1 /* @(#)pmap_rmt.c 2.2 88/08/01 4.0 RPCSRC */ 2 /* 3 * Copyright (c) 2010, Oracle America, Inc. 4 * 5 * All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions are met: 9 * 10 * * Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 13 * * Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in 15 * the documentation and/or other materials provided with the 16 * distribution. 17 * 18 * * Neither the name of the "Oracle America, Inc." nor the names of 19 * its contributors may be used to endorse or promote products 20 * derived from this software without specific prior written permission. 21 * 22 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS 23 * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 24 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A 25 * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 26 * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 27 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED 28 * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 29 * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 30 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 31 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 32 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 33 */ 34 #if !defined(lint) && defined(SCCSIDS) 35 static char sccsid[] = "@(#)pmap_rmt.c 1.21 87/08/27 Copyr 1984 Sun Micro"; 36 #endif 37 38 /* 39 * pmap_rmt.c 40 * Client interface to pmap rpc service. 41 * remote call and broadcast service 42 */ 43 44 #include "k5-platform.h" 45 #include <unistd.h> 46 #include <gssrpc/rpc.h> 47 #include <gssrpc/pmap_prot.h> 48 #include <gssrpc/pmap_clnt.h> 49 #include <gssrpc/pmap_rmt.h> 50 #include <sys/socket.h> 51 #ifdef sun 52 #include <sys/sockio.h> 53 #endif 54 #ifdef OSF1 55 #include <net/route.h> 56 #include <sys/mbuf.h> 57 #endif 58 #include <net/if.h> 59 #include <sys/ioctl.h> 60 #include <arpa/inet.h> 61 #define MAX_BROADCAST_SIZE 1400 62 #include <port-sockets.h> 63 #include "socket-utils.h" 64 65 static struct timeval timeout = { 3, 0 }; 66 67 #ifndef GETSOCKNAME_ARG3_TYPE 68 #define GETSOCKNAME_ARG3_TYPE int 69 #endif 70 71 /* 72 * pmapper remote-call-service interface. 73 * This routine is used to call the pmapper remote call service 74 * which will look up a service program in the port maps, and then 75 * remotely call that routine with the given parameters. This allows 76 * programs to do a lookup and call in one step. 77 */ 78 enum clnt_stat 79 pmap_rmtcall( 80 struct sockaddr_in *addr, 81 rpcprog_t prog, 82 rpcvers_t vers, 83 rpcproc_t proc, 84 xdrproc_t xdrargs, 85 caddr_t argsp, 86 xdrproc_t xdrres, 87 caddr_t resp, 88 struct timeval tout, 89 rpcport_t *port_ptr) 90 { 91 SOCKET sock = INVALID_SOCKET; 92 CLIENT *client; 93 struct rmtcallargs a; 94 struct rmtcallres r; 95 enum clnt_stat stat; 96 97 addr->sin_port = htons(PMAPPORT); 98 client = clntudp_create(addr, PMAPPROG, PMAPVERS, timeout, &sock); 99 if (client != (CLIENT *)NULL) { 100 a.prog = prog; 101 a.vers = vers; 102 a.proc = proc; 103 a.args_ptr = argsp; 104 a.xdr_args = xdrargs; 105 r.port_ptr = port_ptr; 106 r.results_ptr = resp; 107 r.xdr_results = xdrres; 108 stat = CLNT_CALL(client, PMAPPROC_CALLIT, xdr_rmtcall_args, &a, 109 xdr_rmtcallres, &r, tout); 110 CLNT_DESTROY(client); 111 } else { 112 stat = RPC_FAILED; 113 } 114 (void)closesocket(sock); 115 addr->sin_port = 0; 116 return (stat); 117 } 118 119 120 /* 121 * XDR remote call arguments 122 * written for XDR_ENCODE direction only 123 */ 124 bool_t 125 xdr_rmtcall_args( 126 XDR *xdrs, 127 struct rmtcallargs *cap) 128 { 129 u_int lenposition, argposition, position; 130 131 if (xdr_u_int32(xdrs, &(cap->prog)) && 132 xdr_u_int32(xdrs, &(cap->vers)) && 133 xdr_u_int32(xdrs, &(cap->proc))) { 134 lenposition = XDR_GETPOS(xdrs); 135 if (! xdr_u_int32(xdrs, &(cap->arglen))) 136 return (FALSE); 137 argposition = XDR_GETPOS(xdrs); 138 if (! (*(cap->xdr_args))(xdrs, cap->args_ptr)) 139 return (FALSE); 140 position = XDR_GETPOS(xdrs); 141 cap->arglen = (uint32_t)position - (uint32_t)argposition; 142 XDR_SETPOS(xdrs, lenposition); 143 if (! xdr_u_int32(xdrs, &(cap->arglen))) 144 return (FALSE); 145 XDR_SETPOS(xdrs, position); 146 return (TRUE); 147 } 148 return (FALSE); 149 } 150 151 /* 152 * XDR remote call results 153 * written for XDR_DECODE direction only 154 */ 155 bool_t 156 xdr_rmtcallres( 157 XDR *xdrs, 158 struct rmtcallres *crp) 159 { 160 caddr_t port_ptr; 161 162 port_ptr = (caddr_t)(void *)crp->port_ptr; 163 if (xdr_reference(xdrs, &port_ptr, sizeof (uint32_t), 164 xdr_u_int32) && xdr_u_int32(xdrs, &crp->resultslen)) { 165 crp->port_ptr = (uint32_t *)(void *)port_ptr; 166 return ((*(crp->xdr_results))(xdrs, crp->results_ptr)); 167 } 168 return (FALSE); 169 } 170 171 172 /* 173 * The following is kludged-up support for simple rpc broadcasts. 174 * Someday a large, complicated system will replace these trivial 175 * routines which only support udp/ip . 176 */ 177 178 #define GIFCONF_BUFSIZE (256 * sizeof (struct ifconf)) 179 180 static int 181 getbroadcastnets( 182 struct in_addr *addrs, 183 int sock, /* any valid socket will do */ 184 char *buf /* why allocxate more when we can use existing... */ 185 ) 186 { 187 struct ifconf ifc; 188 struct ifreq ifreq, *ifr; 189 int n, i; 190 191 ifc.ifc_len = GIFCONF_BUFSIZE; 192 ifc.ifc_buf = buf; 193 memset (buf, 0, GIFCONF_BUFSIZE); 194 if (ioctl(sock, SIOCGIFCONF, (char *)&ifc) < 0) { 195 perror("broadcast: ioctl (get interface configuration)"); 196 return (0); 197 } 198 ifr = ifc.ifc_req; 199 for (i = 0, n = ifc.ifc_len/sizeof (struct ifreq); n > 0; n--, ifr++) { 200 ifreq = *ifr; 201 if (ioctl(sock, SIOCGIFFLAGS, (char *)&ifreq) < 0) { 202 perror("broadcast: ioctl (get interface flags)"); 203 continue; 204 } 205 if ((ifreq.ifr_flags & IFF_BROADCAST) && 206 (ifreq.ifr_flags & IFF_UP) && 207 ifr->ifr_addr.sa_family == AF_INET) { 208 #ifdef SIOCGIFBRDADDR /* 4.3BSD */ 209 if (ioctl(sock, SIOCGIFBRDADDR, (char *)&ifreq) < 0) { 210 