clnt_rc.c revision 195703
1177633Sdfr/*-
2177633Sdfr * Copyright (c) 2008 Isilon Inc http://www.isilon.com/
3177633Sdfr * Authors: Doug Rabson <dfr@rabson.org>
4177633Sdfr * Developed with Red Inc: Alfred Perlstein <alfred@freebsd.org>
5177633Sdfr *
6177633Sdfr * Redistribution and use in source and binary forms, with or without
7177633Sdfr * modification, are permitted provided that the following conditions
8177633Sdfr * are met:
9177633Sdfr * 1. Redistributions of source code must retain the above copyright
10177633Sdfr *    notice, this list of conditions and the following disclaimer.
11177633Sdfr * 2. Redistributions in binary form must reproduce the above copyright
12177633Sdfr *    notice, this list of conditions and the following disclaimer in the
13177633Sdfr *    documentation and/or other materials provided with the distribution.
14177633Sdfr *
15177633Sdfr * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16177633Sdfr * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17177633Sdfr * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18177633Sdfr * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19177633Sdfr * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20177633Sdfr * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21177633Sdfr * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22177633Sdfr * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23177633Sdfr * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24177633Sdfr * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25177633Sdfr * SUCH DAMAGE.
26177633Sdfr */
27177633Sdfr
28177633Sdfr#include <sys/cdefs.h>
29177633Sdfr__FBSDID("$FreeBSD: head/sys/rpc/clnt_rc.c 195703 2009-07-14 22:54:29Z kib $");
30177633Sdfr
31177633Sdfr#include <sys/param.h>
32177633Sdfr#include <sys/systm.h>
33184588Sdfr#include <sys/kernel.h>
34180025Sdfr#include <sys/limits.h>
35177633Sdfr#include <sys/lock.h>
36177633Sdfr#include <sys/malloc.h>
37177633Sdfr#include <sys/mbuf.h>
38177633Sdfr#include <sys/mutex.h>
39177633Sdfr#include <sys/pcpu.h>
40177633Sdfr#include <sys/proc.h>
41177633Sdfr#include <sys/socket.h>
42177633Sdfr#include <sys/socketvar.h>
43177633Sdfr#include <sys/time.h>
44177633Sdfr#include <sys/uio.h>
45177633Sdfr
46177633Sdfr#include <rpc/rpc.h>
47177685Sdfr#include <rpc/rpc_com.h>
48177633Sdfr
49180025Sdfrstatic enum clnt_stat clnt_reconnect_call(CLIENT *, struct rpc_callextra *,
50184588Sdfr    rpcproc_t, struct mbuf *, struct mbuf **, struct timeval);
51177633Sdfrstatic void clnt_reconnect_geterr(CLIENT *, struct rpc_err *);
52177633Sdfrstatic bool_t clnt_reconnect_freeres(CLIENT *, xdrproc_t, void *);
53177633Sdfrstatic void clnt_reconnect_abort(CLIENT *);
54177633Sdfrstatic bool_t clnt_reconnect_control(CLIENT *, u_int, void *);
55184588Sdfrstatic void clnt_reconnect_close(CLIENT *);
56177633Sdfrstatic void clnt_reconnect_destroy(CLIENT *);
57177633Sdfr
58177633Sdfrstatic struct clnt_ops clnt_reconnect_ops = {
