1177633Sdfr/* $NetBSD: svc_dg.c,v 1.4 2000/07/06 03:10:35 christos Exp $ */ 2177633Sdfr 3261046Smav/*- 4261046Smav * Copyright (c) 2009, Sun Microsystems, Inc. 5261046Smav * All rights reserved. 6261046Smav * 7261046Smav * Redistribution and use in source and binary forms, with or without 8261046Smav * modification, are permitted provided that the following conditions are met: 9261046Smav * - Redistributions of source code must retain the above copyright notice, 10261046Smav * this list of conditions and the following disclaimer. 11261046Smav * - Redistributions in binary form must reproduce the above copyright notice, 12261046Smav * this list of conditions and the following disclaimer in the documentation 13261046Smav * and/or other materials provided with the distribution. 14261046Smav * - Neither the name of Sun Microsystems, Inc. nor the names of its 15261046Smav * contributors may be used to endorse or promote products derived 16261046Smav * from this software without specific prior written permission. 17177633Sdfr * 18261046Smav * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 19261046Smav * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 20261046Smav * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 21261046Smav * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 22261046Smav * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 23261046Smav * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 24261046Smav * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 25261046Smav * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 26261046Smav * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 27261046Smav * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 28261046Smav * POSSIBILITY OF SUCH DAMAGE. 29177633Sdfr */ 30177633Sdfr 31177633Sdfr/* 32177633Sdfr * Copyright (c) 1986-1991 by Sun Microsystems Inc. 33177633Sdfr */ 34177633Sdfr 35177633Sdfr#if defined(LIBC_SCCS) && !defined(lint) 36177633Sdfr#ident "@(#)svc_dg.c 1.17 94/04/24 SMI" 37177633Sdfr#endif 38177633Sdfr#include <sys/cdefs.h> 39177633Sdfr__FBSDID("$FreeBSD: releng/10.3/sys/rpc/svc_dg.c 261055 2014-01-22 23:55:25Z mav $"); 40177633Sdfr 41177633Sdfr/* 42177633Sdfr * svc_dg.c, Server side for connectionless RPC. 43177633Sdfr */ 44177633Sdfr 45177633Sdfr#include <sys/param.h> 46177633Sdfr#include <sys/lock.h> 47177633Sdfr#include <sys/kernel.h> 48177633Sdfr#include <sys/malloc.h> 49177633Sdfr#include <sys/mbuf.h> 50177633Sdfr#include <sys/mutex.h> 51177633Sdfr#include <sys/protosw.h> 52177633Sdfr#include <sys/queue.h> 53177633Sdfr#include <sys/socket.h> 54177633Sdfr#include <sys/socketvar.h> 55184588Sdfr#include <sys/sx.h> 56177633Sdfr#include <sys/systm.h> 57177633Sdfr#include <sys/uio.h> 58177633Sdfr 59196503Szec#include <net/vnet.h> 60196503Szec 61177633Sdfr#include <rpc/rpc.h> 62177633Sdfr 63177685Sdfr#include <rpc/rpc_com.h> 64177633Sdfr 