1177633Sdfr/*	$NetBSD: svc_dg.c,v 1.4 2000/07/06 03:10:35 christos Exp $	*/
2177633Sdfr
3261057Smav/*-
4261057Smav * Copyright (c) 2009, Sun Microsystems, Inc.
5261057Smav * All rights reserved.
6261057Smav *
7261057Smav * Redistribution and use in source and binary forms, with or without
8261057Smav * modification, are permitted provided that the following conditions are met:
9261057Smav * - Redistributions of source code must retain the above copyright notice,
10261057Smav *   this list of conditions and the following disclaimer.
11261057Smav * - Redistributions in binary form must reproduce the above copyright notice,
12261057Smav *   this list of conditions and the following disclaimer in the documentation
13261057Smav *   and/or other materials provided with the distribution.
14261057Smav * - Neither the name of Sun Microsystems, Inc. nor the names of its
15261057Smav *   contributors may be used to endorse or promote products derived
16261057Smav *   from this software without specific prior written permission.
17177633Sdfr *
18261057Smav * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19261057Smav * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20261057Smav * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21261057Smav * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22261057Smav * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23261057Smav * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24261057Smav * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25261057Smav * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26261057Smav * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27261057Smav * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28261057Smav * POSSIBILITY OF SUCH DAMAGE.
29177633Sdfr */
30177633Sdfr
31177633Sdfr/*
32177633Sdfr * Copyright (c) 1986-1991 by Sun Microsystems Inc.
33177633Sdfr */
34177633Sdfr
35177633Sdfr#if defined(LIBC_SCCS) && !defined(lint)
36177633Sdfr#ident	"@(#)svc_dg.c	1.17	94/04/24 SMI"
37177633Sdfr#endif
38177633Sdfr#include <sys/cdefs.h>
39177633Sdfr__FBSDID("$FreeBSD$");
40177633Sdfr
41177633Sdfr/*
42177633Sdfr * svc_dg.c, Server side for connectionless RPC.
43177633Sdfr */
44177633Sdfr
45177633Sdfr#include <sys/param.h>
46177633Sdfr#include <sys/lock.h>
47177633Sdfr#include <sys/kernel.h>
48177633Sdfr#include <sys/malloc.h>
49177633Sdfr#include <sys/mbuf.h>
50177633Sdfr#include <sys/mutex.h>
51177633Sdfr#include <sys/protosw.h>
52177633Sdfr#include <sys/queue.h>
53177633Sdfr#include <sys/socket.h>
54177633Sdfr#include <sys/socketvar.h>
55184588Sdfr#include <sys/sx.h>
56177633Sdfr#include <sys/systm.h>
57177633Sdfr#include <sys/uio.h>
58177633Sdfr
59196503Szec#include <net/vnet.h>
60196503Szec
61177633Sdfr#include <rpc/rpc.h>
62177633Sdfr
63177685Sdfr#include <rpc/rpc_com.h>
64177633Sdfr
65177633Sdfrstatic enum xprt_stat svc_dg_stat(SVCXPRT *);
66184588Sdfrstatic bool_t svc_dg_recv(SVCXPRT *, struct rpc_msg *,
67184588Sdfr    struct sockaddr **, struct mbuf **);
68184588Sdfrstatic bool_t svc_dg_reply(SVCXPRT *, struct rpc_msg *,
69261067Smav    struct sockaddr *, struct mbuf *, uint32_t *);
70177633Sdfrstatic void svc_dg_destroy(SVCXPRT *);
71177633Sdfrstatic bool_t svc_dg_control(SVCXPRT *, const u_int, void *);
72193272Sjhbstatic int svc_dg_soupcall(struct socket *so, void *arg, int waitflag);
73177633Sdfr
74177633Sdfrstatic struct xp_ops svc_dg_ops = {
75177633Sdfr	.xp_recv =	svc_dg_recv,
76177633Sdfr	.xp_stat =	svc_dg_stat,
77177633Sdfr	.xp_reply =	svc_dg_reply,
78177633Sdfr	.xp_destroy =	svc_dg_destroy,
79177633Sdfr	.xp_control =	svc_dg_control,
80177633Sdfr};
81177633Sdfr
82177633Sdfr/*
83177633Sdfr * Usage:
84177633Sdfr *	xprt = svc_dg_create(sock, sendsize, recvsize);
85177633Sdfr * Does other connectionless specific initializations.
