1 /* $NetBSD: clnt_vc.c,v 1.4 2000/07/14 08:40:42 fvdl Exp $ */ 2 3 /* 4 * Sun RPC is a product of Sun Microsystems, Inc. and is provided for 5 * unrestricted use provided that this legend is included on all tape 6 * media and as a part of the software program in whole or part. Users 7 * may copy or modify Sun RPC without charge, but are not authorized 8 * to license or distribute it to anyone else except as part of a product or 9 * program developed by the user. 10 * 11 * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE 12 * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR 13 * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE. 14 * 15 * Sun RPC is provided with no support and without any obligation on the 16 * part of Sun Microsystems, Inc. to assist in its use, correction, 17 * modification or enhancement. 18 * 19 * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE 20 * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC 21 * OR ANY PART THEREOF. 22 * 23 * In no event will Sun Microsystems, Inc. be liable for any lost revenue 24 * or profits or other special, indirect and consequential damages, even if 25 * Sun has been advised of the possibility of such damages. 26 * 27 * Sun Microsystems, Inc. 28 * 2550 Garcia Avenue 29 * Mountain View, California 94043 30 */ 31 32 #if defined(LIBC_SCCS) && !defined(lint) 33 static char *sccsid2 = "@(#)clnt_tcp.c 1.37 87/10/05 Copyr 1984 Sun Micro"; 34 static char *sccsid = "@(#)clnt_tcp.c 2.2 88/08/01 4.0 RPCSRC"; 35 static char sccsid3[] = "@(#)clnt_vc.c 1.19 89/03/16 Copyr 1988 Sun Micro"; 36 #endif 37 #include <sys/cdefs.h> 38 __FBSDID("$FreeBSD$"); 39 40 /* 41 * clnt_tcp.c, Implements a TCP/IP based, client side RPC. 42 * 43 * Copyright (C) 1984, Sun Microsystems, Inc. 44 * 45 * TCP based RPC supports 'batched calls'. 46 * A sequence of calls may be batched-up in a send buffer. The rpc call 47 * return immediately to the client even though the call was not necessarily 48 * sent. The batching occurs if the results' xdr routine is NULL (0) AND 49 * the rpc timeout value is zero (see clnt.h, rpc). 50 * 51 * Clients should NOT casually batch calls that in fact return results; that is, 52 * the server side should be aware that a call is batched and not produce any 53 * return message. Batched calls that produce many result messages can 54 * deadlock (netlock) the client and the server.... 55 * 56 * Now go hang yourself. 57 */ 58 59 #include "namespace.h" 60 #include "reentrant.h" 61 #include <sys/types.h> 62 #include <sys/poll.h> 63 #include <sys/syslog.h> 64 #include <sys/socket.h> 65 #include <sys/un.h> 66 #include <sys/uio.h> 67 68 #include <arpa/inet.h> 69 #include <assert.h> 70 #include <err.h> 71 #include <errno.h> 72 #include <netdb.h> 73 #include <stdio.h> 74 #include <stdlib.h> 75 #include <string.h> 76 #include <unistd.h> 77 #include <signal.h> 78 79 #include <rpc/rpc.h> 80 #include <rpc/rpcsec_gss.h> 81 #include "un-namespace.h" 82 #include "rpc_com.h" 83 #include "mt_misc.h" 84 85 #define MCALL_MSG_SIZE 24 86 87 struct cmessage { 88 struct cmsghdr cmsg; 89 struct cmsgcred cmcred; 90 }; 91 92 static enum clnt_stat clnt_vc_call(CLIENT *, rpcproc_t, xdrproc_t, void *, 93 xdrproc_t, void *, struct timeval); 94 static void clnt_vc_geterr(CLIENT *, struct rpc_err *); 95 static bool_t clnt_vc_freeres(CLIENT *, xdrproc_t, void *); 96 static void clnt_vc_abort(CLIENT *); 97 static bool_t clnt_vc_control(CLIENT *, u_int, void *); 98 static void clnt_vc_destroy(CLIENT *); 99 static struct clnt_ops *clnt_vc_ops(void); 100 static bool_t time_not_ok(struct timeval *); 101 static int read_vc(void *, void *, int); 102 static int write_vc(void *, void *, int); 103 static int __msgwrite(int, void *, size_t); 104 static int __msgread(int, void *, size_t); 105 106 struct ct_data { 107 int ct_fd; /* connection's fd */ 108 bool_t ct_closeit; /* close it on destroy */ 109 struct timeval ct_wait; /* wait interval in milliseconds */ 110 bool_t ct_waitset; /* wait set by clnt_control? */ 111 struct netbuf ct_addr; /* remote addr */ 112 struct rpc_err ct_error; 113 union { 114 char ct_mcallc[MCALL_MSG_SIZE]; /* marshalled callmsg */ 115 u_int32_t ct_mcalli; 116 } ct_u; 117 u_int ct_mpos; /* pos after marshal */ 118 XDR ct_xdrs; /* XDR stream */ 119 }; 120 121 /* 122 * This machinery implements per-fd locks for MT-safety. It is not 123 * sufficient to do per-CLIENT handle locks for MT-safety because a 124 * user may create more than one CLIENT handle with the same fd behind 125 * it. Therfore, we allocate an array of flags (vc_fd_locks), protected 126 * by the clnt_fd_lock mutex, and an array (vc_cv) of condition variables 127 * similarly protected. Vc_fd_lock[fd] == 1 => a call is activte on some 128 * CLIENT handle created for that fd. 129 * The current implementation holds locks across the entire RPC and reply. 130 * Yes, this is silly, and as soon as this code is proven to work, this 131 * should be the first thing fixed. One step at a time. 132 */ 133 static int *vc_fd_locks; 134 static cond_t *vc_cv; 135 #define release_fd_lock(fd, mask) { \ 136 mutex_lock(&clnt_fd_lock); \ 137 vc_fd_locks[fd] = 0; \ 138 mutex_unlock(&clnt_fd_lock); \ 139 thr_sigsetmask(SIG_SETMASK, &(mask), (sigset_t *) NULL); \ 140 cond_signal(&vc_cv[fd]); \ 141 } 142 143 static const char clnt_vc_errstr[] = "%s : %s"; 144 static const char clnt_vc_str[] = "clnt_vc_create"; 145 static const char clnt_read_vc_str[] = "read_vc"; 146 static const char __no_mem_str[] = "out of memory"; 147 148 /* 149 * Create a client handle for a connection. 150 * Default options are set, which the user can change using clnt_control()'s. 151 * The rpc/vc package does buffering similar to stdio, so the client 152 * must pick send and receive buffer sizes, 0 => use the default. 153 * NB: fd is copied into a private area. 154 * NB: The rpch->cl_auth is set null authentication. Caller may wish to 155 * set this something more useful. 