Use sockaddr_in6 instead of sockaddr6_in
[deb_libnfs.git] / lib / socket.c
CommitLineData
84004dbf
RS
1/*
2 Copyright (C) 2010 by Ronnie Sahlberg <ronniesahlberg@gmail.com>
3
4 This program is free software; you can redistribute it and/or modify
5 it under the terms of the GNU Lesser General Public License as published by
6 the Free Software Foundation; either version 2.1 of the License, or
7 (at your option) any later version.
8
9 This program is distributed in the hope that it will be useful,
10 but WITHOUT ANY WARRANTY; without even the implied warranty of
11 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 GNU Lesser General Public License for more details.
13
14 You should have received a copy of the GNU Lesser General Public License
15 along with this program; if not, see <http://www.gnu.org/licenses/>.
16*/
00748f36
RS
17#ifdef HAVE_CONFIG_H
18#include "config.h"
19#endif
20
21#ifdef AROS
22#include "aros_compat.h"
23#endif
24
a8a1b858
M
25#ifdef WIN32
26#include "win32_compat.h"
c022471e
RS
27#endif
28
29#ifdef HAVE_ARPA_INET_H
a8a1b858 30#include <arpa/inet.h>
c022471e 31#endif
84004dbf 32
00748f36
RS
33#ifdef HAVE_POLL_H
34#include <poll.h>
fc01d2a9 35#endif
d7c6e9aa 36
00748f36
RS
37#ifdef HAVE_UNISTD_H
38#include <unistd.h>
d7c6e9aa
RS
39#endif
40
00748f36
RS
41#ifdef HAVE_SYS_IOCTL_H
42#include <sys/ioctl.h>
d7c6e9aa
RS
43#endif
44
7057e733
RS
45#ifdef HAVE_SYS_SOCKET_H
46#include <sys/socket.h>
47#endif
48
1c8b4547
PL
49#ifdef HAVE_NETINET_TCP_H
50#include <netinet/tcp.h>
51#endif
52
bff8fe46
RS
53#ifdef HAVE_NETDB_H
54#include <netdb.h>
55#endif
56
fc01d2a9
TN
57#ifdef HAVE_SYS_FILIO_H
58#include <sys/filio.h>
59#endif
bff8fe46 60
647d2ea1
RS
61#ifdef HAVE_SYS_SOCKIO_H
62#include <sys/sockio.h>
63#endif
bff8fe46
RS
64
65#include <stdio.h>
66#include <stdlib.h>
67#include <assert.h>
68#include <fcntl.h>
69#include <string.h>
70#include <errno.h>
485bc9b9 71#include <sys/types.h>
763cd6e3 72#include "libnfs-zdr.h"
84004dbf
RS
73#include "libnfs.h"
74#include "libnfs-raw.h"
75#include "libnfs-private.h"
76#include "slist.h"
77
fcc42bfe
M
78#ifdef WIN32
79//has to be included after stdlib!!