59177633Sdfr	.cl_call =	clnt_reconnect_call,
60177633Sdfr	.cl_abort =	clnt_reconnect_abort,
61177633Sdfr	.cl_geterr =	clnt_reconnect_geterr,
62177633Sdfr	.cl_freeres =	clnt_reconnect_freeres,
63184588Sdfr	.cl_close =	clnt_reconnect_close,
64177633Sdfr	.cl_destroy =	clnt_reconnect_destroy,
65177633Sdfr	.cl_control =	clnt_reconnect_control
66177633Sdfr};
67177633Sdfr
68184588Sdfrstatic int	fake_wchan;
69184588Sdfr
70177633Sdfrstruct rc_data {
71180025Sdfr	struct mtx		rc_lock;
72177633Sdfr	struct sockaddr_storage	rc_addr; /* server address */
73177633Sdfr	struct netconfig*	rc_nconf; /* network type */
74177633Sdfr	rpcprog_t		rc_prog;  /* program number */
75177633Sdfr	rpcvers_t		rc_vers;  /* version number */
76177633Sdfr	size_t			rc_sendsz;
77177633Sdfr	size_t			rc_recvsz;
78177633Sdfr	struct timeval		rc_timeout;
79177633Sdfr	struct timeval		rc_retry;
80180025Sdfr	int			rc_retries;
81184588Sdfr	int			rc_privport;
82184588Sdfr	char			*rc_waitchan;
83177633Sdfr	int			rc_intr;
84180025Sdfr	int			rc_connecting;
85184588Sdfr	int			rc_closed;
86184588Sdfr	struct ucred		*rc_ucred;
87177633Sdfr	CLIENT*			rc_client; /* underlying RPC client */
88184588Sdfr	struct rpc_err		rc_err;
89177633Sdfr};
90177633Sdfr
91177633SdfrCLIENT *
92177633Sdfrclnt_reconnect_create(
93177633Sdfr	struct netconfig *nconf,	/* network type */
94177633Sdfr	struct sockaddr *svcaddr,	/* servers address */
95177633Sdfr	rpcprog_t program,		/* program number */
96177633Sdfr	rpcvers_t version,		/* version number */
97177633Sdfr	size_t sendsz,			/* buffer recv size */
98177633Sdfr	size_t recvsz)			/* buffer send size */
99177633Sdfr{
100177633Sdfr	CLIENT *cl = NULL;		/* client handle */
101177633Sdfr	struct rc_data *rc = NULL;	/* private data */
102177633Sdfr
103177633Sdfr	if (svcaddr == NULL) {
104177633Sdfr		rpc_createerr.cf_stat = RPC_UNKNOWNADDR;
105177633Sdfr		return (NULL);
106177633Sdfr	}
107177633Sdfr
108177633Sdfr	cl = mem_alloc(sizeof (CLIENT));
109177633Sdfr	rc = mem_alloc(sizeof (*rc));
110180025Sdfr	mtx_init(&rc->rc_lock, "rc->rc_lock", NULL, MTX_DEF);
111177633Sdfr	(void) memcpy(&rc->rc_addr, svcaddr, (size_t)svcaddr->sa_len);
112177633Sdfr	rc->rc_nconf = nconf;
113177633Sdfr	rc->rc_prog = program;
114177633Sdfr	rc->rc_vers = version;
115177633Sdfr	rc->rc_sendsz = sendsz;
116177633Sdfr	rc->rc_recvsz = recvsz;
117177633Sdfr	rc->rc_timeout.tv_sec = -1;
118177633Sdfr	rc->rc_timeout.tv_usec = -1;
119180025Sdfr	rc->rc_retry.tv_sec = 3;
120177633Sdfr	rc->rc_retry.tv_usec = 0;
121180025Sdfr	rc->rc_retries = INT_MAX;
122184588Sdfr	rc->rc_privport = FALSE;
123177633Sdfr	rc->rc_waitchan = "rpcrecv";
124177633Sdfr	rc->rc_intr = 0;
125180025Sdfr	rc->rc_connecting = FALSE;
126184588Sdfr	rc->rc_closed = FALSE;
127184588Sdfr	rc->rc_ucred = crdup(curthread->td_ucred);
128177633Sdfr	rc->rc_client = NULL;
129177633Sdfr
130180025Sdfr	cl->cl_refs = 1;
131177633Sdfr	cl->cl_ops = &clnt_reconnect_ops;
132177633Sdfr	cl->cl_private = (caddr_t)(void *)rc;
133177633Sdfr	cl->cl_auth = authnone_create();
