#include <NetInfo/config.h>
#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#include <sys/types.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <rpc/rpc.h>
#include <rpc/pmap_prot.h>
#include <sys/socket.h>
#include <sys/param.h>
#include <NetInfo/socket_lock.h>
#include "multi_call.h"
#include "ni_globals.h"
#include <NetInfo/system_log.h>
#define NRETRIES 5
#define USECS_PER_SEC 1000000
#define MAX_RETRY_TIMEOUT 8
extern int alert_aborted(void);
extern void xdr_free();
static char *
get_hostname(void)
{
int len;
static char hostname[MAXHOSTNAMELEN + 1];
len = gethostname(hostname, sizeof(hostname));
if (len < 0) {
hostname[0] = 0;
} else {
hostname[len] = 0;
}
return (hostname);
}
static int
encodemsg(
char *buf,
int buflen,
struct rpc_msg *call,
unsigned prognum,
unsigned versnum,
unsigned procnum,
xdrproc_t xdr_args,
void *arg
)
{
XDR xdr;
unsigned size;
unsigned pos;
xdrmem_create(&xdr, buf, buflen, XDR_ENCODE);
if (!xdr_callmsg(&xdr, call) ||
!xdr_u_int(&xdr, &prognum) ||
!xdr_u_int(&xdr, &versnum) ||
!xdr_u_int(&xdr, &procnum)) {
return (0);
}
pos = xdr_getpos(&xdr);
xdr_setpos(&xdr, pos + BYTES_PER_XDR_UNIT);
if (!(*xdr_args)(&xdr, arg)) {
return (0);
}
size = xdr_getpos(&xdr) - pos;
xdr_setpos(&xdr, pos);
if (!xdr_u_int(&xdr, &size)) {
return (0);
}
return (pos + BYTES_PER_XDR_UNIT + size);
}
static int
decodemsg(
XDR *xdr,
xdrproc_t xdr_res,
void *res
)
{
unsigned port;
unsigned len;
long *buf;
XDR bufxdr;
if (!xdr_u_int(xdr, &port) ||
!xdr_u_int(xdr, &len) ||
!(buf = xdr_inline(xdr, len))) {
return (0);
}
xdrmem_create(&bufxdr, (char *)buf, len * BYTES_PER_XDR_UNIT,
XDR_DECODE);
if (!(*xdr_res)(&bufxdr, res)) {
return (0);
}
return (1);
}
enum clnt_stat
ni_multi_call(
unsigned naddrs,
struct in_addr *addrs,
unsigned prognum,
unsigned versnum,
unsigned procnum,
xdrproc_t xdr_args,
void *argsvec,
unsigned argsize,
xdrproc_t xdr_res,
void *res,
int (*eachresult)(void *, struct sockaddr_in *, int),
int preferred_provider
)
{
struct authunix_parms aup;
char credbuf[MAX_AUTH_BYTES];
struct opaque_auth cred;
struct opaque_auth verf;
int gids[NGROUPS];
int s, i;
struct timeval tv;
int callno;
int serverno;
struct rpc_msg call;
struct rpc_msg reply;
struct sockaddr_in sin;
struct sockaddr_in from;
int fromsize;
char buf[UDPMSGSIZE];
int buflen;
unsigned trans_id;
int dtablesize = getdtablesize();
XDR xdr;
int sendlen;
fd_set fds;
aup.aup_time = time(0);
aup.aup_machname = get_hostname();
aup.aup_uid = getuid();
aup.aup_gid = getgid();
aup.aup_gids = gids;
aup.aup_len = getgroups(NGROUPS, aup.aup_gids);
xdrmem_create(&xdr, credbuf, sizeof(credbuf), XDR_ENCODE);
if (!xdr_authunix_parms(&xdr, &aup)) {
return (RPC_CANTENCODEARGS);
}
cred.oa_flavor = AUTH_UNIX;
cred.oa_base = credbuf;
cred.oa_length = xdr_getpos(&xdr);
verf.oa_flavor = AUTH_NULL;
verf.oa_length = 0;
trans_id = time(0) ^ getpid();
