1 /*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License, Version 1.0 only
6 * (the "License"). You may not use this file except in compliance
7 * with the License.
8 *
9 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10 * or http://www.opensolaris.org/os/licensing.
11 * See the License for the specific language governing permissions
12 * and limitations under the License.
13 *
14 * When distributing Covered Code, include this CDDL HEADER in each
15 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16 * If applicable, add the following below this CDDL HEADER, with the
17 * fields enclosed by brackets "[]" replaced with your own identifying
18 * information: Portions Copyright [yyyy] [name of copyright owner]
19 *
20 * CDDL HEADER END
21 */
22
23 /*
24 * Copyright 2014 Garrett D'Amore
25 */
26 /*
27 * Copyright 2005 Sun Microsystems, Inc. All rights reserved.
28 * Use is subject to license terms.
29 */
30
31 /* Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T */
32 /* All Rights Reserved */
33
34 /*
35 * Network Listener Process
36 *
37 * command line:
38 *
39 * listen [ -m minor_prefix ] netspec
40 *
41 */
42
43 /* system include files */
44
45 #include <fcntl.h>
46 #include <signal.h>
47 #include <stdio.h>
48 #include <unistd.h>
49 #include <string.h>
50 #include <errno.h>
51 #include <memory.h>
52 #include <sys/utsname.h>
53 #include <sys/tiuser.h>
54 #include <sys/param.h>
55 #include <sys/types.h>
56 #include <sys/stat.h>
57 #include <sys/mkdev.h>
58 #include <values.h>
59 #include <ctype.h>
60 #include <pwd.h>
61 #include <grp.h>
62 #include <sys/ipc.h>
63 #include <sys/poll.h>
64 #include <sys/stropts.h>
65 #include <sac.h>
66 #include <utmpx.h>
67
68 /* listener include files */
69
70 #include "lsparam.h" /* listener parameters */
71 #include "lsfiles.h" /* listener files info */
72 #include "lserror.h" /* listener error codes */
73 #include "lsnlsmsg.h" /* NLPS listener protocol */
74 #include "lssmbmsg.h" /* MS_NET identifier */
75 #include "lsdbf.h" /* data base file stuff */
76 #include "listen.h"
77
78 /* defines */
79
80 #define NAMESIZE (NAMEBUFSZ-1)
81
82 #define SPLhi() Splflag = 1
83 #define SPLlo() Splflag = 0
84
85 #define GEN 1
86 #define LOGIN 0
87
88 /* global variables */
89
90 int NLPS_proc = 0; /* set if process is a listener child */
91 pid_t Pid; /* listener's process ID */
92 char *Progname; /* listener's basename (from argv[0]) */
93 static char Provbuf[PATHSIZE];
94 char *Provider = Provbuf; /* name of transport provider */
95 char *Netspec = NETSPEC;
96 char *Minor_prefix; /* prefix for minor device names */
97 int Dbf_entries; /* number of private addresses in dbf file*/
98 int Valid_addrs; /* number of addresses bound */
99 struct pollfd *Pollfds; /* for polling fds */
100 dbf_t *Dbfhead; /* Beginning of in-memory database */
101 dbf_t *Newdbf; /* Beginning of in-memory database (reread) */
102 char *Server_cmd_lines; /* database space */
103 char *New_cmd_lines; /* database space (reread) */
104 long Ndesc; /* Number of per-process file descriptors */
105 int Readdb; /* set to TRUE by SAC_READDB message */
106 struct netconfig *Netconf; /* netconfig structure for this network */
107
108 struct call_list Free_call;
109 struct call_list *Free_call_p = &Free_call; /* call free list */
110 struct call_list *Priv_call; /* call save pending list */
111
112 /* FILE DESCRIPTOR MANAGEMENT:
113 *
114 * The listener uses 6 (sometimes 7) file descriptors:
115 * fd 0: Originally opened to /dev/null, used to accept incoming calls.
116 * fd 1: In the parent, a connection to _sacpipe. Closed in the child
117 * and dup'ed to 0.
118 * fd 2: In the parent, a connection to _pmpipe. Dup'ed in the child
119 * to 0.
120 * fd 3: Originally opened to /dev/null, this file descriptor is
121 * reserved to open the STREAMS pipe when passing the connection
122 * to a standing server.
123 * fd 4: Opened to the pid file. We have to keep it open to keep the
124 * lock active.
125 * fd 5: Opened to the log file.
126 * fd 6: Opened to the debug file ONLY when compiled with DEBUGMODE.
127 *
128 * The remaining file descriptors are available for binding private addresses.
129 */
130
131 #ifndef DEBUGMODE
132 #define USEDFDS 6
133 #else
134 #define USEDFDS 7
135 FILE *Debugfp; /* for the debugging file */
136 #endif
137
138 int Acceptfd; /* to accept connections (fd 0) */
139 int Sacpipefd; /* pipe TO sac process (fd 1) */
140 int Pmpipefd; /* pipe FROM sac process (fd 2) */
141 int Passfd; /* pipe used to pass FD (fd 3) */
142 int Pidfd; /* locked pid file (fd 4) */
143 FILE *Logfp; /* for logging listener activity*/
144
145 struct pmmsg Pmmsg; /* to respond to SAC */
146 int State = PM_STARTING; /* current SAC state */
147 char Mytag[15];
148
149 char Lastmsg[BUFSIZ]; /* contains last msg logged (by stampbuf) */
150 int Logmax = LOGMAX; /* number of entriet to allow in logfile */
151
152 int Splflag; /* logfile critical region flag */
153
154 static char *badnspmsg = "Bad netspec on command line ( Pathname too long )";
155 static char *badstart = "Listener failed to start properly";
156 static char *nologfile = "Unable to open listener log file during initialization";
157 static char *usage = "Usage: listen [ -m minor_prefix ] network_device";
158 static char *nopmtag = "Fatal error: Unable to get PMTAG from environment";
159 static char tzenv[BUFSIZ];
160
161 #define TZFILE "/etc/default/init"
162 #define TZSTR "TZ="
163
164 void check_sac_mesg(); /* routine to process messages from sac */
165 void rpc_register(); /* routine to register rpc services */
166 void rpc_unregister(); /* routine to unregister rpc services */
167 extern struct netconfig *getnetconfigent();
168 extern char *t_alloc();
169 extern void logexit();
170 extern int t_errno;
171 extern int errno;
172
173 #ifndef TRUE
174 #define TRUE 1
175 #define FALSE 0
176 #endif
177
178 static void mod_prvaddr(void);
179 static void pitchcall(struct call_list *pending, struct t_discon *discon);
180 static void clr_call(struct t_call *call);
181 static void trycon(struct call_list *phead, int fd);
182 static void send_dis(struct call_list *phead, int fd);
183 static void doevent(struct call_list *phead, int fd);
184 static void listen(void);
185 static void rst_signals(void);
186 static void catch_signals(void);
187 static void net_open(void);
188 static void init_files(void);
189 static void pid_open(void);
190
191 int
main(int argc,char ** argv)192 main(int argc, char **argv)
193 {
194 struct stat buf;
195 int ret;
196 char scratch[BUFSIZ];
197 char log[BUFSIZ];
198 char olog[BUFSIZ];
199 char *scratch_p = scratch;
200 char *mytag_p;
201 FILE *fp;
202 extern char *getenv();
203 char *parse();
204 int c;
205 extern char *optarg;
206 extern int optind;
207 int i;
208 char *Mytag_p = Mytag;
209
210 /* Get my port monitor tag out of the environment */
211 if ((mytag_p = getenv("PMTAG")) == NULL) {
212 /* no place to write */
213 exit(1);
214 }
215 strcpy(Mytag, mytag_p);
216
217 /* open log file */
218 sprintf(log, "%s/%s/%s", ALTDIR, Mytag_p, LOGNAME);
219 sprintf(olog, "%s/%s/%s", ALTDIR, Mytag_p, OLOGNAME);
220 if (stat(log, &buf) == 0) {
221 /* file exists, try and save it but if we can't don't worry */
222 unlink(olog);
223 rename(log, olog);
224 }
225 if ((i = open(log, O_WRONLY|O_CREAT|O_APPEND, 0444)) < 0)
226 logexit(1, nologfile);
227 /* as stated above, the log file should be file descriptor 5 */
228 if ((ret = fcntl(i, F_DUPFD, 5)) != 5)
229 logexit(1, nologfile);
230 Logfp = fdopen(ret, "a+");
231
232 /* Get my port monitor tag out of the environment */
233 if ((mytag_p = getenv("PMTAG")) == NULL) {
234 logexit(1, nopmtag);
235 }
236 strcpy(Mytag, mytag_p);
237
238 (void) umask(022);
239 Readdb = FALSE;
240
241 if (geteuid() != (uid_t) 0) {
242 logmessage("Must be root to start listener");
243 logexit(1, badstart);
244 }
245
246 while ((c = getopt(argc, argv, "m:")) != EOF)
247 switch (c) {
248 case 'm':
249 Minor_prefix = optarg;
250 break;
251 default:
252 logexit(1, usage);
253 break;
254 }
255
256 if ((Netspec = argv[optind]) == NULL) {
257 logexit(1, usage);
258 }
259 if ((Netconf = getnetconfigent(Netspec)) == NULL) {
260 sprintf(scratch, "no netconfig entry for <%s>", Netspec);
261 logmessage(scratch);
262 logexit(1, badstart);
263 }
264 if (!Minor_prefix)
265 Minor_prefix = argv[optind];
266
267 if ((int) strlen(Netspec) > PATHSIZE) {
268 logmessage(badnspmsg);
269 logexit(1, badstart);
270 }
271
272 /*
273 * SAC will start the listener in the correct directory, so we
274 * don't need to chdir there, as we did in older versions
275 */
276
277 strcpy(Provbuf, "/dev/");
278 strcat(Provbuf, Netspec);
279
280 (void) umask(0);
281
282 init_files(); /* open Accept, Sac, Pm, Pass files */
283 pid_open(); /* create pid file */
284
285 #ifdef DEBUGMODE
286 sprintf(scratch, "%s/%s/%s", ALTDIR, Mytag, DBGNAME);
287 Debugfp = fopen(scratch, "w");
288 #endif
289
290
291 #ifdef DEBUGMODE
292 if ((!Logfp) || (!Debugfp))
293 #else
294 if (!Logfp)
295 #endif
296 logexit(1, badstart);
297
298 /*
299 * In case we started with no environment, find out what timezone we're
300 * in. This will get passed to children, so only need to do once.
