174462Salfred/*	$NetBSD: svc_dg.c,v 1.4 2000/07/06 03:10:35 christos Exp $	*/
274462Salfred
3261057Smav/*-
4261057Smav * Copyright (c) 2009, Sun Microsystems, Inc.
5261057Smav * All rights reserved.
6261057Smav *
7261057Smav * Redistribution and use in source and binary forms, with or without
8261057Smav * modification, are permitted provided that the following conditions are met:
9261057Smav * - Redistributions of source code must retain the above copyright notice,
10261057Smav *   this list of conditions and the following disclaimer.
11261057Smav * - Redistributions in binary form must reproduce the above copyright notice,
12261057Smav *   this list of conditions and the following disclaimer in the documentation
13261057Smav *   and/or other materials provided with the distribution.
14261057Smav * - Neither the name of Sun Microsystems, Inc. nor the names of its
15261057Smav *   contributors may be used to endorse or promote products derived
16261057Smav *   from this software without specific prior written permission.
1774462Salfred *
18261057Smav * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19261057Smav * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20261057Smav * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21261057Smav * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22261057Smav * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23261057Smav * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24261057Smav * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25261057Smav * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26261057Smav * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27261057Smav * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28261057Smav * POSSIBILITY OF SUCH DAMAGE.
2974462Salfred */
3074462Salfred
3174462Salfred/*
3274462Salfred * Copyright (c) 1986-1991 by Sun Microsystems Inc.
3374462Salfred */
3474462Salfred
35136581Sobrien#if defined(LIBC_SCCS) && !defined(lint)
36136581Sobrien#ident	"@(#)svc_dg.c	1.17	94/04/24 SMI"
37136581Sobrien#endif
3892990Sobrien#include <sys/cdefs.h>
3992990Sobrien__FBSDID("$FreeBSD$");
4074462Salfred
4174462Salfred/*
4274462Salfred * svc_dg.c, Server side for connectionless RPC.
4374462Salfred *
4474462Salfred * Does some caching in the hopes of achieving execute-at-most-once semantics.
4574462Salfred */
4674462Salfred
4775094Siedowse#include "namespace.h"
4874462Salfred#include "reentrant.h"
4974462Salfred#include <sys/types.h>
5074462Salfred#include <sys/socket.h>
5174462Salfred#include <rpc/rpc.h>
5274462Salfred#include <rpc/svc_dg.h>
53181344Sdfr#include <assert.h>
5474462Salfred#include <errno.h>
5574462Salfred#include <unistd.h>
5674462Salfred#include <stdio.h>
5774462Salfred#include <stdlib.h>
5874462Salfred#include <string.h>
5974462Salfred#ifdef RPC_CACHE_DEBUG
6074462Salfred#include <netconfig.h>
6174462Salfred#include <netdir.h>
6274462Salfred#endif
6374462Salfred#include <err.h>
6474462Salfred#include "un-namespace.h"
6574462Salfred
6674462Salfred#include "rpc_com.h"
67156090Sdeischen#include "mt_misc.h"
6874462Salfred
6974462Salfred#define	su_data(xprt)	((struct svc_dg_data *)(xprt->xp_p2))
7074462Salfred#define	rpc_buffer(xprt) ((xprt)->xp_p1)
7174462Salfred
7274462Salfred#ifndef MAX
7374462Salfred#define	MAX(a, b)	(((a) > (b)) ? (a) : (b))
7474462Salfred#endif
7574462Salfred
7692905Sobrienstatic void svc_dg_ops(SVCXPRT *);
7792905Sobrienstatic enum xprt_stat svc_dg_stat(SVCXPRT *);
7892905Sobrienstatic bool_t svc_dg_recv(SVCXPRT *, struct rpc_msg *);
7992905Sobrienstatic bool_t svc_dg_reply(SVCXPRT *, struct rpc_msg *);
8095658Sdesstatic bool_t svc_dg_getargs(SVCXPRT *, xdrproc_t, void *);
8195658Sdesstatic bool_t svc_dg_freeargs(SVCXPRT *, xdrproc_t, void *);
8292905Sobrienstatic void svc_dg_destroy(SVCXPRT *);
8392905Sobrienstatic bool_t svc_dg_control(SVCXPRT *, const u_int, void *);
8492905Sobrienstatic int cache_get(SVCXPRT *, struct rpc_msg *, char **, size_t *);
8592905Sobrienstatic void cache_set(SVCXPRT *, size_t);
8692905Sobrienint svc_dg_enablecache(SVCXPRT *, u_int);
8774462Salfred
8874462Salfred/*
8974462Salfred * Usage:
9074462Salfred *	xprt = svc_dg_create(sock, sendsize, recvsize);
9174462Salfred * Does other connectionless specific initializations.
9274462Salfred * Once *xprt is initialized, it is registered.
9374462Salfred * see (svc.h, xprt_register). If recvsize or sendsize are 0 suitable
9474462Salfred * system defaults are chosen.
9574462Salfred * The routines returns NULL if a problem occurred.