80#include "win32_errnowrapper.h"
81#endif
82
1744ef90
RS
83static int rpc_reconnect_requeue(struct rpc_context *rpc);
84static int rpc_connect_sockaddr_async(struct rpc_context *rpc, struct sockaddr_storage *s);
b077fdeb 85
84004dbf
RS
86static void set_nonblocking(int fd)
87{
99c14c9b 88 int v = 0;
6874f61e 89#if defined(WIN32)
99c14c9b 90 long nonblocking=1;
622489d3 91 v = ioctl(fd, FIONBIO, &nonblocking);
6874f61e 92#else
84004dbf
RS
93 v = fcntl(fd, F_GETFL, 0);
94 fcntl(fd, F_SETFL, v | O_NONBLOCK);
a8a1b858 95#endif //FIXME
84004dbf
RS
96}
97
74b037ec
M
98static void set_nolinger(int fd)
99{
100 struct linger lng;
101 lng.l_onoff = 1;
102 lng.l_linger = 0;
103 setsockopt(fd, SOL_SOCKET, SO_LINGER, &lng, sizeof(lng));
104}
105
1c8b4547
PL
106#ifdef HAVE_NETINET_TCP_H
107int set_tcp_sockopt(int sockfd, int optname, int value)
108{
109 int level;
110
111 #if defined(__FreeBSD__) || defined(__sun) || (defined(__APPLE__) && defined(__MACH__))
112 struct protoent *buf;
113
114 if ((buf = getprotobyname("tcp")) != NULL)
115 level = buf->p_proto;
116 else
117 return -1;
118 #else
119 level = SOL_TCP;
120 #endif
121
122 return setsockopt(sockfd, level, optname, (char *)&value, sizeof(value));
123}
124#endif
125
84004dbf
RS
126int rpc_get_fd(struct rpc_context *rpc)
127{
4a2b0876
RS
128 assert(rpc->magic == RPC_CONTEXT_MAGIC);
129
84004dbf
RS
130 return rpc->fd;
131}
132
aec45c62
MH
133static int rpc_has_queue(struct rpc_queue *q)
134{
135 return q->head != NULL;
136}
137
84004dbf
RS
138int rpc_which_events(struct rpc_context *rpc)
139{
4a2b0876
RS
140 int events;
141
142 assert(rpc->magic == RPC_CONTEXT_MAGIC);
143
144 events = rpc->is_connected ? POLLIN : POLLOUT;
84004dbf 145
5911f3e8
RS
146 if (rpc->is_udp != 0) {
147 /* for udp sockets we only wait for pollin */
148 return POLLIN;
149 }
150
aec45c62 151 if (rpc_has_queue(&rpc->outqueue)) {
84004dbf
RS
152 events |= POLLOUT;
153 }
154 return events;
155}
156
157static int rpc_write_to_socket(struct rpc_context *rpc)
158{
d14e2838 159 int32_t count;
aec45c62 160 struct rpc_pdu *pdu;
84004dbf 161
4a2b0876
RS
162 assert(rpc->magic == RPC_CONTEXT_MAGIC);
163
84004dbf 164 if (rpc->fd == -1) {
1896d37b
RS
165 rpc_set_error(rpc, "trying to write but not connected");
166 return -1;
84004dbf
RS
167 }
168
aec45c62 169 while ((pdu = rpc->outqueue.head) != NULL) {
183451cf 170 int64_t total;
84004dbf 171
aec45c62 172 total = pdu->outdata.size;
84004dbf 173
aec45c62 174 count = send(rpc->fd, pdu->outdata.data + pdu->written, total - pdu->written, 0);
84004dbf
RS
175 if (count == -1) {
176 if (errno == EAGAIN || errno == EWOULDBLOCK) {
84004dbf
RS
177 return 0;
178 }
1896d37b
RS
179 rpc_set_error(rpc, "Error when writing to socket :%s(%d)", strerror(errno), errno);
180 return -1;
84004dbf
RS
181 }
182
aec45c62
MH
183 pdu->written += count;
184 if (pdu->written == total) {