156 * 157 * fd should be an open socket 158 */ 159 CLIENT * 160 clnt_vc_create(fd, raddr, prog, vers, sendsz, recvsz) 161 int fd; /* open file descriptor */ 162 const struct netbuf *raddr; /* servers address */ 163 const rpcprog_t prog; /* program number */ 164 const rpcvers_t vers; /* version number */ 165 u_int sendsz; /* buffer recv size */ 166 u_int recvsz; /* buffer send size */ 167 { 168 CLIENT *cl; /* client handle */ 169 struct ct_data *ct = NULL; /* client handle */ 170 struct timeval now; 171 struct rpc_msg call_msg; 172 static u_int32_t disrupt; 173 sigset_t mask; 174 sigset_t newmask; 175 struct sockaddr_storage ss; 176 socklen_t slen; 177 struct __rpc_sockinfo si; 178 179 if (disrupt == 0) 180 disrupt = (u_int32_t)(long)raddr; 181 182 cl = (CLIENT *)mem_alloc(sizeof (*cl)); 183 ct = (struct ct_data *)mem_alloc(sizeof (*ct)); 184 if ((cl == (CLIENT *)NULL) || (ct == (struct ct_data *)NULL)) { 185 (void) syslog(LOG_ERR, clnt_vc_errstr, 186 clnt_vc_str, __no_mem_str); 187 rpc_createerr.cf_stat = RPC_SYSTEMERROR; 188 rpc_createerr.cf_error.re_errno = errno; 189 goto err; 190 } 191 ct->ct_addr.buf = NULL; 192 sigfillset(&newmask); 193 thr_sigsetmask(SIG_SETMASK, &newmask, &mask); 194 mutex_lock(&clnt_fd_lock); 195 if (vc_fd_locks == (int *) NULL) { 196 int cv_allocsz, fd_allocsz; 197 int dtbsize = __rpc_dtbsize(); 198 199 fd_allocsz = dtbsize * sizeof (int); 200 vc_fd_locks = (int *) mem_alloc(fd_allocsz); 201 if (vc_fd_locks == (int *) NULL) { 202 mutex_unlock(&clnt_fd_lock); 203 thr_sigsetmask(SIG_SETMASK, &(mask), NULL); 204 goto err; 205 } else 206 memset(vc_fd_locks, '\0', fd_allocsz); 207 208 assert(vc_cv == (cond_t *) NULL); 209 cv_allocsz = dtbsize * sizeof (cond_t); 210 vc_cv = (cond_t *) mem_alloc(cv_allocsz); 211 if (vc_cv == (cond_t *) NULL) { 212 mem_free(vc_fd_locks, fd_allocsz); 213 vc_fd_locks = (int *) NULL; 214 mutex_unlock(&clnt_fd_lock); 215 thr_sigsetmask(SIG_SETMASK, &(mask), NULL); 216 goto err; 217 } else { 218 int i; 219 220 for (i = 0; i < dtbsize; i++) 221 cond_init(&vc_cv[i], 0, (void *) 0); 222 } 223 } else 224 assert(vc_cv != (cond_t *) NULL); 225 226 /* 227 * XXX - fvdl connecting while holding a mutex? 228 */ 229 slen = sizeof ss; 230 if (_getpeername(fd, (struct sockaddr *)(void *)&ss, &slen) < 0) { 231 if (errno != ENOTCONN) { 232 rpc_createerr.cf_stat = RPC_SYSTEMERROR; 233 rpc_createerr.cf_error.re_errno = errno; 234 mutex_unlock(&clnt_fd_lock); 235 thr_sigsetmask(SIG_SETMASK, &(mask), NULL); 236 goto err; 237 } 238 if (_connect(fd, (struct sockaddr *)raddr->buf, raddr->len) < 0){ 239 rpc_createerr.cf_stat = RPC_SYSTEMERROR; 240 rpc_createerr.cf_error.re_errno = errno; 241 mutex_unlock(&clnt_fd_lock); 242 thr_sigsetmask(SIG_SETMASK, &(mask), NULL); 243 goto err; 244 } 245 } 246 mutex_unlock(&clnt_fd_lock); 247 thr_sigsetmask(SIG_SETMASK, &(mask), NULL); 248 if (!__rpc_fd2sockinfo(fd, &si)) 249 goto err; 250 251 ct->ct_closeit = FALSE; 252 253 /* 254 * Set up private data struct 255 */ 256 ct->ct_fd = fd; 257 ct->ct_wait.tv_usec = 0; 258 ct->ct_waitset = FALSE; 259 ct->ct_addr.buf = malloc(raddr->maxlen); 260 if (ct->ct_addr.buf == NULL) 261 goto err; 262 memcpy(ct->ct_addr.buf, raddr->buf, raddr->len); 263 ct->ct_addr.len = raddr->len; 264 ct->ct_addr.maxlen = raddr->maxlen; 265 266 /* 267 * Initialize call message 268 */ 269 (void)gettimeofday(&now, NULL); 270 call_msg.rm_xid = ((u_int32_t)++disrupt) ^ __RPC_GETXID(&now); 271 call_msg.rm_direction = CALL; 272 call_msg.rm_call.cb_rpcvers = RPC_MSG_VERSION; 273 call_msg.rm_call.cb_prog = (u_int32_t)prog; 274 