svc_generic.c revision 1.12.2.2 1 1.12.2.1 tls /* $NetBSD: svc_generic.c,v 1.12.2.2 2014/08/20 00:02:15 tls Exp $ */
2 1.1 fvdl
3 1.1 fvdl /*
4 1.12.2.1 tls * Copyright (c) 2010, Oracle America, Inc.
5 1.12.2.1 tls *
6 1.12.2.1 tls * Redistribution and use in source and binary forms, with or without
7 1.12.2.1 tls * modification, are permitted provided that the following conditions are
8 1.12.2.1 tls * met:
9 1.12.2.1 tls *
10 1.12.2.1 tls * * Redistributions of source code must retain the above copyright
11 1.12.2.1 tls * notice, this list of conditions and the following disclaimer.
12 1.12.2.1 tls * * Redistributions in binary form must reproduce the above
13 1.12.2.1 tls * copyright notice, this list of conditions and the following
14 1.12.2.1 tls * disclaimer in the documentation and/or other materials
15 1.12.2.1 tls * provided with the distribution.
16 1.12.2.1 tls * * Neither the name of the "Oracle America, Inc." nor the names of its
17 1.12.2.1 tls * contributors may be used to endorse or promote products derived
18 1.12.2.1 tls * from this software without specific prior written permission.
19 1.12.2.1 tls *
20 1.12.2.1 tls * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 1.12.2.1 tls * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 1.12.2.1 tls * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
23 1.12.2.1 tls * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
24 1.12.2.1 tls * COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
25 1.12.2.1 tls * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 1.12.2.1 tls * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
27 1.12.2.1 tls * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
28 1.12.2.1 tls * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
29 1.12.2.1 tls * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
30 1.12.2.1 tls * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
31 1.12.2.1 tls * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32 1.1 fvdl */
33 1.1 fvdl
34 1.1 fvdl /*
35 1.1 fvdl * Copyright (c) 1986-1991 by Sun Microsystems Inc.
36 1.1 fvdl */
37 1.1 fvdl
38 1.1 fvdl /* #ident "@(#)svc_generic.c 1.19 94/04/24 SMI" */
39 1.1 fvdl
40 1.7 itojun #include <sys/cdefs.h>
41 1.7 itojun #if defined(LIBC_SCCS) && !defined(lint)
42 1.1 fvdl #if 0
43 1.1 fvdl static char sccsid[] = "@(#)svc_generic.c 1.21 89/02/28 Copyr 1988 Sun Micro";
44 1.7 itojun #else
45 1.12.2.1 tls __RCSID("$NetBSD: svc_generic.c,v 1.12.2.2 2014/08/20 00:02:15 tls Exp $");
46 1.1 fvdl #endif
47 1.1 fvdl #endif
48 1.1 fvdl
49 1.1 fvdl /*
50 1.1 fvdl * svc_generic.c, Server side for RPC.
51 1.1 fvdl *
52 1.1 fvdl */
53 1.1 fvdl
54 1.1 fvdl #include "namespace.h"
55 1.1 fvdl #include "reentrant.h"
56 1.1 fvdl #include <sys/types.h>
57 1.1 fvdl #include <sys/socket.h>
58 1.1 fvdl #include <netinet/in.h>
59 1.1 fvdl #include <rpc/rpc.h>
60 1.3 christos #include <rpc/nettype.h>
61 1.1 fvdl #include <stdio.h>
62 1.1 fvdl #include <errno.h>
63 1.11 dholland #include <stdlib.h>
64 1.1 fvdl #include <string.h>
65 1.1 fvdl #include <unistd.h>
66 1.1 fvdl #include <err.h>
67 1.1 fvdl
68 1.12.2.1 tls #include "svc_fdset.h"
69 1.4 fvdl #include "rpc_internal.h"
70 1.1 fvdl
71 1.1 fvdl #ifdef __weak_alias
72 1.1 fvdl __weak_alias(svc_create,_svc_create)
73 1.1 fvdl __weak_alias(svc_tp_create,_svc_tp_create)
74 1.1 fvdl __weak_alias(svc_tli_create,_svc_tli_create)
75 1.1 fvdl #endif
76 1.1 fvdl
77 1.12 matt extern int __svc_vc_setflag(SVCXPRT *, int);
78 1.1 fvdl
79 1.1 fvdl /*
80 1.1 fvdl * The highest level interface for server creation.
81 1.1 fvdl * It tries for all the nettokens in that particular class of token
82 1.1 fvdl * and returns the number of handles it can create and/or find.
83 1.1 fvdl *
84 1.1 fvdl * It creates a link list of all the handles it could create.