63f36a09
MH
185 unsigned int hash;
186
aec45c62
MH
187 rpc->outqueue.head = pdu->next;
188 if (pdu->next == NULL)
189 rpc->outqueue.tail = NULL;
84004dbf 190
63f36a09
MH
191 hash = rpc_hash_xid(pdu->xid);
192 rpc_enqueue(&rpc->waitpdu[hash], pdu);
84004dbf
RS
193 }
194 }
195 return 0;
196}
197
198static int rpc_read_from_socket(struct rpc_context *rpc)
199{
200 int available;
201 int size;
cdb19ec1 202 int pdu_size;
d14e2838 203 int32_t count;
84004dbf 204
f3a75078 205 assert(rpc->magic == RPC_CONTEXT_MAGIC);
84004dbf
RS
206
207 if (ioctl(rpc->fd, FIONREAD, &available) != 0) {
208 rpc_set_error(rpc, "Ioctl FIONREAD returned error : %d. Closing socket.", errno);
209 return -1;
210 }
a8a1b858 211
84004dbf
RS
212 if (available == 0) {
213 rpc_set_error(rpc, "Socket has been closed");
1896d37b 214 return -1;
84004dbf 215 }
cdb19ec1 216
0268794f
RS
217 if (rpc->is_udp) {
218 char *buf;
219 socklen_t socklen = sizeof(rpc->udp_src);
220
221 buf = malloc(available);
222 if (buf == NULL) {
223 rpc_set_error(rpc, "Failed to malloc buffer for recvfrom");
224 return -1;
225 }
226 count = recvfrom(rpc->fd, buf, available, MSG_DONTWAIT, (struct sockaddr *)&rpc->udp_src, &socklen);
227 if (count < 0) {
228 rpc_set_error(rpc, "Failed recvfrom: %s", strerror(errno));
229 free(buf);
60af7e19 230 return -1;
0268794f
RS
231 }
232 if (rpc_process_pdu(rpc, buf, count) != 0) {
233 rpc_set_error(rpc, "Invalid/garbage pdu received from server. Ignoring PDU");
234 free(buf);
235 return -1;
236 }
237 free(buf);
238 return 0;
239 }
240
cdb19ec1
RS
241 /* read record marker, 4 bytes at the beginning of every pdu */
242 if (rpc->inbuf == NULL) {
243 rpc->insize = 4;
244 rpc->inbuf = malloc(rpc->insize);
245 if (rpc->inbuf == NULL) {
246 rpc_set_error(rpc, "Failed to allocate buffer for record marker, errno:%d. Closing socket.", errno);
247 return -1;
248 }
249 }
250 if (rpc->inpos < 4) {
251 size = 4 - rpc->inpos;
252
6874f61e 253 count = recv(rpc->fd, rpc->inbuf + rpc->inpos, size, 0);
cdb19ec1
RS
254 if (count == -1) {
255 if (errno == EINTR) {
256 return 0;
257 }
258 rpc_set_error(rpc, "Read from socket failed, errno:%d. Closing socket.", errno);
259 return -1;
260 }
261 available -= count;
262 rpc->inpos += count;
263 }
264
265 if (available == 0) {
266 return 0;
267 }
268
269 pdu_size = rpc_get_pdu_size(rpc->inbuf);
270 if (rpc->insize < pdu_size) {
271 unsigned char *buf;
8907aea9 272
cdb19ec1
RS
273 buf = malloc(pdu_size);
274 if (buf == NULL) {
275 rpc_set_error(rpc, "Failed to allocate buffer of %d bytes for pdu, errno:%d. Closing socket.", pdu_size, errno);
276 return -1;
277 }
278 memcpy(buf, rpc->inbuf, rpc->insize);
279 free(rpc->inbuf);
280 rpc->inbuf = buf;
281 rpc->insize = rpc_get_pdu_size(rpc->inbuf);
84004dbf 282 }
cdb19ec1
RS
283
284 size = available;
285 if (size > rpc->insize - rpc->inpos) {
286 size = rpc->insize - rpc->inpos;