301 */
302
303 if (getenv("TZ") == NULL) {
304 fp = fopen(TZFILE, "r");
305 if (fp) {
306 while (fgets(tzenv, BUFSIZ, fp)) {
307 if (tzenv[strlen(tzenv) - 1] == '\n')
308 tzenv[strlen(tzenv) - 1] = '\0';
309 if (!strncmp(TZSTR, tzenv, strlen(TZSTR))) {
310 putenv(parse(tzenv));
311 break;
312 }
313 }
314 fclose(fp);
315 }
316 else {
317 sprintf(scratch, "couldn't open %s, default to GMT",
318 TZFILE);
319 logmessage(scratch);
320 }
321 }
322
323 logmessage("@(#)listen:listen.c 1.19.9.1");
324
325 #ifdef DEBUGMODE
326 logmessage("Listener process with DEBUG capability");
327 #endif
328
329 sprintf(scratch, "Listener port monitor tag: %s", Mytag_p);
330 logmessage(scratch);
331 DEBUG((9, "Minor prefix: %s Netspec %s", Minor_prefix, Netspec));
332
333 /* fill in Pmmesg fields that always stay the same */
334
335 Pmmsg.pm_maxclass = MAXCLASS;
336 strcpy(Pmmsg.pm_tag, Mytag_p);
337 Pmmsg.pm_size = 0;
338
339 /* Find out what state to start in. If not in env, exit */
340 if ((scratch_p = getenv("ISTATE")) == NULL)
341 logexit(1, "ERROR: ISTATE variable not set in environment");
342
343 if (!strcmp(scratch_p, "enabled")) {
344 State = PM_ENABLED;
345 logmessage("Starting state: ENABLED");
346 }
347 else {
348 State = PM_DISABLED;
349 logmessage("Starting state: DISABLED");
350 }
351
352 /* try to get my "basename" */
353 Progname = strrchr(argv[0], '/');
354 if (Progname && Progname[1])
355 ++Progname;
356 else
357 Progname = argv[0];
358
359 catch_signals();
360
361 /*
362 * Allocate memory for private address and file descriptor table
363 * Here we are assuming that no matter how many private addresses
364 * exist in the system if the system limit is 20 then we will only
365 * get 20 file descriptors
366 */
367
368 Ndesc = ulimit(4,0L); /* get num of file des on system */
369
370 read_dbf(DB_INIT);
371 net_open(); /* init, open, bind names */
372
373 for (i = 3; i < Ndesc; i++) { /* leave stdout, stderr open */
374 fcntl(i, F_SETFD, 1); /* set close on exec flag*/
375 }
376
377 logmessage("Initialization Complete");
378
379 listen();
380 return (0);
381 }
382
383
384 /*
385 * pid_open:
386 *
387 * open pidfile with specified oflags and modes and lock it
388 *
389 */
390
391 static char *pidopenmsg ="Can't create process ID file in home directory";
392 static char *pidlockmsg ="Can't lock PID file: listener may already be running";
393
394 static void
pid_open(void)395 pid_open(void)
396 {
397 int ret;
398 unsigned int i;
399 char pidstring[20];
400
401 if ((Pidfd = open(PIDNAME, PIDOFLAG, PIDMODE)) == -1) {
402 logmessage(pidopenmsg);
403 error(E_CREAT, EXIT | NOCORE | NO_MSG);
404 }
405
406 if (lockf(Pidfd, 2, 0L) == -1) {
407 logmessage(pidlockmsg);
408 logexit(1, badstart);
409 }
410
411 Pid = getpid();
412 i = sprintf(pidstring, "%ld", Pid) + 1;
413 ftruncate(Pidfd, 0);
414
415 while ((ret = write(Pidfd, pidstring, i)) != i) {
416 if (errno == EINTR)
417 continue;
418 if (ret < 0)
419 sys_error(E_PIDWRITE, EXIT);
420 else
421 error(E_PIDWRITE, EXIT);
422 }
423
424 }
425
426 /*
427 * init_files: open initial files for the listener (see FILE DESC MGMT comment)
428 */
429
430 static char *pmopenmsg = "Can't open pipe to read SAC messages";
431 static char *sacopenmsg = "Can't open pipe to respond to SAC messages";
432
433 static void
init_files(void)434 init_files(void)
435 {
436 close(0);
437 if ((Acceptfd = open("/dev/null", O_RDWR)) != 0) {
438 logmessage("Trouble opening /dev/null");
439 sys_error(E_SYS_ERROR, EXIT | NOCORE);
440 }
441
442 close(1);
443 if ((Sacpipefd = open(SACPIPE, O_RDWR|O_NDELAY)) != 1) {
444 logmessage(sacopenmsg);
445 error(E_CREAT, EXIT | NOCORE | NO_MSG);
446 }
447
448 close(2);
449 if ((Pmpipefd = open(PMPIPE, O_RDWR|O_NDELAY)) != 2) {
450 logmessage(pmopenmsg);
451 error(E_CREAT, EXIT | NOCORE | NO_MSG);
452 }
453
454 close(3);
455 if ((Passfd = dup(Acceptfd)) != 3) {
456 logmessage("Trouble duping /dev/null");
457 sys_error(E_SYS_ERROR, EXIT | NOCORE);
458 }
459
460 }
461
462
463 /*
464 * net_open: open and bind communications channels
465 * The name generation code in net_open, open_bind and bind is,
466 * for the most part, specific to STARLAN NETWORK.
467 * This name generation code is included in the listener
468 * as a developer debugging aid.
