svc_dg.c revision 193272
1177633Sdfr/* $NetBSD: svc_dg.c,v 1.4 2000/07/06 03:10:35 christos Exp $ */ 2177633Sdfr 3177633Sdfr/* 4177633Sdfr * Sun RPC is a product of Sun Microsystems, Inc. and is provided for 5177633Sdfr * unrestricted use provided that this legend is included on all tape 6177633Sdfr * media and as a part of the software program in whole or part. Users 7177633Sdfr * may copy or modify Sun RPC without charge, but are not authorized 8177633Sdfr * to license or distribute it to anyone else except as part of a product or 9177633Sdfr * program developed by the user. 10177633Sdfr * 11177633Sdfr * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE 12177633Sdfr * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR 13177633Sdfr * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE. 14177633Sdfr * 15177633Sdfr * Sun RPC is provided with no support and without any obligation on the 16177633Sdfr * part of Sun Microsystems, Inc. to assist in its use, correction, 17177633Sdfr * modification or enhancement. 18177633Sdfr * 19177633Sdfr * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE 20177633Sdfr * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC 21177633Sdfr * OR ANY PART THEREOF. 22177633Sdfr * 23177633Sdfr * In no event will Sun Microsystems, Inc. be liable for any lost revenue 24177633Sdfr * or profits or other special, indirect and consequential damages, even if 25177633Sdfr * Sun has been advised of the possibility of such damages. 26177633Sdfr * 27177633Sdfr * Sun Microsystems, Inc. 28177633Sdfr * 2550 Garcia Avenue 29177633Sdfr * Mountain View, California 94043 30177633Sdfr */ 31177633Sdfr 32177633Sdfr/* 33177633Sdfr * Copyright (c) 1986-1991 by Sun Microsystems Inc. 34177633Sdfr */ 35177633Sdfr 36177633Sdfr#if defined(LIBC_SCCS) && !defined(lint) 37177633Sdfr#ident "@(#)svc_dg.c 1.17 94/04/24 SMI" 38177633Sdfr#endif 39177633Sdfr#include <sys/cdefs.h> 40177633Sdfr__FBSDID("$FreeBSD: head/sys/rpc/svc_dg.c 193272 2009-06-01 21:17:03Z jhb $"); 41177633Sdfr 42177633Sdfr/* 43177633Sdfr * svc_dg.c, Server side for connectionless RPC. 44177633Sdfr */ 45177633Sdfr 46177633Sdfr#include <sys/param.h> 47177633Sdfr#include <sys/lock.h> 48177633Sdfr#include <sys/kernel.h> 49177633Sdfr#include <sys/malloc.h> 50177633Sdfr#include <sys/mbuf.h> 51177633Sdfr#include <sys/mutex.h> 52177633Sdfr#include <sys/protosw.h> 53177633Sdfr#include <sys/queue.h> 54177633Sdfr#include <sys/socket.h> 55177633Sdfr#include <sys/socketvar.h> 56184588Sdfr#include <sys/sx.h> 57177633Sdfr#include <sys/systm.h> 58177633Sdfr#include <sys/uio.h> 59177633Sdfr 60177633Sdfr#include <rpc/rpc.h> 61177633Sdfr 62177685Sdfr#include <rpc/rpc_com.h> 63177633Sdfr 64177633Sdfrstatic enum xprt_stat svc_dg_stat(SVCXPRT *); 65184588Sdfrstatic bool_t svc_dg_recv(SVCXPRT *, struct rpc_msg *, 