18360efbdSAlfred Perlstein /* $NetBSD: svc.c,v 1.21 2000/07/06 03:10:35 christos Exp $ */ 28360efbdSAlfred Perlstein 32e322d37SHiroki Sato /*- 42e322d37SHiroki Sato * Copyright (c) 2009, Sun Microsystems, Inc. 52e322d37SHiroki Sato * All rights reserved. 699064799SGarrett Wollman * 72e322d37SHiroki Sato * Redistribution and use in source and binary forms, with or without 82e322d37SHiroki Sato * modification, are permitted provided that the following conditions are met: 92e322d37SHiroki Sato * - Redistributions of source code must retain the above copyright notice, 102e322d37SHiroki Sato * this list of conditions and the following disclaimer. 112e322d37SHiroki Sato * - Redistributions in binary form must reproduce the above copyright notice, 122e322d37SHiroki Sato * this list of conditions and the following disclaimer in the documentation 132e322d37SHiroki Sato * and/or other materials provided with the distribution. 142e322d37SHiroki Sato * - Neither the name of Sun Microsystems, Inc. nor the names of its 152e322d37SHiroki Sato * contributors may be used to endorse or promote products derived 162e322d37SHiroki Sato * from this software without specific prior written permission. 1799064799SGarrett Wollman * 182e322d37SHiroki Sato * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 192e322d37SHiroki Sato * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 202e322d37SHiroki Sato * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 212e322d37SHiroki Sato * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 222e322d37SHiroki Sato * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 232e322d37SHiroki Sato * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 242e322d37SHiroki Sato * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 252e322d37SHiroki Sato * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 262e322d37SHiroki Sato * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 272e322d37SHiroki Sato * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 282e322d37SHiroki Sato * POSSIBILITY OF SUCH DAMAGE. 2999064799SGarrett Wollman */ 3099064799SGarrett Wollman 3199064799SGarrett Wollman #if defined(LIBC_SCCS) && !defined(lint) 32a986ef57SDavid E. O'Brien static char *sccsid2 = "@(#)svc.c 1.44 88/02/08 Copyr 1984 Sun Micro"; 33d3d20c82SDavid E. O'Brien static char *sccsid = "@(#)svc.c 2.4 88/08/11 4.0 RPCSRC"; 3499064799SGarrett Wollman #endif 35d3d20c82SDavid E. O'Brien #include <sys/cdefs.h> 36d3d20c82SDavid E. O'Brien __FBSDID("$FreeBSD$"); 3799064799SGarrett Wollman 3899064799SGarrett Wollman /* 3999064799SGarrett Wollman * svc.c, Server-side remote procedure call interface. 4099064799SGarrett Wollman * 4199064799SGarrett Wollman * There are two sets of procedures here. The xprt routines are 4299064799SGarrett Wollman * for handling transport handles. The svc routines handle the 4399064799SGarrett Wollman * list of service routines. 4499064799SGarrett Wollman * 4599064799SGarrett Wollman * Copyright (C) 1984, Sun Microsystems, Inc. 4699064799SGarrett Wollman */ 4799064799SGarrett Wollman 488360efbdSAlfred Perlstein #include "namespace.h" 499f5afc13SIan Dowse #include "reentrant.h" 508360efbdSAlfred Perlstein #include <sys/types.h> 518360efbdSAlfred Perlstein #include <sys/poll.h> 528360efbdSAlfred Perlstein #include <assert.h> 538360efbdSAlfred Perlstein #include <errno.h> 544c3af266SPoul-Henning Kamp #include <stdlib.h> 558360efbdSAlfred Perlstein #include <string.h> 568360efbdSAlfred Perlstein 5799064799SGarrett Wollman #include <rpc/rpc.h> 588360efbdSAlfred Perlstein #ifdef PORTMAP 5999064799SGarrett Wollman #include <rpc/pmap_clnt.h> 608360efbdSAlfred Perlstein #endif /* PORTMAP */ 618360efbdSAlfred Perlstein #include "un-namespace.h" 628360efbdSAlfred Perlstein 638360efbdSAlfred Perlstein #include "rpc_com.h" 64235baf26SDaniel Eischen #include "mt_misc.h" 6599064799SGarrett Wollman 6699064799SGarrett Wollman #define RQCRED_SIZE 400 /* this size is excessive */ 6799064799SGarrett Wollman 688360efbdSAlfred Perlstein #define SVC_VERSQUIET 0x0001 /* keep quiet about vers mismatch */ 698f55a568SDoug Rabson #define version_keepquiet(xp) (SVC_EXT(xp)->xp_flags & SVC_VERSQUIET) 708360efbdSAlfred Perlstein 71ae1e6afdSPeter Wemm #define max(a, b) (a > b ? a : b) 727d6a21b4SJames Raynard 7399064799SGarrett Wollman /* 7499064799SGarrett Wollman * The services list 7599064799SGarrett Wollman * Each entry represents a set of procedures (an rpc program). 7699064799SGarrett Wollman * The dispatch routine takes request structs and runs the 7799064799SGarrett Wollman * apropriate procedure. 