469 */
470
471 static void
net_open(void)472 net_open(void)
473 {
474 #ifdef CHARADDR
475 char pbuf[NAMEBUFSZ + 1];
476 #endif /* CHARADDR */
477 int i;
478 dbf_t *dp;
479 char scratch[BUFSIZ];
480
481 DEBUG((9,"in net_open"));
482
483 /* set up free call list and pending connection lists */
484
485 Free_call_p->cl_head = (struct callsave *) NULL;
486 Free_call_p->cl_tail = (struct callsave *) NULL;
487
488 /* Pending calls are linked in a structure, one per fild descriptor */
489 if ((Priv_call = (struct call_list *) malloc(Ndesc *(sizeof(
490 struct call_list)))) == NULL)
491 error(E_MALLOC,NOCORE | EXIT);
492
493 i = 0;
494 Valid_addrs = 0;
495 /* first do static addrs */
496 while ( (i < Dbf_entries) ) {
497 dp = &Dbfhead[i];
498 if (!(dp->dbf_sflags & DFLAG)) {
499 if (add_prvaddr(dp) == 0)
500 Valid_addrs++;
501 }
502 i++;
503 }
504 i = 0;
505 /* second pass for dynamic addrs */
506 while ( (i < Dbf_entries) ) {
507 dp = &Dbfhead[i];
508 if (dp->dbf_sflags & DFLAG) {
509 if (add_prvaddr(dp) == 0)
510 Valid_addrs++;
511 }
512 i++;
513 }
514
515 sprintf(scratch, "Net opened, %d %s bound, %d fds free", Valid_addrs,
516 (Valid_addrs == 1) ? "address" : "addresses",
517 Ndesc-Valid_addrs-USEDFDS);
518 logmessage(scratch);
519 }
520
521
522 /*
523 * Following are some general queueing routines. The call list head contains
524 * a pointer to the head of the queue and to the tail of the queue. Normally,
525 * calls are added to the tail and removed from the head to ensure they are
526 * processed in the order received, however, because of the possible interruption
527 * of an acceptance with the resulting requeueing, it is necessary to have a
528 * way to do a "priority queueing" which inserts at the head of the queue for
529 * immediate processing
530 */
531
532 /*
533 * queue:
534 *
535 * add calls to tail of queue
536 */
537
538
539 void
queue(head,cp)540 queue(head, cp)
541 struct call_list *head;
542 struct callsave *cp;
543 {
544 DEBUG((9,"in queue"));
545 if (head->cl_tail == (struct callsave *) NULL) {
546 cp->c_np = (struct callsave *) NULL;
547 head->cl_head = head->cl_tail = cp;
548 }
549 else {
550 cp->c_np = head->cl_tail->c_np;
551 head->cl_tail->c_np = cp;
552 head->cl_tail = cp;
553 }
554 }
555
556
557 /*
558 * pqueue:
559 *
560 * priority queuer, add calls to head of queue
561 */
562
563 void
pqueue(head,cp)564 pqueue(head, cp)
565 struct call_list *head;
566 struct callsave *cp;
567 {
568 if (head->cl_head == (struct callsave *) NULL) {
569 cp->c_np = (struct callsave *) NULL;
570 head->cl_head = head->cl_tail = cp;
571 }
572 else {
573 cp->c_np = head->cl_head;
574 head->cl_head = cp;
575 }
576 }
577
578
579 /*
580 * dequeue:
581 *
582 * remove a call from the head of queue
583 */
584
585
586 struct callsave *
dequeue(head)587 dequeue(head)
588 struct call_list *head;
589 {
590 struct callsave *ret;
591
592 DEBUG((9,"in dequeue"));
593 if (head->cl_head == (struct callsave *) NULL) {
594 #ifdef OLD
595 DEBUG((9,"cl_head = null"));
596 error(E_CANT_HAPPEN, EXIT);
597 #endif
598 DEBUG((9, "NULL return"));
599 return((struct callsave *) NULL);
600 }
601 ret = head->cl_head;
602 head->cl_head = ret->c_np;
603 if (head->cl_head == (struct callsave *) NULL)
604 head->cl_tail = (struct callsave *) NULL;
605 return(ret);
606 }
607
608
609 /*
610 * open_bind:
611 *
612 * open the network and bind the endpoint to 'name'
613 * this routine is also used by listen(), so it can't exit
614 * under all error conditions:
615 * if there are no minor devices avaliable in the network driver,
616 * open_bind returns -1. (error message will be logged).
617 * if the open fails because all file descriptors are in use,
618 * open_bind returns -2. (no message logged). This should
619 * only happen when too many private addresses are specified.
620 * if the bind fails, open_bind returns -3 (no message logged). This
621 * happens when a duplicate address is bound, and the message
622 * should be logged by the routine that calls open_bind.
623 * All other errors cause an exit.
624 *
625 * If clen is zero, transport provider picks the name and these
626 * routines (open_bind and bind) ignore name and qlen --
627 * this option is used when binding a name for accepting a connection
628 * (not for listening.) You MUST supply a name, qlen and clen when
629 * opening/binding a name for listening.
630 *
631 * Assumptions: driver returns ENXIO when all devices are allocated.
632 */
633
634 int
open_bind(name,qlen,clen,conp,adrp)635 open_bind(name, qlen, clen, conp, adrp)
636 char *name;
637 int qlen;
638 int clen;
639 unsigned int *conp;
640 char **adrp;
641 {
642 int fd;
643 int ret;
644
645 DEBUG((9,"in open_bind, qlen=%d clen=%d conp=%d",qlen,clen,conp));
646 while ((fd = t_open(Provider, NETOFLAG, NULL)) < 0) {
647 if (t_errno == TSYSERR) {
648 switch (errno) {
649 case EINTR:
650 continue;
651 case EMFILE:
652 return(-2);
653 break;
654 case ENXIO:
655 case ENOSR:
656 case ENOSPC:
657 case EAGAIN:
658 tli_error(E_FD1OPEN, CONTINUE);
659 logmessage("No network minor devices (ENXIO/ENOSR)");
660 return(-1);
661 break;
662 }
663 DEBUG((9,"problem in t_open"));
664 tli_error(E_FD1OPEN, EXIT);
665 }
666 }
667
668 ret = bind(fd, name, qlen, clen, adrp);
669 DEBUG((9, "bind returns %d", ret));
670
671 if (ret < 0) {
672 t_close(fd);
673 return(-3);
674 }
675 if (conp)
676 *conp = ret;
677 return(fd);
678 }
679
680
681 int
bind(fd,name,qlen,clen,ap)682 bind(fd, name, qlen, clen, ap)
683 int fd;
684 char *name;
685 int qlen;
686 int clen;
687 char **ap;
688 {
689 struct t_bind *req = (struct t_bind *)0;
690 struct t_bind *ret = (struct t_bind *)0;
691 char *p, *q;
692 unsigned int retval;
693 extern void nlsaddr2c();
694 extern int memcmp();
695 extern int errno;
696
697 #ifdef CHARADDR
698 char pbuf[NAMEBUFSZ + 1];
699 #endif
700 char scratch[BUFSIZ];
701
702 DEBUG((9,"in bind, fd = %d, clen = %d", fd, clen));
703
704 if (clen) {
705 errno = t_errno = 0;
706 while (!(req = (struct t_bind *)t_alloc(fd,T_BIND,T_ALL)) ) {
707 if ((t_errno != TSYSERR) || (errno != EAGAIN))
708 tli_error( E_T_ALLOC, EXIT);
709 else
710 tli_error( E_T_ALLOC, CONTINUE);
711 }
712
713 errno = t_errno = 0;
714 while (!(ret = (struct t_bind *)t_alloc(fd,T_BIND,T_ALL)) ) {
715 if ((t_errno != TSYSERR) || (errno != EAGAIN))
716 tli_error( E_T_ALLOC, EXIT);
717 else
718 tli_error( E_T_ALLOC, CONTINUE);
719 }
720
721 if (clen > (int) req->addr.maxlen) {
722 sprintf(scratch,"Truncating name size from %d to %d",
723 clen, req->addr.maxlen);
724 logmessage(scratch);
725 clen = req->addr.maxlen;
726 }
727
728 if (clen == -1) {
729 req->addr.len = 0;
730 }
731 else {
732 (void)memcpy(req->addr.buf, name, clen);
733 req->addr.len = clen;
734 }
735 req->qlen = qlen;
736
737 #if defined(CHARADDR) && defined(DEBUGMODE)
738 (void)memcpy(pbuf, req->addr.buf, req->addr.len);
739 pbuf[req->addr.len] = (char)0;
740 DEBUG((3,"bind: fd=%d, logical name=%c%s%c, len=%d",
741 fd, '\"',pbuf, '\"', req->addr.len));
742 #endif /* CHARADDR && DEBUGMODE */
743
744
745 #if defined(CHARADDR) && defined(DEBUGMODE)
746 (void)memcpy(pbuf, req->addr.buf, req->addr.len);
747 pbuf[req->addr.len] = (char)0;
748 DEBUG((3,"bind: fd=%d, address=%c%s%c, len=%d",
749 fd, '\"',pbuf, '\"', req->addr.len));
750 #endif /* CHARADDR && DEBUGMODE */
751
752
753 }
754
755 if (t_bind(fd, req, ret)) {
756 DEBUG((1,"t_bind failed; t_errno %d errno %d", t_errno, errno));
757 if (qlen) /* starup only */
758 tli_error(E_T_BIND, EXIT | NOCORE);
759 /* here during normal service */
760 if ((t_errno == TNOADDR) || ((t_errno == TSYSERR) && (errno == EAGAIN))) {
761 /* our name space is all used up */
762 tli_error(E_T_BIND, CONTINUE);
763 t_close(fd);
764 if (clen) {
765 if ( t_free((char *)req, T_BIND) )
766 tli_error(E_T_FREE, EXIT);
767 if ( t_free((char *)ret, T_BIND) )
768 tli_error(E_T_FREE, EXIT);
769 }
770 return(-1);
771 }
772 /* otherwise, irrecoverable error */
773 tli_error(E_T_BIND, EXIT | NOCORE);
774 }
775 DEBUG((9, "t_bind succeeded"));
776
777 if (clen) {
778 retval = ret->qlen;
779 if (clen == -1) {
780 /* dynamic address */
781 *ap = (char *) malloc(((ret->addr.len) << 1) + 3);
782 if (*ap) {
783 (*ap)[0] = '\\';
784 (*ap)[1] = 'x';
785 nlsaddr2c(*ap+2,ret->addr.buf,(int)ret->addr.len);
786 }
787 }
788 else if ( (ret->addr.len != req->addr.len) ||
789 (memcmp( req->addr.buf, ret->addr.buf, (int) req->addr.len)) ) {
790 p = (char *) malloc(((ret->addr.len) << 1) + 1);
791 q = (char *) malloc(((req->addr.len) << 1) + 1);
792 if (p && q) {
793 nlsaddr2c(p, ret->addr.buf, (int)ret->addr.len);
794 nlsaddr2c(q, req->addr.buf, (int)req->addr.len);
795 sprintf(scratch, "Requested address \\x%s", q);
796 logmessage(scratch);
797 sprintf(scratch, "Actual address \\x%s", p);
798 logmessage(scratch);
799 free(p);
800 free(q);
801 }
802 DEBUG((9, "failed to bind requested address"));
803 t_unbind(fd);
804 t_close(fd);
805 if ( t_free((char *)req, T_BIND) )
806 tli_error(E_T_FREE, EXIT);
807 if ( t_free((char *)ret, T_BIND) )
808 tli_error(E_T_FREE, EXIT);
809 return(-1);
810 }
811
812 if ( t_free((char *)req, T_BIND) )
813 tli_error(E_T_FREE, EXIT);
814
815 if ( t_free((char *)ret, T_BIND) )
816 tli_error(E_T_FREE, EXIT);
817 return(retval);
818 }
819 return((unsigned int) 0);
820 }
821
822
823 /*
824 * catch_signals:
825 * Ignore some, catch the rest. Use SIGTERM to kill me.