9674462Salfred */
9774462Salfredstatic const char svc_dg_str[] = "svc_dg_create: %s";
9874462Salfredstatic const char svc_dg_err1[] = "could not get transport information";
99194448Skanstatic const char svc_dg_err2[] = "transport does not support data transfer";
100192913Szmlstatic const char svc_dg_err3[] = "getsockname failed";
101194448Skanstatic const char svc_dg_err4[] = "cannot set IP_RECVDSTADDR";
10274462Salfredstatic const char __no_mem_str[] = "out of memory";
10374462Salfred
10474462SalfredSVCXPRT *
10574462Salfredsvc_dg_create(fd, sendsize, recvsize)
10674462Salfred	int fd;
10774462Salfred	u_int sendsize;
10874462Salfred	u_int recvsize;
10974462Salfred{
11074462Salfred	SVCXPRT *xprt;
11174462Salfred	struct svc_dg_data *su = NULL;
11274462Salfred	struct __rpc_sockinfo si;
11374462Salfred	struct sockaddr_storage ss;
11474462Salfred	socklen_t slen;
11574462Salfred
11674462Salfred	if (!__rpc_fd2sockinfo(fd, &si)) {
11774462Salfred		warnx(svc_dg_str, svc_dg_err1);
11874462Salfred		return (NULL);
11974462Salfred	}
12074462Salfred	/*
12174462Salfred	 * Find the receive and the send size
12274462Salfred	 */
12374462Salfred	sendsize = __rpc_get_t_size(si.si_af, si.si_proto, (int)sendsize);
12474462Salfred	recvsize = __rpc_get_t_size(si.si_af, si.si_proto, (int)recvsize);
12574462Salfred	if ((sendsize == 0) || (recvsize == 0)) {
12674462Salfred		warnx(svc_dg_str, svc_dg_err2);
12774462Salfred		return (NULL);
12874462Salfred	}
12974462Salfred
130181344Sdfr	xprt = svc_xprt_alloc();
13174462Salfred	if (xprt == NULL)
13274462Salfred		goto freedata;
13374462Salfred
13474462Salfred	su = mem_alloc(sizeof (*su));
13574462Salfred	if (su == NULL)
13674462Salfred		goto freedata;
13774462Salfred	su->su_iosz = ((MAX(sendsize, recvsize) + 3) / 4) * 4;
13874462Salfred	if ((rpc_buffer(xprt) = mem_alloc(su->su_iosz)) == NULL)
13974462Salfred		goto freedata;
14074462Salfred	xdrmem_create(&(su->su_xdrs), rpc_buffer(xprt), su->su_iosz,
14174462Salfred		XDR_DECODE);
14274462Salfred	su->su_cache = NULL;
14374462Salfred	xprt->xp_fd = fd;
14495658Sdes	xprt->xp_p2 = su;
14574462Salfred	xprt->xp_verf.oa_base = su->su_verfbody;
14674462Salfred	svc_dg_ops(xprt);
14774462Salfred	xprt->xp_rtaddr.maxlen = sizeof (struct sockaddr_storage);
14874462Salfred
14974462Salfred	slen = sizeof ss;
150192913Szml	if (_getsockname(fd, (struct sockaddr *)(void *)&ss, &slen) < 0) {
151192913Szml		warnx(svc_dg_str, svc_dg_err3);
152192913Szml		goto freedata_nowarn;
153192913Szml	}
15474462Salfred	xprt->xp_ltaddr.buf = mem_alloc(sizeof (struct sockaddr_storage));
15574462Salfred	xprt->xp_ltaddr.maxlen = sizeof (struct sockaddr_storage);
15674462Salfred	xprt->xp_ltaddr.len = slen;
15774462Salfred	memcpy(xprt->xp_ltaddr.buf, &ss, slen);
15874462Salfred
159194448Skan	if (ss.ss_family == AF_INET) {
160194448Skan		struct sockaddr_in *sin;
161194448Skan		static const int true_value = 1;
162194448Skan
163194448Skan		sin = (struct sockaddr_in *)(void *)&ss;
164194448Skan		if (sin->sin_addr.s_addr == INADDR_ANY) {
165194448Skan		    su->su_srcaddr.buf = mem_alloc(sizeof (ss));
166194448Skan		    su->su_srcaddr.maxlen = sizeof (ss);
167194448Skan
168194448Skan		    if (_setsockopt(fd, IPPROTO_IP, IP_RECVDSTADDR,
169194448Skan				    &true_value, sizeof(true_value))) {
170194448Skan			    warnx(svc_dg_str,  svc_dg_err4);
171194448Skan			    goto freedata_nowarn;
172194448Skan		    }
173194448Skan		}
174194448Skan	}
175194448Skan
17674462Salfred	xprt_register(xprt);
17774462Salfred	return (xprt);
17874462Salfredfreedata:
17974462Salfred	(void) warnx(svc_dg_str, __no_mem_str);
180192913Szmlfreedata_nowarn:
18174462Salfred	if (xprt) {