7899064799SGarrett Wollman */ 7999064799SGarrett Wollman static struct svc_callout { 8099064799SGarrett Wollman struct svc_callout *sc_next; 818360efbdSAlfred Perlstein rpcprog_t sc_prog; 828360efbdSAlfred Perlstein rpcvers_t sc_vers; 838360efbdSAlfred Perlstein char *sc_netid; 84c05ac53bSDavid E. O'Brien void (*sc_dispatch)(struct svc_req *, SVCXPRT *); 8599064799SGarrett Wollman } *svc_head; 8699064799SGarrett Wollman 87635d1cf1SDavid Chisnall SVCXPRT **__svc_xports; 88635d1cf1SDavid Chisnall int __svc_maxrec; 89635d1cf1SDavid Chisnall 901372519bSDavid E. O'Brien static struct svc_callout *svc_find(rpcprog_t, rpcvers_t, 911372519bSDavid E. O'Brien struct svc_callout **, char *); 9208497c02SMartin Blapp static void __xprt_do_unregister (SVCXPRT *xprt, bool_t dolock); 93ae1e6afdSPeter Wemm 9499064799SGarrett Wollman /* *************** SVCXPRT related stuff **************** */ 9599064799SGarrett Wollman 9699064799SGarrett Wollman /* 9799064799SGarrett Wollman * Activate a transport handle. 9899064799SGarrett Wollman */ 9999064799SGarrett Wollman void 100*193d994dSCraig Rodrigues xprt_register(SVCXPRT *xprt) 10199064799SGarrett Wollman { 1028360efbdSAlfred Perlstein int sock; 10399064799SGarrett Wollman 1048360efbdSAlfred Perlstein assert(xprt != NULL); 10599064799SGarrett Wollman 1068360efbdSAlfred Perlstein sock = xprt->xp_fd; 1078360efbdSAlfred Perlstein 1088360efbdSAlfred Perlstein rwlock_wrlock(&svc_fd_lock); 10908497c02SMartin Blapp if (__svc_xports == NULL) { 11008497c02SMartin Blapp __svc_xports = (SVCXPRT **) 1118360efbdSAlfred Perlstein mem_alloc(FD_SETSIZE * sizeof(SVCXPRT *)); 112ed8ddc6eSKonstantin Belousov if (__svc_xports == NULL) { 113ed8ddc6eSKonstantin Belousov rwlock_unlock(&svc_fd_lock); 1148360efbdSAlfred Perlstein return; 115ed8ddc6eSKonstantin Belousov } 11608497c02SMartin Blapp memset(__svc_xports, '\0', FD_SETSIZE * sizeof(SVCXPRT *)); 117ae1e6afdSPeter Wemm } 1188360efbdSAlfred Perlstein if (sock < FD_SETSIZE) { 11908497c02SMartin Blapp __svc_xports[sock] = xprt; 1208360efbdSAlfred Perlstein FD_SET(sock, &svc_fdset); 121ae1e6afdSPeter Wemm svc_maxfd = max(svc_maxfd, sock); 12299064799SGarrett Wollman } 1238360efbdSAlfred Perlstein rwlock_unlock(&svc_fd_lock); 1248360efbdSAlfred Perlstein } 12599064799SGarrett Wollman 12608497c02SMartin Blapp void 12708497c02SMartin Blapp xprt_unregister(SVCXPRT *xprt) 12808497c02SMartin Blapp { 12908497c02SMartin Blapp __xprt_do_unregister(xprt, TRUE); 13008497c02SMartin Blapp } 13108497c02SMartin Blapp 13208497c02SMartin Blapp void 13308497c02SMartin Blapp __xprt_unregister_unlocked(SVCXPRT *xprt) 13408497c02SMartin Blapp { 13508497c02SMartin Blapp __xprt_do_unregister(xprt, FALSE); 13608497c02SMartin Blapp } 13708497c02SMartin Blapp 13899064799SGarrett Wollman /* 13999064799SGarrett Wollman * De-activate a transport handle. 14099064799SGarrett Wollman */ 14108497c02SMartin Blapp static void 142*193d994dSCraig Rodrigues __xprt_do_unregister(SVCXPRT *xprt, bool_t dolock) 14399064799SGarrett Wollman { 1448360efbdSAlfred Perlstein int sock; 14599064799SGarrett Wollman 1468360efbdSAlfred Perlstein assert(xprt != NULL); 1478360efbdSAlfred Perlstein 1488360efbdSAlfred Perlstein sock = xprt->xp_fd; 1498360efbdSAlfred Perlstein 15008497c02SMartin Blapp if (dolock) 1518360efbdSAlfred Perlstein rwlock_wrlock(&svc_fd_lock); 15208497c02SMartin Blapp if ((sock < FD_SETSIZE) && (__svc_xports[sock] == xprt)) { 15308497c02SMartin Blapp __svc_xports[sock] = NULL; 15499064799SGarrett Wollman FD_CLR(sock, &svc_fdset); 1558360efbdSAlfred Perlstein if (sock >= svc_maxfd) { 156ae1e6afdSPeter Wemm for (svc_maxfd--; svc_maxfd>=0; svc_maxfd--) 15708497c02SMartin Blapp if (__svc_xports[svc_maxfd]) 158ae1e6afdSPeter Wemm break; 15999064799SGarrett Wollman } 16099064799SGarrett Wollman } 16108497c02SMartin Blapp if (dolock) 1628360efbdSAlfred Perlstein rwlock_unlock(&svc_fd_lock); 16399064799SGarrett Wollman } 16499064799SGarrett Wollman 1658360efbdSAlfred Perlstein /* 1668360efbdSAlfred Perlstein * Add a service program to the callout list. 1678360efbdSAlfred Perlstein * The dispatch routine will be called when a rpc request for this 1688360efbdSAlfred Perlstein * program number comes in. 1698360efbdSAlfred Perlstein */ 1708360efbdSAlfred Perlstein bool_t 171*193d994dSCraig Rodrigues svc_reg(SVCXPRT *xprt, const rpcprog_t prog, const rpcvers_t vers, 172*193d994dSCraig Rodrigues void (*dispatch)(struct svc_req *, SVCXPRT *), 173*193d994dSCraig Rodrigues const struct netconfig *nconf) 1748360efbdSAlfred Perlstein { 1758360efbdSAlfred Perlstein bool_t dummy; 1768360efbdSAlfred Perlstein struct svc_callout *prev; 1778360efbdSAlfred Perlstein struct svc_callout *s; 1788360efbdSAlfred Perlstein struct netconfig *tnconf; 1798360efbdSAlfred Perlstein char *netid = NULL; 1808360efbdSAlfred Perlstein int flag = 0; 1818360efbdSAlfred Perlstein 1828360efbdSAlfred Perlstein /* VARIABLES PROTECTED BY svc_lock: s, prev, svc_head */ 1838360efbdSAlfred Perlstein 1848360efbdSAlfred Perlstein if (xprt->xp_netid) { 1858360efbdSAlfred Perlstein netid = strdup(xprt->xp_netid); 1868360efbdSAlfred Perlstein flag = 1; 1878360efbdSAlfred Perlstein } else if (nconf && nconf->nc_netid) { 1888360efbdSAlfred Perlstein netid = strdup(nconf->nc_netid); 1898360efbdSAlfred Perlstein flag = 1; 1908360efbdSAlfred Perlstein } else if ((tnconf = __rpcgettp(xprt->xp_fd)) != NULL) { 1918360efbdSAlfred Perlstein netid = strdup(tnconf->nc_netid); 1928360efbdSAlfred Perlstein flag = 1; 1938360efbdSAlfred Perlstein freenetconfigent(tnconf); 1948360efbdSAlfred Perlstein } /* must have been created with svc_raw_create */ 1958360efbdSAlfred Perlstein if ((netid == NULL) && (flag == 1)) { 1968360efbdSAlfred Perlstein return (FALSE); 1978360efbdSAlfred Perlstein } 1988360efbdSAlfred Perlstein 1998360efbdSAlfred Perlstein rwlock_wrlock(&svc_lock); 2008360efbdSAlfred Perlstein if ((s = svc_find(prog, vers, &prev, netid)) != NULL) { 2018360efbdSAlfred Perlstein if (netid) 2028360efbdSAlfred Perlstein free(netid); 2038360efbdSAlfred Perlstein if (s->sc_dispatch == dispatch) 2048360efbdSAlfred Perlstein goto rpcb_it; /* he is registering another xptr */ 2058360efbdSAlfred Perlstein rwlock_unlock(&svc_lock); 2068360efbdSAlfred Perlstein return (FALSE); 2078360efbdSAlfred Perlstein } 2088360efbdSAlfred Perlstein s = mem_alloc(sizeof (struct svc_callout)); 2098360efbdSAlfred Perlstein if (s == NULL) { 2108360efbdSAlfred Perlstein if (netid) 2118360efbdSAlfred Perlstein free(netid); 2128360efbdSAlfred Perlstein rwlock_unlock(&svc_lock); 2138360efbdSAlfred Perlstein return (FALSE); 2148360efbdSAlfred Perlstein } 2158360efbdSAlfred Perlstein 2168360efbdSAlfred Perlstein s->sc_prog = prog; 2178360efbdSAlfred Perlstein s->sc_vers = vers; 2188360efbdSAlfred Perlstein s->sc_dispatch = dispatch; 2198360efbdSAlfred Perlstein s->sc_netid = netid; 2208360efbdSAlfred Perlstein s->sc_next = svc_head; 2218360efbdSAlfred Perlstein svc_head = s; 2228360efbdSAlfred Perlstein 2238360efbdSAlfred Perlstein if ((xprt->xp_netid == NULL) && (flag == 1) && netid) 2248360efbdSAlfred Perlstein ((SVCXPRT *) xprt)->xp_netid = strdup(netid); 2258360efbdSAlfred Perlstein 2268360efbdSAlfred Perlstein rpcb_it: 2278360efbdSAlfred Perlstein rwlock_unlock(&svc_lock); 2288360efbdSAlfred Perlstein /* now register the information with the local binder service */ 2298360efbdSAlfred Perlstein if (nconf) { 2308360efbdSAlfred Perlstein /*LINTED const castaway*/ 2318360efbdSAlfred Perlstein dummy = rpcb_set(prog, vers, (struct netconfig *) nconf, 2328360efbdSAlfred Perlstein &((SVCXPRT *) xprt)->xp_ltaddr); 2338360efbdSAlfred Perlstein return (dummy); 2348360efbdSAlfred Perlstein } 2358360efbdSAlfred Perlstein return (TRUE); 2368360efbdSAlfred Perlstein } 2378360efbdSAlfred Perlstein 2388360efbdSAlfred Perlstein /* 2398360efbdSAlfred Perlstein * Remove a service program from the callout list. 2408360efbdSAlfred Perlstein */ 2418360efbdSAlfred Perlstein void 242*193d994dSCraig Rodrigues svc_unreg(const rpcprog_t prog, const rpcvers_t vers) 2438360efbdSAlfred Perlstein { 2448360efbdSAlfred Perlstein struct svc_callout *prev; 2458360efbdSAlfred Perlstein struct svc_callout *s; 2468360efbdSAlfred Perlstein 2478360efbdSAlfred Perlstein /* unregister the information anyway */ 2488360efbdSAlfred Perlstein (void) rpcb_unset(prog, vers, NULL); 2498360efbdSAlfred Perlstein rwlock_wrlock(&svc_lock); 2508360efbdSAlfred Perlstein while ((s = svc_find(prog, vers, &prev, NULL)) != NULL) { 2518360efbdSAlfred Perlstein if (prev == NULL) { 2528360efbdSAlfred Perlstein svc_head = s->sc_next; 2538360efbdSAlfred Perlstein } else { 2548360efbdSAlfred Perlstein prev->sc_next = s->sc_next; 2558360efbdSAlfred Perlstein } 2568360efbdSAlfred Perlstein s->sc_next = NULL; 2578360efbdSAlfred Perlstein if (s->sc_netid) 2588360efbdSAlfred Perlstein mem_free(s->sc_netid, sizeof (s->sc_netid) + 1); 2598360efbdSAlfred Perlstein mem_free(s, sizeof (struct svc_callout)); 2608360efbdSAlfred Perlstein } 2618360efbdSAlfred Perlstein rwlock_unlock(&svc_lock); 2628360efbdSAlfred Perlstein } 26399064799SGarrett Wollman 26499064799SGarrett Wollman /* ********************** CALLOUT list related stuff ************* */ 26599064799SGarrett Wollman 2668360efbdSAlfred Perlstein #ifdef PORTMAP 26799064799SGarrett Wollman /* 26899064799SGarrett Wollman * Add a service program to the callout list. 26999064799SGarrett Wollman * The dispatch routine will be called when a rpc request for this 27099064799SGarrett Wollman * program number comes in. 27199064799SGarrett Wollman */ 27299064799SGarrett Wollman bool_t 273*193d994dSCraig Rodrigues