2 * clnt_tcp.c, Implements a TCP/IP based, client side RPC.
4 * Copyright (c) 2010, Oracle America, Inc.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions are
10 * * Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * * Redistributions in binary form must reproduce the above
13 * copyright notice, this list of conditions and the following
14 * disclaimer in the documentation and/or other materials
15 * provided with the distribution.
16 * * Neither the name of the "Oracle America, Inc." nor the names of its
17 * contributors may be used to endorse or promote products derived
18 * from this software without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
23 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
24 * COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
25 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
27 * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
28 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
29 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
30 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
31 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
33 * TCP based RPC supports 'batched calls'.
34 * A sequence of calls may be batched-up in a send buffer. The rpc call
35 * return immediately to the client even though the call was not necessarily
36 * sent. The batching occurs if the results' xdr routine is NULL (0) AND
37 * the rpc timeout value is zero (see clnt.h, rpc).
39 * Clients should NOT casually batch calls that in fact return results; that is,
40 * the server side should be aware that a call is batched and not produce any
41 * return message. Batched calls that produce many result messages can
42 * deadlock (netlock) the client and the server....
44 * Now go hang yourself.
54 #include <sys/socket.h>
55 #include <rpc/pmap_clnt.h>
60 extern u_long _create_xid (void);
62 #define MCALL_MSG_SIZE 24
68 struct timeval ct_wait;
69 bool_t ct_waitset; /* wait set by clnt_control? */
70 struct sockaddr_in ct_addr;
71 struct rpc_err ct_error;
72 char ct_mcall[MCALL_MSG_SIZE]; /* marshalled callmsg */
73 u_int ct_mpos; /* pos after marshal */
77 static int readtcp (char *, char *, int);
78 static int writetcp (char *, char *, int);
80 static enum clnt_stat clnttcp_call (CLIENT *, u_long, xdrproc_t, caddr_t,
81 xdrproc_t, caddr_t, struct timeval);
82 static void clnttcp_abort (void);
83 static void clnttcp_geterr (CLIENT *, struct rpc_err *);
84 static bool_t clnttcp_freeres (CLIENT *, xdrproc_t, caddr_t);
85 static bool_t clnttcp_control (CLIENT *, int, char *);
86 static void clnttcp_destroy (CLIENT *);
88 static const struct clnt_ops tcp_ops =
99 * Create a client handle for a tcp/ip connection.
100 * If *sockp<0, *sockp is set to a newly created TCP socket and it is
101 * connected to raddr. If *sockp non-negative then
102 * raddr is ignored. The rpc/tcp package does buffering
103 * similar to stdio, so the client must pick send and receive buffer sizes,];
104 * 0 => use the default.
105 * If raddr->sin_port is 0, then a binder on the remote machine is
106 * consulted for the right port number.
107 * NB: *sockp is copied into a private area.
108 * NB: It is the clients responsibility to close *sockp.
109 * NB: The rpch->cl_auth is set null authentication. Caller may wish to set this
110 * something more useful.
113 clnttcp_create (struct sockaddr_in *raddr, u_long prog, u_long vers,
114 int *sockp, u_int sendsz, u_int recvsz)
118 struct rpc_msg call_msg;
120 h = (CLIENT *) mem_alloc (sizeof (*h));
121 ct = (struct ct_data *) mem_alloc (sizeof (*ct));
122 if (h == NULL || ct == NULL)
124 struct rpc_createerr *ce = &get_rpc_createerr ();
125 (void) __fxprintf (NULL, "%s: %s", __func__, _("out of memory\n"));
126 ce->cf_stat = RPC_SYSTEMERROR;
127 ce->cf_error.re_errno = ENOMEM;
132 * If no port number given ask the pmap for one
134 if (raddr->sin_port == 0)
137 if ((port = pmap_getport (raddr, prog, vers, IPPROTO_TCP)) == 0)
139 mem_free ((caddr_t) ct, sizeof (struct ct_data));
140 mem_free ((caddr_t) h, sizeof (CLIENT));
141 return ((CLIENT *) NULL);
143 raddr->sin_port = htons (port);
147 * If no socket given, open one
151 *sockp = __socket (AF_INET, SOCK_STREAM, IPPROTO_TCP);
152 (void) bindresvport (*sockp, (struct sockaddr_in *) 0);
154 || (__connect (*sockp, (struct sockaddr *) raddr,
155 sizeof (*raddr)) < 0))
157 struct rpc_createerr *ce = &get_rpc_createerr ();
158 ce->cf_stat = RPC_SYSTEMERROR;
159 ce->cf_error.re_errno = errno;
161 (void) __close (*sockp);
164 ct->ct_closeit = TRUE;
168 ct->ct_closeit = FALSE;
172 * Set up private data struct
174 ct->ct_sock = *sockp;
175 ct->ct_wait.tv_usec = 0;
176 ct->ct_waitset = FALSE;
177 ct->ct_addr = *raddr;
180 * Initialize call message
182 call_msg.rm_xid = _create_xid ();
183 call_msg.rm_direction = CALL;
184 call_msg.rm_call.cb_rpcvers = RPC_MSG_VERSION;
185 call_msg.rm_call.cb_prog = prog;
186 call_msg.rm_call.cb_vers = vers;
189 * pre-serialize the static part of the call msg and stash it away
191 xdrmem_create (&(ct->ct_xdrs), ct->ct_mcall, MCALL_MSG_SIZE, XDR_ENCODE);
192 if (!xdr_callhdr (&(ct->ct_xdrs), &call_msg))
196 (void) __close (*sockp);
200 ct->ct_mpos = XDR_GETPOS (&(ct->ct_xdrs));
201 XDR_DESTROY (&(ct->ct_xdrs));
204 * Create a client handle which uses xdrrec for serialization
205 * and authnone for authentication.
