clnt_vc.c revision 75097
174462Salfred/* $NetBSD: clnt_vc.c,v 1.4 2000/07/14 08:40:42 fvdl Exp $ */ 274462Salfred/* $FreeBSD: head/lib/libc/rpc/clnt_vc.c 75097 2001-04-02 22:14:13Z iedowse $ */ 374462Salfred 474462Salfred/* 574462Salfred * Sun RPC is a product of Sun Microsystems, Inc. and is provided for 674462Salfred * unrestricted use provided that this legend is included on all tape 774462Salfred * media and as a part of the software program in whole or part. Users 874462Salfred * may copy or modify Sun RPC without charge, but are not authorized 974462Salfred * to license or distribute it to anyone else except as part of a product or 1074462Salfred * program developed by the user. 1174462Salfred * 1274462Salfred * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE 1374462Salfred * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR 1474462Salfred * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE. 1574462Salfred * 1674462Salfred * Sun RPC is provided with no support and without any obligation on the 1774462Salfred * part of Sun Microsystems, Inc. to assist in its use, correction, 1874462Salfred * modification or enhancement. 1974462Salfred * 2074462Salfred * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE 2174462Salfred * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC 2274462Salfred * OR ANY PART THEREOF. 2374462Salfred * 2474462Salfred * In no event will Sun Microsystems, Inc. be liable for any lost revenue 2574462Salfred * or profits or other special, indirect and consequential damages, even if 2674462Salfred * Sun has been advised of the possibility of such damages. 2774462Salfred * 2874462Salfred * Sun Microsystems, Inc. 2974462Salfred * 2550 Garcia Avenue 3074462Salfred * Mountain View, California 94043 3174462Salfred */ 3274462Salfred 3374462Salfred#include <sys/cdefs.h> 3474462Salfred#if defined(LIBC_SCCS) && !defined(lint) 3574462Salfredstatic char *sccsid = "@(#)clnt_tcp.c 1.37 87/10/05 Copyr 1984 Sun Micro"; 3674462Salfredstatic char *sccsid = "@(#)clnt_tcp.c 2.2 88/08/01 4.0 RPCSRC"; 3774462Salfredstatic char sccsid[] = "@(#)clnt_vc.c 1.19 89/03/16 Copyr 1988 Sun Micro"; 3874462Salfred#endif 3974462Salfred 4074462Salfred/* 4174462Salfred * clnt_tcp.c, Implements a TCP/IP based, client side RPC. 4274462Salfred * 4374462Salfred * Copyright (C) 1984, Sun Microsystems, Inc. 4474462Salfred * 4574462Salfred * TCP based RPC supports 'batched calls'. 4674462Salfred * A sequence of calls may be batched-up in a send buffer. The rpc call 4774462Salfred * return immediately to the client even though the call was not necessarily 4874462Salfred * sent. The batching occurs if the results' xdr routine is NULL (0) AND 4974462Salfred * the rpc timeout value is zero (see clnt.h, rpc). 5074462Salfred * 5174462Salfred * Clients should NOT casually batch calls that in fact return results; that is, 5274462Salfred * the server side should be aware that a call is batched and not produce any 5374462Salfred * return message. Batched calls that produce many result messages can 5474462Salfred * deadlock (netlock) the client and the server.... 5574462Salfred * 5674462Salfred * Now go hang yourself. 5774462Salfred */ 5874462Salfred 5975094Siedowse#include "namespace.h" 6074462Salfred#include "reentrant.h" 6174462Salfred#include <sys/types.h> 6274462Salfred#include <sys/poll.h> 6374462Salfred#include <sys/syslog.h> 6474462Salfred#include <sys/socket.h> 6574462Salfred#include <sys/un.h> 6674462Salfred#include <sys/uio.h> 6774462Salfred 6874462Salfred#include <assert.h> 6974462Salfred#include <err.h> 7074462Salfred#include <errno.h> 7174462Salfred#include <netdb.h> 7274462Salfred#include <stdio.h> 7374462Salfred#include <stdlib.h> 7474462Salfred#include <string.h> 7574462Salfred#include <unistd.h> 7674462Salfred#include <signal.h> 7774462Salfred 7874462Salfred#include <rpc/rpc.h> 7974462Salfred#include "un-namespace.h" 8074462Salfred#include "rpc_com.h" 8174462Salfred 8274462Salfred#define MCALL_MSG_SIZE 24 8374462Salfred 8474660Salfredstruct cmessage { 8574660Salfred struct cmsghdr cmsg; 8674660Salfred struct cmsgcred cmcred; 8774660Salfred}; 8874660Salfred 8974462Salfredstatic enum clnt_stat clnt_vc_call __P((CLIENT *, rpcproc_t, xdrproc_t, caddr_t, 9074462Salfred xdrproc_t, caddr_t, struct timeval)); 9174462Salfredstatic