18274462Salfred		if (su)
18374462Salfred			(void) mem_free(su, sizeof (*su));
184181344Sdfr		svc_xprt_free(xprt);
18574462Salfred	}
18674462Salfred	return (NULL);
18774462Salfred}
18874462Salfred
18974462Salfred/*ARGSUSED*/
19074462Salfredstatic enum xprt_stat
19174462Salfredsvc_dg_stat(xprt)
19274462Salfred	SVCXPRT *xprt;
19374462Salfred{
19474462Salfred	return (XPRT_IDLE);
19574462Salfred}
19674462Salfred
197192913Szmlstatic int
198192913Szmlsvc_dg_recvfrom(int fd, char *buf, int buflen,
199192913Szml    struct sockaddr *raddr, socklen_t *raddrlen,
200192913Szml    struct sockaddr *laddr, socklen_t *laddrlen)
201192913Szml{
202192913Szml	struct msghdr msg;
203192913Szml	struct iovec msg_iov[1];
204192913Szml	struct sockaddr_in *lin = (struct sockaddr_in *)laddr;
205192913Szml	int rlen;
206192913Szml	bool_t have_lin = FALSE;
207192913Szml	char tmp[CMSG_LEN(sizeof(*lin))];
208192913Szml	struct cmsghdr *cmsg;
209192913Szml
210192913Szml	memset((char *)&msg, 0, sizeof(msg));
211192913Szml	msg_iov[0].iov_base = buf;
212192913Szml	msg_iov[0].iov_len = buflen;
213192913Szml	msg.msg_iov = msg_iov;
214192913Szml	msg.msg_iovlen = 1;
215192913Szml	msg.msg_namelen = *raddrlen;
216192913Szml	msg.msg_name = (char *)raddr;
217194448Skan	if (laddr != NULL) {
218194448Skan	    msg.msg_control = (caddr_t)tmp;
219194448Skan	    msg.msg_controllen = CMSG_LEN(sizeof(*lin));
220194448Skan	}
221192913Szml	rlen = _recvmsg(fd, &msg, 0);
222192913Szml	if (rlen >= 0)
223192913Szml		*raddrlen = msg.msg_namelen;
224192913Szml
225194448Skan	if (rlen == -1 || laddr == NULL ||
226192913Szml	    msg.msg_controllen < sizeof(struct cmsghdr) ||
227192913Szml	    msg.msg_flags & MSG_CTRUNC)
228192913Szml		return rlen;
229192913Szml
230192913Szml	for (cmsg = CMSG_FIRSTHDR(&msg); cmsg != NULL;
231193677Skan	     cmsg = CMSG_NXTHDR(&msg, cmsg)) {
232192913Szml		if (cmsg->cmsg_level == IPPROTO_IP &&
233192913Szml		    cmsg->cmsg_type == IP_RECVDSTADDR) {
234192913Szml			have_lin = TRUE;
235192913Szml			memcpy(&lin->sin_addr,
236194448Skan			    (struct in_addr *)CMSG_DATA(cmsg),
237194448Skan			    sizeof(struct in_addr));
238192913Szml			break;
239192913Szml		}
240192913Szml	}
241192913Szml
242192913Szml	lin->sin_family = AF_INET;
243192913Szml	lin->sin_port = 0;
244192913Szml	*laddrlen = sizeof(struct sockaddr_in);
245192913Szml
246194448Skan	if (!have_lin)
247194448Skan		lin->sin_addr.s_addr = INADDR_ANY;
248194448Skan
249192913Szml	return rlen;
250192913Szml}
251192913Szml
25274462Salfredstatic bool_t
25374462Salfredsvc_dg_recv(xprt, msg)
25474462Salfred	SVCXPRT *xprt;
25574462Salfred	struct rpc_msg *msg;
25674462Salfred{
25774462Salfred	struct svc_dg_data *su = su_data(xprt);
25874462Salfred	XDR *xdrs = &(su->su_xdrs);
25974462Salfred	char *reply;
26074462Salfred	struct sockaddr_storage ss;
26174462Salfred	socklen_t alen;
26274462Salfred	size_t replylen;
263109957Smbr	ssize_t rlen;
26474462Salfred
26574462Salfredagain:
26674462Salfred	alen = sizeof (struct sockaddr_storage);
267192913Szml	rlen = svc_dg_recvfrom(xprt->xp_fd, rpc_buffer(xprt), su->su_iosz,
268192913Szml	    (struct sockaddr *)(void *)&ss, &alen,
269194448Skan	    (struct sockaddr *)su->su_srcaddr.buf, &su->su_srcaddr.len);
27074462Salfred	if (rlen == -1 && errno == EINTR)
27174462Salfred		goto again;
272109957Smbr	if (rlen == -1 || (rlen < (ssize_t)(4 * sizeof (u_int32_t))))
27374462Salfred		return (FALSE);
27474462Salfred	if (xprt->xp_rtaddr.len < alen) {
27574462Salfred		if (xprt->xp_rtaddr.len != 0)
27674462Salfred			mem_free(xprt->xp_rtaddr.buf, xprt->xp_rtaddr.len);
27774462Salfred		xprt->xp_rtaddr.buf = mem_alloc(alen);
27874462Salfred		xprt->xp_rtaddr.len = alen;
