18360efbdSAlfred Perlstein /* $NetBSD: clnt_bcast.c,v 1.3 2000/07/06 03:05:20 christos Exp $ */ 28360efbdSAlfred Perlstein 32e322d37SHiroki Sato /*- 42e322d37SHiroki Sato * Copyright (c) 2009, Sun Microsystems, Inc. 52e322d37SHiroki Sato * All rights reserved. 68360efbdSAlfred Perlstein * 72e322d37SHiroki Sato * Redistribution and use in source and binary forms, with or without 82e322d37SHiroki Sato * modification, are permitted provided that the following conditions are met: 92e322d37SHiroki Sato * - Redistributions of source code must retain the above copyright notice, 102e322d37SHiroki Sato * this list of conditions and the following disclaimer. 112e322d37SHiroki Sato * - Redistributions in binary form must reproduce the above copyright notice, 122e322d37SHiroki Sato * this list of conditions and the following disclaimer in the documentation 132e322d37SHiroki Sato * and/or other materials provided with the distribution. 142e322d37SHiroki Sato * - Neither the name of Sun Microsystems, Inc. nor the names of its 152e322d37SHiroki Sato * contributors may be used to endorse or promote products derived 162e322d37SHiroki Sato * from this software without specific prior written permission. 178360efbdSAlfred Perlstein * 182e322d37SHiroki Sato * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 192e322d37SHiroki Sato * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 202e322d37SHiroki Sato * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 212e322d37SHiroki Sato * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 222e322d37SHiroki Sato * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 232e322d37SHiroki Sato * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 242e322d37SHiroki Sato * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 252e322d37SHiroki Sato * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 262e322d37SHiroki Sato * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 272e322d37SHiroki Sato * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 282e322d37SHiroki Sato * POSSIBILITY OF SUCH DAMAGE. 298360efbdSAlfred Perlstein */ 308360efbdSAlfred Perlstein /* 318360efbdSAlfred Perlstein * Copyright (c) 1986-1991 by Sun Microsystems Inc. 328360efbdSAlfred Perlstein */ 338360efbdSAlfred Perlstein 34a986ef57SDavid E. O'Brien #if defined(LIBC_SCCS) && !defined(lint) 35a986ef57SDavid E. O'Brien #ident "@(#)clnt_bcast.c 1.18 94/05/03 SMI" 368360efbdSAlfred Perlstein static char sccsid[] = "@(#)clnt_bcast.c 1.15 89/04/21 Copyr 1988 Sun Micro"; 378360efbdSAlfred Perlstein #endif 38d3d20c82SDavid E. O'Brien #include <sys/cdefs.h> 39d3d20c82SDavid E. O'Brien __FBSDID("$FreeBSD$"); 408360efbdSAlfred Perlstein 418360efbdSAlfred Perlstein 428360efbdSAlfred Perlstein /* 438360efbdSAlfred Perlstein * clnt_bcast.c 448360efbdSAlfred Perlstein * Client interface to broadcast service. 458360efbdSAlfred Perlstein * 468360efbdSAlfred Perlstein * Copyright (C) 1988, Sun Microsystems, Inc. 478360efbdSAlfred Perlstein * 488360efbdSAlfred Perlstein * The following is kludged-up support for simple rpc broadcasts. 498360efbdSAlfred Perlstein * Someday a large, complicated system will replace these routines. 508360efbdSAlfred Perlstein */ 518360efbdSAlfred Perlstein 528360efbdSAlfred Perlstein #include "namespace.h" 538360efbdSAlfred Perlstein #include <sys/types.h> 548360efbdSAlfred Perlstein #include <sys/socket.h> 558360efbdSAlfred Perlstein #include <sys/queue.h> 568360efbdSAlfred Perlstein #include <net/if.h> 578360efbdSAlfred Perlstein #include <netinet/in.h> 588360efbdSAlfred Perlstein #include <ifaddrs.h> 598360efbdSAlfred Perlstein #include <sys/poll.h> 608360efbdSAlfred Perlstein #include <rpc/rpc.h> 618360efbdSAlfred Perlstein #ifdef PORTMAP 628360efbdSAlfred Perlstein #include <rpc/pmap_prot.h> 638360efbdSAlfred Perlstein #include <rpc/pmap_clnt.h> 648360efbdSAlfred Perlstein #include <rpc/pmap_rmt.h> 658360efbdSAlfred Perlstein #endif /* PORTMAP */ 668360efbdSAlfred Perlstein #include <rpc/nettype.h> 678360efbdSAlfred Perlstein #include <arpa/inet.h> 688360efbdSAlfred Perlstein #ifdef RPC_DEBUG 698360efbdSAlfred Perlstein #include <stdio.h> 708360efbdSAlfred Perlstein #endif 718360efbdSAlfred Perlstein #include <errno.h> 728360efbdSAlfred Perlstein #include <stdlib.h> 738360efbdSAlfred Perlstein #include <unistd.h> 748360efbdSAlfred Perlstein #include <netdb.h> 758360efbdSAlfred Perlstein #include <err.h> 768360efbdSAlfred Perlstein #include <string.h> 778360efbdSAlfred Perlstein #include "un-namespace.h" 788360efbdSAlfred Perlstein 798360efbdSAlfred Perlstein #include "rpc_com.h" 808360efbdSAlfred Perlstein 818360efbdSAlfred Perlstein #define MAXBCAST 20 /* Max no of broadcasting transports */ 828360efbdSAlfred Perlstein #define INITTIME 4000 /* Time to wait initially */ 838360efbdSAlfred Perlstein #define WAITTIME 8000 /* Maximum time to wait */ 848360efbdSAlfred Perlstein 858360efbdSAlfred Perlstein /* 868360efbdSAlfred Perlstein * If nettype is NULL, it broadcasts on all the available 878360efbdSAlfred Perlstein * datagram_n transports. May potentially lead to broadacst storms 888360efbdSAlfred Perlstein * and hence should be used with caution, care and courage. 