void clnt_vc_geterr __P((CLIENT *, struct rpc_err *)); 9274462Salfredstatic bool_t clnt_vc_freeres __P((CLIENT *, xdrproc_t, caddr_t)); 9374462Salfredstatic void clnt_vc_abort __P((CLIENT *)); 9474462Salfredstatic bool_t clnt_vc_control __P((CLIENT *, u_int, char *)); 9574462Salfredstatic void clnt_vc_destroy __P((CLIENT *)); 9674462Salfredstatic struct clnt_ops *clnt_vc_ops __P((void)); 9774462Salfredstatic bool_t time_not_ok __P((struct timeval *)); 9874462Salfredstatic int read_vc __P((caddr_t, caddr_t, int)); 9974462Salfredstatic int write_vc __P((caddr_t, caddr_t, int)); 10074462Salfredstatic int __msgwrite(int, void *, size_t); 10174462Salfredstatic int __msgread(int, void *, size_t); 10274462Salfred 10374462Salfredstruct ct_data { 10474462Salfred int ct_fd; /* connection's fd */ 10574462Salfred bool_t ct_closeit; /* close it on destroy */ 10674462Salfred struct timeval ct_wait; /* wait interval in milliseconds */ 10774462Salfred bool_t ct_waitset; /* wait set by clnt_control? */ 10874462Salfred struct netbuf ct_addr; /* remote addr */ 10974462Salfred struct rpc_err ct_error; 11074462Salfred union { 11174462Salfred char ct_mcallc[MCALL_MSG_SIZE]; /* marshalled callmsg */ 11274462Salfred u_int32_t ct_mcalli; 11374462Salfred } ct_u; 11474462Salfred u_int ct_mpos; /* pos after marshal */ 11574462Salfred XDR ct_xdrs; /* XDR stream */ 11674462Salfred}; 11774462Salfred 11874462Salfred/* 11974462Salfred * This machinery implements per-fd locks for MT-safety. It is not 12074462Salfred * sufficient to do per-CLIENT handle locks for MT-safety because a 12174462Salfred * user may create more than one CLIENT handle with the same fd behind 12274462Salfred * it. Therfore, we allocate an array of flags (vc_fd_locks), protected 12374462Salfred * by the clnt_fd_lock mutex, and an array (vc_cv) of condition variables 12474462Salfred * similarly protected. Vc_fd_lock[fd] == 1 => a call is activte on some 12574462Salfred * CLIENT handle created for that fd. 12674462Salfred * The current implementation holds locks across the entire RPC and reply. 12774462Salfred * Yes, this is silly, and as soon as this code is proven to work, this 12874462Salfred * should be the first thing fixed. One step at a time. 12974462Salfred */ 13074462Salfredstatic int *vc_fd_locks; 13174462Salfredextern mutex_t clnt_fd_lock; 13274462Salfredstatic cond_t *vc_cv; 13374462Salfred#define release_fd_lock(fd, mask) { \ 13474462Salfred mutex_lock(&clnt_fd_lock); \ 13574462Salfred if (__isthreaded) \ 13674462Salfred vc_fd_locks[fd] = 0; \ 13774462Salfred mutex_unlock(&clnt_fd_lock); \ 13874462Salfred thr_sigsetmask(SIG_SETMASK, &(mask), (sigset_t *) NULL); \ 13974462Salfred cond_signal(&vc_cv[fd]); \ 14074462Salfred} 14174462Salfred 14274462Salfredstatic const char clnt_vc_errstr[] = "%s : %s"; 14374462Salfredstatic const char clnt_vc_str[] = "clnt_vc_create"; 14474462Salfredstatic const char clnt_read_vc_str[] = "read_vc"; 14574462Salfredstatic const char __no_mem_str[] = "out of memory"; 14674462Salfred 14774462Salfred/* 14874462Salfred * Create a client handle for a connection. 14974462Salfred * Default options are set, which the user can change using clnt_control()'s. 15074462Salfred * The rpc/vc package does buffering similar to stdio, so the client 15174462Salfred * must pick send and receive buffer sizes, 0 => use the default. 15274462Salfred * NB: fd is copied into a private area. 15374462Salfred * NB: The rpch->cl_auth is set null authentication. Caller may wish to 15474462Salfred * set this something more useful. 15574462Salfred * 15674462Salfred * fd should be an open socket 15774462Salfred */ 15874462SalfredCLIENT * 15974462Salfredclnt_vc_create(fd, raddr, prog, vers, sendsz, recvsz) 16074462Salfred int fd; /* open file descriptor */ 16174462Salfred const struct netbuf *raddr; /* servers address */ 16274462Salfred rpcprog_t prog; /* program number */ 16374462Salfred rpcvers_t vers; /* version number */ 16474462Salfred u_int sendsz; /* buffer recv size */ 16574462Salfred u_int recvsz; /* buffer send size */ 16674462Salfred{ 16774462Salfred CLIENT *cl; /* client handle */ 16874462Salfred struct ct_data *ct = NULL; /* client handle */ 16974462Salfred struct timeval now; 17074462Salfred struct rpc_msg call_msg; 17174462Salfred static u_int32_t disrupt; 