27974462Salfred	}
28074462Salfred	memcpy(xprt->xp_rtaddr.buf, &ss, alen);
28174462Salfred#ifdef PORTMAP
28274462Salfred	if (ss.ss_family == AF_INET) {
28374462Salfred		xprt->xp_raddr = *(struct sockaddr_in *)xprt->xp_rtaddr.buf;
28474462Salfred		xprt->xp_addrlen = sizeof (struct sockaddr_in);
28574462Salfred	}
28674462Salfred#endif				/* PORTMAP */
28774462Salfred	xdrs->x_op = XDR_DECODE;
28874462Salfred	XDR_SETPOS(xdrs, 0);
28974462Salfred	if (! xdr_callmsg(xdrs, msg)) {
29074462Salfred		return (FALSE);
29174462Salfred	}
29274462Salfred	su->su_xid = msg->rm_xid;
29374462Salfred	if (su->su_cache != NULL) {
29474462Salfred		if (cache_get(xprt, msg, &reply, &replylen)) {
29574462Salfred			(void)_sendto(xprt->xp_fd, reply, replylen, 0,
29674462Salfred			    (struct sockaddr *)(void *)&ss, alen);
29774462Salfred			return (FALSE);
29874462Salfred		}
29974462Salfred	}
30074462Salfred	return (TRUE);
30174462Salfred}
30274462Salfred
303192913Szmlstatic int
304192913Szmlsvc_dg_sendto(int fd, char *buf, int buflen,
305192913Szml    const struct sockaddr *raddr, socklen_t raddrlen,
306192913Szml    const struct sockaddr *laddr, socklen_t laddrlen)
307192913Szml{
308192913Szml	struct msghdr msg;
309192913Szml	struct iovec msg_iov[1];
310192913Szml	struct sockaddr_in *laddr_in = (struct sockaddr_in *)laddr;
311192913Szml	struct in_addr *lin = &laddr_in->sin_addr;
312192913Szml	char tmp[CMSG_SPACE(sizeof(*lin))];
313192913Szml	struct cmsghdr *cmsg;
314192913Szml
315192913Szml	memset((char *)&msg, 0, sizeof(msg));
316192913Szml	msg_iov[0].iov_base = buf;
317192913Szml	msg_iov[0].iov_len = buflen;
318192913Szml	msg.msg_iov = msg_iov;
319192913Szml	msg.msg_iovlen = 1;
320192913Szml	msg.msg_namelen = raddrlen;
321192913Szml	msg.msg_name = (char *)raddr;
322192913Szml
323194448Skan	if (laddr != NULL && laddr->sa_family == AF_INET &&
324194448Skan	    lin->s_addr != INADDR_ANY) {
325192913Szml		msg.msg_control = (caddr_t)tmp;
326192913Szml		msg.msg_controllen = CMSG_LEN(sizeof(*lin));
327192913Szml		cmsg = CMSG_FIRSTHDR(&msg);
328192913Szml		cmsg->cmsg_len = CMSG_LEN(sizeof(*lin));
329192913Szml		cmsg->cmsg_level = IPPROTO_IP;
330192913Szml		cmsg->cmsg_type = IP_SENDSRCADDR;
331192913Szml		memcpy(CMSG_DATA(cmsg), lin, sizeof(*lin));
332192913Szml	}
333192913Szml
334192913Szml	return _sendmsg(fd, &msg, 0);
335192913Szml}
336192913Szml
33774462Salfredstatic bool_t
33874462Salfredsvc_dg_reply(xprt, msg)
33974462Salfred	SVCXPRT *xprt;
34074462Salfred	struct rpc_msg *msg;
34174462Salfred{
34274462Salfred	struct svc_dg_data *su = su_data(xprt);
34374462Salfred	XDR *xdrs = &(su->su_xdrs);
344181344Sdfr	bool_t stat = TRUE;
34574462Salfred	size_t slen;
346181344Sdfr	xdrproc_t xdr_proc;
347181344Sdfr	caddr_t xdr_where;
34874462Salfred
34974462Salfred	xdrs->x_op = XDR_ENCODE;
35074462Salfred	XDR_SETPOS(xdrs, 0);
35174462Salfred	msg->rm_xid = su->su_xid;
352181344Sdfr	if (msg->rm_reply.rp_stat == MSG_ACCEPTED &&
353181344Sdfr	    msg->rm_reply.rp_acpt.ar_stat == SUCCESS) {
354181344Sdfr		xdr_proc = msg->acpted_rply.ar_results.proc;
355181344Sdfr		xdr_where = msg->acpted_rply.ar_results.where;
356181344Sdfr		msg->acpted_rply.ar_results.proc = (xdrproc_t) xdr_void;
357181344Sdfr		msg->acpted_rply.ar_results.where = NULL;
358181344Sdfr
359181344Sdfr		if (!xdr_replymsg(xdrs, msg) ||
360181344Sdfr		    !SVCAUTH_WRAP(&SVC_AUTH(xprt), xdrs, xdr_proc, xdr_where))
361181344Sdfr			stat = FALSE;
362181344Sdfr	} else {
363181344Sdfr		stat = xdr_replymsg(xdrs, msg);
364181344Sdfr	}
365181344Sdfr	if (stat) {
36674462Salfred		slen = XDR_GETPOS(xdrs);
367192913Szml		if (svc_dg_sendto(xprt->xp_fd, rpc_buffer(xprt), slen,
