clnt_rc.c revision 221127
1177633Sdfr/*-
2177633Sdfr * Copyright (c) 2008 Isilon Inc http://www.isilon.com/
3177633Sdfr * Authors: Doug Rabson <dfr@rabson.org>
4177633Sdfr * Developed with Red Inc: Alfred Perlstein <alfred@freebsd.org>
5177633Sdfr *
6177633Sdfr * Redistribution and use in source and binary forms, with or without
7177633Sdfr * modification, are permitted provided that the following conditions
8177633Sdfr * are met:
9177633Sdfr * 1. Redistributions of source code must retain the above copyright
10177633Sdfr *    notice, this list of conditions and the following disclaimer.
11177633Sdfr * 2. Redistributions in binary form must reproduce the above copyright
12177633Sdfr *    notice, this list of conditions and the following disclaimer in the
13177633Sdfr *    documentation and/or other materials provided with the distribution.
14177633Sdfr *
15177633Sdfr * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16177633Sdfr * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17177633Sdfr * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18177633Sdfr * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19177633Sdfr * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20177633Sdfr * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21177633Sdfr * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22177633Sdfr * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23177633Sdfr * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24177633Sdfr * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25177633Sdfr * SUCH DAMAGE.
26177633Sdfr */
27177633Sdfr
28177633Sdfr#include <sys/cdefs.h>
29177633Sdfr__FBSDID("$FreeBSD: head/sys/rpc/clnt_rc.c 221127 2011-04-27 18:19:26Z rmacklem $");
30177633Sdfr
31177633Sdfr#include <sys/param.h>
32177633Sdfr#include <sys/systm.h>
33184588Sdfr#include <sys/kernel.h>
34180025Sdfr#include <sys/limits.h>
35177633Sdfr#include <sys/lock.h>
36177633Sdfr#include <sys/malloc.h>
37177633Sdfr#include <sys/mbuf.h>
38177633Sdfr#include <sys/mutex.h>
39177633Sdfr#include <sys/pcpu.h>
40177633Sdfr#include <sys/proc.h>
41177633Sdfr#include <sys/socket.h>
42177633Sdfr#include <sys/socketvar.h>
43177633Sdfr#include <sys/time.h>
44177633Sdfr#include <sys/uio.h>
45177633Sdfr
46177633Sdfr#include <rpc/rpc.h>
47177685Sdfr#include <rpc/rpc_com.h>
48177633Sdfr
49180025Sdfrstatic enum clnt_stat clnt_reconnect_call(CLIENT *, struct rpc_callextra *,
50184588Sdfr    rpcproc_t, struct mbuf *, struct mbuf **, struct timeval);
51177633Sdfrstatic void clnt_reconnect_geterr(CLIENT *, struct rpc_err *);
52177633Sdfrstatic bool_t clnt_reconnect_freeres(CLIENT *, xdrproc_t, void *);
53177633Sdfrstatic void clnt_reconnect_abort(CLIENT *);
54177633Sdfrstatic bool_t clnt_reconnect_control(CLIENT *, u_int, void *);
