]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/blob - sys/rpc/clnt_rc.c
bsddialog: import version 0.0.2
[FreeBSD/FreeBSD.git] / sys / rpc / clnt_rc.c
1 /*-
2  * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
3  *
4  * Copyright (c) 2008 Isilon Inc http://www.isilon.com/
5  * Authors: Doug Rabson <dfr@rabson.org>
6  * Developed with Red Inc: Alfred Perlstein <alfred@freebsd.org>
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  *
17  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
21  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27  * SUCH DAMAGE.
28  */
29
30 #include <sys/cdefs.h>
31 __FBSDID("$FreeBSD$");
32
33 #include <sys/param.h>
34 #include <sys/systm.h>
35 #include <sys/kernel.h>
36 #include <sys/limits.h>
37 #include <sys/lock.h>
38 #include <sys/malloc.h>
39 #include <sys/mbuf.h>
40 #include <sys/mutex.h>
41 #include <sys/pcpu.h>
42 #include <sys/proc.h>
43 #include <sys/socket.h>
44 #include <sys/socketvar.h>
45 #include <sys/time.h>
46 #include <sys/uio.h>
47
48 #include <rpc/rpc.h>
49 #include <rpc/rpc_com.h>
50 #include <rpc/krpc.h>
51 #include <rpc/rpcsec_tls.h>
52
53 static enum clnt_stat clnt_reconnect_call(CLIENT *, struct rpc_callextra *,
54     rpcproc_t, struct mbuf *, struct mbuf **, struct timeval);
55 static void clnt_reconnect_geterr(CLIENT *, struct rpc_err *);
56 static bool_t clnt_reconnect_freeres(CLIENT *, xdrproc_t, void *);
57 static void clnt_reconnect_abort(CLIENT *);
58 static bool_t clnt_reconnect_control(CLIENT *, u_int, void *);
59 static void clnt_reconnect_close(CLIENT *);
60 static void clnt_reconnect_destroy(CLIENT *);
61
62 static const struct clnt_ops clnt_reconnect_ops = {
63         .cl_call =      clnt_reconnect_call,
64         .cl_abort =     clnt_reconnect_abort,
65         .cl_geterr =    clnt_reconnect_geterr,
66         .cl_freeres =   clnt_reconnect_freeres,
67         .cl_close =     clnt_reconnect_close,
68         .cl_destroy =   clnt_reconnect_destroy,
69         .cl_control =   clnt_reconnect_control
70 };
71
72 static int      fake_wchan;
73
74 CLIENT *
75 clnt_reconnect_create(
76         struct netconfig *nconf,        /* network type */
77         struct sockaddr *svcaddr,       /* servers address */
78         rpcprog_t program,              /* program number */
79         rpcvers_t version,              /* version number */
80         size_t sendsz,                  /* buffer recv size */
81         size_t recvsz)                  /* buffer send size */
82 {
83         CLIENT *cl = NULL;              /* client handle */
84         struct rc_data *rc = NULL;      /* private data */
85
86         if (svcaddr == NULL) {
87                 rpc_createerr.cf_stat = RPC_UNKNOWNADDR;
88                 return (NULL);
89         }
90
91         cl = mem_alloc(sizeof (CLIENT));
92         rc = mem_alloc(sizeof (*rc));
93         mtx_init(&rc->rc_lock, "rc->rc_lock", NULL, MTX_DEF);
94         (void) memcpy(&rc->rc_addr, svcaddr, (size_t)svcaddr->sa_len);
95         rc->rc_nconf = nconf;
96         rc->rc_prog = program;
97         rc->rc_vers = version;
98         rc->rc_sendsz = sendsz;
99         rc->rc_recvsz = recvsz;
100         rc->rc_timeout.tv_sec = -1;
101         rc->rc_timeout.tv_usec = -1;
102         rc->rc_retry.tv_sec = 3;
103         rc->rc_retry.tv_usec = 0;
104         rc->rc_retries = INT_MAX;
105         rc->rc_privport = FALSE;
106         rc->rc_waitchan = "rpcrecv";
107         rc->rc_intr = 0;
108         rc->rc_connecting = FALSE;
109         rc->rc_closed = FALSE;
110         rc->rc_ucred = crdup(curthread->td_ucred);
111         rc->rc_client = NULL;
112         rc->rc_tls = false;
113         rc->rc_tlscertname = NULL;
114         rc->rc_reconcall = NULL;
115         rc->rc_reconarg = NULL;
116
117         cl->cl_refs = 1;
118         cl->cl_ops = &clnt_reconnect_ops;
119         cl->cl_private = (caddr_t)(void *)rc;
120         cl->cl_auth = authnone_create();
121         cl->cl_tp = NULL;
122         cl->cl_netid = NULL;
123         return (cl);
124 }
125
126 static enum clnt_stat
127 clnt_reconnect_connect(CLIENT *cl)
128 {
129         struct thread *td = curthread;
130         struct rc_data *rc = (struct rc_data *)cl->cl_private;
131         struct socket *so;