36874462Salfred		    (struct sockaddr *)xprt->xp_rtaddr.buf,
369192913Szml		    (socklen_t)xprt->xp_rtaddr.len,
370194448Skan		    (struct sockaddr *)su->su_srcaddr.buf,
371194448Skan		    (socklen_t)su->su_srcaddr.len) == (ssize_t) slen) {
37274462Salfred			stat = TRUE;
37374462Salfred			if (su->su_cache)
37474462Salfred				cache_set(xprt, slen);
37574462Salfred		}
37674462Salfred	}
37774462Salfred	return (stat);
37874462Salfred}
37974462Salfred
38074462Salfredstatic bool_t
38174462Salfredsvc_dg_getargs(xprt, xdr_args, args_ptr)
38274462Salfred	SVCXPRT *xprt;
38374462Salfred	xdrproc_t xdr_args;
38495658Sdes	void *args_ptr;
38574462Salfred{
386181344Sdfr	struct svc_dg_data *su;
387181344Sdfr
388181344Sdfr	assert(xprt != NULL);
389181344Sdfr	su = su_data(xprt);
390181344Sdfr	return (SVCAUTH_UNWRAP(&SVC_AUTH(xprt),
391181344Sdfr		&su->su_xdrs, xdr_args, args_ptr));
39274462Salfred}
39374462Salfred
39474462Salfredstatic bool_t
39574462Salfredsvc_dg_freeargs(xprt, xdr_args, args_ptr)
39674462Salfred	SVCXPRT *xprt;
39774462Salfred	xdrproc_t xdr_args;
39895658Sdes	void *args_ptr;
39974462Salfred{
40074462Salfred	XDR *xdrs = &(su_data(xprt)->su_xdrs);
40174462Salfred
40274462Salfred	xdrs->x_op = XDR_FREE;
40374462Salfred	return (*xdr_args)(xdrs, args_ptr);
40474462Salfred}
40574462Salfred
40674462Salfredstatic void
40774462Salfredsvc_dg_destroy(xprt)
40874462Salfred	SVCXPRT *xprt;
40974462Salfred{
41074462Salfred	struct svc_dg_data *su = su_data(xprt);
41174462Salfred
41274462Salfred	xprt_unregister(xprt);
41374462Salfred	if (xprt->xp_fd != -1)
41474462Salfred		(void)_close(xprt->xp_fd);
41574462Salfred	XDR_DESTROY(&(su->su_xdrs));
41674462Salfred	(void) mem_free(rpc_buffer(xprt), su->su_iosz);
417194448Skan	if (su->su_srcaddr.buf)
418194448Skan		(void) mem_free(su->su_srcaddr.buf, su->su_srcaddr.maxlen);
41974462Salfred	(void) mem_free(su, sizeof (*su));
42074462Salfred	if (xprt->xp_rtaddr.buf)
42174462Salfred		(void) mem_free(xprt->xp_rtaddr.buf, xprt->xp_rtaddr.maxlen);
42274462Salfred	if (xprt->xp_ltaddr.buf)
42374462Salfred		(void) mem_free(xprt->xp_ltaddr.buf, xprt->xp_ltaddr.maxlen);
42474462Salfred	if (xprt->xp_tp)
42574462Salfred		(void) free(xprt->xp_tp);
426181344Sdfr	svc_xprt_free(xprt);
42774462Salfred}
42874462Salfred
42974462Salfredstatic bool_t
43074462Salfred/*ARGSUSED*/
43174462Salfredsvc_dg_control(xprt, rq, in)
43274462Salfred	SVCXPRT *xprt;
43374462Salfred	const u_int	rq;
43474462Salfred	void		*in;
43574462Salfred{
43674462Salfred	return (FALSE);
43774462Salfred}
43874462Salfred
43974462Salfredstatic void
44074462Salfredsvc_dg_ops(xprt)
44174462Salfred	SVCXPRT *xprt;
44274462Salfred{
44374462Salfred	static struct xp_ops ops;
44474462Salfred	static struct xp_ops2 ops2;
44574462Salfred
44674462Salfred/* VARIABLES PROTECTED BY ops_lock: ops */
44774462Salfred
44874462Salfred	mutex_lock(&ops_lock);
44974462Salfred	if (ops.xp_recv == NULL) {
45074462Salfred		ops.xp_recv = svc_dg_recv;
45174462Salfred		ops.xp_stat = svc_dg_stat;
45274462Salfred		ops.xp_getargs = svc_dg_getargs;
45374462Salfred		ops.xp_reply = svc_dg_reply;
45474462Salfred		ops.xp_freeargs = svc_dg_freeargs;
45574462Salfred		ops.xp_destroy = svc_dg_destroy;
45674462Salfred		ops2.xp_control = svc_dg_control;
45774462Salfred	}
45874462Salfred	xprt->xp_ops = &ops;
45974462Salfred	xprt->xp_ops2 = &ops2;
46074462Salfred	mutex_unlock(&ops_lock);
46174462Salfred}
46274462Salfred
46374462Salfred/*  The CACHING COMPONENT */
46474462Salfred
46574462Salfred/*
46674462Salfred * Could have been a separate file, but some part of it depends upon the
46774462Salfred * private structure of the client handle.