17274462Salfred sigset_t mask; 17374462Salfred sigset_t newmask; 17474462Salfred struct sockaddr_storage ss; 17574462Salfred socklen_t slen; 17674462Salfred struct __rpc_sockinfo si; 17774462Salfred 17874462Salfred if (disrupt == 0) 17974462Salfred disrupt = (u_int32_t)(long)raddr; 18074462Salfred 18174462Salfred cl = (CLIENT *)mem_alloc(sizeof (*cl)); 18274462Salfred ct = (struct ct_data *)mem_alloc(sizeof (*ct)); 18374462Salfred if ((cl == (CLIENT *)NULL) || (ct == (struct ct_data *)NULL)) { 18474462Salfred (void) syslog(LOG_ERR, clnt_vc_errstr, 18574462Salfred clnt_vc_str, __no_mem_str); 18674462Salfred rpc_createerr.cf_stat = RPC_SYSTEMERROR; 18774462Salfred rpc_createerr.cf_error.re_errno = errno; 18874462Salfred goto err; 18974462Salfred } 19074462Salfred ct->ct_addr.buf = NULL; 19174462Salfred sigfillset(&newmask); 19274462Salfred thr_sigsetmask(SIG_SETMASK, &newmask, &mask); 19374462Salfred mutex_lock(&clnt_fd_lock); 19474462Salfred if (vc_fd_locks == (int *) NULL) { 19574462Salfred int cv_allocsz, fd_allocsz; 19674462Salfred int dtbsize = __rpc_dtbsize(); 19774462Salfred 19874462Salfred fd_allocsz = dtbsize * sizeof (int); 19974462Salfred vc_fd_locks = (int *) mem_alloc(fd_allocsz); 20074462Salfred if (vc_fd_locks == (int *) NULL) { 20174462Salfred mutex_unlock(&clnt_fd_lock); 20274462Salfred thr_sigsetmask(SIG_SETMASK, &(mask), NULL); 20374462Salfred goto err; 20474462Salfred } else 20574462Salfred memset(vc_fd_locks, '\0', fd_allocsz); 20674462Salfred 20774462Salfred assert(vc_cv == (cond_t *) NULL); 20874462Salfred cv_allocsz = dtbsize * sizeof (cond_t); 20974462Salfred vc_cv = (cond_t *) mem_alloc(cv_allocsz); 21074462Salfred if (vc_cv == (cond_t *) NULL) { 21174462Salfred mem_free(vc_fd_locks, fd_allocsz); 21274462Salfred vc_fd_locks = (int *) NULL; 21374462Salfred mutex_unlock(&clnt_fd_lock); 21474462Salfred thr_sigsetmask(SIG_SETMASK, &(mask), NULL); 21574462Salfred goto err; 21674462Salfred } else { 21774462Salfred int i; 21874462Salfred 21974462Salfred for (i = 0; i < dtbsize; i++) 22074462Salfred cond_init(&vc_cv[i], 0, (void *) 0); 22174462Salfred } 22274462Salfred } else 22374462Salfred assert(vc_cv != (cond_t *) NULL); 22474462Salfred 22574462Salfred /* 22674462Salfred * XXX - fvdl connecting while holding a mutex? 22774462Salfred */ 22874462Salfred slen = sizeof ss; 22974462Salfred if (_getpeername(fd, (struct sockaddr *)(void *)&ss, &slen) < 0) { 23074462Salfred if (errno != ENOTCONN) { 23174462Salfred rpc_createerr.cf_stat = RPC_SYSTEMERROR; 23274462Salfred rpc_createerr.cf_error.re_errno = errno; 23374462Salfred mutex_unlock(&clnt_fd_lock); 23475097Siedowse thr_sigsetmask(SIG_SETMASK, &(mask), NULL); 23574462Salfred goto err; 23674462Salfred } 23774462Salfred if (_connect(fd, (struct sockaddr *)raddr->buf, raddr->len) < 0){ 23874462Salfred rpc_createerr.cf_stat = RPC_SYSTEMERROR; 23974462Salfred rpc_createerr.cf_error.re_errno = errno; 24074462Salfred mutex_unlock(&clnt_fd_lock); 24175097Siedowse thr_sigsetmask(SIG_SETMASK, &(mask), NULL); 24274462Salfred goto err; 24374462Salfred } 24474462Salfred } 24574462Salfred mutex_unlock(&clnt_fd_lock); 24674462Salfred if (!__rpc_fd2sockinfo(fd, &si)) 24774462Salfred goto err; 24874462Salfred thr_sigsetmask(SIG_SETMASK, &(mask), NULL); 24974462Salfred 25074462Salfred ct->ct_closeit = FALSE; 25174462Salfred 25274462Salfred /* 25374462Salfred * Set up private data struct 25474462Salfred */ 25574462Salfred ct->ct_fd = fd; 25674462Salfred ct->ct_wait.tv_usec = 0; 25774462Salfred ct->ct_waitset = FALSE; 25874462Salfred ct->ct_addr.buf = malloc(raddr->maxlen); 25974462Salfred if (ct->ct_addr.buf == NULL) 26074462Salfred goto err; 26174462Salfred memcpy(ct->ct_addr.buf, &raddr->buf, raddr->len); 26274462Salfred ct->ct_addr.len = raddr->maxlen; 26374462Salfred ct->ct_addr.maxlen = raddr->maxlen; 26474462Salfred 26574462Salfred /* 26674462Salfred * Initialize call message 26774462Salfred */ 26874462Salfred (void)gettimeofday(&now, NULL); 26974462Salfred call_msg.rm_xid = ((u_int32_t)++disrupt) ^ __RPC_GETXID(&now); 27074462Salfred call_msg.rm_direction = CALL; 27174462Salfred call_msg.rm_call.cb_rpcvers = RPC_MSG_VERSION; 27274462Salfred call_msg.rm_call.cb_prog = (u_int32_t)prog; 27374462Salfred call_msg.rm_call.cb_vers = (u_int32_t)vers; 27474462Salfred 27574462Salfred /* 27674462Salfred * pre-serialize the static part of the call msg and stash it away 27774462Salfred */ 27874462Salfred xdrmem_create(&(ct->ct_xdrs), ct->ct_u.ct_mcallc, MCALL_MSG_SIZE, 27974462Salfred XDR_ENCODE); 28074462Salfred if (! xdr_callhdr(&(ct->ct_xdrs), &call_msg)) { 28174462Salfred if (ct->ct_closeit) { 28274462Salfred (void)_close(fd); 28374462Salfred } 28474462Salfred goto err; 28574462Salfred } 28674462Salfred ct->ct_mpos = XDR_GETPOS(&(ct->ct_xdrs)); 28774462Salfred XDR_DESTROY(&(ct->ct_xdrs)); 28874462Salfred 28974462Salfred /* 29074462Salfred * Create a client handle which uses xdrrec for serialization 29174462Salfred * and authnone for authentication. 29274462Salfred */ 29374462Salfred cl->cl_ops = clnt_vc_ops(); 29474462Salfred cl->cl_private = ct; 29574462Salfred cl->cl_auth = authnone_create(); 29674462Salfred sendsz = __rpc_get_t_size(si.si_af, si.si_proto, (int)sendsz); 29774462Salfred recvsz = __rpc_get_t_size(si.si_af, si.si_proto, (int)recvsz); 29874462Salfred xdrrec_create(&(ct->ct_xdrs), sendsz, recvsz, 29974462Salfred cl->cl_private, read_vc, write_vc); 30074462Salfred return (cl); 30174462Salfred 30274462Salfrederr: 30374462Salfred if (cl) { 30474462Salfred if (ct) { 30574462Salfred if (ct->ct_addr.len) 30674462Salfred mem_free(ct->ct_addr.buf, ct->ct_addr.len); 30774462Salfred mem_free((caddr_t)ct, sizeof (struct ct_data)); 30874462Salfred } 30974462Salfred if (cl) 31074462Salfred mem_free((caddr_t)cl, sizeof (CLIENT)); 31174462Salfred } 31274462Salfred return ((CLIENT *)NULL); 31374462Salfred} 31474462Salfred 31574462Salfredstatic enum clnt_stat 31674462Salfredclnt_vc_call(cl, proc, xdr_args, args_ptr, xdr_results, results_ptr, timeout) 31774462Salfred CLIENT *cl; 31874462Salfred rpcproc_t proc; 31974462Salfred xdrproc_t xdr_args; 32074462Salfred caddr_t args_ptr; 32174462Salfred xdrproc_t xdr_results; 32274462Salfred caddr_t results_ptr; 32374462Salfred struct timeval timeout; 32474462Salfred{ 32574462Salfred struct ct_data *ct = (struct ct_data *) cl->cl_private; 32674462Salfred XDR *xdrs = &(ct->ct_xdrs); 32774462Salfred struct rpc_msg reply_msg; 32874462Salfred u_int32_t x_id; 32974462Salfred u_int32_t *msg_x_id = &ct->ct_u.ct_mcalli; /* yuk */ 33074462Salfred bool_t shipnow; 33174462Salfred int refreshes = 2; 33274462Salfred sigset_t mask, newmask; 33374462Salfred int rpc_lock_value; 33474462Salfred 33574462Salfred assert(cl != NULL); 33674462Salfred 33774462Salfred sigfillset(&newmask); 33874462Salfred thr_sigsetmask(SIG_SETMASK, &newmask, &mask); 33974462Salfred mutex_lock(&clnt_fd_lock); 34074462Salfred while (vc_fd_locks[ct->ct_fd]) 34174462Salfred cond_wait(&vc_cv[ct->ct_fd], &clnt_fd_lock); 34274462Salfred if (__isthreaded) 34374462Salfred rpc_lock_value = 1; 34474462Salfred else 34574462Salfred rpc_lock_value = 0; 34674462Salfred vc_fd_locks[ct->ct_fd] = rpc_lock_value; 34774462Salfred mutex_unlock(&clnt_fd_lock); 34874462Salfred if (!ct->ct_waitset) { 34974462Salfred /* If time is not within limits, we ignore it. */ 35074462Salfred if (time_not_ok(&timeout) == FALSE) 35174462Salfred ct->ct_wait = timeout; 35274462Salfred } 35374462Salfred 35474462Salfred shipnow = 35574462Salfred (xdr_results == NULL && timeout.tv_sec == 0 35674462Salfred && timeout.tv_usec == 0) ? FALSE : TRUE; 35774462Salfred 35874462Salfredcall_again: 35974462Salfred xdrs->x_op = XDR_ENCODE; 36074462Salfred ct->ct_error.re_status = RPC_SUCCESS; 36174462Salfred x_id = ntohl(--(*msg_x_id)); 36274462Salfred 36374462Salfred if ((! XDR_PUTBYTES(xdrs, ct->ct_u.ct_mcallc, ct->ct_mpos)) || 36474462Salfred (! XDR_PUTINT32(xdrs, &proc)) || 36574462Salfred (! AUTH_MARSHALL(cl->cl_auth, xdrs)) || 36674462Salfred (! (*xdr_args)(xdrs, args_ptr))) { 36774462Salfred if (ct->ct_error.re_status == RPC_SUCCESS) 36874462Salfred ct->ct_error.re_status = RPC_CANTENCODEARGS; 36974462Salfred (void)xdrrec_endofrecord(xdrs, TRUE); 37074462Salfred release_fd_lock(ct->ct_fd, mask); 37174462Salfred return (ct->ct_error.re_status); 37274462Salfred } 37374462Salfred if (! xdrrec_endofrecord(xdrs, shipnow)) { 37474462Salfred release_fd_lock(ct->ct_fd, mask); 37574462Salfred return (ct->ct_error.re_status = RPC_CANTSEND); 37674462Salfred } 37774462Salfred if (! shipnow) { 37874462Salfred release_fd_lock(ct->ct_fd, mask); 37974462Salfred