1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 3 * 4 * Copyright (c) 2008 Isilon Inc http://www.isilon.com/ 5 * Authors: Doug Rabson <dfr@rabson.org> 6 * Developed with Red Inc: Alfred Perlstein <alfred@freebsd.org> 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27 * SUCH DAMAGE. 28 */ 29 30 #include <sys/cdefs.h> 31 __FBSDID("$FreeBSD$"); 32 33 #include <sys/param.h> 34 #include <sys/systm.h> 35 #include <sys/kernel.h> 36 #include <sys/limits.h> 37 #include <sys/lock.h> 38 #include <sys/malloc.h> 39 #include <sys/mbuf.h> 40 #include <sys/mutex.h> 41 #include <sys/pcpu.h> 42 #include <sys/proc.h> 43 #include <sys/socket.h> 44 #include <sys/socketvar.h> 45 #include <sys/time.h> 46 #include <sys/uio.h> 47 48 #include <rpc/rpc.h> 49 #include <rpc/rpc_com.h> 50 #include <rpc/krpc.h> 51 #include <rpc/rpcsec_tls.h> 52 53 static enum clnt_stat clnt_reconnect_call(CLIENT *, struct rpc_callextra *, 54 rpcproc_t, struct mbuf *, struct mbuf **, struct timeval); 55 static void clnt_reconnect_geterr(CLIENT *, struct rpc_err *); 56 static bool_t clnt_reconnect_freeres(CLIENT *, xdrproc_t, void *); 57 static void clnt_reconnect_abort(CLIENT *); 58 static bool_t clnt_reconnect_control(CLIENT *, u_int, void *); 59 static void clnt_reconnect_close(CLIENT *); 60 static void clnt_reconnect_destroy(CLIENT *); 61 62 static const struct clnt_ops clnt_reconnect_ops = { 63 .cl_call = clnt_reconnect_call, 64 .cl_abort = clnt_reconnect_abort, 65 .cl_geterr = clnt_reconnect_geterr, 66 .cl_freeres = clnt_reconnect_freeres, 67 .cl_close = clnt_reconnect_close, 68 .cl_destroy = clnt_reconnect_destroy, 69 .cl_control = clnt_reconnect_control 70 }; 71 72 static int fake_wchan; 73 74 CLIENT * 75 clnt_reconnect_create( 76 struct netconfig *nconf, /* network type */ 77 struct sockaddr *svcaddr, /* servers address */ 78 rpcprog_t program, /* program number */ 79 rpcvers_t version, /* version number */ 80 size_t sendsz, /* buffer recv size */ 81 size_t recvsz) /* buffer send size */ 82 { 83 CLIENT *cl = NULL; /* client handle */ 84 struct rc_data *rc = NULL; /* private data */ 85 86 if (svcaddr == NULL) { 87 rpc_createerr.cf_stat = RPC_UNKNOWNADDR; 88 return (NULL); 89 } 90 91 cl = mem_alloc(sizeof (CLIENT)); 92 rc = mem_alloc(sizeof (*rc)); 93 mtx_init(&rc->rc_lock, "rc->rc_lock", NULL, MTX_DEF); 94 (void) memcpy(&rc->rc_addr, svcaddr, (size_t)svcaddr->sa_len); 95 rc->rc_nconf = nconf; 96 rc->rc_prog = program; 97 rc->rc_vers = version; 98 rc->rc_sendsz = sendsz; 99 rc->rc_recvsz = recvsz; 100 rc->rc_timeout.tv_sec = -1; 101 rc->rc_timeout.tv_usec = -1; 102 rc->rc_retry.tv_sec = 3; 103 rc->rc_retry.tv_usec = 0; 104 rc->rc_retries = INT_MAX; 105 rc->rc_privport = FALSE; 106 rc->rc_waitchan = "rpcrecv"; 107 rc->rc_intr = 0; 108 rc->rc_connecting = FALSE; 109 rc->rc_closed = FALSE; 110 rc->rc_ucred = crdup(curthread->td_ucred); 111 rc->rc_client = NULL; 112 rc->rc_tls = false; 113 rc->rc_tlscertname = NULL; 114 rc->rc_reconcall = NULL; 115 rc->rc_reconarg = NULL; 116 117 cl->cl_refs = 1; 118 cl->cl_ops = &clnt_reconnect_ops; 119 cl->cl_private = (caddr_t)(void *)rc; 120 cl->cl_auth = authnone_create(); 121 cl->cl_tp = NULL; 122 cl->cl_netid = NULL; 123 return (cl); 124 } 125 126 static enum clnt_stat 127 clnt_reconnect_connect(CLIENT *cl) 128 { 129 struct thread *td = curthread; 130 struct rc_data *rc = (struct rc_data *)cl->cl_private; 131 struct socket *so; 132 enum clnt_stat stat; 133 int error; 134 int one = 1; 135 struct ucred *oldcred; 136 CLIENT *newclient = NULL; 137 uint64_t ssl[3]; 138 uint32_t reterr; 139 140 mtx_lock(&rc->rc_lock); 141 while (rc->rc_connecting) { 142 error = msleep(rc, &rc->rc_lock, 143 rc->rc_intr ? PCATCH : 0, "rpcrecon", 0); 144 if (error) { 145 mtx_unlock(&rc->rc_lock); 146 return (RPC_INTR); 147 } 148 } 149 if (rc->rc_closed) { 150 mtx_unlock(&rc->rc_lock); 151 return (RPC_CANTSEND); 152 } 153 if (rc->rc_client) { 154 mtx_unlock(&rc->rc_lock); 155 return (RPC_SUCCESS); 156 } 157 158 /* 159 * My turn to attempt a connect. The rc_connecting variable 160 * serializes the following code sequence, so it is guaranteed 161 * that rc_client will still be NULL after it is re-locked below, 162 * since that is the only place it is set non-NULL. 163 */ 164 rc->rc_connecting = TRUE; 165 mtx_unlock(&rc->rc_lock); 166 167 oldcred = td->td_ucred; 168 td->td_ucred = rc->rc_ucred; 169 so = __rpc_nconf2socket(rc->rc_nconf); 170 if (!so) { 171 stat = rpc_createerr.cf_stat = RPC_TLIERROR; 172 rpc_createerr.cf_error.re_errno = 0; 173 td->td_ucred = oldcred; 174 goto out; 175 } 176 177 if (rc->rc_privport) 178 bindresvport(so, NULL); 179 180 if (rc->rc_nconf->nc_semantics == NC_TPI_CLTS) 181 newclient = clnt_dg_create(so, 182 (struct sockaddr *) &rc->rc_addr, rc->rc_prog, rc->rc_vers, 183 rc->rc_sendsz, rc->rc_recvsz); 184 else { 185 /* 186 * I do not believe a timeout of less than 1sec would make 187 * sense here since short delays can occur when a server is 188 * temporarily overloaded. 189 */ 190 if (rc->rc_timeout.tv_sec > 0 && rc->rc_timeout.tv_usec >= 0) { 191 error = so_setsockopt(so, SOL_SOCKET, SO_SNDTIMEO, 192 &rc->rc_timeout, sizeof(struct timeval)); 193 if (error != 0) { 194 stat = rpc_createerr.cf_stat = RPC_CANTSEND; 195 rpc_createerr.cf_error.re_errno = error; 196 td->td_ucred = oldcred; 197 goto out; 198 } 199 } 200 newclient = clnt_vc_create(so, 201 (struct sockaddr *) &rc->rc_addr, rc->rc_prog, rc->rc_vers, 202 rc->rc_sendsz, rc->rc_recvsz, rc->rc_intr); 203 if (rc->rc_tls && newclient != NULL) { 204 stat = rpctls_connect(newclient, rc->rc_tlscertname, so, 205 ssl, &reterr); 206 if (stat != RPC_SUCCESS || reterr != RPCTLSERR_OK) { 207 if (stat == RPC_SUCCESS) 208 stat = RPC_FAILED; 209 stat = rpc_createerr.cf_stat = stat; 210 rpc_createerr.cf_error.re_errno = 0; 211 CLNT_CLOSE(newclient); 212 CLNT_RELEASE(newclient); 213 newclient = NULL; 214 td->td_ucred = oldcred; 215 goto out; 216 } 217 } 218 if (newclient != NULL && rc->rc_reconcall != NULL) 