55184588Sdfrstatic void clnt_reconnect_close(CLIENT *);
56177633Sdfrstatic void clnt_reconnect_destroy(CLIENT *);
57177633Sdfr
58177633Sdfrstatic struct clnt_ops clnt_reconnect_ops = {
59177633Sdfr	.cl_call =	clnt_reconnect_call,
60177633Sdfr	.cl_abort =	clnt_reconnect_abort,
61177633Sdfr	.cl_geterr =	clnt_reconnect_geterr,
62177633Sdfr	.cl_freeres =	clnt_reconnect_freeres,
63184588Sdfr	.cl_close =	clnt_reconnect_close,
64177633Sdfr	.cl_destroy =	clnt_reconnect_destroy,
65177633Sdfr	.cl_control =	clnt_reconnect_control
66177633Sdfr};
67177633Sdfr
68184588Sdfrstatic int	fake_wchan;
69184588Sdfr
70177633Sdfrstruct rc_data {
71180025Sdfr	struct mtx		rc_lock;
72177633Sdfr	struct sockaddr_storage	rc_addr; /* server address */
73177633Sdfr	struct netconfig*	rc_nconf; /* network type */
74177633Sdfr	rpcprog_t		rc_prog;  /* program number */
75177633Sdfr	rpcvers_t		rc_vers;  /* version number */
76177633Sdfr	size_t			rc_sendsz;
77177633Sdfr	size_t			rc_recvsz;
78177633Sdfr	struct timeval		rc_timeout;
79177633Sdfr	struct timeval		rc_retry;
80180025Sdfr	int			rc_retries;
81184588Sdfr	int			rc_privport;
82184588Sdfr	char			*rc_waitchan;
83177633Sdfr	int			rc_intr;
84180025Sdfr	int			rc_connecting;
85184588Sdfr	int			rc_closed;
86184588Sdfr	struct ucred		*rc_ucred;
87177633Sdfr	CLIENT*			rc_client; /* underlying RPC client */
88184588Sdfr	struct rpc_err		rc_err;
89177633Sdfr};
90177633Sdfr
91177633SdfrCLIENT *
92177633Sdfrclnt_reconnect_create(
93177633Sdfr	struct netconfig *nconf,	/* network type */
94177633Sdfr	struct sockaddr *svcaddr,	/* servers address */
95177633Sdfr	rpcprog_t program,		/* program number */
96177633Sdfr	rpcvers_t version,		/* version number */
97177633Sdfr	size_t sendsz,			/* buffer recv size */
98177633Sdfr	size_t recvsz)			/* buffer send size */
99177633Sdfr{
100177633Sdfr	CLIENT *cl = NULL;		/* client handle */
101177633Sdfr	struct rc_data *rc = NULL;	/* private data */
102177633Sdfr
103177633Sdfr	if (svcaddr == NULL) {
104177633Sdfr		rpc_createerr.cf_stat = RPC_UNKNOWNADDR;
105177633Sdfr		return (NULL);
106177633Sdfr	}
107177633Sdfr
108177633Sdfr	cl = mem_alloc(sizeof (CLIENT));
109177633Sdfr	rc = mem_alloc(sizeof (*rc));
110180025Sdfr	mtx_init(&rc->rc_lock, "rc->rc_lock", NULL, MTX_DEF);
111177633Sdfr	(void) memcpy(&rc->rc_addr, svcaddr, (size_t)svcaddr->sa_len);
112177633Sdfr	rc->rc_nconf = nconf;
113177633Sdfr	rc->rc_prog = program;
114177633Sdfr	rc->rc_vers = version;
115177633Sdfr	rc->rc_sendsz = sendsz;
116177633Sdfr	rc->rc_recvsz = recvsz;
117177633Sdfr	rc->rc_timeout.tv_sec = -1;
118177633Sdfr	rc->rc_timeout.tv_usec = -1;
119180025Sdfr	rc->rc_retry.tv_sec = 3;
120177633Sdfr	rc->rc_retry.tv_usec = 0;
121180025Sdfr	rc->rc_retries = INT_MAX;
122184588Sdfr	rc->rc_privport = FALSE;
