ever use rpcbind v2 for AF_INET6 requests */
313 switch (sap->sa_family) {
314 case AF_INET:
315 info = rpcb_next_version;
316 break;
317 case AF_INET6:
318 info = rpcb_next_version6;
319 break;
320 default:
321 status = -EAFNOSUPPORT;
322 dprintk("RPC: %5u %s: bad address family\n",
323 task->tk_pid, __FUNCTION__);
324 goto bailout_nofree;
325 }
326 if (info[xprt->bind_index].rpc_proc == NULL) {
327 xprt->bind_index = 0;
328 status = -EPFNOSUPPORT;
329 dprintk("RPC: %5u %s: no more getport versions available\n",
330 task->tk_pid, __FUNCTION__);
331 goto bailout_nofree;
332 }
333 bind_version = info[xprt->bind_index].rpc_vers;
334
335 dprintk("RPC: %5u %s: trying rpcbind version %u\n",
336 task->tk_pid, __FUNCTION__, bind_version);
337
338 rpcb_clnt = rpcb_create(clnt->cl_server, sap, salen, xprt->prot,
339 bind_version, 0);
340 if (IS_ERR(rpcb_clnt)) {
341 status = PTR_ERR(rpcb_clnt);
342 dprintk("RPC: %5u %s: rpcb_create failed, error %ld\n",
343 task->tk_pid, __FUNCTION__, PTR_ERR(rpcb_clnt));
344 goto bailout_nofree;
345 }
346
347 map = kzalloc(sizeof(struct rpcbind_args), GFP_ATOMIC);
348 if (!map) {
349 status = -ENOMEM;
350 dprintk("RPC: %5u %s: no memory available\n",
351 task->tk_pid, __FUNCTION__);
352 goto bailout_nofree;
353 }
354 map->r_prog = clnt->cl_prog;
355 map->r_vers = clnt->cl_vers;
356 map->r_prot = xprt->prot;
357 map->r_port = 0;
358 map->r_xprt = xprt_get(xprt);
359 map->r_netid = rpc_peeraddr2str(clnt, RPC_DISPLAY_NETID);
360 map->r_addr = rpc_peeraddr2str(rpcb_clnt, RPC_DISPLAY_UNIVERSAL_ADDR);
361 map->r_owner = RPCB_OWNER_STRING; /* ignored for GETADDR */
362
363 child = rpcb_call_async(rpcb_clnt, map, xprt->bind_index);
364 rpc_release_client(rpcb_clnt);
365 if (IS_ERR(child)) {
366 status = -EIO;
367 dprintk("RPC: %5u %s: rpc_run_task failed\n",
368 task->tk_pid, __FUNCTION__);
369 goto bailout;
370 }
371 rpc_put_task(child);
372
373 task->tk_xprt->stat.bind_count++;
374 return;
375
376 bailout:
377 kfree(map);
378 xprt_put(xprt);
379 bailout_nofree:
380 rpcb_wake_rpcbind_waiters(xprt, status);
381 bailout_nowake:
382 task->tk_status = status;
383 }
384 EXPORT_SYMBOL_GPL(rpcb_getport_async);
385
386 /*
387 * Rpcbind child task calls this callback via tk_exit.