134177633Sdfr	cl->cl_tp = NULL;
135177633Sdfr	cl->cl_netid = NULL;
136177633Sdfr	return (cl);
137177633Sdfr}
138177633Sdfr
139177633Sdfrstatic enum clnt_stat
140177633Sdfrclnt_reconnect_connect(CLIENT *cl)
141177633Sdfr{
142184588Sdfr	struct thread *td = curthread;
143177633Sdfr	struct rc_data *rc = (struct rc_data *)cl->cl_private;
144177633Sdfr	struct socket *so;
145180025Sdfr	enum clnt_stat stat;
146180025Sdfr	int error;
147177633Sdfr	int one = 1;
148184588Sdfr	struct ucred *oldcred;
149194934Srmacklem	CLIENT *newclient = NULL;
150177633Sdfr
151180025Sdfr	mtx_lock(&rc->rc_lock);
152194934Srmacklem	while (rc->rc_connecting) {
153194934Srmacklem		error = msleep(rc, &rc->rc_lock,
154194934Srmacklem		    rc->rc_intr ? PCATCH : 0, "rpcrecon", 0);
155194934Srmacklem		if (error) {
156194934Srmacklem			mtx_unlock(&rc->rc_lock);
157194934Srmacklem			return (RPC_INTR);
158194934Srmacklem		}
159194934Srmacklem	}
160184588Sdfr	if (rc->rc_closed) {
161184588Sdfr		mtx_unlock(&rc->rc_lock);
162184588Sdfr		return (RPC_CANTSEND);
163184588Sdfr	}
164194934Srmacklem	if (rc->rc_client) {
165180025Sdfr		mtx_unlock(&rc->rc_lock);
166180025Sdfr		return (RPC_SUCCESS);
167180025Sdfr	}
168194934Srmacklem
169194934Srmacklem	/*
170194934Srmacklem	 * My turn to attempt a connect. The rc_connecting variable
171194934Srmacklem	 * serializes the following code sequence, so it is guaranteed
172194934Srmacklem	 * that rc_client will still be NULL after it is re-locked below,
173194934Srmacklem	 * since that is the only place it is set non-NULL.
174194934Srmacklem	 */
175194934Srmacklem	rc->rc_connecting = TRUE;
176180025Sdfr	mtx_unlock(&rc->rc_lock);
177180025Sdfr
178177633Sdfr	so = __rpc_nconf2socket(rc->rc_nconf);
179177633Sdfr	if (!so) {
180180025Sdfr		stat = rpc_createerr.cf_stat = RPC_TLIERROR;
181177633Sdfr		rpc_createerr.cf_error.re_errno = 0;
182180025Sdfr		goto out;
183177633Sdfr	}
184188142Sdfr
185188142Sdfr	oldcred = td->td_ucred;
186188142Sdfr	td->td_ucred = rc->rc_ucred;
187184588Sdfr	if (rc->rc_privport)
188184588Sdfr		bindresvport(so, NULL);
189177633Sdfr
190177633Sdfr	if (rc->rc_nconf->nc_semantics == NC_TPI_CLTS)
191194934Srmacklem		newclient = clnt_dg_create(so,
192177633Sdfr		    (struct sockaddr *) &rc->rc_addr, rc->rc_prog, rc->rc_vers,
193177633Sdfr		    rc->rc_sendsz, rc->rc_recvsz);
194177633Sdfr	else
195194934Srmacklem		newclient = clnt_vc_create(so,
196177633Sdfr		    (struct sockaddr *) &rc->rc_addr, rc->rc_prog, rc->rc_vers,
197177633Sdfr		    rc->rc_sendsz, rc->rc_recvsz);
198184588Sdfr	td->td_ucred = oldcred;
199177633Sdfr
200194934Srmacklem	if (!newclient) {
201184588Sdfr		soclose(so);
202184588Sdfr		rc->rc_err = rpc_createerr.cf_error;
203180025Sdfr		stat = rpc_createerr.cf_stat;
204180025Sdfr		goto out;
205180025Sdfr	}
206178112Sdfr
207194934Srmacklem	CLNT_CONTROL(newclient, CLSET_FD_CLOSE, 0);
208194934Srmacklem	CLNT_CONTROL(newclient, CLSET_CONNECT, &one);
209194934Srmacklem	CLNT_CONTROL(newclient, CLSET_TIMEOUT, &rc->rc_timeout);
