18360efbdSAlfred Perlstein /* $NetBSD: clnt_vc.c,v 1.4 2000/07/14 08:40:42 fvdl Exp $ */ 28360efbdSAlfred Perlstein 32e322d37SHiroki Sato /*- 48a16b7a1SPedro F. Giffuni * SPDX-License-Identifier: BSD-3-Clause 58a16b7a1SPedro F. Giffuni * 62e322d37SHiroki Sato * Copyright (c) 2009, Sun Microsystems, Inc. 72e322d37SHiroki Sato * All rights reserved. 88360efbdSAlfred Perlstein * 92e322d37SHiroki Sato * Redistribution and use in source and binary forms, with or without 102e322d37SHiroki Sato * modification, are permitted provided that the following conditions are met: 112e322d37SHiroki Sato * - Redistributions of source code must retain the above copyright notice, 122e322d37SHiroki Sato * this list of conditions and the following disclaimer. 132e322d37SHiroki Sato * - Redistributions in binary form must reproduce the above copyright notice, 142e322d37SHiroki Sato * this list of conditions and the following disclaimer in the documentation 152e322d37SHiroki Sato * and/or other materials provided with the distribution. 162e322d37SHiroki Sato * - Neither the name of Sun Microsystems, Inc. nor the names of its 172e322d37SHiroki Sato * contributors may be used to endorse or promote products derived 182e322d37SHiroki Sato * from this software without specific prior written permission. 198360efbdSAlfred Perlstein * 202e322d37SHiroki Sato * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 212e322d37SHiroki Sato * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 222e322d37SHiroki Sato * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 232e322d37SHiroki Sato * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 242e322d37SHiroki Sato * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 252e322d37SHiroki Sato * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 262e322d37SHiroki Sato * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 272e322d37SHiroki Sato * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 282e322d37SHiroki Sato * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 292e322d37SHiroki Sato * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 302e322d37SHiroki Sato * POSSIBILITY OF SUCH DAMAGE. 318360efbdSAlfred Perlstein */ 328360efbdSAlfred Perlstein 338360efbdSAlfred Perlstein #if defined(LIBC_SCCS) && !defined(lint) 34a986ef57SDavid E. O'Brien static char *sccsid2 = "@(#)clnt_tcp.c 1.37 87/10/05 Copyr 1984 Sun Micro"; 358360efbdSAlfred Perlstein static char *sccsid = "@(#)clnt_tcp.c 2.2 88/08/01 4.0 RPCSRC"; 36a986ef57SDavid E. O'Brien static char sccsid3[] = "@(#)clnt_vc.c 1.19 89/03/16 Copyr 1988 Sun Micro"; 378360efbdSAlfred Perlstein #endif 388360efbdSAlfred Perlstein /* 398360efbdSAlfred Perlstein * clnt_tcp.c, Implements a TCP/IP based, client side RPC. 408360efbdSAlfred Perlstein * 418360efbdSAlfred Perlstein * Copyright (C) 1984, Sun Microsystems, Inc. 428360efbdSAlfred Perlstein * 438360efbdSAlfred Perlstein * TCP based RPC supports 'batched calls'. 448360efbdSAlfred Perlstein * A sequence of calls may be batched-up in a send buffer. The rpc call 458360efbdSAlfred Perlstein * return immediately to the client even though the call was not necessarily 468360efbdSAlfred Perlstein * sent. The batching occurs if the results' xdr routine is NULL (0) AND 478360efbdSAlfred Perlstein * the rpc timeout value is zero (see clnt.h, rpc). 488360efbdSAlfred Perlstein * 498360efbdSAlfred Perlstein * Clients should NOT casually batch calls that in fact return results; that is, 508360efbdSAlfred Perlstein * the server side should be aware that a call is batched and not produce any 518360efbdSAlfred Perlstein * return message. Batched calls that produce many result messages can 528360efbdSAlfred Perlstein * deadlock (netlock) the client and the server.... 538360efbdSAlfred Perlstein * 548360efbdSAlfred Perlstein * Now go hang yourself. 558360efbdSAlfred Perlstein */ 568360efbdSAlfred Perlstein 578360efbdSAlfred Perlstein #include "namespace.h" 589f5afc13SIan Dowse #include "reentrant.h" 598360efbdSAlfred Perlstein #include <sys/types.h> 608360efbdSAlfred Perlstein #include <sys/poll.h> 618360efbdSAlfred Perlstein #include <sys/syslog.h> 628360efbdSAlfred Perlstein #include <sys/socket.h> 63*24938f93SAlan Somers #include <sys/tree.h> 648360efbdSAlfred Perlstein #include <sys/un.h> 658360efbdSAlfred Perlstein #include <sys/uio.h> 668360efbdSAlfred Perlstein 67fd8e4ebcSMike Barcroft #include <arpa/inet.h> 688360efbdSAlfred Perlstein #include <assert.h> 698360efbdSAlfred Perlstein #include <err.h> 708360efbdSAlfred Perlstein #include <errno.h> 718360efbdSAlfred Perlstein #include <netdb.h> 72*24938f93SAlan Somers #include <pthread.h> 738360efbdSAlfred Perlstein #include <stdio.h> 74*24938f93SAlan Somers #include <stdbool.h> 758360efbdSAlfred Perlstein #include <stdlib.h> 768360efbdSAlfred Perlstein #include <string.h> 778360efbdSAlfred Perlstein #include <unistd.h> 788360efbdSAlfred Perlstein #include <signal.h> 798360efbdSAlfred Perlstein 808360efbdSAlfred Perlstein #include <rpc/rpc.h> 818f55a568SDoug Rabson #include <rpc/rpcsec_gss.h> 828360efbdSAlfred Perlstein #include "un-namespace.h" 838360efbdSAlfred Perlstein #include "rpc_com.h" 84235baf26SDaniel Eischen #include "mt_misc.h" 858360efbdSAlfred Perlstein 868360efbdSAlfred Perlstein #define MCALL_MSG_SIZE 24 878360efbdSAlfred Perlstein 88392df6bcSAlfred Perlstein struct cmessage { 89392df6bcSAlfred Perlstein struct cmsghdr cmsg; 90392df6bcSAlfred Perlstein struct cmsgcred cmcred; 91392df6bcSAlfred Perlstein }; 92392df6bcSAlfred Perlstein 93f249dbccSDag-Erling Smørgrav static enum clnt_stat clnt_vc_call(CLIENT *, rpcproc_t, xdrproc_t, void *, 94f249dbccSDag-Erling Smørgrav xdrproc_t, void *, struct timeval); 95c05ac53bSDavid E. O'Brien static void clnt_vc_geterr(CLIENT *, struct rpc_err *); 96f249dbccSDag-Erling Smørgrav static bool_t clnt_vc_freeres(CLIENT *, xdrproc_t, void *); 97c05ac53bSDavid E. O'Brien static void clnt_vc_abort(CLIENT *); 98cffc0b57SAlfred Perlstein static bool_t clnt_vc_control(CLIENT *, u_int, void *); 99c05ac53bSDavid E. O'Brien static void clnt_vc_destroy(CLIENT *); 100c05ac53bSDavid E. O'Brien static struct clnt_ops *clnt_vc_ops(void); 101c05ac53bSDavid E. O'Brien static bool_t time_not_ok(struct timeval *); 102f249dbccSDag-Erling Smørgrav static int read_vc(void *, void *, int); 103f249dbccSDag-Erling Smørgrav static int write_vc(void *, void *, int); 1048360efbdSAlfred Perlstein static int __msgwrite(int, void *, size_t); 1058360efbdSAlfred Perlstein static int __msgread(int, void *, size_t); 1068360efbdSAlfred Perlstein 1078360efbdSAlfred Perlstein struct ct_data { 1088360efbdSAlfred Perlstein int ct_fd; /* connection's fd */ 1098360efbdSAlfred Perlstein bool_t ct_closeit; /* close it on destroy */ 1108360efbdSAlfred Perlstein struct timeval ct_wait; /* wait interval in milliseconds */ 1118360efbdSAlfred Perlstein bool_t ct_waitset; /* wait set by clnt_control? */ 1128360efbdSAlfred Perlstein struct netbuf ct_addr; /* remote addr */ 1138360efbdSAlfred Perlstein struct rpc_err ct_error; 1148360efbdSAlfred Perlstein union { 1158360efbdSAlfred Perlstein char ct_mcallc[MCALL_MSG_SIZE]; /* marshalled callmsg */ 1168360efbdSAlfred Perlstein u_int32_t ct_mcalli; 1178360efbdSAlfred Perlstein } ct_u; 1188360efbdSAlfred Perlstein u_int ct_mpos; /* pos after marshal */ 1198360efbdSAlfred Perlstein XDR ct_xdrs; /* XDR stream */ 1208360efbdSAlfred Perlstein }; 1218360efbdSAlfred Perlstein 1228360efbdSAlfred Perlstein /* 1238360efbdSAlfred Perlstein * This machinery implements per-fd locks for MT-safety. It is not 1248360efbdSAlfred Perlstein * sufficient to do per-CLIENT handle locks for MT-safety because a 1258360efbdSAlfred Perlstein * user may create more than one CLIENT handle with the same fd behind 126*24938f93SAlan Somers * it. Therefore, we allocate an associative array of flags and condition 127*24938f93SAlan Somers * variables (vc_fd). The flags and the array are protected by the 128*24938f93SAlan Somers * clnt_fd_lock mutex. vc_fd_lock[fd] == 1 => a call is active on some 129*24938f93SAlan Somers * CLIENT handle created for that fd. The current implementation holds 130*24938f93SAlan Somers * locks across the entire RPC and reply. Yes, this is silly, and as soon 131*24938f93SAlan Somers * as this code is proven to work, this should be the first thing fixed. 132*24938f93SAlan Somers * One step at a time. 1338360efbdSAlfred Perlstein */ 134*24938f93SAlan Somers struct vc_fd { 135*24938f93SAlan Somers RB_ENTRY(vc_fd) vc_link; 136*24938f93SAlan Somers int fd; 137*24938f93SAlan Somers mutex_t mtx; 138*24938f93SAlan Somers }; 139*24938f93SAlan Somers static inline int 140*24938f93SAlan Somers cmp_vc_fd(struct vc_fd *a, struct vc_fd *b) 141a5c2f4e9SAlan Somers { 142*24938f93SAlan Somers if (a->fd > b->fd) { 143*24938f93SAlan Somers return (1); 144*24938f93SAlan Somers } else if (a->fd < b->fd) { 145*24938f93SAlan Somers return (-1); 146*24938f93SAlan Somers } else { 147*24938f93SAlan Somers return (0); 148*24938f93SAlan Somers } 149*24938f93SAlan Somers } 150*24938f93SAlan Somers RB_HEAD(vc_fd_list, vc_fd); 151*24938f93SAlan Somers RB_PROTOTYPE(vc_fd_list, vc_fd, vc_link, cmp_vc_fd); 152*24938f93SAlan Somers RB_GENERATE(vc_fd_list, vc_fd, vc_link, cmp_vc_fd); 153*24938f93SAlan Somers struct vc_fd_list vc_fd_head = RB_INITIALIZER(&vc_fd_head); 154*24938f93SAlan Somers 155*24938f93SAlan Somers /* 156*24938f93SAlan Somers * Find the lock structure for the given file descriptor, or initialize it if 157*24938f93SAlan Somers * it does not already exist. The clnt_fd_lock mutex must be held. 158*24938f93SAlan Somers */ 159*24938f93SAlan Somers static struct vc_fd * 160*24938f93SAlan Somers vc_fd_find(int fd) 161*24938f93SAlan Somers { 162*24938f93SAlan Somers struct vc_fd key, *elem; 163*24938f93SAlan Somers 164*24938f93SAlan Somers key.fd = fd; 165*24938f93SAlan Somers elem = RB_FIND(vc_fd_list, &vc_fd_head, &key); 166*24938f93SAlan Somers if (elem == NULL) { 167*24938f93SAlan Somers elem = calloc(1, sizeof(*elem)); 168*24938f93SAlan Somers elem->fd = fd; 169*24938f93SAlan Somers mutex_init(&elem->mtx, NULL); 170*24938f93SAlan Somers RB_INSERT(vc_fd_list, &vc_fd_head, elem); 171*24938f93SAlan Somers } 172*24938f93SAlan Somers return (elem); 173*24938f93SAlan Somers } 174*24938f93SAlan Somers 175*24938f93SAlan Somers static void 176*24938f93SAlan Somers release_fd_lock(struct vc_fd *elem, sigset_t mask) 177*24938f93SAlan Somers { 178*24938f93SAlan Somers mutex_unlock(&elem->mtx); 179*24938f93SAlan Somers thr_sigsetmask(SIG_SETMASK, &mask, NULL); 1808360efbdSAlfred Perlstein } 1818360efbdSAlfred Perlstein 1828360efbdSAlfred Perlstein static const char clnt_vc_errstr[] = "%s : %s"; 1838360efbdSAlfred Perlstein static const char clnt_vc_str[] = "clnt_vc_create"; 1848360efbdSAlfred Perlstein static const char __no_mem_str[] = "out of memory"; 1858360efbdSAlfred Perlstein 1868360efbdSAlfred Perlstein /* 1878360efbdSAlfred Perlstein * Create a client handle for a connection. 1888360efbdSAlfred Perlstein * Default options are set, which the user can change using clnt_control()'s. 1898360efbdSAlfred Perlstein * The rpc/vc package does buffering similar to stdio, so the client 1908360efbdSAlfred Perlstein * must pick send and receive buffer sizes, 0 => use the default. 