219 (*rc->rc_reconcall)(newclient, rc->rc_reconarg, 220 rc->rc_ucred); 221 } 222 td->td_ucred = oldcred; 223 224 if (!newclient) { 225 soclose(so); 226 rc->rc_err = rpc_createerr.cf_error; 227 stat = rpc_createerr.cf_stat; 228 goto out; 229 } 230 231 CLNT_CONTROL(newclient, CLSET_FD_CLOSE, 0); 232 CLNT_CONTROL(newclient, CLSET_CONNECT, &one); 233 CLNT_CONTROL(newclient, CLSET_TIMEOUT, &rc->rc_timeout); 234 CLNT_CONTROL(newclient, CLSET_RETRY_TIMEOUT, &rc->rc_retry); 235 CLNT_CONTROL(newclient, CLSET_WAITCHAN, rc->rc_waitchan); 236 CLNT_CONTROL(newclient, CLSET_INTERRUPTIBLE, &rc->rc_intr); 237 if (rc->rc_tls) 238 CLNT_CONTROL(newclient, CLSET_TLS, ssl); 239 if (rc->rc_backchannel != NULL) 240 CLNT_CONTROL(newclient, CLSET_BACKCHANNEL, rc->rc_backchannel); 241 stat = RPC_SUCCESS; 242 243 out: 244 mtx_lock(&rc->rc_lock); 245 KASSERT(rc->rc_client == NULL, ("rc_client not null")); 246 if (!rc->rc_closed) { 247 rc->rc_client = newclient; 248 newclient = NULL; 249 } 250 rc->rc_connecting = FALSE; 251 wakeup(rc); 252 mtx_unlock(&rc->rc_lock); 253 254 if (newclient) { 255 /* 256 * It has been closed, so discard the new client. 257 * nb: clnt_[dg|vc]_close()/clnt_[dg|vc]_destroy() cannot 258 * be called with the rc_lock mutex held, since they may 259 * msleep() while holding a different mutex. 260 */ 261 CLNT_CLOSE(newclient); 262 CLNT_RELEASE(newclient); 263 } 264 265 return (stat); 266 } 267 268 static enum clnt_stat 269 clnt_reconnect_call( 270 CLIENT *cl, /* client handle */ 271 struct rpc_callextra *ext, /* call metadata */ 272 rpcproc_t proc, /* procedure number */ 273 struct mbuf *args, /* pointer to args */ 274 struct mbuf **resultsp, /* pointer to results */ 275 struct timeval utimeout) 276 { 277 struct rc_data *rc = (struct rc_data *)cl->cl_private; 278 CLIENT *client; 279 enum clnt_stat stat; 280 int tries, error; 281 282 tries = 0; 283 do { 284 mtx_lock(&rc->rc_lock); 285 if (rc->rc_closed) { 286 mtx_unlock(&rc->rc_lock); 287 return (RPC_CANTSEND); 288 } 289 290 if (!rc->rc_client) { 291 mtx_unlock(&rc->rc_lock); 292 stat = clnt_reconnect_connect(cl); 293 if (stat == RPC_SYSTEMERROR) { 294 error = tsleep(&fake_wchan, 295 rc->rc_intr ? PCATCH : 0, "rpccon", hz); 296 if (error == EINTR || error == ERESTART) 297 return (RPC_INTR); 298 tries++; 299 if (tries >= rc->rc_retries) 300 return (stat); 301 continue; 302 } 303 if (stat != RPC_SUCCESS) 304 return (stat); 305 mtx_lock(&rc->rc_lock); 306 } 307 308 if (!rc->rc_client) { 309 mtx_unlock(&rc->rc_lock); 310 stat = RPC_FAILED; 311 continue; 312 } 313 CLNT_ACQUIRE(rc->rc_client); 314 client = rc->rc_client; 315 mtx_unlock(&rc->rc_lock); 316 stat = CLNT_CALL_MBUF(client, ext, proc, args, 317 resultsp, utimeout); 318 319 if (stat != RPC_SUCCESS) { 320 if (!ext) 321 CLNT_GETERR(client, &rc->rc_err); 322 } 323 324 if (stat == RPC_TIMEDOUT) { 325 /* 326 * Check for async send misfeature for NLM 327 * protocol. 