svc_dg.c revision 193272
1177633Sdfr/*	$NetBSD: svc_dg.c,v 1.4 2000/07/06 03:10:35 christos Exp $	*/
2177633Sdfr
3177633Sdfr/*
4177633Sdfr * Sun RPC is a product of Sun Microsystems, Inc. and is provided for
5177633Sdfr * unrestricted use provided that this legend is included on all tape
6177633Sdfr * media and as a part of the software program in whole or part.  Users
7177633Sdfr * may copy or modify Sun RPC without charge, but are not authorized
8177633Sdfr * to license or distribute it to anyone else except as part of a product or
9177633Sdfr * program developed by the user.
10177633Sdfr *
11177633Sdfr * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
12177633Sdfr * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
13177633Sdfr * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
14177633Sdfr *
15177633Sdfr * Sun RPC is provided with no support and without any obligation on the
16177633Sdfr * part of Sun Microsystems, Inc. to assist in its use, correction,
17177633Sdfr * modification or enhancement.
18177633Sdfr *
19177633Sdfr * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
20177633Sdfr * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
21177633Sdfr * OR ANY PART THEREOF.
22177633Sdfr *
23177633Sdfr * In no event will Sun Microsystems, Inc. be liable for any lost revenue
24177633Sdfr * or profits or other special, indirect and consequential damages, even if
25177633Sdfr * Sun has been advised of the possibility of such damages.
26177633Sdfr *
27177633Sdfr * Sun Microsystems, Inc.
28177633Sdfr * 2550 Garcia Avenue
29177633Sdfr * Mountain View, California  94043
30177633Sdfr */
31177633Sdfr
32177633Sdfr/*
33177633Sdfr * Copyright (c) 1986-1991 by Sun Microsystems Inc.
34177633Sdfr */
35177633Sdfr
36177633Sdfr#if defined(LIBC_SCCS) && !defined(lint)
37177633Sdfr#ident	"@(#)svc_dg.c	1.17	94/04/24 SMI"
38177633Sdfr#endif
39177633Sdfr#include <sys/cdefs.h>
40177633Sdfr__FBSDID("$FreeBSD: head/sys/rpc/svc_dg.c 193272 2009-06-01 21:17:03Z jhb $");
41177633Sdfr
42177633Sdfr/*
43177633Sdfr * svc_dg.c, Server side for connectionless RPC.
44177633Sdfr */
45177633Sdfr
46177633Sdfr#include <sys/param.h>
47177633Sdfr#include <sys/lock.h>
48177633Sdfr#include <sys/kernel.h>
49177633Sdfr#include <sys/malloc.h>
50177633Sdfr#include <sys/mbuf.h>
51177633Sdfr#include <sys/mutex.h>
52177633Sdfr#include <sys/protosw.h>
53177633Sdfr#include <sys/queue.h>
54177633Sdfr#include <sys/socket.h>
55177633Sdfr#include <sys/socketvar.h>
56184588Sdfr#include <sys/sx.h>
57177633Sdfr#include <sys/systm.h>
58177633Sdfr#include <sys/uio.h>
59177633Sdfr
60177633Sdfr#include <rpc/rpc.h>
61177633Sdfr
62177685Sdfr#include <rpc/rpc_com.h>
63177633Sdfr
64177633Sdfrstatic enum xprt_stat svc_dg_stat(SVCXPRT *);
65184588Sdfrstatic bool_t svc_dg_recv(SVCXPRT *, struct rpc_msg *,
66184588Sdfr    struct sockaddr **, struct mbuf **);
67184588Sdfrstatic bool_t svc_dg_reply(SVCXPRT *, struct rpc_msg *,
68184588Sdfr    struct sockaddr *, struct mbuf *);
69177633Sdfrstatic void svc_dg_destroy(SVCXPRT *);
70177633Sdfrstatic bool_t svc_dg_control(SVCXPRT *, const u_int, void *);
71193272Sjhbstatic int svc_dg_soupcall(struct socket *so, void *arg, int waitflag);
72177633Sdfr
73177633Sdfrstatic struct xp_ops svc_dg_ops = {
74177633Sdfr	.xp_recv =	svc_dg_recv,
75177633Sdfr	.xp_stat =	svc_dg_stat,
76177633Sdfr	.xp_reply =	svc_dg_reply,
77177633Sdfr	.xp_destroy =	svc_dg_destroy,
78177633Sdfr	.xp_control =	svc_dg_control,
79177633Sdfr};
80177633Sdfr
81177633Sdfr/*
82177633Sdfr * Usage:
83177633Sdfr *	xprt = svc_dg_create(sock, sendsize, recvsize);
84177633Sdfr * Does other connectionless specific initializations.