85 1.1 fvdl * If svc_create() is called multiple times, it uses the handle
86 1.1 fvdl * created earlier instead of creating a new handle every time.
87 1.1 fvdl */
88 1.1 fvdl int
89 1.12 matt svc_create(
90 1.12 matt void (*dispatch)(struct svc_req *, SVCXPRT *),
91 1.12 matt rpcprog_t prognum, /* Program number */
92 1.12 matt rpcvers_t versnum, /* Version number */
93 1.12 matt const char *nettype) /* Networktype token */
94 1.1 fvdl {
95 1.1 fvdl struct xlist {
96 1.1 fvdl SVCXPRT *xprt; /* Server handle */
97 1.1 fvdl struct xlist *next; /* Next item */
98 1.1 fvdl } *l;
99 1.1 fvdl static struct xlist *xprtlist; /* A link list of all the handles */
100 1.1 fvdl int num = 0;
101 1.1 fvdl SVCXPRT *xprt;
102 1.1 fvdl struct netconfig *nconf;
103 1.1 fvdl void *handle;
104 1.5 thorpej #ifdef _REENTRANT
105 1.1 fvdl extern mutex_t xprtlist_lock;
106 1.1 fvdl #endif
107 1.1 fvdl
108 1.1 fvdl /* VARIABLES PROTECTED BY xprtlist_lock: xprtlist */
109 1.1 fvdl
110 1.3 christos if ((handle = __rpc_setconf(nettype)) == NULL) {
111 1.12.2.1 tls warnx("%s: unknown protocol %s", __func__, nettype);
112 1.1 fvdl return (0);
113 1.1 fvdl }
114 1.3 christos while ((nconf = __rpc_getconf(handle)) != NULL) {
115 1.1 fvdl mutex_lock(&xprtlist_lock);
116 1.1 fvdl for (l = xprtlist; l; l = l->next) {
117 1.1 fvdl if (strcmp(l->xprt->xp_netid, nconf->nc_netid) == 0) {
118 1.1 fvdl /* Found an old one, use it */
119 1.1 fvdl (void) rpcb_unset(prognum, versnum, nconf);
120 1.1 fvdl if (svc_reg(l->xprt, prognum, versnum,
121 1.1 fvdl dispatch, nconf) == FALSE)
122 1.12.2.1 tls warnx("%s: could not register prog %u "
123 1.12.2.1 tls "vers %u on %s", __func__,
124 1.12.2.1 tls (unsigned)prognum,
125 1.12.2.1 tls (unsigned)versnum, nconf->nc_netid);
126 1.1 fvdl else
127 1.1 fvdl num++;
128 1.1 fvdl break;
129 1.1 fvdl }
130 1.1 fvdl }
131 1.3 christos if (l == NULL) {
132 1.1 fvdl /* It was not found. Now create a new one */
133 1.1 fvdl xprt = svc_tp_create(dispatch, prognum, versnum, nconf);
134 1.1 fvdl if (xprt) {
135 1.10 christos l = malloc(sizeof(*l));
136 1.3 christos if (l == NULL) {
137 1.12.2.1 tls warn("%s: out of memory", __func__);
138 1.1 fvdl mutex_unlock(&xprtlist_lock);
139 1.1 fvdl return (0);
140 1.1 fvdl }
141 1.1 fvdl l->xprt = xprt;
142 1.1 fvdl l->next = xprtlist;
143 1.1 fvdl xprtlist = l;
144 1.1 fvdl num++;
145 1.1 fvdl }
146 1.1 fvdl }
147 1.1 fvdl mutex_unlock(&xprtlist_lock);
148 1.1 fvdl }
149 1.1 fvdl __rpc_endconf(handle);
150 1.1 fvdl /*
151 1.1 fvdl * In case of num == 0; the error messages are generated by the
152 1.1 fvdl * underlying layers; and hence not needed here.
153 1.1 fvdl */
154 1.1 fvdl return (num);
155 1.1 fvdl }
156 1.1 fvdl
157 1.1 fvdl /*
158 1.1 fvdl * The high level interface to svc_tli_create().