388 */
389 static void rpcb_getport_done(struct rpc_task *child, void *data)
390 {
391 struct rpcbind_args *map = data;
392 struct rpc_xprt *xprt = map->r_xprt;
393 int status = child->tk_status;
394
395 /* Garbage reply: retry with a lesser rpcbind version */
396 if (status == -EIO)
397 status = -EPROTONOSUPPORT;
398
399 /* rpcbind server doesn't support this rpcbind protocol version */
400 if (status == -EPROTONOSUPPORT)
401 xprt->bind_index++;
402
403 if (status < 0) {
404 /* rpcbind server not available on remote host? */
405 xprt->ops->set_port(xprt, 0);
406 } else if (map->r_port == 0) {
407 /* Requested RPC service wasn't registered on remote host */
408 xprt->ops->set_port(xprt, 0);
409 status = -EACCES;
410 } else {
411 /* Succeeded */
412 xprt->ops->set_port(xprt, map->r_port);
413 xprt_set_bound(xprt);
414 status = 0;
415 }
416
417 dprintk("RPC: %5u rpcb_getport_done(status %d, port %u)\n",
418 child->tk_pid, status, map->r_port);
419
420 rpcb_wake_rpcbind_waiters(xprt, status);
421 }
422
423 static int rpcb_encode_mapping(struct rpc_rqst *req, __be32 *p,
424 struct rpcbind_args *rpcb)
425 {
426 dprintk("RPC: rpcb_encode_mapping(%u, %u, %d, %u)\n",
427 rpcb->r_prog, rpcb->r_vers, rpcb->r_prot, rpcb->r_port);
428 *p++ = htonl(rpcb->r_prog);
429 *p++ = htonl(rpcb->r_vers);
430 *p++ = htonl(rpcb->r_prot);
431 *p++ = htonl(rpcb->r_port);
432
433 req->rq_slen = xdr_adjust_iovec(req->rq_svec, p);
434 return 0;
435 }
436
437 static int rpcb_decode_getport(struct rpc_rqst *req, __be32 *p,
438 unsigned short *portp)
439 {
440 *portp = (unsigned short) ntohl(*p++);
441 dprintk("RPC: rpcb_decode_getport result %u\n",
442 *portp);
443 return 0;
444 }
445
446 static int rpcb_decode_set(struct rpc_rqst *req, __be32 *p,
447 unsigned int *boolp)
448 {
449 *boolp = (unsigned int) ntohl(*p++);
450 dprintk("RPC: rpcb_decode_set result %u\n",
451 *boolp);
452 return 0;
453 }
454
455 static int rpcb_encode_getaddr(struct rpc_rqst *req, __be32 *p,
456 struct rpcbind_args *rpcb)
457 {
458 dprintk("RPC: rpcb_encode_getaddr(%u, %u, %s)\n",
459 rpcb->r_prog, rpcb->r_vers, rpcb->r_addr);
460 *p++ = htonl(rpcb->r_prog);
461 *p++ = htonl(rpcb->r_vers);
462
463 p = xdr_encode_string(p, rpcb->r_netid);
464 p = xdr_encode_string(p, rpcb->r_addr);
465 p = xdr_encode_string(p, rpcb->r_owner);
466
467 req->rq_slen = xdr_adjust_iovec(req->rq_svec, p);
468
469 return 0;
470 }
471
472 static int rpcb_decode_getaddr(struct rpc_rqst *req, __be32 *p,
473 unsigned short *portp)
474 {
475 char *addr;
476 u32 addr_len;
477 int c, i, f, first, val;
478
479 *portp = 0;
480 addr_len = ntohl(*p++);
481
482 /*
483 * Simple sanity check. The smallest possible universal
484 * address is an IPv4 address string containing 11 bytes.
485 */
486 if (addr_len < 11 || addr_len > RPCBIND_MAXUADDRLEN)
487 goto out_err;
488
489 /*
490 * Start at the end and walk backwards until the first dot
491 * is encountered. When the second dot is found, we have
492 * both parts of the port number.
493 */
494 addr = (char *)p;
495 val = 0;
496 first = 1;
497 f = 1;
498 for (i = addr_len - 1; i > 0; i--) {
499 c = addr[i];
500 if (c >= '0' && c <= '9') {
501 val += (c - '0') * f;
502 f *= 10;
503 } else if (c == '.') {
504 if (first) {
505 *portp = val;
506 val = first = 0;
507 f = 1;
508 } else {
509 *portp |= (val << 8);
510 break;
511 }
512 }
513 }
514
515 /*
516 * Simple sanity check. If we never saw a dot in the reply,
517 * then this was probably just garbage.
