svc.c revision 1.27 1 /* $NetBSD: svc.c,v 1.27 2005/12/03 15:16:19 yamt Exp $ */
2
3 /*
4 * Sun RPC is a product of Sun Microsystems, Inc. and is provided for
5 * unrestricted use provided that this legend is included on all tape
6 * media and as a part of the software program in whole or part. Users
7 * may copy or modify Sun RPC without charge, but are not authorized
8 * to license or distribute it to anyone else except as part of a product or
9 * program developed by the user.
10 *
11 * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
12 * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
13 * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
14 *
15 * Sun RPC is provided with no support and without any obligation on the
16 * part of Sun Microsystems, Inc. to assist in its use, correction,
17 * modification or enhancement.
18 *
19 * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
20 * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
21 * OR ANY PART THEREOF.
22 *
23 * In no event will Sun Microsystems, Inc. be liable for any lost revenue
24 * or profits or other special, indirect and consequential damages, even if
25 * Sun has been advised of the possibility of such damages.
26 *
27 * Sun Microsystems, Inc.
28 * 2550 Garcia Avenue
29 * Mountain View, California 94043
30 */
31
32 #include <sys/cdefs.h>
33 #if defined(LIBC_SCCS) && !defined(lint)
34 #if 0
35 static char *sccsid = "@(#)svc.c 1.44 88/02/08 Copyr 1984 Sun Micro";
36 static char *sccsid = "@(#)svc.c 2.4 88/08/11 4.0 RPCSRC";
37 #else
38 __RCSID("$NetBSD: svc.c,v 1.27 2005/12/03 15:16:19 yamt Exp $");
39 #endif
40 #endif
41
42 /*
43 * svc.c, Server-side remote procedure call interface.
44 *
45 * There are two sets of procedures here. The xprt routines are
46 * for handling transport handles. The svc routines handle the
47 * list of service routines.
48 *
49 * Copyright (C) 1984, Sun Microsystems, Inc.
50 */
51
52 #include "namespace.h"
53 #include "reentrant.h"
54 #include <sys/types.h>
55 #include <sys/poll.h>
56 #include <assert.h>
57 #include <errno.h>
58 #include <stdlib.h>
59 #include <string.h>
60
61 #include <rpc/rpc.h>
62 #ifdef PORTMAP
63 #include <rpc/pmap_clnt.h>
64 #endif
65
66 #include "rpc_internal.h"
67
68 #ifdef __weak_alias
69 __weak_alias(svc_getreq,_svc_getreq)
70 __weak_alias(svc_getreqset,_svc_getreqset)
71 __weak_alias(svc_getreq_common,_svc_getreq_common)
72 __weak_alias(svc_register,_svc_register)
73 __weak_alias(svc_reg,_svc_reg)
74 __weak_alias(svc_unreg,_svc_unreg)
75 __weak_alias(svc_sendreply,_svc_sendreply)
76 __weak_alias(svc_unregister,_svc_unregister)
77 __weak_alias(svcerr_auth,_svcerr_auth)
78 __weak_alias(svcerr_decode,_svcerr_decode)
79 __weak_alias(svcerr_noproc,_svcerr_noproc)
80 __weak_alias(svcerr_noprog,_svcerr_noprog)
81 __weak_alias(svcerr_progvers,_svcerr_progvers)
82 __weak_alias(svcerr_systemerr,_svcerr_systemerr)
83 __weak_alias(svcerr_weakauth,_svcerr_weakauth)
84 __weak_alias(xprt_register,_xprt_register)
85 __weak_alias(xprt_unregister,_xprt_unregister)
86 __weak_alias(rpc_control,_rpc_control)
87 #endif
88
89 SVCXPRT **__svc_xports;
90 int __svc_maxrec;
91
92 #define RQCRED_SIZE 400 /* this size is excessive */
93
94 #define SVC_VERSQUIET 0x0001 /* keep quiet about vers mismatch */
95 #define version_keepquiet(xp) ((u_long)(xp)->xp_p3 & SVC_VERSQUIET)
96
97 #define max(a, b) (a > b ? a : b)
98
99 /*
100 * The services list
101 * Each entry represents a set of procedures (an rpc program).