85177633Sdfr * Once *xprt is initialized, it is registered.
86177633Sdfr * see (svc.h, xprt_register). If recvsize or sendsize are 0 suitable
87177633Sdfr * system defaults are chosen.
88177633Sdfr * The routines returns NULL if a problem occurred.
89177633Sdfr */
90177633Sdfrstatic const char svc_dg_str[] = "svc_dg_create: %s";
91177633Sdfrstatic const char svc_dg_err1[] = "could not get transport information";
92177633Sdfrstatic const char svc_dg_err2[] = "transport does not support data transfer";
93177633Sdfrstatic const char __no_mem_str[] = "out of memory";
94177633Sdfr
95177633SdfrSVCXPRT *
96177633Sdfrsvc_dg_create(SVCPOOL *pool, struct socket *so, size_t sendsize,
97177633Sdfr    size_t recvsize)
98177633Sdfr{
99177633Sdfr	SVCXPRT *xprt;
100177633Sdfr	struct __rpc_sockinfo si;
101177633Sdfr	struct sockaddr* sa;
102177633Sdfr	int error;
103177633Sdfr
104177633Sdfr	if (!__rpc_socket2sockinfo(so, &si)) {
105177633Sdfr		printf(svc_dg_str, svc_dg_err1);
106177633Sdfr		return (NULL);
107177633Sdfr	}
108177633Sdfr	/*
109177633Sdfr	 * Find the receive and the send size
110177633Sdfr	 */
111177633Sdfr	sendsize = __rpc_get_t_size(si.si_af, si.si_proto, (int)sendsize);
112177633Sdfr	recvsize = __rpc_get_t_size(si.si_af, si.si_proto, (int)recvsize);
113177633Sdfr	if ((sendsize == 0) || (recvsize == 0)) {
114177633Sdfr		printf(svc_dg_str, svc_dg_err2);
115177633Sdfr		return (NULL);
116177633Sdfr	}
117177633Sdfr
118184588Sdfr	xprt = svc_xprt_alloc();
119184588Sdfr	sx_init(&xprt->xp_lock, "xprt->xp_lock");
120177633Sdfr	xprt->xp_pool = pool;
121177633Sdfr	xprt->xp_socket = so;
122177633Sdfr	xprt->xp_p1 = NULL;
123177633Sdfr	xprt->xp_p2 = NULL;
124177633Sdfr	xprt->xp_ops = &svc_dg_ops;
125177633Sdfr
126177633Sdfr	error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa);
127177633Sdfr	if (error)
128177633Sdfr		goto freedata;
129177633Sdfr
130184588Sdfr	memcpy(&xprt->xp_ltaddr, sa, sa->sa_len);
131177633Sdfr	free(sa, M_SONAME);
132177633Sdfr
133177633Sdfr	xprt_register(xprt);
134177633Sdfr
135177633Sdfr	SOCKBUF_LOCK(&so->so_rcv);
136193272Sjhb	soupcall_set(so, SO_RCV, svc_dg_soupcall, xprt);
137177633Sdfr	SOCKBUF_UNLOCK(&so->so_rcv);
138177633Sdfr
139177633Sdfr	return (xprt);
140177633Sdfrfreedata:
141177633Sdfr	(void) printf(svc_dg_str, __no_mem_str);
142177633Sdfr	if (xprt) {
143184588Sdfr		svc_xprt_free(xprt);
144177633Sdfr	}
145177633Sdfr	return (NULL);
146177633Sdfr}
147177633Sdfr
148177633Sdfr/*ARGSUSED*/
149177633Sdfrstatic enum xprt_stat
150177633Sdfrsvc_dg_stat(SVCXPRT *xprt)
151177633Sdfr{
152177633Sdfr
153184588Sdfr	if (soreadable(xprt->xp_socket))
154184588Sdfr		return (XPRT_MOREREQS);
155184588Sdfr
156177633Sdfr	return (XPRT_IDLE);
157177633Sdfr}
158177633Sdfr
159177633Sdfrstatic bool_t
160184588Sdfrsvc_dg_recv(SVCXPRT *xprt, struct rpc_msg *msg,
161184588Sdfr    struct sockaddr **addrp, struct mbuf **mp)
162177633Sdfr{
163177633Sdfr	struct uio uio;
164177633Sdfr	struct sockaddr *raddr;
165177633Sdfr	struct mbuf *mreq;
166184588Sdfr	XDR xdrs;
167177633Sdfr	int error, rcvflag;
168177633Sdfr
169177633Sdfr	/*
170184588Sdfr	 * Serialise access to the socket.