call.rm_xid = trans_id;
call.rm_direction = CALL;
call.rm_call.cb_rpcvers = 2;
call.rm_call.cb_prog = PMAPPROG;
call.rm_call.cb_vers = PMAPVERS;
call.rm_call.cb_proc = PMAPPROC_CALLIT;
call.rm_call.cb_cred = cred;
call.rm_call.cb_verf = verf;
socket_lock();
s = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
socket_unlock();
if (s < 0) {
system_log(LOG_ERR, "multi_call: socket: %m");
return (RPC_FAILED);
}
i = 1;
if (setsockopt(s, SOL_SOCKET, SO_BROADCAST, &i, sizeof(int)) < 0) {
system_log(LOG_ERR, "multi_call can't broadcast: %m");
}
tv.tv_sec = 0;
tv.tv_usec = 500000;
sin.sin_family = AF_INET;
sin.sin_port = htons(PMAPPORT);
bzero(sin.sin_zero, sizeof(sin.sin_zero));
do_probes:
for (callno = 0; callno <= NRETRIES; callno++) {
int *todo;
int tCnt = naddrs;
int tX;
int aX;
todo = (int *)malloc(naddrs * sizeof(int));
for (tX=0; tX<naddrs; tX++)
todo[tX] = tX;
for (serverno = 0; serverno < naddrs; serverno++, tCnt--) {
tX = random() % tCnt;
aX = todo[tX];
while (tX < tCnt) {
todo[tX] = todo[tX+1];
tX++;
};
if ((preferred_provider >= 0) &&
(aX != preferred_provider))
{
continue;
}
call.rm_xid = trans_id + aX;
buflen = encodemsg(buf, sizeof(buf), &call,
prognum, versnum, procnum,
xdr_args, (argsvec +
(aX * argsize)));
if (buflen == 0) {
continue;
}
sin.sin_addr = addrs[aX];
sendlen = sendto(s, buf, buflen, 0,
(struct sockaddr *)&sin, sizeof(sin));
if (sendlen != buflen) {
system_log(LOG_ERR,
"Cannot send multicall packet to %s: %m",
inet_ntoa(addrs[aX]));
}
}
free(todo);
if (callno > 1)
{
tv.tv_sec *= 2;
tv.tv_usec *= 2;
if (tv.tv_usec >= USECS_PER_SEC)
{
tv.tv_usec -= USECS_PER_SEC;
tv.tv_sec++;
}
if (tv.tv_sec >= MAX_RETRY_TIMEOUT)
{
tv.tv_sec = MAX_RETRY_TIMEOUT;
tv.tv_usec = 0;
}
}
if (alert_aborted()) {
socket_lock();
close(s);
socket_unlock();
return (RPC_FAILED);
}
FD_ZERO(&fds);
FD_SET(s, &fds);
switch (select(dtablesize, &fds, NULL, NULL, &tv)) {
case -1:
system_log(LOG_ERR, "select failure: %m");
continue;
case 0:
system_log(LOG_DEBUG, "multicall timeout: %u+%u",
tv.tv_sec, tv.tv_usec);
continue;
default:
break;
}
fromsize = sizeof(from);
buflen = recvfrom(s, buf, sizeof(buf), 0,
(struct sockaddr *)&from, &fromsize);
if (buflen < 0) {
continue;
}
xdrmem_create(&xdr, buf, buflen, XDR_DECODE);
reply.rm_reply.rp_acpt.ar_results.proc = xdr_void;
reply.rm_reply.rp_acpt.ar_results.where = NULL;
if (xdr_replymsg(&xdr, &reply) &&
(reply.rm_xid >= trans_id) &&
(reply.rm_xid < trans_id + naddrs) &&
(reply.rm_reply.rp_stat == MSG_ACCEPTED) &&
(reply.acpted_rply.ar_stat == SUCCESS) &&
decodemsg(&xdr, xdr_res, res)) {
if ((*eachresult)(res, &from,
reply.rm_xid - trans_id)) {
xdr_free(xdr_res, res);
socket_lock();
close(s);
socket_unlock();
return (RPC_SUCCESS);
}
}
xdr_free(xdr_res, res);
}
if (preferred_provider >= 0) {
preferred_provider = -1;
goto do_probes;
}
socket_lock();
close(s);
socket_unlock();
return (RPC_TIMEDOUT);
}