1918360efbdSAlfred Perlstein * NB: fd is copied into a private area. 1928360efbdSAlfred Perlstein * NB: The rpch->cl_auth is set null authentication. Caller may wish to 1938360efbdSAlfred Perlstein * set this something more useful. 1948360efbdSAlfred Perlstein * 1958360efbdSAlfred Perlstein * fd should be an open socket 196587cf682SCraig Rodrigues * 197587cf682SCraig Rodrigues * fd - open file descriptor 198587cf682SCraig Rodrigues * raddr - servers address 199587cf682SCraig Rodrigues * prog - program number 200587cf682SCraig Rodrigues * vers - version number 201587cf682SCraig Rodrigues * sendsz - buffer send size 202587cf682SCraig Rodrigues * recvsz - buffer recv size 2038360efbdSAlfred Perlstein */ 2048360efbdSAlfred Perlstein CLIENT * 205587cf682SCraig Rodrigues clnt_vc_create(int fd, const struct netbuf *raddr, const rpcprog_t prog, 206587cf682SCraig Rodrigues const rpcvers_t vers, u_int sendsz, u_int recvsz) 2078360efbdSAlfred Perlstein { 2088360efbdSAlfred Perlstein CLIENT *cl; /* client handle */ 2098360efbdSAlfred Perlstein struct ct_data *ct = NULL; /* client handle */ 2108360efbdSAlfred Perlstein struct timeval now; 2118360efbdSAlfred Perlstein struct rpc_msg call_msg; 2128360efbdSAlfred Perlstein static u_int32_t disrupt; 2138360efbdSAlfred Perlstein struct sockaddr_storage ss; 2148360efbdSAlfred Perlstein socklen_t slen; 2158360efbdSAlfred Perlstein struct __rpc_sockinfo si; 2168360efbdSAlfred Perlstein 2178360efbdSAlfred Perlstein if (disrupt == 0) 2188360efbdSAlfred Perlstein disrupt = (u_int32_t)(long)raddr; 2198360efbdSAlfred Perlstein 2208360efbdSAlfred Perlstein cl = (CLIENT *)mem_alloc(sizeof (*cl)); 2218360efbdSAlfred Perlstein ct = (struct ct_data *)mem_alloc(sizeof (*ct)); 2228360efbdSAlfred Perlstein if ((cl == (CLIENT *)NULL) || (ct == (struct ct_data *)NULL)) { 2238360efbdSAlfred Perlstein (void) syslog(LOG_ERR, clnt_vc_errstr, 2248360efbdSAlfred Perlstein clnt_vc_str, __no_mem_str); 2258360efbdSAlfred Perlstein rpc_createerr.cf_stat = RPC_SYSTEMERROR; 2268360efbdSAlfred Perlstein rpc_createerr.cf_error.re_errno = errno; 2278360efbdSAlfred Perlstein goto err; 2288360efbdSAlfred Perlstein } 2298360efbdSAlfred Perlstein ct->ct_addr.buf = NULL; 2308360efbdSAlfred Perlstein 2318360efbdSAlfred Perlstein /* 2328360efbdSAlfred Perlstein * XXX - fvdl connecting while holding a mutex? 2338360efbdSAlfred Perlstein */ 2348360efbdSAlfred Perlstein slen = sizeof ss; 2358360efbdSAlfred Perlstein if (_getpeername(fd, (struct sockaddr *)(void *)&ss, &slen) < 0) { 2368360efbdSAlfred Perlstein if (errno != ENOTCONN) { 2378360efbdSAlfred Perlstein rpc_createerr.cf_stat = RPC_SYSTEMERROR; 2388360efbdSAlfred Perlstein rpc_createerr.cf_error.re_errno = errno; 2398360efbdSAlfred Perlstein mutex_unlock(&clnt_fd_lock); 2408360efbdSAlfred Perlstein goto err; 2418360efbdSAlfred Perlstein } 2428360efbdSAlfred Perlstein if (_connect(fd, (struct sockaddr *)raddr->buf, raddr->len) < 0){ 2438360efbdSAlfred Perlstein rpc_createerr.cf_stat = RPC_SYSTEMERROR; 2448360efbdSAlfred Perlstein rpc_createerr.cf_error.re_errno = errno; 2458360efbdSAlfred Perlstein mutex_unlock(&clnt_fd_lock); 2468360efbdSAlfred Perlstein goto err; 2478360efbdSAlfred Perlstein } 2488360efbdSAlfred Perlstein } 2498360efbdSAlfred Perlstein mutex_unlock(&clnt_fd_lock); 2508360efbdSAlfred Perlstein if (!__rpc_fd2sockinfo(fd, &si)) 2518360efbdSAlfred Perlstein goto err; 2528360efbdSAlfred Perlstein 2538360efbdSAlfred Perlstein ct->ct_closeit = FALSE; 2548360efbdSAlfred Perlstein 2558360efbdSAlfred Perlstein /* 2568360efbdSAlfred Perlstein * Set up private data struct 2578360efbdSAlfred Perlstein */ 2588360efbdSAlfred Perlstein ct->ct_fd = fd; 2598360efbdSAlfred Perlstein ct->ct_wait.tv_usec = 0; 2608360efbdSAlfred Perlstein ct->ct_waitset = FALSE; 2618360efbdSAlfred Perlstein ct->ct_addr.buf = malloc(raddr->maxlen); 2628360efbdSAlfred Perlstein if (ct->ct_addr.buf == NULL) 2638360efbdSAlfred Perlstein goto err; 264a8634a00SIan Dowse memcpy(ct->ct_addr.buf, raddr->buf, raddr->len); 2655ee74037SKevin Lo ct->ct_addr.len = raddr->len; 2668360efbdSAlfred Perlstein ct->ct_addr.maxlen = raddr->maxlen; 2678360efbdSAlfred Perlstein 2688360efbdSAlfred Perlstein /* 2698360efbdSAlfred Perlstein * Initialize call message 2708360efbdSAlfred Perlstein */ 2718360efbdSAlfred Perlstein (void)gettimeofday(&now, NULL); 2728360efbdSAlfred Perlstein call_msg.rm_xid = ((u_int32_t)++disrupt) ^ __RPC_GETXID(&now); 2738360efbdSAlfred Perlstein call_msg.rm_direction = CALL; 2748360efbdSAlfred Perlstein call_msg.rm_call.cb_rpcvers = RPC_MSG_VERSION; 2758360efbdSAlfred Perlstein call_msg.rm_call.cb_prog = (u_int32_t)prog; 2768360efbdSAlfred Perlstein call_msg.rm_call.cb_vers = (u_int32_t)vers; 2778360efbdSAlfred Perlstein 2788360efbdSAlfred Perlstein /* 2798360efbdSAlfred Perlstein * pre-serialize the static part of the call msg and stash it away 2808360efbdSAlfred Perlstein */ 2818360efbdSAlfred Perlstein xdrmem_create(&(ct->ct_xdrs), ct->ct_u.ct_mcallc, MCALL_MSG_SIZE, 2828360efbdSAlfred Perlstein XDR_ENCODE); 2838360efbdSAlfred Perlstein if (! xdr_callhdr(&(ct->ct_xdrs), &call_msg)) { 2848360efbdSAlfred Perlstein if (ct->ct_closeit) { 2858360efbdSAlfred Perlstein (void)_close(fd); 2868360efbdSAlfred Perlstein } 2878360efbdSAlfred Perlstein goto err; 2888360efbdSAlfred Perlstein } 2898360efbdSAlfred Perlstein ct->ct_mpos = XDR_GETPOS(&(ct->ct_xdrs)); 2908360efbdSAlfred Perlstein XDR_DESTROY(&(ct->ct_xdrs)); 2918f55a568SDoug Rabson assert(ct->ct_mpos + sizeof(uint32_t) <= MCALL_MSG_SIZE); 2928360efbdSAlfred Perlstein 2938360efbdSAlfred Perlstein /* 2948360efbdSAlfred Perlstein * Create a client handle which uses xdrrec for serialization 2958360efbdSAlfred Perlstein * and authnone for authentication. 