123177633Sdfr	rc->rc_waitchan = "rpcrecv";
124177633Sdfr	rc->rc_intr = 0;
125180025Sdfr	rc->rc_connecting = FALSE;
126184588Sdfr	rc->rc_closed = FALSE;
127184588Sdfr	rc->rc_ucred = crdup(curthread->td_ucred);
128177633Sdfr	rc->rc_client = NULL;
129177633Sdfr
130180025Sdfr	cl->cl_refs = 1;
131177633Sdfr	cl->cl_ops = &clnt_reconnect_ops;
132177633Sdfr	cl->cl_private = (caddr_t)(void *)rc;
133177633Sdfr	cl->cl_auth = authnone_create();
134177633Sdfr	cl->cl_tp = NULL;
135177633Sdfr	cl->cl_netid = NULL;
136177633Sdfr	return (cl);
137177633Sdfr}
138177633Sdfr
139177633Sdfrstatic enum clnt_stat
140177633Sdfrclnt_reconnect_connect(CLIENT *cl)
141177633Sdfr{
142184588Sdfr	struct thread *td = curthread;
143177633Sdfr	struct rc_data *rc = (struct rc_data *)cl->cl_private;
144177633Sdfr	struct socket *so;
145180025Sdfr	enum clnt_stat stat;
146180025Sdfr	int error;
147177633Sdfr	int one = 1;
148184588Sdfr	struct ucred *oldcred;
149194934Srmacklem	CLIENT *newclient = NULL;
150177633Sdfr
151180025Sdfr	mtx_lock(&rc->rc_lock);
152194934Srmacklem	while (rc->rc_connecting) {
153194934Srmacklem		error = msleep(rc, &rc->rc_lock,
154194934Srmacklem		    rc->rc_intr ? PCATCH : 0, "rpcrecon", 0);
155194934Srmacklem		if (error) {
156194934Srmacklem			mtx_unlock(&rc->rc_lock);
157194934Srmacklem			return (RPC_INTR);
158194934Srmacklem		}
159194934Srmacklem	}
160184588Sdfr	if (rc->rc_closed) {
161184588Sdfr		mtx_unlock(&rc->rc_lock);
162184588Sdfr		return (RPC_CANTSEND);
163184588Sdfr	}
164194934Srmacklem	if (rc->rc_client) {
165180025Sdfr		mtx_unlock(&rc->rc_lock);
166180025Sdfr		return (RPC_SUCCESS);
167180025Sdfr	}
168194934Srmacklem
169194934Srmacklem	/*
170194934Srmacklem	 * My turn to attempt a connect. The rc_connecting variable
171194934Srmacklem	 * serializes the following code sequence, so it is guaranteed
172194934Srmacklem	 * that rc_client will still be NULL after it is re-locked below,
173194934Srmacklem	 * since that is the only place it is set non-NULL.
174194934Srmacklem	 */
175194934Srmacklem	rc->rc_connecting = TRUE;
176180025Sdfr	mtx_unlock(&rc->rc_lock);
177180025Sdfr
178196503Szec	oldcred = td->td_ucred;
179196503Szec	td->td_ucred = rc->rc_ucred;
180177633Sdfr	so = __rpc_nconf2socket(rc->rc_nconf);
181177633Sdfr	if (!so) {
182180025Sdfr		stat = rpc_createerr.cf_stat = RPC_TLIERROR;
183177633Sdfr		rpc_createerr.cf_error.re_errno = 0;
184196503Szec		td->td_ucred = oldcred;
185180025Sdfr		goto out;
186177633Sdfr	}
187188142Sdfr
188184588Sdfr	if (rc->rc_privport)
189184588Sdfr		bindresvport(so, NULL);
190177633Sdfr
191177633Sdfr	if (rc->rc_nconf->nc_semantics == NC_TPI_CLTS)
192194934Srmacklem		newclient = clnt_dg_create(so,
193177633Sdfr		    (struct sockaddr *) &rc->rc_addr, rc->rc_prog, rc->rc_vers,