call_msg.rm_call.cb_vers = (u_int32_t)vers; 275 276 /* 277 * pre-serialize the static part of the call msg and stash it away 278 */ 279 xdrmem_create(&(ct->ct_xdrs), ct->ct_u.ct_mcallc, MCALL_MSG_SIZE, 280 XDR_ENCODE); 281 if (! xdr_callhdr(&(ct->ct_xdrs), &call_msg)) { 282 if (ct->ct_closeit) { 283 (void)_close(fd); 284 } 285 goto err; 286 } 287 ct->ct_mpos = XDR_GETPOS(&(ct->ct_xdrs)); 288 XDR_DESTROY(&(ct->ct_xdrs)); 289 assert(ct->ct_mpos + sizeof(uint32_t) <= MCALL_MSG_SIZE); 290 291 /* 292 * Create a client handle which uses xdrrec for serialization 293 * and authnone for authentication. 294 */ 295 cl->cl_ops = clnt_vc_ops(); 296 cl->cl_private = ct; 297 cl->cl_auth = authnone_create(); 298 sendsz = __rpc_get_t_size(si.si_af, si.si_proto, (int)sendsz); 299 recvsz = __rpc_get_t_size(si.si_af, si.si_proto, (int)recvsz); 300 xdrrec_create(&(ct->ct_xdrs), sendsz, recvsz, 301 cl->cl_private, read_vc, write_vc); 302 return (cl); 303 304 err: 305 if (cl) { 306 if (ct) { 307 if (ct->ct_addr.len) 308 mem_free(ct->ct_addr.buf, ct->ct_addr.len); 309 mem_free(ct, sizeof (struct ct_data)); 310 } 311 if (cl) 312 mem_free(cl, sizeof (CLIENT)); 313 } 314 return ((CLIENT *)NULL); 315 } 316 317 static enum clnt_stat 318 clnt_vc_call(cl, proc, xdr_args, args_ptr, xdr_results, results_ptr, timeout) 319 CLIENT *cl; 320 rpcproc_t proc; 321 xdrproc_t xdr_args; 322 void *args_ptr; 323 xdrproc_t xdr_results; 324 void *results_ptr; 325 struct timeval timeout; 326 { 327 struct ct_data *ct = (struct ct_data *) cl->cl_private; 328 XDR *xdrs = &(ct->ct_xdrs); 329 struct rpc_msg reply_msg; 330 u_int32_t x_id; 331 u_int32_t *msg_x_id = &ct->ct_u.ct_mcalli; /* yuk */ 332 bool_t shipnow; 333 int refreshes = 2; 334 sigset_t mask, newmask; 335 int rpc_lock_value; 336 bool_t reply_stat; 337 338 assert(cl != NULL); 339 340 sigfillset(&newmask); 341 thr_sigsetmask(SIG_SETMASK, &newmask, &mask); 342 mutex_lock(&clnt_fd_lock); 343 while (vc_fd_locks[ct->ct_fd]) 344 cond_wait(&vc_cv[ct->ct_fd], &clnt_fd_lock); 345 if (__isthreaded) 346 rpc_lock_value = 1; 347 else 348 rpc_lock_value = 0; 349 vc_fd_locks[ct->ct_fd] = rpc_lock_value; 350 mutex_unlock(&clnt_fd_lock); 351 if (!ct->ct_waitset) { 352 /* If time is not within limits, we ignore it. */ 353 if (time_not_ok(&timeout) == FALSE) 354 ct->ct_wait = timeout; 355 } 356 357 shipnow = 358 (xdr_results == NULL && timeout.tv_sec == 0 359 && timeout.tv_usec == 0) ? FALSE : TRUE; 360 361 call_again: 362 xdrs->x_op = XDR_ENCODE; 363 ct->ct_error.re_status = RPC_SUCCESS; 364 x_id = ntohl(--(*msg_x_id)); 365 366 if (cl->cl_auth->ah_cred.oa_flavor != RPCSEC_GSS) { 367 if ((! XDR_PUTBYTES(xdrs, ct->ct_u.ct_mcallc, ct->ct_mpos)) || 368 (! XDR_PUTINT32(xdrs, &proc)) || 369 (! AUTH_MARSHALL(cl->cl_auth, xdrs)) || 370 (! (*xdr_args)(xdrs, args_ptr))) { 371 if (ct->ct_error.re_status == RPC_SUCCESS) 372 ct->ct_error.re_status = RPC_CANTENCODEARGS; 373 (void)xdrrec_endofrecord(xdrs, TRUE); 374 release_fd_lock(ct->ct_fd, mask); 375 return (ct->ct_error.re_status); 376 } 377 } else { 378 *(uint32_t *) &ct->ct_u.ct_mcallc[ct->ct_mpos] = htonl(proc); 379 if (! __rpc_gss_wrap(cl->cl_auth, ct->ct_u.ct_mcallc, 380 