210194934Srmacklem	CLNT_CONTROL(newclient, CLSET_RETRY_TIMEOUT, &rc->rc_retry);
211194934Srmacklem	CLNT_CONTROL(newclient, CLSET_WAITCHAN, rc->rc_waitchan);
212194934Srmacklem	CLNT_CONTROL(newclient, CLSET_INTERRUPTIBLE, &rc->rc_intr);
213180025Sdfr	stat = RPC_SUCCESS;
214177633Sdfr
215180025Sdfrout:
216180025Sdfr	mtx_lock(&rc->rc_lock);
217194934Srmacklem	KASSERT(rc->rc_client == NULL, ("rc_client not null"));
218194934Srmacklem	if (!rc->rc_closed) {
219194934Srmacklem		rc->rc_client = newclient;
220194934Srmacklem		newclient = NULL;
221184588Sdfr	}
222180025Sdfr	rc->rc_connecting = FALSE;
223180025Sdfr	wakeup(rc);
224180025Sdfr	mtx_unlock(&rc->rc_lock);
225180025Sdfr
226194934Srmacklem	if (newclient) {
227194934Srmacklem		/*
228194934Srmacklem		 * It has been closed, so discard the new client.
229194934Srmacklem		 * nb: clnt_[dg|vc]_close()/clnt_[dg|vc]_destroy() cannot
230194934Srmacklem		 * be called with the rc_lock mutex held, since they may
231194934Srmacklem		 * msleep() while holding a different mutex.
232194934Srmacklem		 */
233194934Srmacklem		CLNT_CLOSE(newclient);
234194934Srmacklem		CLNT_RELEASE(newclient);
235194934Srmacklem	}
236194934Srmacklem
237180025Sdfr	return (stat);
238177633Sdfr}
239177633Sdfr
240177633Sdfrstatic enum clnt_stat
241177633Sdfrclnt_reconnect_call(
242180025Sdfr	CLIENT		*cl,		/* client handle */
243180025Sdfr	struct rpc_callextra *ext,	/* call metadata */
244177633Sdfr	rpcproc_t	proc,		/* procedure number */
245184588Sdfr	struct mbuf	*args,		/* pointer to args */
246184588Sdfr	struct mbuf	**resultsp,	/* pointer to results */
247184588Sdfr	struct timeval	utimeout)
248177633Sdfr{
249177633Sdfr	struct rc_data *rc = (struct rc_data *)cl->cl_private;
250180025Sdfr	CLIENT *client;
251177633Sdfr	enum clnt_stat stat;
252194934Srmacklem	int tries, error;
253177633Sdfr
254180025Sdfr	tries = 0;
255177633Sdfr	do {
256194934Srmacklem		mtx_lock(&rc->rc_lock);
257184588Sdfr		if (rc->rc_closed) {
258194934Srmacklem			mtx_unlock(&rc->rc_lock);
259184588Sdfr			return (RPC_CANTSEND);
260184588Sdfr		}
261184588Sdfr
262178112Sdfr		if (!rc->rc_client) {
263194934Srmacklem			mtx_unlock(&rc->rc_lock);
264178112Sdfr			stat = clnt_reconnect_connect(cl);
265184588Sdfr			if (stat == RPC_SYSTEMERROR) {
266194934Srmacklem				error = tsleep(&fake_wchan,
267195703Skib				    rc->rc_intr ? PCATCH | PBDRY : 0, "rpccon",
268195703Skib				    hz);
269194934Srmacklem				if (error == EINTR || error == ERESTART)
270194934Srmacklem					return (RPC_INTR);
271184588Sdfr				tries++;
272184588Sdfr				if (tries >= rc->rc_retries)
273184588Sdfr					return (stat);
274184588Sdfr				continue;
275184588Sdfr			}
276178112Sdfr			if (stat != RPC_SUCCESS)
277178112Sdfr				return (stat);
278194934Srmacklem			mtx_lock(&rc->rc_lock);
279178112Sdfr		}
280177633Sdfr
281184588Sdfr		if (!rc->rc_client) {
282184588Sdfr			mtx_unlock(&rc->rc_lock);
283184588Sdfr			stat = RPC_FAILED;
284184588Sdfr			continue;