65177633Sdfrstatic enum xprt_stat svc_dg_stat(SVCXPRT *); 66184588Sdfrstatic bool_t svc_dg_recv(SVCXPRT *, struct rpc_msg *, 67184588Sdfr struct sockaddr **, struct mbuf **); 68184588Sdfrstatic bool_t svc_dg_reply(SVCXPRT *, struct rpc_msg *, 69261055Smav struct sockaddr *, struct mbuf *, uint32_t *); 70177633Sdfrstatic void svc_dg_destroy(SVCXPRT *); 71177633Sdfrstatic bool_t svc_dg_control(SVCXPRT *, const u_int, void *); 72193272Sjhbstatic int svc_dg_soupcall(struct socket *so, void *arg, int waitflag); 73177633Sdfr 74177633Sdfrstatic struct xp_ops svc_dg_ops = { 75177633Sdfr .xp_recv = svc_dg_recv, 76177633Sdfr .xp_stat = svc_dg_stat, 77177633Sdfr .xp_reply = svc_dg_reply, 78177633Sdfr .xp_destroy = svc_dg_destroy, 79177633Sdfr .xp_control = svc_dg_control, 80177633Sdfr}; 81177633Sdfr 82177633Sdfr/* 83177633Sdfr * Usage: 84177633Sdfr * xprt = svc_dg_create(sock, sendsize, recvsize); 85177633Sdfr * Does other connectionless specific initializations. 86177633Sdfr * Once *xprt is initialized, it is registered. 87177633Sdfr * see (svc.h, xprt_register). If recvsize or sendsize are 0 suitable 88177633Sdfr * system defaults are chosen. 89177633Sdfr * The routines returns NULL if a problem occurred. 90177633Sdfr */ 91177633Sdfrstatic const char svc_dg_str[] = "svc_dg_create: %s"; 92177633Sdfrstatic const char svc_dg_err1[] = "could not get transport information"; 93177633Sdfrstatic const char svc_dg_err2[] = "transport does not support data transfer"; 94177633Sdfrstatic const char __no_mem_str[] = "out of memory"; 95177633Sdfr 96177633SdfrSVCXPRT * 97177633Sdfrsvc_dg_create(SVCPOOL *pool, struct socket *so, size_t sendsize, 98177633Sdfr size_t recvsize) 99177633Sdfr{ 100177633Sdfr SVCXPRT *xprt; 101177633Sdfr struct __rpc_sockinfo si; 102177633Sdfr struct sockaddr* sa; 103177633Sdfr int error; 104177633Sdfr 105177633Sdfr if (!__rpc_socket2sockinfo(so, &si)) { 106177633Sdfr printf(svc_dg_str, svc_dg_err1); 107177633Sdfr return (NULL); 108177633Sdfr } 109177633Sdfr /* 110177633Sdfr * Find the receive and the send size 111177633Sdfr */ 112177633Sdfr sendsize = __rpc_get_t_size(si.si_af, si.si_proto, (int)sendsize); 113177633Sdfr recvsize = __rpc_get_t_size(si.si_af, si.si_proto, (int)recvsize); 114177633Sdfr if ((sendsize == 0) || (recvsize == 0)) { 115177633Sdfr printf(svc_dg_str, svc_dg_err2); 116177633Sdfr return (NULL); 117177633Sdfr } 118177633Sdfr 119184588Sdfr xprt = svc_xprt_alloc(); 120184588Sdfr sx_init(&xprt->xp_lock, "xprt->xp_lock"); 121177633Sdfr xprt->xp_pool = pool; 122177633Sdfr xprt->xp_socket = so; 123177633Sdfr xprt->xp_p1 = NULL; 124177633Sdfr xprt->xp_p2 = NULL; 125177633Sdfr xprt->xp_ops = &svc_dg_ops; 126177633Sdfr 127218757Sbz CURVNET_SET(so->so_vnet); 128177633Sdfr error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa); 129196503Szec CURVNET_RESTORE(); 130177633Sdfr if (error) 131177633Sdfr goto freedata; 