898360efbdSAlfred Perlstein * 908360efbdSAlfred Perlstein * The current parameter xdr packet size is limited by the max tsdu 918360efbdSAlfred Perlstein * size of the transport. If the max tsdu size of any transport is 928360efbdSAlfred Perlstein * smaller than the parameter xdr packet, then broadcast is not 938360efbdSAlfred Perlstein * sent on that transport. 948360efbdSAlfred Perlstein * 958360efbdSAlfred Perlstein * Also, the packet size should be less the packet size of 968360efbdSAlfred Perlstein * the data link layer (for ethernet it is 1400 bytes). There is 978360efbdSAlfred Perlstein * no easy way to find out the max size of the data link layer and 988360efbdSAlfred Perlstein * we are assuming that the args would be smaller than that. 998360efbdSAlfred Perlstein * 1008360efbdSAlfred Perlstein * The result size has to be smaller than the transport tsdu size. 1018360efbdSAlfred Perlstein * 1028360efbdSAlfred Perlstein * If PORTMAP has been defined, we send two packets for UDP, one for 1038360efbdSAlfred Perlstein * rpcbind and one for portmap. For those machines which support 1048360efbdSAlfred Perlstein * both rpcbind and portmap, it will cause them to reply twice, and 1058360efbdSAlfred Perlstein * also here it will get two responses ... inefficient and clumsy. 1068360efbdSAlfred Perlstein */ 1078360efbdSAlfred Perlstein 1088360efbdSAlfred Perlstein struct broadif { 1098360efbdSAlfred Perlstein int index; 1108360efbdSAlfred Perlstein struct sockaddr_storage broadaddr; 1118360efbdSAlfred Perlstein TAILQ_ENTRY(broadif) link; 1128360efbdSAlfred Perlstein }; 1138360efbdSAlfred Perlstein 1148360efbdSAlfred Perlstein typedef TAILQ_HEAD(, broadif) broadlist_t; 1158360efbdSAlfred Perlstein 116c05ac53bSDavid E. O'Brien int __rpc_getbroadifs(int, int, int, broadlist_t *); 117c05ac53bSDavid E. O'Brien void __rpc_freebroadifs(broadlist_t *); 118c05ac53bSDavid E. O'Brien int __rpc_broadenable(int, int, struct broadif *); 1198360efbdSAlfred Perlstein 1208360efbdSAlfred Perlstein int __rpc_lowvers = 0; 1218360efbdSAlfred Perlstein 1228360efbdSAlfred Perlstein int 1238360efbdSAlfred Perlstein __rpc_getbroadifs(int af, int proto, int socktype, broadlist_t *list) 1248360efbdSAlfred Perlstein { 1258360efbdSAlfred Perlstein int count = 0; 1268360efbdSAlfred Perlstein struct broadif *bip; 1278360efbdSAlfred Perlstein struct ifaddrs *ifap, *ifp; 1288360efbdSAlfred Perlstein #ifdef INET6 1298360efbdSAlfred Perlstein struct sockaddr_in6 *sin6; 1308360efbdSAlfred Perlstein #endif 1318360efbdSAlfred Perlstein struct sockaddr_in *sin; 1328360efbdSAlfred Perlstein struct addrinfo hints, *res; 1338360efbdSAlfred Perlstein 1348360efbdSAlfred Perlstein if (getifaddrs(&ifp) < 0) 1358360efbdSAlfred Perlstein return 0; 1368360efbdSAlfred Perlstein 1378360efbdSAlfred Perlstein memset(&hints, 0, sizeof hints); 1388360efbdSAlfred Perlstein 1398360efbdSAlfred Perlstein hints.ai_family = af; 1408360efbdSAlfred Perlstein hints.ai_protocol = proto; 1418360efbdSAlfred Perlstein hints.ai_socktype = socktype; 1428360efbdSAlfred Perlstein 143e0c69338SMartin Blapp if (getaddrinfo(NULL, "sunrpc", &hints, &res) != 0) { 144e0c69338SMartin Blapp freeifaddrs(ifp); 1458360efbdSAlfred Perlstein return 0; 146e0c69338SMartin Blapp } 1478360efbdSAlfred Perlstein 1488360efbdSAlfred Perlstein for (ifap = ifp; ifap != NULL; ifap = ifap->ifa_next) { 1498360efbdSAlfred Perlstein if (ifap->ifa_addr->sa_family != af || 1508360efbdSAlfred Perlstein !