328 */ 329 if ((rc->rc_timeout.tv_sec == 0 330 && rc->rc_timeout.tv_usec == 0) 331 || (rc->rc_timeout.tv_sec == -1 332 && utimeout.tv_sec == 0 333 && utimeout.tv_usec == 0)) { 334 CLNT_RELEASE(client); 335 break; 336 } 337 } 338 339 if (stat == RPC_TIMEDOUT || stat == RPC_CANTSEND 340 || stat == RPC_CANTRECV) { 341 tries++; 342 if (tries >= rc->rc_retries) { 343 CLNT_RELEASE(client); 344 break; 345 } 346 347 if (ext && ext->rc_feedback) 348 ext->rc_feedback(FEEDBACK_RECONNECT, proc, 349 ext->rc_feedback_arg); 350 351 mtx_lock(&rc->rc_lock); 352 /* 353 * Make sure that someone else hasn't already 354 * reconnected by checking if rc_client has changed. 355 * If not, we are done with the client and must 356 * do CLNT_RELEASE(client) twice to dispose of it, 357 * because there is both an initial refcnt and one 358 * acquired by CLNT_ACQUIRE() above. 359 */ 360 if (rc->rc_client == client) { 361 rc->rc_client = NULL; 362 mtx_unlock(&rc->rc_lock); 363 CLNT_RELEASE(client); 364 } else { 365 mtx_unlock(&rc->rc_lock); 366 } 367 CLNT_RELEASE(client); 368 } else { 369 CLNT_RELEASE(client); 370 break; 371 } 372 } while (stat != RPC_SUCCESS); 373 374 KASSERT(stat != RPC_SUCCESS || *resultsp, 375 ("RPC_SUCCESS without reply")); 376 377 return (stat); 378 } 379 380 static void 381 clnt_reconnect_geterr(CLIENT *cl, struct rpc_err *errp) 382 { 383 struct rc_data *rc = (struct rc_data *)cl->cl_private; 384 385 *errp = rc->rc_err; 386 } 387 388 /* 389 * Since this function requires that rc_client be valid, it can 390 * only be called when that is guaranteed to be the case. 391 */ 392 static bool_t 393 clnt_reconnect_freeres(CLIENT *cl, xdrproc_t xdr_res, void *res_ptr) 394 { 395 struct rc_data *rc = (struct rc_data *)cl->cl_private; 396 397 return (CLNT_FREERES(rc->rc_client, xdr_res, res_ptr)); 398 } 399 400 /*ARGSUSED*/ 401 static void 402 clnt_reconnect_abort(CLIENT *h) 403 { 404 } 405 406 /* 407 * CLNT_CONTROL() on the client returned by clnt_reconnect_create() must 408 * always be called before CLNT_CALL_MBUF() by a single thread only. 409 */ 410 static bool_t 411 clnt_reconnect_control(CLIENT *cl, u_int request, void *info) 412 { 413 struct rc_data *rc = (struct rc_data *)cl->cl_private; 414 SVCXPRT *xprt; 415 size_t slen; 416 struct rpc_reconupcall *upcp; 417 418 if (info == NULL) { 419 return (FALSE); 420 } 421 switch (request) { 422 case CLSET_TIMEOUT: 423 rc->rc_timeout = *(struct timeval *)info; 424 if (rc->rc_client) 425 CLNT_CONTROL(rc->rc_client, request, info); 426 break; 427 428 case CLGET_TIMEOUT: 429 *(struct timeval *)info = rc->rc_timeout; 430 break; 431 432 case CLSET_RETRY_TIMEOUT: 433 rc->rc_retry = *(struct timeval *)info; 434 if (rc->rc_client) 435 CLNT_CONTROL(rc->rc_client, request, info); 436 break; 437 438 case CLGET_RETRY_TIMEOUT: 439 *(struct timeval *)info = rc->rc_retry; 440 break; 441 442 case CLGET_VERS: 443 *(uint32_t *)info = rc->rc_vers; 444 break; 445 446 case CLSET_VERS: 447 rc->rc_vers = *(uint32_t *) info; 448 if (rc->rc_client) 449 CLNT_CONTROL(rc->rc_client, CLSET_VERS, info); 