return (RPC_SUCCESS); 38074462Salfred } 38174462Salfred /* 38274462Salfred * Hack to provide rpc-based message passing 38374462Salfred */ 38474462Salfred if (timeout.tv_sec == 0 && timeout.tv_usec == 0) { 38574462Salfred release_fd_lock(ct->ct_fd, mask); 38674462Salfred return(ct->ct_error.re_status = RPC_TIMEDOUT); 38774462Salfred } 38874462Salfred 38974462Salfred 39074462Salfred /* 39174462Salfred * Keep receiving until we get a valid transaction id 39274462Salfred */ 39374462Salfred xdrs->x_op = XDR_DECODE; 39474462Salfred while (TRUE) { 39574462Salfred reply_msg.acpted_rply.ar_verf = _null_auth; 39674462Salfred reply_msg.acpted_rply.ar_results.where = NULL; 39774462Salfred reply_msg.acpted_rply.ar_results.proc = (xdrproc_t)xdr_void; 39874462Salfred if (! xdrrec_skiprecord(xdrs)) { 39974462Salfred release_fd_lock(ct->ct_fd, mask); 40074462Salfred return (ct->ct_error.re_status); 40174462Salfred } 40274462Salfred /* now decode and validate the response header */ 40374462Salfred if (! xdr_replymsg(xdrs, &reply_msg)) { 40474462Salfred if (ct->ct_error.re_status == RPC_SUCCESS) 40574462Salfred continue; 40674462Salfred release_fd_lock(ct->ct_fd, mask); 40774462Salfred return (ct->ct_error.re_status); 40874462Salfred } 40974462Salfred if (reply_msg.rm_xid == x_id) 41074462Salfred break; 41174462Salfred } 41274462Salfred 41374462Salfred /* 41474462Salfred * process header 41574462Salfred */ 41674462Salfred _seterr_reply(&reply_msg, &(ct->ct_error)); 41774462Salfred if (ct->ct_error.re_status == RPC_SUCCESS) { 41874462Salfred if (! AUTH_VALIDATE(cl->cl_auth, 41974462Salfred &reply_msg.acpted_rply.ar_verf)) { 42074462Salfred ct->ct_error.re_status = RPC_AUTHERROR; 42174462Salfred ct->ct_error.re_why = AUTH_INVALIDRESP; 42274462Salfred } else if (! (*xdr_results)(xdrs, results_ptr)) { 42374462Salfred if (ct->ct_error.re_status == RPC_SUCCESS) 42474462Salfred ct->ct_error.re_status = RPC_CANTDECODERES; 42574462Salfred } 42674462Salfred /* free verifier ... */ 42774462Salfred if (reply_msg.acpted_rply.ar_verf.oa_base != NULL) { 42874462Salfred xdrs->x_op = XDR_FREE; 42974462Salfred (void)xdr_opaque_auth(xdrs, 43074462Salfred &(reply_msg.acpted_rply.ar_verf)); 43174462Salfred } 43274462Salfred } /* end successful completion */ 43374462Salfred else { 43474462Salfred /* maybe our credentials need to be refreshed ... */ 43574462Salfred if (refreshes-- && AUTH_REFRESH(cl->cl_auth, &reply_msg)) 43674462Salfred goto call_again; 43774462Salfred } /* end of unsuccessful completion */ 43874462Salfred release_fd_lock(ct->ct_fd, mask); 43974462Salfred return (ct->ct_error.re_status); 44074462Salfred} 44174462Salfred 44274462Salfredstatic void 44374462Salfredclnt_vc_geterr(cl, errp) 44474462Salfred CLIENT *cl; 44574462Salfred struct rpc_err *errp; 44674462Salfred{ 44774462Salfred struct ct_data *ct; 44874462Salfred 44974462Salfred assert(cl != NULL); 45074462Salfred assert(errp != NULL); 45174462Salfred 45274462Salfred ct = (struct ct_data *) cl->cl_private; 45374462Salfred *errp = ct->ct_error; 45474462Salfred} 45574462Salfred 45674462Salfredstatic bool_t 45774462Salfredclnt_vc_freeres(cl, xdr_res, res_ptr) 45874462Salfred CLIENT *cl; 45974462Salfred xdrproc_t xdr_res; 46074462Salfred caddr_t res_ptr; 46174462Salfred{ 46274462Salfred struct ct_data *ct; 46374462Salfred XDR *xdrs; 46474462Salfred bool_t dummy; 46574462Salfred sigset_t mask; 46674462Salfred sigset_t newmask; 46774462Salfred 46874462Salfred assert(cl != NULL); 46974462Salfred 47074462Salfred ct = (struct ct_data *)cl->cl_private; 47174462Salfred xdrs = &(ct->ct_xdrs); 47274462Salfred 47374462Salfred sigfillset(&newmask); 47474462Salfred thr_sigsetmask(SIG_SETMASK, &newmask, &mask); 47574462Salfred mutex_lock(&clnt_fd_lock); 47674462Salfred while (vc_fd_locks[ct->ct_fd]) 47774462Salfred cond_wait(&vc_cv[ct->ct_fd], &clnt_fd_lock); 47874462Salfred xdrs->x_op = XDR_FREE; 47974462Salfred dummy = (*xdr_res)(xdrs, res_ptr); 48074462Salfred mutex_unlock(&clnt_fd_lock); 48174462Salfred thr_sigsetmask(SIG_SETMASK, &(mask), NULL); 48274462Salfred cond_signal(&vc_cv[ct->ct_fd]); 48374462Salfred 48474462Salfred return dummy; 48574462Salfred} 48674462Salfred 48774462Salfred/*ARGSUSED*/ 48874462Salfredstatic void 48974462Salfredclnt_vc_abort(cl) 49074462Salfred CLIENT *cl; 49174462Salfred{ 