84004dbf
RS
287 }
288
6874f61e 289 count = recv(rpc->fd, rpc->inbuf + rpc->inpos, size, 0);
84004dbf
RS
290 if (count == -1) {
291 if (errno == EINTR) {
84004dbf
RS
292 return 0;
293 }
294 rpc_set_error(rpc, "Read from socket failed, errno:%d. Closing socket.", errno);
1896d37b 295 return -1;
84004dbf 296 }
cdb19ec1
RS
297 available -= count;
298 rpc->inpos += count;
84004dbf 299
cdb19ec1 300 if (rpc->inpos == rpc->insize) {
dd97d43a
RS
301 char *buf = rpc->inbuf;
302
303 rpc->inbuf = NULL;
304 rpc->insize = 0;
305 rpc->inpos = 0;
306
307 if (rpc_process_pdu(rpc, buf, pdu_size) != 0) {
84004dbf 308 rpc_set_error(rpc, "Invalid/garbage pdu received from server. Closing socket");
1896d37b 309 return -1;
84004dbf 310 }
751770fd 311 free(buf);
84004dbf 312 }
cdb19ec1 313
84004dbf
RS
314 return 0;
315}
316
317
318
319int rpc_service(struct rpc_context *rpc, int revents)
320{
4a2b0876
RS
321 assert(rpc->magic == RPC_CONTEXT_MAGIC);
322
84004dbf 323 if (revents & POLLERR) {
fcc42bfe 324#ifdef WIN32
a8a1b858 325 char err = 0;
fcc42bfe
M
326#else
327 int err = 0;
328#endif
912f7ad5
RS
329 socklen_t err_size = sizeof(err);
330
331 if (getsockopt(rpc->fd, SOL_SOCKET, SO_ERROR,
bb4e9ed6 332 (char *)&err, &err_size) != 0 || err != 0) {
912f7ad5
RS
333 if (err == 0) {
334 err = errno;
335 }
336 rpc_set_error(rpc, "rpc_service: socket error "
337 "%s(%d).",
338 strerror(err), err);
84004dbf 339 } else {
912f7ad5
RS
340 rpc_set_error(rpc, "rpc_service: POLLERR, "
341 "Unknown socket error.");
84004dbf 342 }
b990de23
RS
343 if (rpc->connect_cb != NULL) {
344 rpc->connect_cb(rpc, RPC_STATUS_ERROR, rpc->error_string, rpc->connect_data);
345 }
84004dbf
RS
346 return -1;
347 }
348 if (revents & POLLHUP) {
84004dbf 349 rpc_set_error(rpc, "Socket failed with POLLHUP");
b990de23
RS
350 if (rpc->connect_cb != NULL) {
351 rpc->connect_cb(rpc, RPC_STATUS_ERROR, rpc->error_string, rpc->connect_data);
352 }
1896d37b 353 return -1;
84004dbf
RS
354 }
355
356 if (rpc->is_connected == 0 && rpc->fd != -1 && revents&POLLOUT) {
912f7ad5
RS
357 int err = 0;
358 socklen_t err_size = sizeof(err);
359
360 if (getsockopt(rpc->fd, SOL_SOCKET, SO_ERROR,
bb4e9ed6 361 (char *)&err, &err_size) != 0 || err != 0) {
912f7ad5
RS
362 if (err == 0) {
363 err = errno;
364 }
365 rpc_set_error(rpc, "rpc_service: socket error "
366 "%s(%d) while connecting.",
367 strerror(err), err);
b990de23
RS
368 if (rpc->connect_cb != NULL) {
369 rpc->connect_cb(rpc, RPC_STATUS_ERROR,
912f7ad5 370 NULL, rpc->connect_data);
b990de23 371 }
912f7ad5
RS
372 return -1;
373 }
374
84004dbf 375 rpc->is_connected = 1;
b990de23
RS
376 if (rpc->connect_cb != NULL) {
377 rpc->connect_cb(rpc, RPC_STATUS_SUCCESS, NULL, rpc->connect_data);
378 }
84004dbf
RS
379 return 0;
380 }
381
b077fdeb
RS
382 if (revents & POLLIN) {
383 if (rpc_read_from_socket(rpc) != 0) {
1744ef90 384 rpc_reconnect_requeue(rpc);