46874462Salfred *
46974462Salfred * Fifo cache for cl server
47074462Salfred * Copies pointers to reply buffers into fifo cache
47174462Salfred * Buffers are sent again if retransmissions are detected.
47274462Salfred */
47374462Salfred
47474462Salfred#define	SPARSENESS 4	/* 75% sparse */
47574462Salfred
47674462Salfred#define	ALLOC(type, size)	\
47774462Salfred	(type *) mem_alloc((sizeof (type) * (size)))
47874462Salfred
47974462Salfred#define	MEMZERO(addr, type, size)	 \
48074462Salfred	(void) memset((void *) (addr), 0, sizeof (type) * (int) (size))
48174462Salfred
48274462Salfred#define	FREE(addr, type, size)	\
48374462Salfred	mem_free((addr), (sizeof (type) * (size)))
48474462Salfred
48574462Salfred/*
48674462Salfred * An entry in the cache
48774462Salfred */
48874462Salfredtypedef struct cache_node *cache_ptr;
48974462Salfredstruct cache_node {
49074462Salfred	/*
49174462Salfred	 * Index into cache is xid, proc, vers, prog and address
49274462Salfred	 */
49374462Salfred	u_int32_t cache_xid;
49474462Salfred	rpcproc_t cache_proc;
49574462Salfred	rpcvers_t cache_vers;
49674462Salfred	rpcprog_t cache_prog;
49774462Salfred	struct netbuf cache_addr;
49874462Salfred	/*
49974462Salfred	 * The cached reply and length
50074462Salfred	 */
50174462Salfred	char *cache_reply;
50274462Salfred	size_t cache_replylen;
50374462Salfred	/*
50474462Salfred	 * Next node on the list, if there is a collision
50574462Salfred	 */
50674462Salfred	cache_ptr cache_next;
50774462Salfred};
50874462Salfred
50974462Salfred/*
51074462Salfred * The entire cache
51174462Salfred */
51274462Salfredstruct cl_cache {
51374462Salfred	u_int uc_size;		/* size of cache */
51474462Salfred	cache_ptr *uc_entries;	/* hash table of entries in cache */
51574462Salfred	cache_ptr *uc_fifo;	/* fifo list of entries in cache */
51674462Salfred	u_int uc_nextvictim;	/* points to next victim in fifo list */
51774462Salfred	rpcprog_t uc_prog;	/* saved program number */
51874462Salfred	rpcvers_t uc_vers;	/* saved version number */
51974462Salfred	rpcproc_t uc_proc;	/* saved procedure number */
52074462Salfred};
52174462Salfred
52274462Salfred
52374462Salfred/*
52474462Salfred * the hashing function
52574462Salfred */
52674462Salfred#define	CACHE_LOC(transp, xid)	\
52774462Salfred	(xid % (SPARSENESS * ((struct cl_cache *) \
52874462Salfred		su_data(transp)->su_cache)->uc_size))
52974462Salfred
53074462Salfred/*
53174462Salfred * Enable use of the cache. Returns 1 on success, 0 on failure.
53274462Salfred * Note: there is no disable.
53374462Salfred */
53474462Salfredstatic const char cache_enable_str[] = "svc_enablecache: %s %s";
53574462Salfredstatic const char alloc_err[] = "could not allocate cache ";
53674462Salfredstatic const char enable_err[] = "cache already enabled";
53774462Salfred
53874462Salfredint
53974462Salfredsvc_dg_enablecache(transp, size)
54074462Salfred	SVCXPRT *transp;
54174462Salfred	u_int size;
54274462Salfred{
54374462Salfred	struct svc_dg_data *su = su_data(transp);
54474462Salfred	struct cl_cache *uc;
54574462Salfred
54674462Salfred	mutex_lock(&dupreq_lock);
54774462Salfred	if (su->su_cache != NULL) {
54874462Salfred		(void) warnx(cache_enable_str, enable_err, " ");
54974462Salfred		mutex_unlock(&dupreq_lock);
55074462Salfred		return (0);
55174462Salfred	}
55274462Salfred	uc = ALLOC(struct cl_cache, 1);
55374462Salfred	if (uc == NULL) {
55474462Salfred		warnx(cache_enable_str, alloc_err, " ");
55574462Salfred		mutex_unlock(&dupreq_lock);
55674462Salfred		return (0);
55774462Salfred	}
55874462Salfred	uc->uc_size = size;
55974462Salfred	uc->uc_nextvictim = 0;
56074462Salfred	uc->uc_entries = ALLOC(cache_ptr, size * SPARSENESS);
56174462Salfred	if (uc->uc_entries == NULL) {
56274462Salfred		warnx(cache_enable_str, alloc_err, "data");
56374462Salfred		FREE(uc, struct cl_cache, 1);