171184588Sdfr	 */
172184588Sdfr	sx_xlock(&xprt->xp_lock);
173184588Sdfr
174184588Sdfr	/*
175177633Sdfr	 * The socket upcall calls xprt_active() which will eventually
176177633Sdfr	 * cause the server to call us here. We attempt to read a
177177633Sdfr	 * packet from the socket and process it. If the read fails,
178177633Sdfr	 * we have drained all pending requests so we call
179177633Sdfr	 * xprt_inactive().
180177633Sdfr	 */
181177633Sdfr	uio.uio_resid = 1000000000;
182177633Sdfr	uio.uio_td = curthread;
183177633Sdfr	mreq = NULL;
184177633Sdfr	rcvflag = MSG_DONTWAIT;
185177633Sdfr	error = soreceive(xprt->xp_socket, &raddr, &uio, &mreq, NULL, &rcvflag);
186177633Sdfr
187177633Sdfr	if (error == EWOULDBLOCK) {
188184588Sdfr		/*
189184588Sdfr		 * We must re-test for readability after taking the
190184588Sdfr		 * lock to protect us in the case where a new packet
191184588Sdfr		 * arrives on the socket after our call to soreceive
192184588Sdfr		 * fails with EWOULDBLOCK. The pool lock protects us
193184588Sdfr		 * from racing the upcall after our soreadable() call
194184588Sdfr		 * returns false.
195184588Sdfr		 */
196184588Sdfr		mtx_lock(&xprt->xp_pool->sp_lock);
197184588Sdfr		if (!soreadable(xprt->xp_socket))
198184588Sdfr			xprt_inactive_locked(xprt);
199184588Sdfr		mtx_unlock(&xprt->xp_pool->sp_lock);
200184588Sdfr		sx_xunlock(&xprt->xp_lock);
201177633Sdfr		return (FALSE);
202177633Sdfr	}
203177633Sdfr
204177633Sdfr	if (error) {
205177633Sdfr		SOCKBUF_LOCK(&xprt->xp_socket->so_rcv);
206193272Sjhb		soupcall_clear(xprt->xp_socket, SO_RCV);
207177633Sdfr		SOCKBUF_UNLOCK(&xprt->xp_socket->so_rcv);
208177633Sdfr		xprt_inactive(xprt);
209184588Sdfr		sx_xunlock(&xprt->xp_lock);
210177633Sdfr		return (FALSE);
211177633Sdfr	}
212177633Sdfr
213184588Sdfr	sx_xunlock(&xprt->xp_lock);
214177633Sdfr
215184588Sdfr	xdrmbuf_create(&xdrs, mreq, XDR_DECODE);
216184588Sdfr	if (! xdr_callmsg(&xdrs, msg)) {
217184588Sdfr		XDR_DESTROY(&xdrs);
218177633Sdfr		return (FALSE);
219177633Sdfr	}
220177633Sdfr
221184588Sdfr	*addrp = raddr;
222184588Sdfr	*mp = xdrmbuf_getall(&xdrs);
223184588Sdfr	XDR_DESTROY(&xdrs);
224184588Sdfr
225177633Sdfr	return (TRUE);
226177633Sdfr}
227177633Sdfr
228177633Sdfrstatic bool_t
229184588Sdfrsvc_dg_reply(SVCXPRT *xprt, struct rpc_msg *msg,