svc_register(SVCXPRT *xprt, u_long prog, u_long vers, 274*193d994dSCraig Rodrigues void (*dispatch)(struct svc_req *, SVCXPRT *), 275*193d994dSCraig Rodrigues int protocol) 27699064799SGarrett Wollman { 27799064799SGarrett Wollman struct svc_callout *prev; 2788360efbdSAlfred Perlstein struct svc_callout *s; 27999064799SGarrett Wollman 2808360efbdSAlfred Perlstein assert(xprt != NULL); 2818360efbdSAlfred Perlstein assert(dispatch != NULL); 2828360efbdSAlfred Perlstein 2838360efbdSAlfred Perlstein if ((s = svc_find((rpcprog_t)prog, (rpcvers_t)vers, &prev, NULL)) != 2848360efbdSAlfred Perlstein NULL) { 28599064799SGarrett Wollman if (s->sc_dispatch == dispatch) 28699064799SGarrett Wollman goto pmap_it; /* he is registering another xptr */ 28799064799SGarrett Wollman return (FALSE); 28899064799SGarrett Wollman } 2898360efbdSAlfred Perlstein s = mem_alloc(sizeof(struct svc_callout)); 2908360efbdSAlfred Perlstein if (s == NULL) { 29199064799SGarrett Wollman return (FALSE); 29299064799SGarrett Wollman } 2938360efbdSAlfred Perlstein s->sc_prog = (rpcprog_t)prog; 2948360efbdSAlfred Perlstein s->sc_vers = (rpcvers_t)vers; 29599064799SGarrett Wollman s->sc_dispatch = dispatch; 29699064799SGarrett Wollman s->sc_next = svc_head; 29799064799SGarrett Wollman svc_head = s; 29899064799SGarrett Wollman pmap_it: 29999064799SGarrett Wollman /* now register the information with the local binder service */ 30099064799SGarrett Wollman if (protocol) { 30199064799SGarrett Wollman return (pmap_set(prog, vers, protocol, xprt->xp_port)); 30299064799SGarrett Wollman } 30399064799SGarrett Wollman return (TRUE); 30499064799SGarrett Wollman } 30599064799SGarrett Wollman 30699064799SGarrett Wollman /* 30799064799SGarrett Wollman * Remove a service program from the callout list. 30899064799SGarrett Wollman */ 30999064799SGarrett Wollman void 310*193d994dSCraig Rodrigues svc_unregister(u_long prog, u_long vers) 31199064799SGarrett Wollman { 31299064799SGarrett Wollman struct svc_callout *prev; 3138360efbdSAlfred Perlstein struct svc_callout *s; 31499064799SGarrett Wollman 3158360efbdSAlfred Perlstein if ((s = svc_find((rpcprog_t)prog, (rpcvers_t)vers, &prev, NULL)) == 3168360efbdSAlfred Perlstein NULL) 31799064799SGarrett Wollman return; 3188360efbdSAlfred Perlstein if (prev == NULL) { 31999064799SGarrett Wollman svc_head = s->sc_next; 32099064799SGarrett Wollman } else { 32199064799SGarrett Wollman prev->sc_next = s->sc_next; 32299064799SGarrett Wollman } 3238360efbdSAlfred Perlstein s->sc_next = NULL; 3248360efbdSAlfred Perlstein mem_free(s, sizeof(struct svc_callout)); 32599064799SGarrett Wollman /* now unregister the information with the local binder service */ 32699064799SGarrett Wollman (void)pmap_unset(prog, vers); 32799064799SGarrett Wollman } 3288360efbdSAlfred Perlstein #endif /* PORTMAP */ 32999064799SGarrett Wollman 33099064799SGarrett Wollman /* 33199064799SGarrett Wollman * Search the callout list for a program number, return the callout 33299064799SGarrett Wollman * struct. 33399064799SGarrett Wollman */ 33499064799SGarrett Wollman static struct svc_callout * 335*193d994dSCraig Rodrigues svc_find(rpcprog_t prog, rpcvers_t vers, struct svc_callout **prev, 336*193d994dSCraig Rodrigues char *netid) 33799064799SGarrett Wollman { 3388360efbdSAlfred Perlstein struct svc_callout *s, *p; 33999064799SGarrett Wollman 3408360efbdSAlfred Perlstein assert(prev != NULL); 3418360efbdSAlfred Perlstein 3428360efbdSAlfred Perlstein p = NULL; 3438360efbdSAlfred Perlstein for (s = svc_head; s != NULL; s = s->sc_next) { 3448360efbdSAlfred Perlstein if (((s->sc_prog == prog) && (s->sc_vers == vers)) && 3458360efbdSAlfred Perlstein ((netid == NULL) || (s->sc_netid == NULL) || 3468360efbdSAlfred Perlstein (strcmp(netid, s->sc_netid) == 0))) 3478360efbdSAlfred Perlstein break; 34899064799SGarrett Wollman p = s; 34999064799SGarrett Wollman } 35099064799SGarrett Wollman *prev = p; 35199064799SGarrett Wollman return (s); 35299064799SGarrett Wollman } 35399064799SGarrett Wollman 35499064799SGarrett Wollman /* ******************* REPLY GENERATION ROUTINES ************ */ 35599064799SGarrett Wollman 35699064799SGarrett Wollman /* 35799064799SGarrett Wollman * Send a reply to an rpc request 35899064799SGarrett Wollman */ 35999064799SGarrett Wollman bool_t 360*193d994dSCraig Rodrigues svc_sendreply(SVCXPRT *xprt, xdrproc_t xdr_results, 361*193d994dSCraig Rodrigues void * xdr_location) 36299064799SGarrett Wollman { 36399064799SGarrett Wollman struct rpc_msg rply; 36499064799SGarrett Wollman 3658360efbdSAlfred Perlstein assert(xprt != NULL); 3668360efbdSAlfred Perlstein 36799064799SGarrett Wollman rply.rm_direction = REPLY; 36899064799SGarrett Wollman rply.rm_reply.rp_stat = MSG_ACCEPTED; 36999064799SGarrett