86177633Sdfr * Once *xprt is initialized, it is registered.
87177633Sdfr * see (svc.h, xprt_register). If recvsize or sendsize are 0 suitable
88177633Sdfr * system defaults are chosen.
89177633Sdfr * The routines returns NULL if a problem occurred.
90177633Sdfr */
91177633Sdfrstatic const char svc_dg_str[] = "svc_dg_create: %s";
92177633Sdfrstatic const char svc_dg_err1[] = "could not get transport information";
93177633Sdfrstatic const char svc_dg_err2[] = "transport does not support data transfer";
94177633Sdfrstatic const char __no_mem_str[] = "out of memory";
95177633Sdfr
96177633SdfrSVCXPRT *
97177633Sdfrsvc_dg_create(SVCPOOL *pool, struct socket *so, size_t sendsize,
98177633Sdfr    size_t recvsize)
99177633Sdfr{
100177633Sdfr	SVCXPRT *xprt;
101177633Sdfr	struct __rpc_sockinfo si;
102177633Sdfr	struct sockaddr* sa;
103177633Sdfr	int error;
104177633Sdfr
105177633Sdfr	if (!__rpc_socket2sockinfo(so, &si)) {
106177633Sdfr		printf(svc_dg_str, svc_dg_err1);
107177633Sdfr		return (NULL);
108177633Sdfr	}
109177633Sdfr	/*
110177633Sdfr	 * Find the receive and the send size
111177633Sdfr	 */
112177633Sdfr	sendsize = __rpc_get_t_size(si.si_af, si.si_proto, (int)sendsize);
113177633Sdfr	recvsize = __rpc_get_t_size(si.si_af, si.si_proto, (int)recvsize);
114177633Sdfr	if ((sendsize == 0) || (recvsize == 0)) {
115177633Sdfr		printf(svc_dg_str, svc_dg_err2);
116177633Sdfr		return (NULL);
117177633Sdfr	}
118177633Sdfr
119184588Sdfr	xprt = svc_xprt_alloc();
120184588Sdfr	sx_init(&xprt->xp_lock, "xprt->xp_lock");
121177633Sdfr	xprt->xp_pool = pool;
122177633Sdfr	xprt->xp_socket = so;
123177633Sdfr	xprt->xp_p1 = NULL;
124177633Sdfr	xprt->xp_p2 = NULL;
125177633Sdfr	xprt->xp_ops = &svc_dg_ops;
126177633Sdfr
127218757Sbz	CURVNET_SET(so->so_vnet);
128177633Sdfr	error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa);
129196503Szec	CURVNET_RESTORE();
130177633Sdfr	if (error)
131177633Sdfr		goto freedata;
132177633Sdfr
133184588Sdfr	memcpy(&xprt->xp_ltaddr, sa, sa->sa_len);
134177633Sdfr	free(sa, M_SONAME);
135177633Sdfr
136177633Sdfr	xprt_register(xprt);
137177633Sdfr
138177633Sdfr	SOCKBUF_LOCK(&so->so_rcv);
139193272Sjhb	soupcall_set(so, SO_RCV, svc_dg_soupcall, xprt);
140177633Sdfr	SOCKBUF_UNLOCK(&so->so_rcv);
141177633Sdfr
142177633Sdfr	return (xprt);
143177633Sdfrfreedata:
144177633Sdfr	(void) printf(svc_dg_str, __no_mem_str);
145177633Sdfr	if (xprt) {
146184588Sdfr		svc_xprt_free(xprt);
147177633Sdfr	}
148177633Sdfr	return (NULL);
149177633Sdfr}
150177633Sdfr
151177633Sdfr/*ARGSUSED*/
152177633Sdfrstatic enum xprt_stat
153177633Sdfrsvc_dg_stat(SVCXPRT *xprt)
154177633Sdfr{
155177633Sdfr
156184588Sdfr	if (soreadable(xprt->xp_socket))
157184588Sdfr		return (XPRT_MOREREQS);
158184588Sdfr
159177633Sdfr	return (XPRT_IDLE);
160177633Sdfr}
161177633Sdfr
162177633Sdfrstatic bool_t
163184588Sdfrsvc_dg_recv(SVCXPRT *xprt, struct rpc_msg *msg,
164184588Sdfr    struct sockaddr **addrp, struct mbuf **mp)
165177633Sdfr{
166177633Sdfr	struct uio uio;
167177633Sdfr	struct sockaddr *raddr;
168177633Sdfr	struct mbuf *mreq;
169184588Sdfr	XDR xdrs;
170177633Sdfr	int error, rcvflag;
171177633Sdfr
172177633Sdfr	/*
173184588Sdfr	 * Serialise access to the socket.