2968360efbdSAlfred Perlstein */ 2978360efbdSAlfred Perlstein cl->cl_ops = clnt_vc_ops(); 2988360efbdSAlfred Perlstein cl->cl_private = ct; 2998360efbdSAlfred Perlstein cl->cl_auth = authnone_create(); 3008360efbdSAlfred Perlstein sendsz = __rpc_get_t_size(si.si_af, si.si_proto, (int)sendsz); 3018360efbdSAlfred Perlstein recvsz = __rpc_get_t_size(si.si_af, si.si_proto, (int)recvsz); 3028360efbdSAlfred Perlstein xdrrec_create(&(ct->ct_xdrs), sendsz, recvsz, 3038360efbdSAlfred Perlstein cl->cl_private, read_vc, write_vc); 3048360efbdSAlfred Perlstein return (cl); 3058360efbdSAlfred Perlstein 3068360efbdSAlfred Perlstein err: 3078360efbdSAlfred Perlstein if (ct) { 3088360efbdSAlfred Perlstein if (ct->ct_addr.len) 3098360efbdSAlfred Perlstein mem_free(ct->ct_addr.buf, ct->ct_addr.len); 310f249dbccSDag-Erling Smørgrav mem_free(ct, sizeof (struct ct_data)); 3118360efbdSAlfred Perlstein } 3128360efbdSAlfred Perlstein if (cl) 313f249dbccSDag-Erling Smørgrav mem_free(cl, sizeof (CLIENT)); 3148360efbdSAlfred Perlstein return ((CLIENT *)NULL); 3158360efbdSAlfred Perlstein } 3168360efbdSAlfred Perlstein 3178360efbdSAlfred Perlstein static enum clnt_stat 318587cf682SCraig Rodrigues clnt_vc_call(CLIENT *cl, rpcproc_t proc, xdrproc_t xdr_args, void *args_ptr, 319587cf682SCraig Rodrigues xdrproc_t xdr_results, void *results_ptr, struct timeval timeout) 3208360efbdSAlfred Perlstein { 3218360efbdSAlfred Perlstein struct ct_data *ct = (struct ct_data *) cl->cl_private; 3228360efbdSAlfred Perlstein XDR *xdrs = &(ct->ct_xdrs); 3238360efbdSAlfred Perlstein struct rpc_msg reply_msg; 324*24938f93SAlan Somers struct vc_fd *elem; 3258360efbdSAlfred Perlstein u_int32_t x_id; 3268360efbdSAlfred Perlstein u_int32_t *msg_x_id = &ct->ct_u.ct_mcalli; /* yuk */ 3278360efbdSAlfred Perlstein bool_t shipnow; 3288360efbdSAlfred Perlstein int refreshes = 2; 3298360efbdSAlfred Perlstein sigset_t mask, newmask; 3308f55a568SDoug Rabson bool_t reply_stat; 3318360efbdSAlfred Perlstein 3328360efbdSAlfred Perlstein assert(cl != NULL); 3338360efbdSAlfred Perlstein 3348360efbdSAlfred Perlstein sigfillset(&newmask); 3358360efbdSAlfred Perlstein thr_sigsetmask(SIG_SETMASK, &newmask, &mask); 3368360efbdSAlfred Perlstein mutex_lock(&clnt_fd_lock); 337*24938f93SAlan Somers elem = vc_fd_find(ct->ct_fd); 3388360efbdSAlfred Perlstein mutex_unlock(&clnt_fd_lock); 339*24938f93SAlan Somers mutex_lock(&elem->mtx); 3408360efbdSAlfred Perlstein if (!ct->ct_waitset) { 3418360efbdSAlfred Perlstein /* If time is not within limits, we ignore it. */ 3428360efbdSAlfred Perlstein if (time_not_ok(&timeout) == FALSE) 3438360efbdSAlfred Perlstein ct->ct_wait = timeout; 3448360efbdSAlfred Perlstein } 3458360efbdSAlfred Perlstein 3468360efbdSAlfred Perlstein shipnow = 3478360efbdSAlfred Perlstein (xdr_results == NULL && timeout.tv_sec == 0 3488360efbdSAlfred Perlstein && timeout.tv_usec == 0) ? FALSE : TRUE; 3498360efbdSAlfred Perlstein 3508360efbdSAlfred Perlstein call_again: 3518360efbdSAlfred Perlstein xdrs->x_op = XDR_ENCODE; 3528360efbdSAlfred Perlstein ct->ct_error.re_status = RPC_SUCCESS; 3538360efbdSAlfred Perlstein x_id = ntohl(--(*msg_x_id)); 3548360efbdSAlfred Perlstein 3558f55a568SDoug Rabson if (cl->cl_auth->ah_cred.oa_flavor != RPCSEC_GSS) { 3568360efbdSAlfred Perlstein if ((! XDR_PUTBYTES(xdrs, ct->ct_u.ct_mcallc, ct->ct_mpos)) || 3578360efbdSAlfred Perlstein (! XDR_PUTINT32(xdrs, &proc)) || 3588360efbdSAlfred Perlstein (! AUTH_MARSHALL(cl->cl_auth, xdrs)) || 3598360efbdSAlfred Perlstein (! (*xdr_args)(xdrs, args_ptr))) { 3608360efbdSAlfred Perlstein if (ct->ct_error.re_status == RPC_SUCCESS) 3618360efbdSAlfred Perlstein ct->ct_error.re_status = RPC_CANTENCODEARGS; 3628360efbdSAlfred Perlstein (void)xdrrec_endofrecord(xdrs, TRUE); 363*24938f93SAlan Somers release_fd_lock(elem, mask); 3648360efbdSAlfred Perlstein return (ct->ct_error.re_status); 3658360efbdSAlfred Perlstein } 3668f55a568SDoug Rabson } else { 3678f55a568SDoug Rabson *(uint32_t *) &ct->ct_u.ct_mcallc[ct->ct_mpos] = htonl(proc); 3688f55a568SDoug Rabson if (! __rpc_gss_wrap(cl->cl_auth, ct->ct_u.ct_mcallc, 3698f55a568SDoug Rabson ct->ct_mpos + sizeof(uint32_t), 3708f55a568SDoug Rabson xdrs, xdr_args, args_ptr)) { 3718f55a568SDoug Rabson if (ct->ct_error.re_status == RPC_SUCCESS) 3728f55a568SDoug Rabson ct->ct_error.re_status = RPC_CANTENCODEARGS; 3738f55a568SDoug Rabson (void)xdrrec_endofrecord(xdrs, TRUE); 374*24938f93SAlan Somers release_fd_lock(elem, mask); 3758f55a568SDoug Rabson return (ct->ct_error.re_status); 3768f55a568SDoug Rabson } 3778f55a568SDoug Rabson } 3788360efbdSAlfred Perlstein if (! xdrrec_endofrecord(xdrs, shipnow)) { 379*24938f93SAlan Somers release_fd_lock(elem, mask); 3808360efbdSAlfred Perlstein return (ct->ct_error.re_status = RPC_CANTSEND); 3818360efbdSAlfred Perlstein } 3828360efbdSAlfred Perlstein if (! shipnow) { 383*24938f93SAlan Somers release_fd_lock(elem, mask); 3848360efbdSAlfred Perlstein return (RPC_SUCCESS); 3858360efbdSAlfred Perlstein } 3868360efbdSAlfred Perlstein /* 3878360efbdSAlfred Perlstein * Hack to provide rpc-based message passing 3888360efbdSAlfred Perlstein */ 3898360efbdSAlfred Perlstein if (timeout.tv_sec == 0 && timeout.tv_usec == 0) { 390*24938f93SAlan Somers release_fd_lock(elem, mask); 3918360efbdSAlfred Perlstein return(ct->ct_error.re_status = RPC_TIMEDOUT); 3928360efbdSAlfred Perlstein } 3938360efbdSAlfred Perlstein 3948360efbdSAlfred Perlstein 3958360efbdSAlfred