Wollman rply.acpted_rply.ar_verf = xprt->xp_verf; 37099064799SGarrett Wollman rply.acpted_rply.ar_stat = SUCCESS; 37199064799SGarrett Wollman rply.acpted_rply.ar_results.where = xdr_location; 37299064799SGarrett Wollman rply.acpted_rply.ar_results.proc = xdr_results; 37399064799SGarrett Wollman return (SVC_REPLY(xprt, &rply)); 37499064799SGarrett Wollman } 37599064799SGarrett Wollman 37699064799SGarrett Wollman /* 37799064799SGarrett Wollman * No procedure error reply 37899064799SGarrett Wollman */ 37999064799SGarrett Wollman void 380*193d994dSCraig Rodrigues svcerr_noproc(SVCXPRT *xprt) 38199064799SGarrett Wollman { 38299064799SGarrett Wollman struct rpc_msg rply; 38399064799SGarrett Wollman 3848360efbdSAlfred Perlstein assert(xprt != NULL); 3858360efbdSAlfred Perlstein 38699064799SGarrett Wollman rply.rm_direction = REPLY; 38799064799SGarrett Wollman rply.rm_reply.rp_stat = MSG_ACCEPTED; 38899064799SGarrett Wollman rply.acpted_rply.ar_verf = xprt->xp_verf; 38999064799SGarrett Wollman rply.acpted_rply.ar_stat = PROC_UNAVAIL; 39099064799SGarrett Wollman SVC_REPLY(xprt, &rply); 39199064799SGarrett Wollman } 39299064799SGarrett Wollman 39399064799SGarrett Wollman /* 39499064799SGarrett Wollman * Can't decode args error reply 39599064799SGarrett Wollman */ 39699064799SGarrett Wollman void 397*193d994dSCraig Rodrigues svcerr_decode(SVCXPRT *xprt) 39899064799SGarrett Wollman { 39999064799SGarrett Wollman struct rpc_msg rply; 40099064799SGarrett Wollman 4018360efbdSAlfred Perlstein assert(xprt != NULL); 4028360efbdSAlfred Perlstein 40399064799SGarrett Wollman rply.rm_direction = REPLY; 40499064799SGarrett Wollman rply.rm_reply.rp_stat = MSG_ACCEPTED; 40599064799SGarrett Wollman rply.acpted_rply.ar_verf = xprt->xp_verf; 40699064799SGarrett Wollman rply.acpted_rply.ar_stat = GARBAGE_ARGS; 40799064799SGarrett Wollman SVC_REPLY(xprt, &rply); 40899064799SGarrett Wollman } 40999064799SGarrett Wollman 41099064799SGarrett Wollman /* 41199064799SGarrett Wollman * Some system error 41299064799SGarrett Wollman */ 41399064799SGarrett Wollman void 414*193d994dSCraig Rodrigues svcerr_systemerr(SVCXPRT *xprt) 41599064799SGarrett Wollman { 41699064799SGarrett Wollman struct rpc_msg rply; 41799064799SGarrett Wollman 4188360efbdSAlfred Perlstein assert(xprt != NULL); 4198360efbdSAlfred Perlstein 42099064799SGarrett Wollman rply.rm_direction = REPLY; 42199064799SGarrett Wollman rply.rm_reply.rp_stat = MSG_ACCEPTED; 42299064799SGarrett Wollman rply.acpted_rply.ar_verf = xprt->xp_verf; 42399064799SGarrett Wollman rply.acpted_rply.ar_stat = SYSTEM_ERR; 42499064799SGarrett Wollman SVC_REPLY(xprt, &rply); 42599064799SGarrett Wollman } 42699064799SGarrett Wollman 4278360efbdSAlfred Perlstein #if 0 4288360efbdSAlfred Perlstein /* 4298360efbdSAlfred Perlstein * Tell RPC package to not complain about version errors to the client. This 4308360efbdSAlfred Perlstein * is useful when revving broadcast protocols that sit on a fixed address. 4318360efbdSAlfred Perlstein * There is really one (or should be only one) example of this kind of 4328360efbdSAlfred Perlstein * protocol: the portmapper (or rpc binder). 4338360efbdSAlfred Perlstein */ 4348360efbdSAlfred Perlstein void 435*193d994dSCraig Rodrigues __svc_versquiet_on(SVCXPRT *xprt) 4368360efbdSAlfred Perlstein { 4378360efbdSAlfred Perlstein 4388f55a568SDoug Rabson SVC_EXT(xprt)->xp_flags |= SVC_VERSQUIET; 4398360efbdSAlfred Perlstein } 4408360efbdSAlfred Perlstein 4418360efbdSAlfred Perlstein void 442*193d994dSCraig Rodrigues __svc_versquiet_off(SVCXPRT *xprt) 4438360efbdSAlfred Perlstein { 4448360efbdSAlfred Perlstein 4458f55a568SDoug Rabson SVC_EXT(xprt)->xp_flags &= ~SVC_VERSQUIET; 4468360efbdSAlfred Perlstein } 4478360efbdSAlfred Perlstein 4488360efbdSAlfred Perlstein void 449*193d994dSCraig Rodrigues svc_versquiet(SVCXPRT *xprt) 4508360efbdSAlfred Perlstein { 4518360efbdSAlfred Perlstein __svc_versquiet_on(xprt); 4528360efbdSAlfred Perlstein } 4538360efbdSAlfred Perlstein 4548360efbdSAlfred Perlstein int 455*193d994dSCraig Rodrigues __svc_versquiet_get(SVCXPRT *xprt) 4568360efbdSAlfred Perlstein { 4578f55a568SDoug Rabson 4588f55a568SDoug Rabson return (SVC_EXT(xprt)->xp_flags & SVC_VERSQUIET); 4598360efbdSAlfred Perlstein } 4608360efbdSAlfred Perlstein #endif 4618360efbdSAlfred Perlstein 46299064799SGarrett Wollman /* 46399064799SGarrett Wollman * Authentication error reply 46499064799SGarrett Wollman */ 46599064799SGarrett Wollman void 466*193d994dSCraig Rodrigues svcerr_auth(SVCXPRT *xprt, enum auth_stat why) 46799064799SGarrett Wollman { 46899064799SGarrett Wollman struct rpc_msg rply; 46999064799SGarrett Wollman 4708360efbdSAlfred Perlstein assert(xprt != NULL); 4718360efbdSAlfred Perlstein 47299064799SGarrett Wollman