826 */
827
828 sigset_t Oset;
829 struct sigaction Sigterm;
830 struct sigaction Sigcld;
831
832 static void
catch_signals(void)833 catch_signals(void)
834 {
835 sigset_t sset;
836 sigset_t eset;
837 struct sigaction sigact;
838 extern void sigterm();
839
840 (void) sigfillset(&sset);
841 (void) sigdelset(&sset, SIGTERM);
842 (void) sigdelset(&sset, SIGCLD);
843 (void) sigprocmask(SIG_SETMASK, &sset, &Oset);
844
845 sigact.sa_flags = 0;
846 sigact.sa_handler = sigterm;
847 sigact.sa_mask = sset;
848 sigaction(SIGTERM, &sigact, &Sigterm);
849 sigact.sa_flags = SA_NOCLDWAIT;
850 sigact.sa_handler = SIG_IGN;
851 sigact.sa_mask = sset;
852 sigaction(SIGCLD, &sigact, &Sigcld);
853 }
854
855
856 /*
857 * rst_signals:
858 * After forking but before exec'ing a server,
859 * reset all signals to original setting.
860 */
861
862 static void
rst_signals(void)863 rst_signals(void)
864 {
865 struct sigaction sigact;
866
867 sigaction(SIGTERM, &Sigterm, NULL);
868 sigaction(SIGCLD, &Sigcld, NULL);
869 sigprocmask(SIG_SETMASK, &Oset, NULL);
870 }
871
872
873 /*
874 * sigterm: Clean up and exit.
875 */
876
877 void
sigterm()878 sigterm()
879 {
880 extern char *shaddr;
881 extern char *sh2addr;
882
883 error(E_SIGTERM, EXIT | NORMAL | NOCORE); /* calls cleanup */
884 }
885
886
887 /*
888 * listen: listen for and process connection requests.
889 */
890
891 static char *dbfnewdmsg = "Using new data base file";
892
893 static void
listen(void)894 listen(void)
895 {
896 int i;
897 dbf_t *dbp = Dbfhead;
898 struct pollfd *sp;
899 struct call_list *phead; /* pending head */
900
901 DEBUG((9,"in listen, tag %s", Pmmsg.pm_tag));
902
903 if ((Pollfds = (struct pollfd *) malloc(Ndesc * sizeof(struct pollfd)))
904 == NULL)
905 error(E_MALLOC,NOCORE | EXIT);
906
907 /* setup poll structures for sac messages and private addresses */
908 sp = Pollfds;
909 sp->fd = Pmpipefd;
910 sp->events = POLLIN;
911 sp->revents = 0;
912 sp++;
913 for (dbp = Dbfhead; dbp && dbp->dbf_svc_code; dbp++) {
914 if (dbp->dbf_fd >= 0) {
915 sp->fd = dbp->dbf_fd;
916 DEBUG((9, "adding %d to poll struct", dbp->dbf_fd));
917 sp->events = POLLIN;
918 sp->revents = 0;
919 sp++;
920 }
921 }
922 errno = t_errno = 0;
923
924 for (;;) {
925 DEBUG((9,"listen(): TOP of loop"));
926
927 /* +1 for Pmpipefd */
928 if (poll(Pollfds, Valid_addrs + 1, -1) < 0) {
929 if (errno == EINTR)
930 continue;
931 /* poll error */
932 sys_error(E_POLL, EXIT);
933 }
934 else {
935 /* incoming request or message */
936 for (i = 0, sp = Pollfds; i < Valid_addrs + 1; i++, sp++) {
937 switch (sp->revents) {
938 case POLLIN:
939 if (sp->fd == Pmpipefd) {
940 DEBUG((9,"sac message received"));
941 check_sac_mesg();
942 }
943 else {
944 DEBUG((9,"Connection requested "));
945 phead = ((sp->fd) + Priv_call);
946 doevent(phead, (sp->fd));
947 if (State == PM_ENABLED)
948 trycon(phead, (sp->fd));
949 else
950 send_dis(phead, (sp->fd));
951 }
952 break;
953 case 0:
954 break;
955 /* distinguish the various errors for the user */
956 case POLLERR:
957 logmessage("poll() returned POLLERR");
958 error(E_SYS_ERROR, EXIT | NO_MSG);
959 break;
960 case POLLHUP:
961 logmessage("poll() returned POLLHUP");
962 error(E_SYS_ERROR, EXIT | NO_MSG);
963 break;
964 case POLLNVAL:
965 logmessage("poll() returned POLLNVAL");
966 error(E_SYS_ERROR, EXIT | NO_MSG);
967 break;
968 case POLLPRI:
969 logmessage("poll() returned POLLPRI");
970 error(E_SYS_ERROR, EXIT | NO_MSG);
971 break;
972 case POLLOUT:
973 logmessage("poll() returned POLLOUT");
974 error(E_SYS_ERROR, EXIT | NO_MSG);
975 break;
976 default:
977 logmessage("poll() returned unrecognized event");
978 error(E_SYS_ERROR, EXIT | NO_MSG);
979 }
980 sp->revents = 0;
981 }
982 }
983
984 if (Readdb) {
985 DEBUG((9,"dbf file has been modified"));
986 logmessage("Re-reading database");
987 /* have to close an fd because read_dbf needs it */
988 close(Acceptfd);
989 if (!read_dbf(DB_REREAD)) {
990 /* MUST re-open Acceptfd to insure it is free later */
991 dup(Passfd);
992 mod_prvaddr();
993 }
994 else {
995 dup(Passfd);
996 logmessage(dbfnewdmsg);
997 }
998 Readdb = FALSE;
999 }
1000 }
1001 }
1002
1003
1004 /*
1005 * check_sac_mesg: check the pipe to see if SAC has sent a message
1006 */
1007
1008 void
check_sac_mesg()1009 check_sac_mesg()
1010 {
1011 int length;
1012 struct sacmsg sacmsg;
1013
1014 DEBUG((9, "in check_sac_mesg..."));
1015
1016 /* read all messages out of pipe */
1017 while ((length = read(Pmpipefd, &sacmsg, sizeof(sacmsg))) != 0) {
1018 if (length < 0) {
1019 if (errno == EINTR)
1020 continue;
1021 DEBUG((9, "read of _pmpipe failed"));
1022 return;
1023 }
1024
1025 switch (sacmsg.sc_type) {
1026 case SC_STATUS:
1027 DEBUG((9, "Got SC_STATUS message"));
1028 Pmmsg.pm_type = PM_STATUS;
1029 Pmmsg.pm_state = State;
1030 break;
1031 case SC_ENABLE:
1032 DEBUG((9, "Got SC_ENABLE message"));
1033 if (State != PM_ENABLED)
1034 logmessage("New state: ENABLED");
1035 Pmmsg.pm_type = PM_STATUS;
1036 State = PM_ENABLED;
1037 Pmmsg.pm_state = PM_ENABLED;
1038 break;
1039 case SC_DISABLE:
1040 DEBUG((9, "Got SC_DISABLE message"));
1041 if (State != PM_DISABLED)
1042 logmessage("New state: DISABLED");
1043 Pmmsg.pm_type = PM_STATUS;
1044 State = PM_DISABLED;
1045 Pmmsg.pm_state = PM_DISABLED;
1046 break;
1047 case SC_READDB:
1048 DEBUG((9, "Got SC_READDB message"));
1049 Readdb = TRUE;
1050 Pmmsg.pm_type = PM_STATUS;
1051 Pmmsg.pm_state = State;
1052 break;
1053 default:
1054 DEBUG((9, "Got UNKNOWN message"));
1055 Pmmsg.pm_type = PM_UNKNOWN;
1056 Pmmsg.pm_state = State;
1057 logmessage("Received unknown message from sac -- ignored");
1058 break;
1059 }
1060 DEBUG((9, "Responding with state %d", Pmmsg.pm_state));
1061 while (write(Sacpipefd, &Pmmsg, sizeof(Pmmsg)) != sizeof(Pmmsg)) {
1062 if (errno == EINTR)
1063 continue;
1064 DEBUG((9, "sanity response failed"));
1065 break;
1066 }
1067 }
1068 }
1069
1070
1071 /*
1072 * doevent: handle an asynchronous event
1073 */
1074
1075 static void
doevent(struct call_list * phead,int fd)1076 doevent(struct call_list *phead, int fd)
1077 {
1078 static struct t_discon *disc;
1079 struct callsave *current;
1080 struct t_call *call;
1081 char scratch[BUFSIZ];
1082
1083 DEBUG((9, "in doevent"));
1084 switch (t_look(fd)) {
1085 case 0:
1086 sys_error(E_POLL, EXIT);
1087 /* no return */