b077fdeb 385 return 0;
84004dbf
RS
386 }
387 }
388
aec45c62 389 if (revents & POLLOUT && rpc_has_queue(&rpc->outqueue)) {
b077fdeb
RS
390 if (rpc_write_to_socket(rpc) != 0) {
391 rpc_set_error(rpc, "write to socket failed");
1896d37b 392 return -1;
84004dbf
RS
393 }
394 }
395
396 return 0;
397}
398
1744ef90 399void rpc_set_autoreconnect(struct rpc_context *rpc)
84004dbf 400{
4a2b0876
RS
401 assert(rpc->magic == RPC_CONTEXT_MAGIC);
402
1744ef90
RS
403 rpc->auto_reconnect = 1;
404}
84004dbf 405
1744ef90
RS
406void rpc_unset_autoreconnect(struct rpc_context *rpc)
407{
4a2b0876
RS
408 assert(rpc->magic == RPC_CONTEXT_MAGIC);
409
1744ef90
RS
410 rpc->auto_reconnect = 0;
411}
070287e5 412
1c8b4547
PL
413void rpc_set_tcp_syncnt(struct rpc_context *rpc, int v)
414{
415 assert(rpc->magic == RPC_CONTEXT_MAGIC);
416
417 rpc->tcp_syncnt = v;
418}
419
d43a8953
PL
420#ifndef TCP_SYNCNT
421#define TCP_SYNCNT 7
422#endif
423
1744ef90
RS
424static int rpc_connect_sockaddr_async(struct rpc_context *rpc, struct sockaddr_storage *s)
425{
426 int socksize;
84004dbf 427
4a2b0876
RS
428 assert(rpc->magic == RPC_CONTEXT_MAGIC);
429
1744ef90 430 switch (s->ss_family) {
84004dbf 431 case AF_INET:
84004dbf 432 socksize = sizeof(struct sockaddr_in);
6874f61e 433 rpc->fd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
1c8b4547
PL
434#ifdef HAVE_NETINET_TCP_H
435 if (rpc->tcp_syncnt != RPC_PARAM_UNDEFINED) {
436 set_tcp_sockopt(rpc->fd, TCP_SYNCNT, rpc->tcp_syncnt);
437 }
1c1e09ad
RS
438#endif
439 break;
440 case AF_INET6:
441 socksize = sizeof(struct sockaddr_in6);
442 rpc->fd = socket(AF_INET6, SOCK_STREAM, IPPROTO_TCP);
443#ifdef HAVE_NETINET_TCP_H
444 if (rpc->tcp_syncnt != RPC_PARAM_UNDEFINED) {
445 set_tcp_sockopt(rpc->fd, TCP_SYNCNT, rpc->tcp_syncnt);
446 }
1c8b4547 447#endif
84004dbf 448 break;
1744ef90
RS
449 default:
450 rpc_set_error(rpc, "Can not handle AF_FAMILY:%d", s->ss_family);
451 return -1;
84004dbf
RS
452 }
453
454 if (rpc->fd == -1) {
455 rpc_set_error(rpc, "Failed to open socket");
1896d37b 456 return -1;
84004dbf
RS
457 }
458
07fd0cbc
RS
459 /* Some systems allow you to set capabilities on an executable
460 * to allow the file to be executed with privilege to bind to
461 * privileged system ports, even if the user is not root.
462 *
463 * Opportunistically try to bind the socket to a low numbered
464 * system port in the hope that the user is either root or the
465 * executable has the CAP_NET_BIND_SERVICE.
466 *
467 * As soon as we fail the bind() with EACCES we know we will never
468 * be able to bind to a system port so we terminate the loop.
469 *
470 * On linux, use
471 * sudo setcap 'cap_net_bind_service=+ep' /path/executable
472 * to make the executable able to bind to a system port.
ac559609
RI
473 *
474 * On Windows, there is no concept of privileged ports. Thus
475 * binding will usually succeed.