132177633Sdfr 133184588Sdfr memcpy(&xprt->xp_ltaddr, sa, sa->sa_len); 134177633Sdfr free(sa, M_SONAME); 135177633Sdfr 136177633Sdfr xprt_register(xprt); 137177633Sdfr 138177633Sdfr SOCKBUF_LOCK(&so->so_rcv); 139193272Sjhb soupcall_set(so, SO_RCV, svc_dg_soupcall, xprt); 140177633Sdfr SOCKBUF_UNLOCK(&so->so_rcv); 141177633Sdfr 142177633Sdfr return (xprt); 143177633Sdfrfreedata: 144177633Sdfr (void) printf(svc_dg_str, __no_mem_str); 145177633Sdfr if (xprt) { 146184588Sdfr svc_xprt_free(xprt); 147177633Sdfr } 148177633Sdfr return (NULL); 149177633Sdfr} 150177633Sdfr 151177633Sdfr/*ARGSUSED*/ 152177633Sdfrstatic enum xprt_stat 153177633Sdfrsvc_dg_stat(SVCXPRT *xprt) 154177633Sdfr{ 155177633Sdfr 156184588Sdfr if (soreadable(xprt->xp_socket)) 157184588Sdfr return (XPRT_MOREREQS); 158184588Sdfr 159177633Sdfr return (XPRT_IDLE); 160177633Sdfr} 161177633Sdfr 162177633Sdfrstatic bool_t 163184588Sdfrsvc_dg_recv(SVCXPRT *xprt, struct rpc_msg *msg, 164184588Sdfr struct sockaddr **addrp, struct mbuf **mp) 165177633Sdfr{ 166177633Sdfr struct uio uio; 167177633Sdfr struct sockaddr *raddr; 168177633Sdfr struct mbuf *mreq; 169184588Sdfr XDR xdrs; 170177633Sdfr int error, rcvflag; 171177633Sdfr 172177633Sdfr /* 173184588Sdfr * Serialise access to the socket. 174184588Sdfr */ 175184588Sdfr sx_xlock(&xprt->xp_lock); 176184588Sdfr 177184588Sdfr /* 178177633Sdfr * The socket upcall calls xprt_active() which will eventually 179177633Sdfr * cause the server to call us here. We attempt to read a 180177633Sdfr * packet from the socket and process it. If the read fails, 181177633Sdfr * we have drained all pending requests so we call 182177633Sdfr * xprt_inactive(). 183177633Sdfr */ 184177633Sdfr uio.uio_resid = 1000000000; 185177633Sdfr uio.uio_td = curthread; 186177633Sdfr mreq = NULL; 187177633Sdfr rcvflag = MSG_DONTWAIT; 188177633Sdfr error = soreceive(xprt->xp_socket, &raddr, &uio, &mreq, NULL, &rcvflag); 189177633Sdfr 190177633Sdfr if (error == EWOULDBLOCK) { 191184588Sdfr /* 192184588Sdfr * We must re-test for readability after taking the 193184588Sdfr * lock to protect us in the case where a new packet 194184588Sdfr * arrives on the socket after our call to soreceive 195184588Sdfr * fails with EWOULDBLOCK. The pool lock protects us 196184588Sdfr * from racing the upcall after our soreadable() call 197184588Sdfr * returns false. 198184588Sdfr */ 199261053Smav SOCKBUF_LOCK(&xprt->xp_socket->so_rcv); 200184588Sdfr if (!soreadable(xprt->xp_socket)) 201261053Smav xprt_inactive_self(xprt); 202261053Smav SOCKBUF_UNLOCK(&xprt->xp_socket->so_rcv); 203184588Sdfr sx_xunlock(&xprt->xp_lock); 204177633Sdfr return (FALSE); 205177633Sdfr } 206177633Sdfr 207177633Sdfr if (error) { 208177633Sdfr SOCKBUF_LOCK(&xprt->xp_socket->so_rcv); 209193272Sjhb soupcall_clear(xprt->xp_socket, SO_RCV); 210177633Sdfr SOCKBUF_UNLOCK(&xprt->xp_socket->so_rcv); 211261053Smav xprt_inactive_self(xprt); 