(ifap->ifa_flags & IFF_UP)) 1518360efbdSAlfred Perlstein continue; 1528360efbdSAlfred Perlstein bip = (struct broadif *)malloc(sizeof *bip); 1538360efbdSAlfred Perlstein if (bip == NULL) 1548360efbdSAlfred Perlstein break; 1558360efbdSAlfred Perlstein bip->index = if_nametoindex(ifap->ifa_name); 15633e0ae48SMartin Blapp if ( 1578360efbdSAlfred Perlstein #ifdef INET6 15833e0ae48SMartin Blapp af != AF_INET6 && 1598360efbdSAlfred Perlstein #endif 16033e0ae48SMartin Blapp (ifap->ifa_flags & IFF_BROADCAST) && 16133e0ae48SMartin Blapp ifap->ifa_broadaddr) { 1628360efbdSAlfred Perlstein memcpy(&bip->broadaddr, ifap->ifa_broadaddr, 1638360efbdSAlfred Perlstein (size_t)ifap->ifa_broadaddr->sa_len); 1648360efbdSAlfred Perlstein sin = (struct sockaddr_in *)(void *)&bip->broadaddr; 1658360efbdSAlfred Perlstein sin->sin_port = 1668360efbdSAlfred Perlstein ((struct sockaddr_in *) 1678360efbdSAlfred Perlstein (void *)res->ai_addr)->sin_port; 16833e0ae48SMartin Blapp } else 1698360efbdSAlfred Perlstein #ifdef INET6 17033e0ae48SMartin Blapp if (af == AF_INET6 && (ifap->ifa_flags & IFF_MULTICAST)) { 1718360efbdSAlfred Perlstein sin6 = (struct sockaddr_in6 *)(void *)&bip->broadaddr; 1728360efbdSAlfred Perlstein inet_pton(af, RPCB_MULTICAST_ADDR, &sin6->sin6_addr); 1738360efbdSAlfred Perlstein sin6->sin6_family = af; 1748360efbdSAlfred Perlstein sin6->sin6_len = sizeof *sin6; 1758360efbdSAlfred Perlstein sin6->sin6_port = 1768360efbdSAlfred Perlstein ((struct sockaddr_in6 *) 1778360efbdSAlfred Perlstein (void *)res->ai_addr)->sin6_port; 1788360efbdSAlfred Perlstein sin6->sin6_scope_id = bip->index; 17933e0ae48SMartin Blapp } else 1808360efbdSAlfred Perlstein #endif 18133e0ae48SMartin Blapp { 18233e0ae48SMartin Blapp free(bip); 18333e0ae48SMartin Blapp continue; 1848360efbdSAlfred Perlstein } 1858360efbdSAlfred Perlstein TAILQ_INSERT_TAIL(list, bip, link); 1868360efbdSAlfred Perlstein count++; 1878360efbdSAlfred Perlstein } 1888360efbdSAlfred Perlstein freeifaddrs(ifp); 1898360efbdSAlfred Perlstein freeaddrinfo(res); 1908360efbdSAlfred Perlstein 1918360efbdSAlfred Perlstein return count; 1928360efbdSAlfred Perlstein } 1938360efbdSAlfred Perlstein 1948360efbdSAlfred Perlstein void 1958360efbdSAlfred Perlstein __rpc_freebroadifs(broadlist_t *list) 1968360efbdSAlfred Perlstein { 1978360efbdSAlfred Perlstein struct broadif *bip, *next; 1988360efbdSAlfred Perlstein 1998360efbdSAlfred Perlstein bip = TAILQ_FIRST(list); 2008360efbdSAlfred Perlstein 2018360efbdSAlfred Perlstein while (bip != NULL) { 2028360efbdSAlfred Perlstein next = TAILQ_NEXT(bip, link); 2038360efbdSAlfred Perlstein free(bip); 2048360efbdSAlfred Perlstein bip = next; 2058360efbdSAlfred Perlstein } 2068360efbdSAlfred Perlstein } 2078360efbdSAlfred Perlstein 2088360efbdSAlfred Perlstein int 2098360efbdSAlfred Perlstein /*ARGSUSED*/ 2108360efbdSAlfred Perlstein __rpc_broadenable(int af, int s, struct broadif *bip) 2118360efbdSAlfred Perlstein { 2128360efbdSAlfred Perlstein int o = 1; 2138360efbdSAlfred Perlstein 2148360efbdSAlfred Perlstein #if 0 2158360efbdSAlfred Perlstein if (af == AF_INET6) { 2168360efbdSAlfred Perlstein fprintf(stderr, "set v6 multicast if to %d\n", bip->index); 2178360efbdSAlfred Perlstein if (_setsockopt(s, IPPROTO_IPV6, IPV6_MULTICAST_IF, &bip->index, 2188360efbdSAlfred Perlstein sizeof bip->index) < 0) 2198360efbdSAlfred Perlstein return -1; 2208360efbdSAlfred Perlstein } else 2218360efbdSAlfred Perlstein #endif 2228360efbdSAlfred Perlstein if (_setsockopt(s, SOL_SOCKET, SO_BROADCAST, &o, sizeof o) < 0) 2238360efbdSAlfred Perlstein return -1; 2248360efbdSAlfred Perlstein 2258360efbdSAlfred Perlstein return 0; 2268360efbdSAlfred Perlstein } 2278360efbdSAlfred Perlstein 228*587cf682SCraig Rodrigues /* 229*587cf682SCraig Rodrigues * rpc_broadcast_exp() 230*587cf682SCraig Rodrigues * 231*587cf682SCraig Rodrigues * prog - program number 232*587cf682SCraig Rodrigues * vers - version number 233*587cf682SCraig Rodrigues * proc - procedure number 234*587cf682SCraig Rodrigues * xargs - xdr routine for args 235*587cf682SCraig Rodrigues * argsp - pointer to args 236*587cf682SCraig Rodrigues * xresults - xdr routine for results 237*587cf682SCraig Rodrigues * resultsp - pointer to results 238*587cf682SCraig Rodrigues * eachresult - call with each result obtained 239*587cf682SCraig Rodrigues * inittime - how long to wait initially 240*587cf682SCraig Rodrigues * waittime - maximum time to wait 241*587cf682SCraig Rodrigues * nettype - transport type 242*587cf682SCraig Rodrigues */ 2438360efbdSAlfred Perlstein enum clnt_stat 244*587cf682SCraig Rodrigues rpc_broadcast_exp(rpcprog_t prog, rpcvers_t vers, rpcproc_t proc, 245*587cf682SCraig Rodrigues xdrproc_t xargs, caddr_t argsp, xdrproc_t xresults, caddr_t resultsp, 246*587cf682SCraig Rodrigues resultproc_t eachresult, int inittime, int waittime, 247*587cf682SCraig Rodrigues const char *nettype) 2488360efbdSAlfred Perlstein { 2498360efbdSAlfred Perlstein enum clnt_stat stat = RPC_SUCCESS; /* Return status */ 2508360efbdSAlfred Perlstein XDR