66184588Sdfr struct sockaddr **, struct mbuf **); 67184588Sdfrstatic bool_t svc_dg_reply(SVCXPRT *, struct rpc_msg *, 68184588Sdfr struct sockaddr *, struct mbuf *); 69177633Sdfrstatic void svc_dg_destroy(SVCXPRT *); 70177633Sdfrstatic bool_t svc_dg_control(SVCXPRT *, const u_int, void *); 71193272Sjhbstatic int svc_dg_soupcall(struct socket *so, void *arg, int waitflag); 72177633Sdfr 73177633Sdfrstatic struct xp_ops svc_dg_ops = { 74177633Sdfr .xp_recv = svc_dg_recv, 75177633Sdfr .xp_stat = svc_dg_stat, 76177633Sdfr .xp_reply = svc_dg_reply, 77177633Sdfr .xp_destroy = svc_dg_destroy, 78177633Sdfr .xp_control = svc_dg_control, 79177633Sdfr}; 80177633Sdfr 81177633Sdfr/* 82177633Sdfr * Usage: 83177633Sdfr * xprt = svc_dg_create(sock, sendsize, recvsize); 84177633Sdfr * Does other connectionless specific initializations. 85177633Sdfr * Once *xprt is initialized, it is registered. 86177633Sdfr * see (svc.h, xprt_register). If recvsize or sendsize are 0 suitable 87177633Sdfr * system defaults are chosen. 88177633Sdfr * The routines returns NULL if a problem occurred. 89177633Sdfr */ 90177633Sdfrstatic const char svc_dg_str[] = "svc_dg_create: %s"; 91177633Sdfrstatic const char svc_dg_err1[] = "could not get transport information"; 92177633Sdfrstatic const char svc_dg_err2[] = "transport does not support data transfer"; 93177633Sdfrstatic const char __no_mem_str[] = "out of memory"; 94177633Sdfr 95177633SdfrSVCXPRT * 96177633Sdfrsvc_dg_create(SVCPOOL *pool, struct socket *so, size_t sendsize, 97177633Sdfr size_t recvsize) 98177633Sdfr{ 99177633Sdfr SVCXPRT *xprt; 100177633Sdfr struct __rpc_sockinfo si; 101177633Sdfr struct sockaddr* sa; 102177633Sdfr int error; 103177633Sdfr 104177633Sdfr if (!__rpc_socket2sockinfo(so, &si)) { 105177633Sdfr printf(svc_dg_str, svc_dg_err1); 106177633Sdfr return (NULL); 107177633Sdfr } 108177633Sdfr /* 109177633Sdfr * Find the receive and the send size 110177633Sdfr */ 111177633Sdfr sendsize = __rpc_get_t_size(si.si_af, si.si_proto, (int)sendsize); 112177633Sdfr recvsize = __rpc_get_t_size(si.si_af, si.si_proto, (int)recvsize); 113177633Sdfr if ((sendsize == 0) || (recvsize == 0)) { 114177633Sdfr printf(svc_dg_str, svc_dg_err2); 115177633Sdfr return (NULL); 116177633Sdfr } 117177633Sdfr 118184588Sdfr xprt = svc_xprt_alloc(); 119184588Sdfr sx_init(&xprt->xp_lock, "xprt->xp_lock"); 120177633Sdfr xprt->xp_pool = pool; 121177633Sdfr xprt->xp_socket = so; 122177633Sdfr xprt->xp_p1 = NULL; 123177633Sdfr xprt->xp_p2 = NULL; 124177633Sdfr xprt->xp_ops = &svc_dg_ops; 125177633Sdfr 126177633Sdfr error = so->so_proto->pr_usrreqs->pru_sockaddr(so, &sa); 127177633Sdfr if (error) 128177633Sdfr goto freedata; 129177633Sdfr 130184588Sdfr memcpy(&xprt->xp_ltaddr, sa, sa->sa_len); 131177633Sdfr free(sa, M_SONAME); 132177633Sdfr 133177633Sdfr xprt_register(xprt); 