1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
|
/*
Copyright (C) 1994 Free Software Foundation
This program is free software; you can redistribute it and/or
modify it under the terms of the GNU General Public License as
published by the Free Software Foundation; either version 2, or (at
your option) any later version.
This program is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */
struct rpc_list
{
struct rpc_list *next, **prevp;
void *rpc;
size_t rpc_len;
void *reply;
size_t reply_buflen;
size_t reply_len;
int reply_received;
};
static struct rpc_list *outstanding_rpcs;
static struct mutex outstanding_lock = MUTEX_INITIALIZER;
static struct condition rpc_wakeup = CONDITION_INITIALIZER;
/* Send an RPC message to target TARGET from buffer BUF of size
LEN, waiting for a reply. The expected reply length is
REPLY_LEN; a buffer that big is provided as REPLY_BUF.
Set REPLY_CONTENTS to the actual protocol-level reply, of
size REPLY_CONTENTS_LEN. AUTH is the authentication used
in constructing BUF.*/
error_t
rpc_send (struct rpc_target *target, void *buf, size_t len,
void *reply_buf, size_t reply_len, void **reply_contents,
size_t *reply_contents_len, struct rpc_auth *auth)
{
struct rpc_list record;
struct rpcv2_msg_hdr *reply;
struct rpcv2_msg_hdr *request;
struct rpcv2_accepted_reply *accept;
struct rpcv2_rejected_reply *reject;
struct rpcv2_auth *authdata;
struct rpcv2_verf *verf;
error_t error;
mutex_lock (&outstanding_lock);
record.rpc = request = buf;
record.len = len;
record.reply = reply_buf;
record.reply_len = reply_len;
record.reply_received = 0;
record.next = outstanding_rpcs;
if (record.next)
record.next->prevp = &record.next;
outstanding_rpcs = &record;
record.prevp = &outstanding_rpcs;
rpc_transmit (target, &record);
while (!record.reply_received)
condition_wait (&rpc_wakeup, &outstanding_lock);
/* Examine the reply to see whether any RPC level errors have happened. */
reply = record.reply;
assert (reply->xid == request->xid);
assert (reply->mtype == RPCV2_REPLY);
if (reply->body.reply.reply_state == RPCV2_MSG_ACCEPTED)
{
/* Ignore VERF */
verf = &reply->body.reply.rest;
accept = (void *)verf + sizeof (struct rpcv2_verf) + verf->nbytes;
/* The message was accepted; return the appropriate error
(or success) to the caller. */
if (accept->stat == RPCV2_SUCCESS)
{
/* Ah hah! Return to the user */
*reply_contents = &accept->reply_data.results;
*reply_contents_len = record.reply_len;
*reply_contents_len -= ((void *)&accept->reply_data.result
- (void *) reply);
error = 0;
}
else
error = EOPNOTSUPP;
}
else if (reply->body.reply.reply_state == RPCV2_MSG_DENIED)
{
/* For some reason we didn't win. */
reject = &reply->body.reply.rest;
if (reject->stat == RPCV2_RPC_MISMATCH)
error = EOPNOTSUPP;
else if (reject->stat == RPCV2_AUTH_ERROR)
error = EACCES;
else
error = EIEIO;
}
else
error = EIEIO;
*record.prevp = record.next;
if (record.next)
record.next->prevp = record.prevp;
mutex_unlock (&outstanding_lock);
return error;
}
void
rpc_transmit (struct rpc_target *target, struct rpc_list *record)
{
static int xid;
/* Assign a unique transaction ID */
record->rpc
|