xdr_stream; /* XDR stream */ 2518360efbdSAlfred Perlstein XDR *xdrs = &xdr_stream; 2528360efbdSAlfred Perlstein struct rpc_msg msg; /* RPC message */ 2538360efbdSAlfred Perlstein struct timeval t; 2548360efbdSAlfred Perlstein char *outbuf = NULL; /* Broadcast msg buffer */ 2558360efbdSAlfred Perlstein char *inbuf = NULL; /* Reply buf */ 2568360efbdSAlfred Perlstein int inlen; 2578360efbdSAlfred Perlstein u_int maxbufsize = 0; 2588360efbdSAlfred Perlstein AUTH *sys_auth = authunix_create_default(); 2595dfef001SCraig Rodrigues u_int i; 2608360efbdSAlfred Perlstein void *handle; 2618360efbdSAlfred Perlstein char uaddress[1024]; /* A self imposed limit */ 2628360efbdSAlfred Perlstein char *uaddrp = uaddress; 2638360efbdSAlfred Perlstein int pmap_reply_flag; /* reply recvd from PORTMAP */ 2648360efbdSAlfred Perlstein /* An array of all the suitable broadcast transports */ 2658360efbdSAlfred Perlstein struct { 2668360efbdSAlfred Perlstein int fd; /* File descriptor */ 2678360efbdSAlfred Perlstein int af; 2688360efbdSAlfred Perlstein int proto; 2698360efbdSAlfred Perlstein struct netconfig *nconf; /* Netconfig structure */ 2708360efbdSAlfred Perlstein u_int asize; /* Size of the addr buf */ 2718360efbdSAlfred Perlstein u_int dsize; /* Size of the data buf */ 2728360efbdSAlfred Perlstein struct sockaddr_storage raddr; /* Remote address */ 2738360efbdSAlfred Perlstein broadlist_t nal; 2748360efbdSAlfred Perlstein } fdlist[MAXBCAST]; 2758360efbdSAlfred Perlstein struct pollfd pfd[MAXBCAST]; 2768360efbdSAlfred Perlstein size_t fdlistno = 0; 2778360efbdSAlfred Perlstein struct r_rpcb_rmtcallargs barg; /* Remote arguments */ 2788360efbdSAlfred Perlstein struct r_rpcb_rmtcallres bres; /* Remote results */ 2798d630135SAlfred Perlstein size_t outlen; 2808360efbdSAlfred Perlstein struct netconfig *nconf; 2818360efbdSAlfred Perlstein int msec; 2828360efbdSAlfred Perlstein int pollretval; 2838360efbdSAlfred Perlstein int fds_found; 2848360efbdSAlfred Perlstein 2858360efbdSAlfred Perlstein #ifdef PORTMAP 2868d630135SAlfred Perlstein size_t outlen_pmap = 0; 2878360efbdSAlfred Perlstein u_long port; /* Remote port number */ 2888360efbdSAlfred Perlstein int pmap_flag = 0; /* UDP exists ? */ 2898360efbdSAlfred Perlstein char *outbuf_pmap = NULL; 2908360efbdSAlfred Perlstein struct rmtcallargs barg_pmap; /* Remote arguments */ 2918360efbdSAlfred Perlstein struct rmtcallres bres_pmap; /* Remote results */ 2928360efbdSAlfred Perlstein u_int udpbufsz = 0; 2938360efbdSAlfred Perlstein #endif /* PORTMAP */ 2948360efbdSAlfred Perlstein 2958360efbdSAlfred Perlstein if (sys_auth == NULL) { 2968360efbdSAlfred Perlstein return (RPC_SYSTEMERROR); 2978360efbdSAlfred Perlstein } 2988360efbdSAlfred Perlstein /* 2998360efbdSAlfred Perlstein * initialization: create a fd, a broadcast address, and send the 3008360efbdSAlfred Perlstein * request on the broadcast transport. 3018360efbdSAlfred Perlstein * Listen on all of them and on replies, call the user supplied 3028360efbdSAlfred Perlstein * function. 3038360efbdSAlfred Perlstein */ 3048360efbdSAlfred Perlstein 3058360efbdSAlfred Perlstein if (nettype == NULL) 3068360efbdSAlfred Perlstein nettype = "datagram_n"; 3078360efbdSAlfred Perlstein if ((handle = __rpc_setconf(nettype)) == NULL) { 308e0c69338SMartin Blapp AUTH_DESTROY(sys_auth); 3098360efbdSAlfred Perlstein return (RPC_UNKNOWNPROTO); 3108360efbdSAlfred Perlstein } 3118360efbdSAlfred Perlstein while ((nconf = __rpc_getconf(handle)) != NULL) { 3128360efbdSAlfred Perlstein int fd; 3138360efbdSAlfred Perlstein struct __rpc_sockinfo si; 3148360efbdSAlfred Perlstein 3158360efbdSAlfred Perlstein if (nconf->nc_semantics != NC_TPI_CLTS) 3168360efbdSAlfred Perlstein continue; 3178360efbdSAlfred Perlstein if (fdlistno >= MAXBCAST) 3188360efbdSAlfred Perlstein break; /* No more slots available */ 3198360efbdSAlfred Perlstein if (!__rpc_nconf2sockinfo(nconf, &si)) 3208360efbdSAlfred Perlstein continue; 3218360efbdSAlfred Perlstein 3228360efbdSAlfred Perlstein TAILQ_INIT(&fdlist[fdlistno].nal); 3238360efbdSAlfred Perlstein if (__rpc_getbroadifs(si.si_af, si.si_proto, si.si_socktype, 3248360efbdSAlfred Perlstein &fdlist[fdlistno].nal) == 0) 3258360efbdSAlfred Perlstein continue; 3268360efbdSAlfred Perlstein 3278360efbdSAlfred Perlstein fd = _socket(si.si_af, si.si_socktype, si.si_proto); 3288360efbdSAlfred Perlstein if (fd < 0) { 3298360efbdSAlfred Perlstein stat = RPC_CANTSEND; 3308360efbdSAlfred Perlstein continue; 3318360efbdSAlfred Perlstein } 3328360efbdSAlfred Perlstein fdlist[fdlistno].af = si.si_af; 3338360efbdSAlfred