56474462Salfred		mutex_unlock(&dupreq_lock);
56574462Salfred		return (0);
56674462Salfred	}
56774462Salfred	MEMZERO(uc->uc_entries, cache_ptr, size * SPARSENESS);
56874462Salfred	uc->uc_fifo = ALLOC(cache_ptr, size);
56974462Salfred	if (uc->uc_fifo == NULL) {
57074462Salfred		warnx(cache_enable_str, alloc_err, "fifo");
57174462Salfred		FREE(uc->uc_entries, cache_ptr, size * SPARSENESS);
57274462Salfred		FREE(uc, struct cl_cache, 1);
57374462Salfred		mutex_unlock(&dupreq_lock);
57474462Salfred		return (0);
57574462Salfred	}
57674462Salfred	MEMZERO(uc->uc_fifo, cache_ptr, size);
57774462Salfred	su->su_cache = (char *)(void *)uc;
57874462Salfred	mutex_unlock(&dupreq_lock);
57974462Salfred	return (1);
58074462Salfred}
58174462Salfred
58274462Salfred/*
58374462Salfred * Set an entry in the cache.  It assumes that the uc entry is set from
58474462Salfred * the earlier call to cache_get() for the same procedure.  This will always
58574462Salfred * happen because cache_get() is calle by svc_dg_recv and cache_set() is called
58674462Salfred * by svc_dg_reply().  All this hoopla because the right RPC parameters are
58774462Salfred * not available at svc_dg_reply time.
58874462Salfred */
58974462Salfred
59074462Salfredstatic const char cache_set_str[] = "cache_set: %s";
59174462Salfredstatic const char cache_set_err1[] = "victim not found";
59274462Salfredstatic const char cache_set_err2[] = "victim alloc failed";
59374462Salfredstatic const char cache_set_err3[] = "could not allocate new rpc buffer";
59474462Salfred
59574462Salfredstatic void
59674462Salfredcache_set(xprt, replylen)
59774462Salfred	SVCXPRT *xprt;
59874462Salfred	size_t replylen;
59974462Salfred{
60074462Salfred	cache_ptr victim;
60174462Salfred	cache_ptr *vicp;
60274462Salfred	struct svc_dg_data *su = su_data(xprt);
60374462Salfred	struct cl_cache *uc = (struct cl_cache *) su->su_cache;
60474462Salfred	u_int loc;
60574462Salfred	char *newbuf;
60674462Salfred#ifdef RPC_CACHE_DEBUG
60774462Salfred	struct netconfig *nconf;
60874462Salfred	char *uaddr;
60974462Salfred#endif
61074462Salfred
61174462Salfred	mutex_lock(&dupreq_lock);
61274462Salfred	/*
61374462Salfred	 * Find space for the new entry, either by
61474462Salfred	 * reusing an old entry, or by mallocing a new one
61574462Salfred	 */
61674462Salfred	victim = uc->uc_fifo[uc->uc_nextvictim];
61774462Salfred	if (victim != NULL) {
61874462Salfred		loc = CACHE_LOC(xprt, victim->cache_xid);
61974462Salfred		for (vicp = &uc->uc_entries[loc];
62074462Salfred			*vicp != NULL && *vicp != victim;
62174462Salfred			vicp = &(*vicp)->cache_next)
62274462Salfred			;
62374462Salfred		if (*vicp == NULL) {
62474462Salfred			warnx(cache_set_str, cache_set_err1);
62574462Salfred			mutex_unlock(&dupreq_lock);
62674462Salfred			return;
62774462Salfred		}
62874462Salfred		*vicp = victim->cache_next;	/* remove from cache */
62974462Salfred		newbuf = victim->cache_reply;
63074462Salfred	} else {
63174462Salfred		victim = ALLOC(struct cache_node, 1);
63274462Salfred		if (victim == NULL) {
63374462Salfred			warnx(cache_set_str, cache_set_err2);
63474462Salfred			mutex_unlock(&dupreq_lock);
63574462Salfred			return;
63674462Salfred		}
63774462Salfred		newbuf = mem_alloc(su->su_iosz);
63874462Salfred		if (newbuf == NULL) {
63974462Salfred			warnx(cache_set_str, cache_set_err3);
64074462Salfred			FREE(victim, struct cache_node, 1);
64174462Salfred			mutex_unlock(&dupreq_lock);
64274462Salfred			return;
64374462Salfred		}
64474462Salfred	}
64574462Salfred
64674462Salfred	/*
64774462Salfred	 * Store it away
64874462Salfred	 */
64974462Salfred#ifdef RPC_CACHE_DEBUG
65074462Salfred	if (nconf = getnetconfigent(xprt->xp_netid)) {
65174462Salfred		uaddr = taddr2uaddr(nconf, &xprt->xp_rtaddr);
65274462Salfred		freenetconfigent(nconf);
65374462Salfred		printf(