518 */
519 if (first)
520 goto out_err;
521
522 dprintk("RPC: rpcb_decode_getaddr port=%u\n", *portp);
523 return 0;
524
525 out_err:
526 dprintk("RPC: rpcbind server returned malformed reply\n");
527 return -EIO;
528 }
529
530 #define RPCB_program_sz (1u)
531 #define RPCB_version_sz (1u)
532 #define RPCB_protocol_sz (1u)
533 #define RPCB_port_sz (1u)
534 #define RPCB_boolean_sz (1u)
535
536 #define RPCB_netid_sz (1+XDR_QUADLEN(RPCBIND_MAXNETIDLEN))
537 #define RPCB_addr_sz (1+XDR_QUADLEN(RPCBIND_MAXUADDRLEN))
538 #define RPCB_ownerstring_sz (1+XDR_QUADLEN(RPCB_MAXOWNERLEN))
539
540 #define RPCB_mappingargs_sz RPCB_program_sz+RPCB_version_sz+ \
541 RPCB_protocol_sz+RPCB_port_sz
542 #define RPCB_getaddrargs_sz RPCB_program_sz+RPCB_version_sz+ \
543 RPCB_netid_sz+RPCB_addr_sz+ \
544 RPCB_ownerstring_sz
545
546 #define RPCB_setres_sz RPCB_boolean_sz
547 #define RPCB_getportres_sz RPCB_port_sz
548
549 /*
550 * Note that RFC 1833 does not put any size restrictions on the
551 * address string returned by the remote rpcbind database.
552 */
553 #define RPCB_getaddrres_sz RPCB_addr_sz
554
555 #define PROC(proc, argtype, restype) \
556 [RPCBPROC_##proc] = { \
557 .p_proc = RPCBPROC_##proc, \
558 .p_encode = (kxdrproc_t) rpcb_encode_##argtype, \
559 .p_decode = (kxdrproc_t) rpcb_decode_##restype, \
560 .p_arglen = RPCB_##argtype##args_sz, \
561 .p_replen = RPCB_##restype##res_sz, \
562 .p_statidx = RPCBPROC_##proc, \
563 .p_timer = 0, \
564 .p_name = #proc, \
565 }
566
567 /*
568 * Not all rpcbind procedures described in RFC 1833 are implemented
569 * since the Linux kernel RPC code requires only these.
570 */
571 static struct rpc_procinfo rpcb_procedures2[] = {
572 PROC(SET, mapping, set),
573 PROC(UNSET, mapping, set),
574 PROC(GETADDR, mapping, getport),
575 };
576
577 static struct rpc_procinfo rpcb_procedures3[] = {
578 PROC(SET, mapping, set),
579 PROC(UNSET, mapping, set),
580 PROC(GETADDR, getaddr, getaddr),
581 };
582
583 static struct rpc_procinfo rpcb_procedures4[] = {
584 PROC(SET, mapping, set),
585 PROC(UNSET, mapping, set),
586 PROC(GETVERSADDR, getaddr, getaddr),
587 };
588
589 static struct rpcb_info rpcb_next_version[] = {
590 #ifdef CONFIG_SUNRPC_BIND34
591 { 4, &rpcb_procedures4[RPCBPROC_GETVERSADDR] },
592 { 3, &rpcb_procedures3[RPCBPROC_GETADDR] },
593 #endif
594 { 2, &rpcb_procedures2[RPCBPROC_GETPORT] },
595 { 0, NULL },
596 };
597
598 static struct rpcb_info rpcb_next_version6[] = {
599 #ifdef CONFIG_SUNRPC_BIND34
600 { 4, &rpcb_procedures4[RPCBPROC_GETVERSADDR] },
601 { 3, &rpcb_procedures3[RPCBPROC_GETADDR] },
602 #endif
603 { 0, NULL },
604 };
605
606 static struct rpc_version rpcb_version2 = {
607 .number = 2,
608 .nrprocs = RPCB_HIGHPROC_2,
609 .procs = rpcb_procedures2
610 };
611
612 static struct rpc_version rpcb_version3 = {
613 .number = 3,
614 .nrprocs = RPCB_HIGHPROC_3,
615 .procs = rpcb_procedures3
616 };
617
618 static struct rpc_version rpcb_version4 = {
619 .number = 4,
620 .nrprocs = RPCB_HIGHPROC_4,
621 .procs = rpcb_procedures4
622 };
623
624 static struct rpc_version *rpcb_version[] = {
625 NULL,
626 NULL,
627 &rpcb_version2,
628 &rpcb_version3,
629 &rpcb_version4
630 };
631
632 static struct rpc_stat rpcb_stats;
633
634 static struct rpc_program rpcb_program = {
635 .name = "rpcbind",
636 .number = RPCBIND_PROGRAM,
637 .nrvers = ARRAY_SIZE(rpcb_version),
638 .version = rpcb_version,
639 .stats = &rpcb_stats,
640 };