102 * The dispatch routine takes request structs and runs the
103 * apropriate procedure.
104 */
105 static struct svc_callout {
106 struct svc_callout *sc_next;
107 rpcprog_t sc_prog;
108 rpcvers_t sc_vers;
109 char *sc_netid;
110 void (*sc_dispatch) __P((struct svc_req *, SVCXPRT *));
111 } *svc_head;
112
113 #ifdef _REENTRANT
114 extern rwlock_t svc_lock;
115 extern rwlock_t svc_fd_lock;
116 #endif
117
118 static struct svc_callout *svc_find __P((rpcprog_t, rpcvers_t,
119 struct svc_callout **, char *));
120 static void __xprt_do_unregister __P((SVCXPRT *xprt, bool_t dolock));
121
122 /* *************** SVCXPRT related stuff **************** */
123
124 /*
125 * Activate a transport handle.
126 */
127 void
128 xprt_register(xprt)
129 SVCXPRT *xprt;
130 {
131 int sock;
132
133 _DIAGASSERT(xprt != NULL);
134
135 sock = xprt->xp_fd;
136
137 rwlock_wrlock(&svc_fd_lock);
138 if (__svc_xports == NULL) {
139 __svc_xports = (SVCXPRT **)
140 mem_alloc(FD_SETSIZE * sizeof(SVCXPRT *));
141 if (__svc_xports == NULL)
142 return;
143 memset(__svc_xports, '\0', FD_SETSIZE * sizeof(SVCXPRT *));
144 }
145 if (sock < FD_SETSIZE) {
146 __svc_xports[sock] = xprt;
147 FD_SET(sock, &svc_fdset);
148 svc_maxfd = max(svc_maxfd, sock);
149 }
150 rwlock_unlock(&svc_fd_lock);
151 }
152
153 void
154 xprt_unregister(SVCXPRT *xprt)
155 {
156 __xprt_do_unregister(xprt, TRUE);
157 }
158
159 void
160 __xprt_unregister_unlocked(SVCXPRT *xprt)
161 {
162 __xprt_do_unregister(xprt, FALSE);
163 }
164
165 /*
166 * De-activate a transport handle.
167 */
168 static void
169 __xprt_do_unregister(xprt, dolock)
170 SVCXPRT *xprt;
171 bool_t dolock;
172 {
173 int sock;
174
175 _DIAGASSERT(xprt != NULL);
176
177 sock = xprt->xp_fd;
178
179 if (dolock)
180 rwlock_wrlock(&svc_fd_lock);
181 if ((sock < FD_SETSIZE) && (__svc_xports[sock] == xprt)) {
182 __svc_xports[sock] = NULL;
183 FD_CLR(sock, &svc_fdset);
184 if (sock >= svc_maxfd) {
185 for (svc_maxfd--; svc_maxfd>=0; svc_maxfd--)
186 if (__svc_xports[svc_maxfd])
187 break;
188 }
189 }
190 if (dolock)
191 rwlock_unlock(&svc_fd_lock);
192 }
193
194 /*
195 * Add a service program to the callout list.
196 * The dispatch routine will be called when a rpc request for this
197 * program number comes in.