rply.rm_direction = REPLY; 47399064799SGarrett Wollman rply.rm_reply.rp_stat = MSG_DENIED; 47499064799SGarrett Wollman rply.rjcted_rply.rj_stat = AUTH_ERROR; 47599064799SGarrett Wollman rply.rjcted_rply.rj_why = why; 47699064799SGarrett Wollman SVC_REPLY(xprt, &rply); 47799064799SGarrett Wollman } 47899064799SGarrett Wollman 47999064799SGarrett Wollman /* 48099064799SGarrett Wollman * Auth too weak error reply 48199064799SGarrett Wollman */ 48299064799SGarrett Wollman void 483*193d994dSCraig Rodrigues svcerr_weakauth(SVCXPRT *xprt) 48499064799SGarrett Wollman { 48599064799SGarrett Wollman 4868360efbdSAlfred Perlstein assert(xprt != NULL); 4878360efbdSAlfred Perlstein 48899064799SGarrett Wollman svcerr_auth(xprt, AUTH_TOOWEAK); 48999064799SGarrett Wollman } 49099064799SGarrett Wollman 49199064799SGarrett Wollman /* 49299064799SGarrett Wollman * Program unavailable error reply 49399064799SGarrett Wollman */ 49499064799SGarrett Wollman void 495*193d994dSCraig Rodrigues svcerr_noprog(SVCXPRT *xprt) 49699064799SGarrett Wollman { 49799064799SGarrett Wollman struct rpc_msg rply; 49899064799SGarrett Wollman 4998360efbdSAlfred Perlstein assert(xprt != NULL); 5008360efbdSAlfred Perlstein 50199064799SGarrett Wollman rply.rm_direction = REPLY; 50299064799SGarrett Wollman rply.rm_reply.rp_stat = MSG_ACCEPTED; 50399064799SGarrett Wollman rply.acpted_rply.ar_verf = xprt->xp_verf; 50499064799SGarrett Wollman rply.acpted_rply.ar_stat = PROG_UNAVAIL; 50599064799SGarrett Wollman SVC_REPLY(xprt, &rply); 50699064799SGarrett Wollman } 50799064799SGarrett Wollman 50899064799SGarrett Wollman /* 50999064799SGarrett Wollman * Program version mismatch error reply 51099064799SGarrett Wollman */ 51199064799SGarrett Wollman void 512*193d994dSCraig Rodrigues svcerr_progvers(SVCXPRT *xprt, rpcvers_t low_vers, rpcvers_t high_vers) 51399064799SGarrett Wollman { 51499064799SGarrett Wollman struct rpc_msg rply; 51599064799SGarrett Wollman 5168360efbdSAlfred Perlstein assert(xprt != NULL); 5178360efbdSAlfred Perlstein 51899064799SGarrett Wollman rply.rm_direction = REPLY; 51999064799SGarrett Wollman rply.rm_reply.rp_stat = MSG_ACCEPTED; 52099064799SGarrett Wollman rply.acpted_rply.ar_verf = xprt->xp_verf; 52199064799SGarrett Wollman rply.acpted_rply.ar_stat = PROG_MISMATCH; 5228360efbdSAlfred Perlstein rply.acpted_rply.ar_vers.low = (u_int32_t)low_vers; 5238360efbdSAlfred Perlstein rply.acpted_rply.ar_vers.high = (u_int32_t)high_vers; 52499064799SGarrett Wollman SVC_REPLY(xprt, &rply); 52599064799SGarrett Wollman } 52699064799SGarrett Wollman 5278f55a568SDoug Rabson /* 5288f55a568SDoug Rabson * Allocate a new server transport structure. All fields are 5298f55a568SDoug Rabson * initialized to zero and xp_p3 is initialized to point at an 5308f55a568SDoug Rabson * extension structure to hold various flags and authentication 5318f55a568SDoug Rabson * parameters. 5328f55a568SDoug Rabson */ 5338f55a568SDoug Rabson SVCXPRT * 534*193d994dSCraig Rodrigues svc_xprt_alloc(void) 5358f55a568SDoug Rabson { 5368f55a568SDoug Rabson SVCXPRT *xprt; 5378f55a568SDoug Rabson SVCXPRT_EXT *ext; 5388f55a568SDoug Rabson 5398f55a568SDoug Rabson xprt = mem_alloc(sizeof(SVCXPRT)); 540ed8ddc6eSKonstantin Belousov if (xprt == NULL) 541ed8ddc6eSKonstantin Belousov return (NULL); 5428f55a568SDoug Rabson memset(xprt, 0, sizeof(SVCXPRT)); 5438f55a568SDoug Rabson ext = mem_alloc(sizeof(SVCXPRT_EXT)); 544ed8ddc6eSKonstantin Belousov if (ext == NULL) { 545ed8ddc6eSKonstantin Belousov mem_free(xprt, sizeof(SVCXPRT)); 546ed8ddc6eSKonstantin Belousov return (NULL); 547ed8ddc6eSKonstantin Belousov } 5488f55a568SDoug Rabson memset(ext, 0, sizeof(SVCXPRT_EXT)); 5498f55a568SDoug Rabson xprt->xp_p3 = ext; 5504efa8f3eSDoug Rabson ext->xp_auth.svc_ah_ops = &svc_auth_null_ops; 5518f55a568SDoug Rabson 5528f55a568SDoug Rabson return (xprt); 5538f55a568SDoug Rabson } 5548f55a568SDoug Rabson 5558f55a568SDoug Rabson /* 5568f55a568SDoug Rabson * Free a server transport structure. 5578f55a568SDoug Rabson */ 5588f55a568SDoug Rabson void 559*193d994dSCraig Rodrigues svc_xprt_free(SVCXPRT *xprt) 5608f55a568SDoug Rabson { 5618f55a568SDoug Rabson 5628f55a568SDoug Rabson mem_free(xprt->xp_p3, sizeof(SVCXPRT_EXT)); 5638f55a568SDoug Rabson mem_free(xprt, sizeof(SVCXPRT)); 5648f55a568SDoug Rabson } 5658f55a568SDoug Rabson 56699064799SGarrett Wollman /* ******************* SERVER INPUT STUFF ******************* */ 56799064799SGarrett Wollman 56899064799SGarrett Wollman /* 56999064799SGarrett Wollman * Get server side input from some transport. 57099064799SGarrett Wollman * 57199064799SGarrett Wollman * Statement of authentication parameters management: 57299064799SGarrett Wollman * This function owns and manages all authentication parameters, specifically 57399064799SGarrett Wollman * the "raw" parameters (msg.rm_call.cb_cred and msg.rm_call.cb_verf) and 57499064799SGarrett Wollman * the "cooked" credentials (rqst->rq_clntcred). 