174184588Sdfr	 */
175184588Sdfr	sx_xlock(&xprt->xp_lock);
176184588Sdfr
177184588Sdfr	/*
178177633Sdfr	 * The socket upcall calls xprt_active() which will eventually
179177633Sdfr	 * cause the server to call us here. We attempt to read a
180177633Sdfr	 * packet from the socket and process it. If the read fails,
181177633Sdfr	 * we have drained all pending requests so we call
182177633Sdfr	 * xprt_inactive().
183177633Sdfr	 */
184177633Sdfr	uio.uio_resid = 1000000000;
185177633Sdfr	uio.uio_td = curthread;
186177633Sdfr	mreq = NULL;
187177633Sdfr	rcvflag = MSG_DONTWAIT;
188177633Sdfr	error = soreceive(xprt->xp_socket, &raddr, &uio, &mreq, NULL, &rcvflag);
189177633Sdfr
190177633Sdfr	if (error == EWOULDBLOCK) {
191184588Sdfr		/*
192184588Sdfr		 * We must re-test for readability after taking the
193184588Sdfr		 * lock to protect us in the case where a new packet
194184588Sdfr		 * arrives on the socket after our call to soreceive
195184588Sdfr		 * fails with EWOULDBLOCK. The pool lock protects us
196184588Sdfr		 * from racing the upcall after our soreadable() call
197184588Sdfr		 * returns false.
198184588Sdfr		 */
199261065Smav		SOCKBUF_LOCK(&xprt->xp_socket->so_rcv);
200184588Sdfr		if (!soreadable(xprt->xp_socket))
201261065Smav			xprt_inactive_self(xprt);
202261065Smav		SOCKBUF_UNLOCK(&xprt->xp_socket->so_rcv);
203184588Sdfr		sx_xunlock(&xprt->xp_lock);
204177633Sdfr		return (FALSE);
205177633Sdfr	}
206177633Sdfr
207177633Sdfr	if (error) {
208177633Sdfr		SOCKBUF_LOCK(&xprt->xp_socket->so_rcv);
209193272Sjhb		soupcall_clear(xprt->xp_socket, SO_RCV);
210177633Sdfr		SOCKBUF_UNLOCK(&xprt->xp_socket->so_rcv);
211261065Smav		xprt_inactive_self(xprt);
212184588Sdfr		sx_xunlock(&xprt->xp_lock);
213177633Sdfr		return (FALSE);
214177633Sdfr	}
215177633Sdfr
216184588Sdfr	sx_xunlock(&xprt->xp_lock);
217177633Sdfr
218184588Sdfr	xdrmbuf_create(&xdrs, mreq, XDR_DECODE);
219184588Sdfr	if (! xdr_callmsg(&xdrs, msg)) {
220184588Sdfr		XDR_DESTROY(&xdrs);
221177633Sdfr		return (FALSE);
222177633Sdfr	}
223177633Sdfr
224184588Sdfr	*addrp = raddr;
225184588Sdfr	*mp = xdrmbuf_getall(&xdrs);
226184588Sdfr	XDR_DESTROY(&xdrs);
227184588Sdfr
228177633Sdfr	return (TRUE);
229177633Sdfr}
230177633Sdfr
231177633Sdfrstatic bool_t
232184588Sdfrsvc_dg_reply(SVCXPRT *xprt, struct rpc_msg *msg,