134177633Sdfr 135177633Sdfr SOCKBUF_LOCK(&so->so_rcv); 136193272Sjhb soupcall_set(so, SO_RCV, svc_dg_soupcall, xprt); 137177633Sdfr SOCKBUF_UNLOCK(&so->so_rcv); 138177633Sdfr 139177633Sdfr return (xprt); 140177633Sdfrfreedata: 141177633Sdfr (void) printf(svc_dg_str, __no_mem_str); 142177633Sdfr if (xprt) { 143184588Sdfr svc_xprt_free(xprt); 144177633Sdfr } 145177633Sdfr return (NULL); 146177633Sdfr} 147177633Sdfr 148177633Sdfr/*ARGSUSED*/ 149177633Sdfrstatic enum xprt_stat 150177633Sdfrsvc_dg_stat(SVCXPRT *xprt) 151177633Sdfr{ 152177633Sdfr 153184588Sdfr if (soreadable(xprt->xp_socket)) 154184588Sdfr return (XPRT_MOREREQS); 155184588Sdfr 156177633Sdfr return (XPRT_IDLE); 157177633Sdfr} 158177633Sdfr 159177633Sdfrstatic bool_t 160184588Sdfrsvc_dg_recv(SVCXPRT *xprt, struct rpc_msg *msg, 161184588Sdfr struct sockaddr **addrp, struct mbuf **mp) 162177633Sdfr{ 163177633Sdfr struct uio uio; 164177633Sdfr struct sockaddr *raddr; 165177633Sdfr struct mbuf *mreq; 166184588Sdfr XDR xdrs; 167177633Sdfr int error, rcvflag; 168177633Sdfr 169177633Sdfr /* 170184588Sdfr * Serialise access to the socket. 171184588Sdfr */ 172184588Sdfr sx_xlock(&xprt->xp_lock); 173184588Sdfr 174184588Sdfr /* 175177633Sdfr * The socket upcall calls xprt_active() which will eventually 176177633Sdfr * cause the server to call us here. We attempt to read a 177177633Sdfr * packet from the socket and process it. If the read fails, 178177633Sdfr * we have drained all pending requests so we call 179177633Sdfr * xprt_inactive(). 180177633Sdfr */ 181177633Sdfr uio.uio_resid = 1000000000; 182177633Sdfr uio.uio_td = curthread; 183177633Sdfr mreq = NULL; 184177633Sdfr rcvflag = MSG_DONTWAIT; 185177633Sdfr error = soreceive(xprt->xp_socket, &raddr, &uio, &mreq, NULL, &rcvflag); 186177633Sdfr 187177633Sdfr if (error == EWOULDBLOCK) { 188184588Sdfr /* 189184588Sdfr * We must re-test for readability after taking the 190184588Sdfr * lock to protect us in the case where a new packet 191184588Sdfr * arrives on the socket after our call to soreceive 192184588Sdfr * fails with EWOULDBLOCK. The pool lock protects us 193184588Sdfr * from racing the upcall after our soreadable() call 194184588Sdfr * returns false. 195184588Sdfr */ 196184588Sdfr mtx_lock(&xprt->xp_pool->sp_lock); 197184588Sdfr if (!soreadable(xprt->xp_socket)) 198184588Sdfr xprt_inactive_locked(xprt); 199184588Sdfr mtx_unlock(&xprt->xp_pool->sp_lock); 200184588Sdfr sx_xunlock(&xprt->xp_lock); 201177633Sdfr return (FALSE); 202177633Sdfr } 203177633Sdfr 204177633Sdfr if (error) { 205177633Sdfr SOCKBUF_LOCK(&xprt->xp_socket->so_rcv); 206193272Sjhb soupcall_clear(xprt->xp_socket, SO_RCV); 207177633Sdfr SOCKBUF_UNLOCK(&xprt->xp_socket->so_rcv); 208177633Sdfr xprt_inactive(xprt); 209184588Sdfr sx_xunlock(&xprt->xp_lock); 210177633Sdfr return (FALSE); 