132         enum clnt_stat stat;
133         int error;
134         int one = 1;
135         struct ucred *oldcred;
136         CLIENT *newclient = NULL;
137         uint64_t ssl[3];
138         uint32_t reterr;
139
140         mtx_lock(&rc->rc_lock);
141         while (rc->rc_connecting) {
142                 error = msleep(rc, &rc->rc_lock,
143                     rc->rc_intr ? PCATCH : 0, "rpcrecon", 0);
144                 if (error) {
145                         mtx_unlock(&rc->rc_lock);
146                         return (RPC_INTR);
147                 }
148         }
149         if (rc->rc_closed) {
150                 mtx_unlock(&rc->rc_lock);
151                 return (RPC_CANTSEND);
152         }
153         if (rc->rc_client) {
154                 mtx_unlock(&rc->rc_lock);
155                 return (RPC_SUCCESS);
156         }
157
158         /*
159          * My turn to attempt a connect. The rc_connecting variable
160          * serializes the following code sequence, so it is guaranteed
161          * that rc_client will still be NULL after it is re-locked below,
162          * since that is the only place it is set non-NULL.
163          */
164         rc->rc_connecting = TRUE;
165         mtx_unlock(&rc->rc_lock);
166
167         oldcred = td->td_ucred;
168         td->td_ucred = rc->rc_ucred;
169         so = __rpc_nconf2socket(rc->rc_nconf);
170         if (!so) {
171                 stat = rpc_createerr.cf_stat = RPC_TLIERROR;
172                 rpc_createerr.cf_error.re_errno = 0;
173                 td->td_ucred = oldcred;
174                 goto out;
175         }
176
177         if (rc->rc_privport)
178                 bindresvport(so, NULL);
179
180         if (rc->rc_nconf->nc_semantics == NC_TPI_CLTS)
181                 newclient = clnt_dg_create(so,
182                     (struct sockaddr *) &rc->rc_addr, rc->rc_prog, rc->rc_vers,
183                     rc->rc_sendsz, rc->rc_recvsz);
184         else {
185                 /*
186                  * I do not believe a timeout of less than 1sec would make
187                  * sense here since short delays can occur when a server is
188                  * temporarily overloaded.
189                  */
190                 if (rc->rc_timeout.tv_sec > 0 && rc->rc_timeout.tv_usec >= 0) {
191                         error = so_setsockopt(so, SOL_SOCKET, SO_SNDTIMEO,
192                             &rc->rc_timeout, sizeof(struct timeval));
193                         if (error != 0) {
194                                 stat = rpc_createerr.cf_stat = RPC_CANTSEND;
195                                 rpc_createerr.cf_error.re_errno = error;
196                                 td->td_ucred = oldcred;
197                                 goto out;
198                         }
199                 }
200                 newclient = clnt_vc_create(so,
201                     (struct sockaddr *) &rc->rc_addr, rc->rc_prog, rc->rc_vers,
202                     rc->rc_sendsz, rc->rc_recvsz, rc->rc_intr);
203                 if (rc->rc_tls && newclient != NULL) {
204                         stat = rpctls_connect(newclient, rc->rc_tlscertname, so,
205                             ssl, &reterr);
206                         if (stat != RPC_SUCCESS || reterr != RPCTLSERR_OK) {
207                                 if (stat == RPC_SUCCESS)
208                                         stat = RPC_FAILED;
209                                 stat = rpc_createerr.cf_stat = stat;
210                                 rpc_createerr.cf_error.re_errno = 0;
211                                 CLNT_CLOSE(newclient);
212                                 CLNT_RELEASE(newclient);
213                                 newclient = NULL;
214                                 td->td_ucred = oldcred;
215                                 goto out;
216                         }
217                 }
218                 if (newclient != NULL && rc->rc_reconcall != NULL)
219                         (*rc->rc_reconcall)(newclient, rc->rc_reconarg,
220                             rc->rc_ucred);
221         }
222         td->td_ucred = oldcred;
223
224         if (!newclient) {
225                 soclose(so);