198 */
199 bool_t
200 svc_reg(xprt, prog, vers, dispatch, nconf)
201 SVCXPRT *xprt;
202 const rpcprog_t prog;
203 const rpcvers_t vers;
204 void (*dispatch) __P((struct svc_req *, SVCXPRT *));
205 const struct netconfig *nconf;
206 {
207 bool_t dummy;
208 struct svc_callout *prev;
209 struct svc_callout *s;
210 struct netconfig *tnconf;
211 char *netid = NULL;
212 int flag = 0;
213
214 _DIAGASSERT(xprt != NULL);
215 /* XXX: dispatch may be NULL ??? */
216
217 /* VARIABLES PROTECTED BY svc_lock: s, prev, svc_head */
218
219 if (xprt->xp_netid) {
220 netid = strdup(xprt->xp_netid);
221 flag = 1;
222 } else if (nconf && nconf->nc_netid) {
223 netid = strdup(nconf->nc_netid);
224 flag = 1;
225 } else if ((tnconf = __rpcgettp(xprt->xp_fd)) != NULL) {
226 netid = strdup(tnconf->nc_netid);
227 flag = 1;
228 freenetconfigent(tnconf);
229 } /* must have been created with svc_raw_create */
230 if ((netid == NULL) && (flag == 1)) {
231 return (FALSE);
232 }
233
234 rwlock_wrlock(&svc_lock);
235 if ((s = svc_find(prog, vers, &prev, netid)) != NULL) {
236 if (netid)
237 free(netid);
238 if (s->sc_dispatch == dispatch)
239 goto rpcb_it; /* he is registering another xptr */
240 rwlock_unlock(&svc_lock);
241 return (FALSE);
242 }
243 s = mem_alloc(sizeof (struct svc_callout));
244 if (s == NULL) {
245 if (netid)
246 free(netid);
247 rwlock_unlock(&svc_lock);
248 return (FALSE);
249 }
250
251 s->sc_prog = prog;
252 s->sc_vers = vers;
253 s->sc_dispatch = dispatch;
254 s->sc_netid = netid;
255 s->sc_next = svc_head;
256 svc_head = s;
257
258 if ((xprt->xp_netid == NULL) && (flag == 1) && netid)
259 ((SVCXPRT *) xprt)->xp_netid = strdup(netid);
260
261 rpcb_it:
262 rwlock_unlock(&svc_lock);
263 /* now register the information with the local binder service */
264 if (nconf) {
265 dummy = rpcb_set(prog, vers, __UNCONST(nconf),
266 &((SVCXPRT *) xprt)->xp_ltaddr);
267 return (dummy);
268 }
269 return (TRUE);
270 }
271
272 /*
273 * Remove a service program from the callout list.
274 */
275 void
276 svc_unreg(prog, vers)
277 const rpcprog_t prog;
278 const rpcvers_t vers;
279 {
280 struct svc_callout *prev;
281 struct svc_callout *s;
282
283 /* unregister the information anyway */
284 (void) rpcb_unset(prog, vers, NULL);
285 rwlock_wrlock(&svc_lock);
286 while ((s = svc_find(prog, vers, &prev, NULL)) != NULL) {
287 if (prev == NULL) {
288 svc_head = s->sc_next;
289 } else {
290 prev->sc_next = s->sc_next;
291 }
292 s->sc_next = NULL;
293 if (s->sc_netid)
294 mem_free(s->sc_netid, sizeof (s->sc_netid) + 1);
295 mem_free(s, sizeof (struct svc_callout));
296 }
297 rwlock_unlock(&svc_lock);
298 }
299
300 /* ********************** CALLOUT list related stuff ************* */
301
302 #ifdef PORTMAP
303 /*
304 * Add a service program to the callout list.
305 * The dispatch routine will be called when a rpc request for this
306 * program number comes in.