230184588Sdfr    struct sockaddr *addr, struct mbuf *m)
231177633Sdfr{
232184588Sdfr	XDR xdrs;
233177633Sdfr	struct mbuf *mrep;
234184588Sdfr	bool_t stat = TRUE;
235177633Sdfr	int error;
236177633Sdfr
237177633Sdfr	MGETHDR(mrep, M_WAIT, MT_DATA);
238177633Sdfr	mrep->m_len = 0;
239177633Sdfr
240184588Sdfr	xdrmbuf_create(&xdrs, mrep, XDR_ENCODE);
241184588Sdfr
242184588Sdfr	if (msg->rm_reply.rp_stat == MSG_ACCEPTED &&
243184588Sdfr	    msg->rm_reply.rp_acpt.ar_stat == SUCCESS) {
244184588Sdfr		if (!xdr_replymsg(&xdrs, msg))
245184588Sdfr			stat = FALSE;
246184588Sdfr		else
247184588Sdfr			xdrmbuf_append(&xdrs, m);
248184588Sdfr	} else {
249184588Sdfr		stat = xdr_replymsg(&xdrs, msg);
250184588Sdfr	}
251184588Sdfr
252184588Sdfr	if (stat) {
253177633Sdfr		m_fixhdr(mrep);
254184588Sdfr		error = sosend(xprt->xp_socket, addr, NULL, mrep, NULL,
255177633Sdfr		    0, curthread);
256177633Sdfr		if (!error) {
257177633Sdfr			stat = TRUE;
258177633Sdfr		}
259177633Sdfr	} else {
260177633Sdfr		m_freem(mrep);
261177633Sdfr	}
262177633Sdfr
263184588Sdfr	XDR_DESTROY(&xdrs);
264177633Sdfr	xprt->xp_p2 = NULL;
265177633Sdfr
266177633Sdfr	return (stat);
267177633Sdfr}
268177633Sdfr
269177633Sdfrstatic void
270177633Sdfrsvc_dg_destroy(SVCXPRT *xprt)
271177633Sdfr{
272184588Sdfr
273177633Sdfr	SOCKBUF_LOCK(&xprt->xp_socket->so_rcv);
274193272Sjhb	soupcall_clear(xprt->xp_socket, SO_RCV);
275177633Sdfr	SOCKBUF_UNLOCK(&xprt->xp_socket->so_rcv);
276177633Sdfr
277184588Sdfr	sx_destroy(&xprt->xp_lock);
278177633Sdfr	if (xprt->xp_socket)
279177633Sdfr		(void)soclose(xprt->xp_socket);
280177633Sdfr
281184588Sdfr	if (xprt->xp_netid)
282184588Sdfr		(void) mem_free(xprt->xp_netid, strlen(xprt->xp_netid) + 1);
283184588Sdfr	svc_xprt_free(xprt);
284177633Sdfr}
285177633Sdfr
286177633Sdfrstatic bool_t
287177633Sdfr/*ARGSUSED*/
288177633Sdfrsvc_dg_control(xprt, rq, in)
289177633Sdfr	SVCXPRT *xprt;
290177633Sdfr	const u_int	rq;
291177633Sdfr	void		*in;
292177633Sdfr{
293177633Sdfr
294177633Sdfr	return (FALSE);
295177633Sdfr}
296177633Sdfr
297193272Sjhbstatic int
298177633Sdfrsvc_dg_soupcall(struct socket *so, void *arg, int waitflag)
299177633Sdfr{
300177633Sdfr	SVCXPRT *xprt = (SVCXPRT *) arg;
301177633Sdfr
302177633Sdfr	xprt_active(xprt);
303193272Sjhb	return (SU_OK);
304177633Sdfr}
305