159 1.1 fvdl * It tries to create a server for "nconf" and registers the service
160 1.1 fvdl * with the rpcbind. It calls svc_tli_create();
161 1.1 fvdl */
162 1.1 fvdl SVCXPRT *
163 1.12 matt svc_tp_create(
164 1.12 matt void (*dispatch)(struct svc_req *, SVCXPRT *),
165 1.12 matt rpcprog_t prognum, /* Program number */
166 1.12 matt rpcvers_t versnum, /* Version number */
167 1.12 matt const struct netconfig *nconf) /* Netconfig structure for the network */
168 1.1 fvdl {
169 1.1 fvdl SVCXPRT *xprt;
170 1.1 fvdl
171 1.3 christos if (nconf == NULL) {
172 1.12.2.1 tls warnx("%s: invalid netconfig structure for prog %u vers %u",
173 1.12.2.1 tls __func__, (unsigned)prognum, (unsigned)versnum);
174 1.3 christos return (NULL);
175 1.1 fvdl }
176 1.3 christos xprt = svc_tli_create(RPC_ANYFD, nconf, NULL, 0, 0);
177 1.3 christos if (xprt == NULL) {
178 1.3 christos return (NULL);
179 1.1 fvdl }
180 1.8 christos (void) rpcb_unset(prognum, versnum, __UNCONST(nconf));
181 1.1 fvdl if (svc_reg(xprt, prognum, versnum, dispatch, nconf) == FALSE) {
182 1.12.2.1 tls warnx("%s: Could not register prog %u vers %u on %s",
183 1.12.2.1 tls __func__, (unsigned)prognum, (unsigned)versnum,
184 1.12.2.1 tls nconf->nc_netid);
185 1.1 fvdl SVC_DESTROY(xprt);
186 1.3 christos return (NULL);
187 1.1 fvdl }
188 1.1 fvdl return (xprt);
189 1.1 fvdl }
190 1.1 fvdl
191 1.1 fvdl /*
192 1.1 fvdl * If fd is RPC_ANYFD, then it opens a fd for the given transport
193 1.1 fvdl * provider (nconf cannot be NULL then). If the t_state is T_UNBND and
194 1.1 fvdl * bindaddr is NON-NULL, it performs a t_bind using the bindaddr. For
195 1.1 fvdl * NULL bindadr and Connection oriented transports, the value of qlen
196 1.1 fvdl * is set to 8.
197 1.1 fvdl *
198 1.1 fvdl * If sendsz or recvsz are zero, their default values are chosen.
199 1.1 fvdl */
200 1.1 fvdl SVCXPRT *
201 1.12 matt svc_tli_create(
202 1.12 matt int fd, /* Connection end point */
203 1.12 matt const struct netconfig *nconf, /* Netconfig struct for nettoken */
204 1.12 matt const struct t_bind *bindaddr, /* Local bind address */
205 1.12 matt u_int sendsz, /* Max sendsize */
206 1.12 matt u_int recvsz) /* Max recvsize */
207 1.1 fvdl {
208 1.3 christos SVCXPRT *xprt = NULL; /* service handle */
209 1.1 fvdl bool_t madefd = FALSE; /* whether fd opened here */
210 1.1 fvdl struct __rpc_sockinfo si;
211 1.1 fvdl struct sockaddr_storage ss;
212 1.1 fvdl socklen_t slen;
213 1.1 fvdl
214 1.1 fvdl if (fd == RPC_ANYFD) {
215 1.3 christos if (nconf == NULL) {
216 1.12.2.1 tls warnx("%s: invalid netconfig", __func__);
217 1.3 christos return (NULL);
218 1.1 fvdl }
219 1.1 fvdl fd = __rpc_nconf2fd(nconf);
220 1.1 fvdl if (fd == -1) {
221 1.12.2.1 tls warnx("%s: could not open connection for %s", __func__,
222 1.12.2.1 tls nconf->nc_netid);
223 1.3 christos return (NULL);
224 1.1 fvdl }
225 1.1 fvdl __rpc_nconf2sockinfo(nconf, &si);
226 1.1 fvdl madefd = TRUE;
227 1.1 fvdl } else {
228 1.1 fvdl /*
229 1.1 fvdl * It is an open descriptor. Get the transport info.
230 1.1 fvdl */
231 1.1 fvdl if (!__rpc_fd2sockinfo(fd, &si)) {
232 1.12.2.1 tls warnx("%s: could not get transport information",
233 1.12.2.1 tls __func__);
234 1.3 christos return (NULL);
235 1.1 fvdl }
236 1.1 fvdl }
237 1.1 fvdl
238 1.1 fvdl /*
239 1.1 fvdl * If the fd is unbound, try to bind it.