Perlstein fdlist[fdlistno].proto = si.si_proto; 3348360efbdSAlfred Perlstein fdlist[fdlistno].fd = fd; 3358360efbdSAlfred Perlstein fdlist[fdlistno].nconf = nconf; 3368360efbdSAlfred Perlstein fdlist[fdlistno].asize = __rpc_get_a_size(si.si_af); 3378360efbdSAlfred Perlstein pfd[fdlistno].events = POLLIN | POLLPRI | 3388360efbdSAlfred Perlstein POLLRDNORM | POLLRDBAND; 3398360efbdSAlfred Perlstein pfd[fdlistno].fd = fdlist[fdlistno].fd = fd; 3408360efbdSAlfred Perlstein fdlist[fdlistno].dsize = __rpc_get_t_size(si.si_af, si.si_proto, 3418360efbdSAlfred Perlstein 0); 3428360efbdSAlfred Perlstein 3438360efbdSAlfred Perlstein if (maxbufsize <= fdlist[fdlistno].dsize) 3448360efbdSAlfred Perlstein maxbufsize = fdlist[fdlistno].dsize; 3458360efbdSAlfred Perlstein 3468360efbdSAlfred Perlstein #ifdef PORTMAP 3478360efbdSAlfred Perlstein if (si.si_af == AF_INET && si.si_proto == IPPROTO_UDP) { 3488360efbdSAlfred Perlstein udpbufsz = fdlist[fdlistno].dsize; 3498360efbdSAlfred Perlstein if ((outbuf_pmap = malloc(udpbufsz)) == NULL) { 3508360efbdSAlfred Perlstein _close(fd); 3518360efbdSAlfred Perlstein stat = RPC_SYSTEMERROR; 3528360efbdSAlfred Perlstein goto done_broad; 3538360efbdSAlfred Perlstein } 3548360efbdSAlfred Perlstein pmap_flag = 1; 3558360efbdSAlfred Perlstein } 3568360efbdSAlfred Perlstein #endif /* PORTMAP */ 3578360efbdSAlfred Perlstein fdlistno++; 3588360efbdSAlfred Perlstein } 3598360efbdSAlfred Perlstein 3608360efbdSAlfred Perlstein if (fdlistno == 0) { 3618360efbdSAlfred Perlstein if (stat == RPC_SUCCESS) 3628360efbdSAlfred Perlstein stat = RPC_UNKNOWNPROTO; 3638360efbdSAlfred Perlstein goto done_broad; 3648360efbdSAlfred Perlstein } 3658360efbdSAlfred Perlstein if (maxbufsize == 0) { 3668360efbdSAlfred Perlstein if (stat == RPC_SUCCESS) 3678360efbdSAlfred Perlstein stat = RPC_CANTSEND; 3688360efbdSAlfred Perlstein goto done_broad; 3698360efbdSAlfred Perlstein } 3708360efbdSAlfred Perlstein inbuf = malloc(maxbufsize); 3718360efbdSAlfred Perlstein outbuf = malloc(maxbufsize); 3728360efbdSAlfred Perlstein if ((inbuf == NULL) || (outbuf == NULL)) { 3738360efbdSAlfred Perlstein stat = RPC_SYSTEMERROR; 3748360efbdSAlfred Perlstein goto done_broad; 3758360efbdSAlfred Perlstein } 3768360efbdSAlfred Perlstein 3778360efbdSAlfred Perlstein /* Serialize all the arguments which have to be sent */ 3788360efbdSAlfred Perlstein (void) gettimeofday(&t, NULL); 3798360efbdSAlfred Perlstein msg.rm_xid = __RPC_GETXID(&t); 3808360efbdSAlfred Perlstein msg.rm_direction = CALL; 3818360efbdSAlfred Perlstein msg.rm_call.cb_rpcvers = RPC_MSG_VERSION; 3828360efbdSAlfred Perlstein msg.rm_call.cb_prog = RPCBPROG; 3838360efbdSAlfred Perlstein msg.rm_call.cb_vers = RPCBVERS; 3848360efbdSAlfred Perlstein msg.rm_call.cb_proc = RPCBPROC_CALLIT; 3858360efbdSAlfred Perlstein barg.prog = prog; 3868360efbdSAlfred Perlstein barg.vers = vers; 3878360efbdSAlfred Perlstein barg.proc = proc; 3888360efbdSAlfred Perlstein barg.args.args_val = argsp; 3898360efbdSAlfred Perlstein barg.xdr_args = xargs; 3908360efbdSAlfred Perlstein bres.addr = uaddrp; 3918360efbdSAlfred Perlstein bres.results.results_val = resultsp; 3928360efbdSAlfred Perlstein bres.xdr_res = xresults; 3938360efbdSAlfred Perlstein msg.rm_call.cb_cred = sys_auth->ah_cred; 3948360efbdSAlfred Perlstein msg.rm_call.cb_verf = sys_auth->ah_verf; 3958360efbdSAlfred Perlstein xdrmem_create(xdrs, outbuf, maxbufsize, XDR_ENCODE); 3968360efbdSAlfred Perlstein if ((!xdr_callmsg(xdrs, &msg)) || 3978360efbdSAlfred Perlstein (!xdr_rpcb_rmtcallargs(xdrs, 3988360efbdSAlfred Perlstein (struct rpcb_rmtcallargs *)(void *)&barg))) { 3998360efbdSAlfred Perlstein stat = RPC_CANTENCODEARGS; 4008360efbdSAlfred Perlstein goto done_broad; 4018360efbdSAlfred Perlstein } 4028360efbdSAlfred Perlstein outlen = xdr_getpos(xdrs); 4038360efbdSAlfred Perlstein xdr_destroy(xdrs); 4048360efbdSAlfred Perlstein 4058360efbdSAlfred Perlstein #ifdef PORTMAP 4068360efbdSAlfred Perlstein /* Prepare the packet for version 2 PORTMAP */ 4078360efbdSAlfred Perlstein if (pmap_flag) { 4088360efbdSAlfred Perlstein msg.rm_xid++; /* One way to distinguish */ 4098360efbdSAlfred Perlstein msg.rm_call.cb_prog = PMAPPROG; 4108360efbdSAlfred Perlstein msg.rm_call.cb_vers = PMAPVERS; 4118360efbdSAlfred Perlstein msg.rm_call.cb_proc = PMAPPROC_CALLIT; 4128360efbdSAlfred Perlstein barg_pmap.prog = prog; 4138360efbdSAlfred Perlstein barg_pmap.vers = vers; 4148360efbdSAlfred Perlstein barg_pmap.proc = proc; 4158360efbdSAlfred Perlstein barg_pmap.args_ptr = argsp; 4168360efbdSAlfred Perlstein