207 xdrrec_create (&(ct->ct_xdrs), sendsz, recvsz,
208 (caddr_t) ct, readtcp, writetcp);
209 h->cl_ops = (struct clnt_ops *) &tcp_ops;
210 h->cl_private = (caddr_t) ct;
211 h->cl_auth = authnone_create ();
216 * Something goofed, free stuff and barf
218 mem_free ((caddr_t) ct, sizeof (struct ct_data));
219 mem_free ((caddr_t) h, sizeof (CLIENT));
220 return ((CLIENT *) NULL);
222 #ifdef EXPORT_RPC_SYMBOLS
223 libc_hidden_def (clnttcp_create)
225 libc_hidden_nolink (clnttcp_create, GLIBC_2_0)
228 static enum clnt_stat
229 clnttcp_call (h, proc, xdr_args, args_ptr, xdr_results, results_ptr, timeout)
234 xdrproc_t xdr_results;
236 struct timeval timeout;
238 struct ct_data *ct = (struct ct_data *) h->cl_private;
239 XDR *xdrs = &(ct->ct_xdrs);
240 struct rpc_msg reply_msg;
242 u_int32_t *msg_x_id = (u_int32_t *) (ct->ct_mcall); /* yuk */
248 ct->ct_wait = timeout;
252 (xdr_results == (xdrproc_t) 0 && ct->ct_wait.tv_sec == 0
253 && ct->ct_wait.tv_usec == 0) ? FALSE : TRUE;
256 xdrs->x_op = XDR_ENCODE;
257 ct->ct_error.re_status = RPC_SUCCESS;
258 x_id = ntohl (--(*msg_x_id));
259 if ((!XDR_PUTBYTES (xdrs, ct->ct_mcall, ct->ct_mpos)) ||
260 (!XDR_PUTLONG (xdrs, (long *) &proc)) ||
261 (!AUTH_MARSHALL (h->cl_auth, xdrs)) ||
262 (!(*xdr_args) (xdrs, args_ptr)))
264 if (ct->ct_error.re_status == RPC_SUCCESS)
265 ct->ct_error.re_status = RPC_CANTENCODEARGS;
266 (void) xdrrec_endofrecord (xdrs, TRUE);
267 return (ct->ct_error.re_status);
269 if (!xdrrec_endofrecord (xdrs, shipnow))
270 return ct->ct_error.re_status = RPC_CANTSEND;
274 * Hack to provide rpc-based message passing
276 if (ct->ct_wait.tv_sec == 0 && ct->ct_wait.tv_usec == 0)
278 return ct->ct_error.re_status = RPC_TIMEDOUT;
283 * Keep receiving until we get a valid transaction id
285 xdrs->x_op = XDR_DECODE;
288 reply_msg.acpted_rply.ar_verf = _null_auth;
289 reply_msg.acpted_rply.ar_results.where = NULL;
290 reply_msg.acpted_rply.ar_results.proc = (xdrproc_t)xdr_void;
291 if (!xdrrec_skiprecord (xdrs))
292 return (ct->ct_error.re_status);
293 /* now decode and validate the response header */
294 if (!xdr_replymsg (xdrs, &reply_msg))
296 if (ct->ct_error.re_status == RPC_SUCCESS)
298 return ct->ct_error.re_status;
300 if ((u_int32_t) reply_msg.rm_xid == (u_int32_t) x_id)
307 _seterr_reply (&reply_msg, &(ct->ct_error));
308 if (ct->ct_error.re_status == RPC_SUCCESS)
310 if (!AUTH_VALIDATE (h->cl_auth, &reply_msg.acpted_rply.ar_verf))
312 ct->ct_error.re_status = RPC_AUTHERROR;
313 ct->ct_error.re_why = AUTH_INVALIDRESP;
315 else if (!(*xdr_results) (xdrs, results_ptr))
317 if (ct->ct_error.re_status == RPC_SUCCESS)
318 ct->ct_error.re_status = RPC_CANTDECODERES;
320 /* free verifier ... */
321 if (reply_msg.acpted_rply.ar_verf.oa_base != NULL)
323 xdrs->x_op = XDR_FREE;
324 (void) xdr_opaque_auth (xdrs, &(reply_msg.acpted_rply.ar_verf));
326 } /* end successful completion */
329 /* maybe our credentials need to be refreshed ... */
330 if (refreshes-- && AUTH_REFRESH (h->cl_auth))
332 } /* end of unsuccessful completion */
333 return ct->ct_error.re_status;
337 clnttcp_geterr (h, errp)
339 struct rpc_err *errp;
342 (struct ct_data *) h->cl_private;
344 *errp = ct->ct_error;