1088 break;
1089 case T_LISTEN:
1090 DEBUG((9, "case t_listen "));
1091 current = dequeue(Free_call_p);
1092 call = current->c_cp;
1093 if (t_listen(fd, call) < 0) {
1094 tli_error(E_T_LISTEN, CONTINUE);
1095 clr_call(call);
1096 queue(Free_call_p, current);
1097 return;
1098 }
1099 queue(phead, current);
1100 DEBUG((9, "incoming call seq # %d", call->sequence));
1101 break;
1102 case T_DISCONNECT:
1103 DEBUG((9, "case t_disconnect"));
1104 if (disc == NULL) {
1105 while (!(disc = (struct t_discon *)t_alloc(fd, T_DIS, T_ALL)) ) {
1106 if (t_errno == TBADF)
1107 DEBUG((9,"listen - fd not transport end point"));
1108 if ((t_errno != TSYSERR) || (errno != EAGAIN))
1109 tli_error(E_T_ALLOC, EXIT);
1110 else
1111 tli_error(E_T_ALLOC, CONTINUE);
1112 }
1113 }
1114 if (t_rcvdis(fd, disc) < 0) {
1115 tli_error(E_T_RCVDIS, EXIT);
1116 /* no return */
1117 }
1118 sprintf(scratch, "Disconnect on fd %d, seq # %d", fd, disc->sequence);
1119 logmessage(scratch);
1120 DEBUG((9, "incoming disconnect seq # %d", disc->sequence));
1121 pitchcall(phead, disc);
1122 break;
1123 default:
1124 DEBUG((9, "case default"));
1125 tli_error(E_T_LOOK, CONTINUE);
1126 break;
1127
1128 }
1129 }
1130
1131 /*
1132 * send_dis: send a disconnect
1133 * called when we are in state PM_DISABLED
1134 */
1135
1136 static void
send_dis(struct call_list * phead,int fd)1137 send_dis(struct call_list *phead, int fd)
1138 {
1139 struct t_call *call;
1140 struct callsave *current;
1141 char scratch[BUFSIZ];
1142
1143 DEBUG((9, "sending disconnect"));
1144 while (!EMPTYLIST(phead)) {
1145 current = dequeue(phead);
1146 call = current->c_cp;
1147 if (t_snddis(fd, call) < 0) {
1148 if (t_errno == TLOOK) {
1149 DEBUG((9, "collision during snddis"));
1150 pqueue(phead, current);
1151 return;
1152 }
1153 else
1154 tli_error(E_T_SNDDIS, CONTINUE);
1155 }
1156 sprintf(scratch, "Incoming call while disabled: fd %d, seq %d", fd, call->sequence);
1157 logmessage(scratch);
1158 clr_call(call);
1159 queue(Free_call_p, current);
1160 }
1161 return;
1162 }
1163
1164
1165 /*
1166 * trycon: try to accept a connection
1167 */
1168
1169 static void
trycon(struct call_list * phead,int fd)1170 trycon(struct call_list *phead, int fd)
1171 {
1172 struct callsave *current;
1173 struct t_call *call;
1174 int i;
1175 pid_t pid;
1176 dbf_t *dbp;
1177 char scratch[BUFSIZ];
1178 extern dbf_t *getentry();
1179
1180 DEBUG((9, "in trycon"));
1181 while (!EMPTYLIST(phead)) {
1182 current = dequeue(phead);
1183 call = current->c_cp;
1184
1185 if ((dbp = getentry(fd)) == NULL) {
1186 sprintf(scratch, "No service bound to incoming fd %d: call disconnected", fd);
1187 logmessage(scratch);
1188 t_snddis(fd, call);
1189 clr_call(call);
1190 queue(Free_call_p, current);
1191 continue;
1192 }
1193
1194 if (dbp->dbf_flags & DBF_OFF) {
1195 sprintf(scratch, "Request for service on fd %d denied: disabled", fd);
1196 logmessage(scratch);
1197 t_snddis(fd, call);
1198 clr_call(call);
1199 queue(Free_call_p, current);
1200 continue;
1201 }
1202
1203 DEBUG((9, "try to accept #%d", call->sequence));
1204 SPLhi();
1205 close(Acceptfd);
1206 if ((Acceptfd = open_bind(NULL, 0, 0, (unsigned int *) 0, NULL)) != 0) {
1207 error(E_OPENBIND, CONTINUE);
1208 clr_call(call);
1209 queue(Free_call_p, current);
1210 continue; /* let transport provider generate disconnect */
1211 }
1212 SPLlo();
1213 if (t_accept(fd, Acceptfd, call) < 0) {
1214 if (t_errno == TLOOK) {
1215 t_close(Acceptfd);
1216 SPLhi();
1217 if (dup(Passfd) != 0)
1218 logmessage("Trouble duping fd 0");
1219 SPLlo();
1220 logmessage("Incoming call during t_accept -- queueing current call");
1221 DEBUG((9, "save call #%d", call->sequence));
1222 pqueue(phead, current);
1223 return;
1224 }
1225 else {
1226 t_close(Acceptfd);
1227 SPLhi();
1228 if (dup(Passfd) != 0)
1229 logmessage("Trouble duping fd 0");
1230 SPLlo();
1231 tli_error(E_T_ACCEPT, CONTINUE);
1232 clr_call(call);
1233 queue(Free_call_p, current);
1234 continue;
1235 }
1236 }
1237
1238 sprintf(scratch, "Connect: fd %d, svctag %s, seq %d, type %s",
1239 fd, dbp->dbf_svc_code, call->sequence,
1240 (dbp->dbf_sflags & PFLAG) ? "passfd" : "exec");
1241 logmessage(scratch);
1242
1243 DEBUG((9, "Accepted call %d", call->sequence));
1244
1245 if (dbp->dbf_sflags & PFLAG) {
1246
1247 close(Passfd);
1248
1249 if (pushmod(Acceptfd, dbp->dbf_modules)) {
1250 sprintf(scratch, "Could not push modules: %s", dbp->dbf_modules);
1251 logmessage(scratch);
1252 goto cleanup;
1253 }
1254
1255 /* doconfig needs a file descriptor, so use Passfd */
1256 DEBUG((9, "Running doconfig on %s", dbp->dbf_svc_code));
1257 if ((i = doconfig(Acceptfd, dbp->dbf_svc_code, NOASSIGN|NORUN)) != 0) {
1258 DEBUG((9, "doconfig exited with code %d", i));
1259 sprintf(scratch, "doconfig failed on line %d of script %s", i, dbp->dbf_svc_code);
1260 logmessage(scratch);
1261 goto cleanup;
1262 }
1263
1264 /* open pipe to pass fd through */
1265 if ((Passfd = open(dbp->dbf_cmd_line, O_WRONLY)) < 0) {
1266 /* bad pipe? */
1267 sprintf(scratch,"Open failed: %s", dbp->dbf_cmd_line);
1268 logmessage(scratch);
1269 goto cleanup;
1270 }
1271
1272 if (ioctl(Passfd, I_SENDFD, Acceptfd) < 0) {
1273 /* clean up call, log error */
1274 sprintf(scratch,"Passfd failed: %s", dbp->dbf_cmd_line);
1275 logmessage(scratch);
1276 }
1277 cleanup:
1278 /* clean up this call */
1279 clr_call(call);
1280 t_close(Acceptfd);
1281 close(Passfd);
1282 Acceptfd = open("/dev/null", O_RDWR);
1283 Passfd = dup(Acceptfd);
1284 queue(Free_call_p, current);
1285 }
1286 else {
1287 if ((pid = fork()) < 0)
1288 log(E_FORK_SERVICE);
1289 else if (!pid) {
1290 setpgrp();
1291 /* so log files are correct */
1292 Pid = getpid();
1293
1294 if (senviron(call)) {
1295 logmessage("Can't expand server's environment");
1296 }
1297
1298 start_server(Acceptfd, dbp);
1299 #ifdef COREDUMP
1300 abort();
1301 #endif
1302 exit(1); /* server failed, don't log */
1303 /* no return */
1304 }
1305 /* only parent gets here */
1306 clr_call(call);
1307 t_close(Acceptfd);
1308 queue(Free_call_p, current);
1309 SPLhi();
1310 if (dup(Passfd) != 0)
1311 logmessage("Trouble duping fd 0");
1312 SPLlo();
1313 }
1314 }
1315 }
1316
1317 /*
1318 * common code to start a server process (for any service)
1319 * The first argument in argv is the full pathname of server.