307 */
308 bool_t
309 svc_register(xprt, prog, vers, dispatch, protocol)
310 SVCXPRT *xprt;
311 u_long prog;
312 u_long vers;
313 void (*dispatch) __P((struct svc_req *, SVCXPRT *));
314 int protocol;
315 {
316 struct svc_callout *prev;
317 struct svc_callout *s;
318
319 _DIAGASSERT(xprt != NULL);
320 _DIAGASSERT(dispatch != NULL);
321
322 if ((s = svc_find((rpcprog_t)prog, (rpcvers_t)vers, &prev, NULL)) !=
323 NULL) {
324 if (s->sc_dispatch == dispatch)
325 goto pmap_it; /* he is registering another xptr */
326 return (FALSE);
327 }
328 s = mem_alloc(sizeof(struct svc_callout));
329 if (s == NULL) {
330 return (FALSE);
331 }
332 s->sc_prog = (rpcprog_t)prog;
333 s->sc_vers = (rpcvers_t)vers;
334 s->sc_dispatch = dispatch;
335 s->sc_next = svc_head;
336 svc_head = s;
337 pmap_it:
338 /* now register the information with the local binder service */
339 if (protocol) {
340 return (pmap_set(prog, vers, protocol, xprt->xp_port));
341 }
342 return (TRUE);
343 }
344
345 /*
346 * Remove a service program from the callout list.
347 */
348 void
349 svc_unregister(prog, vers)
350 u_long prog;
351 u_long vers;
352 {
353 struct svc_callout *prev;
354 struct svc_callout *s;
355
356 if ((s = svc_find((rpcprog_t)prog, (rpcvers_t)vers, &prev, NULL)) ==
357 NULL)
358 return;
359 if (prev == NULL) {
360 svc_head = s->sc_next;
361 } else {
362 prev->sc_next = s->sc_next;
363 }
364 s->sc_next = NULL;
365 mem_free(s, sizeof(struct svc_callout));
366 /* now unregister the information with the local binder service */
367 (void)pmap_unset(prog, vers);
368 }
369 #endif /* PORTMAP */
370
371 /*
372 * Search the callout list for a program number, return the callout
373 * struct.
374 */
375 static struct svc_callout *
376 svc_find(prog, vers, prev, netid)
377 rpcprog_t prog;
378 rpcvers_t vers;
379 struct svc_callout **prev;
380 char *netid;
381 {
382 struct svc_callout *s, *p;
383
384 _DIAGASSERT(prev != NULL);
385 /* netid is handled below */
386
387 p = NULL;
388 for (s = svc_head; s != NULL; s = s->sc_next) {
389 if (((s->sc_prog == prog) && (s->sc_vers == vers)) &&
390 ((netid == NULL) || (s->sc_netid == NULL) ||
391 (strcmp(netid, s->sc_netid) == 0)))
392 break;
393 p = s;
394 }
395 *prev = p;
396 return (s);
397 }
398
399 /* ******************* REPLY GENERATION ROUTINES ************ */
400
401 /*
402 * Send a reply to an rpc request
403 */
404 bool_t
405 svc_sendreply(xprt, xdr_results, xdr_location)
406 SVCXPRT *xprt;
407 xdrproc_t xdr_results;
408 const char *xdr_location;
409 {
410 struct rpc_msg rply;
411
412 _DIAGASSERT(xprt != NULL);
413
414 rply.rm_direction = REPLY;
415 rply.rm_reply.rp_stat = MSG_ACCEPTED;
416 rply.acpted_rply.ar_verf = xprt->xp_verf;
417 rply.acpted_rply.ar_stat = SUCCESS;
418 rply.acpted_rply.ar_results.where = xdr_location;
419 rply.acpted_rply.ar_results.proc = xdr_results;
420 return (SVC_REPLY(xprt, &rply));
421 }
422
423 /*
424 * No procedure error reply