240 1.1 fvdl */
241 1.1 fvdl if (madefd || !__rpc_sockisbound(fd)) {
242 1.1 fvdl if (bindaddr == NULL) {
243 1.2 fvdl if (bindresvport(fd, NULL) < 0) {
244 1.2 fvdl memset(&ss, 0, sizeof ss);
245 1.2 fvdl ss.ss_family = si.si_af;
246 1.2 fvdl ss.ss_len = si.si_alen;
247 1.2 fvdl if (bind(fd, (struct sockaddr *)(void *)&ss,
248 1.3 christos (socklen_t)si.si_alen) < 0) {
249 1.12.2.1 tls warn( "%s: could not bind to anonymous "
250 1.12.2.1 tls "port", __func__);
251 1.2 fvdl goto freedata;
252 1.2 fvdl }
253 1.1 fvdl }
254 1.12.2.2 tls if (si.si_socktype != SOCK_DGRAM &&
255 1.12.2.2 tls listen(fd, SOMAXCONN) == -1) {
256 1.12.2.2 tls warnx("%s: could not listen at anonymous port",
257 1.12.2.2 tls __func__);
258 1.12.2.2 tls goto freedata;
259 1.12.2.2 tls }
260 1.1 fvdl } else {
261 1.3 christos if (bind(fd,
262 1.6 yamt (struct sockaddr *)bindaddr->addr.buf,
263 1.3 christos (socklen_t)si.si_alen) < 0) {
264 1.12.2.1 tls warnx("%s: could not bind to requested address",
265 1.12.2.1 tls __func__);
266 1.1 fvdl goto freedata;
267 1.1 fvdl }
268 1.12.2.2 tls if (si.si_socktype != SOCK_DGRAM &&
269 1.12.2.2 tls listen(fd, (int)bindaddr->qlen) == -1) {
270 1.12.2.2 tls warnx("%s: could not listen at requested "
271 1.12.2.2 tls "address", __func__);
272 1.12.2.2 tls goto freedata;
273 1.12.2.2 tls }
274 1.1 fvdl }
275 1.1 fvdl }
276 1.1 fvdl /*
277 1.1 fvdl * call transport specific function.
278 1.1 fvdl */
279 1.1 fvdl switch (si.si_socktype) {
280 1.12.2.1 tls case SOCK_STREAM:
281 1.12.2.1 tls slen = sizeof ss;
282 1.12.2.1 tls if (getpeername(fd, (struct sockaddr *)(void *)&ss, &slen)
283 1.12.2.1 tls == 0) {
284 1.12.2.1 tls /* accepted socket */
285 1.12.2.1 tls xprt = svc_fd_create(fd, sendsz, recvsz);
286 1.12.2.1 tls } else
287 1.12.2.1 tls xprt = svc_vc_create(fd, sendsz, recvsz);
288 1.12.2.1 tls if (!nconf || !xprt)
289 1.12.2.1 tls break;
290 1.1 fvdl #if 0
291 1.12.2.1 tls /* XXX fvdl */
292 1.12.2.1 tls if (strcmp(nconf->nc_protofmly, "inet") == 0 ||
293 1.12.2.1 tls strcmp(nconf->nc_protofmly, "inet6") == 0)
294 1.12.2.1 tls (void) __svc_vc_setflag(xprt, TRUE);
295 1.1 fvdl #endif
296 1.12.2.1 tls break;
297 1.12.2.1 tls case SOCK_DGRAM:
298 1.12.2.1 tls xprt = svc_dg_create(fd, sendsz, recvsz);
299 1.12.2.1 tls break;
300 1.12.2.1 tls default:
301 1.12.2.1 tls warnx("%s: bad service type %u", __func__, si.si_socktype);
302 1.12.2.1 tls goto freedata;
303 1.1 fvdl }
304 1.1 fvdl
305 1.3 christos if (xprt == NULL)
306 1.1 fvdl /*
307 1.1 fvdl * The error messages here are spitted out by the lower layers:
308 1.1 fvdl * svc_vc_create(), svc_fd_create() and svc_dg_create().
309 1.1 fvdl */
310 1.1 fvdl goto freedata;
311 1.1 fvdl
312 1.1 fvdl /* Fill in type of service */
313 1.1 fvdl xprt->xp_type = __rpc_socktype2seman(si.si_socktype);
314 1.1 fvdl
315 1.1 fvdl if (nconf) {
316 1.1 fvdl xprt->xp_netid = strdup(nconf->nc_netid);
317 1.1 fvdl xprt->xp_tp = strdup(nconf->nc_device);
318 1.10 christos if (xprt->xp_netid == NULL || xprt->xp_tp == NULL) {
319 1.10 christos svc_destroy(xprt);
320 1.10 christos return NULL;
321 1.10 christos }
322 1.1 fvdl }
323 1.1 fvdl return (xprt);
324 1.1 fvdl
325 1.1 fvdl freedata:
326 1.1 fvdl if (madefd)
327 1.1 fvdl (void) close(fd);
328 1.3 christos return (NULL);
329 1.1 fvdl }
330