57599064799SGarrett Wollman * However, this function does not know the structure of the cooked 57699064799SGarrett Wollman * credentials, so it make the following assumptions: 57799064799SGarrett Wollman * a) the structure is contiguous (no pointers), and 57899064799SGarrett Wollman * b) the cred structure size does not exceed RQCRED_SIZE bytes. 57999064799SGarrett Wollman * In all events, all three parameters are freed upon exit from this routine. 58099064799SGarrett Wollman * The storage is trivially management on the call stack in user land, but 58199064799SGarrett Wollman * is mallocated in kernel land. 58299064799SGarrett Wollman */ 58399064799SGarrett Wollman 58499064799SGarrett Wollman void 585*193d994dSCraig Rodrigues svc_getreq(int rdfds) 58699064799SGarrett Wollman { 58799064799SGarrett Wollman fd_set readfds; 58899064799SGarrett Wollman 58999064799SGarrett Wollman FD_ZERO(&readfds); 59099064799SGarrett Wollman readfds.fds_bits[0] = rdfds; 59199064799SGarrett Wollman svc_getreqset(&readfds); 59299064799SGarrett Wollman } 59399064799SGarrett Wollman 59499064799SGarrett Wollman void 595*193d994dSCraig Rodrigues svc_getreqset(fd_set *readfds) 59699064799SGarrett Wollman { 5978360efbdSAlfred Perlstein int bit, fd; 5988360efbdSAlfred Perlstein fd_mask mask, *maskp; 5998360efbdSAlfred Perlstein int sock; 6008360efbdSAlfred Perlstein 6018360efbdSAlfred Perlstein assert(readfds != NULL); 6028360efbdSAlfred Perlstein 6038360efbdSAlfred Perlstein maskp = readfds->fds_bits; 6048360efbdSAlfred Perlstein for (sock = 0; sock < FD_SETSIZE; sock += NFDBITS) { 60555fdae4cSJohn Baldwin for (mask = *maskp++; (bit = ffsl(mask)) != 0; 60655fdae4cSJohn Baldwin mask ^= (1ul << (bit - 1))) { 6078360efbdSAlfred Perlstein /* sock has input waiting */ 6088360efbdSAlfred Perlstein fd = sock + bit - 1; 6098360efbdSAlfred Perlstein svc_getreq_common(fd); 6108360efbdSAlfred Perlstein } 6118360efbdSAlfred Perlstein } 612ae1e6afdSPeter Wemm } 613ae1e6afdSPeter Wemm 614ae1e6afdSPeter Wemm void 615*193d994dSCraig Rodrigues svc_getreq_common(int fd) 61699064799SGarrett Wollman { 6178360efbdSAlfred Perlstein SVCXPRT *xprt; 6188360efbdSAlfred Perlstein struct svc_req r; 61999064799SGarrett Wollman struct rpc_msg msg; 62099064799SGarrett Wollman int prog_found; 6218360efbdSAlfred Perlstein rpcvers_t low_vers; 6228360efbdSAlfred Perlstein rpcvers_t high_vers; 6238360efbdSAlfred Perlstein enum xprt_stat stat; 62499064799SGarrett Wollman char cred_area[2*MAX_AUTH_BYTES + RQCRED_SIZE]; 6258360efbdSAlfred Perlstein 62699064799SGarrett Wollman msg.rm_call.cb_cred.oa_base = cred_area; 62799064799SGarrett Wollman msg.rm_call.cb_verf.oa_base = &(cred_area[MAX_AUTH_BYTES]); 62899064799SGarrett Wollman r.rq_clntcred = &(cred_area[2*MAX_AUTH_BYTES]); 62999064799SGarrett Wollman 6308360efbdSAlfred Perlstein rwlock_rdlock(&svc_fd_lock); 63108497c02SMartin Blapp xprt = __svc_xports[fd]; 6328360efbdSAlfred Perlstein rwlock_unlock(&svc_fd_lock); 633ae1e6afdSPeter Wemm if (xprt == NULL) 634ae1e6afdSPeter Wemm /* But do we control sock? */ 6358360efbdSAlfred Perlstein return; 63699064799SGarrett Wollman /* now receive msgs from xprtprt (support batch calls) */ 63799064799SGarrett Wollman do { 63899064799SGarrett Wollman if (SVC_RECV(xprt, &msg)) { 63999064799SGarrett Wollman 64099064799SGarrett Wollman /* now find the exported program and call it */ 6418360efbdSAlfred Perlstein struct svc_callout *s; 64299064799SGarrett Wollman enum auth_stat why; 64399064799SGarrett Wollman 64499064799SGarrett Wollman r.rq_xprt = xprt; 64599064799SGarrett Wollman r.rq_prog = msg.rm_call.cb_prog; 64699064799SGarrett Wollman r.rq_vers = msg.rm_call.cb_vers; 64799064799SGarrett Wollman r.rq_proc = msg.rm_call.cb_proc; 64899064799SGarrett Wollman r.rq_cred = msg.rm_call.cb_cred; 64999064799SGarrett Wollman /* first authenticate the message */ 65099064799SGarrett Wollman if ((why = _authenticate(&r, &msg)) != AUTH_OK) { 6518f55a568SDoug Rabson /* 6528f55a568SDoug Rabson * RPCSEC_GSS uses this return code 6538f55a568SDoug Rabson * for requests that form part of its 6548f55a568SDoug Rabson * context establishment protocol and 6558f55a568SDoug Rabson * should not be dispatched to the 6568f55a568SDoug Rabson * application. 