194177633Sdfr		    rc->rc_sendsz, rc->rc_recvsz);
195177633Sdfr	else
196194934Srmacklem		newclient = clnt_vc_create(so,
197177633Sdfr		    (struct sockaddr *) &rc->rc_addr, rc->rc_prog, rc->rc_vers,
198221127Srmacklem		    rc->rc_sendsz, rc->rc_recvsz, rc->rc_intr);
199184588Sdfr	td->td_ucred = oldcred;
200177633Sdfr
201194934Srmacklem	if (!newclient) {
202184588Sdfr		soclose(so);
203184588Sdfr		rc->rc_err = rpc_createerr.cf_error;
204180025Sdfr		stat = rpc_createerr.cf_stat;
205180025Sdfr		goto out;
206180025Sdfr	}
207178112Sdfr
208194934Srmacklem	CLNT_CONTROL(newclient, CLSET_FD_CLOSE, 0);
209194934Srmacklem	CLNT_CONTROL(newclient, CLSET_CONNECT, &one);
210194934Srmacklem	CLNT_CONTROL(newclient, CLSET_TIMEOUT, &rc->rc_timeout);
211194934Srmacklem	CLNT_CONTROL(newclient, CLSET_RETRY_TIMEOUT, &rc->rc_retry);
212194934Srmacklem	CLNT_CONTROL(newclient, CLSET_WAITCHAN, rc->rc_waitchan);
213194934Srmacklem	CLNT_CONTROL(newclient, CLSET_INTERRUPTIBLE, &rc->rc_intr);
214180025Sdfr	stat = RPC_SUCCESS;
215177633Sdfr
216180025Sdfrout:
217180025Sdfr	mtx_lock(&rc->rc_lock);
218194934Srmacklem	KASSERT(rc->rc_client == NULL, ("rc_client not null"));
219194934Srmacklem	if (!rc->rc_closed) {
220194934Srmacklem		rc->rc_client = newclient;
221194934Srmacklem		newclient = NULL;
222184588Sdfr	}
223180025Sdfr	rc->rc_connecting = FALSE;
224180025Sdfr	wakeup(rc);
225180025Sdfr	mtx_unlock(&rc->rc_lock);
226180025Sdfr
227194934Srmacklem	if (newclient) {
228194934Srmacklem		/*
229194934Srmacklem		 * It has been closed, so discard the new client.
230194934Srmacklem		 * nb: clnt_[dg|vc]_close()/clnt_[dg|vc]_destroy() cannot
231194934Srmacklem		 * be called with the rc_lock mutex held, since they may
232194934Srmacklem		 * msleep() while holding a different mutex.
233194934Srmacklem		 */
234194934Srmacklem		CLNT_CLOSE(newclient);
235194934Srmacklem		CLNT_RELEASE(newclient);
236194934Srmacklem	}
237194934Srmacklem
238180025Sdfr	return (stat);
239177633Sdfr}
240177633Sdfr
241177633Sdfrstatic enum clnt_stat
242177633Sdfrclnt_reconnect_call(
243180025Sdfr	CLIENT		*cl,		/* client handle */
244180025Sdfr	struct rpc_callextra *ext,	/* call metadata */
245177633Sdfr	rpcproc_t	proc,		/* procedure number */
246184588Sdfr	struct mbuf	*args,		/* pointer to args */
247184588Sdfr	struct mbuf	**resultsp,	/* pointer to results */
248184588Sdfr	struct timeval	utimeout)
249177633Sdfr{
250177633Sdfr	struct rc_data *rc = (struct rc_data *)cl->cl_private;
251180025Sdfr	CLIENT *client;
252177633Sdfr	enum clnt_stat stat;
253194934Srmacklem	int tries, error;
254177633Sdfr
255180025Sdfr	tries = 0;
256177633Sdfr	do {
257194934Srmacklem		mtx_lock(&rc->rc_lock);
258184588Sdfr		if (rc->rc_closed) {
259194934Srmacklem			mtx_unlock(&rc->rc_lock);
260184588Sdfr			return (RPC_CANTSEND);