348 clnttcp_freeres (cl, xdr_res, res_ptr)
353 struct ct_data *ct = (struct ct_data *) cl->cl_private;
354 XDR *xdrs = &(ct->ct_xdrs);
356 xdrs->x_op = XDR_FREE;
357 return (*xdr_res) (xdrs, res_ptr);
366 clnttcp_control (CLIENT *cl, int request, char *info)
368 struct ct_data *ct = (struct ct_data *) cl->cl_private;
374 ct->ct_closeit = TRUE;
376 case CLSET_FD_NCLOSE:
377 ct->ct_closeit = FALSE;
380 ct->ct_wait = *(struct timeval *) info;
381 ct->ct_waitset = TRUE;
384 *(struct timeval *) info = ct->ct_wait;
386 case CLGET_SERVER_ADDR:
387 *(struct sockaddr_in *) info = ct->ct_addr;
390 *(int *)info = ct->ct_sock;
394 * use the knowledge that xid is the
395 * first element in the call structure *.
396 * This will get the xid of the PREVIOUS call
398 *(u_long *)info = ntohl (*(u_long *)ct->ct_mcall);
401 /* This will set the xid of the NEXT call */
402 *(u_long *)ct->ct_mcall = htonl (*(u_long *)info - 1);
403 /* decrement by 1 as clnttcp_call() increments once */
407 * This RELIES on the information that, in the call body,
408 * the version number field is the fifth field from the
409 * begining of the RPC header. MUST be changed if the
410 * call_struct is changed
412 *(u_long *)info = ntohl (*(u_long *)(ct->ct_mcall +
413 4 * BYTES_PER_XDR_UNIT));
416 *(u_long *)(ct->ct_mcall + 4 * BYTES_PER_XDR_UNIT)
417 = htonl (*(u_long *)info);
421 * This RELIES on the information that, in the call body,
422 * the program number field is the field from the
423 * begining of the RPC header. MUST be changed if the
424 * call_struct is changed
426 *(u_long *)info = ntohl(*(u_long *)(ct->ct_mcall +
427 3 * BYTES_PER_XDR_UNIT));
430 *(u_long *)(ct->ct_mcall + 3 * BYTES_PER_XDR_UNIT)
431 = htonl(*(u_long *)info);
433 /* The following are only possible with TI-RPC */
434 case CLGET_RETRY_TIMEOUT:
435 case CLSET_RETRY_TIMEOUT:
438 case CLSET_PUSH_TIMOD:
439 case CLSET_POP_TIMOD:
448 clnttcp_destroy (CLIENT *h)
451 (struct ct_data *) h->cl_private;
455 (void) __close (ct->ct_sock);
457 XDR_DESTROY (&(ct->ct_xdrs));
458 mem_free ((caddr_t) ct, sizeof (struct ct_data));
459 mem_free ((caddr_t) h, sizeof (CLIENT));
463 * Interface between xdr serializer and tcp connection.
464 * Behaves like the system calls, read & write, but keeps some error state
465 * around for the rpc level.
468 readtcp (char *ctptr, char *buf, int len)
470 struct ct_data *ct = (struct ct_data *)ctptr;
472 int milliseconds = (ct->ct_wait.tv_sec * 1000) +
473 (ct->ct_wait.tv_usec / 1000);
482 switch (__poll(&fd, 1, milliseconds))
485 ct->ct_error.re_status = RPC_TIMEDOUT;
491 ct->ct_error.re_status = RPC_CANTRECV;
492 ct->ct_error.re_errno = errno;
497 switch (len = __read (ct->ct_sock, buf, len))
502 ct->ct_error.re_errno = ECONNRESET;
503 ct->ct_error.re_status = RPC_CANTRECV;
504 len = -1; /* it's really an error */
508 ct->ct_error.re_errno = errno;
509 ct->ct_error.re_status = RPC_CANTRECV;
516 writetcp (char *ctptr, char *buf, int len)
519 struct ct_data *ct = (struct ct_data*)ctptr;
521 for (cnt = len; cnt > 0; cnt -= i, buf += i)
523 if ((i = __write (ct->ct_sock, buf, cnt)) == -1)
525 ct->ct_error.re_errno = errno;
526 ct->ct_error.re_status = RPC_CANTSEND;