Perlstein /* 3968360efbdSAlfred Perlstein * Keep receiving until we get a valid transaction id 3978360efbdSAlfred Perlstein */ 3988360efbdSAlfred Perlstein xdrs->x_op = XDR_DECODE; 3998360efbdSAlfred Perlstein while (TRUE) { 4008360efbdSAlfred Perlstein reply_msg.acpted_rply.ar_verf = _null_auth; 4018360efbdSAlfred Perlstein reply_msg.acpted_rply.ar_results.where = NULL; 4028360efbdSAlfred Perlstein reply_msg.acpted_rply.ar_results.proc = (xdrproc_t)xdr_void; 4038360efbdSAlfred Perlstein if (! xdrrec_skiprecord(xdrs)) { 404*24938f93SAlan Somers release_fd_lock(elem, mask); 4058360efbdSAlfred Perlstein return (ct->ct_error.re_status); 4068360efbdSAlfred Perlstein } 4078360efbdSAlfred Perlstein /* now decode and validate the response header */ 4088360efbdSAlfred Perlstein if (! xdr_replymsg(xdrs, &reply_msg)) { 4098360efbdSAlfred Perlstein if (ct->ct_error.re_status == RPC_SUCCESS) 4108360efbdSAlfred Perlstein continue; 411*24938f93SAlan Somers release_fd_lock(elem, mask); 4128360efbdSAlfred Perlstein return (ct->ct_error.re_status); 4138360efbdSAlfred Perlstein } 4148360efbdSAlfred Perlstein if (reply_msg.rm_xid == x_id) 4158360efbdSAlfred Perlstein break; 4168360efbdSAlfred Perlstein } 4178360efbdSAlfred Perlstein 4188360efbdSAlfred Perlstein /* 4198360efbdSAlfred Perlstein * process header 4208360efbdSAlfred Perlstein */ 4218360efbdSAlfred Perlstein _seterr_reply(&reply_msg, &(ct->ct_error)); 4228360efbdSAlfred Perlstein if (ct->ct_error.re_status == RPC_SUCCESS) { 4238360efbdSAlfred Perlstein if (! AUTH_VALIDATE(cl->cl_auth, 4248360efbdSAlfred Perlstein &reply_msg.acpted_rply.ar_verf)) { 4258360efbdSAlfred Perlstein ct->ct_error.re_status = RPC_AUTHERROR; 4268360efbdSAlfred Perlstein ct->ct_error.re_why = AUTH_INVALIDRESP; 4278f55a568SDoug Rabson } else { 4288f55a568SDoug Rabson if (cl->cl_auth->ah_cred.oa_flavor != RPCSEC_GSS) { 4298f55a568SDoug Rabson reply_stat = (*xdr_results)(xdrs, results_ptr); 4308f55a568SDoug Rabson } else { 4318f55a568SDoug Rabson reply_stat = __rpc_gss_unwrap(cl->cl_auth, 4328f55a568SDoug Rabson xdrs, xdr_results, results_ptr); 4338f55a568SDoug Rabson } 4348f55a568SDoug Rabson if (! reply_stat) { 4358360efbdSAlfred Perlstein if (ct->ct_error.re_status == RPC_SUCCESS) 4368f55a568SDoug Rabson ct->ct_error.re_status = 4378f55a568SDoug Rabson RPC_CANTDECODERES; 4388f55a568SDoug Rabson } 4398360efbdSAlfred Perlstein } 4408360efbdSAlfred Perlstein /* free verifier ... */ 4418360efbdSAlfred Perlstein if (reply_msg.acpted_rply.ar_verf.oa_base != NULL) { 4428360efbdSAlfred Perlstein xdrs->x_op = XDR_FREE; 4438360efbdSAlfred Perlstein (void)xdr_opaque_auth(xdrs, 4448360efbdSAlfred Perlstein &(reply_msg.acpted_rply.ar_verf)); 4458360efbdSAlfred Perlstein } 4468360efbdSAlfred Perlstein } /* end successful completion */ 4478360efbdSAlfred Perlstein else { 4488360efbdSAlfred Perlstein /* maybe our credentials need to be refreshed ... */ 4498360efbdSAlfred Perlstein if (refreshes-- && AUTH_REFRESH(cl->cl_auth, &reply_msg)) 4508360efbdSAlfred Perlstein goto call_again; 4518360efbdSAlfred Perlstein } /* end of unsuccessful completion */ 452*24938f93SAlan Somers release_fd_lock(elem, mask); 4538360efbdSAlfred Perlstein return (ct->ct_error.re_status); 4548360efbdSAlfred Perlstein } 4558360efbdSAlfred Perlstein 4568360efbdSAlfred Perlstein static void 457587cf682SCraig Rodrigues clnt_vc_geterr(CLIENT *cl, struct rpc_err *errp) 4588360efbdSAlfred Perlstein { 4598360efbdSAlfred Perlstein struct ct_data *ct; 4608360efbdSAlfred Perlstein 4618360efbdSAlfred Perlstein assert(cl != NULL); 4628360efbdSAlfred Perlstein assert(errp != NULL); 4638360efbdSAlfred Perlstein 4648360efbdSAlfred Perlstein ct = (struct ct_data *) cl->cl_private; 4658360efbdSAlfred Perlstein *errp = ct->ct_error; 4668360efbdSAlfred Perlstein } 4678360efbdSAlfred Perlstein 4688360efbdSAlfred Perlstein static bool_t 469587cf682SCraig Rodrigues clnt_vc_freeres(CLIENT *cl, xdrproc_t xdr_res, void *res_ptr) 4708360efbdSAlfred Perlstein { 4718360efbdSAlfred Perlstein struct ct_data *ct; 472*24938f93SAlan Somers struct vc_fd *elem; 4738360efbdSAlfred Perlstein XDR *xdrs; 4748360efbdSAlfred Perlstein bool_t dummy; 4758360efbdSAlfred Perlstein sigset_t mask; 4768360efbdSAlfred Perlstein sigset_t newmask; 4778360efbdSAlfred Perlstein 4788360efbdSAlfred Perlstein assert(cl != NULL); 4798360efbdSAlfred Perlstein 4808360efbdSAlfred Perlstein ct = (struct ct_data *)cl->cl_private; 4818360efbdSAlfred Perlstein xdrs = &(ct->ct_xdrs); 4828360efbdSAlfred Perlstein 4838360efbdSAlfred Perlstein sigfillset(&newmask); 4848360efbdSAlfred Perlstein thr_sigsetmask(SIG_SETMASK, &newmask, &mask); 4858360efbdSAlfred Perlstein mutex_lock(&clnt_fd_lock); 486*24938f93SAlan Somers elem = vc_fd_find(ct->ct_fd); 487*24938f93SAlan Somers mutex_lock(&elem->mtx); 4888360efbdSAlfred Perlstein xdrs->x_op = XDR_FREE; 4898360efbdSAlfred Perlstein dummy = (*xdr_res)(xdrs, res_ptr); 4908360efbdSAlfred Perlstein 491*24938f93SAlan Somers mutex_unlock(&clnt_fd_lock); 492*24938f93SAlan Somers release_fd_lock(elem, mask); 4938360efbdSAlfred Perlstein return dummy; 4948360efbdSAlfred Perlstein } 4958360efbdSAlfred Perlstein 4968360efbdSAlfred Perlstein /*ARGSUSED*/ 4978360efbdSAlfred Perlstein static void 498587cf682SCraig Rodrigues clnt_vc_abort(CLIENT *cl) 4998360efbdSAlfred Perlstein { 5008360efbdSAlfred Perlstein } 5018360efbdSAlfred Perlstein 502ef2c4faeSPedro F. Giffuni static __inline void 503ef2c4faeSPedro F. Giffuni htonlp(void *dst, const void *src, uint32_t incr) 504ef2c4faeSPedro F. Giffuni { 505ef2c4faeSPedro F. Giffuni /* We are aligned, so we think */ 506ef2c4faeSPedro