addrs[i++].s_addr = INADDR_ANY; 211 } else { 212 addrs[i++] = sa2sin(&ifreq.ifr_addr)->sin_addr; 213 } 214 #else /* 4.2 BSD */ 215 struct sockaddr_in *sockin; 216 sockin = sa2sin(&ifr->ifr_addr); 217 addrs[i++] = inet_makeaddr(inet_netof 218 (sockin->sin_addr.s_addr), INADDR_ANY); 219 #endif 220 } 221 } 222 return (i); 223 } 224 225 enum clnt_stat 226 clnt_broadcast( 227 rpcprog_t prog, /* program number */ 228 rpcvers_t vers, /* version number */ 229 rpcproc_t proc, /* procedure number */ 230 xdrproc_t xargs, /* xdr routine for args */ 231 caddr_t argsp, /* pointer to args */ 232 xdrproc_t xresults, /* xdr routine for results */ 233 caddr_t resultsp, /* pointer to results */ 234 resultproc_t eachresult /* call with each result obtained */ 235 ) 236 { 237 enum clnt_stat stat; 238 AUTH *unix_auth = authunix_create_default(); 239 XDR xdr_stream; 240 XDR *xdrs = &xdr_stream; 241 int outlen, nets; 242 ssize_t inlen; 243 GETSOCKNAME_ARG3_TYPE fromlen; 244 SOCKET sock; 245 int on = 1; 246 #ifdef FD_SETSIZE 247 fd_set mask; 248 fd_set readfds; 249 #else 250 int readfds; 251 int mask; 252 #endif /* def FD_SETSIZE */ 253 int i; 254 bool_t done = FALSE; 255 uint32_t xid; 256 rpcport_t port; 257 struct in_addr addrs[20]; 258 struct sockaddr_in baddr, raddr; /* broadcast and response addresses */ 259 struct rmtcallargs a; 260 struct rmtcallres r; 261 struct rpc_msg msg; 262 struct timeval t, t2; 263 char outbuf[MAX_BROADCAST_SIZE]; 264 #ifndef MAX 265 #define MAX(A,B) ((A)<(B)?(B):(A)) 266 #endif 267 char inbuf[MAX (UDPMSGSIZE, GIFCONF_BUFSIZE)]; 268 269 /* 270 * initialization: create a socket, a broadcast address, and 271 * preserialize the arguments into a send buffer. 272 */ 273 if ((sock = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0) { 274 perror("Cannot create socket for broadcast rpc"); 275 stat = RPC_CANTSEND; 276 goto done_broad; 277 } 278 set_cloexec_fd(sock); 279 #ifdef SO_BROADCAST 280 if (setsockopt(sock, SOL_SOCKET, SO_BROADCAST, (char *) &on, 281 sizeof (on)) < 0) { 282 perror("Cannot set socket option SO_BROADCAST"); 283 stat = RPC_CANTSEND; 284 goto done_broad; 285 } 286 #endif /* def SO_BROADCAST */ 287 #ifdef FD_SETSIZE 288 FD_ZERO(&mask); 289 FD_SET(sock, &mask); 290 #else 291 mask = (1 << sock); 292 #endif /* def FD_SETSIZE */ 293 nets = getbroadcastnets(addrs, sock, inbuf); 294 memset(&baddr, 0, sizeof (baddr)); 295 baddr.sin_family = AF_INET; 296 baddr.sin_port = htons(PMAPPORT); 297 baddr.sin_addr.s_addr = htonl(INADDR_ANY); 298 /* baddr.sin_addr.S_un.S_addr = htonl(INADDR_ANY); */ 299 (void)gettimeofday(&t, (struct timezone *)0); 300 msg.rm_xid = xid = getpid() ^ t.tv_sec ^ t.tv_usec; 301 t.tv_usec = 0; 302 msg.rm_direction = CALL; 303 msg.rm_call.cb_rpcvers = RPC_MSG_VERSION; 304 msg.rm_call.cb_prog = PMAPPROG; 305 msg.rm_call.cb_vers = PMAPVERS; 306 msg.rm_call.cb_proc = PMAPPROC_CALLIT; 307 msg.rm_call.cb_cred = unix_auth->ah_cred; 308 msg.rm_call.cb_verf = unix_auth->ah_verf; 309 a.prog = prog; 310 a.vers = vers; 311 