226                 rc->rc_err = rpc_createerr.cf_error;
227                 stat = rpc_createerr.cf_stat;
228                 goto out;
229         }
230
231         CLNT_CONTROL(newclient, CLSET_FD_CLOSE, 0);
232         CLNT_CONTROL(newclient, CLSET_CONNECT, &one);
233         CLNT_CONTROL(newclient, CLSET_TIMEOUT, &rc->rc_timeout);
234         CLNT_CONTROL(newclient, CLSET_RETRY_TIMEOUT, &rc->rc_retry);
235         CLNT_CONTROL(newclient, CLSET_WAITCHAN, rc->rc_waitchan);
236         CLNT_CONTROL(newclient, CLSET_INTERRUPTIBLE, &rc->rc_intr);
237         if (rc->rc_tls)
238                 CLNT_CONTROL(newclient, CLSET_TLS, ssl);
239         if (rc->rc_backchannel != NULL)
240                 CLNT_CONTROL(newclient, CLSET_BACKCHANNEL, rc->rc_backchannel);
241         stat = RPC_SUCCESS;
242
243 out:
244         mtx_lock(&rc->rc_lock);
245         KASSERT(rc->rc_client == NULL, ("rc_client not null"));
246         if (!rc->rc_closed) {
247                 rc->rc_client = newclient;
248                 newclient = NULL;
249         }
250         rc->rc_connecting = FALSE;
251         wakeup(rc);
252         mtx_unlock(&rc->rc_lock);
253
254         if (newclient) {
255                 /*
256                  * It has been closed, so discard the new client.
257                  * nb: clnt_[dg|vc]_close()/clnt_[dg|vc]_destroy() cannot
258                  * be called with the rc_lock mutex held, since they may
259                  * msleep() while holding a different mutex.
260                  */
261                 CLNT_CLOSE(newclient);
262                 CLNT_RELEASE(newclient);
263         }
264
265         return (stat);
266 }
267
268 static enum clnt_stat
269 clnt_reconnect_call(
270         CLIENT          *cl,            /* client handle */
271         struct rpc_callextra *ext,      /* call metadata */
272         rpcproc_t       proc,           /* procedure number */
273         struct mbuf     *args,          /* pointer to args */
274         struct mbuf     **resultsp,     /* pointer to results */
275         struct timeval  utimeout)
276 {
277         struct rc_data *rc = (struct rc_data *)cl->cl_private;
278         CLIENT *client;
279         enum clnt_stat stat;
280         int tries, error;
281
282         tries = 0;
283         do {
284                 mtx_lock(&rc->rc_lock);
285                 if (rc->rc_closed) {
286                         mtx_unlock(&rc->rc_lock);
287                         return (RPC_CANTSEND);
288                 }
289
290                 if (!rc->rc_client) {
291                         mtx_unlock(&rc->rc_lock);
292                         stat = clnt_reconnect_connect(cl);
293                         if (stat == RPC_SYSTEMERROR) {
294                                 error = tsleep(&fake_wchan,
295                                     rc->rc_intr ? PCATCH : 0, "rpccon", hz);
296                                 if (error == EINTR || error == ERESTART)
297                                         return (RPC_INTR);
298                                 tries++;
299                                 if (tries >= rc->rc_retries)
300                                         return (stat);
301                                 continue;
302                         }
303                         if (stat != RPC_SUCCESS)
304                                 return (stat);
305                         mtx_lock(&rc->rc_lock);
306                 }
307
308                 if (!rc->rc_client) {
309                         mtx_unlock(&rc->rc_lock);
310                         stat = RPC_FAILED;
311                         continue;
312                 }
313                 CLNT_ACQUIRE(rc->rc_client);
314                 client = rc->rc_client;
315                 mtx_unlock(&rc->rc_lock);
316                 stat = CLNT_CALL_MBUF(client, ext, proc, args,
317                     resultsp, utimeout);
318
319                 if (stat != RPC_SUCCESS) {
320                         if (!ext)
321                                 CLNT_GETERR(client, &rc->rc_err);
322                 }
323
324                 if (stat == RPC_TIMEDOUT) {
325                         /*
326                          * Check for async send misfeature for NLM
327                          * protocol.