07fd0cbc 476 */
ac559609 477 {
1c1e09ad 478 struct sockaddr_storage ss;
ac559609
RI
479 static int portOfs = 0;
480 const int firstPort = 512; /* >= 512 according to Sun docs */
481 const int portCount = IPPORT_RESERVED - firstPort;
cb5b8be2 482 int startOfs, port, rc;
ac559609 483
cb5b8be2
RS
484 if (portOfs == 0) {
485 portOfs = time(NULL) % 400;
486 }
487 startOfs = portOfs;
ac559609
RI
488 do {
489 rc = -1;
490 port = htons(firstPort + portOfs);
491 portOfs = (portOfs + 1) % portCount;
492
493 /* skip well-known ports */
494 if (!getservbyport(port, "tcp")) {
1c1e09ad
RS
495 memset(&ss, 0, sizeof(ss));
496
497 switch (s->ss_family) {
498 case AF_INET:
499 ((struct sockaddr_in *)&ss)->sin_port = port;
500 ((struct sockaddr_in *)&ss)->sin_family = AF_INET;
501#ifdef HAVE_SOCKADDR_LEN
502 ((struct sockaddr_in *)&ss)->sin_len = sizeof(struct sockaddr_in);
503#endif
504 break;
505 case AF_INET6:
506 ((struct sockaddr_in6 *)&ss)->sin6_port = port;
507 ((struct sockaddr_in6 *)&ss)->sin6_family = AF_INET6;
508#ifdef HAVE_SOCKADDR_LEN
18c94b46 509 ((struct sockaddr_in6 *)&ss)->sin6_len = sizeof(struct sockaddr_in6);
1c1e09ad
RS
510#endif
511 break;
512 }
ac559609 513
1c1e09ad 514 rc = bind(rpc->fd, (struct sockaddr *)&ss, socksize);
ac559609
RI
515#if !defined(WIN32)
516 /* we got EACCES, so don't try again */
517 if (rc != 0 && errno == EACCES)
518 break;
519#endif
07fd0cbc 520 }
ac559609 521 } while (rc != 0 && portOfs != startOfs);
07fd0cbc 522 }
07fd0cbc 523
84004dbf 524 set_nonblocking(rpc->fd);
74b037ec 525 set_nolinger(rpc->fd);
07fd0cbc 526
f96b24fa
RI
527 if (connect(rpc->fd, (struct sockaddr *)s, socksize) != 0 && errno != EINPROGRESS) {
528 rpc_set_error(rpc, "connect() to server failed. %s(%d)", strerror(errno), errno);
1896d37b 529 return -1;
8907aea9 530 }
84004dbf
RS
531
532 return 0;
8907aea9 533}
84004dbf 534
1744ef90
RS
535int rpc_connect_async(struct rpc_context *rpc, const char *server, int port, rpc_cb cb, void *private_data)
536{
1c1e09ad 537 struct addrinfo *ai = NULL;
1744ef90 538
4a2b0876
RS
539 assert(rpc->magic == RPC_CONTEXT_MAGIC);
540
1744ef90
RS
541 if (rpc->fd != -1) {
542 rpc_set_error(rpc, "Trying to connect while already connected");
543 return -1;
544 }
545
546 if (rpc->is_udp != 0) {
547 rpc_set_error(rpc, "Trying to connect on UDP socket");
548 return -1;
549 }
550
551 rpc->auto_reconnect = 0;
552
1c1e09ad
RS
553 if (getaddrinfo(server, NULL, NULL, &ai) != 0) {
554 rpc_set_error(rpc, "Invalid address:%s. "
555 "Can not resolv into IPv4/v6 structure.", server);
1744ef90 556 return -1;
1c1e09ad 557 }
1744ef90 558
1c1e09ad 559 switch (ai->ai_family) {
1744ef90 560 case AF_INET:
1c1e09ad
RS
561 ((struct sockaddr_in *)&rpc->s)->sin_family = ai->ai_family;
562 ((struct sockaddr_in *)&rpc->s)->sin_port = htons(port);
7a750aea 563 ((struct sockaddr_in *)&rpc->s)->sin_addr = ((struct sockaddr_in *)(ai->ai_addr))->sin_addr;
1744ef90 564#ifdef HAVE_SOCKADDR_LEN
1c1e09ad
RS
565 ((struct sockaddr_in *)&rpc->s)->sin_len = sizeof(struct sockaddr_in);