ct->ct_mpos + sizeof(uint32_t), 381 xdrs, xdr_args, args_ptr)) { 382 if (ct->ct_error.re_status == RPC_SUCCESS) 383 ct->ct_error.re_status = RPC_CANTENCODEARGS; 384 (void)xdrrec_endofrecord(xdrs, TRUE); 385 release_fd_lock(ct->ct_fd, mask); 386 return (ct->ct_error.re_status); 387 } 388 } 389 if (! xdrrec_endofrecord(xdrs, shipnow)) { 390 release_fd_lock(ct->ct_fd, mask); 391 return (ct->ct_error.re_status = RPC_CANTSEND); 392 } 393 if (! shipnow) { 394 release_fd_lock(ct->ct_fd, mask); 395 return (RPC_SUCCESS); 396 } 397 /* 398 * Hack to provide rpc-based message passing 399 */ 400 if (timeout.tv_sec == 0 && timeout.tv_usec == 0) { 401 release_fd_lock(ct->ct_fd, mask); 402 return(ct->ct_error.re_status = RPC_TIMEDOUT); 403 } 404 405 406 /* 407 * Keep receiving until we get a valid transaction id 408 */ 409 xdrs->x_op = XDR_DECODE; 410 while (TRUE) { 411 reply_msg.acpted_rply.ar_verf = _null_auth; 412 reply_msg.acpted_rply.ar_results.where = NULL; 413 reply_msg.acpted_rply.ar_results.proc = (xdrproc_t)xdr_void; 414 if (! xdrrec_skiprecord(xdrs)) { 415 release_fd_lock(ct->ct_fd, mask); 416 return (ct->ct_error.re_status); 417 } 418 /* now decode and validate the response header */ 419 if (! xdr_replymsg(xdrs, &reply_msg)) { 420 if (ct->ct_error.re_status == RPC_SUCCESS) 421 continue; 422 release_fd_lock(ct->ct_fd, mask); 423 return (ct->ct_error.re_status); 424 } 425 if (reply_msg.rm_xid == x_id) 426 break; 427 } 428 429 /* 430 * process header 431 */ 432 _seterr_reply(&reply_msg, &(ct->ct_error)); 433 if (ct->ct_error.re_status == RPC_SUCCESS) { 434 if (! AUTH_VALIDATE(cl->cl_auth, 435 &reply_msg.acpted_rply.ar_verf)) { 436 ct->ct_error.re_status = RPC_AUTHERROR; 437 ct->ct_error.re_why = AUTH_INVALIDRESP; 438 } else { 439 if (cl->cl_auth->ah_cred.oa_flavor != RPCSEC_GSS) { 440 reply_stat = (*xdr_results)(xdrs, results_ptr); 441 } else { 442 reply_stat = __rpc_gss_unwrap(cl->cl_auth, 443 xdrs, xdr_results, results_ptr); 444 } 445 if (! reply_stat) { 446 if (ct->ct_error.re_status == RPC_SUCCESS) 447 ct->ct_error.re_status = 448 RPC_CANTDECODERES; 449 } 450 } 451 /* free verifier ... */ 452 if (reply_msg.acpted_rply.ar_verf.oa_base != NULL) { 453 xdrs->x_op = XDR_FREE; 454 (void)xdr_opaque_auth(xdrs, 455 &(reply_msg.acpted_rply.ar_verf)); 456 } 457 } /* end successful completion */ 458 else { 459 /* maybe our credentials need to be refreshed ... */ 460 if (refreshes-- && AUTH_REFRESH(cl->cl_auth, &reply_msg)) 461 goto call_again; 462 } /* end of unsuccessful completion */ 463 release_fd_lock(ct->ct_fd, mask); 464 return (ct->ct_error.re_status); 465 } 466 467 static void 468 clnt_vc_geterr(cl, errp) 469 CLIENT *cl; 470 struct rpc_err *errp; 471 { 472 struct ct_data *ct; 473 474 assert(cl != NULL); 475 assert(errp != NULL); 476 477 ct = (struct ct_data *) cl->cl_private; 478 *errp = ct->ct_error; 479 } 480 481 static bool_t 482 clnt_vc_freeres(cl, xdr_res, res_ptr) 483 CLIENT *cl; 484 xdrproc_t xdr_res; 485 void *res_ptr; 486 { 487 struct ct_data *ct; 488 XDR *xdrs; 489 bool_t dummy; 490 sigset_t mask; 491 sigset_t newmask; 492 493 assert(cl != NULL); 494 495 ct = (struct ct_data *)cl->cl_private; 496 xdrs = &(ct->ct_xdrs); 