261184588Sdfr		}
262184588Sdfr
263178112Sdfr		if (!rc->rc_client) {
264194934Srmacklem			mtx_unlock(&rc->rc_lock);
265178112Sdfr			stat = clnt_reconnect_connect(cl);
266184588Sdfr			if (stat == RPC_SYSTEMERROR) {
267194934Srmacklem				error = tsleep(&fake_wchan,
268195703Skib				    rc->rc_intr ? PCATCH | PBDRY : 0, "rpccon",
269195703Skib				    hz);
270194934Srmacklem				if (error == EINTR || error == ERESTART)
271194934Srmacklem					return (RPC_INTR);
272184588Sdfr				tries++;
273184588Sdfr				if (tries >= rc->rc_retries)
274184588Sdfr					return (stat);
275184588Sdfr				continue;
276184588Sdfr			}
277178112Sdfr			if (stat != RPC_SUCCESS)
278178112Sdfr				return (stat);
279194934Srmacklem			mtx_lock(&rc->rc_lock);
280178112Sdfr		}
281177633Sdfr
282184588Sdfr		if (!rc->rc_client) {
283184588Sdfr			mtx_unlock(&rc->rc_lock);
284184588Sdfr			stat = RPC_FAILED;
285184588Sdfr			continue;
286184588Sdfr		}
287180025Sdfr		CLNT_ACQUIRE(rc->rc_client);
288180025Sdfr		client = rc->rc_client;
289180025Sdfr		mtx_unlock(&rc->rc_lock);
290184588Sdfr		stat = CLNT_CALL_MBUF(client, ext, proc, args,
291184588Sdfr		    resultsp, utimeout);
292177633Sdfr
293184588Sdfr		if (stat != RPC_SUCCESS) {
294184588Sdfr			if (!ext)
295184588Sdfr				CLNT_GETERR(client, &rc->rc_err);
296184588Sdfr		}
297184588Sdfr
298177633Sdfr		if (stat == RPC_TIMEDOUT) {
299177633Sdfr			/*
300177633Sdfr			 * Check for async send misfeature for NLM
301177633Sdfr			 * protocol.
302177633Sdfr			 */
303177633Sdfr			if ((rc->rc_timeout.tv_sec == 0
304177633Sdfr				&& rc->rc_timeout.tv_usec == 0)
305177633Sdfr			    || (rc->rc_timeout.tv_sec == -1
306177633Sdfr				&& utimeout.tv_sec == 0
307180025Sdfr				&& utimeout.tv_usec == 0)) {
308194934Srmacklem				CLNT_RELEASE(client);
309177633Sdfr				break;
310180025Sdfr			}
311177633Sdfr		}
312177633Sdfr
313184588Sdfr		if (stat == RPC_TIMEDOUT || stat == RPC_CANTSEND
314184588Sdfr		    || stat == RPC_CANTRECV) {
315180025Sdfr			tries++;
316194934Srmacklem			if (tries >= rc->rc_retries) {
317194934Srmacklem				CLNT_RELEASE(client);
318180025Sdfr				break;
319194934Srmacklem			}
320180025Sdfr
321180025Sdfr			if (ext && ext->rc_feedback)
322180025Sdfr				ext->rc_feedback(FEEDBACK_RECONNECT, proc,
323180025Sdfr				    ext->rc_feedback_arg);
324180025Sdfr
325180025Sdfr			mtx_lock(&rc->rc_lock);
326180025Sdfr			/*
327180025Sdfr			 * Make sure that someone else hasn't already
328194934Srmacklem			 * reconnected by checking if rc_client has changed.
329194934Srmacklem			 * If not, we are done with the client and must
330194934Srmacklem			 * do CLNT_RELEASE(client) twice to dispose of it,
331194934Srmacklem			 * because there is both an initial refcnt and one
332194934Srmacklem			 * acquired by CLNT_ACQUIRE() above.