F. Giffuni *(uint32_t *)dst = htonl(*(const uint32_t *)src + incr); 507ef2c4faeSPedro F. Giffuni } 508ef2c4faeSPedro F. Giffuni 509ef2c4faeSPedro F. Giffuni static __inline void 510ef2c4faeSPedro F. Giffuni ntohlp(void *dst, const void *src) 511ef2c4faeSPedro F. Giffuni { 512ef2c4faeSPedro F. Giffuni /* We are aligned, so we think */ 513ef2c4faeSPedro F. Giffuni *(uint32_t *)dst = htonl(*(const uint32_t *)src); 514ef2c4faeSPedro F. Giffuni } 515ef2c4faeSPedro F. Giffuni 5168360efbdSAlfred Perlstein static bool_t 517587cf682SCraig Rodrigues clnt_vc_control(CLIENT *cl, u_int request, void *info) 5188360efbdSAlfred Perlstein { 5198360efbdSAlfred Perlstein struct ct_data *ct; 520*24938f93SAlan Somers struct vc_fd *elem; 5218360efbdSAlfred Perlstein void *infop = info; 5228360efbdSAlfred Perlstein sigset_t mask; 5238360efbdSAlfred Perlstein sigset_t newmask; 5248360efbdSAlfred Perlstein 5258360efbdSAlfred Perlstein assert(cl != NULL); 5268360efbdSAlfred Perlstein 5278360efbdSAlfred Perlstein ct = (struct ct_data *)cl->cl_private; 5288360efbdSAlfred Perlstein 5298360efbdSAlfred Perlstein sigfillset(&newmask); 5308360efbdSAlfred Perlstein thr_sigsetmask(SIG_SETMASK, &newmask, &mask); 5318360efbdSAlfred Perlstein mutex_lock(&clnt_fd_lock); 532*24938f93SAlan Somers elem = vc_fd_find(ct->ct_fd); 5338360efbdSAlfred Perlstein mutex_unlock(&clnt_fd_lock); 534*24938f93SAlan Somers mutex_lock(&elem->mtx); 5358360efbdSAlfred Perlstein 5368360efbdSAlfred Perlstein switch (request) { 5378360efbdSAlfred Perlstein case CLSET_FD_CLOSE: 5388360efbdSAlfred Perlstein ct->ct_closeit = TRUE; 539*24938f93SAlan Somers release_fd_lock(elem, mask); 5408360efbdSAlfred Perlstein return (TRUE); 5418360efbdSAlfred Perlstein case CLSET_FD_NCLOSE: 5428360efbdSAlfred Perlstein ct->ct_closeit = FALSE; 543*24938f93SAlan Somers release_fd_lock(elem, mask); 5448360efbdSAlfred Perlstein return (TRUE); 5458360efbdSAlfred Perlstein default: 5468360efbdSAlfred Perlstein break; 5478360efbdSAlfred Perlstein } 5488360efbdSAlfred Perlstein 5498360efbdSAlfred Perlstein /* for other requests which use info */ 5508360efbdSAlfred Perlstein if (info == NULL) { 551*24938f93SAlan Somers release_fd_lock(elem, mask); 5528360efbdSAlfred Perlstein return (FALSE); 5538360efbdSAlfred Perlstein } 5548360efbdSAlfred Perlstein switch (request) { 5558360efbdSAlfred Perlstein case CLSET_TIMEOUT: 556cffc0b57SAlfred Perlstein if (time_not_ok((struct timeval *)info)) { 557*24938f93SAlan Somers release_fd_lock(elem, mask); 5588360efbdSAlfred Perlstein return (FALSE); 5598360efbdSAlfred Perlstein } 5608360efbdSAlfred Perlstein ct->ct_wait = *(struct timeval *)infop; 5618360efbdSAlfred Perlstein ct->ct_waitset = TRUE; 5628360efbdSAlfred Perlstein break; 5638360efbdSAlfred Perlstein case CLGET_TIMEOUT: 5648360efbdSAlfred Perlstein *(struct timeval *)infop = ct->ct_wait; 5658360efbdSAlfred Perlstein break; 5668360efbdSAlfred Perlstein case CLGET_SERVER_ADDR: 5678360efbdSAlfred Perlstein (void) memcpy(info, ct->ct_addr.buf, (size_t)ct->ct_addr.len); 5688360efbdSAlfred Perlstein break; 5698360efbdSAlfred Perlstein case CLGET_FD: 570cffc0b57SAlfred Perlstein *(int *)info = ct->ct_fd; 5718360efbdSAlfred Perlstein break; 5728360efbdSAlfred Perlstein case CLGET_SVC_ADDR: 5738360efbdSAlfred Perlstein /* The caller should not free this memory area */ 574cffc0b57SAlfred Perlstein *(struct netbuf *)info = ct->ct_addr; 5758360efbdSAlfred Perlstein break; 5768360efbdSAlfred Perlstein case CLSET_SVC_ADDR: /* set to new address */ 577*24938f93SAlan Somers release_fd_lock(elem, mask); 5788360efbdSAlfred Perlstein return (FALSE); 5798360efbdSAlfred Perlstein case CLGET_XID: 5808360efbdSAlfred Perlstein /* 5818360efbdSAlfred Perlstein * use the knowledge that xid is the 5828360efbdSAlfred Perlstein * first element in the call structure 5838360efbdSAlfred Perlstein * This will get the xid of the PREVIOUS call 5848360efbdSAlfred Perlstein */ 585ef2c4faeSPedro F. Giffuni ntohlp(info, &ct->ct_u.ct_mcalli); 5868360efbdSAlfred Perlstein break; 5878360efbdSAlfred Perlstein case CLSET_XID: 5888360efbdSAlfred Perlstein /* This will set the xid of the NEXT call */ 5898360efbdSAlfred Perlstein /* increment by 1 as clnt_vc_call() decrements once */ 590ef2c4faeSPedro F. Giffuni htonlp(&ct->ct_u.ct_mcalli, info, 1); 5918360efbdSAlfred Perlstein break; 5928360efbdSAlfred Perlstein case CLGET_VERS: 5938360efbdSAlfred Perlstein /* 5948360efbdSAlfred Perlstein * This RELIES on the information that, in the call body, 5958360efbdSAlfred Perlstein * the version number field is the fifth field from the 59632223c1bSPedro F. Giffuni * beginning of the RPC header. MUST be changed if the 5978360efbdSAlfred Perlstein * call_struct is changed 5988360efbdSAlfred Perlstein */ 599ef2c4faeSPedro F. Giffuni ntohlp(info, ct->ct_u.ct_mcallc + 4 * BYTES_PER_XDR_UNIT); 6008360efbdSAlfred Perlstein break; 6018360efbdSAlfred Perlstein 6028360efbdSAlfred Perlstein case CLSET_VERS: 603ef2c4faeSPedro F. Giffuni htonlp(ct->ct_u.ct_mcallc + 4 * BYTES_PER_XDR_UNIT, info, 0); 6048360efbdSAlfred Perlstein break; 6058360efbdSAlfred Perlstein 6068360efbdSAlfred Perlstein case CLGET_PROG: 6078360efbdSAlfred Perlstein /* 6088360efbdSAlfred Perlstein * This RELIES on the information that, in the call body, 6098360efbdSAlfred Perlstein * the program number field is the fourth field from the 61032223c1bSPedro F. Giffuni * beginning of the RPC header. MUST be changed if the 6118360efbdSAlfred Perlstein * call_struct is changed 6128360efbdSAlfred Perlstein */ 613ef2c4faeSPedro F. Giffuni ntohlp(info, ct->ct_u.ct_mcallc + 3 * BYTES_PER_XDR_UNIT); 