425 */
426 void
427 svcerr_noproc(xprt)
428 SVCXPRT *xprt;
429 {
430 struct rpc_msg rply;
431
432 _DIAGASSERT(xprt != NULL);
433
434 rply.rm_direction = REPLY;
435 rply.rm_reply.rp_stat = MSG_ACCEPTED;
436 rply.acpted_rply.ar_verf = xprt->xp_verf;
437 rply.acpted_rply.ar_stat = PROC_UNAVAIL;
438 SVC_REPLY(xprt, &rply);
439 }
440
441 /*
442 * Can't decode args error reply
443 */
444 void
445 svcerr_decode(xprt)
446 SVCXPRT *xprt;
447 {
448 struct rpc_msg rply;
449
450 _DIAGASSERT(xprt != NULL);
451
452 rply.rm_direction = REPLY;
453 rply.rm_reply.rp_stat = MSG_ACCEPTED;
454 rply.acpted_rply.ar_verf = xprt->xp_verf;
455 rply.acpted_rply.ar_stat = GARBAGE_ARGS;
456 SVC_REPLY(xprt, &rply);
457 }
458
459 /*
460 * Some system error
461 */
462 void
463 svcerr_systemerr(xprt)
464 SVCXPRT *xprt;
465 {
466 struct rpc_msg rply;
467
468 _DIAGASSERT(xprt != NULL);
469
470 rply.rm_direction = REPLY;
471 rply.rm_reply.rp_stat = MSG_ACCEPTED;
472 rply.acpted_rply.ar_verf = xprt->xp_verf;
473 rply.acpted_rply.ar_stat = SYSTEM_ERR;
474 SVC_REPLY(xprt, &rply);
475 }
476
477 #if 0
478 /*
479 * Tell RPC package to not complain about version errors to the client. This
480 * is useful when revving broadcast protocols that sit on a fixed address.
481 * There is really one (or should be only one) example of this kind of
482 * protocol: the portmapper (or rpc binder).
483 */
484 void
485 __svc_versquiet_on(xprt)
486 SVCXPRT *xprt;
487 {
488 u_long tmp;
489
490 _DIAGASSERT(xprt != NULL);
491
492 tmp = ((u_long) xprt->xp_p3) | SVC_VERSQUIET;
493 xprt->xp_p3 = (caddr_t) tmp;
494 }
495
496 void
497 __svc_versquiet_off(xprt)
498 SVCXPRT *xprt;
499 {
500 u_long tmp;
501
502 _DIAGASSERT(xprt != NULL);
503
504 tmp = ((u_long) xprt->xp_p3) & ~SVC_VERSQUIET;
505 xprt->xp_p3 = (caddr_t) tmp;
506 }
507
508 void
509 svc_versquiet(xprt)
510 SVCXPRT *xprt;
511 {
512 __svc_versquiet_on(xprt);
513 }
514
515 int
516 __svc_versquiet_get(xprt)
517 SVCXPRT *xprt;
518 {
519
520 _DIAGASSERT(xprt != NULL);
521
522 return ((int) xprt->xp_p3) & SVC_VERSQUIET;
523 }
524 #endif
525
526 /*
527 * Authentication error reply
528 */
529 void
530 svcerr_auth(xprt, why)
531 SVCXPRT *xprt;
532 enum auth_stat why;
533 {
534 struct rpc_msg rply;
535
536 _DIAGASSERT(xprt != NULL);
537
538 rply.rm_direction = REPLY;
539 rply.rm_reply.rp_stat = MSG_DENIED;
540 rply.rjcted_rply.rj_stat = AUTH_ERROR;
541 rply.rjcted_rply.rj_why = why;
542 SVC_REPLY(xprt, &rply);
543 }
544
545 /*
546 * Auth too weak error reply
547 */
548 void
549 svcerr_weakauth(xprt)
550 SVCXPRT *xprt;
551 {
552
553 _DIAGASSERT(xprt != NULL);
554
555 svcerr_auth(xprt, AUTH_TOOWEAK);
556 }
557
558 /*
559 * Program unavailable error reply
560 */
561 void
562 svcerr_noprog(xprt)
563 SVCXPRT *xprt;
564 {
565 struct rpc_msg rply;
566
567 _DIAGASSERT(xprt != NULL);
568
569 rply.rm_direction = REPLY;
570 rply.rm_reply.rp_stat = MSG_ACCEPTED;