barg_pmap.xdr_args = xargs; 4178360efbdSAlfred Perlstein bres_pmap.port_ptr = &port; 4188360efbdSAlfred Perlstein bres_pmap.xdr_results = xresults; 4198360efbdSAlfred Perlstein bres_pmap.results_ptr = resultsp; 4208360efbdSAlfred Perlstein xdrmem_create(xdrs, outbuf_pmap, udpbufsz, XDR_ENCODE); 4218360efbdSAlfred Perlstein if ((! xdr_callmsg(xdrs, &msg)) || 4228360efbdSAlfred Perlstein (! xdr_rmtcall_args(xdrs, &barg_pmap))) { 4238360efbdSAlfred Perlstein stat = RPC_CANTENCODEARGS; 4248360efbdSAlfred Perlstein goto done_broad; 4258360efbdSAlfred Perlstein } 4268360efbdSAlfred Perlstein outlen_pmap = xdr_getpos(xdrs); 4278360efbdSAlfred Perlstein xdr_destroy(xdrs); 4288360efbdSAlfred Perlstein } 4298754b1acSPeter Wemm #endif /* PORTMAP */ 4308360efbdSAlfred Perlstein 4318360efbdSAlfred Perlstein /* 4328360efbdSAlfred Perlstein * Basic loop: broadcast the packets to transports which 4338360efbdSAlfred Perlstein * support data packets of size such that one can encode 4348360efbdSAlfred Perlstein * all the arguments. 4358360efbdSAlfred Perlstein * Wait a while for response(s). 4368360efbdSAlfred Perlstein * The response timeout grows larger per iteration. 4378360efbdSAlfred Perlstein */ 4388360efbdSAlfred Perlstein for (msec = inittime; msec <= waittime; msec += msec) { 4398360efbdSAlfred Perlstein struct broadif *bip; 4408360efbdSAlfred Perlstein 4418360efbdSAlfred Perlstein /* Broadcast all the packets now */ 4428360efbdSAlfred Perlstein for (i = 0; i < fdlistno; i++) { 4438360efbdSAlfred Perlstein if (fdlist[i].dsize < outlen) { 4448360efbdSAlfred Perlstein stat = RPC_CANTSEND; 4458360efbdSAlfred Perlstein continue; 4468360efbdSAlfred Perlstein } 4478360efbdSAlfred Perlstein for (bip = TAILQ_FIRST(&fdlist[i].nal); bip != NULL; 4488360efbdSAlfred Perlstein bip = TAILQ_NEXT(bip, link)) { 4498360efbdSAlfred Perlstein void *addr; 4508360efbdSAlfred Perlstein 4518360efbdSAlfred Perlstein addr = &bip->broadaddr; 4528360efbdSAlfred Perlstein 4538360efbdSAlfred Perlstein __rpc_broadenable(fdlist[i].af, fdlist[i].fd, 4548360efbdSAlfred Perlstein bip); 4558360efbdSAlfred Perlstein 4568360efbdSAlfred Perlstein /* 4578360efbdSAlfred Perlstein * Only use version 3 if lowvers is not set 4588360efbdSAlfred Perlstein */ 4598360efbdSAlfred Perlstein 4608360efbdSAlfred Perlstein if (!__rpc_lowvers) 4618360efbdSAlfred Perlstein if (_sendto(fdlist[i].fd, outbuf, 4628360efbdSAlfred Perlstein outlen, 0, (struct sockaddr*)addr, 4638360efbdSAlfred Perlstein (size_t)fdlist[i].asize) != 4648360efbdSAlfred Perlstein outlen) { 4658360efbdSAlfred Perlstein #ifdef RPC_DEBUG 4668360efbdSAlfred Perlstein perror("sendto"); 4678360efbdSAlfred Perlstein #endif 4688360efbdSAlfred Perlstein warnx("clnt_bcast: cannot send " 4698360efbdSAlfred Perlstein "broadcast packet"); 4708360efbdSAlfred Perlstein stat = RPC_CANTSEND; 4718360efbdSAlfred Perlstein continue; 4728360efbdSAlfred Perlstein }; 4738360efbdSAlfred Perlstein #ifdef RPC_DEBUG 4748360efbdSAlfred Perlstein if (!__rpc_lowvers) 4758360efbdSAlfred Perlstein fprintf(stderr, "Broadcast packet sent " 4768360efbdSAlfred Perlstein "for %s\n", 4778360efbdSAlfred Perlstein fdlist[i].nconf->nc_netid); 4788360efbdSAlfred Perlstein #endif 4798360efbdSAlfred Perlstein #ifdef PORTMAP 4808360efbdSAlfred Perlstein /* 4818360efbdSAlfred Perlstein * Send the version 2 packet also 4828360efbdSAlfred Perlstein * for UDP/IP 4838360efbdSAlfred Perlstein */ 484d063ef14SMartin Blapp if (pmap_flag && 485d063ef14SMartin Blapp fdlist[i].proto == IPPROTO_UDP) { 4868360efbdSAlfred Perlstein if (_sendto(fdlist[i].fd, outbuf_pmap, 4878360efbdSAlfred Perlstein outlen_pmap, 0, addr, 4888360efbdSAlfred Perlstein (size_t)fdlist[i].asize) != 4898360efbdSAlfred Perlstein outlen_pmap) { 4908360efbdSAlfred Perlstein warnx("clnt_bcast: " 4918360efbdSAlfred Perlstein "Cannot send broadcast packet"); 4928360efbdSAlfred Perlstein stat = RPC_CANTSEND; 4938360efbdSAlfred Perlstein continue; 4948360efbdSAlfred Perlstein } 4958360efbdSAlfred Perlstein } 4968360efbdSAlfred Perlstein #ifdef RPC_DEBUG 4978360efbdSAlfred Perlstein fprintf(stderr, "PMAP Broadcast packet " 4988360efbdSAlfred Perlstein "sent for %s\n", 4998360efbdSAlfred Perlstein fdlist[i].nconf->nc_netid); 5008360efbdSAlfred Perlstein #endif 5018360efbdSAlfred Perlstein #endif /* PORTMAP */ 5028360efbdSAlfred Perlstein } 5038360efbdSAlfred Perlstein /* End for sending all packets on this transport */ 5048360efbdSAlfred Perlstein } /* End for sending on all transports */ 5058360efbdSAlfred Perlstein 5068360efbdSAlfred Perlstein if (eachresult == NULL) { 5078360efbdSAlfred Perlstein stat = RPC_SUCCESS; 5088360efbdSAlfred Perlstein goto done_broad; 5098360efbdSAlfred Perlstein } 5108360efbdSAlfred Perlstein 5118360efbdSAlfred Perlstein /* 5128360efbdSAlfred Perlstein * Get all the replies from these broadcast requests 5138360efbdSAlfred Perlstein */ 5148360efbdSAlfred Perlstein recv_again: 5158360efbdSAlfred Perlstein 5168360efbdSAlfred Perlstein switch (pollretval = _poll(pfd, fdlistno, msec)) { 5178360efbdSAlfred Perlstein case 0: /* timed out */ 5188360efbdSAlfred Perlstein stat = RPC_TIMEDOUT; 5198360efbdSAlfred Perlstein continue; 5208360efbdSAlfred Perlstein case -1: /* some kind of error - we ignore it */ 5218360efbdSAlfred Perlstein goto recv_again; 5228360efbdSAlfred Perlstein } /* end of poll results switch */ 5238360efbdSAlfred Perlstein 5248360efbdSAlfred Perlstein for (i = fds_found = 0; 5258360efbdSAlfred Perlstein i < fdlistno && fds_found < pollretval; i++) { 5268360efbdSAlfred Perlstein bool_t done = FALSE; 5278360efbdSAlfred Perlstein 5288360efbdSAlfred Perlstein if (pfd[i].revents == 0) 5298360efbdSAlfred Perlstein continue; 5308360efbdSAlfred Perlstein else if (pfd[i].revents & POLLNVAL) { 5318360efbdSAlfred Perlstein /* 5328360efbdSAlfred Perlstein * Something bad has happened to this descri- 5338360efbdSAlfred Perlstein * ptor. We can cause _poll() to ignore 5348360efbdSAlfred Perlstein * it simply by using a negative fd. We do that 5358360efbdSAlfred Perlstein * rather than compacting the pfd[] and fdlist[] 5368360efbdSAlfred Perlstein * arrays. 5378360efbdSAlfred Perlstein */ 5388360efbdSAlfred Perlstein pfd[i].fd = -1; 5398360efbdSAlfred Perlstein fds_found++; 5408360efbdSAlfred Perlstein continue; 5418360efbdSAlfred Perlstein } else 5428360efbdSAlfred Perlstein fds_found++; 5438360efbdSAlfred Perlstein #ifdef RPC_DEBUG 5448360efbdSAlfred Perlstein fprintf(stderr, "response for %s\n", 5458360efbdSAlfred Perlstein fdlist[i].nconf->nc_netid); 5468360efbdSAlfred Perlstein #endif 5478360efbdSAlfred Perlstein try_again: 5488360efbdSAlfred Perlstein inlen = _recvfrom(fdlist[i].fd, inbuf, fdlist[i].dsize, 5498360efbdSAlfred Perlstein 0, (struct sockaddr *)(void *)&fdlist[i].raddr, 5508360efbdSAlfred Perlstein &fdlist[i].asize); 5518360efbdSAlfred Perlstein if (inlen < 0) { 5528360efbdSAlfred Perlstein if (errno == EINTR) 5538360efbdSAlfred Perlstein goto try_again; 5548360efbdSAlfred Perlstein warnx("clnt_bcast: Cannot receive reply to " 5558360efbdSAlfred Perlstein "broadcast"); 5568360efbdSAlfred Perlstein stat = RPC_CANTRECV; 5578360efbdSAlfred Perlstein continue; 5588360efbdSAlfred Perlstein } 5598360efbdSAlfred Perlstein if (inlen < sizeof (u_int32_t)) 5608360efbdSAlfred Perlstein continue; /* Drop that and go ahead */ 5618360efbdSAlfred Perlstein /* 5628360efbdSAlfred Perlstein * see if reply transaction id matches sent id. 5638360efbdSAlfred Perlstein * If so, decode the results. If return id is xid + 1 5648360efbdSAlfred Perlstein * it was a PORTMAP reply 5658360efbdSAlfred Perlstein */ 5668360efbdSAlfred Perlstein if (*((u_int32_t *)(void *)(inbuf)) == 5678360efbdSAlfred Perlstein *((u_int32_t *)(void *)(outbuf))) { 5688360efbdSAlfred Perlstein pmap_reply_flag = 0; 5698360efbdSAlfred Perlstein msg.acpted_rply.ar_verf = _null_auth; 5708360efbdSAlfred Perlstein msg.acpted_rply.ar_results.where = 5718360efbdSAlfred Perlstein (caddr_t)(void *)&bres; 5728360efbdSAlfred Perlstein msg.acpted_rply.ar_results.proc = 5738360efbdSAlfred Perlstein (xdrproc_t)xdr_rpcb_rmtcallres; 5748360efbdSAlfred Perlstein #ifdef PORTMAP 5758360efbdSAlfred Perlstein } else if (pmap_flag && 5768360efbdSAlfred Perlstein *((u_int32_t *)(void *)(inbuf)) == 5778360efbdSAlfred Perlstein *((u_int32_t *)(void *)(outbuf_pmap))) { 5788360efbdSAlfred Perlstein pmap_reply_flag = 1; 5798360efbdSAlfred Perlstein msg.acpted_rply.ar_verf = _null_auth; 5808360efbdSAlfred Perlstein msg.acpted_rply.ar_results.where = 5818360efbdSAlfred Perlstein (caddr_t)(void *)&bres_pmap; 5828360efbdSAlfred Perlstein msg.acpted_rply.ar_results.proc = 5838360efbdSAlfred Perlstein (xdrproc_t)xdr_rmtcallres; 5848360efbdSAlfred Perlstein #endif /* PORTMAP */ 5858360efbdSAlfred Perlstein } else 5868360efbdSAlfred Perlstein continue; 5878360efbdSAlfred Perlstein xdrmem_create(xdrs, inbuf, (u_int)inlen, XDR_DECODE); 5888360efbdSAlfred Perlstein if (xdr_replymsg(xdrs, &msg)) { 5898360efbdSAlfred Perlstein if ((msg.rm_reply.rp_stat == MSG_ACCEPTED) && 5908360efbdSAlfred Perlstein (msg.acpted_rply.ar_stat == SUCCESS)) { 5918360efbdSAlfred Perlstein struct