6578f55a568SDoug Rabson */ 6588f55a568SDoug Rabson if (why != RPCSEC_GSS_NODISPATCH) 65999064799SGarrett Wollman svcerr_auth(xprt, why); 66099064799SGarrett Wollman goto call_done; 66199064799SGarrett Wollman } 66299064799SGarrett Wollman /* now match message with a registered service*/ 66399064799SGarrett Wollman prog_found = FALSE; 6648360efbdSAlfred Perlstein low_vers = (rpcvers_t) -1L; 6658360efbdSAlfred Perlstein high_vers = (rpcvers_t) 0L; 6668360efbdSAlfred Perlstein for (s = svc_head; s != NULL; s = s->sc_next) { 66799064799SGarrett Wollman if (s->sc_prog == r.rq_prog) { 66899064799SGarrett Wollman if (s->sc_vers == r.rq_vers) { 66999064799SGarrett Wollman (*s->sc_dispatch)(&r, xprt); 67099064799SGarrett Wollman goto call_done; 67199064799SGarrett Wollman } /* found correct version */ 67299064799SGarrett Wollman prog_found = TRUE; 67399064799SGarrett Wollman if (s->sc_vers < low_vers) 67499064799SGarrett Wollman low_vers = s->sc_vers; 67599064799SGarrett Wollman if (s->sc_vers > high_vers) 67699064799SGarrett Wollman high_vers = s->sc_vers; 67799064799SGarrett Wollman } /* found correct program */ 67899064799SGarrett Wollman } 67999064799SGarrett Wollman /* 68099064799SGarrett Wollman * if we got here, the program or version 68199064799SGarrett Wollman * is not served ... 68299064799SGarrett Wollman */ 68399064799SGarrett Wollman if (prog_found) 6848360efbdSAlfred Perlstein svcerr_progvers(xprt, low_vers, high_vers); 68599064799SGarrett Wollman else 68699064799SGarrett Wollman svcerr_noprog(xprt); 68799064799SGarrett Wollman /* Fall through to ... */ 68899064799SGarrett Wollman } 6898360efbdSAlfred Perlstein /* 6908360efbdSAlfred Perlstein * Check if the xprt has been disconnected in a 6918360efbdSAlfred Perlstein * recursive call in the service dispatch routine. 6928360efbdSAlfred Perlstein * If so, then break. 6938360efbdSAlfred Perlstein */ 6948360efbdSAlfred Perlstein rwlock_rdlock(&svc_fd_lock); 69508497c02SMartin Blapp if (xprt != __svc_xports[fd]) { 6968360efbdSAlfred Perlstein rwlock_unlock(&svc_fd_lock); 6978360efbdSAlfred Perlstein break; 6988360efbdSAlfred Perlstein } 6998360efbdSAlfred Perlstein rwlock_unlock(&svc_fd_lock); 70099064799SGarrett Wollman call_done: 70199064799SGarrett Wollman if ((stat = SVC_STAT(xprt)) == XPRT_DIED){ 70299064799SGarrett Wollman SVC_DESTROY(xprt); 70399064799SGarrett Wollman break; 70499064799SGarrett Wollman } 70599064799SGarrett Wollman } while (stat == XPRT_MOREREQS); 70699064799SGarrett Wollman } 7078360efbdSAlfred Perlstein 7088360efbdSAlfred Perlstein 7098360efbdSAlfred Perlstein void 710*193d994dSCraig Rodrigues svc_getreq_poll(struct pollfd *pfdp, int pollretval) 7118360efbdSAlfred Perlstein { 7128360efbdSAlfred Perlstein int i; 7138360efbdSAlfred Perlstein int fds_found; 7148360efbdSAlfred Perlstein 7158360efbdSAlfred Perlstein for (i = fds_found = 0; fds_found < pollretval; i++) { 7168360efbdSAlfred Perlstein struct pollfd *p = &pfdp[i]; 7178360efbdSAlfred Perlstein 7188360efbdSAlfred Perlstein if (p->revents) { 7198360efbdSAlfred Perlstein /* fd has input waiting */ 7208360efbdSAlfred Perlstein fds_found++; 7218360efbdSAlfred Perlstein /* 7228360efbdSAlfred Perlstein * We assume that this function is only called 7238360efbdSAlfred Perlstein * via someone _select()ing from svc_fdset or 7248360efbdSAlfred Perlstein * _poll()ing from svc_pollset[]. Thus it's safe 7258360efbdSAlfred Perlstein * to handle the POLLNVAL event by simply turning 7268360efbdSAlfred Perlstein * the corresponding bit off in svc_fdset. The 7278360efbdSAlfred Perlstein * svc_pollset[] array is derived from svc_fdset 7288360efbdSAlfred Perlstein * and so will also be updated eventually. 7298360efbdSAlfred Perlstein * 7308360efbdSAlfred Perlstein * XXX Should we do an xprt_unregister() instead? 7318360efbdSAlfred Perlstein */ 7328360efbdSAlfred Perlstein if (p->revents & POLLNVAL) { 7338360efbdSAlfred Perlstein rwlock_wrlock(&svc_fd_lock); 7348360efbdSAlfred Perlstein FD_CLR(p->fd, &svc_fdset); 7358360efbdSAlfred Perlstein rwlock_unlock(&svc_fd_lock); 7368360efbdSAlfred Perlstein } else 7378360efbdSAlfred Perlstein svc_getreq_common(p->fd); 7388360efbdSAlfred Perlstein } 73999064799SGarrett Wollman } 74099064799SGarrett Wollman } 74108497c02SMartin Blapp 74208497c02SMartin Blapp bool_t 74308497c02SMartin Blapp rpc_control(int what, void *arg) 74408497c02SMartin Blapp { 74508497c02SMartin Blapp int val; 74608497c02SMartin Blapp 74708497c02SMartin Blapp switch (what) { 74808497c02SMartin Blapp case RPC_SVC_CONNMAXREC_SET: 74908497c02SMartin Blapp val = *(int *)arg; 75008497c02SMartin Blapp if (val <= 0) 75108497c02SMartin Blapp return FALSE; 75208497c02SMartin Blapp __svc_maxrec = val; 75308497c02SMartin Blapp return TRUE; 75408497c02SMartin Blapp case RPC_SVC_CONNMAXREC_GET: 75508497c02SMartin Blapp *(int *)arg = __svc_maxrec; 75608497c02SMartin Blapp return TRUE; 75708497c02SMartin Blapp default: 75808497c02SMartin Blapp break; 75908497c02SMartin Blapp } 76008497c02SMartin Blapp return FALSE; 76108497c02SMartin Blapp } 762