571 rply.acpted_rply.ar_verf = xprt->xp_verf;
572 rply.acpted_rply.ar_stat = PROG_UNAVAIL;
573 SVC_REPLY(xprt, &rply);
574 }
575
576 /*
577 * Program version mismatch error reply
578 */
579 void
580 svcerr_progvers(xprt, low_vers, high_vers)
581 SVCXPRT *xprt;
582 rpcvers_t low_vers;
583 rpcvers_t high_vers;
584 {
585 struct rpc_msg rply;
586
587 _DIAGASSERT(xprt != NULL);
588
589 rply.rm_direction = REPLY;
590 rply.rm_reply.rp_stat = MSG_ACCEPTED;
591 rply.acpted_rply.ar_verf = xprt->xp_verf;
592 rply.acpted_rply.ar_stat = PROG_MISMATCH;
593 rply.acpted_rply.ar_vers.low = (u_int32_t)low_vers;
594 rply.acpted_rply.ar_vers.high = (u_int32_t)high_vers;
595 SVC_REPLY(xprt, &rply);
596 }
597
598 /* ******************* SERVER INPUT STUFF ******************* */
599
600 /*
601 * Get server side input from some transport.
602 *
603 * Statement of authentication parameters management:
604 * This function owns and manages all authentication parameters, specifically
605 * the "raw" parameters (msg.rm_call.cb_cred and msg.rm_call.cb_verf) and
606 * the "cooked" credentials (rqst->rq_clntcred).
607 * However, this function does not know the structure of the cooked
608 * credentials, so it make the following assumptions:
609 * a) the structure is contiguous (no pointers), and
610 * b) the cred structure size does not exceed RQCRED_SIZE bytes.
611 * In all events, all three parameters are freed upon exit from this routine.
612 * The storage is trivially management on the call stack in user land, but
613 * is mallocated in kernel land.
614 */
615
616 void
617 svc_getreq(rdfds)
618 int rdfds;
619 {
620 fd_set readfds;
621
622 FD_ZERO(&readfds);
623 readfds.fds_bits[0] = rdfds;
624 svc_getreqset(&readfds);
625 }
626
627 void
628 svc_getreqset(readfds)
629 fd_set *readfds;
630 {
631 int bit, fd;
632 int32_t mask, *maskp;
633 int sock;
634
635 _DIAGASSERT(readfds != NULL);
636
637 maskp = readfds->fds_bits;
638 for (sock = 0; sock < FD_SETSIZE; sock += NFDBITS) {
639 for (mask = *maskp++; (bit = ffs(mask)) != 0;
640 mask ^= (1 << (bit - 1))) {
641 /* sock has input waiting */
642 fd = sock + bit - 1;
643 svc_getreq_common(fd);
644 }
645 }
646 }
647
648 void
649 svc_getreq_common(fd)
650 int fd;
651 {
652 SVCXPRT *xprt;
653 struct svc_req r;
654 struct rpc_msg msg;
655 int prog_found;
656 rpcvers_t low_vers;
657 rpcvers_t high_vers;
658 enum xprt_stat stat;
659 char cred_area[2*MAX_AUTH_BYTES + RQCRED_SIZE];
660
661 msg.rm_call.cb_cred.oa_base = cred_area;
662 msg.rm_call.cb_verf.oa_base = &(cred_area[MAX_AUTH_BYTES]);
663 r.rq_clntcred = &(cred_area[2*MAX_AUTH_BYTES]);
664
665 rwlock_rdlock(&svc_fd_lock);
666 xprt = __svc_xports[fd];
667 rwlock_unlock(&svc_fd_lock);
668 if (xprt == NULL)
669 /* But do we control sock? */
670 return;
671 /* now receive msgs from xprtprt (support batch calls) */
672 do {
673 if (SVC_RECV(xprt, &msg)) {
674
675 /* now find the exported program and call it */