333180025Sdfr			 */
334180025Sdfr			if (rc->rc_client == client) {
335180025Sdfr				rc->rc_client = NULL;
336194934Srmacklem				mtx_unlock(&rc->rc_lock);
337194934Srmacklem				CLNT_RELEASE(client);
338194934Srmacklem			} else {
339194934Srmacklem				mtx_unlock(&rc->rc_lock);
340180025Sdfr			}
341194934Srmacklem			CLNT_RELEASE(client);
342184588Sdfr		} else {
343194934Srmacklem			CLNT_RELEASE(client);
344184588Sdfr			break;
345177633Sdfr		}
346177633Sdfr	} while (stat != RPC_SUCCESS);
347177633Sdfr
348184588Sdfr	KASSERT(stat != RPC_SUCCESS || *resultsp,
349184588Sdfr	    ("RPC_SUCCESS without reply"));
350184588Sdfr
351177633Sdfr	return (stat);
352177633Sdfr}
353177633Sdfr
354177633Sdfrstatic void
355177633Sdfrclnt_reconnect_geterr(CLIENT *cl, struct rpc_err *errp)
356177633Sdfr{
357177633Sdfr	struct rc_data *rc = (struct rc_data *)cl->cl_private;
358177633Sdfr
359184588Sdfr	*errp = rc->rc_err;
360177633Sdfr}
361177633Sdfr
362194934Srmacklem/*
363194934Srmacklem * Since this function requires that rc_client be valid, it can
364194934Srmacklem * only be called when that is guaranteed to be the case.
365194934Srmacklem */
366177633Sdfrstatic bool_t
367177633Sdfrclnt_reconnect_freeres(CLIENT *cl, xdrproc_t xdr_res, void *res_ptr)
368177633Sdfr{
369177633Sdfr	struct rc_data *rc = (struct rc_data *)cl->cl_private;
370177633Sdfr
371177633Sdfr	return (CLNT_FREERES(rc->rc_client, xdr_res, res_ptr));
372177633Sdfr}
373177633Sdfr
374177633Sdfr/*ARGSUSED*/
375177633Sdfrstatic void
376177633Sdfrclnt_reconnect_abort(CLIENT *h)
377177633Sdfr{
378177633Sdfr}
379177633Sdfr
380194934Srmacklem/*
381194934Srmacklem * CLNT_CONTROL() on the client returned by clnt_reconnect_create() must
382194934Srmacklem * always be called before CLNT_CALL_MBUF() by a single thread only.
383194934Srmacklem */
384177633Sdfrstatic bool_t
385177633Sdfrclnt_reconnect_control(CLIENT *cl, u_int request, void *info)
386177633Sdfr{
387177633Sdfr	struct rc_data *rc = (struct rc_data *)cl->cl_private;
388177633Sdfr
389177633Sdfr	if (info == NULL) {
390177633Sdfr		return (FALSE);
391177633Sdfr	}
392177633Sdfr	switch (request) {
393177633Sdfr	case CLSET_TIMEOUT:
394177633Sdfr		rc->rc_timeout = *(struct timeval *)info;
395177633Sdfr		if (rc->rc_client)
396177633Sdfr			CLNT_CONTROL(rc->rc_client, request, info);
397177633Sdfr		break;
398177633Sdfr
399177633Sdfr	case CLGET_TIMEOUT:
400177633Sdfr		*(struct timeval *)info = rc->rc_timeout;
401177633Sdfr		break;
402177633Sdfr
403177633Sdfr	case CLSET_RETRY_TIMEOUT:
404177633Sdfr		rc->rc_retry = *(struct timeval *)info;
405177633Sdfr		if (rc->rc_client)
406177633Sdfr			CLNT_CONTROL(rc->rc_client, request, info);
407177633Sdfr		break;
408177633Sdfr
409177633Sdfr	case CLGET_RETRY_TIMEOUT:
410177633Sdfr		*(struct timeval *)info = rc->rc_retry;
411177633Sdfr		break;
412177633Sdfr
413177633Sdfr	case CLGET_VERS:
414177633Sdfr		*(uint32_t *)info = rc->rc_vers;
415177633Sdfr		break;
416177633Sdfr