212184588Sdfr sx_xunlock(&xprt->xp_lock); 213177633Sdfr return (FALSE); 214177633Sdfr } 215177633Sdfr 216184588Sdfr sx_xunlock(&xprt->xp_lock); 217177633Sdfr 218184588Sdfr xdrmbuf_create(&xdrs, mreq, XDR_DECODE); 219184588Sdfr if (! xdr_callmsg(&xdrs, msg)) { 220184588Sdfr XDR_DESTROY(&xdrs); 221177633Sdfr return (FALSE); 222177633Sdfr } 223177633Sdfr 224184588Sdfr *addrp = raddr; 225184588Sdfr *mp = xdrmbuf_getall(&xdrs); 226184588Sdfr XDR_DESTROY(&xdrs); 227184588Sdfr 228177633Sdfr return (TRUE); 229177633Sdfr} 230177633Sdfr 231177633Sdfrstatic bool_t 232184588Sdfrsvc_dg_reply(SVCXPRT *xprt, struct rpc_msg *msg, 233261055Smav struct sockaddr *addr, struct mbuf *m, uint32_t *seq) 234177633Sdfr{ 235184588Sdfr XDR xdrs; 236177633Sdfr struct mbuf *mrep; 237184588Sdfr bool_t stat = TRUE; 238177633Sdfr int error; 239177633Sdfr 240248195Sglebius mrep = m_gethdr(M_WAITOK, MT_DATA); 241177633Sdfr 242184588Sdfr xdrmbuf_create(&xdrs, mrep, XDR_ENCODE); 243184588Sdfr 244184588Sdfr if (msg->rm_reply.rp_stat == MSG_ACCEPTED && 245184588Sdfr msg->rm_reply.rp_acpt.ar_stat == SUCCESS) { 246184588Sdfr if (!xdr_replymsg(&xdrs, msg)) 247184588Sdfr stat = FALSE; 248184588Sdfr else 249184588Sdfr xdrmbuf_append(&xdrs, m); 250184588Sdfr } else { 251184588Sdfr stat = xdr_replymsg(&xdrs, msg); 252184588Sdfr } 253184588Sdfr 254184588Sdfr if (stat) { 255177633Sdfr m_fixhdr(mrep); 256184588Sdfr error = sosend(xprt->xp_socket, addr, NULL, mrep, NULL, 257177633Sdfr 0, curthread); 258177633Sdfr if (!error) { 259177633Sdfr stat = TRUE; 260177633Sdfr } 261177633Sdfr } else { 262177633Sdfr m_freem(mrep); 263177633Sdfr } 264177633Sdfr 265184588Sdfr XDR_DESTROY(&xdrs); 266177633Sdfr xprt->xp_p2 = NULL; 267177633Sdfr 268177633Sdfr return (stat); 269177633Sdfr} 270177633Sdfr 271177633Sdfrstatic void 272177633Sdfrsvc_dg_destroy(SVCXPRT *xprt) 273177633Sdfr{ 274184588Sdfr 275177633Sdfr SOCKBUF_LOCK(&xprt->xp_socket->so_rcv); 276193272Sjhb soupcall_clear(xprt->xp_socket, SO_RCV); 277177633Sdfr SOCKBUF_UNLOCK(&xprt->xp_socket->so_rcv); 278177633Sdfr 279184588Sdfr sx_destroy(&xprt->xp_lock); 280177633Sdfr if (xprt->xp_socket) 281177633Sdfr (void)soclose(xprt->xp_socket); 282177633Sdfr 283184588Sdfr if (xprt->xp_netid) 284184588Sdfr (void) mem_free(xprt->xp_netid, strlen(xprt->xp_netid) + 1); 285184588Sdfr svc_xprt_free(xprt); 286177633Sdfr} 287177633Sdfr 288177633Sdfrstatic bool_t 289177633Sdfr/*ARGSUSED*/ 290177633Sdfrsvc_dg_control(xprt, rq, in) 291177633Sdfr SVCXPRT *xprt; 292177633Sdfr const u_int rq; 293177633Sdfr void *in; 294177633Sdfr{ 295177633Sdfr 296177633Sdfr return (FALSE); 297177633Sdfr} 298177633Sdfr 299193272Sjhbstatic int 300177633Sdfrsvc_dg_soupcall(struct socket *so, void *arg, int waitflag) 301177633Sdfr{ 302177633Sdfr SVCXPRT *xprt = (SVCXPRT *) arg; 303177633Sdfr 304177633Sdfr xprt_active(xprt); 305193272Sjhb return (SU_OK); 306177633Sdfr} 307