49274462Salfred} 49374462Salfred 49474462Salfredstatic bool_t 49574462Salfredclnt_vc_control(cl, request, info) 49674462Salfred CLIENT *cl; 49774462Salfred u_int request; 49874462Salfred char *info; 49974462Salfred{ 50074462Salfred struct ct_data *ct; 50174462Salfred void *infop = info; 50274462Salfred sigset_t mask; 50374462Salfred sigset_t newmask; 50474462Salfred int rpc_lock_value; 50574462Salfred 50674462Salfred assert(cl != NULL); 50774462Salfred 50874462Salfred ct = (struct ct_data *)cl->cl_private; 50974462Salfred 51074462Salfred sigfillset(&newmask); 51174462Salfred thr_sigsetmask(SIG_SETMASK, &newmask, &mask); 51274462Salfred mutex_lock(&clnt_fd_lock); 51374462Salfred while (vc_fd_locks[ct->ct_fd]) 51474462Salfred cond_wait(&vc_cv[ct->ct_fd], &clnt_fd_lock); 51574462Salfred if (__isthreaded) 51674462Salfred rpc_lock_value = 1; 51774462Salfred else 51874462Salfred rpc_lock_value = 0; 51974462Salfred vc_fd_locks[ct->ct_fd] = rpc_lock_value; 52074462Salfred mutex_unlock(&clnt_fd_lock); 52174462Salfred 52274462Salfred switch (request) { 52374462Salfred case CLSET_FD_CLOSE: 52474462Salfred ct->ct_closeit = TRUE; 52574462Salfred release_fd_lock(ct->ct_fd, mask); 52674462Salfred return (TRUE); 52774462Salfred case CLSET_FD_NCLOSE: 52874462Salfred ct->ct_closeit = FALSE; 52974462Salfred release_fd_lock(ct->ct_fd, mask); 53074462Salfred return (TRUE); 53174462Salfred default: 53274462Salfred break; 53374462Salfred } 53474462Salfred 53574462Salfred /* for other requests which use info */ 53674462Salfred if (info == NULL) { 53774462Salfred release_fd_lock(ct->ct_fd, mask); 53874462Salfred return (FALSE); 53974462Salfred } 54074462Salfred switch (request) { 54174462Salfred case CLSET_TIMEOUT: 54274462Salfred if (time_not_ok((struct timeval *)(void *)info)) { 54374462Salfred release_fd_lock(ct->ct_fd, mask); 54474462Salfred return (FALSE); 54574462Salfred } 54674462Salfred ct->ct_wait = *(struct timeval *)infop; 54774462Salfred ct->ct_waitset = TRUE; 54874462Salfred break; 54974462Salfred case CLGET_TIMEOUT: 55074462Salfred *(struct timeval *)infop = ct->ct_wait; 55174462Salfred break; 55274462Salfred case CLGET_SERVER_ADDR: 55374462Salfred (void) memcpy(info, ct->ct_addr.buf, (size_t)ct->ct_addr.len); 55474462Salfred break; 55574462Salfred case CLGET_FD: 55674462Salfred *(int *)(void *)info = ct->ct_fd; 55774462Salfred break; 55874462Salfred case CLGET_SVC_ADDR: 55974462Salfred /* The caller should not free this memory area */ 56074462Salfred *(struct netbuf *)(void *)info = ct->ct_addr; 56174462Salfred break; 56274462Salfred case CLSET_SVC_ADDR: /* set to new address */ 56374462Salfred release_fd_lock(ct->ct_fd, mask); 56474462Salfred return (FALSE); 56574462Salfred case CLGET_XID: 56674462Salfred /* 56774462Salfred * use the knowledge that xid is the 56874462Salfred * first element in the call structure 56974462Salfred * This will get the xid of the PREVIOUS call 57074462Salfred */ 57174462Salfred *(u_int32_t *)(void *)info = 57274462Salfred ntohl(*(u_int32_t *)(void *)&ct->ct_u.ct_mcalli); 57374462Salfred break; 57474462Salfred case CLSET_XID: 57574462Salfred /* This will set the xid of the NEXT call */ 57674462Salfred *(u_int32_t *)(void *)&ct->ct_u.ct_mcalli = 57774462Salfred htonl(*((u_int32_t *)(void *)info) + 1); 57874462Salfred /* increment by 1 as clnt_vc_call() decrements once */ 57974462Salfred break; 58074462Salfred case CLGET_VERS: 58174462Salfred /* 58274462Salfred * This RELIES on the information that, in the call body, 58374462Salfred * the version number field is the fifth field from the 58474462Salfred * begining of the RPC header. MUST be changed if the 58574462Salfred * call_struct is changed 58674462Salfred */ 58774462Salfred *(u_int32_t *)(void *)info = 58874462Salfred ntohl(*(u_int32_t *)(void *)(ct->ct_u.ct_mcallc + 58974462Salfred 4 * BYTES_PER_XDR_UNIT)); 59074462Salfred break; 59174462Salfred 59274462Salfred case CLSET_VERS: 59374462Salfred *(u_int32_t *)(void *)(ct->ct_u.ct_mcallc + 59474462Salfred 4 * BYTES_PER_XDR_UNIT) = 59574462Salfred htonl(*(u_int32_t *)(void *)info); 59674462Salfred break; 59774462Salfred 59874462Salfred case CLGET_PROG: 59974462Salfred /* 60074462Salfred * This RELIES on the information that, in the call body, 60174462Salfred * the program number field is the fourth field