233261067Smav    struct sockaddr *addr, struct mbuf *m, uint32_t *seq)
234177633Sdfr{
235184588Sdfr	XDR xdrs;
236177633Sdfr	struct mbuf *mrep;
237184588Sdfr	bool_t stat = TRUE;
238177633Sdfr	int error;
239177633Sdfr
240177633Sdfr	MGETHDR(mrep, M_WAIT, MT_DATA);
241177633Sdfr	mrep->m_len = 0;
242177633Sdfr
243184588Sdfr	xdrmbuf_create(&xdrs, mrep, XDR_ENCODE);
244184588Sdfr
245184588Sdfr	if (msg->rm_reply.rp_stat == MSG_ACCEPTED &&
246184588Sdfr	    msg->rm_reply.rp_acpt.ar_stat == SUCCESS) {
247184588Sdfr		if (!xdr_replymsg(&xdrs, msg))
248184588Sdfr			stat = FALSE;
249184588Sdfr		else
250184588Sdfr			xdrmbuf_append(&xdrs, m);
251184588Sdfr	} else {
252184588Sdfr		stat = xdr_replymsg(&xdrs, msg);
253184588Sdfr	}
254184588Sdfr
255184588Sdfr	if (stat) {
256177633Sdfr		m_fixhdr(mrep);
257184588Sdfr		error = sosend(xprt->xp_socket, addr, NULL, mrep, NULL,
258177633Sdfr		    0, curthread);
259177633Sdfr		if (!error) {
260177633Sdfr			stat = TRUE;
261177633Sdfr		}
262177633Sdfr	} else {
263177633Sdfr		m_freem(mrep);
264177633Sdfr	}
265177633Sdfr
266184588Sdfr	XDR_DESTROY(&xdrs);
267177633Sdfr	xprt->xp_p2 = NULL;
268177633Sdfr
269177633Sdfr	return (stat);
270177633Sdfr}
271177633Sdfr
272177633Sdfrstatic void
273177633Sdfrsvc_dg_destroy(SVCXPRT *xprt)
274177633Sdfr{
275184588Sdfr
276177633Sdfr	SOCKBUF_LOCK(&xprt->xp_socket->so_rcv);
277193272Sjhb	soupcall_clear(xprt->xp_socket, SO_RCV);
278177633Sdfr	SOCKBUF_UNLOCK(&xprt->xp_socket->so_rcv);
279177633Sdfr
280184588Sdfr	sx_destroy(&xprt->xp_lock);
281177633Sdfr	if (xprt->xp_socket)
282177633Sdfr		(void)soclose(xprt->xp_socket);
283177633Sdfr
284184588Sdfr	if (xprt->xp_netid)
285184588Sdfr		(void) mem_free(xprt->xp_netid, strlen(xprt->xp_netid) + 1);
286184588Sdfr	svc_xprt_free(xprt);
287177633Sdfr}
288177633Sdfr
289177633Sdfrstatic bool_t
290177633Sdfr/*ARGSUSED*/
291177633Sdfrsvc_dg_control(xprt, rq, in)
292177633Sdfr	SVCXPRT *xprt;
293177633Sdfr	const u_int	rq;
294177633Sdfr	void		*in;
295177633Sdfr{
296177633Sdfr
297177633Sdfr	return (FALSE);
298177633Sdfr}
299177633Sdfr
300193272Sjhbstatic int
301177633Sdfrsvc_dg_soupcall(struct socket *so, void *arg, int waitflag)
302177633Sdfr{
303177633Sdfr	SVCXPRT *xprt = (SVCXPRT *) arg;
304177633Sdfr
305177633Sdfr	xprt_active(xprt);
306193272Sjhb	return (SU_OK);
307177633Sdfr}
308