1320 * Before exec-ing the server, the caller's
1321 * logical address, opt and udata are addded to the environment.
1322 */
1323
1324 static char homeenv[BUFSIZ];
1325 static char pathenv[BUFSIZ];
1326
1327 int
start_server(netfd,dbp)1328 start_server(netfd, dbp)
1329 int netfd;
1330 dbf_t *dbp;
1331 {
1332 char *path;
1333 char **argvp;
1334 extern char **environ;
1335 extern char **mkdbfargv();
1336 struct passwd *pwdp;
1337 struct group *grpp;
1338 char msgbuf[256];
1339 int i;
1340
1341
1342 argvp = mkdbfargv(dbp);
1343 path = *argvp;
1344
1345 /* set up stdout and stderr before pushing optional modules */
1346 /* this child doesn't need access to _sacpipe and _pmpipe */
1347
1348 (void) close(Sacpipefd);
1349 (void) close(Pmpipefd);
1350
1351 if (dbp->dbf_flags & DBF_UTMP) {
1352 pid_t tmp;
1353 struct stat sbuf;
1354 char device[20];
1355 char dummy[PMTAGSIZE + 1];
1356 struct utmpx utline;
1357
1358 /*
1359 * create a utmpx entry --
1360 * we do an extra fork here to make init this process's
1361 * parent. this lets init clean up the utmpx entry when
1362 * this proc dies.
1363 *
1364 * the utmpx routines need a file descriptor!
1365 */
1366
1367 DEBUG((9, "Creating a utmpx entry for this service "));
1368 if ((tmp = fork()) < 0) {
1369 logmessage("Can't fork to create utmpx entry");
1370 exit(2);
1371 }
1372 if (tmp)
1373 exit(0); /* kill parent */
1374
1375 /*
1376 * child continues processing, creating utmp and exec'ing
1377 * the service
1378 */
1379
1380 setpgrp();
1381 if (fstat(0, &sbuf) < 0) {
1382 logmessage("Stat failed on fd 0: no line field "
1383 "available for utmpx entry");
1384 *device = '\0';
1385 }
1386 else {
1387 if (minor(sbuf.st_rdev) < 100)
1388 sprintf(device, "%.9s%02d", Minor_prefix,
1389 minor(sbuf.st_rdev));
1390 else
1391 sprintf(device, "%.8s%03d", Minor_prefix,
1392 minor(sbuf.st_rdev));
1393 DEBUG((9, "Device: %s", device));
1394 }
1395 /*
1396 * prepend a "." so this can be distinguished as a "funny"
1397 * utmpx entry that may never get a DEAD_PROCESS entry in
1398 * the wtmpx file.
1399 */
1400 sprintf(dummy, ".%s", Mytag);
1401 /* XXX - utmp - fix login name length */
1402 strncpy(utline.ut_user, dummy, sizeof (utline.ut_user) - 1);
1403 sprintf(utline.ut_id, "ls%c%c", SC_WILDC, SC_WILDC);
1404 strncpy(utline.ut_line, device, sizeof (utline.ut_line) - 1);
1405 utline.ut_pid = getpid();
1406 utline.ut_type = USER_PROCESS;
1407 utline.ut_exit.e_termination = 0;
1408 utline.ut_exit.e_exit = 0;
1409 utline.ut_xtime = (time_t) time((time_t *)0);
1410 makeutx(&utline);
1411 }
1412
1413 if (dup(0) != 1 || dup(0) != 2) {
1414 logmessage("Dup of fd 0 failed");
1415 exit(2); /* server, don't log */
1416 }
1417
1418
1419 if (pushmod(netfd, dbp->dbf_modules)) {
1420 logmessage("Can't push server's modules: exit");
1421 exit(2); /* server, don't log */
1422 }
1423
1424 rst_signals();
1425
1426 DEBUG((9, "Running doconfig on %s", dbp->dbf_svc_code));
1427 if ((i = doconfig(Acceptfd, dbp->dbf_svc_code, 0)) != 0) {
1428 DEBUG((9, "doconfig exited with code %d", i));
1429 sprintf(msgbuf, "doconfig failed on line %d of script %s", i, dbp->dbf_svc_code);
1430 logmessage(msgbuf);
1431 exit(2);
1432 }
1433
1434 if ((pwdp = getpwnam(dbp->dbf_id)) == NULL) {
1435 sprintf(msgbuf, "Missing or bad passwd entry for <%s>",dbp->dbf_id);
1436 logmessage(msgbuf);
1437 exit(2); /* server, don't log */
1438 }
1439
1440 if (setgid(pwdp->pw_gid)) {
1441 if ((grpp = getgrgid(pwdp->pw_gid)) == NULL) {
1442 sprintf(msgbuf, "No group entry for %ld", pwdp->pw_gid);
1443 logmessage(msgbuf);
1444 exit(2); /* server, don't log */
1445 }
1446 sprintf(msgbuf, "Cannot set group id to %s", grpp->gr_name);
1447 logmessage(msgbuf);
1448 exit(2); /* server, don't log */
1449 }
1450
1451 if (setuid(pwdp->pw_uid)) {
1452 sprintf(msgbuf, "Cannot set user id to %s", dbp->dbf_id);
1453 logmessage(msgbuf);
1454 exit(2); /* server, don't log */
1455 }
1456
1457 if (chdir(pwdp->pw_dir)) {
1458 sprintf(msgbuf, "Cannot chdir to %s", pwdp->pw_dir);
1459 logmessage(msgbuf);
1460 exit(2); /* server, don't log */
1461 }
1462
1463
1464 DEBUG((9, "New uid %ld New gid %ld", getuid(), getgid()));
1465
1466 sprintf(homeenv, "HOME=%s", pwdp->pw_dir);
1467 putenv(homeenv);
1468 if (pwdp->pw_uid)
1469 sprintf(pathenv, "PATH=/usr/bin:");
1470 else
1471 sprintf(pathenv, "PATH=/usr/sbin:/usr/bin");
1472 putenv(pathenv);
1473
1474 endpwent();
1475
1476 execve(path, argvp, environ);
1477
1478 /* exec returns only on failure! */
1479
1480 logmessage("ERROR: could not exec server");
1481 sys_error(E_SYS_ERROR, CONTINUE);
1482 return(-1);
1483 }
1484
1485
1486 /*
1487 * senviron: Update environment before exec-ing the server:
1488 * The callers logical address is placed in the
1489 * environment in hex/ascii character representation.
1490 *
1491 * Note: no need to free the malloc'ed buffers since this process
1492 * will either exec or exit.
1493 */
1494
1495 static char provenv[2*PATHSIZE];
1496 static char prefenv[2*PATHSIZE];
1497
1498 int
senviron(call)1499 senviron(call)
1500 struct t_call *call;
1501 {
1502 char *p;
1503 extern void nlsaddr2c();
1504 extern char *getenv();
1505
1506
1507 /*
1508 * The following code handles the case where the listener was started with
1509 * no environment. If so, supply a reasonable default path. Parent already
1510 * set TZ on startup if it wasn't, so don't need to do it here.
1511 */
1512
1513 if (getenv("PATH") == NULL)
1514 putenv("PATH=/usr/sbin:/usr/bin");
1515
1516 if ((p = (char *)malloc(((call->addr.len)<<1) + 18)) == NULL)
1517 return(-1);
1518 strcpy(p, NLSADDR);
1519 strcat(p, "=");
1520 nlsaddr2c(p + strlen(p), call->addr.buf, (int)call->addr.len);
1521 DEBUG((7, "Adding %s to server's environment", p));
1522 putenv(p);
1523
1524 if ((p = (char *)malloc(((call->opt.len)<<1) + 16)) == NULL)
1525 return(-1);
1526 strcpy(p, NLSOPT);
1527 strcat(p, "=");
1528 nlsaddr2c(p + strlen(p), call->opt.buf, (int)call->opt.len);
1529 DEBUG((7, "Adding %s to server's environment", p));
1530 putenv(p);
1531
1532 p = provenv;
1533 strcpy(p, NLSPROVIDER);
1534 strcat(p, "=");
1535 strcat(p, Netspec);
1536 DEBUG((7, "Adding %s to environment", p));
1537 putenv(p);
1538
1539 /*
1540 * MPREFIX is NEW for SVR4.0. It tells the nlps_server what to use
1541 * as a minor device prefix. THIS SHOULD BE DOCUMENTED!