285184588Sdfr		}
286180025Sdfr		CLNT_ACQUIRE(rc->rc_client);
287180025Sdfr		client = rc->rc_client;
288180025Sdfr		mtx_unlock(&rc->rc_lock);
289184588Sdfr		stat = CLNT_CALL_MBUF(client, ext, proc, args,
290184588Sdfr		    resultsp, utimeout);
291177633Sdfr
292184588Sdfr		if (stat != RPC_SUCCESS) {
293184588Sdfr			if (!ext)
294184588Sdfr				CLNT_GETERR(client, &rc->rc_err);
295184588Sdfr		}
296184588Sdfr
297177633Sdfr		if (stat == RPC_TIMEDOUT) {
298177633Sdfr			/*
299177633Sdfr			 * Check for async send misfeature for NLM
300177633Sdfr			 * protocol.
301177633Sdfr			 */
302177633Sdfr			if ((rc->rc_timeout.tv_sec == 0
303177633Sdfr				&& rc->rc_timeout.tv_usec == 0)
304177633Sdfr			    || (rc->rc_timeout.tv_sec == -1
305177633Sdfr				&& utimeout.tv_sec == 0
306180025Sdfr				&& utimeout.tv_usec == 0)) {
307194934Srmacklem				CLNT_RELEASE(client);
308177633Sdfr				break;
309180025Sdfr			}
310177633Sdfr		}
311177633Sdfr
312184588Sdfr		if (stat == RPC_TIMEDOUT || stat == RPC_CANTSEND
313184588Sdfr		    || stat == RPC_CANTRECV) {
314180025Sdfr			tries++;
315194934Srmacklem			if (tries >= rc->rc_retries) {
316194934Srmacklem				CLNT_RELEASE(client);
317180025Sdfr				break;
318194934Srmacklem			}
319180025Sdfr
320180025Sdfr			if (ext && ext->rc_feedback)
321180025Sdfr				ext->rc_feedback(FEEDBACK_RECONNECT, proc,
322180025Sdfr				    ext->rc_feedback_arg);
323180025Sdfr
324180025Sdfr			mtx_lock(&rc->rc_lock);
325180025Sdfr			/*
326180025Sdfr			 * Make sure that someone else hasn't already
327194934Srmacklem			 * reconnected by checking if rc_client has changed.
328194934Srmacklem			 * If not, we are done with the client and must
329194934Srmacklem			 * do CLNT_RELEASE(client) twice to dispose of it,
330194934Srmacklem			 * because there is both an initial refcnt and one
331194934Srmacklem			 * acquired by CLNT_ACQUIRE() above.
332180025Sdfr			 */
333180025Sdfr			if (rc->rc_client == client) {
334180025Sdfr				rc->rc_client = NULL;
335194934Srmacklem				mtx_unlock(&rc->rc_lock);
336194934Srmacklem				CLNT_RELEASE(client);
337194934Srmacklem			} else {
338194934Srmacklem				mtx_unlock(&rc->rc_lock);
339180025Sdfr			}
340194934Srmacklem			CLNT_RELEASE(client);
341184588Sdfr		} else {
342194934Srmacklem			CLNT_RELEASE(client);
343184588Sdfr			break;
344177633Sdfr		}
345177633Sdfr	} while (stat != RPC_SUCCESS);
346177633Sdfr
347184588Sdfr	KASSERT(stat != RPC_SUCCESS || *resultsp,
348184588Sdfr	    ("RPC_SUCCESS without reply"));
349184588Sdfr
350177633Sdfr	return (stat);
351177633Sdfr}
352177633Sdfr
353177633Sdfrstatic void
354177633Sdfrclnt_reconnect_geterr(CLIENT *cl, struct rpc_err *errp)
355177633Sdfr{
356177633Sdfr	struct rc_data *rc = (struct rc_data *)cl->cl_private;
357177633Sdfr
358184588Sdfr	*errp = rc->rc_err;
359177633Sdfr}
360177633Sdfr
361194934Srmacklem/*
362194934Srmacklem * Since this function requires that rc_client be valid, it can
363194934Srmacklem * only be called when that is guaranteed to be the case.