a.proc = proc; 312 a.xdr_args = xargs; 313 a.args_ptr = argsp; 314 r.port_ptr = &port; 315 r.xdr_results = xresults; 316 r.results_ptr = resultsp; 317 xdrmem_create(xdrs, outbuf, MAX_BROADCAST_SIZE, XDR_ENCODE); 318 if ((! xdr_callmsg(xdrs, &msg)) || (! xdr_rmtcall_args(xdrs, &a))) { 319 stat = RPC_CANTENCODEARGS; 320 goto done_broad; 321 } 322 outlen = (int)xdr_getpos(xdrs); 323 xdr_destroy(xdrs); 324 /* 325 * Basic loop: broadcast a packet and wait a while for response(s). 326 * The response timeout grows larger per iteration. 327 */ 328 for (t.tv_sec = 4; t.tv_sec <= 14; t.tv_sec += 2) { 329 for (i = 0; i < nets; i++) { 330 baddr.sin_addr = addrs[i]; 331 if (sendto(sock, outbuf, outlen, 0, 332 (struct sockaddr *)&baddr, 333 sizeof (struct sockaddr)) != outlen) { 334 perror("Cannot send broadcast packet"); 335 stat = RPC_CANTSEND; 336 goto done_broad; 337 } 338 } 339 if (eachresult == NULL) { 340 stat = RPC_SUCCESS; 341 goto done_broad; 342 } 343 recv_again: 344 msg.acpted_rply.ar_verf = gssrpc__null_auth; 345 msg.acpted_rply.ar_results.where = (caddr_t)&r; 346 msg.acpted_rply.ar_results.proc = xdr_rmtcallres; 347 readfds = mask; 348 t2 = t; 349 switch (select(gssrpc__rpc_dtablesize(), &readfds, (fd_set *)NULL, 350 (fd_set *)NULL, &t2)) { 351 352 case 0: /* timed out */ 353 stat = RPC_TIMEDOUT; 354 continue; 355 356 case -1: /* some kind of error */ 357 if (errno == EINTR) 358 goto recv_again; 359 perror("Broadcast select problem"); 360 stat = RPC_CANTRECV; 361 goto done_broad; 362 363 } /* end of select results switch */ 364 try_again: 365 fromlen = sizeof(struct sockaddr); 366 inlen = recvfrom(sock, inbuf, UDPMSGSIZE, 0, 367 (struct sockaddr *)&raddr, &fromlen); 368 if (inlen < 0) { 369 if (errno == EINTR) 370 goto try_again; 371 perror("Cannot receive reply to broadcast"); 372 stat = RPC_CANTRECV; 373 goto done_broad; 374 } 375 if ((size_t)inlen < sizeof(uint32_t)) 376 goto recv_again; 377 /* 378 * see if reply transaction id matches sent id. 379 * If so, decode the results. 380 */ 381 xdrmem_create(xdrs, inbuf, (u_int)inlen, XDR_DECODE); 382 if (xdr_replymsg(xdrs, &msg)) { 383 if ((msg.rm_xid == xid) && 384 (msg.rm_reply.rp_stat == MSG_ACCEPTED) && 385 (msg.acpted_rply.ar_stat == SUCCESS)) { 386 raddr.sin_port = htons((u_short)port); 387 done = (*eachresult)(resultsp, &raddr); 388 } 389 /* otherwise, we just ignore the errors ... */ 390 } else { 391 #ifdef notdef 392 /* some kind of deserialization problem ... */ 393 if (msg.rm_xid == xid) 394 fprintf(stderr, "Broadcast deserialization problem"); 395 /* otherwise, just random garbage */ 396 #endif 397 } 398 xdrs->x_op = XDR_FREE; 399 msg.acpted_rply.ar_results.proc = xdr_void; 400 (void)xdr_replymsg(xdrs, &msg); 401 (void)(*xresults)(xdrs, resultsp); 402 xdr_destroy(xdrs); 403 if (done) { 404 stat = RPC_SUCCESS; 405 goto done_broad; 406 } else { 407 goto recv_again; 408 } 409 } 410 done_broad: 411 (void)closesocket(sock); 412 AUTH_DESTROY(unix_auth); 413 return (stat); 414 } 415