676 struct svc_callout *s;
677 enum auth_stat why;
678
679 r.rq_xprt = xprt;
680 r.rq_prog = msg.rm_call.cb_prog;
681 r.rq_vers = msg.rm_call.cb_vers;
682 r.rq_proc = msg.rm_call.cb_proc;
683 r.rq_cred = msg.rm_call.cb_cred;
684 /* first authenticate the message */
685 if ((why = _authenticate(&r, &msg)) != AUTH_OK) {
686 svcerr_auth(xprt, why);
687 goto call_done;
688 }
689 /* now match message with a registered service*/
690 prog_found = FALSE;
691 low_vers = (rpcvers_t) -1L;
692 high_vers = (rpcvers_t) 0L;
693 for (s = svc_head; s != NULL; s = s->sc_next) {
694 if (s->sc_prog == r.rq_prog) {
695 if (s->sc_vers == r.rq_vers) {
696 (*s->sc_dispatch)(&r, xprt);
697 goto call_done;
698 } /* found correct version */
699 prog_found = TRUE;
700 if (s->sc_vers < low_vers)
701 low_vers = s->sc_vers;
702 if (s->sc_vers > high_vers)
703 high_vers = s->sc_vers;
704 } /* found correct program */
705 }
706 /*
707 * if we got here, the program or version
708 * is not served ...
709 */
710 if (prog_found)
711 svcerr_progvers(xprt, low_vers, high_vers);
712 else
713 svcerr_noprog(xprt);
714 /* Fall through to ... */
715 }
716 /*
717 * Check if the xprt has been disconnected in a
718 * recursive call in the service dispatch routine.
719 * If so, then break.
720 */
721 rwlock_rdlock(&svc_fd_lock);
722 if (xprt != __svc_xports[fd]) {
723 rwlock_unlock(&svc_fd_lock);
724 break;
725 }
726 rwlock_unlock(&svc_fd_lock);
727 call_done:
728 if ((stat = SVC_STAT(xprt)) == XPRT_DIED){
729 SVC_DESTROY(xprt);
730 break;
731 }
732 } while (stat == XPRT_MOREREQS);
733 }
734
735
736 void
737 svc_getreq_poll(pfdp, pollretval)
738 struct pollfd *pfdp;
739 int pollretval;
740 {
741 int i;
742 int fds_found;
743
744 _DIAGASSERT(pfdp != NULL);
745
746 for (i = fds_found = 0; fds_found < pollretval; i++) {
747 struct pollfd *p = &pfdp[i];
748
749 if (p->revents) {
750 /* fd has input waiting */
751 fds_found++;
752 /*
753 * We assume that this function is only called
754 * via someone select()ing from svc_fdset or
755 * pollts()ing from svc_pollset[]. Thus it's safe
756 * to handle the POLLNVAL event by simply turning
757 * the corresponding bit off in svc_fdset. The
758 * svc_pollset[] array is derived from svc_fdset
759 * and so will also be updated eventually.
760 *
761 * XXX Should we do an xprt_unregister() instead?
762 */
763 if (p->revents & POLLNVAL) {
764 rwlock_wrlock(&svc_fd_lock);
765 FD_CLR(p->fd, &svc_fdset);
766 rwlock_unlock(&svc_fd_lock);
767 } else
768 svc_getreq_common(p->fd);
769 }
770 }
771 }
772
773 bool_t
774 rpc_control(int what, void *arg)
775 {
776 int val;
777
778 switch (what) {
779 case RPC_SVC_CONNMAXREC_SET:
780 val = *(int *)arg;
781 if (val <= 0)
782 return FALSE;
783 __svc_maxrec = val;
784 return TRUE;
785 case RPC_SVC_CONNMAXREC_GET:
786 *(int *)arg = __svc_maxrec;
787 return TRUE;
788 default:
789 break;
790 }
791 return FALSE;
792 }
793