from the 60274462Salfred * begining of the RPC header. MUST be changed if the 60374462Salfred * call_struct is changed 60474462Salfred */ 60574462Salfred *(u_int32_t *)(void *)info = 60674462Salfred ntohl(*(u_int32_t *)(void *)(ct->ct_u.ct_mcallc + 60774462Salfred 3 * BYTES_PER_XDR_UNIT)); 60874462Salfred break; 60974462Salfred 61074462Salfred case CLSET_PROG: 61174462Salfred *(u_int32_t *)(void *)(ct->ct_u.ct_mcallc + 61274462Salfred 3 * BYTES_PER_XDR_UNIT) = 61374462Salfred htonl(*(u_int32_t *)(void *)info); 61474462Salfred break; 61574462Salfred 61674462Salfred default: 61774462Salfred release_fd_lock(ct->ct_fd, mask); 61874462Salfred return (FALSE); 61974462Salfred } 62074462Salfred release_fd_lock(ct->ct_fd, mask); 62174462Salfred return (TRUE); 62274462Salfred} 62374462Salfred 62474462Salfred 62574462Salfredstatic void 62674462Salfredclnt_vc_destroy(cl) 62774462Salfred CLIENT *cl; 62874462Salfred{ 62974462Salfred struct ct_data *ct = (struct ct_data *) cl->cl_private; 63074462Salfred int ct_fd = ct->ct_fd; 63174462Salfred sigset_t mask; 63274462Salfred sigset_t newmask; 63374462Salfred 63474462Salfred assert(cl != NULL); 63574462Salfred 63674462Salfred ct = (struct ct_data *) cl->cl_private; 63774462Salfred 63874462Salfred sigfillset(&newmask); 63974462Salfred thr_sigsetmask(SIG_SETMASK, &newmask, &mask); 64074462Salfred mutex_lock(&clnt_fd_lock); 64174462Salfred while (vc_fd_locks[ct_fd]) 64274462Salfred cond_wait(&vc_cv[ct_fd], &clnt_fd_lock); 64374462Salfred if (ct->ct_closeit && ct->ct_fd != -1) { 64474462Salfred (void)_close(ct->ct_fd); 64574462Salfred } 64674462Salfred XDR_DESTROY(&(ct->ct_xdrs)); 64774462Salfred if (ct->ct_addr.buf) 64874462Salfred free(ct->ct_addr.buf); 64974462Salfred mem_free(ct, sizeof(struct ct_data)); 65074462Salfred mem_free(cl, sizeof(CLIENT)); 65174462Salfred mutex_unlock(&clnt_fd_lock); 65274462Salfred thr_sigsetmask(SIG_SETMASK, &(mask), NULL); 65374462Salfred cond_signal(&vc_cv[ct_fd]); 65474462Salfred} 65574462Salfred 65674462Salfred/* 65774462Salfred * Interface between xdr serializer and tcp connection. 65874462Salfred * Behaves like the system calls, read & write, but keeps some error state 65974462Salfred * around for the rpc level. 66074462Salfred */ 66174462Salfredstatic int 66274462Salfredread_vc(ctp, buf, len) 66374462Salfred caddr_t ctp; 66474462Salfred caddr_t buf; 66574462Salfred int len; 66674462Salfred{ 66774462Salfred struct sockaddr sa; 66874462Salfred socklen_t sal; 66974462Salfred struct ct_data *ct = (struct ct_data *)(void *)ctp; 67074462Salfred struct pollfd fd; 67174462Salfred int milliseconds = (int)((ct->ct_wait.tv_sec * 1000) + 67274462Salfred (ct->ct_wait.tv_usec / 1000)); 67374462Salfred 67474462Salfred if (len == 0) 67574462Salfred return (0); 67674462Salfred fd.fd = ct->ct_fd; 67774462Salfred fd.events = POLLIN; 67874462Salfred for (;;) { 67974462Salfred switch (_poll(&fd, 1, milliseconds)) { 68074462Salfred case 0: 68174462Salfred ct->ct_error.re_status = RPC_TIMEDOUT; 68274462Salfred return (-1); 68374462Salfred 68474462Salfred case -1: 68574462Salfred if (errno == EINTR) 68674462Salfred continue; 68774462Salfred ct->ct_error.re_status = RPC_CANTRECV; 68874462Salfred ct->ct_error.re_errno = errno; 68974462Salfred return (-1); 69074462Salfred } 69174462Salfred break; 69274462Salfred } 69374462Salfred 69474462Salfred sal = sizeof(sa); 69574462Salfred if ((_getpeername(ct->ct_fd, &sa, &sal) == 0) && 69674462Salfred (sa.sa_family == AF_LOCAL)) { 69774462Salfred len = __msgread(ct->ct_fd, buf, (size_t)len); 69874462Salfred } else { 69974462Salfred len = _read(ct->ct_fd, buf, (size_t)len); 70074462Salfred } 70174462Salfred 70274462Salfred switch (len) { 70374462Salfred case 0: 70474462Salfred /* premature eof */ 70574462Salfred ct->ct_error.re_errno = ECONNRESET; 70674462Salfred ct->ct_error.re_status = RPC_CANTRECV; 70774462Salfred len = -1; /* it's really an error */ 70874462Salfred break; 70974462Salfred 71074462Salfred case -1: 71174462Salfred ct->ct_error.re_errno = errno; 71274462Salfred ct->ct_error.re_status = RPC_CANTRECV; 71374462Salfred break; 71474462Salfred } 71574462Salfred return (len); 71674462Salfred} 71774462Salfred 71874462Salfredstatic int 71974462Salfredwrite_vc(ctp, buf, len) 72074462Salfred caddr_t ctp; 72174462Salfred caddr_t buf; 