6148360efbdSAlfred Perlstein break; 6158360efbdSAlfred Perlstein 6168360efbdSAlfred Perlstein case CLSET_PROG: 617ef2c4faeSPedro F. Giffuni htonlp(ct->ct_u.ct_mcallc + 3 * BYTES_PER_XDR_UNIT, info, 0); 6188360efbdSAlfred Perlstein break; 6198360efbdSAlfred Perlstein 6208360efbdSAlfred Perlstein default: 621*24938f93SAlan Somers release_fd_lock(elem, mask); 6228360efbdSAlfred Perlstein return (FALSE); 6238360efbdSAlfred Perlstein } 624*24938f93SAlan Somers release_fd_lock(elem, mask); 6258360efbdSAlfred Perlstein return (TRUE); 6268360efbdSAlfred Perlstein } 6278360efbdSAlfred Perlstein 6288360efbdSAlfred Perlstein 6298360efbdSAlfred Perlstein static void 630587cf682SCraig Rodrigues clnt_vc_destroy(CLIENT *cl) 6318360efbdSAlfred Perlstein { 6328360efbdSAlfred Perlstein struct ct_data *ct = (struct ct_data *) cl->cl_private; 633*24938f93SAlan Somers struct vc_fd *elem; 6348360efbdSAlfred Perlstein int ct_fd = ct->ct_fd; 6358360efbdSAlfred Perlstein sigset_t mask; 6368360efbdSAlfred Perlstein sigset_t newmask; 6378360efbdSAlfred Perlstein 6388360efbdSAlfred Perlstein assert(cl != NULL); 6398360efbdSAlfred Perlstein 6408360efbdSAlfred Perlstein ct = (struct ct_data *) cl->cl_private; 6418360efbdSAlfred Perlstein 6428360efbdSAlfred Perlstein sigfillset(&newmask); 6438360efbdSAlfred Perlstein thr_sigsetmask(SIG_SETMASK, &newmask, &mask); 6448360efbdSAlfred Perlstein mutex_lock(&clnt_fd_lock); 645*24938f93SAlan Somers elem = vc_fd_find(ct_fd); 646*24938f93SAlan Somers mutex_lock(&elem->mtx); 6478360efbdSAlfred Perlstein if (ct->ct_closeit && ct->ct_fd != -1) { 6488360efbdSAlfred Perlstein (void)_close(ct->ct_fd); 6498360efbdSAlfred Perlstein } 6508360efbdSAlfred Perlstein XDR_DESTROY(&(ct->ct_xdrs)); 6518360efbdSAlfred Perlstein free(ct->ct_addr.buf); 6528360efbdSAlfred Perlstein mem_free(ct, sizeof(struct ct_data)); 6530c2222baSPedro F. Giffuni if (cl->cl_netid && cl->cl_netid[0]) 6540c2222baSPedro F. Giffuni mem_free(cl->cl_netid, strlen(cl->cl_netid) +1); 6550c2222baSPedro F. Giffuni if (cl->cl_tp && cl->cl_tp[0]) 6560c2222baSPedro F. Giffuni mem_free(cl->cl_tp, strlen(cl->cl_tp) +1); 6578360efbdSAlfred Perlstein mem_free(cl, sizeof(CLIENT)); 6588360efbdSAlfred Perlstein mutex_unlock(&clnt_fd_lock); 659*24938f93SAlan Somers release_fd_lock(elem, mask); 6608360efbdSAlfred Perlstein } 6618360efbdSAlfred Perlstein 6628360efbdSAlfred Perlstein /* 6638360efbdSAlfred Perlstein * Interface between xdr serializer and tcp connection. 6648360efbdSAlfred Perlstein * Behaves like the system calls, read & write, but keeps some error state 6658360efbdSAlfred Perlstein * around for the rpc level. 6668360efbdSAlfred Perlstein */ 6678360efbdSAlfred Perlstein static int 668587cf682SCraig Rodrigues read_vc(void *ctp, void *buf, int len) 6698360efbdSAlfred Perlstein { 6708360efbdSAlfred Perlstein struct sockaddr sa; 6718360efbdSAlfred Perlstein socklen_t sal; 672f249dbccSDag-Erling Smørgrav struct ct_data *ct = (struct ct_data *)ctp; 6738360efbdSAlfred Perlstein struct pollfd fd; 6748360efbdSAlfred Perlstein int milliseconds = (int)((ct->ct_wait.tv_sec * 1000) + 6758360efbdSAlfred Perlstein (ct->ct_wait.tv_usec / 1000)); 6768360efbdSAlfred Perlstein 6778360efbdSAlfred Perlstein if (len == 0) 6788360efbdSAlfred Perlstein return (0); 6798360efbdSAlfred Perlstein fd.fd = ct->ct_fd; 6808360efbdSAlfred Perlstein fd.events = POLLIN; 6818360efbdSAlfred Perlstein for (;;) { 6828360efbdSAlfred Perlstein switch (_poll(&fd, 1, milliseconds)) { 6838360efbdSAlfred Perlstein case 0: 6848360efbdSAlfred Perlstein ct->ct_error.re_status = RPC_TIMEDOUT; 6858360efbdSAlfred Perlstein return (-1); 6868360efbdSAlfred Perlstein 6878360efbdSAlfred Perlstein case -1: 6888360efbdSAlfred Perlstein if (errno == EINTR) 6898360efbdSAlfred Perlstein continue; 6908360efbdSAlfred Perlstein ct->ct_error.re_status = RPC_CANTRECV; 6918360efbdSAlfred Perlstein ct->ct_error.re_errno = errno; 6928360efbdSAlfred Perlstein return (-1); 6938360efbdSAlfred Perlstein } 6948360efbdSAlfred Perlstein break; 6958360efbdSAlfred Perlstein } 6968360efbdSAlfred Perlstein 6978360efbdSAlfred Perlstein sal = sizeof(sa); 6988360efbdSAlfred Perlstein if ((_getpeername(ct->ct_fd, &sa, &sal) == 0) && 6998360efbdSAlfred Perlstein (sa.sa_family == AF_LOCAL)) { 7008360efbdSAlfred Perlstein len = __msgread(ct->ct_fd, buf, (size_t)len); 7018360efbdSAlfred Perlstein } else { 7028360efbdSAlfred Perlstein len = _read(ct->ct_fd, buf, (size_t)len); 7038360efbdSAlfred Perlstein } 7048360efbdSAlfred Perlstein 7058360efbdSAlfred Perlstein switch (len) { 7068360efbdSAlfred Perlstein case 0: 7078360efbdSAlfred Perlstein /* premature eof */ 7088360efbdSAlfred Perlstein ct->ct_error.re_errno = ECONNRESET; 7098360efbdSAlfred Perlstein ct->ct_error.re_status = RPC_CANTRECV; 7108360efbdSAlfred Perlstein len = -1; /* it's really an error */ 7118360efbdSAlfred Perlstein break; 7128360efbdSAlfred Perlstein 7138360efbdSAlfred Perlstein case -1: 7148360efbdSAlfred Perlstein ct->ct_error.re_errno = errno; 7158360efbdSAlfred Perlstein ct->ct_error.re_status = RPC_CANTRECV; 7168360efbdSAlfred Perlstein break; 7178360efbdSAlfred Perlstein } 7188360efbdSAlfred Perlstein return (len); 7198360efbdSAlfred Perlstein } 7208360efbdSAlfred Perlstein 7218360efbdSAlfred Perlstein static int 722587cf682SCraig Rodrigues write_vc(void *ctp, void *buf, int len) 7238360efbdSAlfred Perlstein { 7248360efbdSAlfred Perlstein struct sockaddr sa; 7258360efbdSAlfred Perlstein socklen_t sal; 726f249dbccSDag-Erling Smørgrav struct ct_data *ct = (struct ct_data *)ctp; 7278360efbdSAlfred Perlstein int i, cnt; 7288360efbdSAlfred Perlstein 