328                          */
329                         if ((rc->rc_timeout.tv_sec == 0
330                                 && rc->rc_timeout.tv_usec == 0)
331                             || (rc->rc_timeout.tv_sec == -1
332                                 && utimeout.tv_sec == 0
333                                 && utimeout.tv_usec == 0)) {
334                                 CLNT_RELEASE(client);
335                                 break;
336                         }
337                 }
338
339                 if (stat == RPC_TIMEDOUT || stat == RPC_CANTSEND
340                     || stat == RPC_CANTRECV) {
341                         tries++;
342                         if (tries >= rc->rc_retries) {
343                                 CLNT_RELEASE(client);
344                                 break;
345                         }
346
347                         if (ext && ext->rc_feedback)
348                                 ext->rc_feedback(FEEDBACK_RECONNECT, proc,
349                                     ext->rc_feedback_arg);
350
351                         mtx_lock(&rc->rc_lock);
352                         /*
353                          * Make sure that someone else hasn't already
354                          * reconnected by checking if rc_client has changed.
355                          * If not, we are done with the client and must
356                          * do CLNT_RELEASE(client) twice to dispose of it,
357                          * because there is both an initial refcnt and one
358                          * acquired by CLNT_ACQUIRE() above.
359                          */
360                         if (rc->rc_client == client) {
361                                 rc->rc_client = NULL;
362                                 mtx_unlock(&rc->rc_lock);
363                                 CLNT_RELEASE(client);
364                         } else {
365                                 mtx_unlock(&rc->rc_lock);
366                         }
367                         CLNT_RELEASE(client);
368                 } else {
369                         CLNT_RELEASE(client);
370                         break;
371                 }
372         } while (stat != RPC_SUCCESS);
373
374         KASSERT(stat != RPC_SUCCESS || *resultsp,
375             ("RPC_SUCCESS without reply"));
376
377         return (stat);
378 }
379
380 static void
381 clnt_reconnect_geterr(CLIENT *cl, struct rpc_err *errp)
382 {
383         struct rc_data *rc = (struct rc_data *)cl->cl_private;
384
385         *errp = rc->rc_err;
386 }
387
388 /*
389  * Since this function requires that rc_client be valid, it can
390  * only be called when that is guaranteed to be the case.
391  */
392 static bool_t
393 clnt_reconnect_freeres(CLIENT *cl, xdrproc_t xdr_res, void *res_ptr)
394 {
395         struct rc_data *rc = (struct rc_data *)cl->cl_private;
396
397         return (CLNT_FREERES(rc->rc_client, xdr_res, res_ptr));
398 }
399
400 /*ARGSUSED*/
401 static void
402 clnt_reconnect_abort(CLIENT *h)
403 {
404 }
405
406 /*
407  * CLNT_CONTROL() on the client returned by clnt_reconnect_create() must
408  * always be called before CLNT_CALL_MBUF() by a single thread only.
409  */
410 static bool_t
411 clnt_reconnect_control(CLIENT *cl, u_int request, void *info)
412 {
413         struct rc_data *rc = (struct rc_data *)cl->cl_private;
414         SVCXPRT *xprt;
415         size_t slen;
416         struct rpc_reconupcall *upcp;
417
418         if (info == NULL) {
419                 return (FALSE);
420         }
421         switch (request) {
422         case CLSET_TIMEOUT:
423                 rc->rc_timeout = *(struct timeval *)info;
424                 if (rc->rc_client)
425                         CLNT_CONTROL(rc->rc_client, request, info);
426                 break;
427
428         case CLGET_TIMEOUT:
429                 *(struct timeval *)info = rc->rc_timeout;
430                 break;
431
432         case CLSET_RETRY_TIMEOUT:
433                 rc->rc_retry = *(struct timeval *)info;
434                 if (rc->rc_client)
435                         CLNT_CONTROL(rc->rc_client, request, info);
436                 break;
437
438         case CLGET_RETRY_TIMEOUT:
439                 *(struct timeval *)info = rc->rc_retry;
440                 break;
441
442         case CLGET_VERS:
443                 *(uint32_t *)info = rc->rc_vers;
444                 break;
445
446         case CLSET_VERS:
447                 rc->rc_vers = *(uint32_t *) info;
448                 if (rc->rc_client)
449                         CLNT_CONTROL(rc->rc_client, CLSET_VERS, info);
450                 break;
451
452         case CLGET_PROG:
453                 *(uint32_t *)info = rc->rc_prog;
454                 break;
455
456         case CLSET_PROG:
457                 rc->rc_prog = *(uint32_t *) info;
458                 if (rc->rc_client)
459                         CLNT_CONTROL(rc->rc_client, request, info);
460                 break;
461
462         case CLSET_WAITCHAN:
463                 rc->rc_waitchan = (char *)info;
464                 if (rc->rc_client)
465                         CLNT_CONTROL(rc->rc_client, request, info);
466                 break;
467
468         case CLGET_WAITCHAN:
469                 *(const char **) info = rc->rc_waitchan;
470                 break;
471
472         case CLSET_INTERRUPTIBLE:
473                 rc->rc_intr = *(int *) info;
474                 if (rc->rc_client)
475                         CLNT_CONTROL(rc->rc_client, request, info);
476                 break;
477
478         case CLGET_INTERRUPTIBLE:
479                 *(int *) info = rc->rc_intr;
480                 break;
481
482         case CLSET_RETRIES:
483                 rc->rc_retries = *(int *) info;
484                 break;
485
486         case CLGET_RETRIES:
487                 *(int *) info = rc->rc_retries;
488                 break;
489
490         case CLSET_PRIVPORT:
491                 rc->rc_privport = *(int *) info;
492                 break;
493
494         case CLGET_PRIVPORT:
495                 *(int *) info = rc->rc_privport;
496                 break;
497
498         case CLSET_BACKCHANNEL:
499                 xprt = (SVCXPRT *)info;
500                 xprt_register(xprt);
501                 rc->rc_backchannel = info;
502                 break;
503
504         case CLSET_TLS:
505                 rc->rc_tls = true;
506                 break;
507
508         case CLSET_TLSCERTNAME:
509                 slen = strlen(info) + 1;
510                 /*
511                  * tlscertname with "key.pem" appended to it forms a file
512                  * name.  As such, the maximum allowable strlen(info) is
513                  * NAME_MAX - 7. However, "slen" includes the nul termination
514                  * byte so it can be up to NAME_MAX - 6.
515                  */
516                 if (slen <= 1 || slen > NAME_MAX - 6)
517                         return (FALSE);
518                 rc->rc_tlscertname = mem_alloc(slen);
519                 strlcpy(rc->rc_tlscertname, info, slen);
520                 break;
521
522         case CLSET_RECONUPCALL:
523                 upcp = (struct rpc_reconupcall *)info;
524                 rc->rc_reconcall = upcp->call;
525                 rc->rc_reconarg = upcp->arg;
526                 break;
527
528         default:
529                 return (FALSE);
530         }
531
532         return (TRUE);
533 }
534
535 static void
536 clnt_reconnect_close(CLIENT *cl)
537 {
538         struct rc_data *rc = (struct rc_data *)cl->cl_private;
539         CLIENT *client;
540
541         mtx_lock(&rc->rc_lock);
542
543         if (rc->rc_closed) {
544                 mtx_unlock(&rc->rc_lock);
545                 return;
546         }
547
548         rc->rc_closed = TRUE;
549         client = rc->rc_client;
550         rc->rc_client = NULL;
551
552         mtx_unlock(&rc->rc_lock);
553
554         if (client) {
555                 CLNT_CLOSE(client);
556                 CLNT_RELEASE(client);
557         }
558 }
559
560 static void
561 clnt_reconnect_destroy(CLIENT *cl)
562 {
563         struct rc_data *rc = (struct rc_data *)cl->cl_private;
564         SVCXPRT *xprt;
565
566         if (rc->rc_client)
567                 CLNT_DESTROY(rc->rc_client);
568         if (rc->rc_backchannel) {
569                 xprt = (SVCXPRT *)rc->rc_backchannel;
570                 KASSERT(xprt->xp_socket == NULL,
571                     ("clnt_reconnect_destroy: xp_socket not NULL"));
572                 xprt_unregister(xprt);
573                 SVC_RELEASE(xprt);
574         }
575         crfree(rc->rc_ucred);
576         mtx_destroy(&rc->rc_lock);
577         mem_free(rc->rc_tlscertname, 0);        /* 0 ok, since arg. ignored. */
578         mem_free(rc->rc_reconarg, 0);
579         mem_free(rc, sizeof(*rc));
580         mem_free(cl, sizeof (CLIENT));
581 }