417177633Sdfr	case CLSET_VERS:
418177633Sdfr		rc->rc_vers = *(uint32_t *) info;
419177633Sdfr		if (rc->rc_client)
420177633Sdfr			CLNT_CONTROL(rc->rc_client, CLSET_VERS, info);
421177633Sdfr		break;
422177633Sdfr
423177633Sdfr	case CLGET_PROG:
424177633Sdfr		*(uint32_t *)info = rc->rc_prog;
425177633Sdfr		break;
426177633Sdfr
427177633Sdfr	case CLSET_PROG:
428177633Sdfr		rc->rc_prog = *(uint32_t *) info;
429177633Sdfr		if (rc->rc_client)
430177633Sdfr			CLNT_CONTROL(rc->rc_client, request, info);
431177633Sdfr		break;
432177633Sdfr
433177633Sdfr	case CLSET_WAITCHAN:
434184588Sdfr		rc->rc_waitchan = (char *)info;
435177633Sdfr		if (rc->rc_client)
436177633Sdfr			CLNT_CONTROL(rc->rc_client, request, info);
437177633Sdfr		break;
438177633Sdfr
439177633Sdfr	case CLGET_WAITCHAN:
440177633Sdfr		*(const char **) info = rc->rc_waitchan;
441177633Sdfr		break;
442177633Sdfr
443177633Sdfr	case CLSET_INTERRUPTIBLE:
444177633Sdfr		rc->rc_intr = *(int *) info;
445177633Sdfr		if (rc->rc_client)
446177633Sdfr			CLNT_CONTROL(rc->rc_client, request, info);
447177633Sdfr		break;
448177633Sdfr
449177633Sdfr	case CLGET_INTERRUPTIBLE:
450177633Sdfr		*(int *) info = rc->rc_intr;
451177633Sdfr		break;
452177633Sdfr
453180025Sdfr	case CLSET_RETRIES:
454180025Sdfr		rc->rc_retries = *(int *) info;
455180025Sdfr		break;
456180025Sdfr
457180025Sdfr	case CLGET_RETRIES:
458180025Sdfr		*(int *) info = rc->rc_retries;
459180025Sdfr		break;
460180025Sdfr
461184588Sdfr	case CLSET_PRIVPORT:
462184588Sdfr		rc->rc_privport = *(int *) info;
463184588Sdfr		break;
464184588Sdfr
465184588Sdfr	case CLGET_PRIVPORT:
466184588Sdfr		*(int *) info = rc->rc_privport;
467184588Sdfr		break;
468184588Sdfr
469177633Sdfr	default:
470177633Sdfr		return (FALSE);
471177633Sdfr	}
472177633Sdfr
473177633Sdfr	return (TRUE);
474177633Sdfr}
475177633Sdfr
476177633Sdfrstatic void
477184588Sdfrclnt_reconnect_close(CLIENT *cl)
478184588Sdfr{
479184588Sdfr	struct rc_data *rc = (struct rc_data *)cl->cl_private;
480184588Sdfr	CLIENT *client;
481184588Sdfr
482184588Sdfr	mtx_lock(&rc->rc_lock);
483184588Sdfr
484184588Sdfr	if (rc->rc_closed) {
485184588Sdfr		mtx_unlock(&rc->rc_lock);
486184588Sdfr		return;
487184588Sdfr	}
488184588Sdfr
489184588Sdfr	rc->rc_closed = TRUE;
490184588Sdfr	client = rc->rc_client;
491184588Sdfr	rc->rc_client = NULL;
492184588Sdfr
493184588Sdfr	mtx_unlock(&rc->rc_lock);
494184588Sdfr
495184588Sdfr	if (client) {
496184588Sdfr		CLNT_CLOSE(client);
497184588Sdfr		CLNT_RELEASE(client);
498184588Sdfr	}
499184588Sdfr}
500184588Sdfr
501184588Sdfrstatic void
502177633Sdfrclnt_reconnect_destroy(CLIENT *cl)
503177633Sdfr{
504177633Sdfr	struct rc_data *rc = (struct rc_data *)cl->cl_private;
505177633Sdfr
506177633Sdfr	if (rc->rc_client)
507177633Sdfr		CLNT_DESTROY(rc->rc_client);
508184588Sdfr	crfree(rc->rc_ucred);
509181684Sdfr	mtx_destroy(&rc->rc_lock);
510177633Sdfr	mem_free(rc, sizeof(*rc));
511177633Sdfr	mem_free(cl, sizeof (CLIENT));
512177633Sdfr}
513