72274462Salfred int len; 72374462Salfred{ 72474462Salfred struct sockaddr sa; 72574462Salfred socklen_t sal; 72674462Salfred struct ct_data *ct = (struct ct_data *)(void *)ctp; 72774462Salfred int i, cnt; 72874462Salfred 72974462Salfred sal = sizeof(sa); 73074462Salfred if ((_getpeername(ct->ct_fd, &sa, &sal) == 0) && 73174462Salfred (sa.sa_family == AF_LOCAL)) { 73274462Salfred for (cnt = len; cnt > 0; cnt -= i, buf += i) { 73374462Salfred if ((i = __msgwrite(ct->ct_fd, buf, 73474462Salfred (size_t)cnt)) == -1) { 73574462Salfred ct->ct_error.re_errno = errno; 73674462Salfred ct->ct_error.re_status = RPC_CANTSEND; 73774462Salfred return (-1); 73874462Salfred } 73974462Salfred } 74074462Salfred } else { 74174462Salfred for (cnt = len; cnt > 0; cnt -= i, buf += i) { 74274462Salfred if ((i = _write(ct->ct_fd, buf, (size_t)cnt)) == -1) { 74374462Salfred ct->ct_error.re_errno = errno; 74474462Salfred ct->ct_error.re_status = RPC_CANTSEND; 74574462Salfred return (-1); 74674462Salfred } 74774462Salfred } 74874462Salfred } 74974462Salfred return (len); 75074462Salfred} 75174462Salfred 75274462Salfredstatic struct clnt_ops * 75374462Salfredclnt_vc_ops() 75474462Salfred{ 75574462Salfred static struct clnt_ops ops; 75674462Salfred extern mutex_t ops_lock; 75774462Salfred sigset_t mask, newmask; 75874462Salfred 75974462Salfred /* VARIABLES PROTECTED BY ops_lock: ops */ 76074462Salfred 76174462Salfred sigfillset(&newmask); 76274462Salfred thr_sigsetmask(SIG_SETMASK, &newmask, &mask); 76374462Salfred mutex_lock(&ops_lock); 76474462Salfred if (ops.cl_call == NULL) { 76574462Salfred ops.cl_call = clnt_vc_call; 76674462Salfred ops.cl_abort = clnt_vc_abort; 76774462Salfred ops.cl_geterr = clnt_vc_geterr; 76874462Salfred ops.cl_freeres = clnt_vc_freeres; 76974462Salfred ops.cl_destroy = clnt_vc_destroy; 77074462Salfred ops.cl_control = clnt_vc_control; 77174462Salfred } 77274462Salfred mutex_unlock(&ops_lock); 77374462Salfred thr_sigsetmask(SIG_SETMASK, &(mask), NULL); 77474462Salfred return (&ops); 77574462Salfred} 77674462Salfred 77774462Salfred/* 77874462Salfred * Make sure that the time is not garbage. -1 value is disallowed. 77974462Salfred * Note this is different from time_not_ok in clnt_dg.c 78074462Salfred */ 78174462Salfredstatic bool_t 78274462Salfredtime_not_ok(t) 78374462Salfred struct timeval *t; 78474462Salfred{ 78574462Salfred return (t->tv_sec <= -1 || t->tv_sec > 100000000 || 78674462Salfred t->tv_usec <= -1 || t->tv_usec > 1000000); 78774462Salfred} 78874462Salfred 78974627Salfredstatic int 79074462Salfred__msgread(sock, buf, cnt) 79174462Salfred int sock; 79274462Salfred void *buf; 79374462Salfred size_t cnt; 79474462Salfred{ 79574462Salfred struct iovec iov[1]; 79674462Salfred struct msghdr msg; 79774462Salfred struct cmessage cm; 79874462Salfred 79974462Salfred bzero((char *)&cm, sizeof(cm)); 80074462Salfred iov[0].iov_base = buf; 80174462Salfred iov[0].iov_len = cnt; 80274462Salfred 80374462Salfred msg.msg_iov = iov; 80474462Salfred msg.msg_iovlen = 1; 80574462Salfred msg.msg_name = NULL; 80674462Salfred msg.msg_namelen = 0; 80774462Salfred msg.msg_control = (caddr_t)&cm; 80874462Salfred msg.msg_controllen = sizeof(struct cmessage); 80974462Salfred msg.msg_flags = 0; 81074462Salfred 81174462Salfred return(_recvmsg(sock, &msg, 0)); 81274462Salfred} 81374627Salfred 81474462Salfredstatic int 81574462Salfred__msgwrite(sock, buf, cnt) 81674462Salfred int sock; 81774462Salfred void *buf; 81874462Salfred size_t cnt; 81974462Salfred{ 82074462Salfred struct iovec iov[1]; 82174462Salfred struct msghdr msg; 82274462Salfred struct cmessage cm; 82374462Salfred 82474462Salfred bzero((char *)&cm, sizeof(cm)); 82574462Salfred iov[0].iov_base = buf; 82674462Salfred iov[0].iov_len = cnt; 82774462Salfred 82874462Salfred cm.cmsg.cmsg_type = SCM_CREDS; 82974462Salfred cm.cmsg.cmsg_level = SOL_SOCKET; 83074462Salfred cm.cmsg.cmsg_len = sizeof(struct cmessage); 83174462Salfred 83274462Salfred msg.msg_iov = iov; 83374462Salfred msg.msg_iovlen = 1; 83474462Salfred msg.msg_name = NULL; 83574462Salfred msg.msg_namelen = 0; 83674462Salfred msg.msg_control = (caddr_t)&cm; 83774462Salfred msg.msg_controllen = sizeof(struct cmessage); 83874462Salfred msg.msg_flags = 0; 83974462Salfred 84074462Salfred return(_sendmsg(sock, &msg, 0)); 84174462Salfred} 842