497 498 sigfillset(&newmask); 499 thr_sigsetmask(SIG_SETMASK, &newmask, &mask); 500 mutex_lock(&clnt_fd_lock); 501 while (vc_fd_locks[ct->ct_fd]) 502 cond_wait(&vc_cv[ct->ct_fd], &clnt_fd_lock); 503 xdrs->x_op = XDR_FREE; 504 dummy = (*xdr_res)(xdrs, res_ptr); 505 mutex_unlock(&clnt_fd_lock); 506 thr_sigsetmask(SIG_SETMASK, &(mask), NULL); 507 cond_signal(&vc_cv[ct->ct_fd]); 508 509 return dummy; 510 } 511 512 /*ARGSUSED*/ 513 static void 514 clnt_vc_abort(cl) 515 CLIENT *cl; 516 { 517 } 518 519 static bool_t 520 clnt_vc_control(cl, request, info) 521 CLIENT *cl; 522 u_int request; 523 void *info; 524 { 525 struct ct_data *ct; 526 void *infop = info; 527 sigset_t mask; 528 sigset_t newmask; 529 int rpc_lock_value; 530 531 assert(cl != NULL); 532 533 ct = (struct ct_data *)cl->cl_private; 534 535 sigfillset(&newmask); 536 thr_sigsetmask(SIG_SETMASK, &newmask, &mask); 537 mutex_lock(&clnt_fd_lock); 538 while (vc_fd_locks[ct->ct_fd]) 539 cond_wait(&vc_cv[ct->ct_fd], &clnt_fd_lock); 540 if (__isthreaded) 541 rpc_lock_value = 1; 542 else 543 rpc_lock_value = 0; 544 vc_fd_locks[ct->ct_fd] = rpc_lock_value; 545 mutex_unlock(&clnt_fd_lock); 546 547 switch (request) { 548 case CLSET_FD_CLOSE: 549 ct->ct_closeit = TRUE; 550 release_fd_lock(ct->ct_fd, mask); 551 return (TRUE); 552 case CLSET_FD_NCLOSE: 553 ct->ct_closeit = FALSE; 554 release_fd_lock(ct->ct_fd, mask); 555 return (TRUE); 556 default: 557 break; 558 } 559 560 /* for other requests which use info */ 561 if (info == NULL) { 562 release_fd_lock(ct->ct_fd, mask); 563 return (FALSE); 564 } 565 switch (request) { 566 case CLSET_TIMEOUT: 567 if (time_not_ok((struct timeval *)info)) { 568 release_fd_lock(ct->ct_fd, mask); 569 return (FALSE); 570 } 571 ct->ct_wait = *(struct timeval *)infop; 572 ct->ct_waitset = TRUE; 573 break; 574 case CLGET_TIMEOUT: 575 *(struct timeval *)infop = ct->ct_wait; 576 break; 577 case CLGET_SERVER_ADDR: 578 (void) memcpy(info, ct->ct_addr.buf, (size_t)ct->ct_addr.len); 579 break; 580 case CLGET_FD: 581 *(int *)info = ct->ct_fd; 582 break; 583 case CLGET_SVC_ADDR: 584 /* The caller should not free this memory area */ 585 *(struct netbuf *)info = ct->ct_addr; 586 break; 587 case CLSET_SVC_ADDR: /* set to new address */ 588 release_fd_lock(ct->ct_fd, mask); 589 return (FALSE); 590 case CLGET_XID: 591 /* 592 * use the knowledge that xid is the 593 * first element in the call structure 594 * This will get the xid of the PREVIOUS call 595 */ 596 *(u_int32_t *)info = 597 ntohl(*(u_int32_t *)(void *)&ct->ct_u.ct_mcalli); 598 break; 599 case CLSET_XID: 600 /* This will set the xid of the NEXT call */ 601 *(u_int32_t *)(void *)&ct->ct_u.ct_mcalli = 602 htonl(*((u_int32_t *)info) + 1); 603 /* increment by 1 as clnt_vc_call() decrements once */ 604 break; 605 case CLGET_VERS: 606 /* 607 * This RELIES on the information that, in the call body, 608 * the version number field is the fifth field from the 609 * begining of the RPC header. MUST be changed if the 610 * call_struct is changed 611 */ 612 *(u_int32_t *)info = 613 ntohl(*(u_int32_t *)(void *)(ct->ct_u.ct_mcallc + 614 4 * BYTES_PER_XDR_UNIT)); 615 break; 616 617 case CLSET_VERS: 618 *(u_int32_t *)(void *)(ct->ct_u.ct_mcallc + 619 4 * BYTES_PER_XDR_UNIT) = 620 htonl(*(u_int32_t *)info); 621 break; 622 623 case CLGET_PROG: 624 /* 625 * This RELIES on the information that, in the call body, 626 * the program number field is the fourth field from the 627 * begining of the RPC header. MUST be changed if the 628 * call_struct is changed 629 */ 630 *(u_int32_t *)info = 631 ntohl(*(u_int32_t *)(void *)(ct->ct_u.ct_mcallc + 632 3 * BYTES_PER_XDR_UNIT)); 633 break; 634 635 case CLSET_PROG: 636 *(u_int32_t *)(void *)(ct->ct_u.ct_mcallc + 637 3 * BYTES_PER_XDR_UNIT) = 638 htonl(*(u_int32_t *)info); 639 break; 640 641 default: 642 release_fd_lock(ct->ct_fd, mask); 643 return (FALSE); 644 } 645 release_fd_lock(ct->ct_fd, mask); 646 return (TRUE); 647 } 648 649 650 static void 651 clnt_vc_destroy(cl) 652 CLIENT *cl; 653 { 654 struct ct_data *ct = (struct ct_data *) cl->cl_private; 655 int ct_fd = ct->ct_fd; 656 sigset_t mask; 657 sigset_t newmask; 658 659 assert(cl != NULL); 660 661 ct = (struct ct_data *) cl->cl_private; 662 663 sigfillset(&newmask); 664 thr_sigsetmask(SIG_SETMASK, &newmask, &mask); 665 mutex_lock(&clnt_fd_lock); 666 while (vc_fd_locks[ct_fd]) 667 cond_wait(&vc_cv[ct_fd], &clnt_fd_lock); 668 if (ct->ct_closeit && ct->ct_fd != -1) { 669 (void)_close(ct->ct_fd); 670 } 671 XDR_DESTROY(&(ct->ct_xdrs)); 672 if (ct->ct_addr.buf) 673 free(ct->ct_addr.buf); 674 mem_free(ct, sizeof(struct ct_data)); 675 if (cl->cl_netid && cl->cl_netid[0]) 676 mem_free(cl->cl_netid, strlen(cl->cl_netid) +1); 677 if (cl->cl_tp && cl->cl_tp[0]) 678 mem_free(cl->cl_tp, strlen(cl->cl_tp) +1); 679 mem_free(cl, sizeof(CLIENT)); 680 mutex_unlock(&clnt_fd_lock); 681 thr_sigsetmask(SIG_SETMASK, &(mask), NULL); 682 cond_signal(&vc_cv[ct_fd]); 683 } 684 685 /* 686 * Interface between xdr serializer and tcp connection. 687 * Behaves like the system calls, read & write, but keeps some error state 688 * around for the rpc level. 689 */ 690 static int 691 read_vc(ctp, buf, len) 692 void *ctp; 693 void *buf; 694 int len; 695 { 696 struct sockaddr sa; 697 socklen_t sal; 698 struct ct_data *ct = (struct ct_data *)ctp; 699 struct pollfd fd; 700 int milliseconds = (int)((ct->ct_wait.tv_sec * 1000) + 701 (ct->ct_wait.tv_usec / 1000)); 702 703 if (len == 0) 704 return (0); 705 fd.fd = ct->ct_fd; 706 fd.events = POLLIN; 707 for (;;) { 708 switch (_poll(&fd, 1, milliseconds)) { 709 case 0: 710 ct->ct_error.re_status = RPC_TIMEDOUT; 711 return (-1); 712 713 case -1: 714 if (errno == EINTR) 715 continue; 716 ct->ct_error.re_status = RPC_CANTRECV; 717 ct->ct_error.re_errno = errno; 718 return (-1); 719 } 720 break; 721 } 722 723 sal = sizeof(sa); 724 if ((_getpeername(ct->ct_fd, &sa, &sal) == 0) && 725 (sa.sa_family == AF_LOCAL)) { 726 len = __msgread(ct->ct_fd, buf, (size_t)len); 727 } else { 728 len = _read(ct->ct_fd, buf, (size_t)len); 729 } 730 731 switch (len) { 732 case 0: 733 /* premature eof */ 734 ct->ct_error.re_errno = ECONNRESET; 735 ct->ct_error.re_status = RPC_CANTRECV; 736 len = -1; /* it's really an error */ 737 break; 738 739 case -1: 740 ct->ct_error.re_errno = errno; 741 ct->ct_error.re_status = RPC_CANTRECV; 742 break; 743 } 744 return (len); 745 } 746 747 static int 748 write_vc(ctp, buf, len) 749 void *ctp; 750 void *buf; 751 int len; 752 { 753 struct sockaddr sa; 754 socklen_t sal; 755 struct ct_data *ct = (struct ct_data *)ctp; 756 int i, cnt; 757 758 sal = sizeof(sa); 759 if ((_getpeername(ct->ct_fd, &sa, &sal) == 0) && 760 (sa.sa_family == AF_LOCAL)) { 761 for (cnt = len; cnt > 0; cnt -= i, buf = (char *)buf + i) { 762 if ((i = __msgwrite(ct->ct_fd, buf, 763 (size_t)cnt)) == -1) { 764 ct->ct_error.re_errno = errno; 765 ct->ct_error.re_status = RPC_CANTSEND; 766 return (-1); 767 } 768 } 769 } else { 770 for (cnt = len; cnt > 0; cnt -= i, buf = (char *)buf + i) { 771 if ((i = _write(ct->ct_fd, buf, (size_t)cnt)) == -1) { 772 ct->ct_error.re_errno = errno; 773 ct->ct_error.re_status = RPC_CANTSEND; 774 return (-1); 775 } 776 } 777 } 778 return (len); 779 } 780 781 static struct clnt_ops * 782 clnt_vc_ops() 783 { 784 static struct clnt_ops ops; 785 sigset_t mask, newmask; 786 787 /* VARIABLES PROTECTED BY ops_lock: ops */ 788 789 sigfillset(&newmask); 790 thr_sigsetmask(SIG_SETMASK, &newmask, &mask); 791 mutex_lock(&ops_lock); 792 if (ops.cl_call == NULL) { 793 ops.cl_call = clnt_vc_call; 794 ops.cl_abort = clnt_vc_abort; 795 ops.cl_geterr = clnt_vc_geterr; 796 ops.cl_freeres = clnt_vc_freeres; 797 ops.cl_destroy = clnt_vc_destroy; 798 ops.cl_control = clnt_vc_control; 799 } 800 mutex_unlock(&ops_lock); 801 thr_sigsetmask(SIG_SETMASK, &(mask), NULL); 802 return (&ops); 803 } 804 805 /* 806 * Make sure that the time is not garbage. -1 value is disallowed. 807 * Note this is different from time_not_ok in clnt_dg.c 808 */ 809 static bool_t 810 time_not_ok(t) 811 struct timeval *t; 812 { 813 return (t->tv_sec <= -1 || t->tv_sec > 100000000 || 814 t->tv_usec <= -1 || t->tv_usec > 1000000); 815 } 816 817 static int 818 __msgread(sock, buf, cnt) 819 int sock; 820 void *buf; 821 size_t cnt; 822 { 823 struct iovec iov[1]; 824 struct msghdr msg; 825 union { 826 struct cmsghdr cmsg; 827 char control[CMSG_SPACE(sizeof(struct cmsgcred))]; 828 } cm; 829 830 bzero((char *)&cm, sizeof(cm)); 831 iov[0].iov_base = buf; 832 iov[0].iov_len = cnt; 833 834 msg.msg_iov = iov; 835 msg.msg_iovlen = 1; 836 msg.msg_name = NULL; 837 msg.msg_namelen = 0; 838 msg.msg_control = (caddr_t)&cm; 839 msg.msg_controllen = CMSG_SPACE(sizeof(struct cmsgcred)); 840 msg.msg_flags = 0; 841 842 return(_recvmsg(sock, &msg, 0)); 843 } 844 845 static int 846 __msgwrite(sock, buf, cnt) 847 int sock; 848 void *buf; 849 size_t cnt; 850 { 851 struct iovec iov[1]; 852 struct msghdr msg; 853 union { 854 struct cmsghdr cmsg; 855 char control[CMSG_SPACE(sizeof(struct cmsgcred))]; 856 } cm; 857 858 bzero((char *)&cm, sizeof(cm)); 859 iov[0].iov_base = buf; 860 iov[0].iov_len = cnt; 861 862 cm.cmsg.cmsg_type = SCM_CREDS; 863 cm.cmsg.cmsg_level = SOL_SOCKET; 864 cm.cmsg.cmsg_len = CMSG_LEN(sizeof(struct cmsgcred)); 865 866 msg.msg_iov = iov; 867 msg.msg_iovlen = 1; 868 msg.msg_name = NULL; 869 msg.msg_namelen = 0; 870 msg.msg_control = (caddr_t)&cm; 871 msg.msg_controllen = CMSG_SPACE(sizeof(struct cmsgcred)); 872 msg.msg_flags = 0; 873 874 return(_sendmsg(sock, &msg, 0)); 875 } 876