netbuf taddr, *np; 5928360efbdSAlfred Perlstein struct sockaddr_in *sin; 5938360efbdSAlfred Perlstein 5948360efbdSAlfred Perlstein #ifdef PORTMAP 5958360efbdSAlfred Perlstein if (pmap_flag && pmap_reply_flag) { 5968360efbdSAlfred Perlstein sin = (struct sockaddr_in *) 5978360efbdSAlfred Perlstein (void *)&fdlist[i].raddr; 5988360efbdSAlfred Perlstein sin->sin_port = 5998360efbdSAlfred Perlstein htons((u_short)port); 6008360efbdSAlfred Perlstein taddr.len = taddr.maxlen = 6018360efbdSAlfred Perlstein fdlist[i].raddr.ss_len; 6028360efbdSAlfred Perlstein taddr.buf = &fdlist[i].raddr; 6038360efbdSAlfred Perlstein done = (*eachresult)(resultsp, 6048360efbdSAlfred Perlstein &taddr, fdlist[i].nconf); 6058360efbdSAlfred Perlstein } else { 6068360efbdSAlfred Perlstein #endif /* PORTMAP */ 6078360efbdSAlfred Perlstein #ifdef RPC_DEBUG 6088360efbdSAlfred Perlstein fprintf(stderr, "uaddr %s\n", 6098360efbdSAlfred Perlstein uaddrp); 6108360efbdSAlfred Perlstein #endif 6118360efbdSAlfred Perlstein np = uaddr2taddr( 6128360efbdSAlfred Perlstein fdlist[i].nconf, uaddrp); 6138360efbdSAlfred Perlstein done = (*eachresult)(resultsp, 6148360efbdSAlfred Perlstein np, fdlist[i].nconf); 6158360efbdSAlfred Perlstein free(np); 6168360efbdSAlfred Perlstein #ifdef PORTMAP 6178360efbdSAlfred Perlstein } 6188360efbdSAlfred Perlstein #endif /* PORTMAP */ 6198360efbdSAlfred Perlstein } 6208360efbdSAlfred Perlstein /* otherwise, we just ignore the errors ... */ 6218360efbdSAlfred Perlstein } 6228360efbdSAlfred Perlstein /* else some kind of deserialization problem ... */ 6238360efbdSAlfred Perlstein 6248360efbdSAlfred Perlstein xdrs->x_op = XDR_FREE; 6258360efbdSAlfred Perlstein msg.acpted_rply.ar_results.proc = (xdrproc_t) xdr_void; 6268360efbdSAlfred Perlstein (void) xdr_replymsg(xdrs, &msg); 6278360efbdSAlfred Perlstein (void) (*xresults)(xdrs, resultsp); 6288360efbdSAlfred Perlstein XDR_DESTROY(xdrs); 6298360efbdSAlfred Perlstein if (done) { 6308360efbdSAlfred Perlstein stat = RPC_SUCCESS; 6318360efbdSAlfred Perlstein goto done_broad; 6328360efbdSAlfred Perlstein } else { 6338360efbdSAlfred Perlstein goto recv_again; 6348360efbdSAlfred Perlstein } 6358360efbdSAlfred Perlstein } /* The recv for loop */ 6368360efbdSAlfred Perlstein } /* The giant for loop */ 6378360efbdSAlfred Perlstein 6388360efbdSAlfred Perlstein done_broad: 6398360efbdSAlfred Perlstein if (inbuf) 6408360efbdSAlfred Perlstein (void) free(inbuf); 6418360efbdSAlfred Perlstein if (outbuf) 6428360efbdSAlfred Perlstein (void) free(outbuf); 6438360efbdSAlfred Perlstein #ifdef PORTMAP 6448360efbdSAlfred Perlstein if (outbuf_pmap) 6458360efbdSAlfred Perlstein (void) free(outbuf_pmap); 6468360efbdSAlfred Perlstein #endif /* PORTMAP */ 6478360efbdSAlfred Perlstein for (i = 0; i < fdlistno; i++) { 6488360efbdSAlfred Perlstein (void)_close(fdlist[i].fd); 6498360efbdSAlfred Perlstein __rpc_freebroadifs(&fdlist[i].nal); 6508360efbdSAlfred Perlstein } 6518360efbdSAlfred Perlstein AUTH_DESTROY(sys_auth); 6528360efbdSAlfred Perlstein (void) __rpc_endconf(handle); 6538360efbdSAlfred Perlstein 6548360efbdSAlfred Perlstein return (stat); 6558360efbdSAlfred Perlstein } 6568360efbdSAlfred Perlstein 657*587cf682SCraig Rodrigues /* 658*587cf682SCraig Rodrigues * rpc_broadcast() 659*587cf682SCraig Rodrigues * 660*587cf682SCraig Rodrigues * prog - program number 661*587cf682SCraig Rodrigues * vers - version number 662*587cf682SCraig Rodrigues * proc - procedure number 663*587cf682SCraig Rodrigues * xargs - xdr routine for args 664*587cf682SCraig Rodrigues * argsp - pointer to args 665*587cf682SCraig Rodrigues * xresults - xdr routine for results 666*587cf682SCraig Rodrigues * resultsp - pointer to results 667*587cf682SCraig Rodrigues * eachresult - call with each result obtained 668*587cf682SCraig Rodrigues * nettype - transport type 669*587cf682SCraig Rodrigues */ 6708360efbdSAlfred Perlstein enum clnt_stat 671*587cf682SCraig Rodrigues rpc_broadcast(rpcprog_t prog, rpcvers_t vers, rpcproc_t proc, xdrproc_t xargs, 672*587cf682SCraig Rodrigues caddr_t argsp, xdrproc_t xresults, caddr_t resultsp, 673*587cf682SCraig Rodrigues resultproc_t eachresult, const char *nettype) 6748360efbdSAlfred Perlstein { 6758360efbdSAlfred Perlstein enum clnt_stat dummy; 6768360efbdSAlfred Perlstein 6778360efbdSAlfred Perlstein dummy = rpc_broadcast_exp(prog, vers, proc, xargs, argsp, 6788360efbdSAlfred Perlstein xresults, resultsp, eachresult, 6798360efbdSAlfred Perlstein INITTIME, WAITTIME, nettype); 6808360efbdSAlfred Perlstein return (dummy); 6818360efbdSAlfred Perlstein } 682