1542 */
1543 p = prefenv;
1544 strcpy(p, "MPREFIX");
1545 strcat(p, "=");
1546 strcat(p, Minor_prefix);
1547 DEBUG((7, "Adding %s to environment", p));
1548 putenv(p);
1549
1550 if ((p = (char *)malloc(((call->udata.len)<<1) + 20)) == NULL)
1551 return(-1);
1552 strcpy(p, NLSUDATA);
1553 strcat(p, "=");
1554 if ((int)call->udata.len >= 0)
1555 nlsaddr2c(p + strlen(p), call->udata.buf, (int)call->udata.len);
1556 putenv(p);
1557 return (0);
1558 }
1559
1560
1561 /*
1562 * parse: Parse TZ= string like init does for consistency
1563 * Work on string in place since result will
1564 * either be the same or shorter.
1565 */
1566
1567 char *
parse(s)1568 parse(s)
1569 char *s;
1570 {
1571 char *p;
1572 char *tp;
1573 char scratch[BUFSIZ];
1574 int delim;
1575
1576 tp = p = s + strlen("TZ="); /* skip TZ= in parsing */
1577 if ((*p == '"') || (*p == '\'')) {
1578 /* it is quoted */
1579 delim = *p++;
1580 for (;;) {
1581 if (*p == '\0') {
1582 /* etc/default/init ill-formed, go without TZ */
1583 sprintf(scratch, "%s ill-formed", TZFILE);
1584 logmessage(scratch);
1585 strcpy(s, "TZ=");
1586 return(s);
1587 }
1588 if (*p == delim) {
1589 *tp = '\0';
1590 return(s);
1591 }
1592 else {
1593 *tp++ = *p++;
1594 }
1595 }
1596 }
1597 else { /* look for comment or trailing whitespace */
1598 for ( ; *p && !isspace(*p) && *p != '#'; ++p)
1599 ;
1600 /* if a comment or trailing whitespace, trash it */
1601 if (*p) {
1602 *p = '\0';
1603 }
1604 return(s);
1605 }
1606 }
1607
1608
1609 /*
1610 * clr_call: clear out a call structure
1611 */
1612
1613 static void
clr_call(struct t_call * call)1614 clr_call(struct t_call *call)
1615 {
1616 call->sequence = 0;
1617 call->addr.len = 0;
1618 call->opt.len = 0;
1619 call->udata.len = 0;
1620 memset(call->addr.buf, 0, (int)call->addr.maxlen);
1621 memset(call->opt.buf, 0, (int)call->opt.maxlen);
1622 memset(call->udata.buf, 0, (int)call->udata.maxlen);
1623 }
1624
1625
1626 /*
1627 * pitchcall: remove call from pending list
1628 */
1629
1630 static void
pitchcall(struct call_list * pending,struct t_discon * discon)1631 pitchcall(struct call_list *pending, struct t_discon *discon)
1632 {
1633 struct callsave *p, *oldp;
1634
1635 DEBUG((9, "pitching call, sequence # is %d", discon->sequence));
1636 if (EMPTYLIST(pending)) {
1637 discon->sequence = -1;
1638 return;
1639 }
1640 p = pending->cl_head;
1641 oldp = (struct callsave *) NULL;
1642 while (p) {
1643 if (p->c_cp->sequence == discon->sequence) {
1644 if (oldp == (struct callsave *) NULL) {
1645 pending->cl_head = p->c_np;
1646 if (pending->cl_head == (struct callsave *) NULL) {
1647 pending->cl_tail = (struct callsave *) NULL;
1648 }
1649 }
1650 else if (p == pending->cl_tail) {
1651 oldp->c_np = p->c_np;
1652 pending->cl_tail = oldp;
1653 }
1654 else {
1655 oldp->c_np = p->c_np;
1656 }
1657 clr_call(p->c_cp);
1658 queue(Free_call_p, p);
1659 discon->sequence = -1;
1660 return;
1661 }
1662 oldp = p;
1663 p = p->c_np;
1664 }
1665 logmessage("received disconnect with no pending call");
1666 discon->sequence = -1;
1667 return;
1668 }
1669
1670 /*
1671 * add_prvaddr: open and bind the private address specified in the database
1672 * entry passed into the routine. Update the maxcon and fd
1673 * entries in the database structure
1674 *
1675 * This routine is very sloppy with malloc'ed memory, but addresses
1676 * shouldn't ever change enough for this to matter.
1677 */
1678
1679 int
add_prvaddr(dbp)1680 add_prvaddr(dbp)
1681 dbf_t *dbp;
1682 {
1683 extern char *t_alloc();
1684 int j;
1685 struct call_list *temp_pend;
1686 struct callsave *tmp;
1687 char scratch[BUFSIZ];
1688 int bindfd;
1689 extern struct netbuf *stoa();
1690 char str[NAMEBUFSZ];
1691 char *lstr = str;
1692 struct netbuf netbuf;
1693 int maxcon;
1694 char *ap;
1695 int clen;
1696
1697 DEBUG((9,"in add_prvaddr, addr %s, svc %s",
1698 (dbp->dbf_sflags & DFLAG) ? "DYNAMIC" : dbp->dbf_prv_adr,
1699 dbp->dbf_svc_code));
1700 netbuf.buf = NULL;
1701 netbuf.maxlen = 0;
1702 netbuf.len = 0;
1703 if (!(dbp->dbf_sflags & DFLAG)) {
1704 strcpy(lstr, dbp->dbf_prv_adr);
1705
1706 /* call stoa - convert from rfs address to netbuf */
1707
1708 if (stoa(lstr, &netbuf) == (struct netbuf *)NULL) {
1709 DEBUG((9,"stoa returned null, errno = %d\n",errno));
1710 error(1, E_MALLOC);
1711 return(-1);
1712 }
1713 clen = netbuf.len;
1714 }
1715 else {
1716 clen = -1;
1717 }
1718 if ((bindfd = open_bind(netbuf.buf, MAXCON, clen, &maxcon, &ap)) < 0) {
1719 switch (bindfd) {
1720 case -1:
1721 return(-1);
1722 break;
1723 case -2:
1724 sprintf(scratch, " Service %s ignored: out of file descriptors", dbp->dbf_svc_code);
1725 logmessage(scratch);
1726 return(-1);
1727 break;
1728 case -3:
1729 sprintf(scratch, " Service %s ignored: unable to bind requested address", dbp->dbf_svc_code);
1730 logmessage(scratch);
1731 return(-1);
1732 break;
1733 default:
1734 error(E_OPENBIND, EXIT);
1735 }
1736 }
1737 if (clen == -1) {
1738 sprintf(scratch,"Service %s: fd %d dynamic addr %s", dbp->dbf_svc_code, bindfd, ap);
1739 dbp->dbf_prv_adr = ap;
1740 }
1741 else {
1742 sprintf(scratch,"Service %s: fd %d addr %s", dbp->dbf_svc_code, bindfd, dbp->dbf_prv_adr);
1743 }
1744 logmessage(scratch);
1745 rpc_register(dbp);
1746 temp_pend = Priv_call + bindfd;
1747 dbp->dbf_fd = bindfd;
1748 dbp->dbf_maxcon = maxcon;
1749 temp_pend->cl_head = (struct callsave *) NULL;
1750 temp_pend->cl_tail = (struct callsave *) NULL;
1751 for (j=0; j < maxcon; ++j) {
1752 if ((tmp = (struct callsave *) malloc(sizeof(struct callsave))) == NULL) {
1753 error (E_MALLOC, NOCORE | EXIT);
1754 }
1755 if ((tmp->c_cp = (struct t_call *) t_alloc(bindfd, T_CALL,
1756 T_ALL)) == NULL) {
1757 tli_error(E_T_ALLOC,EXIT);
1758 }
1759 queue(Free_call_p, tmp);
1760 }
1761 return(0);
1762 }
1763
1764 /*
1765 * mod_prvaddr -- after re-reading the database, take appropriate action for
1766 * new, deleted, or changed addresses.
1767 */
1768 static void
mod_prvaddr(void)1769 mod_prvaddr(void)
1770 {
1771 dbf_t *entry_p;
1772 dbf_t *oldentry_p;
1773 char scratch[BUFSIZ];
1774 dbf_t *svc_code_match();
1775 int bound;
1776 struct pollfd *sp;
1777
1778 DEBUG((9, "in mod_prvaddr..."));
1779 /*
1780 * for each entry in the new table, check for a svc code match.
1781 * if there is a svc code match and the address matches, all we
1782 * need to do is update the new table. if the addresses are
1783 * different, we need to remove the old one and replace it.