364194934Srmacklem */
365177633Sdfrstatic bool_t
366177633Sdfrclnt_reconnect_freeres(CLIENT *cl, xdrproc_t xdr_res, void *res_ptr)
367177633Sdfr{
368177633Sdfr	struct rc_data *rc = (struct rc_data *)cl->cl_private;
369177633Sdfr
370177633Sdfr	return (CLNT_FREERES(rc->rc_client, xdr_res, res_ptr));
371177633Sdfr}
372177633Sdfr
373177633Sdfr/*ARGSUSED*/
374177633Sdfrstatic void
375177633Sdfrclnt_reconnect_abort(CLIENT *h)
376177633Sdfr{
377177633Sdfr}
378177633Sdfr
379194934Srmacklem/*
380194934Srmacklem * CLNT_CONTROL() on the client returned by clnt_reconnect_create() must
381194934Srmacklem * always be called before CLNT_CALL_MBUF() by a single thread only.
382194934Srmacklem */
383177633Sdfrstatic bool_t
384177633Sdfrclnt_reconnect_control(CLIENT *cl, u_int request, void *info)
385177633Sdfr{
386177633Sdfr	struct rc_data *rc = (struct rc_data *)cl->cl_private;
387177633Sdfr
388177633Sdfr	if (info == NULL) {
389177633Sdfr		return (FALSE);
390177633Sdfr	}
391177633Sdfr	switch (request) {
392177633Sdfr	case CLSET_TIMEOUT:
393177633Sdfr		rc->rc_timeout = *(struct timeval *)info;
394177633Sdfr		if (rc->rc_client)
395177633Sdfr			CLNT_CONTROL(rc->rc_client, request, info);
396177633Sdfr		break;
397177633Sdfr
398177633Sdfr	case CLGET_TIMEOUT:
399177633Sdfr		*(struct timeval *)info = rc->rc_timeout;
400177633Sdfr		break;
401177633Sdfr
402177633Sdfr	case CLSET_RETRY_TIMEOUT:
403177633Sdfr		rc->rc_retry = *(struct timeval *)info;
404177633Sdfr		if (rc->rc_client)
405177633Sdfr			CLNT_CONTROL(rc->rc_client, request, info);
406177633Sdfr		break;
407177633Sdfr
408177633Sdfr	case CLGET_RETRY_TIMEOUT:
409177633Sdfr		*(struct timeval *)info = rc->rc_retry;
410177633Sdfr		break;
411177633Sdfr
412177633Sdfr	case CLGET_VERS:
413177633Sdfr		*(uint32_t *)info = rc->rc_vers;
414177633Sdfr		break;
415177633Sdfr
416177633Sdfr	case CLSET_VERS:
417177633Sdfr		rc->rc_vers = *(uint32_t *) info;
418177633Sdfr		if (rc->rc_client)
419177633Sdfr			CLNT_CONTROL(rc->rc_client, CLSET_VERS, info);
420177633Sdfr		break;
421177633Sdfr
422177633Sdfr	case CLGET_PROG:
423177633Sdfr		*(uint32_t *)info = rc->rc_prog;
424177633Sdfr		break;
425177633Sdfr
426177633Sdfr	case CLSET_PROG:
427177633Sdfr		rc->rc_prog = *(uint32_t *) info;
428177633Sdfr		if (rc->rc_client)
429177633Sdfr			CLNT_CONTROL(rc->rc_client, request, info);
430177633Sdfr		break;
431177633Sdfr
432177633Sdfr	case CLSET_WAITCHAN:
433184588Sdfr		rc->rc_waitchan = (char *)info;
434177633Sdfr		if (rc->rc_client)
435177633Sdfr			CLNT_CONTROL(rc->rc_client, request, info);
436177633Sdfr		break;
437177633Sdfr
438177633Sdfr	case CLGET_WAITCHAN:
439177633Sdfr		*(const char **) info = rc->rc_waitchan;
440177633Sdfr		break;
441177633Sdfr
442177633Sdfr	case CLSET_INTERRUPTIBLE:
443177633Sdfr		rc->rc_intr = *(int *) info;
444177633Sdfr		if (rc->rc_client)
445177633Sdfr			CLNT_CONTROL(rc->rc_client, request, info);
446177633Sdfr		break;
447177633Sdfr
448177633Sdfr	case CLGET_INTERRUPTIBLE:
449177633Sdfr		*(int *) info = rc->rc_intr;
450177633Sdfr		break;
451177633Sdfr
452180025Sdfr	case CLSET_RETRIES:
453180025Sdfr		rc->rc_retries = *(int *) info;
454180025Sdfr		break;
455180025Sdfr
456180025Sdfr	case CLGET_RETRIES:
457180025Sdfr		*(int *) info = rc->rc_retries;
458180025Sdfr		break;
459180025Sdfr
460184588Sdfr	case CLSET_PRIVPORT:
461184588Sdfr		rc->rc_privport = *(int *) info;
462184588Sdfr		break;
463184588Sdfr
464184588Sdfr	case CLGET_PRIVPORT:
465184588Sdfr		*(int *) info = rc->rc_privport;
466184588Sdfr		break;
467184588Sdfr
468177633Sdfr	default:
469177633Sdfr		return (FALSE);
470177633Sdfr	}
471177633Sdfr
472177633Sdfr	return (TRUE);
473177633Sdfr}
474177633Sdfr
475177633Sdfrstatic void
476184588Sdfrclnt_reconnect_close(CLIENT *cl)
477184588Sdfr{
478184588Sdfr	struct rc_data *rc = (struct rc_data *)cl->cl_private;
479184588Sdfr	CLIENT *client;
480184588Sdfr
481184588Sdfr	mtx_lock(&rc->rc_lock);
482184588Sdfr
483184588Sdfr	if (rc->rc_closed) {
484184588Sdfr		mtx_unlock(&rc->rc_lock);
485184588Sdfr		return;
486184588Sdfr	}
487184588Sdfr
488184588Sdfr	rc->rc_closed = TRUE;
489184588Sdfr	client = rc->rc_client;
490184588Sdfr	rc->rc_client = NULL;
491184588Sdfr
492184588Sdfr	mtx_unlock(&rc->rc_lock);
493184588Sdfr
494184588Sdfr	if (client) {
495184588Sdfr		CLNT_CLOSE(client);
496184588Sdfr		CLNT_RELEASE(client);
497184588Sdfr	}
498184588Sdfr}
499184588Sdfr
500184588Sdfrstatic void
501177633Sdfrclnt_reconnect_destroy(CLIENT *cl)
502177633Sdfr{
503177633Sdfr	struct rc_data *rc = (struct rc_data *)cl->cl_private;
504177633Sdfr
505177633Sdfr	if (rc->rc_client)
506177633Sdfr		CLNT_DESTROY(rc->rc_client);
507184588Sdfr	crfree(rc->rc_ucred);
508181684Sdfr	mtx_destroy(&rc->rc_lock);
509177633Sdfr	mem_free(rc, sizeof(*rc));
510177633Sdfr	mem_free(cl, sizeof (CLIENT));
511177633Sdfr}
512