450 break; 451 452 case CLGET_PROG: 453 *(uint32_t *)info = rc->rc_prog; 454 break; 455 456 case CLSET_PROG: 457 rc->rc_prog = *(uint32_t *) info; 458 if (rc->rc_client) 459 CLNT_CONTROL(rc->rc_client, request, info); 460 break; 461 462 case CLSET_WAITCHAN: 463 rc->rc_waitchan = (char *)info; 464 if (rc->rc_client) 465 CLNT_CONTROL(rc->rc_client, request, info); 466 break; 467 468 case CLGET_WAITCHAN: 469 *(const char **) info = rc->rc_waitchan; 470 break; 471 472 case CLSET_INTERRUPTIBLE: 473 rc->rc_intr = *(int *) info; 474 if (rc->rc_client) 475 CLNT_CONTROL(rc->rc_client, request, info); 476 break; 477 478 case CLGET_INTERRUPTIBLE: 479 *(int *) info = rc->rc_intr; 480 break; 481 482 case CLSET_RETRIES: 483 rc->rc_retries = *(int *) info; 484 break; 485 486 case CLGET_RETRIES: 487 *(int *) info = rc->rc_retries; 488 break; 489 490 case CLSET_PRIVPORT: 491 rc->rc_privport = *(int *) info; 492 break; 493 494 case CLGET_PRIVPORT: 495 *(int *) info = rc->rc_privport; 496 break; 497 498 case CLSET_BACKCHANNEL: 499 xprt = (SVCXPRT *)info; 500 xprt_register(xprt); 501 rc->rc_backchannel = info; 502 break; 503 504 case CLSET_TLS: 505 rc->rc_tls = true; 506 break; 507 508 case CLSET_TLSCERTNAME: 509 slen = strlen(info) + 1; 510 /* 511 * tlscertname with "key.pem" appended to it forms a file 512 * name. As such, the maximum allowable strlen(info) is 513 * NAME_MAX - 7. However, "slen" includes the nul termination 514 * byte so it can be up to NAME_MAX - 6. 515 */ 516 if (slen <= 1 || slen > NAME_MAX - 6) 517 return (FALSE); 518 rc->rc_tlscertname = mem_alloc(slen); 519 strlcpy(rc->rc_tlscertname, info, slen); 520 break; 521 522 case CLSET_RECONUPCALL: 523 upcp = (struct rpc_reconupcall *)info; 524 rc->rc_reconcall = upcp->call; 525 rc->rc_reconarg = upcp->arg; 526 break; 527 528 default: 529 return (FALSE); 530 } 531 532 return (TRUE); 533 } 534 535 static void 536 clnt_reconnect_close(CLIENT *cl) 537 { 538 struct rc_data *rc = (struct rc_data *)cl->cl_private; 539 CLIENT *client; 540 541 mtx_lock(&rc->rc_lock); 542 543 if (rc->rc_closed) { 544 mtx_unlock(&rc->rc_lock); 545 return; 546 } 547 548 rc->rc_closed = TRUE; 549 client = rc->rc_client; 550 rc->rc_client = NULL; 551 552 mtx_unlock(&rc->rc_lock); 553 554 if (client) { 555 CLNT_CLOSE(client); 556 CLNT_RELEASE(client); 557 } 558 } 559 560 static void 561 clnt_reconnect_destroy(CLIENT *cl) 562 { 563 struct rc_data *rc = (struct rc_data *)cl->cl_private; 564 SVCXPRT *xprt; 565 566 if (rc->rc_client) 567 CLNT_DESTROY(rc->rc_client); 568 if (rc->rc_backchannel) { 569 xprt = (SVCXPRT *)rc->rc_backchannel; 570 KASSERT(xprt->xp_socket == NULL, 571 ("clnt_reconnect_destroy: xp_socket not NULL")); 572 xprt_unregister(xprt); 573 SVC_RELEASE(xprt); 574 } 575 crfree(rc->rc_ucred); 576 mtx_destroy(&rc->rc_lock); 577 mem_free(rc->rc_tlscertname, 0); /* 0 ok, since arg. ignored. */ 578 mem_free(rc->rc_reconarg, 0); 579 mem_free(rc, sizeof(*rc)); 580 mem_free(cl, sizeof (CLIENT)); 581 } 582