7298360efbdSAlfred Perlstein sal = sizeof(sa); 7308360efbdSAlfred Perlstein if ((_getpeername(ct->ct_fd, &sa, &sal) == 0) && 7318360efbdSAlfred Perlstein (sa.sa_family == AF_LOCAL)) { 7321f7d62b3SStefan Farfeleder for (cnt = len; cnt > 0; cnt -= i, buf = (char *)buf + i) { 7338360efbdSAlfred Perlstein if ((i = __msgwrite(ct->ct_fd, buf, 7348360efbdSAlfred Perlstein (size_t)cnt)) == -1) { 7358360efbdSAlfred Perlstein ct->ct_error.re_errno = errno; 7368360efbdSAlfred Perlstein ct->ct_error.re_status = RPC_CANTSEND; 7378360efbdSAlfred Perlstein return (-1); 7388360efbdSAlfred Perlstein } 7398360efbdSAlfred Perlstein } 7408360efbdSAlfred Perlstein } else { 741361de173SStefan Farfeleder for (cnt = len; cnt > 0; cnt -= i, buf = (char *)buf + i) { 7428360efbdSAlfred Perlstein if ((i = _write(ct->ct_fd, buf, (size_t)cnt)) == -1) { 7438360efbdSAlfred Perlstein ct->ct_error.re_errno = errno; 7448360efbdSAlfred Perlstein ct->ct_error.re_status = RPC_CANTSEND; 7458360efbdSAlfred Perlstein return (-1); 7468360efbdSAlfred Perlstein } 7478360efbdSAlfred Perlstein } 7488360efbdSAlfred Perlstein } 7498360efbdSAlfred Perlstein return (len); 7508360efbdSAlfred Perlstein } 7518360efbdSAlfred Perlstein 7528360efbdSAlfred Perlstein static struct clnt_ops * 753587cf682SCraig Rodrigues clnt_vc_ops(void) 7548360efbdSAlfred Perlstein { 7558360efbdSAlfred Perlstein static struct clnt_ops ops; 7568360efbdSAlfred Perlstein sigset_t mask, newmask; 7578360efbdSAlfred Perlstein 7588360efbdSAlfred Perlstein /* VARIABLES PROTECTED BY ops_lock: ops */ 7598360efbdSAlfred Perlstein 7608360efbdSAlfred Perlstein sigfillset(&newmask); 7618360efbdSAlfred Perlstein thr_sigsetmask(SIG_SETMASK, &newmask, &mask); 7628360efbdSAlfred Perlstein mutex_lock(&ops_lock); 7638360efbdSAlfred Perlstein if (ops.cl_call == NULL) { 7648360efbdSAlfred Perlstein ops.cl_call = clnt_vc_call; 7658360efbdSAlfred Perlstein ops.cl_abort = clnt_vc_abort; 7668360efbdSAlfred Perlstein ops.cl_geterr = clnt_vc_geterr; 7678360efbdSAlfred Perlstein ops.cl_freeres = clnt_vc_freeres; 7688360efbdSAlfred Perlstein ops.cl_destroy = clnt_vc_destroy; 7698360efbdSAlfred Perlstein ops.cl_control = clnt_vc_control; 7708360efbdSAlfred Perlstein } 7718360efbdSAlfred Perlstein mutex_unlock(&ops_lock); 7728360efbdSAlfred Perlstein thr_sigsetmask(SIG_SETMASK, &(mask), NULL); 7738360efbdSAlfred Perlstein return (&ops); 7748360efbdSAlfred Perlstein } 7758360efbdSAlfred Perlstein 7768360efbdSAlfred Perlstein /* 7778360efbdSAlfred Perlstein * Make sure that the time is not garbage. -1 value is disallowed. 7788360efbdSAlfred Perlstein * Note this is different from time_not_ok in clnt_dg.c 7798360efbdSAlfred Perlstein */ 7808360efbdSAlfred Perlstein static bool_t 781587cf682SCraig Rodrigues time_not_ok(struct timeval *t) 7828360efbdSAlfred Perlstein { 7838360efbdSAlfred Perlstein return (t->tv_sec <= -1 || t->tv_sec > 100000000 || 7848360efbdSAlfred Perlstein t->tv_usec <= -1 || t->tv_usec > 1000000); 7858360efbdSAlfred Perlstein } 7868360efbdSAlfred Perlstein 7874ed6d634SAlfred Perlstein static int 788587cf682SCraig Rodrigues __msgread(int sock, void *buf, size_t cnt) 7898360efbdSAlfred Perlstein { 7908360efbdSAlfred Perlstein struct iovec iov[1]; 7918360efbdSAlfred Perlstein struct msghdr msg; 7922bc21ed9SDavid Malone union { 7932bc21ed9SDavid Malone struct cmsghdr cmsg; 7942bc21ed9SDavid Malone char control[CMSG_SPACE(sizeof(struct cmsgcred))]; 7952bc21ed9SDavid Malone } cm; 7968360efbdSAlfred Perlstein 7978360efbdSAlfred Perlstein bzero((char *)&cm, sizeof(cm)); 7988360efbdSAlfred Perlstein iov[0].iov_base = buf; 7998360efbdSAlfred Perlstein iov[0].iov_len = cnt; 8008360efbdSAlfred Perlstein 8018360efbdSAlfred Perlstein msg.msg_iov = iov; 8028360efbdSAlfred Perlstein msg.msg_iovlen = 1; 8038360efbdSAlfred Perlstein msg.msg_name = NULL; 8048360efbdSAlfred Perlstein msg.msg_namelen = 0; 8058360efbdSAlfred Perlstein msg.msg_control = (caddr_t)&cm; 8062bc21ed9SDavid Malone msg.msg_controllen = CMSG_SPACE(sizeof(struct cmsgcred)); 8078360efbdSAlfred Perlstein msg.msg_flags = 0; 8088360efbdSAlfred Perlstein 8098360efbdSAlfred Perlstein return(_recvmsg(sock, &msg, 0)); 8108360efbdSAlfred Perlstein } 8118360efbdSAlfred Perlstein 8128360efbdSAlfred Perlstein static int 813587cf682SCraig Rodrigues __msgwrite(int sock, void *buf, size_t cnt) 8148360efbdSAlfred Perlstein { 8158360efbdSAlfred Perlstein struct iovec iov[1]; 8168360efbdSAlfred Perlstein struct msghdr msg; 8172bc21ed9SDavid Malone union { 8182bc21ed9SDavid Malone struct cmsghdr cmsg; 8192bc21ed9SDavid Malone char control[CMSG_SPACE(sizeof(struct cmsgcred))]; 8202bc21ed9SDavid Malone } cm; 8218360efbdSAlfred Perlstein 8228360efbdSAlfred Perlstein bzero((char *)&cm, sizeof(cm)); 8238360efbdSAlfred Perlstein iov[0].iov_base = buf; 8248360efbdSAlfred Perlstein iov[0].iov_len = cnt; 8258360efbdSAlfred Perlstein 8268360efbdSAlfred Perlstein cm.cmsg.cmsg_type = SCM_CREDS; 8278360efbdSAlfred Perlstein cm.cmsg.cmsg_level = SOL_SOCKET; 8282bc21ed9SDavid Malone cm.cmsg.cmsg_len = CMSG_LEN(sizeof(struct cmsgcred)); 8298360efbdSAlfred Perlstein 8308360efbdSAlfred Perlstein msg.msg_iov = iov; 8318360efbdSAlfred Perlstein msg.msg_iovlen = 1; 8328360efbdSAlfred Perlstein msg.msg_name = NULL; 8338360efbdSAlfred Perlstein msg.msg_namelen = 0; 8348360efbdSAlfred Perlstein msg.msg_control = (caddr_t)&cm; 8352bc21ed9SDavid Malone msg.msg_controllen = CMSG_SPACE(sizeof(struct cmsgcred)); 8368360efbdSAlfred Perlstein msg.msg_flags = 0; 8378360efbdSAlfred Perlstein 8388360efbdSAlfred Perlstein return(_sendmsg(sock, &msg, 0)); 8398360efbdSAlfred Perlstein } 840