65474462Salfred	"cache set for xid= %x prog=%d vers=%d proc=%d for rmtaddr=%s\n",
65574462Salfred			su->su_xid, uc->uc_prog, uc->uc_vers,
65674462Salfred			uc->uc_proc, uaddr);
65774462Salfred		free(uaddr);
65874462Salfred	}
65974462Salfred#endif
66074462Salfred	victim->cache_replylen = replylen;
66174462Salfred	victim->cache_reply = rpc_buffer(xprt);
66274462Salfred	rpc_buffer(xprt) = newbuf;
66374462Salfred	xdrmem_create(&(su->su_xdrs), rpc_buffer(xprt),
66474462Salfred			su->su_iosz, XDR_ENCODE);
66574462Salfred	victim->cache_xid = su->su_xid;
66674462Salfred	victim->cache_proc = uc->uc_proc;
66774462Salfred	victim->cache_vers = uc->uc_vers;
66874462Salfred	victim->cache_prog = uc->uc_prog;
66974462Salfred	victim->cache_addr = xprt->xp_rtaddr;
67074462Salfred	victim->cache_addr.buf = ALLOC(char, xprt->xp_rtaddr.len);
67174462Salfred	(void) memcpy(victim->cache_addr.buf, xprt->xp_rtaddr.buf,
67274462Salfred	    (size_t)xprt->xp_rtaddr.len);
67374462Salfred	loc = CACHE_LOC(xprt, victim->cache_xid);
67474462Salfred	victim->cache_next = uc->uc_entries[loc];
67574462Salfred	uc->uc_entries[loc] = victim;
67674462Salfred	uc->uc_fifo[uc->uc_nextvictim++] = victim;
67774462Salfred	uc->uc_nextvictim %= uc->uc_size;
67874462Salfred	mutex_unlock(&dupreq_lock);
67974462Salfred}
68074462Salfred
68174462Salfred/*
68274462Salfred * Try to get an entry from the cache
68374462Salfred * return 1 if found, 0 if not found and set the stage for cache_set()
68474462Salfred */
68574462Salfredstatic int
68674462Salfredcache_get(xprt, msg, replyp, replylenp)
68774462Salfred	SVCXPRT *xprt;
68874462Salfred	struct rpc_msg *msg;
68974462Salfred	char **replyp;
69074462Salfred	size_t *replylenp;
69174462Salfred{
69274462Salfred	u_int loc;
69374462Salfred	cache_ptr ent;
69474462Salfred	struct svc_dg_data *su = su_data(xprt);
69574462Salfred	struct cl_cache *uc = (struct cl_cache *) su->su_cache;
69674462Salfred#ifdef RPC_CACHE_DEBUG
69774462Salfred	struct netconfig *nconf;
69874462Salfred	char *uaddr;
69974462Salfred#endif
70074462Salfred
70174462Salfred	mutex_lock(&dupreq_lock);
70274462Salfred	loc = CACHE_LOC(xprt, su->su_xid);
70374462Salfred	for (ent = uc->uc_entries[loc]; ent != NULL; ent = ent->cache_next) {
70474462Salfred		if (ent->cache_xid == su->su_xid &&
70574462Salfred			ent->cache_proc == msg->rm_call.cb_proc &&
70674462Salfred			ent->cache_vers == msg->rm_call.cb_vers &&
70774462Salfred			ent->cache_prog == msg->rm_call.cb_prog &&
70874462Salfred			ent->cache_addr.len == xprt->xp_rtaddr.len &&
70974462Salfred			(memcmp(ent->cache_addr.buf, xprt->xp_rtaddr.buf,
71074462Salfred				xprt->xp_rtaddr.len) == 0)) {
71174462Salfred#ifdef RPC_CACHE_DEBUG
71274462Salfred			if (nconf = getnetconfigent(xprt->xp_netid)) {
71374462Salfred				uaddr = taddr2uaddr(nconf, &xprt->xp_rtaddr);
71474462Salfred				freenetconfigent(nconf);
71574462Salfred				printf(
71674462Salfred	"cache entry found for xid=%x prog=%d vers=%d proc=%d for rmtaddr=%s\n",
71774462Salfred					su->su_xid, msg->rm_call.cb_prog,
71874462Salfred					msg->rm_call.cb_vers,
71974462Salfred					msg->rm_call.cb_proc, uaddr);
72074462Salfred				free(uaddr);
72174462Salfred			}
72274462Salfred#endif
72374462Salfred			*replyp = ent->cache_reply;
72474462Salfred			*replylenp = ent->cache_replylen;
72574462Salfred			mutex_unlock(&dupreq_lock);
72674462Salfred			return (1);
72774462Salfred		}
72874462Salfred	}
72974462Salfred	/*
73074462Salfred	 * Failed to find entry
73174462Salfred	 * Remember a few things so we can do a set later
73274462Salfred	 */
73374462Salfred	uc->uc_proc = msg->rm_call.cb_proc;
73474462Salfred	uc->uc_vers = msg->rm_call.cb_vers;
73574462Salfred	uc->uc_prog = msg->rm_call.cb_prog;
73674462Salfred	mutex_unlock(&dupreq_lock);
73774462Salfred	return (0);
73874462Salfred}
739