566#endif
567 break;
568 case AF_INET6:
569 ((struct sockaddr_in6 *)&rpc->s)->sin6_family = ai->ai_family;
570 ((struct sockaddr_in6 *)&rpc->s)->sin6_port = htons(port);
7a750aea 571 ((struct sockaddr_in6 *)&rpc->s)->sin6_addr = ((struct sockaddr_in6 *)(ai->ai_addr))->sin6_addr;
1c1e09ad
RS
572#ifdef HAVE_SOCKADDR_LEN
573 ((struct sockaddr_in6 *)&rpc->s)->sin6_len = sizeof(struct sockaddr_in6);
1744ef90
RS
574#endif
575 break;
576 }
577
578 rpc->connect_cb = cb;
579 rpc->connect_data = private_data;
580
1c1e09ad
RS
581 freeaddrinfo(ai);
582
1744ef90
RS
583 if (rpc_connect_sockaddr_async(rpc, &rpc->s) != 0) {
584 return -1;
585 }
586
587 return 0;
8907aea9 588}
1744ef90 589
84004dbf
RS
590int rpc_disconnect(struct rpc_context *rpc, char *error)
591{
4a2b0876
RS
592 assert(rpc->magic == RPC_CONTEXT_MAGIC);
593
1744ef90
RS
594 rpc_unset_autoreconnect(rpc);
595
84004dbf
RS
596 if (rpc->fd != -1) {
597 close(rpc->fd);
598 }
599 rpc->fd = -1;
600
601 rpc->is_connected = 0;
602
603 rpc_error_all_pdus(rpc, error);
604
605 return 0;
606}
485bc9b9 607
1744ef90
RS
608static void reconnect_cb(struct rpc_context *rpc, int status, void *data _U_, void *private_data)
609{
4a2b0876
RS
610 assert(rpc->magic == RPC_CONTEXT_MAGIC);
611
1744ef90
RS
612 if (status != RPC_STATUS_SUCCESS) {
613 rpc_error_all_pdus(rpc, "RPC ERROR: Failed to reconnect async");
614 return;
615 }
616
617 rpc->is_connected = 1;
b990de23 618 rpc->connect_cb = NULL;
1744ef90
RS
619}
620
621/* disconnect but do not error all PDUs, just move pdus in-flight back to the outqueue and reconnect */
622static int rpc_reconnect_requeue(struct rpc_context *rpc)
b077fdeb
RS
623{
624 struct rpc_pdu *pdu;
63f36a09 625 unsigned int i;
b077fdeb 626
4a2b0876
RS
627 assert(rpc->magic == RPC_CONTEXT_MAGIC);
628
b077fdeb
RS
629 if (rpc->fd != -1) {
630 close(rpc->fd);
631 }
632 rpc->fd = -1;
633
634 rpc->is_connected = 0;
635
636 /* socket is closed so we will not get any replies to any commands
637 * in flight. Move them all over from the waitpdu queue back to the out queue
638 */
63f36a09
MH
639 for (i = 0; i < HASHES; i++) {
640 struct rpc_queue *q = &rpc->waitpdu[i];
641
642 for (pdu=q->head; pdu; pdu=pdu->next) {
643 rpc_return_to_queue(&rpc->outqueue, pdu);
644 /* we have to re-send the whole pdu again */
645 pdu->written = 0;
646 }
647 rpc_reset_queue(q);
1744ef90
RS
648 }
649
650 if (rpc->auto_reconnect != 0) {
651 rpc->connect_cb = reconnect_cb;
652
653 if (rpc_connect_sockaddr_async(rpc, &rpc->s) != 0) {
654 rpc_error_all_pdus(rpc, "RPC ERROR: Failed to reconnect async");
655 return -1;
656 }
b077fdeb
RS
657 }
658
659 return 0;
660}
661
485bc9b9
RS
662
663int rpc_bind_udp(struct rpc_context *rpc, char *addr, int port)
664{
665 struct addrinfo *ai = NULL;
666 char service[6];
667
4a2b0876
RS
668 assert(rpc->magic == RPC_CONTEXT_MAGIC);
669
485bc9b9
RS
670 if (rpc->is_udp == 0) {
671 rpc_set_error(rpc, "Cant not bind UDP. Not UDP context");
672 return -1;
673 }
674