211177633Sdfr } 212177633Sdfr 213184588Sdfr sx_xunlock(&xprt->xp_lock); 214177633Sdfr 215184588Sdfr xdrmbuf_create(&xdrs, mreq, XDR_DECODE); 216184588Sdfr if (! xdr_callmsg(&xdrs, msg)) { 217184588Sdfr XDR_DESTROY(&xdrs); 218177633Sdfr return (FALSE); 219177633Sdfr } 220177633Sdfr 221184588Sdfr *addrp = raddr; 222184588Sdfr *mp = xdrmbuf_getall(&xdrs); 223184588Sdfr XDR_DESTROY(&xdrs); 224184588Sdfr 225177633Sdfr return (TRUE); 226177633Sdfr} 227177633Sdfr 228177633Sdfrstatic bool_t 229184588Sdfrsvc_dg_reply(SVCXPRT *xprt, struct rpc_msg *msg, 230184588Sdfr struct sockaddr *addr, struct mbuf *m) 231177633Sdfr{ 232184588Sdfr XDR xdrs; 233177633Sdfr struct mbuf *mrep; 234184588Sdfr bool_t stat = TRUE; 235177633Sdfr int error; 236177633Sdfr 237177633Sdfr MGETHDR(mrep, M_WAIT, MT_DATA); 238177633Sdfr mrep->m_len = 0; 239177633Sdfr 240184588Sdfr xdrmbuf_create(&xdrs, mrep, XDR_ENCODE); 241184588Sdfr 242184588Sdfr if (msg->rm_reply.rp_stat == MSG_ACCEPTED && 243184588Sdfr msg->rm_reply.rp_acpt.ar_stat == SUCCESS) { 244184588Sdfr if (!xdr_replymsg(&xdrs, msg)) 245184588Sdfr stat = FALSE; 246184588Sdfr else 247184588Sdfr xdrmbuf_append(&xdrs, m); 248184588Sdfr } else { 249184588Sdfr stat = xdr_replymsg(&xdrs, msg); 250184588Sdfr } 251184588Sdfr 252184588Sdfr if (stat) { 253177633Sdfr m_fixhdr(mrep); 254184588Sdfr error = sosend(xprt->xp_socket, addr, NULL, mrep, NULL, 255177633Sdfr 0, curthread); 256177633Sdfr if (!error) { 257177633Sdfr stat = TRUE; 258177633Sdfr } 259177633Sdfr } else { 260177633Sdfr m_freem(mrep); 261177633Sdfr } 262177633Sdfr 263184588Sdfr XDR_DESTROY(&xdrs); 264177633Sdfr xprt->xp_p2 = NULL; 265177633Sdfr 266177633Sdfr return (stat); 267177633Sdfr} 268177633Sdfr 269177633Sdfrstatic void 270177633Sdfrsvc_dg_destroy(SVCXPRT *xprt) 271177633Sdfr{ 272184588Sdfr 273177633Sdfr SOCKBUF_LOCK(&xprt->xp_socket->so_rcv); 274193272Sjhb soupcall_clear(xprt->xp_socket, SO_RCV); 275177633Sdfr SOCKBUF_UNLOCK(&xprt->xp_socket->so_rcv); 276177633Sdfr 277184588Sdfr sx_destroy(&xprt->xp_lock); 278177633Sdfr if (xprt->xp_socket) 279177633Sdfr (void)soclose(xprt->xp_socket); 280177633Sdfr 281184588Sdfr if (xprt->xp_netid) 282184588Sdfr (void) mem_free(xprt->xp_netid, strlen(xprt->xp_netid) + 1); 283184588Sdfr svc_xprt_free(xprt); 284177633Sdfr} 285177633Sdfr 286177633Sdfrstatic bool_t 287177633Sdfr/*ARGSUSED*/ 288177633Sdfrsvc_dg_control(xprt, rq, in) 289177633Sdfr SVCXPRT *xprt; 290177633Sdfr const u_int rq; 291177633Sdfr void *in; 292177633Sdfr{ 293177633Sdfr 294177633Sdfr return (FALSE); 295177633Sdfr} 296177633Sdfr 297193272Sjhbstatic int 298177633Sdfrsvc_dg_soupcall(struct socket *so, void *arg, int waitflag) 299177633Sdfr{ 300177633Sdfr SVCXPRT *xprt = (SVCXPRT *) arg; 301177633Sdfr 302177633Sdfr xprt_active(xprt); 303193272Sjhb return (SU_OK); 304177633Sdfr} 305