1784 */
1785 for (entry_p = Newdbf; entry_p && entry_p->dbf_svc_code; entry_p++) {
1786 if ((oldentry_p = svc_code_match(entry_p->dbf_svc_code)) != NULL) {
1787 /* matched svc code. see if address matches. */
1788 DEBUG((9, "MATCHED service code"));
1789 if ((strcmp(oldentry_p->dbf_prv_adr, entry_p->dbf_prv_adr) == 0) || ((oldentry_p->dbf_sflags & DFLAG) && (entry_p->dbf_sflags & DFLAG))) {
1790 DEBUG((9, "SAME addresses, old %s, new %s",
1791 oldentry_p->dbf_prv_adr, entry_p->dbf_prv_adr));
1792 /* update new table with fd, set old fd to -1 */
1793 DEBUG((9, "Old fd %d", oldentry_p->dbf_fd));
1794 entry_p->dbf_fd = oldentry_p->dbf_fd;
1795 entry_p->dbf_maxcon = oldentry_p->dbf_maxcon;
1796 oldentry_p->dbf_fd = -1;
1797 if ((oldentry_p->dbf_sflags & DFLAG) && (entry_p->dbf_sflags & DFLAG)) {
1798 entry_p->dbf_prv_adr = oldentry_p->dbf_prv_adr;
1799 }
1800 if (entry_p->dbf_fd != -1) {
1801 sprintf(scratch, "Service %s: fd %d addr %s",
1802 entry_p->dbf_svc_code, entry_p->dbf_fd,
1803 entry_p->dbf_prv_adr);
1804 logmessage(scratch);
1805 }
1806 if ((oldentry_p->dbf_version != entry_p->dbf_version) || (oldentry_p->dbf_prognum != entry_p->dbf_prognum)) {
1807 rpc_unregister(oldentry_p);
1808 rpc_register(entry_p);
1809 }
1810 }
1811 }
1812 }
1813
1814 /* now unbind the remaining addresses in the old table (fd != -1) */
1815
1816 for (oldentry_p = Dbfhead; oldentry_p && oldentry_p->dbf_svc_code; oldentry_p++) {
1817 if (oldentry_p->dbf_fd != -1) {
1818 DEBUG((9, "deleting %s", oldentry_p->dbf_svc_code));
1819 if (del_prvaddr(oldentry_p) == 0)
1820 Valid_addrs--;
1821 }
1822 }
1823
1824 /* now bind all of the new addresses (fd == -1) */
1825 /*
1826 * this tries to bind any addresses that failed to bind successfully
1827 * when the address changed. This means that if a service is moved to
1828 * an address that is being deleted, the first attempt to bind it will
1829 * fail, the old address will be removed, and this bind will succeed
1830 */
1831
1832 /* first the static addrs */
1833 for (entry_p = Newdbf; entry_p && entry_p->dbf_svc_code; entry_p++) {
1834 if ((entry_p->dbf_fd == -1) && (!(entry_p->dbf_sflags & DFLAG))) {
1835 DEBUG((9, "adding %s", entry_p->dbf_svc_code));
1836 if (add_prvaddr(entry_p) == 0)
1837 Valid_addrs++;
1838 }
1839 }
1840 /* then the dynamic addrs */
1841 for (entry_p = Newdbf; entry_p && entry_p->dbf_svc_code; entry_p++) {
1842 if ((entry_p->dbf_fd == -1) && (entry_p->dbf_sflags & DFLAG)) {
1843 DEBUG((9, "adding %s", entry_p->dbf_svc_code));
1844 if (add_prvaddr(entry_p) == 0)
1845 Valid_addrs++;
1846 }
1847 }
1848
1849 /* free old database, set up new pollfd table, and we're done */
1850
1851 free(Dbfhead);
1852 free(Server_cmd_lines);
1853 Dbfhead = Newdbf;
1854 Newdbf = NULL;
1855 Server_cmd_lines = New_cmd_lines;
1856 sprintf(scratch, "Re-read complete, %d %s bound, %d fds free", Valid_addrs,
1857 (Valid_addrs == 1) ? "address" : "addresses",
1858 Ndesc-Valid_addrs-USEDFDS);
1859 logmessage(scratch);
1860
1861 /* Pollfds[0] is for _pmpipe */
1862 sp = &Pollfds[1];
1863 for (entry_p = Dbfhead; entry_p && entry_p->dbf_svc_code; entry_p++) {
1864 if (entry_p->dbf_fd >= 0) {
1865 sp->fd = entry_p->dbf_fd;
1866 DEBUG((9, "adding %d to poll struct", entry_p->dbf_fd));
1867 sp->events = POLLIN;
1868 sp->revents = 0;
1869 sp++;
1870 }
1871 }
1872 }
1873
1874 /*
1875 * unbind the address, close the file descriptor, and free call structs
1876 */
1877
1878 int
del_prvaddr(dbp)1879 del_prvaddr(dbp)
1880 dbf_t *dbp;
1881 {
1882 struct callsave *tmp;
1883 struct call_list *q;
1884 struct t_call *call;
1885 int i;
1886 char scratch[BUFSIZ];
1887
1888 DEBUG((9, "in del_prvaddr..."));
1889 rpc_unregister(dbp);
1890 if (dbp->dbf_fd < 0)
1891 return -1;
1892
1893 q = Priv_call + dbp->dbf_fd;
1894 i = 0;
1895
1896 /* delete pending calls */
1897 while ((tmp = dequeue(q)) != NULL) {
1898 i++;
1899 call = tmp->c_cp;
1900 t_snddis(dbp->dbf_fd, call);
1901 t_free((char *)call, T_CALL);
1902 free(tmp);
1903 }
1904
1905 /* delete free call structs we don't need */
1906 for ( ; i < dbp->dbf_maxcon; i++) {
1907 tmp = dequeue(Free_call_p);
1908 t_free((char *)tmp->c_cp, T_CALL);
1909 free(tmp);
1910 }
1911
1912 t_unbind(dbp->dbf_fd);
1913 t_close(dbp->dbf_fd);
1914 sprintf(scratch, "Unbind %s: fd %d addr %s", dbp->dbf_svc_code,
1915 dbp->dbf_fd, dbp->dbf_prv_adr);
1916 logmessage(scratch);
1917 dbp->dbf_fd = -1;
1918 return 0;
1919 }
1920
1921
1922 /*
1923 * look through the old database file to see if this service code matches
1924 * one already present
1925 */
1926
1927 dbf_t *
svc_code_match(new_code)1928 svc_code_match(new_code)
1929 char *new_code;
1930 {
1931 dbf_t *dbp;
1932
1933 for (dbp = Dbfhead; dbp && dbp->dbf_svc_code; dbp++) {
1934 if (strcmp(dbp->dbf_svc_code, new_code) == 0)
1935 return(dbp);
1936 }
1937 return((dbf_t *)NULL);
1938 }
1939
1940
1941 /*
1942 * register an rpc service with rpcbind
1943 */
1944
1945 void
rpc_register(dbp)1946 rpc_register(dbp)
1947 dbf_t *dbp;
1948 {
1949 char str[NAMEBUFSZ];
1950 char scratch[BUFSIZ];
1951 char *lstr = str;
1952 struct netbuf netbuf;
1953 extern struct netbuf *stoa();
1954 extern int errno;
1955
1956 DEBUG((9, "in rpc_register"));
1957 if (dbp->dbf_prognum == -1 || dbp->dbf_version == -1)
1958 /* not an rpc service */
1959 return;
1960
1961 rpc_unregister(dbp);
1962 netbuf.buf = NULL;
1963 netbuf.maxlen = 0;
1964 netbuf.len = 0;
1965 strcpy(lstr, dbp->dbf_prv_adr);
1966 if (stoa(lstr, &netbuf) == (struct netbuf *)NULL) {
1967 DEBUG((9,"stoa returned null, errno = %d\n",errno));
1968 error(1, E_MALLOC);
1969 return;
1970 }
1971 if (rpcb_set(dbp->dbf_prognum, dbp->dbf_version, Netconf, &netbuf)) {
1972 sprintf(scratch," registered with rpcbind, prognum %d version %d", dbp->dbf_prognum, dbp->dbf_version);
1973 logmessage(scratch);
1974 }
1975 else {
1976 logmessage("rpcb_set failed, service not registered with rpcbind");
1977 }
1978 return;
1979 }
1980
1981
1982 /*
1983 * unregister an rpc service with rpcbind
1984 */
1985
1986 void
rpc_unregister(dbp)1987 rpc_unregister(dbp)
1988 dbf_t *dbp;
1989 {
1990 DEBUG((9, "in rpc_unregister"));
1991 if (dbp->dbf_prognum == -1 || dbp->dbf_version == -1)
1992 /* not an rpc service */
1993 return;
1994 (void) rpcb_unset(dbp->dbf_prognum, dbp->dbf_version, Netconf);
1995 }
1996