6874f61e 675 sprintf(service, "%d", port);
485bc9b9
RS
676 if (getaddrinfo(addr, service, NULL, &ai) != 0) {
677 rpc_set_error(rpc, "Invalid address:%s. "
8907aea9 678 "Can not resolv into IPv4/v6 structure.", addr);
485bc9b9
RS
679 return -1;
680 }
681
682 switch(ai->ai_family) {
683 case AF_INET:
684 rpc->fd = socket(ai->ai_family, SOCK_DGRAM, 0);
685 if (rpc->fd == -1) {
8907aea9 686 rpc_set_error(rpc, "Failed to create UDP socket: %s", strerror(errno));
485bc9b9
RS
687 freeaddrinfo(ai);
688 return -1;
689 }
690
691 if (bind(rpc->fd, (struct sockaddr *)ai->ai_addr, sizeof(struct sockaddr_in)) != 0) {
8907aea9 692 rpc_set_error(rpc, "Failed to bind to UDP socket: %s",strerror(errno));
485bc9b9
RS
693 freeaddrinfo(ai);
694 return -1;
695 }
696 break;
697 default:
698 rpc_set_error(rpc, "Can not handle UPD sockets of family %d yet", ai->ai_family);
699 freeaddrinfo(ai);
700 return -1;
701 }
702
703 freeaddrinfo(ai);
704
705 return 0;
706}
707
5bf60dc6
RS
708int rpc_set_udp_destination(struct rpc_context *rpc, char *addr, int port, int is_broadcast)
709{
710 struct addrinfo *ai = NULL;
711 char service[6];
712
4a2b0876
RS
713 assert(rpc->magic == RPC_CONTEXT_MAGIC);
714
5bf60dc6
RS
715 if (rpc->is_udp == 0) {
716 rpc_set_error(rpc, "Can not set destination sockaddr. Not UDP context");
717 return -1;
718 }
719
6874f61e 720 sprintf(service, "%d", port);
5bf60dc6
RS
721 if (getaddrinfo(addr, service, NULL, &ai) != 0) {
722 rpc_set_error(rpc, "Invalid address:%s. "
8907aea9 723 "Can not resolv into IPv4/v6 structure.", addr);
5bf60dc6
RS
724 return -1;
725 }
726
727 if (rpc->udp_dest) {
728 free(rpc->udp_dest);
729 rpc->udp_dest = NULL;
730 }
731 rpc->udp_dest = malloc(ai->ai_addrlen);
732 if (rpc->udp_dest == NULL) {
733 rpc_set_error(rpc, "Out of memory. Failed to allocate sockaddr structure");
be7f5933 734 freeaddrinfo(ai);
5bf60dc6
RS
735 return -1;
736 }
737 memcpy(rpc->udp_dest, ai->ai_addr, ai->ai_addrlen);
738 freeaddrinfo(ai);
739
740 rpc->is_broadcast = is_broadcast;
bb4e9ed6 741 setsockopt(rpc->fd, SOL_SOCKET, SO_BROADCAST, (char *)&is_broadcast, sizeof(is_broadcast));
5bf60dc6
RS
742
743 return 0;
744}
c481da67
RS
745
746struct sockaddr *rpc_get_recv_sockaddr(struct rpc_context *rpc)
747{
4a2b0876
RS
748 assert(rpc->magic == RPC_CONTEXT_MAGIC);
749
c481da67
RS
750 return (struct sockaddr *)&rpc->udp_src;
751}
83aa785d
RS
752
753int rpc_queue_length(struct rpc_context *rpc)
754{
755 int i=0;
756 struct rpc_pdu *pdu;
63f36a09 757 unsigned int n;
83aa785d 758
4a2b0876
RS
759 assert(rpc->magic == RPC_CONTEXT_MAGIC);
760
aec45c62 761 for(pdu = rpc->outqueue.head; pdu; pdu = pdu->next) {
83aa785d
RS
762 i++;
763 }
63f36a09
MH
764
765 for (n = 0; n < HASHES; n++) {
766 struct rpc_queue *q = &rpc->waitpdu[n];
767
768 for(pdu = q->head; pdu; pdu = pdu->next)
769 i++;
83aa785d
RS
770 }
771 return i;
772}
6ec481d3
RS
773
774void rpc_set_fd(struct rpc_context *rpc, int fd)
775{
776 assert(rpc->magic == RPC_CONTEXT_MAGIC);
777
778 rpc->fd = fd;
779}